GManOfficial / IDOR-IN
The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points to identify potential IDOR vulnerabilities. It leverages techniques such as parameter fuzzing, payload injection, and response analysis to detect signs of insecure direct object references.
☆10Updated last year
Related projects ⓘ
Alternatives and complementary repositories for IDOR-IN
- Changes the output of Wappalyzer into something human readable. It also provides links to useful websites and a Google query for finding…☆9Updated last year
- ☆13Updated last year
- NetFuzzer is a comprehensive network security assessment tool for internal and external networks, including Firewalls, Routers, Switches,…☆13Updated 4 months ago
- Simple tools to handle string and generate subdomain permutations☆14Updated 2 years ago
- The Network Execution Tool☆13Updated 7 months ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆35Updated last month
- A bash script that automates the process of port scanning and service discovery on specified target hosts. The aim of the scripts is redu…☆12Updated last month
- JaelesFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications☆12Updated 6 months ago
- Smart and efficient tool to automate open redirect detection at scale.☆8Updated 2 years ago
- Extract endpoints from specific Git repository for fuzzing☆21Updated 4 years ago
- List of domains having RVDP programmes☆10Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Updated last year
- Python script implementing the favicon hash trick to find subdomains.☆26Updated last year
- ☆12Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated last year
- Web based favicon recon tool made using streamlit.☆9Updated 2 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆17Updated 5 months ago
- ☆14Updated last year
- DataReaper is a powerful Python tool designed to harvest data from publicly accessible HTTP servers. It combines the capabilities of Shod…☆11Updated 9 months ago
- Pentesting notes☆17Updated last year
- Burpsuite Plugin to bypass strict RePlay protection☆12Updated 3 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆27Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆30Updated last week
- XSSMaze is a web service designed to test and improve the performance of security testing tools by providing various cases of XSS vulnera…☆24Updated 6 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Updated 3 months ago
- Enumeration & fingerprint tool☆23Updated 8 months ago
- Install and upgrade projectdiscovery tools☆10Updated 2 years ago
- Monitor your target continuously for new subdomains!☆26Updated last year
- Burp extension used to snip any header from all the requests.☆22Updated last year