{"id":3900,"date":"2019-02-25T07:58:26","date_gmt":"2019-02-25T02:28:26","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=3900"},"modified":"2019-02-25T07:58:26","modified_gmt":"2019-02-25T02:28:26","slug":"pompem-exploits-vulnerability-database","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/","title":{"rendered":"Pompem : Tool For Exploits &#038; Vulnerability in Database"},"content":{"rendered":"\n<p> Pompem is an open source tool, designed to automate the search for  Exploits and Vulnerability in the most important databases. <\/p>\n\n\n\n<p>Developed in Python, has a system of advanced search, that help the work  of pentesters and ethical hackers. <\/p>\n\n\n\n<p>In the current version, it performs searches in PacketStorm security, CXSecurity, ZeroDay, Vulners, National Vulnerability Database, WPScan Vulnerability Database.<\/p>\n\n\n\n<p><strong>Also Read  : <\/strong><a href=\"https:\/\/kalilinuxtutorials.com\/pf_ring\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"PF_RING : High-Speed Packet Processing Framework (opens in a new tab)\">PF_RING : High-Speed Packet Processing Framework<\/a><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-vivid-green-cyan-background-color\"><strong>Screenshots<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2019\/02\/Screenshots1-1.png\" alt=\"Pompem\" class=\"wp-image-3901\"\/><\/figure><\/div>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2019\/02\/Screenshots2.png\" alt=\"Pompem\" class=\"wp-image-3902\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2019\/02\/Screenshots3.png\" alt=\"Pompem\" class=\"wp-image-3903\"\/><\/figure>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-vivid-green-cyan-background-color\"><strong>Source code<\/strong><\/p>\n\n\n\n<p>You can download the latest <a rel=\"noreferrer noopener\" aria-label=\"tarball (opens in a new tab)\" href=\"https:\/\/github.com\/rfunix\/Pompem\/archive\/v0.2.0.tar.gz\" target=\"_blank\">tarball<\/a> by clicking here or latest <a href=\"https:\/\/github.com\/rfunix\/Pompem\/archive\/v0.2.0.zip\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"zipball (opens in a new tab)\">zipball<\/a> by clicking here.<\/p>\n\n\n\n<p>You can also download it directly from its Git repository:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$ git clone https:\/\/github.com\/rfunix\/Pompem.git<\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-vivid-green-cyan-background-color\"><strong>Dependencies<\/strong><\/p>\n\n\n\n<p>It works out of the box with Python 3.5 on any platform and requires the following packages:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Requests 2.9.1+<\/code><\/pre>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-vivid-green-cyan-background-color\"><strong>Installation<\/strong><\/p>\n\n\n\n<p>Get it up and running in a single command:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$ pip3.5 install -r requirements.txt<\/strong><\/p>\n\n\n\n<p>You may greatly benefit from using virtualenv, which isolates packages installed for every project. If you have never used it, simply check <a href=\"http:\/\/docs.python-guide.org\/en\/latest\/dev\/virtualenvs\">this tutorial<\/a> .<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-vivid-green-cyan-background-color\"><strong>Usage<\/strong><\/p>\n\n\n\n<p>To get the list of basic options and information about the project:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$ python3.5 pompem.py -h<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>Options:<br>   -h, &#8211;help                      show this help message and exit<br>   -s, &#8211;search   text for search<br>   &#8211;txt                           Write txt File<br>   &#8211;html                          Write html File<\/strong><\/p>\n\n\n\n<p>Examples of use:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">$ python3.5 pompem.py -s WordPress<br> $ python3.5 pompem.py -s Joomla &#8211;html<br> $ python3.5 pompem.py -s &#8220;Internet Explorer,joomla,wordpress&#8221; &#8211;html<br> $ python3.5 pompem.py -s FortiGate &#8211;txt<br> $ python3.5 pompem.py -s ssh,ftp,mysql<\/p>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-squared\"><a class=\"wp-block-button__link has-text-color has-very-light-gray-color has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/rfunix\/Pompem\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases. Developed in Python, has a system of advanced search, that help the work of pentesters and ethical hackers. In the current version, it performs searches in PacketStorm security, CXSecurity, ZeroDay, Vulners, National Vulnerability Database, WPScan [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[761,1128,2553,3562],"class_list":["post-3900","post","type-post","status-publish","format-standard","hentry","category-kali","tag-database","tag-exploits","tag-pompem","tag-vulnerability"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pompem : Tool For Exploits &amp; Vulnerability in Database<\/title>\n<meta name=\"description\" content=\"Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pompem : Tool For Exploits &amp; Vulnerability in Database\" \/>\n<meta property=\"og:description\" content=\"Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-25T02:28:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2019\/02\/Screenshots1-1.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Pompem : Tool For Exploits &#038; Vulnerability in Database\",\"datePublished\":\"2019-02-25T02:28:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/\"},\"wordCount\":240,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2019\/02\/Screenshots1-1.png\",\"keywords\":[\"database\",\"Exploits\",\"Pompem\",\"vulnerability\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/\",\"name\":\"Pompem : Tool For Exploits & Vulnerability in Database\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2019\/02\/Screenshots1-1.png\",\"datePublished\":\"2019-02-25T02:28:26+00:00\",\"description\":\"Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/#primaryimage\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2019\/02\/Screenshots1-1.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2019\/02\/Screenshots1-1.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pompem : Tool For Exploits & Vulnerability in Database","description":"Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/","og_locale":"en_US","og_type":"article","og_title":"Pompem : Tool For Exploits & Vulnerability in Database","og_description":"Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases.","og_url":"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2019-02-25T02:28:26+00:00","og_image":[{"url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2019\/02\/Screenshots1-1.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Pompem : Tool For Exploits &#038; Vulnerability in Database","datePublished":"2019-02-25T02:28:26+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/"},"wordCount":240,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2019\/02\/Screenshots1-1.png","keywords":["database","Exploits","Pompem","vulnerability"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/","url":"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/","name":"Pompem : Tool For Exploits & Vulnerability in Database","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2019\/02\/Screenshots1-1.png","datePublished":"2019-02-25T02:28:26+00:00","description":"Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/pompem-exploits-vulnerability-database\/#primaryimage","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2019\/02\/Screenshots1-1.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2019\/02\/Screenshots1-1.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":6546,"url":"https:\/\/kalilinuxtutorials.com\/detexploit-oss-vulnerability-scanner-windows\/","url_meta":{"origin":3900,"position":0},"title":"DetExploit : OSS Vulnerability Scanner for Windows Platform","author":"R K","date":"September 20, 2019","format":false,"excerpt":"DetExploit is software that detect vulnerable applications and not-installed important OS updates on the system, and notify them to user. As we know, most of cyberattacks uses vulnerability that is released out year before. I thought this is huge problem, and this kind of technology should be more powerful than\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/VBev9dtGtEM\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":4910,"url":"https:\/\/kalilinuxtutorials.com\/vulmap-vulnerability-scanners\/","url_meta":{"origin":3900,"position":1},"title":"Vulmap :Online Local Vulnerability Scanners Project","author":"R K","date":"May 9, 2019","format":false,"excerpt":"Vulmap is an open source online local vulnerability scanner project. It consists of online local vulnerability scanning programs for Windows and Linux operating systems. These scripts can be used for defensive and offensive purposes. It is possible to make vulnerability assessments using these scripts. Also they can be used for\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":12521,"url":"https:\/\/kalilinuxtutorials.com\/ronin-a-ruby-platform-for-vulnerability-research-exploit-development\/","url_meta":{"origin":3900,"position":2},"title":"Ronin : A Ruby Platform For Vulnerability Research &#038; Exploit Development","author":"R K","date":"April 22, 2021","format":false,"excerpt":"Ronin is a Ruby platform for vulnerability research and exploit development. Ronin allows for the rapid development and distribution of code, Exploits, Payloads, Scanners, etc, via Repositories. Console Ronin provides users with a powerful Ruby Console, pre-loaded with powerful convenience methods. In the Console one can work with data and\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1717,"url":"https:\/\/kalilinuxtutorials.com\/jcs-joomla-vulnerability\/","url_meta":{"origin":3900,"position":3},"title":"JCS &#8211; Joomla Vulnerability For Penetration Testing Component Scanner","author":"R K","date":"June 24, 2018","format":false,"excerpt":"JCS (Joomla Component Scanner) made for penetration testing purpose on Joomla CMS JCS can help you with the latest component vulnerabilities and exploits. Database can update from several resources and a Crawler has been implemented to find components and component's link. This version supports Exploitdb and Packetstorm vulnerabilities to create\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/JCS.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/JCS.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/JCS.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/JCS.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":36782,"url":"https:\/\/kalilinuxtutorials.com\/vulnerability-research\/","url_meta":{"origin":3900,"position":4},"title":"Vulnerability Research : Harnessing Tools Like Metasploit To Uncover And Mitigate Security Weaknesses","author":"Varshini","date":"March 3, 2025","format":false,"excerpt":"Vulnerability research is a critical aspect of cybersecurity that focuses on identifying, analyzing, and documenting security weaknesses in software, hardware, and networks. This process often involves specialized tools and frameworks that aid researchers in discovering vulnerabilities and developing exploits to demonstrate the risks. Below, we explore the role of tools\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Vulnerability-Research.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Vulnerability-Research.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Vulnerability-Research.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Vulnerability-Research.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Vulnerability-Research.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Vulnerability-Research.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":31309,"url":"https:\/\/kalilinuxtutorials.com\/cve-half-day-watcher\/","url_meta":{"origin":3900,"position":5},"title":"CVE Half-Day Watcher","author":"Varshini","date":"November 17, 2023","format":false,"excerpt":"CVE Half-Day Watcher is a security tool designed to highlight the risk of early exposure of Common Vulnerabilities and Exposures (CVEs) in the public domain. It leverages the National Vulnerability Database (NVD) API to identify recently published CVEs with GitHub references before an official patch is released. By doing so,\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjx0_1-MV0fb94ABOjbvUe2C5s3gNIY9E44gvCagwIOPm6geu6l4UPSTYQ45W-QgslPnwX9qBrmW-31ziGl8EOknI-2PZeNncinxL6IHVbQUsqPz6g9QBx9pT14Tnw6mqplFV_NDIU2Sq38jZ-zJZ85m9TAgFRZqCvG-ALza6VLRzMSCGDPBKvX1b6WkQ\/s16000\/CVE%20Half-Day%20Watcher.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjx0_1-MV0fb94ABOjbvUe2C5s3gNIY9E44gvCagwIOPm6geu6l4UPSTYQ45W-QgslPnwX9qBrmW-31ziGl8EOknI-2PZeNncinxL6IHVbQUsqPz6g9QBx9pT14Tnw6mqplFV_NDIU2Sq38jZ-zJZ85m9TAgFRZqCvG-ALza6VLRzMSCGDPBKvX1b6WkQ\/s16000\/CVE%20Half-Day%20Watcher.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjx0_1-MV0fb94ABOjbvUe2C5s3gNIY9E44gvCagwIOPm6geu6l4UPSTYQ45W-QgslPnwX9qBrmW-31ziGl8EOknI-2PZeNncinxL6IHVbQUsqPz6g9QBx9pT14Tnw6mqplFV_NDIU2Sq38jZ-zJZ85m9TAgFRZqCvG-ALza6VLRzMSCGDPBKvX1b6WkQ\/s16000\/CVE%20Half-Day%20Watcher.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjx0_1-MV0fb94ABOjbvUe2C5s3gNIY9E44gvCagwIOPm6geu6l4UPSTYQ45W-QgslPnwX9qBrmW-31ziGl8EOknI-2PZeNncinxL6IHVbQUsqPz6g9QBx9pT14Tnw6mqplFV_NDIU2Sq38jZ-zJZ85m9TAgFRZqCvG-ALza6VLRzMSCGDPBKvX1b6WkQ\/s16000\/CVE%20Half-Day%20Watcher.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjx0_1-MV0fb94ABOjbvUe2C5s3gNIY9E44gvCagwIOPm6geu6l4UPSTYQ45W-QgslPnwX9qBrmW-31ziGl8EOknI-2PZeNncinxL6IHVbQUsqPz6g9QBx9pT14Tnw6mqplFV_NDIU2Sq38jZ-zJZ85m9TAgFRZqCvG-ALza6VLRzMSCGDPBKvX1b6WkQ\/s16000\/CVE%20Half-Day%20Watcher.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjx0_1-MV0fb94ABOjbvUe2C5s3gNIY9E44gvCagwIOPm6geu6l4UPSTYQ45W-QgslPnwX9qBrmW-31ziGl8EOknI-2PZeNncinxL6IHVbQUsqPz6g9QBx9pT14Tnw6mqplFV_NDIU2Sq38jZ-zJZ85m9TAgFRZqCvG-ALza6VLRzMSCGDPBKvX1b6WkQ\/s16000\/CVE%20Half-Day%20Watcher.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/3900","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=3900"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/3900\/revisions"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=3900"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=3900"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=3900"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}