GManOfficial / IDOR-INLinks
The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points to identify potential IDOR vulnerabilities. It leverages techniques such as parameter fuzzing, payload injection, and response analysis to detect signs of insecure direct object references.
☆18Updated 2 years ago
Alternatives and similar repositories for IDOR-IN
Users that are interested in IDOR-IN are comparing it to the libraries listed below
Sorting:
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Updated 10 months ago
- ☆25Updated 2 years ago
- Pointer is a Fast Simple Lightweight Tool for Endpoint Discovery.☆14Updated last year
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆24Updated 2 years ago
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆22Updated 3 years ago
- Xss payload for bypassing waf☆18Updated 5 years ago
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆39Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 10 months ago
- A Python tool for exploiting Django RCE via deserialization vulnerabilities in session cookies, allowing remote code execution through fo…☆18Updated 11 months ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆43Updated 4 months ago
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've …☆56Updated 3 months ago
- My personal collection of nuclei templates made for fuzzing.☆28Updated last year
- bash script for automating subdomain enumeration process either passive or active☆28Updated 9 months ago
- Collection of templates from various resources☆39Updated last month
- Find secrets and passwords in container images and file systems☆14Updated 2 years ago
- Dump paths & pages from Next.js Manifest☆15Updated last year
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆29Updated 9 months ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆34Updated last year
- Collection of tools, scripts, one-liners, templates, dorks and more☆10Updated this week
- subfalcon is a subdomain enumeration tool that allows you to discover and monitor subdomains for a given list of domains or a single doma…☆51Updated 9 months ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆44Updated last year
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆33Updated last year
- Host Header Vulnerability Scanner Automated Tool☆24Updated 5 months ago
- This tool allows you to find ssti vulnerability with ease!☆21Updated 3 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆42Updated last year
- This script is used to search for cloud certificate entities such as Amazon, Azure, and others that have been extracted by the kaeferjaeg…☆48Updated 9 months ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆19Updated last year
- Khonsu is a powerful port scanning tool written in python that detect open ports with concurrent and accurately☆15Updated last week
- A Collection of Wordlists for Penetration Testing☆25Updated 9 months ago
- ☆68Updated 2 years ago