تخطَّ إلى المحتوى

Pompem

Pompem is a Python-based tool that automates the search for known exploits and vulnerabilities across multiple databases including ExploitDB, PacketStorm, and WPScan. It provides security researchers and penetration testers with an efficient way to identify publicly available exploits, vulnerability information, and proof-of-concepts for discovered software and applications without manually querying multiple sources.

sudo apt-get install python3 python3-pip
pip3 install pompem
sudo dnf install python3 python3-pip
pip3 install pompem
brew install python3
pip3 install pompem
pip install pompem
git clone https://github.com/jmendozauc/pompem.git
cd pompem
pip3 install -r requirements.txt
python3 pompem.py
pompem --version
pompem --help

Pompem integrates with:

  • ExploitDB: Largest exploit database with 50,000+ exploits
  • PacketStorm: Vulnerability and security resource repository
  • WPScan: WordPress vulnerability database
  • SecurityFocus: Bugtraq vulnerability information
  • Metasploit Database: Exploitation framework modules
  • Application name search
  • CVE identifier lookup
  • Version-specific vulnerability matching
  • Software component identification

Pompem combines results from multiple sources to provide comprehensive vulnerability information.

pompem -s "Apache"
pompem -s "nginx"
pompem -s "WordPress"
pompem -s "CVE-2024-1234"
pompem -c CVE-2024-00000
pompem -s "Apache 2.4.41"
pompem -s "WordPress 6.0.1"
pompem -s "application_name" -a
CommandDescription
pompem -s "app_name"Search for application vulnerabilities
pompem -c "CVE-XXXX"Search by CVE identifier
pompem -s "app" -eSearch ExploitDB only
pompem -s "app" -wSearch WPScan only
pompem -s "app" -pSearch PacketStorm only
pompem -s "app" -aSearch all databases
pompem -s "app" -f jsonOutput in JSON format
pompem -s "Apache Struts" -e
pompem -s "PHP 7.4" -e
pompem -s "WordPress" -w
pompem -s "Akismet" -w
pompem -s "WooCommerce" -w
pompem -s "Cisco IOS" -p
pompem -s "Windows RDP" -p
pompem -s "Apache 2.4" -a
pompem -c "CVE-2021-41773" -a
pompem -s "Apache Struts 2 RCE"
pompem -s "PHP SQL injection"
pompem -s "WordPress 5.0"
pompem -s "Drupal 8"
pompem -s "Apache" | grep -i "rce\|injection\|bypass"
pompem -s "application" | grep "2024"
pompem -s "application" | grep -i "critical\|high"
pompem -s "Apache"
pompem -s "Apache" -f json
pompem -s "WordPress" -f json > wordpress_vulns.json
pompem -s "application" -f csv > vulns.csv
pompem -s "Apache" > apache_vulnerabilities.txt
pompem -c "CVE-2024-1234" > cve_search.txt
# Determine application versions running on target
# Example: Apache 2.4.41, PHP 7.4.10, WordPress 5.9
pompem -s "Apache 2.4.41" -a
pompem -s "PHP 7.4.10" -a
pompem -s "WordPress 5.9" -a
pompem -s "Apache 2.4.41" -a > apache_vulns.txt
pompem -s "PHP 7.4.10" -a > php_vulns.txt
pompem -s "WordPress 5.9" -a > wordpress_vulns.txt
cat *_vulns.txt | sort | uniq > all_vulnerabilities.txt
grep -i "remote\|critical" all_vulnerabilities.txt > critical_vulns.txt
# Create assessment report with findings
# After identifying web technologies
pompem -s "Nginx 1.18" -a
pompem -s "PHP 8.0" -a
pompem -s "WordPress 5.8" -a
# Search identified services
pompem -s "OpenSSH 7.4" -a
pompem -s "Postfix 2.11" -a
pompem -s "Bind 9.11" -a
# Search discovered plugins
pompem -s "WordPress WooCommerce" -w
pompem -s "Drupal Views" -e
#!/bin/bash
APPS=("Apache 2.4" "PHP 7.4" "WordPress 5.9" "MySQL 8.0")

for app in "${APPS[@]}"; do
    echo "=== Searching for $app ===" >> vulnerabilities.txt
    pompem -s "$app" -a >> vulnerabilities.txt
    echo "" >> vulnerabilities.txt
done
#!/bin/bash
while IFS= read -r cve; do
    pompem -c "$cve" -a >> cve_details.txt
done < cve_list.txt
# After nmap service detection
pompem -s "Apache httpd 2.4.41"
pompem -s "OpenSSH 7.6p1"
pompem -s "application" -e | grep -i "exploit\|poc"
pompem -s "Apache Struts 2" -e
# Will show available Proof-of-Concepts
pompem -s "vulnerability" -a
# Returns full details including exploit source URLs
pompem -c "CVE-2021-41773"
pompem -c "CVE-2021-44228"
pompem -c "CVE-2024-12345" -a
# Shows all available resources for the CVE
pompem -s "2024" | head -20
pompem -s "WordPress Twenty Twenty Two" -w
pompem -s "WordPress Plugin" -w
pompem -s "WooCommerce" -w
pompem -s "WordPress 6.0" -w
pompem -s "Drupal 9" -a
pompem -s "Drupal Module" -e
pompem -s "Joomla 3.10" -a
pompem -s "Joomla Extension" -e
pompem -s "Magento 2.4" -a
# Extract exploit URLs for Metasploit
pompem -s "Windows Server 2019" -e | grep "http" > exploit_urls.txt
# Generate JSON report for dashboard
pompem -s "application" -f json > vuln_dashboard.json
# Compare Pompem results with Nessus scan
pompem -s "service_name" -a > pompem_results.txt
# Compare with Nessus export
echo "=== Vulnerability Assessment Report ===" > report.txt
echo "Date: $(date)" >> report.txt
echo "Target: target.com" >> report.txt
echo "" >> report.txt
echo "=== Identified Vulnerabilities ===" >> report.txt
pompem -s "identified_service" -a >> report.txt

Create Detailed Vulnerability Documentation

Section titled “Create Detailed Vulnerability Documentation”
#!/bin/bash
SERVICES=("Apache 2.4.41" "PHP 7.4.10" "WordPress 5.9")

{
    echo "# Vulnerability Assessment Report"
    echo "Date: $(date)"
    echo ""
    
    for service in "${SERVICES[@]}"; do
        echo "## $service"
        pompem -s "$service" -a
        echo ""
    done
} > assessment_report.txt
pompem -s "application" -f json | jq '.[] | {name, severity, cve}' > executive_summary.json
echo "Apache 2.4" | parallel pompem -s {}
cat app_list.txt | parallel pompem -s {}
# Cache results for repeated searches
pompem -s "Apache" -a > apache_cache.txt
# Use cached results for reporting
cat apache_cache.txt
# Check internet connectivity
ping www.google.com

# Verify API endpoints are accessible
curl -I "https://www.exploit-db.com"
# Increase timeout for large result sets
timeout 60 pompem -s "popular_application"
# Narrow searches to reduce results
pompem -s "Apache 2.4.41" -e  # Specific version
pompem -c "CVE-2024-12345"     # Specific CVE
# Ensure latest vulnerability data
pip3 install --upgrade pompem
  • Verify Findings: Cross-reference results with official sources
  • Document Sources: Note which database provided each finding
  • Prioritize Severity: Focus on critical and high-severity vulnerabilities
  • Check Patch Status: Verify if patches are available
  • Timeline Tracking: Note vulnerability disclosure dates
  • Responsible Disclosure: Follow coordinated disclosure practices
  • Regular Searches: Maintain up-to-date vulnerability inventory
  • Assessment Reports: Document all findings systematically
  • Nuclei: Template-based scanning with integration
  • Searchsploit: Local ExploitDB search tool
  • Shodan: Internet search engine for services
  • CVEDetails: CVE information aggregator
  • SecurityTrails: DNS and domain intelligence
  • OpenCVE: CVE monitoring platform