The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points to identify potential IDOR vulnerabilities. It leverages techniques such as parameter fuzzing, payload injection, and response analysis to detect signs of insecure direct object references.
☆25Jun 25, 2023Updated 2 years ago
Alternatives and similar repositories for IDOR-IN
Users that are interested in IDOR-IN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An interactive bash script for detecting IDOR vulnerabilities. Automates the discovery of access control issues in web applications, enha…☆15Apr 10, 2025Updated last year
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆64Jan 18, 2021Updated 5 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- Free Online Certifications in CyberSecurity☆23Sep 29, 2020Updated 5 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A list of ChatGPT Prompts for Web Application Security, Bug Bounty, and Pentesting☆39May 18, 2023Updated 2 years ago
- ☆10Jul 3, 2021Updated 4 years ago
- A simple index for HackTheBox machine along with tags☆16Mar 26, 2026Updated 3 weeks ago
- A python based tool for finding SQL vulnerable sites.☆14May 22, 2023Updated 2 years ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆16Sep 20, 2023Updated 2 years ago
- Laravel PHP framework black-box vulnerability scanner☆38Sep 3, 2024Updated last year
- A Complete SSRF (Server Side Request Forgery) Scanner.☆41Dec 1, 2025Updated 4 months ago
- Official API Documentation☆33Jun 29, 2025Updated 9 months ago
- Collected resources for OSWA preparation.☆26Jan 25, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated last year
- SQL Injection Vulnerability Scanner for a given URL written in Python☆16Feb 8, 2016Updated 10 years ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Jan 22, 2025Updated last year
- Query builder for mongo_dart and objectory☆11Jan 26, 2026Updated 2 months ago
- This is a simple web application vulnerability scanner that checks if a given URL or IP address is vulnerable to 36 common web applicatio…☆26Dec 7, 2025Updated 4 months ago
- Bug Hunting Handbook☆11Aug 11, 2022Updated 3 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 3 months ago
- PlanAI: A graph-based framework for complex task automation integrating traditional compute and LLM capabilities☆41Feb 13, 2026Updated 2 months ago
- multiple python implementations for image dithering☆18Apr 12, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A Python based scanner to find potential SSRF parameters in a web application.☆70Jul 12, 2021Updated 4 years ago
- Scripts for bug bounty-ing and attack surface mapping☆13Jan 10, 2022Updated 4 years ago
- A (fork of a) slick visualization for your source code☆59Feb 3, 2010Updated 16 years ago
- Detect SSRF within Caido☆49Apr 7, 2026Updated last week
- Reddit is tracking every out-going link you click. Even if you are not logged in, every news article, image, or website you visit from R…☆13Aug 6, 2016Updated 9 years ago
- Dart Postgresql database library.☆15Jan 20, 2026Updated 2 months ago
- TLS protocol scanner☆15Sep 27, 2022Updated 3 years ago
- <img src=x onerroralert(1);>☆11Jul 12, 2014Updated 11 years ago
- A curated list of resources, tools, and wordlists for bug bounty hunters.☆19Feb 26, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- React 16 Tooling, published by Packt☆15Mar 1, 2023Updated 3 years ago
- Argument injection vulnerability in PHP☆13Jun 15, 2024Updated last year
- osint tool user github | ghubscan 1.4☆13Mar 5, 2026Updated last month
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆82Aug 20, 2023Updated 2 years ago
- Checks for signature requirements over LDAP☆98Oct 11, 2022Updated 3 years ago
- ✅ Experience the power of an automated Insecure Direct Object Reference (IDOR) vulnerability detection tool. Safeguard your applications …☆68Mar 9, 2025Updated last year
- BugBounty framework with main function to ORGANIZE data and STEPS. So, you don't get lost in your bug bounty hunting. You can find everyt…☆14Jul 8, 2018Updated 7 years ago