MandConsultingGroup / porch-pirate
Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitation of API endpoints and secrets committed to workspaces, collections, requests, users and teams. Porch Pirate can be used as a client or be incorporated into your own applications.
☆409Updated last year
Alternatives and similar repositories for porch-pirate:
Users that are interested in porch-pirate are comparing it to the libraries listed below
- AI-powered ffuf wrapper☆468Updated 5 months ago
- Simple tool to scan a website for (DOM-based) XSS vulnerabilities and Open Redirects.☆237Updated 2 months ago
- ☆481Updated 11 months ago
- Crtsh Subdomain Enumeration | This bash script makes it easy to quickly save and parse the output from https://crt.sh website.☆217Updated 7 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆350Updated last year
- A suite for hunting suspicious targets, expose domains and phishing discovery☆358Updated this week
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆443Updated 2 years ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆497Updated last month
- Small tool to Grab subdomains using Shodan api.☆439Updated 5 months ago
- Local File Inclusion discovery and exploitation tool☆300Updated 3 months ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆288Updated last year
- Automation of tokens/api keys testing.☆124Updated 2 years ago
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆356Updated last year
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆382Updated last year
- Automated Tool for Testing Header Based Blind SQL Injection☆277Updated last year
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆408Updated 3 months ago
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆247Updated 8 months ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆634Updated last week
- Fast and customizable vulnerability scanner For JIRA written in Python☆318Updated 3 months ago
- Discover new target domains using Content Security Policy☆418Updated this week
- CT Log Scanner☆349Updated 3 weeks ago
- A Chrome/Firefox browser extension to show alerts for reflected query params, show Wayback archive links for the current path, show hidde…☆363Updated 3 weeks ago
- Golang client for querying SecurityTrails API data☆552Updated last year
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆244Updated 3 weeks ago
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆261Updated 3 weeks ago
- Finding XSS during recon☆257Updated 2 years ago
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning—On Your Terms. Easily distribute arbit…☆468Updated this week
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon☆236Updated last year
- Search for sensitive data in Postman public library.☆204Updated 3 months ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆632Updated last year