MandConsultingGroup / porch-pirateView external linksLinks
Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitation of API endpoints and secrets committed to workspaces, collections, requests, users and teams. Porch Pirate can be used as a client or be incorporated into your own applications.
☆447Jan 25, 2024Updated 2 years ago
Alternatives and similar repositories for porch-pirate
Users that are interested in porch-pirate are comparing it to the libraries listed below
Sorting:
- ☆520Apr 29, 2024Updated last year
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆721Feb 3, 2026Updated 2 weeks ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,755May 22, 2024Updated last year
- A streamlined tool for discovering private TLDs for security research.☆313Feb 9, 2026Updated last week
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!☆2,533Feb 7, 2026Updated last week
- An IIS short filename enumeration tool☆1,109Nov 25, 2024Updated last year
- A python3 script searching for secret on swaggerhub☆65Mar 22, 2022Updated 3 years ago
- Search for documents in a domain through Search Engines (Google, Bing and Baidu). The objective is to extract metadata☆218Jan 19, 2024Updated 2 years ago
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,515Jan 15, 2026Updated last month
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,322Updated this week
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆148Dec 9, 2024Updated last year
- ngrok Collaborator Link — yet another Burp Collaborator alternative for free with ngrok.☆113Jan 4, 2024Updated 2 years ago
- Unleash the power of cloud☆821Nov 19, 2024Updated last year
- A command-line utility designed to discover subdomains for a given domain in a simple, efficient way. It works by gathering information f…☆115Dec 8, 2025Updated 2 months ago
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆141Sep 16, 2024Updated last year
- De-clutter a list of URLs☆384Feb 3, 2026Updated 2 weeks ago
- Gotator is a tool to generate DNS wordlists through permutations.☆503Jul 17, 2022Updated 3 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,192Updated this week
- A rapid HTTP downgrade smuggling scanner written in Go.☆311May 16, 2024Updated last year
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆749Dec 19, 2023Updated 2 years ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆2,017Jul 12, 2025Updated 7 months ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆417Jan 31, 2026Updated 2 weeks ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Apr 1, 2023Updated 2 years ago
- Find subdomains on GitLab.☆106Apr 28, 2024Updated last year
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆300Sep 8, 2023Updated 2 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,057Aug 14, 2024Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆127Dec 23, 2025Updated last month
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆87May 2, 2024Updated last year
- CT Log Scanner☆513Dec 26, 2025Updated last month
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆264Dec 15, 2025Updated 2 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆378Dec 5, 2023Updated 2 years ago
- Contextual Content Discovery Tool☆3,085Apr 29, 2024Updated last year
- This extension is meticulously crafted to safeguard users from phishing attempts that replicate the Office365 login interface, particular…☆11Nov 27, 2023Updated 2 years ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆438Dec 30, 2025Updated last month
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆744Dec 8, 2025Updated 2 months ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆30Oct 11, 2023Updated 2 years ago
- Obtain GraphQL API schema even if the introspection is disabled☆1,383Dec 5, 2025Updated 2 months ago
- declutters url lists for crawling/pentesting☆1,524Feb 23, 2025Updated 11 months ago
- This script is used to search for cloud certificate entities such as Amazon, Azure, and others that have been extracted by the kaeferjaeg…☆55Nov 21, 2025Updated 2 months ago