Dishant4081 / All-about-IDORView external linksLinks
☆16Jun 21, 2024Updated last year
Alternatives and similar repositories for All-about-IDOR
Users that are interested in All-about-IDOR are comparing it to the libraries listed below
Sorting:
- Documentation for knoXSS tool by @brutelogic☆29Jan 24, 2017Updated 9 years ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- ☆15Mar 21, 2025Updated 10 months ago
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆45Mar 24, 2025Updated 10 months ago
- Extensor is a command-line tool designed to help users quickly gather URLs containing specific file extensions from a given source (e.g.,…☆10Mar 13, 2024Updated last year
- PyTorch Implementation for the paper "Let Me Help You! Neuro-Symbolic Short-Context Action Anticipation" accepted to RA-L'24.☆12Nov 27, 2024Updated last year
- ☆165Jan 23, 2026Updated 3 weeks ago
- ☆11Aug 12, 2022Updated 3 years ago
- Truly unique, provable Certificates for Companies and Universities☆11Jun 28, 2022Updated 3 years ago
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 2 years ago
- Learning Smart Contracts with freecodecamp!☆14Jun 1, 2022Updated 3 years ago
- Gathering All Nuclei Fuzzing Templates in a Single Repo.☆11Apr 23, 2024Updated last year
- a game based on space invaders for a mini-course on learning pygame☆17Oct 18, 2021Updated 4 years ago
- A Python Script to Get Subdomain using https://crt.sh☆95Aug 4, 2024Updated last year
- Privacy-enabling tools for onchain Provable querying☆15Apr 26, 2019Updated 6 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- ☆23Sep 22, 2025Updated 4 months ago
- Steganography Detection Framework☆13Jan 8, 2025Updated last year
- ☆18Aug 14, 2023Updated 2 years ago
- This repository houses diverse files and challenges centered around Just Mobile Security. With practical exercises and resources aimed at…☆13Apr 15, 2024Updated last year
- ☆12Sep 24, 2025Updated 4 months ago
- 一个为PentestBox添加搜索工具名称功能的py脚本☆13Sep 28, 2020Updated 5 years ago
- Description-FAQ of the process☆11Jul 16, 2023Updated 2 years ago
- Library for Hackers☆27Oct 8, 2024Updated last year
- ☆15Sep 13, 2023Updated 2 years ago
- my-first-hh☆11May 29, 2022Updated 3 years ago
- 🔍 erroreyes – Lightweight Subdomain Enumeration Tool A Python-based tool that queries crt.sh certificate logs to discover subdomains ass…☆16May 8, 2025Updated 9 months ago
- ☆15Jan 17, 2022Updated 4 years ago
- Wordlists for content discovery with special words in different languages☆14Jan 17, 2025Updated last year
- eval() Exploit POC for Searchor 2.4.2 and lower☆11Apr 10, 2023Updated 2 years ago
- Attack surface discovery and AI-assisted triage for security researchers. Endpoint & parameter mapping with actionable testing hints.☆43Jan 12, 2026Updated last month
- your bestfried for finding LinkedIn Employees on github☆15Mar 28, 2023Updated 2 years ago
- google dorks for locate important files, information and accesses☆20Nov 25, 2024Updated last year
- Exploit for w3-total-cache☆17Jan 11, 2013Updated 13 years ago
- ☆22Nov 11, 2024Updated last year
- BBT - Bug Bounty Tools☆18Apr 5, 2024Updated last year
- An exploit that allows you to bind an exe to a pdf for the 2010 adobe reader.☆14Nov 26, 2019Updated 6 years ago
- ☆24Apr 5, 2025Updated 10 months ago