falcnix / Vulnerable-Cognito-application-Links
A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.
☆12Updated 2 years ago
Alternatives and similar repositories for Vulnerable-Cognito-application-
Users that are interested in Vulnerable-Cognito-application- are comparing it to the libraries listed below
Sorting:
- Enhanced 403 bypass header☆21Updated 2 years ago
- Application for showcasing Android Deep Link and WebView Vulnerabilities☆15Updated 2 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆23Updated 10 months ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
- Programs I Made while learning python for pentesters.☆18Updated 2 years ago
- A collection of one off hacks and simple scripts☆28Updated 2 years ago
- A python3 script searching for secret on swaggerhub☆65Updated 3 years ago
- Advanced test for proxy & waf☆13Updated 9 months ago
- Find CVEs that don't have a Detectify modules.☆22Updated 2 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Updated 2 months ago
- Automate bug bounty recon using bash alias☆14Updated 10 months ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- ☆27Updated 2 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- security.txt collection of most popular world-wide domains☆54Updated last year
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Updated 3 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Updated 3 years ago
- ☆22Updated 3 years ago
- A Burp Extension that makes it easier to view all script code on a Response.☆16Updated last year
- Manage attack surface data on Elasticsearch☆22Updated last year
- Tools used for Pentesting☆22Updated 2 years ago
- List of bug bounty programs of companies/organisations in Switzerland☆13Updated 3 years ago
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆16Updated 2 years ago
- vīlicus is a bug bounty api dashboard☆41Updated last year
- Make exploiting race conditions in web applications highly efficient and ease-of-use.☆23Updated last week
- Creating a Database for Mass Recon☆12Updated 4 years ago
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆33Updated last year
- Automated HTTP Request Repeating With Burp Suite☆38Updated 2 years ago