cosad3s / postleaksLinks
Search for sensitive data in Postman public library.
☆206Updated 6 months ago
Alternatives and similar repositories for postleaks
Users that are interested in postleaks are comparing it to the libraries listed below
Sorting:
- The Most Advanced Client-Side Prototype Pollution Scanner☆226Updated 3 weeks ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆150Updated 7 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆107Updated last month
- Nodesub is a command-line tool for finding subdomains in bug bounty programs☆148Updated 11 months ago
- Automated Subdomain Enumeration and Scanning Tool☆114Updated last year
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Updated last year
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆139Updated 3 months ago
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆161Updated 7 months ago
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆149Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon☆240Updated last year
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆341Updated last year
- ☆171Updated last month
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆162Updated 2 months ago
- ☆185Updated 2 months ago
- Opensource assets and vulnerability scanning tool☆181Updated last month
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆229Updated 11 months ago
- Gourlex is a simple tool that can be used to extract URLs and paths from web pages.☆234Updated last year
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆350Updated last year
- Self-hosted passive subdomain continous monitoring tool.☆165Updated last year
- ☆148Updated last year
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆126Updated 3 months ago
- hauditor is a tool designed to analyze the security headers returned by a web page.☆173Updated last year
- A streamlined tool for discovering private TLDs for security research.☆213Updated last week
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆424Updated 5 months ago
- Recon MindMap (RMM)☆158Updated last year
- Nuclei templates for honeypots detection.☆196Updated last year
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆197Updated last month
- ☆103Updated 11 months ago
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.☆233Updated last year