A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.
☆12Jul 13, 2022Updated 3 years ago
Alternatives and similar repositories for Vulnerable-Cognito-application-
Users that are interested in Vulnerable-Cognito-application- are comparing it to the libraries listed below
Sorting:
- Filter URLs that match your scope file for bugbounty.☆11May 23, 2023Updated 2 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆19Nov 13, 2025Updated 3 months ago
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 3 years ago
- The optional MailPlugin used in ScarletCloud for MacOS☆11Jan 3, 2023Updated 3 years ago
- Bcheck scripts for Burp☆28Aug 7, 2024Updated last year
- Python library for video editing, presentation video generation, motion graphics, shader art coding, and other video production tasks☆17Sep 17, 2024Updated last year
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- The Veteran-focused integration process(VIP) is a Lean-Agile framework services the interest of Veterans through the efficient streamlini…☆13Jun 4, 2023Updated 2 years ago
- ☆16Feb 28, 2026Updated last week
- ☆15Mar 21, 2025Updated 11 months ago
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- Public Disclosed Bug Bounty Reports formated in markdown☆76May 31, 2025Updated 9 months ago
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 9 months ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- ☆10Feb 28, 2023Updated 3 years ago
- These are the official datasets used on the Medicare.gov Hospital Compare Website provided by the Centers for Medicare & Medicaid Service…☆10Mar 12, 2018Updated 7 years ago
- TradeGPT is a full-stack cryptocurrency trading application that combines a modern Fresh (Deno) frontend with a Python (FastAPI) backend …☆15Mar 1, 2025Updated last year
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 3 months ago
- The Ultimate Recon Framework☆11Mar 29, 2024Updated last year
- offensive notes & resources☆43Apr 7, 2025Updated 11 months ago
- Penetration Testing Interview Questions☆53Apr 15, 2022Updated 3 years ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆96Dec 29, 2025Updated 2 months ago
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Oct 14, 2021Updated 4 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- ☆11Jun 9, 2020Updated 5 years ago
- Artificial Intelligence, Machine learning and Deep Learning Resources. 🚀 FREE AI/ML/DL Resources - 🎓 Courses, 📝 Blogs, 🔬 Research, an…☆11Aug 2, 2022Updated 3 years ago
- simple tool for finding javascript files from webapps☆10Apr 20, 2023Updated 2 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- A conspiratorial typeface.☆10Nov 7, 2020Updated 5 years ago
- Marlin Simulator UI☆15Feb 19, 2026Updated 2 weeks ago
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago