MandConsultingGroup / porch-pirate
Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitation of API endpoints and secrets committed to workspaces, collections, requests, users and teams. Porch Pirate can be used as a client or be incorporated into your own applications.
☆374Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for porch-pirate
- AI-powered ffuf wrapper☆267Updated 2 months ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆390Updated last week
- ☆447Updated 6 months ago
- Local File Inclusion discovery and exploitation tool☆224Updated last month
- Simple tool to scan a website for (DOM-based) XSS vulnerabilities and Open Redirects.☆220Updated this week
- A Chrome/Firefox browser extension to show alerts for reflected query params, show Wayback archive links for the current path, show hidde…☆314Updated 4 months ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆553Updated last year
- ☆358Updated 6 months ago
- CT Log Scanner☆289Updated last month
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆543Updated this week
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.☆225Updated 10 months ago
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆229Updated 3 months ago
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆428Updated 2 years ago
- Crtsh Subdomain Enumeration | This bash script makes it easy to quickly save and parse the output from https://crt.sh website.☆196Updated 2 months ago
- Small tool to Grab subdomains using Shodan api.☆362Updated 3 weeks ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆429Updated last month
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆346Updated 11 months ago
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon☆228Updated last year
- Find subdomains with GPT, for free☆334Updated 7 months ago
- Golang client for querying SecurityTrails API data☆539Updated last year
- Automated Tool for Testing Header Based Blind SQL Injection☆263Updated last year
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆275Updated last year
- Recon MindMap (RMM)☆140Updated 5 months ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆400Updated last month
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆378Updated last year
- Simple Google Dorks search tool☆254Updated 8 months ago
- EvenBetter is a frontend Caido plugin that makes the Caido experience even better 😎☆134Updated 2 weeks ago
- Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not☆266Updated 2 months ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆381Updated 3 months ago