DNS Rebinding Exploitation Framework
☆492Apr 27, 2021Updated 5 years ago
Alternatives and similar repositories for dref
Users that are interested in dref are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆500Oct 2, 2021Updated 4 years ago
- A DNS rebinding attack framework.☆1,286Apr 12, 2026Updated 2 weeks ago
- A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)☆660Dec 17, 2021Updated 4 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,489Oct 12, 2024Updated last year
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing in a comfortable way!☆104Jun 1, 2018Updated 7 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆472Nov 14, 2019Updated 6 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆660Feb 1, 2025Updated last year
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆584Sep 7, 2021Updated 4 years ago
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,191Oct 24, 2018Updated 7 years ago
- Probe a rendering engine for vulnerabilities and other features☆368Oct 13, 2021Updated 4 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆613Mar 4, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Automatic tool for DNS rebinding-based SSRF attacks☆305Aug 21, 2020Updated 5 years ago
- Payload Generation Framework☆1,977Aug 21, 2024Updated last year
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,795Apr 26, 2024Updated 2 years ago
- exploit for ImageMagick's uninitialized memory disclosure in gif coder☆284Jul 22, 2017Updated 8 years ago
- ☆210Jan 30, 2019Updated 7 years ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆265Nov 18, 2021Updated 4 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,125Feb 10, 2021Updated 5 years ago
- Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.☆891Feb 23, 2026Updated 2 months ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆944May 8, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,020Sep 11, 2017Updated 8 years ago
- a CLI for ephemeral penetration testing☆16Dec 10, 2019Updated 6 years ago
- DNS rebinding toolkit☆253May 22, 2023Updated 2 years ago
- A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques☆740May 4, 2019Updated 6 years ago
- A tool for embedding XXE/XML exploits into different filetypes☆1,154Dec 16, 2024Updated last year
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,148Apr 21, 2024Updated 2 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 3 years ago
- Smart ssrf scanner using different methods like parameter brute forcing in post and get...☆278Feb 11, 2021Updated 5 years ago
- Security Tool to Look For Interesting Files in S3 Buckets☆1,460Apr 10, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,289Aug 18, 2025Updated 8 months ago
- A tool to elevate privilege with Windows Tokens☆1,066Oct 6, 2023Updated 2 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- ☆2,323Dec 8, 2023Updated 2 years ago
- A script to enumerate virtual hosts on a server.☆692Dec 28, 2017Updated 8 years ago
- Toolkit to detect and keep track on Blind XSS, XXE & SSRF☆337Aug 23, 2019Updated 6 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,108Nov 3, 2017Updated 8 years ago