MandConsultingGroup / porch-pirateLinks
Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitation of API endpoints and secrets committed to workspaces, collections, requests, users and teams. Porch Pirate can be used as a client or be incorporated into your own applications.
☆421Updated last year
Alternatives and similar repositories for porch-pirate
Users that are interested in porch-pirate are comparing it to the libraries listed below
Sorting:
- AI-powered ffuf wrapper☆512Updated 7 months ago
- ☆491Updated last year
- Simple tool to scan a website for (DOM-based) XSS vulnerabilities and Open Redirects.☆241Updated 5 months ago
- ☆470Updated 5 months ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆344Updated last year
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆350Updated last year
- A Chrome/Firefox browser extension to show alerts for reflected query params, show Wayback archive links for the current path, show hidde…☆378Updated 3 months ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆424Updated 5 months ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆669Updated 3 months ago
- Local File Inclusion discovery and exploitation tool☆318Updated 6 months ago
- Search for sensitive data in Postman public library.☆207Updated 6 months ago
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆248Updated 11 months ago
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon☆240Updated last year
- Crtsh Subdomain Enumeration | This bash script makes it easy to quickly save and parse the output from https://crt.sh website.☆233Updated 10 months ago
- Small tool to Grab subdomains using Shodan api.☆480Updated 2 weeks ago
- EndExt is a .go tool for extracting all the possible endpoints from the JS files☆214Updated last year
- Automated Tool for Testing Header Based Blind SQL Injection☆282Updated last year
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆661Updated 2 years ago
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆274Updated last month
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆447Updated 3 years ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆362Updated 2 months ago
- Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not☆357Updated this week
- CT Log Scanner☆382Updated 3 months ago
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning—On Your Terms. Easily distribute arbit…☆555Updated this week
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆293Updated last year
- Arsenal is a Simple shell script (Bash) used to install tools and requirements for Bug Bounty☆277Updated last year
- Recon MindMap (RMM)☆158Updated last year
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆381Updated 2 years ago
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway a…☆264Updated last year
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆253Updated 3 months ago