.TH pompem "1" "Ago 2016" "POMPEM 0.2.0" "Exploit and Vulnerability Finder" .\" Text automatically generated by txt2man .SH NAME \fBpompem \fP- Exploit and Vulnerability Finder .SH SYNOPSIS .nf .fam C \fBpompem\fP [\fIOPTIONS\fP] .fam T .fi .fam T .fi .SH DESCRIPTION Find exploit with a system of advanced search, designed to automate the search for Exploits and Vulnerability in the most important databases facilitating the work of pentesters, ethical hackers and forensics expert. Performs searches in databases: PacketStorm security, CXSecurity, ZeroDay, Vulners, National Vulnerability Database, WPScan Vulnerability Database. This tool is essential in the security of networks and systems. .PP The search results can be exported to HTML or text format. .SH OPTIONS .TP .B \fB-s\fP | \fB--search\fP Search by .TP .B \fB--txt\fP Write txt file .TP .B \fB--html\fP Write html file .TP .B \fB--update\fP Upgrade to latest version .TP .B \fB-g\fP | \fB--get\fP Download exploit files .TP .B \fB-h\fP | \fB--help\fP Get basic options and Help .SH AUTHOR The POMPEM was written by Rafael Francischini and Bruno Fraga .PP This manual page was written by Giovani Augusto Ferreira for the Debian project (but may be used by others).