CypherNova1337 / Auto-IDORLinks
An interactive bash script for detecting IDOR vulnerabilities. Automates the discovery of access control issues in web applications, enhancing the efficiency of bug bounty hunting.
☆13Updated 7 months ago
Alternatives and similar repositories for Auto-IDOR
Users that are interested in Auto-IDOR are comparing it to the libraries listed below
Sorting:
- The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points…☆20Updated 2 years ago
- Nafeed-Broken-Link: A Python tool designed to check for broken social media links on a given domain. This script crawls all accessible pa…☆65Updated last year
- BountyDork is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for perf…☆28Updated last year
- Dons Js Scanner is a sleek command-line tool that hunts for hidden treasures—API keys, credentials, and secrets—lurking in the JavaScript…☆86Updated 4 months ago
- Host Header Vulnerability Scanner Automated Tool☆27Updated 7 months ago
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆61Updated 6 months ago
- Xssor.go is a xss reflections checker for urls☆71Updated 2 years ago
- xsschecker tests endpoints for reflected XSS by injecting payloads and checking responses. It prints vulnerable if the payload is reflect…☆38Updated 2 weeks ago
- ☆51Updated 4 months ago
- Ultimate Wordlist for Web Content Discovery☆67Updated 6 months ago
- ☆35Updated 6 months ago
- ☆66Updated last year
- Automate Recon XSS Bug Bounty☆176Updated 5 months ago
- CRLF Bug scanner for WebPentesters and Bugbounty Hunters☆42Updated 2 years ago
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆22Updated 3 years ago
- ☆43Updated last year
- URL Fuzzer☆20Updated 11 months ago
- subfalcon is a subdomain enumeration tool that allows you to discover and monitor subdomains for a given list of domains or a single doma…☆53Updated 11 months ago
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆36Updated last year
- Welcome to the 403 and 401 Bypass Techniques and Bug Bounty Tips repository! This repo is a collection of methods and strategies to bypas…☆19Updated 10 months ago
- KakHunt is a python GUI Tool private tool which earns me 100s of bugs every month. It spawns URLS and filters Sensitive Info.☆51Updated 2 years ago
- A powerful command-line tool for Google dorking, enabling users to uncover hidden information and vulnerabilities with advanced search qu…☆27Updated 4 months ago
- Fback is a tool that helps you create target-specific wordlists using a .json pattern.☆61Updated 4 months ago
- Gather results of dorks across a number of search engines☆156Updated last month
- Firebase_Checker is Python tool to analyze APK files and web applications for Firebase-related vulnerabilities. This tool identifies secu…☆49Updated 2 weeks ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆76Updated 2 months ago
- Bypass Reset Password Code Lead to Account Takeover☆26Updated last year
- Enumerate old versions of robots.txt paths using Wayback Machine for content discovery☆53Updated 2 years ago
- This script Crawl the website and find the urls that contains html forms.☆72Updated last year
- Collection of templates from various resources☆41Updated 2 weeks ago