@@ -98,6 +98,9 @@ python IDOR-Forge.py -u "https://example.com/api/resource?id=1" -p -m GET --prox
98
98
```
99
99
python IDOR-Forge.py -u http://example.com/resource?id=1 -p -m GET --output results.csv --output-format csv --test-values [100,200,300] --sensitive-keywords ["password", "email"]
100
100
```
101
+ ```
102
+ python IDOR-Forge.py -u http://example.com/api/user?id=1 --parameters -m GET -d 2 -o results.json --output-format json --headers '{"Authorization": "Bearer token"}' --test-values '[1, 2, 3]' --sensitive-keywords '["password", "email"]' -v -Rv
103
+ ```
101
104
Options
102
105
- -u, --url: Target URL to test for IDOR vulnerabilities.
103
106
@@ -122,6 +125,8 @@ Options
122
125
- --sensitive-keywords: Custom sensitive keywords in JSON format (e.g., '[ "password", "email"] ').
123
126
124
127
- --interactive: Launch interactive GUI mode.
128
+
129
+ - -Rv, --report-and-visualize: Enable reporting and visualization
125
130
126
131
## Interactive GUI Mode
127
132
```
@@ -201,13 +206,28 @@ Vulnerable Payloads:
201
206
- {'id': 1, 'random_str': 'aBcDeFgHiJ'}
202
207
- {'id': 3, 'sql_injection': "' OR '1'='1"}
203
208
```
204
-
209
+ Table:
210
+ ```
211
+ +-------------------+-------------+---------------------------+
212
+ | Payload | Status Code | Sensitive Data Detected |
213
+ +-------------------+-------------+---------------------------+
214
+ | {'id': '1'} | 200 | True |
215
+ | {'id': '2'} | 404 | False |
216
+ | {'id': '3'} | 200 | False |
217
+ +-------------------+-------------+---------------------------+
218
+ ```
205
219
File Output (results.csv):
206
220
```
207
221
Payload,Status Code,Response Content,Sensitive Data Detected
208
222
"{'id': 1}",200,"{"data": "sensitive_data"}",True
209
223
"{'id': 2, 'random_str': 'aBcDeFgHiJ'}",403,"{"error": "Forbidden"}",False
210
224
```
225
+
226
+ Pie Chart :
227
+
228
+ ![ Screen Shot] ( ./IMG/visualization.png )
229
+
230
+
211
231
## Contributing 🤝
212
232
213
233
Contributions are welcome! Please follow these steps:
0 commit comments