MandConsultingGroup / porch-pirate
Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitation of API endpoints and secrets committed to workspaces, collections, requests, users and teams. Porch Pirate can be used as a client or be incorporated into your own applications.
☆417Updated last year
Alternatives and similar repositories for porch-pirate
Users that are interested in porch-pirate are comparing it to the libraries listed below
Sorting:
- Simple tool to scan a website for (DOM-based) XSS vulnerabilities and Open Redirects.☆240Updated 3 months ago
- ☆487Updated last year
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆649Updated last month
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆445Updated 3 years ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆347Updated last year
- Crtsh Subdomain Enumeration | This bash script makes it easy to quickly save and parse the output from https://crt.sh website.☆219Updated 8 months ago
- A Chrome/Firefox browser extension to show alerts for reflected query params, show Wayback archive links for the current path, show hidde…☆368Updated last month
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆633Updated 2 years ago
- AI-powered ffuf wrapper☆486Updated 5 months ago
- Simple Google Dorks search tool☆289Updated last week
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon☆237Updated last year
- Search for sensitive data in Postman public library.☆204Updated 4 months ago
- De-clutter a list of URLs☆339Updated 5 months ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆340Updated last year
- Small tool to Grab subdomains using Shodan api.☆449Updated 6 months ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆411Updated 3 months ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆290Updated last year
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆360Updated last year
- EndExt is a .go tool for extracting all the possible endpoints from the JS files☆202Updated 10 months ago
- Automated Tool for Testing Header Based Blind SQL Injection☆278Updated last year
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆504Updated 2 months ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆637Updated last year
- Automation of tokens/api keys testing.☆128Updated 2 years ago
- A suite for hunting suspicious targets, expose domains and phishing discovery☆357Updated 3 weeks ago
- Recon MindMap (RMM)☆158Updated 11 months ago
- Golang client for querying SecurityTrails API data☆556Updated last year
- Nuclei-AI-Prompts☆191Updated last month
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆646Updated last year
- An Automated Subdomain Enumeration Tool☆262Updated 7 months ago
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆248Updated 9 months ago