GManOfficial / IDOR-IN
The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points to identify potential IDOR vulnerabilities. It leverages techniques such as parameter fuzzing, payload injection, and response analysis to detect signs of insecure direct object references.
☆15Updated last year
Alternatives and similar repositories for IDOR-IN
Users that are interested in IDOR-IN are comparing it to the libraries listed below
Sorting:
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆15Updated 2 years ago
- JaelesFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications☆16Updated last year
- ☆23Updated last year
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆8Updated last year
- Recon (Whois)☆15Updated last year
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Updated 6 months ago
- Python script implementing the favicon hash trick to find subdomains.☆35Updated 2 years ago
- uforall is a fast url crawler this tool crawl all URLs number of different sources, alienvault,WayBackMachine,urlscan,commoncrawl☆42Updated 5 months ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Updated 3 months ago
- bash script for automating subdomain enumeration process either passive or active☆27Updated 5 months ago
- xsschecker tool checking reflected endpoints finding possible xss vulnerable endpoints.☆21Updated 6 months ago
- OWASP Foundation Web Respository☆25Updated 11 months ago
- Find secrets and passwords in container images and file systems☆12Updated 2 years ago
- Enumerate old versions of robots.txt paths using Wayback Machine for content discovery☆47Updated last year
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆40Updated 3 months ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last month
- Pointer is a Fast Simple Lightweight Tool for Endpoint Discovery.☆14Updated last year
- subdog is a subdomain enumeration tools, this tool collect number of different sources to create a list of root subdomains☆18Updated 3 months ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆13Updated 5 months ago
- Useful Github Dorks for BugBounty -☆64Updated 2 years ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Updated 2 years ago
- Xss payload for bypassing waf☆16Updated 5 years ago
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆23Updated last year
- ☆19Updated 9 months ago
- Ffuf output browser☆39Updated 2 years ago
- Filter URLs to save your time.☆60Updated 2 years ago
- ☆11Updated 4 months ago
- ☆14Updated last month
- CrlfiX☆19Updated 3 months ago
- Extracting api keys and secrets by requesting each url at the your list.☆17Updated 10 months ago