KiteRunner – Hacker Tools: Next-level API hacking πŸ‘©β€πŸ’»

By Anna Hammond

September 7, 2021

Last updated on March 6, 2025

Download
KiteRunner – Hacker Tools: Next-level API hacking πŸ‘©β€πŸ’»

When facing API endpoints, older tools for directory busting tend to be very ineffective. The days where a webserver is just a directory tree are behind us. The more modern β€˜routes’ have taken over and wildly bruteforcing filenames isn’t effective anymore. We need to be smarter and scan based on popular API layouts. Let’s look at how KiteRunner can help with that!

Kiterunner Logo

πŸ™‹β€β™‚οΈ What is KiteRunner?

As the KiteRunner’s Github readme.md page explains, content discovery tools have been focusing on finding files and folders. However, for modern web applications and frameworks, in specific APIs, this approach isn’t effective anymore.

The creators felt like there was a need for a tool that can effectively brute force endpoints and routes in modern applications and that’s how KiteRunner was born.

Many modern frameworks (Flask, Rails, Express, Django and more) follow the paradigm of defining routes expecting certains headers, methods and so on. With this specific knowledge and through internet-wide searches for route names, methods, parameters and headers, KiteRunner can bruteforce API endpoints smarter and faster.

πŸ‘·β€β™€οΈ Setting up KiteRunner

As with many of these tools, the setup couldn’t be simpler.

Note: The name of the binary is kt. We recommend moving it into your path!

Installing KiteRunner

πŸ±β€πŸ Our first scan

Check out the video below for an example of a scan!

🚧 Conclusion

KiteRunner is a powerful tool to help you uncover all secret routes APIs hold. Mastering this will allow you to find vulnerabilities on endpoints unknown to others!

If you would like to recommend a tool for us to cover next week, then be sure to let us know down below. Also be sure to check outΒ all the previous Hacker Tools articles, such asΒ the last one on WPScan.


Did you know that there is a video accompanying this article? Check outΒ the playlist!

You may also like

Most assume that SQL injection is a solved problem in today's application landscape, especially with increased awareness of secure coding practices (such as resorting to prepared statements or parameterized queries) and the widespread adoption of NoSQL databases. However, in practice, SQLi vulnerabi

Read more

In March 2026, we ran BugQuest, a 31-day campaign covering everything you need to know about finding and exploiting broken access control vulnerabilities. From understanding the basics of authentication and authorization to spotting subtle authorization bypasses in real code, we broke down one of th

Read more

At Intigriti, we host monthly web-based Capture The Flag (CTF) challenges as a way to engage with the security researcher community. This month's challenge, brought forward by Kulindu, presented us with a Secure Search Portal that, on the surface, appeared to be well protected. A strict Content Secu

Read more