MandConsultingGroup / porch-pirateLinks
Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitation of API endpoints and secrets committed to workspaces, collections, requests, users and teams. Porch Pirate can be used as a client or be incorporated into your own applications.
☆441Updated last year
Alternatives and similar repositories for porch-pirate
Users that are interested in porch-pirate are comparing it to the libraries listed below
Sorting:
- AI-powered ffuf wrapper☆543Updated 11 months ago
- Simple tool to scan a website for (DOM-based) XSS vulnerabilities and Open Redirects.☆249Updated 8 months ago
- ☆503Updated last year
- Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not☆483Updated 2 months ago
- Crtsh Subdomain Enumeration | This bash script makes it easy to quickly save and parse the output from https://crt.sh website.☆251Updated last year
- ☆514Updated 2 weeks ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆376Updated last year
- A Chrome/Firefox browser extension to show alerts for reflected query params, show Wayback archive links for the current path, show hidde…☆407Updated 2 weeks ago
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning-On Your Terms. Easily distribute arbit…☆646Updated last month
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆452Updated 3 years ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆432Updated 9 months ago
- Automated Tool for Testing Header Based Blind SQL Injection☆289Updated 2 years ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆703Updated last month
- Local File Inclusion discovery and exploitation tool☆330Updated 10 months ago
- CT Log Scanner☆410Updated 7 months ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆352Updated last year
- Small tool to Grab subdomains using Shodan api.☆508Updated last month
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon☆241Updated 2 years ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆695Updated 2 years ago
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆129Updated 3 weeks ago
- Opensource assets and vulnerability scanning tool☆185Updated 4 months ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆549Updated 7 months ago
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆274Updated last month
- Find subdomains with GPT, for free☆350Updated last year
- Recon MindMap (RMM)☆164Updated last year
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆714Updated last year
- Simple Google Dorks search tool☆304Updated last month
- Search for sensitive data in Postman public library.☆214Updated 2 months ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆281Updated last year
- Automation of tokens/api keys testing.☆143Updated 2 years ago