Pentesting Live Targets
-
Updated
Apr 19, 2018 - HTML
Pentesting Live Targets
Hospital's Patient Records Management System v1.0 - 'id' Insecure direct object references (IDOR) leads to Account TakeOver
solutions of hack-yourself-first
Capture the Flag (CTF) is a cybersecurity competition that is used as a test of security skills.
An easy ctf - Authentication Bypassing using IDOR vulnerability
Writeups for portswigger labs.
This repository is designed for IDOR vulnerabilities in a web application.
A sensible no bullshit repo of summaries of reports on hackerone, bugcrowd and alike, that makes straight up sense and make it easy to repeat and automate. This is supposed to serve as my personal reference, but should be a good public index reference for like minded.
✅ Experience the power of an automated Insecure Direct Object Reference (IDOR) vulnerability detection tool. Safeguard your applications with cutting-edge technology that identifies potential security weaknesses in an efficient and streamlined manner.
HTTPeeper is a quick way to perform HTTP requests using GET, POST, PUT, DELETE, PATCH, and OPTIONS to a specified URL. HTTPeeper is tool to investigate web interactions across different HTTP methods.
Proactive, Open source API security → API discovery, Testing in CI/CD, Test Library with 150+ Tests, Add custom tests, Sensitive data exposure
Add a description, image, and links to the idor topic page so that developers can more easily learn about it.
To associate your repository with the idor topic, visit your repo's landing page and select "manage topics."