API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).
☆234Jan 25, 2026Updated last month
Alternatives and similar repositories for API-Pentesting-Tools
Users that are interested in API-Pentesting-Tools are comparing it to the libraries listed below
Sorting:
- ☆96Apr 3, 2025Updated 10 months ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆16Jan 25, 2026Updated last month
- Gampung tools for find nuclei template from github☆11Sep 6, 2023Updated 2 years ago
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆61Jan 25, 2026Updated last month
- ☆13Oct 24, 2024Updated last year
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆47Jan 25, 2026Updated last month
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆34Jan 26, 2026Updated last month
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆88Jan 25, 2026Updated last month
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆98Jan 25, 2026Updated last month
- Penetration Testing For - Web | Mobile | API | Thick Client | Source Code Review | DevSecOps | Wireless | Network Pentesting, etc...☆1,462Feb 5, 2026Updated 3 weeks ago
- Automate Recon XSS Bug Bounty☆178Jan 18, 2026Updated last month
- ☆23Mar 22, 2025Updated 11 months ago
- ☆91Mar 17, 2025Updated 11 months ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 weeks ago
- how to look for Leaked Credentials !☆1,033May 6, 2024Updated last year
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆131May 12, 2025Updated 9 months ago
- A comprehensive reconnaissance and vulnerability scanning tool that combines multiple security assessment capabilities into a single auto…☆26Jun 24, 2025Updated 8 months ago
- Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers☆309Mar 31, 2024Updated last year
- Header Exploitation HTTP☆711Updated this week
- Nuclei-AI-Prompts☆354Jun 22, 2025Updated 8 months ago
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆19Mar 6, 2025Updated 11 months ago
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆56Jan 25, 2026Updated last month
- A passive way to find backups/ sensitive information.☆87Jul 10, 2025Updated 7 months ago
- A collection of useful lists for Penetration Testing & Bug Bounty - Content Discovery, Payloads, Variables, Sandbox Escaping, etc☆102Mar 5, 2025Updated 11 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated 10 months ago
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆60Jan 25, 2026Updated last month
- Wordlists for content discovery with special words in different languages☆15Jan 17, 2025Updated last year
- A curated list of penetration testing and ethical hacking tools, organized by category. This compilation includes tools from Kali Linux a…☆1,195Jan 25, 2026Updated last month
- A fast subdomain takeover tool☆85Nov 10, 2023Updated 2 years ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆45May 2, 2025Updated 9 months ago
- HackTheBox Certified Penetration Tester Specialist Cheatsheet☆696Jul 10, 2024Updated last year
- This repository contains the best fuzzing wordlist files☆34Dec 2, 2024Updated last year
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆220Sep 25, 2025Updated 5 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆267Dec 23, 2024Updated last year
- A Simple JS code to keylogger data and send it to the personal server☆31Dec 30, 2024Updated last year
- A simple browser extension to quickly find interesting security-related information on a webpage.☆170Jan 20, 2026Updated last month
- 轻量级的 Active Directory 枚举工具,用于收集域环境中的信息☆88Mar 22, 2025Updated 11 months ago
- CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applicat…☆1,779Jun 15, 2025Updated 8 months ago