cosad3s / postleaks
Search for sensitive data in Postman public library.
☆204Updated 4 months ago
Alternatives and similar repositories for postleaks:
Users that are interested in postleaks are comparing it to the libraries listed below
- The Most Advanced Client-Side Prototype Pollution Scanner☆221Updated 2 weeks ago
- ☆168Updated 8 months ago
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆131Updated 5 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆150Updated 5 months ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆122Updated 2 years ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆96Updated last month
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆158Updated 5 months ago
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆158Updated 5 months ago
- ☆139Updated last year
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.☆231Updated last year
- ☆175Updated 6 months ago
- Custom scan profiles for use with Burp Suite Pro☆143Updated last year
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆117Updated last month
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆147Updated 11 months ago
- Automated Subdomain Enumeration and Scanning Tool☆113Updated last year
- ☆175Updated 2 weeks ago
- ☆199Updated 11 months ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆290Updated last year
- ☆148Updated 11 months ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆411Updated 3 months ago
- ☆103Updated 9 months ago
- ☆119Updated last year
- A recon tool that uses ML to predict subdomains. Then returns those that resolve.☆82Updated 3 weeks ago
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆84Updated this week
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆138Updated last year
- A rapid HTTP downgrade smuggling scanner written in Go.☆255Updated 11 months ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆170Updated 7 months ago
- Simplify your life with leak detection in JavaScript. NipeJS streamlines the use of regex, making it effortless to uncover potential leak…☆93Updated 9 months ago
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆139Updated last year
- ai-based domain name generation☆90Updated 3 months ago