falcnix / Vulnerable-Cognito-application-Links
A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.
☆12Updated 3 years ago
Alternatives and similar repositories for Vulnerable-Cognito-application-
Users that are interested in Vulnerable-Cognito-application- are comparing it to the libraries listed below
Sorting:
- Some simple scripts that I use during bug bounty hunting in Android Apps☆28Updated 11 months ago
- This repo offers comprehensive information, necessary tools, and instructional videos for beginners in Android penetration testing, provi…☆22Updated 2 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆21Updated 3 years ago
- Enhanced 403 bypass header☆21Updated 3 years ago
- Programs I Made while learning python for pentesters.☆20Updated 3 years ago
- Find CVEs that don't have a Detectify modules.☆22Updated 2 years ago
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Updated 3 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 4 months ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Updated 3 years ago
- A solid recon tool I use personally.☆30Updated 2 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- A set of Gitlab pipelines and Github workflows to automate and ease on BugBounty and Penetration Testing engagements☆28Updated 3 years ago
- ☆13Updated 2 years ago
- Simple recon tool automates your recon process☆16Updated 2 years ago
- ☆21Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Script for Reconnaissance(Bug Bounty)☆18Updated 3 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Updated last year
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15Updated 7 months ago
- I collected it to help the bug hunter get a reward☆57Updated 3 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- security.txt collection of most popular world-wide domains☆54Updated 2 years ago
- Tools and Scripts used in CRTP☆12Updated 5 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Updated 4 years ago
- ☆27Updated 2 years ago
- HTTP requests of FrontPage expolit☆26Updated 12 years ago