A front-end JavaScript toolkit for creating DNS rebinding attacks.
☆45Jun 19, 2018Updated 7 years ago
Alternatives and similar repositories for dns-rebind-toolkit
Users that are interested in dns-rebind-toolkit are comparing it to the libraries listed below
Sorting:
- Parse X509 certificates to get the (sub)domains in it.☆28Jun 14, 2018Updated 7 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- A Java serializer in JavaScript☆80May 21, 2018Updated 7 years ago
- Repo for proof of concept exploits and tools.☆56Oct 15, 2020Updated 5 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆95Dec 23, 2020Updated 5 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Jan 1, 2021Updated 5 years ago
- ☆15May 23, 2019Updated 6 years ago
- Smb Scanner from PingCastle☆125Apr 9, 2019Updated 6 years ago
- Hacking Artifactory with server side template injection☆51Mar 12, 2020Updated 6 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Sep 4, 2018Updated 7 years ago
- ☆51Sep 7, 2017Updated 8 years ago
- Revisiting Helpviewer.app to hack Parallels for Mac☆17Sep 14, 2019Updated 6 years ago
- vulnerable single sign on☆149Aug 1, 2024Updated last year
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)☆657Dec 17, 2021Updated 4 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Spring messaging STOMP protocol RCE☆113Apr 12, 2018Updated 7 years ago
- A code demonstrating CVE-2018-0886☆269Aug 14, 2020Updated 5 years ago
- Scan for open S3 buckets and dump☆38Feb 23, 2018Updated 8 years ago
- 在目标主机上执行php、asp、aspx 插件☆23Feb 1, 2019Updated 7 years ago
- A PowerShell example of the Windows zero day priv esc☆328Sep 12, 2018Updated 7 years ago
- PowerShell module for Mimikatz☆215Dec 28, 2019Updated 6 years ago
- Kurukshetra - A framework for teaching secure coding by means of interactive problem solving.☆140Sep 23, 2024Updated last year
- ☆16Aug 31, 2018Updated 7 years ago
- Enumerate RIDs using pure Python☆32Jan 5, 2026Updated 2 months ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Jan 28, 2021Updated 5 years ago
- A CLI tool for querying passive DNS services☆42Dec 15, 2023Updated 2 years ago
- CVE-2020-5410 Spring Cloud Config directory traversal vulnerability☆31Jun 16, 2020Updated 5 years ago
- ☆34May 4, 2022Updated 3 years ago
- Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.☆143Jul 2, 2018Updated 7 years ago
- Platform Firmware Auditing Tool☆131Sep 7, 2018Updated 7 years ago
- ffmpeg exploitation tool☆28Aug 3, 2016Updated 9 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆323Feb 7, 2018Updated 8 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆49Apr 9, 2019Updated 6 years ago
- Challenge Sources & Exploits for the 34C3 CTF☆115Jan 5, 2018Updated 8 years ago
- unix SSH post-exploitation 1337 tool☆141Dec 16, 2018Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- DNS Rebinding Exploitation Framework☆492Apr 27, 2021Updated 4 years ago