MandConsultingGroup / porch-pirate
Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitation of API endpoints and secrets committed to workspaces, collections, requests, users and teams. Porch Pirate can be used as a client or be incorporated into your own applications.
☆403Updated last year
Alternatives and similar repositories for porch-pirate:
Users that are interested in porch-pirate are comparing it to the libraries listed below
- ☆475Updated 11 months ago
- AI-powered ffuf wrapper☆303Updated 4 months ago
- Simple tool to scan a website for (DOM-based) XSS vulnerabilities and Open Redirects.☆236Updated last month
- Crtsh Subdomain Enumeration | This bash script makes it easy to quickly save and parse the output from https://crt.sh website.☆215Updated 7 months ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆616Updated 2 weeks ago
- ☆428Updated 2 months ago
- Search for sensitive data in Postman public library.☆203Updated 2 months ago
- A suite for hunting suspicious targets, expose domains and phishing discovery☆355Updated 3 weeks ago
- Small tool to Grab subdomains using Shodan api.☆429Updated 5 months ago
- Find subdomains with GPT, for free☆337Updated 11 months ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆332Updated last year
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆405Updated 2 months ago
- Local File Inclusion discovery and exploitation tool☆295Updated 3 months ago
- CT Log Scanner☆324Updated 2 months ago
- A Chrome/Firefox browser extension to show alerts for reflected query params, show Wayback archive links for the current path, show hidde…☆362Updated last week
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆629Updated last year
- EndExt is a .go tool for extracting all the possible endpoints from the JS files☆196Updated 8 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆350Updated last year
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆497Updated 3 weeks ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆285Updated last year
- De-clutter a list of URLs☆328Updated 4 months ago
- Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not☆283Updated 6 months ago
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆246Updated 7 months ago
- Discover new target domains using Content Security Policy☆410Updated this week
- An Automated Subdomain Enumeration Tool☆259Updated 5 months ago
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon☆234Updated last year
- Golang client for querying SecurityTrails API data☆546Updated last year
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆551Updated last week
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway a…☆259Updated last year
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆631Updated last year