MandConsultingGroup / porch-pirateLinks
Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitation of API endpoints and secrets committed to workspaces, collections, requests, users and teams. Porch Pirate can be used as a client or be incorporated into your own applications.
☆441Updated last year
Alternatives and similar repositories for porch-pirate
Users that are interested in porch-pirate are comparing it to the libraries listed below
Sorting:
- AI-powered ffuf wrapper☆556Updated last week
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆380Updated 2 years ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆433Updated 3 weeks ago
- Simple tool to scan a website for (DOM-based) XSS vulnerabilities and Open Redirects.☆255Updated 10 months ago
- ☆510Updated last year
- ☆525Updated 2 weeks ago
- Find subdomains with GPT, for free☆348Updated last year
- Crtsh Subdomain Enumeration | This bash script makes it easy to quickly save and parse the output from https://crt.sh website.☆256Updated last year
- Local File Inclusion discovery and exploitation tool☆330Updated 11 months ago
- Search for sensitive data in Postman public library.☆216Updated 3 months ago
- A Chrome/Firefox browser extension to show alerts for reflected query params, show Wayback archive links for the current path, show hidde…☆417Updated last month
- Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not☆507Updated 2 weeks ago
- Simple Google Dorks search tool☆309Updated 3 months ago
- Automated Tool for Testing Header Based Blind SQL Injection☆315Updated 2 years ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆354Updated last year
- A suite for hunting suspicious targets, expose domains and phishing discovery☆373Updated 2 weeks ago
- Discover new target domains using Content Security Policy☆494Updated last week
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆714Updated 2 weeks ago
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning-On Your Terms. Easily distribute arbit…☆672Updated 3 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆695Updated 6 months ago
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon☆244Updated 2 years ago
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆253Updated last year
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆452Updated 3 years ago
- Small tool to Grab subdomains using Shodan api.☆517Updated 3 months ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆553Updated 9 months ago
- Opensource assets and vulnerability scanning tool☆187Updated 6 months ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆731Updated last year
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆275Updated last week
- jsleak is a tool to find secret , paths or links in the source code during the recon.☆566Updated 2 months ago
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆382Updated 2 years ago