CloudJack Logo

CloudJack

0
Free
Visit Website

CloudJack assesses AWS accounts for subdomain hijacking vulnerabilities as a result of decoupled Route53 and CloudFront configurations. This vulnerability exists if a Route53 alias references 1) a deleted CloudFront web distribution or 2) an active CloudFront web distribution with deleted CNAME(s). Exploitation of this vulnerability results in the ability to spoof the victim's web site content, which otherwise would have been accessed through the victim's account.

FEATURES

ALTERNATIVES

A collection of real-world scenarios to evaluate command injection detection and exploitation abilities

Amass by OWASP performs comprehensive attack surface mapping and asset discovery.

A repository of open-source plugins for Rapid7 InsightConnect

An automated web application security scanner that evaluates JavaScript library vulnerabilities and HTTP security headers to assess website security posture.

A Powershell script for assessing the security configurations of Siemens - SIMATIC PCS 7 OS client, OS Server or Engineering station.

A hosted web application security testing tool that enables security researchers to register, activate their accounts, and scan web applications for vulnerabilities.

Automate the search for Exploits and Vulnerabilities in important databases.

A vulnerable web site for testing Sentinel features