GManOfficial / IDOR-INLinks
The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points to identify potential IDOR vulnerabilities. It leverages techniques such as parameter fuzzing, payload injection, and response analysis to detect signs of insecure direct object references.
☆17Updated last year
Alternatives and similar repositories for IDOR-IN
Users that are interested in IDOR-IN are comparing it to the libraries listed below
Sorting:
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Updated 4 months ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Updated 7 months ago
- An interactive bash script for detecting IDOR vulnerabilities. Automates the discovery of access control issues in web applications, enha…☆9Updated last month
- ☆24Updated last year
- Find secrets and passwords in container images and file systems☆14Updated 2 years ago
- xsschecker tool checking reflected endpoints finding possible xss vulnerable endpoints.☆21Updated 7 months ago
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆16Updated 2 years ago
- bash script for automating subdomain enumeration process either passive or active☆27Updated 5 months ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆21Updated 2 years ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆41Updated 2 weeks ago
- Automate your subdomain enumeration, subdomain takeover, management, nuclei, etc. in one go.☆10Updated 2 years ago
- Pointer is a Fast Simple Lightweight Tool for Endpoint Discovery.☆14Updated last year
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆38Updated 9 months ago
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆8Updated last year
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆40Updated 9 months ago
- Enumerate old versions of robots.txt paths using Wayback Machine for content discovery☆48Updated last year
- Useful Github Dorks for BugBounty -☆65Updated 2 years ago
- I collected it to help the bug hunter get a reward☆58Updated 2 years ago
- An automated reconnaissance and vulnerability scanning tool that combines multiple tools for comprehensive web application security asses…☆19Updated 3 weeks ago
- This repo is just a guide where you can find all labs of burp suite resolved, you can see the workflow and all type of web attacks☆13Updated 3 years ago
- Extracting api keys and secrets by requesting each url at the your list.☆18Updated 11 months ago
- OWASP Foundation Web Respository☆25Updated 11 months ago
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆23Updated 3 years ago
- word-list, payloads , Resources☆14Updated 4 months ago
- This tool allows you to find ssti vulnerability with ease!☆20Updated 2 years ago
- Ollama AI Analyzer runs directly on your local computer, using Ollama's AI models to analyze your HTTP requests and responses. This means…☆29Updated 3 months ago
- Detect SSRF within Caido☆24Updated 2 months ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆18Updated last year
- Ultimate Package Of 50 Bug Bounty Hunting Tools☆42Updated 2 years ago
- ☆16Updated 2 years ago