GManOfficial / IDOR-INView external linksLinks
The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points to identify potential IDOR vulnerabilities. It leverages techniques such as parameter fuzzing, payload injection, and response analysis to detect signs of insecure direct object references.
☆23Jun 25, 2023Updated 2 years ago
Alternatives and similar repositories for IDOR-IN
Users that are interested in IDOR-IN are comparing it to the libraries listed below
Sorting:
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- Collected resources for OSWA preparation.☆25Jan 25, 2023Updated 3 years ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆16Sep 20, 2023Updated 2 years ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Jan 22, 2025Updated last year
- ☆19Aug 26, 2020Updated 5 years ago
- AI-based Web Application Penetration Testing Tool☆24Jan 19, 2024Updated 2 years ago
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆22Apr 26, 2022Updated 3 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated last month
- Detect SSRF within Caido☆42Dec 23, 2025Updated last month
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- A Complete SSRF (Server Side Request Forgery) Scanner.☆41Dec 1, 2025Updated 2 months ago
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆44Oct 29, 2023Updated 2 years ago
- ☆14May 14, 2022Updated 3 years ago
- Code examples for learn Infrastructure as Code Part01☆10Jun 1, 2021Updated 4 years ago
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- Final year project in Magshimim, focusing on Python development and Web Exploitation.☆10Apr 29, 2023Updated 2 years ago
- Configurations for a vertical 72" PiWall system☆13Jan 21, 2017Updated 9 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Jan 31, 2025Updated last year
- Get newest public disclosed HackerOne report notifications on your Desktop☆14Jan 29, 2020Updated 6 years ago
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- ☆13Nov 30, 2023Updated 2 years ago
- Query builder for mongo_dart and objectory☆11Jan 26, 2026Updated 2 weeks ago
- Reddit is tracking every out-going link you click. Even if you are not logged in, every news article, image, or website you visit from R…☆12Aug 6, 2016Updated 9 years ago
- A deliberately vulnerable website used to showcase Dastardly from Burp Suite☆10Oct 6, 2025Updated 4 months ago
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- ☆18Aug 15, 2025Updated 5 months ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆13Jul 19, 2020Updated 5 years ago
- Network scanning tool designed to detect and report changes in open ports and services over time☆12Oct 16, 2025Updated 3 months ago
- ☆10Jul 3, 2021Updated 4 years ago
- Webapp builder: The easy (and fast) way to create a web project☆13Jul 3, 2017Updated 8 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Protect your sensitive HTML content with this AES encryption HTML loader. User will need to key in password in order to view the HTML con…☆11May 5, 2015Updated 10 years ago
- ARL使用代理池联动nuclei,xray通过企业微信机器人告警☆10Oct 28, 2022Updated 3 years ago
- Recon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnais…☆11May 28, 2022Updated 3 years ago