GManOfficial / IDOR-INLinks
The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points to identify potential IDOR vulnerabilities. It leverages techniques such as parameter fuzzing, payload injection, and response analysis to detect signs of insecure direct object references.
☆20Updated 2 years ago
Alternatives and similar repositories for IDOR-IN
Users that are interested in IDOR-IN are comparing it to the libraries listed below
Sorting:
- ☆25Updated 2 years ago
- Pointer is a Fast Simple Lightweight Tool for Endpoint Discovery.☆14Updated last year
- Xss payload for bypassing waf☆18Updated 5 years ago
- simple bash script to earn bounties☆36Updated last year
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆22Updated 3 years ago
- Host Header Vulnerability Scanner Automated Tool☆27Updated 7 months ago
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆61Updated 6 months ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆42Updated last year
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Updated last year
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆36Updated 2 years ago
- I collected it to help the bug hunter get a reward☆58Updated 3 years ago
- HackLiners: CyberSec/BugHunting OneLiners☆60Updated last year
- Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)☆72Updated 9 months ago
- Collection of templates from various resources☆41Updated 2 weeks ago
- Bug Bounty Methodology-slides by Muhammad M. Awali. Pentesting and Researcher Talks.☆28Updated 2 years ago
- Automated tool for domains & Subdomains Gathering☆14Updated last year
- My personal collection of nuclei templates made for fuzzing.☆29Updated last year
- This script will install all the essential bug bounty tools and will find some basic vulns. I made this script for my daily hunting. The …☆45Updated 3 years ago
- A powerful Go tool for finding origin IPs of domains by querying multiple security APIs and validating results with built-in HTTP client.☆37Updated 2 weeks ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated last year
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆63Updated 4 years ago
- bash script for automating subdomain enumeration process either passive or active☆29Updated 11 months ago
- Dump paths & pages from Next.js Manifest☆15Updated last year
- An interactive bash script for detecting IDOR vulnerabilities. Automates the discovery of access control issues in web applications, enha…☆13Updated 7 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 11 months ago
- Automate bug bounty recon using bash alias☆15Updated last year
- List of payloads for BurpSuite intruder. Payloads gathered from Swisskyrepos PayloadsAllTheThings☆32Updated 3 weeks ago
- Methodoloy for pentesting web applications.☆10Updated 3 years ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆34Updated last year
- AutoAR is a comprehensive, modular security automation toolkit designed for bug bounty hunters, penetration testers, and security researc…☆28Updated last week