0xSs0rZ
search
Ctrlk
  • Hello World
  • Whoamiarrow-up-right-from-square
  • Interesting Books
  • Pentest
    • CheckLists
    • Reconchevron-right
      • Tools
      • Information Gathering
      • OSINTchevron-right
        • Tools
        • Emails
        • Dark Web Exposure
        • Database Leak - Credential stuffing
        • Code Search (Gitlab / Github)
        • Credentials in git repos
        • GitHub - finding vulnerabilities
        • API Leaks
        • Docker
        • Social Media
        • Credentials in YouTube Videos
        • Metadata and Hidden infos
      • Whois
      • Google Dorks
      • Git Dorks
      • Cloud
      • DNS Subdomain Enumeration
      • Virtual Host
      • Fingerprinting / Crawling
      • Host Discovery
    • Protocolschevron-right
    • Brute forcechevron-right
    • Shellschevron-right
    • File Transferchevron-right
    • Web attackschevron-right
    • APIchevron-right
    • Public Exploitchevron-right
    • External Pentest
    • Internal Pentestchevron-right
    • Privilege Escalationchevron-right
    • Post Exploitationchevron-right
    • Crackingchevron-right
    • Thick Client Pentest
    • Wifi Pentest
    • Mobile Pentest
    • Configuration Audit / Hardening
    • Code Analysis
    • Toolschevron-right
    • Search Engines
    • Cheatsheets
    • Free VPN / Proxy
    • Note Keeping / Reporting / Admin Stuff
  • Cloud
    • Cloud VM
    • Enumeration
    • SSRF / RCE
    • Azure
    • AWSchevron-right
    • GCP
    • Kubernetes
    • Tools
  • Labs
  • Antivirus Evasion - Defender
    • Mindmap
    • Defender Module for PowerShell
    • Static Analysis
    • Dynamic Analysis
    • AMSI Bypass
    • Process Injection
    • Open-Source Software
    • User Access Control (UAC)
    • AppLocker
    • LOLBAS / LOLDrivers / LOLESXi
    • PowerShell ConstrainedLanguage Mode, CLM
    • VBScript
    • Bypass all Powershell security features (AMSI,CLM)
    • Bypass AV Payload / Shells
    • Find Folder Exclusions
    • Resources
  • EDR BYPASS
    • Approches for Evasion
    • Tools
    • Obfuscation
    • EDR Killer
    • BYOVD
    • Spoof Command Line Arguments
    • Blind Spots
    • Living Off Security Tools / LOTTunels
    • Process Hollowing
    • Process Injection - Reverse Shell
    • Payload Creation
    • Shellcode Loader
    • MalDev
    • Malware Testing Lab
    • Resources
  • Red Team
    • OpSec / Anonymity
    • Initial Access
    • Infrastructure (phishing, C2, redirector)
    • C2
    • EDR / AV Bypass
    • Physical Penetration Testing
    • Bypass Bitlocker
    • Resources
  • CTF
    • OSINT
    • Forensicchevron-right
    • Cryptographychevron-right
    • Steganographychevron-right
    • Write Upchevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Pentestchevron-right
  2. Reconchevron-right
  3. OSINT

API Leaks

hashtag
Porch Pirate

LogoGitHub - MandConsultingGroup/porch-pirate: Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitation of API endpoints and secrets committed to workspaces, collections, requests, users and teams. Porch Pirate can be used as a client or be incorporated into your own applications.GitHubchevron-right

hashtag
Swagger Spy

LogoGitHub - UndeadSec/SwaggerSpy: Automated OSINT on SwaggerHubGitHubchevron-right
PreviousGitHub - finding vulnerabilitieschevron-leftNextDockerchevron-right

Last updated 11 months ago

  • Porch Pirate
  • Swagger Spy