A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter specializes in dissecting AWS Cognito implementations and performing advanced credential-to-session conversions.
☆21Jan 20, 2025Updated last year
Alternatives and similar repositories for Cognitohunter
Users that are interested in Cognitohunter are comparing it to the libraries listed below
Sorting:
- ☆25Mar 11, 2025Updated 11 months ago
- AI Substitutor is an extension for Burp Suite that uses AI functionality to substitute values of HTTP request parameters and headers.☆27Apr 30, 2025Updated 10 months ago
- Exploit script for the CFOR vulnerability using Github's GraphQL API☆23Aug 7, 2024Updated last year
- Repository aimed at helping to perform pentests on flutter applications☆18Jul 10, 2024Updated last year
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Feb 15, 2024Updated 2 years ago
- OSEP - Offsec Expert Professional☆21Jun 23, 2024Updated last year
- Shodan-Grabber is a Node.js tool for scraping IP addresses and other information from Shodan's web interface. It utilizes Puppeteer for w…☆17Nov 13, 2024Updated last year
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- Will share some interesting writeups here :)☆18Oct 18, 2023Updated 2 years ago
- Precompiled binaries for various projects☆12Nov 6, 2020Updated 5 years ago
- A tool for adding new lines to files, skipping duplicates and written in Rust!☆19May 8, 2025Updated 9 months ago
- Tool for finding URLs, paths, secrets and generating raw HTTP requests and OpenApi specifications from config files and annotations used …☆242Dec 9, 2025Updated 2 months ago
- ☆40Aug 2, 2024Updated last year
- ☆21Sep 12, 2025Updated 5 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- Windows Privilege Escalation☆23Jun 7, 2022Updated 3 years ago
- Archive Alchemist is a tool for creating specially crafted archives to test extraction vulnerabilities.☆227Jul 24, 2025Updated 7 months ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Sep 11, 2024Updated last year
- A tool which allows HackerOne researchers to download their reports into a local, indexed, and searchable repository☆19Sep 29, 2022Updated 3 years ago
- Tool to fuzz for interesting vhost.☆23Jan 8, 2025Updated last year
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 4 months ago
- Tool to scan servers and hosts using dynamic paths.☆21Oct 1, 2025Updated 5 months ago
- Simple XXE test suite generated specifically for SAML interfaces☆23May 18, 2018Updated 7 years ago
- Shellcode and In-PowerShell solution for patching AMSI via Page Guard Exceptions☆63Nov 15, 2025Updated 3 months ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Nov 30, 2018Updated 7 years ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆54Aug 12, 2025Updated 6 months ago
- tool that generates bypasses for open redirects☆51Apr 18, 2022Updated 3 years ago
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- TGC is the TCP Gender Changer☆21Jan 3, 2019Updated 7 years ago
- A collection of published exploits and proof-of-concept code.☆21Dec 19, 2017Updated 8 years ago
- List of periodically validated public DNS resolvers☆25Updated this week
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dll☆50Jun 16, 2025Updated 8 months ago
- Laravel PHP framework black-box vulnerability scanner☆37Sep 3, 2024Updated last year
- Python code to Serialize and Unserialize java binary serialization format.☆30Feb 27, 2026Updated last week
- Zone transfers for rwhois☆20Feb 27, 2019Updated 7 years ago
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆482Updated this week
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- Obfuscate UDP traffic as RTP☆25Sep 25, 2023Updated 2 years ago
- ☆24Jan 26, 2021Updated 5 years ago