Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitation of API endpoints and secrets committed to workspaces, collections, requests, users and teams. Porch Pirate can be used as a client or be incorporated into your own applications.
☆445Jan 25, 2024Updated 2 years ago
Alternatives and similar repositories for porch-pirate
Users that are interested in porch-pirate are comparing it to the libraries listed below
Sorting:
- Automated OSINT on SwaggerHub☆247Jan 16, 2024Updated 2 years ago
- ☆520Apr 29, 2024Updated last year
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆721Feb 28, 2026Updated last week
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,773May 22, 2024Updated last year
- A streamlined tool for discovering private TLDs for security research.☆314Mar 2, 2026Updated last week
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!☆2,552Updated this week
- An IIS short filename enumeration tool☆1,127Nov 25, 2024Updated last year
- A python3 script searching for secret on swaggerhub☆66Mar 22, 2022Updated 3 years ago
- Search for documents in a domain through Search Engines (Google, Bing and Baidu). The objective is to extract metadata☆218Jan 19, 2024Updated 2 years ago
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,530Updated this week
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,327Updated this week
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆149Dec 9, 2024Updated last year
- ngrok Collaborator Link — yet another Burp Collaborator alternative for free with ngrok.☆113Jan 4, 2024Updated 2 years ago
- Unleash the power of cloud☆815Nov 19, 2024Updated last year
- A command-line utility designed to discover subdomains for a given domain in a simple, efficient way. It works by gathering information f…☆116Feb 23, 2026Updated 2 weeks ago
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆141Sep 16, 2024Updated last year
- De-clutter a list of URLs☆385Feb 3, 2026Updated last month
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,280Updated this week
- Gotator is a tool to generate DNS wordlists through permutations.☆507Jul 17, 2022Updated 3 years ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆753Dec 19, 2023Updated 2 years ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆419Jan 31, 2026Updated last month
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆2,034Jul 12, 2025Updated 7 months ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Apr 1, 2023Updated 2 years ago
- Find subdomains on GitLab.☆106Apr 28, 2024Updated last year
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆299Sep 8, 2023Updated 2 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,089Aug 14, 2024Updated last year
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆89May 2, 2024Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆129Dec 23, 2025Updated 2 months ago
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆265Dec 15, 2025Updated 2 months ago
- CT Log Scanner☆516Dec 26, 2025Updated 2 months ago
- Obtain GraphQL API schema even if the introspection is disabled☆1,399Dec 5, 2025Updated 3 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆377Dec 5, 2023Updated 2 years ago
- This extension is meticulously crafted to safeguard users from phishing attempts that replicate the Office365 login interface, particular…☆11Nov 27, 2023Updated 2 years ago
- Contextual Content Discovery Tool☆3,106Apr 29, 2024Updated last year
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆436Dec 30, 2025Updated 2 months ago
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆748Dec 8, 2025Updated 3 months ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆30Feb 13, 2026Updated 3 weeks ago
- declutters url lists for crawling/pentesting☆1,532Feb 23, 2025Updated last year