RestHound is a CLI tool for API reconnaissance and security analysis. It discovers RESTful API endpoints, checks HTTP method support, detects CORS misconfigurations, and fingerprints technologies using passive header inspection.
- 🔍 Discover reachable API endpoints
- 📮 Detect supported HTTP methods (via
OPTIONS
) - 🚨 Detect insecure CORS behavior
- 🧬 Fingerprint server-side technologies via headers
- ✅ Clean, human-readable CLI summary output
- Python 3.12+
Install requirements:
pip install -r requirements.txt
python resthound.py -u https://httpbin.org -w wordlist.txt
To see all available options, use:
python resthound.py -h
============================================================
✅ Reachable Endpoints:
============================================================
• https://httpbin.org/get
• https://httpbin.org/post
============================================================
🔍 Valid Endpoints with Allowed Methods:
============================================================
[200] https://httpbin.org/get
↳ Allowed Methods: HEAD, OPTIONS, GET
[200] https://httpbin.org/post
↳ Allowed Methods: POST, OPTIONS
============================================================
🚨 CORS Reflection Check:
============================================================
[!] https://httpbin.org/get
↳ Access-Control-Allow-Origin: https://evil.com
↳ Access-Control-Allow-Credentials: true
============================================================
🧬 Header Fingerprint Summary:
============================================================
https://httpbin.org/get
↳ Server: gunicorn/19.9.0
↳ X-Powered-By: None
These are features under consideration or in progress:
- 🧾 Support for custom headers (e.g. tokens, User-Agent)
- 🔄 JSON/CSV output formats
- 🕵️ Smart method inference when Allow header is missing
- 🕵️ Validate that promised HTTP methods match actual behavior using HEAD or minimal requests.
This tool is intended for authorized testing, research, and educational use only. Do not scan or probe systems without explicit permission.