GManOfficial / IDOR-INLinks
The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points to identify potential IDOR vulnerabilities. It leverages techniques such as parameter fuzzing, payload injection, and response analysis to detect signs of insecure direct object references.
☆20Updated 2 years ago
Alternatives and similar repositories for IDOR-IN
Users that are interested in IDOR-IN are comparing it to the libraries listed below
Sorting:
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆43Updated last month
- ☆25Updated 2 years ago
- Python script implementing the favicon hash trick to find subdomains.☆37Updated 2 years ago
- Xss payload for bypassing waf☆17Updated 5 years ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Updated 8 months ago
- Updated 6000 Sql Injection Google Dork 2021☆38Updated 4 years ago
- Useful Github Dorks for BugBounty -☆65Updated 2 years ago
- bash script for automating subdomain enumeration process either passive or active☆27Updated 7 months ago
- Pointer is a Fast Simple Lightweight Tool for Endpoint Discovery.☆14Updated last year
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆40Updated 2 years ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Updated 5 months ago
- Filter URLs to save your time.☆60Updated 2 years ago
- CLI tool that extracts a regex pattern from a list of urls ( Rust )☆62Updated 2 years ago
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆38Updated 10 months ago
- Khonsu is a powerful port scanning tool written in python that detect open ports with concurrent and accurately☆15Updated last year
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆24Updated 2 years ago
- This repo is just a guide where you can find all labs of burp suite resolved, you can see the workflow and all type of web attacks☆13Updated 3 years ago
- Extracting api keys and secrets by requesting each url at the your list.☆19Updated last year
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Updated 2 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆42Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 7 months ago
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆8Updated last year
- Enumerate old versions of robots.txt paths using Wayback Machine for content discovery☆52Updated last year
- simple recon tool to help you for searching vulnerability on web server☆74Updated 4 months ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated 10 months ago
- ☆40Updated 11 months ago
- Ollama AI Analyzer runs directly on your local computer, using Ollama's AI models to analyze your HTTP requests and responses. This means…☆29Updated 4 months ago
- ☆10Updated last year
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Updated last year
- Passive Web Vulnerability Detection Tool☆34Updated 2 months ago