falcnix / Vulnerable-Cognito-application-Links
A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.
☆12Updated 3 years ago
Alternatives and similar repositories for Vulnerable-Cognito-application-
Users that are interested in Vulnerable-Cognito-application- are comparing it to the libraries listed below
Sorting:
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year
- Some simple scripts that I use during bug bounty hunting in Android Apps☆28Updated 10 months ago
- Programs I Made while learning python for pentesters.☆20Updated 3 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15Updated 7 months ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
- Find CVEs that don't have a Detectify modules.☆22Updated 2 years ago
- Automate bug bounty recon using bash alias☆15Updated last year
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Updated 3 years ago
- This repo offers comprehensive information, necessary tools, and instructional videos for beginners in Android penetration testing, provi…☆22Updated 2 years ago
- ☆13Updated 2 years ago
- Enhanced 403 bypass header☆21Updated 3 years ago
- This script identifies Host Header Injection vulnerabilities in a list of URLs or a specific domain, outputting the vulnerable locations …☆15Updated 2 years ago
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Updated 3 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- King of Bug Bounty Tips Simple Tool☆13Updated 4 years ago
- Automated tool for domains & Subdomains Gathering☆14Updated last year
- ☆18Updated 2 weeks ago
- Sample Vulnerable and Secure Code Snippets for Various Vulnerabilities☆21Updated last year
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆17Updated 2 years ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Updated 3 years ago
- Automated HTTP Request Repeating With Burp Suite☆40Updated 2 years ago
- A solid recon tool I use personally.☆30Updated 2 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Updated 5 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- Simple recon tool automates your recon process☆16Updated 2 years ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆26Updated 2 years ago
- Manage attack surface data on Elasticsearch☆23Updated 2 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆23Updated 4 months ago
- bash script for automating subdomain enumeration process either passive or active☆29Updated last year