MandConsultingGroup / porch-pirateLinks
Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitation of API endpoints and secrets committed to workspaces, collections, requests, users and teams. Porch Pirate can be used as a client or be incorporated into your own applications.
☆440Updated last year
Alternatives and similar repositories for porch-pirate
Users that are interested in porch-pirate are comparing it to the libraries listed below
Sorting:
- AI-powered ffuf wrapper☆552Updated 11 months ago
- Crtsh Subdomain Enumeration | This bash script makes it easy to quickly save and parse the output from https://crt.sh website.☆252Updated last year
- ☆507Updated last year
- Simple tool to scan a website for (DOM-based) XSS vulnerabilities and Open Redirects.☆250Updated 9 months ago
- Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not☆507Updated last week
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆380Updated last year
- A Chrome/Firefox browser extension to show alerts for reflected query params, show Wayback archive links for the current path, show hidde…☆413Updated last month
- ☆520Updated last month
- Local File Inclusion discovery and exploitation tool☆330Updated 10 months ago
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆452Updated 3 years ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆433Updated 9 months ago
- Small tool to Grab subdomains using Shodan api.☆513Updated 2 months ago
- Automated Tool for Testing Header Based Blind SQL Injection☆291Updated 2 years ago
- Discover new target domains using Content Security Policy☆492Updated 2 weeks ago
- Find subdomains with GPT, for free☆350Updated last year
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆254Updated last year
- Opensource assets and vulnerability scanning tool☆185Updated 5 months ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆353Updated last year
- CT Log Scanner☆418Updated 7 months ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆709Updated 2 months ago
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆131Updated last week
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon☆242Updated 2 years ago
- ☆174Updated 2 months ago
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆274Updated last week
- A suite for hunting suspicious targets, expose domains and phishing discovery☆372Updated 2 months ago
- Simple Google Dorks search tool☆306Updated 2 months ago
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning-On Your Terms. Easily distribute arbit…☆667Updated 2 months ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆721Updated 2 years ago
- Recon MindMap (RMM)☆164Updated last year
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆285Updated last year