falcnix / Vulnerable-Cognito-application-Links
A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.
☆12Updated 3 years ago
Alternatives and similar repositories for Vulnerable-Cognito-application-
Users that are interested in Vulnerable-Cognito-application- are comparing it to the libraries listed below
Sorting:
- A collection of one off hacks and simple scripts☆28Updated 2 years ago
 - Programs I Made while learning python for pentesters.☆19Updated 3 years ago
 - Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year
 - Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
 - Some simple scripts that I use during bug bounty hunting in Android Apps☆28Updated 9 months ago
 - gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Updated 3 years ago
 - This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Updated 5 years ago
 - A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Updated 3 years ago
 - Find CVEs that don't have a Detectify modules.☆22Updated 2 years ago
 - Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
 - Automated HTTP Request Repeating With Burp Suite☆40Updated 2 years ago
 - Burp Suite extension that makes your life easier by tucking the headers out of the way, so you can see the body content right away withou…☆39Updated 2 years ago
 - WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Updated 3 years ago
 - A simple tool which makes creating nuclei templates even easier.☆36Updated last year
 - This repo offers comprehensive information, necessary tools, and instructional videos for beginners in Android penetration testing, provi…☆21Updated 2 years ago
 - HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
 - ☆16Updated last year
 - ☆13Updated 2 years ago
 - Automate bug bounty recon using bash alias☆15Updated last year
 - My fuzz repo!☆22Updated 2 years ago
 - ☆18Updated 3 months ago
 - ☆20Updated 4 years ago
 - your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
 - Make exploiting race conditions in web applications highly efficient and ease-of-use.☆25Updated 4 months ago
 - Tool for fetching all the available waybackmachine snapshot urls☆24Updated last year
 - An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated 2 years ago
 - Simple recon tool automates your recon process☆17Updated 2 years ago
 - Filter URLs to save your time.☆60Updated 3 years ago
 - Simple tools to handle string and generate subdomain permutations☆15Updated 3 years ago
 - S3 bucket enumerator☆30Updated 6 years ago