brannondorsey / whonowView external linksLinks
A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)
☆659Dec 17, 2021Updated 4 years ago
Alternatives and similar repositories for whonow
Users that are interested in whonow are comparing it to the libraries listed below
Sorting:
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆501Oct 2, 2021Updated 4 years ago
- DNS Rebinding Exploitation Framework☆495Apr 27, 2021Updated 4 years ago
- A DNS rebinding attack framework.☆1,261Dec 4, 2025Updated 2 months ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆950May 8, 2019Updated 6 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆661Feb 1, 2025Updated last year
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,448Nov 20, 2025Updated 2 months ago
- Pop shells like a master.☆1,488Apr 2, 2019Updated 6 years ago
- Security Tool to Look For Interesting Files in S3 Buckets☆1,456Apr 10, 2024Updated last year
- Nameserver DNS poisoning attacks made easy☆525Feb 26, 2017Updated 8 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆470Nov 14, 2019Updated 6 years ago
- A simple SSRF-testing sheriff written in Go☆336Oct 31, 2024Updated last year
- A Tool for Domain Flyovers☆5,897May 22, 2022Updated 3 years ago
- Fast directory scanning and scraping tool☆630Feb 5, 2026Updated last week
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,194Oct 24, 2018Updated 7 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆398Apr 17, 2020Updated 5 years ago
- A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.☆558Mar 6, 2023Updated 2 years ago
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,484Oct 12, 2024Updated last year
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆634Jun 20, 2017Updated 8 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,468Jan 9, 2025Updated last year
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,283Aug 18, 2025Updated 5 months ago
- This tool can be used to brute discover GET and POST parameters☆1,390Aug 24, 2019Updated 6 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Jun 19, 2018Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,128Feb 10, 2021Updated 5 years ago
- A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities.☆550Jun 12, 2017Updated 8 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,605Oct 4, 2024Updated last year
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆823Nov 15, 2025Updated 3 months ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,818Nov 19, 2024Updated last year
- A code demonstrating CVE-2018-0886☆269Aug 14, 2020Updated 5 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆613Mar 4, 2021Updated 4 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,067Apr 26, 2020Updated 5 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Apr 22, 2018Updated 7 years ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆584Sep 7, 2021Updated 4 years ago
- Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed b…☆1,028Feb 5, 2021Updated 5 years ago