A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)
☆657Dec 17, 2021Updated 4 years ago
Alternatives and similar repositories for whonow
Users that are interested in whonow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆499Oct 2, 2021Updated 4 years ago
- DNS Rebinding Exploitation Framework☆492Apr 27, 2021Updated 4 years ago
- A DNS rebinding attack framework.☆1,271Dec 4, 2025Updated 3 months ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆659Feb 1, 2025Updated last year
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,452Nov 20, 2025Updated 4 months ago
- Pop shells like a master.☆1,489Apr 2, 2019Updated 6 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Jun 19, 2018Updated 7 years ago
- A Tool for Domain Flyovers☆5,916May 22, 2022Updated 3 years ago
- Security Tool to Look For Interesting Files in S3 Buckets☆1,459Apr 10, 2024Updated last year
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,476Jan 9, 2025Updated last year
- Fast directory scanning and scraping tool☆632Feb 5, 2026Updated last month
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆471Nov 14, 2019Updated 6 years ago
- A simple SSRF-testing sheriff written in Go☆336Oct 31, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Nameserver DNS poisoning attacks made easy☆525Feb 26, 2017Updated 9 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.☆557Mar 6, 2023Updated 3 years ago
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,195Oct 24, 2018Updated 7 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,482Oct 12, 2024Updated last year
- HTA encryption tool for RedTeams☆1,422Nov 9, 2022Updated 3 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al …☆1,286Aug 18, 2025Updated 7 months ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- This tool can be used to brute discover GET and POST parameters☆1,396Aug 24, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆397Apr 17, 2020Updated 5 years ago
- A mini webserver with FTP support for XXE payloads☆341Jan 3, 2024Updated 2 years ago
- Automatic tool for DNS rebinding-based SSRF attacks☆304Aug 21, 2020Updated 5 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed b…☆1,028Feb 5, 2021Updated 5 years ago
- A python script that finds endpoints in JavaScript files☆4,309Apr 13, 2024Updated last year
- A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities.☆549Jun 12, 2017Updated 8 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Jun 20, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)☆3,555Jul 21, 2025Updated 8 months ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆612Mar 4, 2021Updated 5 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,125Feb 10, 2021Updated 5 years ago
- Hawkeye filesystem analysis tool☆242Jul 21, 2018Updated 7 years ago
- A tool for embedding XXE/XML exploits into different filetypes☆1,136Dec 16, 2024Updated last year
- TheftFuzzer is a tool that fuzzes Cross-Origin Resource Sharing implementations for common misconfigurations.☆318May 22, 2023Updated 2 years ago
- A tool to elevate privilege with Windows Tokens☆1,063Oct 6, 2023Updated 2 years ago