✅ Experience the power of an automated Insecure Direct Object Reference (IDOR) vulnerability detection tool. Safeguard your applications with cutting-edge technology that identifies potential security weaknesses in an efficient and streamlined manner.
☆68Mar 9, 2025Updated last year
Alternatives and similar repositories for IDORD
Users that are interested in IDORD are comparing it to the libraries listed below
Sorting:
- SOC bilgileri yer almaktadır.☆22Jul 2, 2025Updated 8 months ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32May 18, 2022Updated 3 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 9 months ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 7 months ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Jan 22, 2025Updated last year
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆45Jun 19, 2023Updated 2 years ago
- A Developer and Security Engineer friendly package for Securing NodeJS Applications.☆28Nov 14, 2022Updated 3 years ago
- A Web Vulnerability Scanner and Patcher☆170Feb 14, 2026Updated 3 weeks ago
- Alien Logger is a MaaS (Malware as a Service) website offering an easier to use alternative from the traditional keylogger.☆28Oct 31, 2021Updated 4 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- Application for administer multidomain Active Directory-based networks☆29Dec 4, 2025Updated 3 months ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆28Mar 11, 2022Updated 3 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆71Oct 2, 2023Updated 2 years ago
- ☆11Feb 28, 2022Updated 4 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- ☆28Sep 10, 2022Updated 3 years ago
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tes…☆83Sep 15, 2022Updated 3 years ago
- Sifter - All purpose penetration testing op-center☆82Nov 23, 2022Updated 3 years ago
- OTP Grabber Bot | OTP Bot☆39Jul 11, 2025Updated 7 months ago
- The Immutable Core SDK Golang provides convenient access to the Immutable APIs and Ethereum contract methods for applications integrating…☆10Jan 6, 2026Updated 2 months ago
- Crossword client for Ubuntu☆10Sep 9, 2018Updated 7 years ago
- delosNmap | Nmap Script☆38Jan 15, 2023Updated 3 years ago
- A powerful reverse shell generator☆46Apr 15, 2022Updated 3 years ago
- ☆29Jan 19, 2026Updated last month
- The Ultimate Recon Framework☆11Mar 29, 2024Updated last year
- Hanoman is an GUI antivirus engine sigature based detection 🐒☆46Oct 3, 2021Updated 4 years ago
- This is a simple computer based test project using solely html, css & javascript(ES5). The project can display questions from an API or s…☆19Oct 27, 2021Updated 4 years ago
- This is an unofficial repository, for the official repository visit: https://git.anonymousmessenger.ly/dx/AnonymousMessenger☆82Nov 1, 2023Updated 2 years ago
- HOCig- Automatic HOC Information Gathering Tool V 1.2☆10May 4, 2021Updated 4 years ago
- Sharify is a serverless web app that allows you to share, preview and save your last month on Spotify seamlessly.☆14May 3, 2025Updated 10 months ago
- Subscan is a simple tool for subdomain scanner, it can scan subdomains fast.☆39Aug 9, 2023Updated 2 years ago
- A wireless infusion pump system workbench for security research☆15Jun 22, 2022Updated 3 years ago
- A public repo to hold some code review challenges for RSA Conference 2022☆11Jun 3, 2022Updated 3 years ago
- Full Valid Fake Data Generator☆103Sep 27, 2024Updated last year
- Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is writt…☆100Sep 9, 2023Updated 2 years ago
- An Raspberry PI 2 OpenWRT Image Setup To Be A Wireless Hacking Sandbox☆38Oct 9, 2015Updated 10 years ago
- An asynchronous TCP and UDP port scanner developed by the late Jack C. Louis.☆37Sep 11, 2014Updated 11 years ago