A front-end JavaScript toolkit for creating DNS rebinding attacks.
☆45Jun 19, 2018Updated 7 years ago
Alternatives and similar repositories for dns-rebind-toolkit
Users that are interested in dns-rebind-toolkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Parse X509 certificates to get the (sub)domains in it.☆28Jun 14, 2018Updated 7 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- A Java serializer in JavaScript☆81May 21, 2018Updated 7 years ago
- Repo for proof of concept exploits and tools.☆56Oct 15, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Very crude and poorly written HTTP(s) and SMTP bin☆95Dec 23, 2020Updated 5 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Jan 1, 2021Updated 5 years ago
- ☆15May 23, 2019Updated 6 years ago
- Smb Scanner from PingCastle☆125Apr 9, 2019Updated 7 years ago
- Hacking Artifactory with server side template injection☆51Mar 12, 2020Updated 6 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Sep 4, 2018Updated 7 years ago
- ☆51Sep 7, 2017Updated 8 years ago
- Revisiting Helpviewer.app to hack Parallels for Mac☆17Sep 14, 2019Updated 6 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- vulnerable single sign on☆150Aug 1, 2024Updated last year
- A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)☆660Dec 17, 2021Updated 4 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆90May 8, 2018Updated 7 years ago
- Spring messaging STOMP protocol RCE☆113Apr 12, 2018Updated 8 years ago
- A code demonstrating CVE-2018-0886☆269Aug 14, 2020Updated 5 years ago
- Scan for open S3 buckets and dump☆38Feb 23, 2018Updated 8 years ago
- 在目标主机上执行php、asp、aspx 插件☆23Feb 1, 2019Updated 7 years ago
- A PowerShell example of the Windows zero day priv esc☆327Sep 12, 2018Updated 7 years ago
- Kurukshetra - A framework for teaching secure coding by means of interactive problem solving.☆140Sep 23, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PowerShell module for Mimikatz☆215Dec 28, 2019Updated 6 years ago
- ☆16Aug 31, 2018Updated 7 years ago
- Enumerate RIDs using pure Python☆32Jan 5, 2026Updated 3 months ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Jan 28, 2021Updated 5 years ago
- A CLI tool for querying passive DNS services☆43Dec 15, 2023Updated 2 years ago
- CVE-2020-5410 Spring Cloud Config directory traversal vulnerability☆31Jun 16, 2020Updated 5 years ago
- Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.☆142Jul 2, 2018Updated 7 years ago
- ☆34May 4, 2022Updated 3 years ago
- Platform Firmware Auditing Tool☆132Sep 7, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ffmpeg exploitation tool☆28Aug 3, 2016Updated 9 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆324Feb 7, 2018Updated 8 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆49Apr 9, 2019Updated 7 years ago
- Challenge Sources & Exploits for the 34C3 CTF☆115Jan 5, 2018Updated 8 years ago
- unix SSH post-exploitation 1337 tool☆141Dec 16, 2018Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- DNS Rebinding Exploitation Framework☆492Apr 27, 2021Updated 5 years ago