Skip to content
#

idor-attack

Here are 13 public repositories matching this topic...

✅ Experience the power of an automated Insecure Direct Object Reference (IDOR) vulnerability detection tool. Safeguard your applications with cutting-edge technology that identifies potential security weaknesses in an efficient and streamlined manner.

  • Updated Mar 9, 2025
  • Python

This repository details an IDOR vulnerability in AbsysNet 2.3.1, which allows a remote attacker to brute-force session IDs via the /cgi-bin/ocap/ endpoint. Successful exploitation can compromise active user sessions, exposing authentication tokens in HTML. The attack is limited to active sessions and is terminated if the user logs out.

  • Updated Nov 24, 2024
  • Python

This repository contains a basic penetration testing report focusing on ethical hacking techniques and methodologies. It includes findings, analysis, and recommendations to improve the security posture of the tested system.

  • Updated Mar 13, 2025

Immerse yourself in a practical hacking exercise to gain valuable experience with prevalent security exploits. Explore six key vulnerabilities, including SQL injection, session hijacking, username enumeration, IDOR, XSS, and CSRF, for a comprehensive cybersecurity learning experience.

  • Updated Mar 14, 2023
  • HTML

Basic Penetration Testing Report for Ethical Hacking covering key findings and recommendations for improving cybersecurity defenses. Detailed analysis of vulnerabilities identified during the testing process and steps to enhance overall security posture.

  • Updated Mar 13, 2025

Improve this page

Add a description, image, and links to the idor-attack topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the idor-attack topic, visit your repo's landing page and select "manage topics."

Learn more