nullenc0de / CognitohunterLinks
A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter specializes in dissecting AWS Cognito implementations and performing advanced credential-to-session conversions.
☆21Updated 8 months ago
Alternatives and similar repositories for Cognitohunter
Users that are interested in Cognitohunter are comparing it to the libraries listed below
Sorting:
- ☆40Updated 3 months ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- Make better use of the embedded browser that comes by default with Burp☆45Updated last year
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆33Updated 6 months ago
- Bcheck scripts for Burp☆29Updated last year
- BurpSuite extension to convert requests into bcheck scripts☆33Updated 2 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆20Updated last year
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆55Updated 11 months ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last year
- ☆27Updated 2 years ago
- ☆57Updated last year
- ☆27Updated 2 years ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- ☆64Updated 2 years ago
- For unpacking base64:ed "Save items"-content from Burp (From search + proxy history)☆54Updated 7 months ago
- A collection of utilities for building extensions using Burp's Montoya API☆52Updated last year
- ☆95Updated 4 years ago
- Adobe Experience Manager (AEM) hacking toolkit☆50Updated this week
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Updated 10 months ago
- My talks...☆25Updated 7 months ago
- Stay within program scope☆37Updated 3 years ago
- Demo of various ways to exploit post based reflected XSS☆18Updated 2 years ago
- vīlicus is a bug bounty api dashboard☆41Updated 2 years ago
- Tool for helping in the exploitation of path traversal vulnerabilities in Java web applications☆32Updated 2 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆95Updated 2 years ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆79Updated last year
- Web cache poisoning vulnerability scanner.☆71Updated 3 years ago
- A set of open-source community scripts☆65Updated 11 months ago
- ☆31Updated last year
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆34Updated 3 years ago