GManOfficial / IDOR-INLinks
The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points to identify potential IDOR vulnerabilities. It leverages techniques such as parameter fuzzing, payload injection, and response analysis to detect signs of insecure direct object references.
☆20Updated 2 years ago
Alternatives and similar repositories for IDOR-IN
Users that are interested in IDOR-IN are comparing it to the libraries listed below
Sorting:
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆61Updated 4 years ago
- Useful Github Dorks for BugBounty -☆65Updated 2 years ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Updated 9 months ago
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆23Updated 3 years ago
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆17Updated 2 years ago
- Xss payload for bypassing waf☆18Updated 5 years ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆29Updated 7 months ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆37Updated 2 years ago
- ☆10Updated 2 months ago
- List of payloads for BurpSuite intruder. Payloads gathered from Swisskyrepos PayloadsAllTheThings☆30Updated last week
- Pointer is a Fast Simple Lightweight Tool for Endpoint Discovery.☆14Updated last year
- bash script for automating subdomain enumeration process either passive or active☆28Updated 7 months ago
- Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)☆68Updated 6 months ago
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆56Updated 3 months ago
- An interactive bash script for detecting IDOR vulnerabilities. Automates the discovery of access control issues in web applications, enha…☆9Updated 4 months ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆24Updated 2 years ago
- ☆19Updated last year
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆38Updated 11 months ago
- Host Header Injection Scanner☆45Updated 4 years ago
- ☆8Updated last year
- Cool One Liners at one place to make your recon and bug bounty skills better !☆16Updated 4 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated 11 months ago
- My personal collection of nuclei templates made for fuzzing.☆27Updated 11 months ago
- Host Header Vulnerability Scanner Automated Tool☆23Updated 3 months ago
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆23Updated last month
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆43Updated 2 months ago
- Enumerate old versions of robots.txt paths using Wayback Machine for content discovery☆52Updated last year
- This script will install all the essential bug bounty tools and will find some basic vulns. I made this script for my daily hunting. The …☆45Updated 3 years ago
- Bug Bounty ultimate tool☆22Updated last month
- A Python tool for exploiting Django RCE via deserialization vulnerabilities in session cookies, allowing remote code execution through fo…☆17Updated 10 months ago