GManOfficial / IDOR-INLinks
The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points to identify potential IDOR vulnerabilities. It leverages techniques such as parameter fuzzing, payload injection, and response analysis to detect signs of insecure direct object references.
☆21Updated 2 years ago
Alternatives and similar repositories for IDOR-IN
Users that are interested in IDOR-IN are comparing it to the libraries listed below
Sorting:
- ☆26Updated 2 years ago
- uforall is a fast url crawler this tool crawl all URLs number of different sources, alienvault,WayBackMachine,urlscan,commoncrawl☆51Updated last month
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Updated last year
- My personal collection of nuclei templates made for fuzzing.☆29Updated last year
- Xss payload for bypassing waf☆18Updated 5 years ago
- A powerful Go tool for finding origin IPs of domains by querying multiple security APIs and validating results with built-in HTTP client.☆38Updated last week
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆63Updated 4 years ago
- simple bash script to earn bounties☆36Updated last year
- Enumerate old versions of robots.txt paths using Wayback Machine for content discovery☆53Updated 2 years ago
- Xssor.go is a xss reflections checker for urls☆71Updated 2 years ago
- Host Header Vulnerability Scanner Automated Tool☆27Updated 7 months ago
- I collected it to help the bug hunter get a reward☆57Updated 3 years ago
- Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)☆74Updated 10 months ago
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆22Updated 3 years ago
- Useful Github Dorks for BugBounty -☆68Updated 2 years ago
- bash script for automating subdomain enumeration process either passive or active☆29Updated 11 months ago
- Pointer is a Fast Simple Lightweight Tool for Endpoint Discovery.☆14Updated last year
- Collection of templates from various resources☆42Updated last week
- Python script implementing the favicon hash trick to find subdomains.☆37Updated 2 years ago
- Bug Bounty Methodology-slides by Muhammad M. Awali. Pentesting and Researcher Talks.☆30Updated 2 years ago
- A command-line utility designed to discover subdomains for a given domain in a simple, efficient way. It works by gathering information f…☆115Updated last week
- A really fast http prober.☆41Updated last year
- Resolvers updated daily for reconftw☆47Updated 2 years ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆43Updated 6 months ago
- ☆21Updated 3 years ago
- subfalcon is a subdomain enumeration tool that allows you to discover and monitor subdomains for a given list of domains or a single doma…☆54Updated last year
- ☆67Updated 2 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆34Updated 2 years ago
- Supertruder but better☆31Updated 2 years ago
- Passive Web Vulnerability Detection Tool☆37Updated 7 months ago