GManOfficial / IDOR-INLinks
The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points to identify potential IDOR vulnerabilities. It leverages techniques such as parameter fuzzing, payload injection, and response analysis to detect signs of insecure direct object references.
☆18Updated 2 years ago
Alternatives and similar repositories for IDOR-IN
Users that are interested in IDOR-IN are comparing it to the libraries listed below
Sorting:
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆59Updated 4 years ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Updated 10 months ago
- Pointer is a Fast Simple Lightweight Tool for Endpoint Discovery.☆14Updated last year
- uforall is a fast url crawler this tool crawl all URLs number of different sources, alienvault,WayBackMachine,urlscan,commoncrawl☆42Updated 8 months ago
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆23Updated 2 months ago
- A command-line utility designed to discover subdomains for a given domain in a simple, efficient way. It works by gathering information f…☆113Updated 2 weeks ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆43Updated 3 months ago
- Useful Github Dorks for BugBounty -☆66Updated 2 years ago
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆22Updated 3 years ago
- Resolvers updated daily for reconftw☆47Updated 2 years ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆24Updated 2 years ago
- Python script implementing the favicon hash trick to find subdomains.☆37Updated 2 years ago
- Passive Web Vulnerability Detection Tool☆35Updated 4 months ago
- bash script for automating subdomain enumeration process either passive or active☆28Updated 8 months ago
- ☆25Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆40Updated 11 months ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆96Updated 8 months ago
- simple recon tool to help you for searching vulnerability on web server☆74Updated 6 months ago
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆57Updated 4 months ago
- Cool One Liners at one place to make your recon and bug bounty skills better !☆14Updated 4 years ago
- XML-RPC Vulnerability Checker and Directory Fuzzer☆23Updated last year
- My personal collection of nuclei templates made for fuzzing.☆28Updated 11 months ago
- Xss payload for bypassing waf☆18Updated 5 years ago
- Enumerate old versions of robots.txt paths using Wayback Machine for content discovery☆52Updated last year
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆41Updated 10 months ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆37Updated 2 years ago
- RobinHood - Bug Hunting Recon Automation Script☆37Updated 2 years ago
- ☆19Updated last year
- A Lightning-Fast DNS Resolver written in Rust 🦀☆67Updated 9 months ago
- Filter URLs to save your time.☆60Updated 3 years ago