└── README.md /README.md: -------------------------------------------------------------------------------- 1 | # API Documentation 2 | 3 | ## Osprey Vision 4 | [Osprey Vision](https://www.osprey.vision) is an Artificial Intelligence API for Information Discovery. 5 | 6 | ### Endpoints without authentication (aggressive ratelimits, limited access) 7 | - Returns a streaming response for a prompt
8 | `POST` https://api.osprey.vision/ 9 | - `prompt` (json dict string | mandatory): ask any query 10 | 11 | ### Endpoints with authentication (no ratelimits, full access) 12 | - Returns a streaming response for a prompt
13 | `POST` https://api.osprey.vision/beta/ 14 | - `prompt` (json dict string | mandatory): ask any query 15 | - `auth` (json dict string | mandatory): [authentication code](https://www.arpsyndicate.io/pricing.html) 16 | 17 | - Returns a streaming response containing a summary for a list of webpages
18 | `POST` https://api.osprey.vision/summarize/ 19 | - `links` (json dict string | mandatory): HTTP/HTTPS links separated by space/newline 20 | - `auth` (json dict string | mandatory): [authentication code](https://www.arpsyndicate.io/pricing.html) 21 | 22 | - Returns a streaming response containing a vulnerability advisory
23 | `POST` https://api.osprey.vision/advisory/ 24 | - `vulnid` (json dict string | mandatory): generates for a [supported vulnerability identifier](#supported-vulnerability-identifiers) 25 | - `lang` (json dict string | mandatory): choose from English, Mandarin, Spanish, Russian, French, German, Finnish, Estonian, Japanese, Korean, Italian & Hindi 26 | - `auth` (json dict string | mandatory): [authentication code](https://www.arpsyndicate.io/pricing.html) 27 | 28 | ## Subdomain Center 29 | [Subdomain Center](https://www.subdomain.center) is a Shadow IT / Subdomain Intelligence API. 30 | 31 | ### Endpoints without authentication (aggressive ratelimits, limited access) 32 | - Returns a list of subdomains for a domain
33 | `GET` https://api.subdomain.center/?domain={DOMAIN}&engine={ENGINE} 34 | - `domain` (string | mandatory): searches by any domain/subdomain 35 | - `engine` (string | optional): choose a clustering engine 36 | - `cuttlefish` (default): clusters by domain 37 | - `octopus`: clusters by visual identity 38 | 39 | ### Endpoints with authentication (no ratelimits, full access) 40 | - Returns a list of subdomains for a domain
41 | `GET` https://api.subdomain.center/beta/?domain={DOMAIN}&engine={ENGINE}&auth={AUTH} 42 | - `domain` (string | mandatory): searches by any domain/subdomain 43 | - `engine` (string | optional): choose a clustering engine 44 | - `cuttlefish` (default): clusters by domain 45 | - `octopus`: clusters by visual identity 46 | - `auth` (string | mandatory): [authentication code](https://www.arpsyndicate.io/pricing.html) 47 | 48 | 49 | ## Exploit Observer 50 | [Exploit Observer](https://www.exploit.observer) is a Vulnerability / Exploit Intelligence API. 51 | 52 | ### Endpoints without authentication (no ratelimits) 53 | - Returns a watchlist of vulnerability & exploit identifiers
54 | `GET` https://api.exploit.observer/watchlist/identifiers 55 | 56 | - Returns a detailed watchlist of vulnerability & exploit identifiers
57 | `GET` https://api.exploit.observer/watchlist/describers 58 | 59 | - Returns a watchlist of vulnerable technologies
60 | `GET` https://api.exploit.observer/watchlist/technologies 61 | 62 | - Returns statistics around all vulnerabilities & exploits
63 | `GET` https://api.exploit.observer/stats 64 | 65 | ### Endpoints without authentication (aggressive ratelimits) 66 | - Returns information related to a VID
67 | `GET` https://api.exploit.observer/?keyword={VID}&enrich={TRUE/FALSE} 68 | - `keyword` (string | mandatory): searches by any of the [supported vulnerability identifiers](#supported-vulnerability-identifiers) 69 | - `enrich` (boolean | optional): enables enrichment with additional data points for CVE/GHSA IDs (Includes EPSS, Aliases, Affected Products & Additional References) 70 | 71 | - Returns a list of VEDAS identifiers associated with a Russian VID but not a CVE
72 | `GET` https://api.exploit.observer/russia/noncve 73 | 74 | - Returns a list of VEDAS identifiers associated with a Chinese VID but not a CVE
75 | `GET` https://api.exploit.observer/china/noncve 76 | 77 | ### Endpoints with authentication (no ratelimits) 78 | - Returns information related to a VID
79 | `GET` https://api.exploit.observer/beta/?keyword={VID}&enrich={TRUE/FALSE}&auth={AUTH} 80 | - `keyword` (string | mandatory): searches by any of the [supported vulnerability identifiers](#supported-vulnerability-identifiers) 81 | - `enrich` (boolean | optional): enables enrichment with additional data points for CVE/GHSA IDs (Includes EPSS, Aliases, Affected Products & Additional References) 82 | - `auth` (string | mandatory): [authentication code](https://www.arpsyndicate.io/pricing.html) 83 | 84 | ### Supported Vulnerability Identifiers 85 | - A.R.P. Syndicate Vulnerability & Exploit Data Aggregation System (VEDAS) - `VEDAS:OBLIVIONHAWK` 86 | - China National Vulnerability Database (CNVD) - `CNVD-2024-02713` 87 | - China National Vulnerability Database of Information Security (CNNVD) - `CNNVD-202312-2255` 88 | - Cisco Talos (TALOS) - `TALOS-2023-1896` 89 | - Common Vulnerabilities and Exposures (CVE) - `CVE-2021-3450` 90 | - CXSecurity World Laboratory of Bugtraq (WLB) - `WLB-2024010058` 91 | - Defiant Wordfence (WORDFENCE) - `WORDFENCE-00086b84-c1ec-447a-a536-1c73eac1cc85` 92 | - European Union Vulnerability Database (EUVD) - `EUVD-2025-14498` 93 | - GitHub Commits (GHCOMMIT) - `GHCOMMIT-102448040d5132460e3b0013e03ebedec0677e00` 94 | - GitHub Repositories (GITHUB) - `GITHUB/aio-libs/aiohttp` 95 | - GitHub Security Advisories (GHSA) - `GHSA-wfh5-x68w-hvw2` 96 | - Google Bug Hunters VRP (GBHVRP) - `GBHVRP-F8GFYGv4g` 97 | - Google Chromium Issues (CHROMIUM) - `CHROMIUM-40057791` 98 | - Google Project Zero (PROJECTZERO) - `PROJECTZERO-42450487` 99 | - Hackerone Hacktivity (H1) - `H1-2230915` 100 | - Japan Vulnerability Notes iPedia (JVNDB) - `JVNDB-2023-006199` 101 | - Knownsec Seebug (SSVID) - `SSVID-99817` 102 | - Linux Open Source Security Foundation (OSSF) - `OSSF-OSV-2024-1427` 103 | - Microsoft Common Vulnerabilities and Exposures (MSCVE) - `MSCVE-2025-21415` 104 | - Mozilla Foundation Issues (MOZILLA) - `MOZILLA-290162` 105 | - Mozilla Foundation Security Advisories (MFSA) - `MFSA2024-51` 106 | - OffSec Exploit Database (EDB) - `EDB-10102` 107 | - openSUSE Common Vulnerabilities and Exposures (SUCVE) - `SUCVE-2023-40547` 108 | - openSUSE Issues (SUSE) - `SUSE-1183851` 109 | - Packet Storm Security (PSS) - `PSS-170615` 110 | - Patchstack (PATCHSTACK) - `PATCHSTACK/spectrum/wordpress-spectrum-theme-remote-code-execution` 111 | - ProjectDiscovery Nuclei (PD) - `PD/http/cves/2020/CVE-2020-12720` 112 | - ProtectAI Huntr (HUNTR) - `HUNTR-001d1c29-805a-4035-93bb-71a0e81da3e5` 113 | - Rapid7 Metasploit Framework (MSF) - `MSF/auxiliary_admin/2wire/xslt_password_reset` 114 | - RedHat Common Vulnerabilities and Exposures (RHCVE) - `RHCVE-2025-27098` 115 | - RedHat Issues (REDHAT) - `REDHAT-290162` 116 | - RedHat Security Advisories (RHSA) - `RHSA-2025:1730` 117 | - Russian Data Bank of Information Security Threats (BDU) - `BDU:2024-00390` 118 | - Snyk Vulnerability Database (SNYK) - `SNYK-JAVA-ORGCLOJURE-5740378` 119 | - Source Incite (SRC) - `SRC-2021-0019` 120 | - Tenable Common Vulnerabilities and Exposures (TNCVE) - `TNCVE-2025-25763` 121 | - Tenable Security Advisories (TNS) - `TNS-2021-05` 122 | - Trend Micro Zero Day Initiative (ZDI) - `ZDI-23-1714` 123 | - VARIoT Exploits (VAR-E) - `VAR-E-201704-0525` 124 | - VARIoT Vulnerabilities (VAR) - `VAR-202404-0085` 125 | - Veracode SourceClear Vulnerability Database (SRCCLR-SID) - `SRCCLR-SID-3173` 126 | - WP Engine WPScan (WPSCAN) - `WPSCAN-52568abd-c509-411e-8391-c75e7613eb42` 127 | - YouTube (YT) - `YT/ccqjhUmwLCk` 128 | - Zero Science Lab (ZSL) - `ZSL-2022-5743` 129 | - 0Day Today (0DAY-ID) - `0DAY-ID-24705` 130 | - Vendor/Product ({vendor}__{product}) - `grafana` 131 | - Vendor/Product + Version ({vendor}__{product}@{version}) - `felixwelberg@1.0.45` 132 | - Multiple Non-VID Keywords ({keywordA}__{keywordB}) - `pci__util` --------------------------------------------------------------------------------