GManOfficial / IDOR-INLinks
The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points to identify potential IDOR vulnerabilities. It leverages techniques such as parameter fuzzing, payload injection, and response analysis to detect signs of insecure direct object references.
☆23Updated 2 years ago
Alternatives and similar repositories for IDOR-IN
Users that are interested in IDOR-IN are comparing it to the libraries listed below
Sorting:
- An interactive bash script for detecting IDOR vulnerabilities. Automates the discovery of access control issues in web applications, enha…☆14Updated 9 months ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Updated 2 years ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Updated last year
- simple recon tool to help you for searching vulnerability on web server☆75Updated last month
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆64Updated 5 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆34Updated 2 years ago
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆64Updated 9 months ago
- Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)☆76Updated last year
- Useful Github Dorks for BugBounty -☆68Updated 3 years ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated last year
- Host Header Vulnerability Scanner Automated Tool☆27Updated 9 months ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆36Updated 2 years ago
- ☆27Updated 2 years ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆30Updated last year
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆45Updated 8 months ago
- I collected it to help the bug hunter get a reward☆57Updated 3 years ago
- A command-line utility designed to discover subdomains for a given domain in a simple, efficient way. It works by gathering information f…☆115Updated last month
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆33Updated last year
- 「🧱」Test a list of payloads and see if you can bypass it☆62Updated 3 years ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆35Updated 2 years ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Updated 5 months ago
- Bug Bounty Methodology-slides by Muhammad M. Awali. Pentesting and Researcher Talks.☆31Updated 2 years ago
- Xss payload for bypassing waf☆18Updated 5 years ago
- SQLi Hunter is a tool designed to find potential SQL injection vulnerabilities by fetching URLs from the Wayback Machine and checking for…☆14Updated 7 months ago
- Filter URLs to save your time.☆60Updated 3 years ago
- Python script implementing the favicon hash trick to find subdomains.☆38Updated 2 years ago
- bash script for automating subdomain enumeration process either passive or active☆29Updated last year
- A Collection of Wordlists for Penetration Testing☆32Updated last month
- URL Fuzzer☆20Updated last year
- ☆12Updated 11 months ago