A tool that detects unauthorized access vulnerabilities through passive proxies, leveraging mainstream AI systems such as Kimi, DeepSeek, GPT, and others.
-
Updated
Dec 18, 2025 - Go
A tool that detects unauthorized access vulnerabilities through passive proxies, leveraging mainstream AI systems such as Kimi, DeepSeek, GPT, and others.
Advisory for CVE-2020-28054 & stack based buffer overflow in IBM Tivoli Storage Manager
PoC for CVE-2024-39924
🎓 Complete IDOR (Insecure Direct Object Reference) Guide: Beginner → Advanced
An intentionally vulnerable PHP web application designed for ethical hacking and cybersecurity training. Learn to exploit and secure vulnerabilities like SQL Injection, Authentication Bypass, and more in a controlled environment.
Add a description, image, and links to the authorization-bypass topic page so that developers can more easily learn about it.
To associate your repository with the authorization-bypass topic, visit your repo's landing page and select "manage topics."