CloudJack Logo

CloudJack

0
Free
Updated 11 March 2025
Visit Website

CloudJack assesses AWS accounts for subdomain hijacking vulnerabilities as a result of decoupled Route53 and CloudFront configurations. This vulnerability exists if a Route53 alias references 1) a deleted CloudFront web distribution or 2) an active CloudFront web distribution with deleted CNAME(s). Exploitation of this vulnerability results in the ability to spoof the victim's web site content, which otherwise would have been accessed through the victim's account.

FEATURES

SIMILAR TOOLS

Scans Alpine base images for vulnerabilities using Multi Stage builds in Docker 17.05

A list of vulnerable applications for testing and learning

Python-based extension for integrating a Yara scanner into Burp Suite for on-demand website scans based on custom rules.

Automate software supply chain security by blocking malicious open source components

A tool for static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers

Dnscan is a DNS reconnaissance tool that performs DNS scans, DNS cache snooping, and DNS amplification attack detection.

A comprehensive open dictionary of fault injection patterns and predictable resource locations for dynamic application security testing

A tool to run YARA rules against node_module folders to identify suspicious scripts

An extensible, heuristic-based vulnerability scanning tool for installed npm packages.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved