└── README.md
/README.md:
--------------------------------------------------------------------------------
1 | # API Documentation
2 |
3 | ## Osprey Vision
4 | [Osprey Vision](https://www.osprey.vision) is an Artificial Intelligence API for Information Discovery.
5 |
6 | ### Endpoints without authentication (aggressive ratelimits, limited access)
7 | - Returns a streaming response for a prompt
8 | `POST` https://api.osprey.vision/
9 | - `prompt` (json dict string | mandatory): ask any query
10 |
11 | ### Endpoints with authentication (no ratelimits, full access)
12 | - Returns a streaming response for a prompt
13 | `POST` https://api.osprey.vision/beta/
14 | - `prompt` (json dict string | mandatory): ask any query
15 | - `auth` (json dict string | mandatory): [authentication code](https://www.arpsyndicate.io/pricing.html)
16 |
17 | - Returns a streaming response containing a summary for a list of webpages
18 | `POST` https://api.osprey.vision/summarize/
19 | - `links` (json dict string | mandatory): HTTP/HTTPS links separated by space/newline
20 | - `auth` (json dict string | mandatory): [authentication code](https://www.arpsyndicate.io/pricing.html)
21 |
22 | - Returns a streaming response containing a vulnerability advisory
23 | `POST` https://api.osprey.vision/advisory/
24 | - `vulnid` (json dict string | mandatory): generates for a [supported vulnerability identifier](#supported-vulnerability-identifiers)
25 | - `lang` (json dict string | mandatory): choose from English, Mandarin, Spanish, Russian, French, German, Finnish, Estonian, Japanese, Korean, Italian & Hindi
26 | - `auth` (json dict string | mandatory): [authentication code](https://www.arpsyndicate.io/pricing.html)
27 |
28 | ## Subdomain Center
29 | [Subdomain Center](https://www.subdomain.center) is a Shadow IT / Subdomain Intelligence API.
30 |
31 | ### Endpoints without authentication (aggressive ratelimits, limited access)
32 | - Returns a list of subdomains for a domain
33 | `GET` https://api.subdomain.center/?domain={DOMAIN}&engine={ENGINE}
34 | - `domain` (string | mandatory): searches by any domain/subdomain
35 | - `engine` (string | optional): choose a clustering engine
36 | - `cuttlefish` (default): clusters by domain
37 | - `octopus`: clusters by visual identity
38 |
39 | ### Endpoints with authentication (no ratelimits, full access)
40 | - Returns a list of subdomains for a domain
41 | `GET` https://api.subdomain.center/beta/?domain={DOMAIN}&engine={ENGINE}&auth={AUTH}
42 | - `domain` (string | mandatory): searches by any domain/subdomain
43 | - `engine` (string | optional): choose a clustering engine
44 | - `cuttlefish` (default): clusters by domain
45 | - `octopus`: clusters by visual identity
46 | - `auth` (string | mandatory): [authentication code](https://www.arpsyndicate.io/pricing.html)
47 |
48 |
49 | ## Exploit Observer
50 | [Exploit Observer](https://www.exploit.observer) is a Vulnerability / Exploit Intelligence API.
51 |
52 | ### Endpoints without authentication (no ratelimits)
53 | - Returns a watchlist of vulnerability & exploit identifiers
54 | `GET` https://api.exploit.observer/watchlist/identifiers
55 |
56 | - Returns a detailed watchlist of vulnerability & exploit identifiers
57 | `GET` https://api.exploit.observer/watchlist/describers
58 |
59 | - Returns a watchlist of vulnerable technologies
60 | `GET` https://api.exploit.observer/watchlist/technologies
61 |
62 | - Returns statistics around all vulnerabilities & exploits
63 | `GET` https://api.exploit.observer/stats
64 |
65 | ### Endpoints without authentication (aggressive ratelimits)
66 | - Returns information related to a VID
67 | `GET` https://api.exploit.observer/?keyword={VID}&enrich={TRUE/FALSE}
68 | - `keyword` (string | mandatory): searches by any of the [supported vulnerability identifiers](#supported-vulnerability-identifiers)
69 | - `enrich` (boolean | optional): enables enrichment with additional data points for CVE/GHSA IDs (Includes EPSS, Aliases, Affected Products & Additional References)
70 |
71 | - Returns a list of VEDAS identifiers associated with a Russian VID but not a CVE
72 | `GET` https://api.exploit.observer/russia/noncve
73 |
74 | - Returns a list of VEDAS identifiers associated with a Chinese VID but not a CVE
75 | `GET` https://api.exploit.observer/china/noncve
76 |
77 | ### Endpoints with authentication (no ratelimits)
78 | - Returns information related to a VID
79 | `GET` https://api.exploit.observer/beta/?keyword={VID}&enrich={TRUE/FALSE}&auth={AUTH}
80 | - `keyword` (string | mandatory): searches by any of the [supported vulnerability identifiers](#supported-vulnerability-identifiers)
81 | - `enrich` (boolean | optional): enables enrichment with additional data points for CVE/GHSA IDs (Includes EPSS, Aliases, Affected Products & Additional References)
82 | - `auth` (string | mandatory): [authentication code](https://www.arpsyndicate.io/pricing.html)
83 |
84 | ### Supported Vulnerability Identifiers
85 | - A.R.P. Syndicate Vulnerability & Exploit Data Aggregation System (VEDAS) - `VEDAS:OBLIVIONHAWK`
86 | - China National Vulnerability Database (CNVD) - `CNVD-2024-02713`
87 | - China National Vulnerability Database of Information Security (CNNVD) - `CNNVD-202312-2255`
88 | - Cisco Talos (TALOS) - `TALOS-2023-1896`
89 | - Common Vulnerabilities and Exposures (CVE) - `CVE-2021-3450`
90 | - CXSecurity World Laboratory of Bugtraq (WLB) - `WLB-2024010058`
91 | - Defiant Wordfence (WORDFENCE) - `WORDFENCE-00086b84-c1ec-447a-a536-1c73eac1cc85`
92 | - European Union Vulnerability Database (EUVD) - `EUVD-2025-14498`
93 | - GitHub Commits (GHCOMMIT) - `GHCOMMIT-102448040d5132460e3b0013e03ebedec0677e00`
94 | - GitHub Repositories (GITHUB) - `GITHUB/aio-libs/aiohttp`
95 | - GitHub Security Advisories (GHSA) - `GHSA-wfh5-x68w-hvw2`
96 | - Google Bug Hunters VRP (GBHVRP) - `GBHVRP-F8GFYGv4g`
97 | - Google Chromium Issues (CHROMIUM) - `CHROMIUM-40057791`
98 | - Google Project Zero (PROJECTZERO) - `PROJECTZERO-42450487`
99 | - Hackerone Hacktivity (H1) - `H1-2230915`
100 | - Japan Vulnerability Notes iPedia (JVNDB) - `JVNDB-2023-006199`
101 | - Knownsec Seebug (SSVID) - `SSVID-99817`
102 | - Linux Open Source Security Foundation (OSSF) - `OSSF-OSV-2024-1427`
103 | - Microsoft Common Vulnerabilities and Exposures (MSCVE) - `MSCVE-2025-21415`
104 | - Mozilla Foundation Issues (MOZILLA) - `MOZILLA-290162`
105 | - Mozilla Foundation Security Advisories (MFSA) - `MFSA2024-51`
106 | - OffSec Exploit Database (EDB) - `EDB-10102`
107 | - openSUSE Common Vulnerabilities and Exposures (SUCVE) - `SUCVE-2023-40547`
108 | - openSUSE Issues (SUSE) - `SUSE-1183851`
109 | - Packet Storm Security (PSS) - `PSS-170615`
110 | - Patchstack (PATCHSTACK) - `PATCHSTACK/spectrum/wordpress-spectrum-theme-remote-code-execution`
111 | - ProjectDiscovery Nuclei (PD) - `PD/http/cves/2020/CVE-2020-12720`
112 | - ProtectAI Huntr (HUNTR) - `HUNTR-001d1c29-805a-4035-93bb-71a0e81da3e5`
113 | - Rapid7 Metasploit Framework (MSF) - `MSF/auxiliary_admin/2wire/xslt_password_reset`
114 | - RedHat Common Vulnerabilities and Exposures (RHCVE) - `RHCVE-2025-27098`
115 | - RedHat Issues (REDHAT) - `REDHAT-290162`
116 | - RedHat Security Advisories (RHSA) - `RHSA-2025:1730`
117 | - Russian Data Bank of Information Security Threats (BDU) - `BDU:2024-00390`
118 | - Snyk Vulnerability Database (SNYK) - `SNYK-JAVA-ORGCLOJURE-5740378`
119 | - Source Incite (SRC) - `SRC-2021-0019`
120 | - Tenable Common Vulnerabilities and Exposures (TNCVE) - `TNCVE-2025-25763`
121 | - Tenable Security Advisories (TNS) - `TNS-2021-05`
122 | - Trend Micro Zero Day Initiative (ZDI) - `ZDI-23-1714`
123 | - VARIoT Exploits (VAR-E) - `VAR-E-201704-0525`
124 | - VARIoT Vulnerabilities (VAR) - `VAR-202404-0085`
125 | - Veracode SourceClear Vulnerability Database (SRCCLR-SID) - `SRCCLR-SID-3173`
126 | - WP Engine WPScan (WPSCAN) - `WPSCAN-52568abd-c509-411e-8391-c75e7613eb42`
127 | - YouTube (YT) - `YT/ccqjhUmwLCk`
128 | - Zero Science Lab (ZSL) - `ZSL-2022-5743`
129 | - 0Day Today (0DAY-ID) - `0DAY-ID-24705`
130 | - Vendor/Product ({vendor}__{product}) - `grafana`
131 | - Vendor/Product + Version ({vendor}__{product}@{version}) - `felixwelberg@1.0.45`
132 | - Multiple Non-VID Keywords ({keywordA}__{keywordB}) - `pci__util`
--------------------------------------------------------------------------------