Organize your API security assessment by using MindAPI. It's free and open for community collaboration.
☆860Sep 22, 2025Updated 5 months ago
Alternatives and similar repositories for MindAPI
Users that are interested in MindAPI are comparing it to the libraries listed below
Sorting:
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communit…☆3,644Nov 23, 2025Updated 3 months ago
- Contextual Content Discovery Tool☆3,096Apr 29, 2024Updated last year
- BBT - Bug Bounty Tools (examples💡)☆1,881Apr 5, 2024Updated last year
- This challenge is Inon Shkedy's 31 days API Security Tips.☆2,231Apr 20, 2022Updated 3 years ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,820Jun 9, 2024Updated last year
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆642Jul 7, 2025Updated 7 months ago
- ☆299Jul 16, 2022Updated 3 years ago
- ☆755Jun 26, 2024Updated last year
- Gotator is a tool to generate DNS wordlists through permutations.☆505Jul 17, 2022Updated 3 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,075Aug 14, 2024Updated last year
- A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.☆1,974Sep 5, 2021Updated 4 years ago
- Hidden parameters discovery suite☆2,027Sep 8, 2024Updated last year
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,524Jan 15, 2026Updated last month
- a tool that compiles a csv of all h1 program stats☆49Jul 2, 2023Updated 2 years ago
- Mind-Maps of Several Things☆2,626Jun 29, 2023Updated 2 years ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆2,062Jan 2, 2024Updated 2 years ago
- API Security Project aims to present unique attack & defense methods in API Security field☆1,430Mar 5, 2024Updated last year
- Collection of methodology and test case for various web vulnerabilities.☆7,034Jun 25, 2025Updated 8 months ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,348Sep 30, 2024Updated last year
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,773Apr 26, 2024Updated last year
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,077Jul 29, 2024Updated last year
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,039Aug 23, 2025Updated 6 months ago
- De-clutter a list of URLs☆386Feb 3, 2026Updated 3 weeks ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,259Updated this week
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned ent…☆2,116Nov 18, 2024Updated last year
- ☆436Jun 1, 2021Updated 4 years ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,024Updated this week
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆5,208Jan 31, 2026Updated 3 weeks ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,497Jan 8, 2026Updated last month
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,676May 24, 2025Updated 9 months ago
- All about bug bounty (bypasses, payloads, and etc)☆6,644Sep 8, 2023Updated 2 years ago
- GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep☆1,401Sep 13, 2024Updated last year
- HTTP parameter discovery suite.☆6,091Feb 20, 2025Updated last year
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆750Dec 19, 2023Updated 2 years ago
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,458Nov 16, 2024Updated last year
- Scope aggregation tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!☆1,268Updated this week
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.☆4,837Jan 1, 2025Updated last year
- Rockyou for web fuzzing☆3,023Feb 11, 2026Updated 2 weeks ago
- GoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fing…☆207Jun 21, 2023Updated 2 years ago