A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)
☆660Dec 17, 2021Updated 4 years ago
Alternatives and similar repositories for whonow
Users that are interested in whonow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆500Oct 2, 2021Updated 4 years ago
- DNS Rebinding Exploitation Framework☆492Apr 27, 2021Updated 5 years ago
- A DNS rebinding attack framework.☆1,287Apr 26, 2026Updated last week
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆660Feb 1, 2025Updated last year
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆945May 8, 2019Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,454Nov 20, 2025Updated 5 months ago
- Pop shells like a master.☆1,486Apr 2, 2019Updated 7 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Jun 19, 2018Updated 7 years ago
- A Tool for Domain Flyovers☆5,930May 22, 2022Updated 3 years ago
- Security Tool to Look For Interesting Files in S3 Buckets☆1,460Apr 10, 2024Updated 2 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,488Jan 9, 2025Updated last year
- Fast directory scanning and scraping tool☆633Apr 14, 2026Updated 3 weeks ago
- A simple SSRF-testing sheriff written in Go☆338Oct 31, 2024Updated last year
- Nameserver DNS poisoning attacks made easy☆526Feb 26, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.☆556Mar 6, 2023Updated 3 years ago
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,191Oct 24, 2018Updated 7 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,493Oct 12, 2024Updated last year
- HTA encryption tool for RedTeams☆1,426Nov 9, 2022Updated 3 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,292Aug 18, 2025Updated 8 months ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- This tool can be used to brute discover GET and POST parameters☆1,394Aug 24, 2019Updated 6 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆397Apr 17, 2020Updated 6 years ago
- A mini webserver with FTP support for XXE payloads☆342Jan 3, 2024Updated 2 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Automatic tool for DNS rebinding-based SSRF attacks☆305Aug 21, 2020Updated 5 years ago
- Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed b…☆1,031Feb 5, 2021Updated 5 years ago
- A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities.☆549Jun 12, 2017Updated 8 years ago
- A python script that finds endpoints in JavaScript files☆4,335Apr 13, 2024Updated 2 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Jun 20, 2017Updated 8 years ago
- A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)☆3,581Apr 15, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆615Mar 4, 2021Updated 5 years ago
- Hawkeye filesystem analysis tool☆242Jul 21, 2018Updated 7 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,124Feb 10, 2021Updated 5 years ago
- A tool to elevate privilege with Windows Tokens☆1,066Oct 6, 2023Updated 2 years ago
- TheftFuzzer is a tool that fuzzes Cross-Origin Resource Sharing implementations for common misconfigurations.☆319May 22, 2023Updated 2 years ago
- Find interesting Amazon S3 Buckets by watching certificate transparency logs.☆1,803Feb 28, 2025Updated last year
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,832Nov 19, 2024Updated last year