Osprey Vision is an Artificial Intelligence API for Information Discovery.
- Returns a streaming response for a prompt
POSThttps://api.osprey.vision/prompt(json dict string | mandatory): ask any query
-
Returns a streaming response for a prompt
POSThttps://api.osprey.vision/beta/prompt(json dict string | mandatory): ask any queryauth(json dict string | mandatory): authentication code
-
Returns a streaming response containing a summary for a list of webpages
POSThttps://api.osprey.vision/summarize/links(json dict string | mandatory): HTTP/HTTPS links separated by space/newlineauth(json dict string | mandatory): authentication code
-
Returns a streaming response containing a vulnerability advisory
POSThttps://api.osprey.vision/advisory/vulnid(json dict string | mandatory): generates for a supported vulnerability identifierlang(json dict string | mandatory): choose from English, Mandarin, Spanish, Russian, French, German, Finnish, Estonian, Japanese, Korean, Italian & Hindiauth(json dict string | mandatory): authentication code
Subdomain Center is a Shadow IT / Subdomain Intelligence API.
- Returns a list of subdomains for a domain
GEThttps://api.subdomain.center/?domain={DOMAIN}&engine={ENGINE}domain(string | mandatory): searches by any domain/subdomainengine(string | optional): choose a clustering enginecuttlefish(default): clusters by domainoctopus: clusters by visual identity
- Returns a list of subdomains for a domain
GEThttps://api.subdomain.center/beta/?domain={DOMAIN}&engine={ENGINE}&auth={AUTH}domain(string | mandatory): searches by any domain/subdomainengine(string | optional): choose a clustering enginecuttlefish(default): clusters by domainoctopus: clusters by visual identity
auth(string | mandatory): authentication code
Exploit Observer is a Vulnerability / Exploit Intelligence API.
-
Returns a watchlist of vulnerability & exploit identifiers
GEThttps://api.exploit.observer/watchlist/identifiers -
Returns a detailed watchlist of vulnerability & exploit identifiers
GEThttps://api.exploit.observer/watchlist/describers -
Returns a watchlist of vulnerable technologies
GEThttps://api.exploit.observer/watchlist/technologies -
Returns statistics around all vulnerabilities & exploits
GEThttps://api.exploit.observer/stats
- Returns information related to a VID
GEThttps://api.exploit.observer/?keyword={VID}&enrich={TRUE/FALSE}keyword(string | mandatory): searches by any of the supported vulnerability identifiersenrich(boolean | optional): enables enrichment with additional data points for CVE/GHSA IDs (Includes EPSS, Aliases, Affected Products & Additional References)
- Returns information related to a VID
GEThttps://api.exploit.observer/beta/?keyword={VID}&enrich={TRUE/FALSE}&auth={AUTH}keyword(string | mandatory): searches by any of the supported vulnerability identifiersenrich(boolean | optional): enables enrichment with additional data points for CVE/GHSA IDs (Includes EPSS, Aliases, Affected Products & Additional References)auth(string | mandatory): authentication code
- A.R.P. Syndicate Vulnerability & Exploit Data Aggregation System (VEDAS) -
VEDAS:OBLIVIONHAWK - China National Vulnerability Database (CNVD) -
CNVD-2024-02713 - China National Vulnerability Database of Information Security (CNNVD) -
CNNVD-202312-2255 - Cisco Talos (TALOS) -
TALOS-2023-1896 - Common Vulnerabilities and Exposures (CVE) -
CVE-2021-3450 - CXSecurity World Laboratory of Bugtraq (WLB) -
WLB-2024010058 - Defiant Wordfence (WORDFENCE) -
WORDFENCE-00086b84-c1ec-447a-a536-1c73eac1cc85 - European Union Vulnerability Database (EUVD) -
EUVD-2025-14498 - GitHub Commits (GHCOMMIT) -
GHCOMMIT-102448040d5132460e3b0013e03ebedec0677e00 - GitHub Repositories (GITHUB) -
GITHUB/aio-libs/aiohttp - GitHub Security Advisories (GHSA) -
GHSA-wfh5-x68w-hvw2 - Google Bug Hunters VRP (GBHVRP) -
GBHVRP-F8GFYGv4g - Google Chromium Issues (CHROMIUM) -
CHROMIUM-40057791 - Google Project Zero (PROJECTZERO) -
PROJECTZERO-42450487 - Hackerone Hacktivity (H1) -
H1-2230915 - Japan Vulnerability Notes iPedia (JVNDB) -
JVNDB-2023-006199 - Knownsec Seebug (SSVID) -
SSVID-99817 - Linux Open Source Security Foundation (OSSF) -
OSSF-OSV-2024-1427 - Microsoft Common Vulnerabilities and Exposures (MSCVE) -
MSCVE-2025-21415 - Mozilla Foundation Issues (MOZILLA) -
MOZILLA-290162 - Mozilla Foundation Security Advisories (MFSA) -
MFSA2024-51 - OffSec Exploit Database (EDB) -
EDB-10102 - openSUSE Common Vulnerabilities and Exposures (SUCVE) -
SUCVE-2023-40547 - openSUSE Issues (SUSE) -
SUSE-1183851 - Packet Storm Security (PSS) -
PSS-170615 - Patchstack (PATCHSTACK) -
PATCHSTACK/spectrum/wordpress-spectrum-theme-remote-code-execution - ProjectDiscovery Nuclei (PD) -
PD/http/cves/2020/CVE-2020-12720 - ProtectAI Huntr (HUNTR) -
HUNTR-001d1c29-805a-4035-93bb-71a0e81da3e5 - Rapid7 Metasploit Framework (MSF) -
MSF/auxiliary_admin/2wire/xslt_password_reset - RedHat Common Vulnerabilities and Exposures (RHCVE) -
RHCVE-2025-27098 - RedHat Issues (REDHAT) -
REDHAT-290162 - RedHat Security Advisories (RHSA) -
RHSA-2025:1730 - Russian Data Bank of Information Security Threats (BDU) -
BDU:2024-00390 - Snyk Vulnerability Database (SNYK) -
SNYK-JAVA-ORGCLOJURE-5740378 - Source Incite (SRC) -
SRC-2021-0019 - Tenable Common Vulnerabilities and Exposures (TNCVE) -
TNCVE-2025-25763 - Tenable Security Advisories (TNS) -
TNS-2021-05 - Trend Micro Zero Day Initiative (ZDI) -
ZDI-23-1714 - VARIoT Exploits (VAR-E) -
VAR-E-201704-0525 - VARIoT Vulnerabilities (VAR) -
VAR-202404-0085 - Veracode SourceClear Vulnerability Database (SRCCLR-SID) -
SRCCLR-SID-3173 - WP Engine WPScan (WPSCAN) -
WPSCAN-52568abd-c509-411e-8391-c75e7613eb42 - YouTube (YT) -
YT/ccqjhUmwLCk - Zero Science Lab (ZSL) -
ZSL-2022-5743 - 0Day Today (0DAY-ID) -
0DAY-ID-24705 - Vendor/Product ({vendor}__{product}) -
grafana - Vendor/Product + Version ({vendor}__{product}@{version}) -
[email protected] - Multiple Non-VID Keywords ({keywordA}__{keywordB}) -
pci__util