A python based minimal DNS server to test/verify DNS rebinding attacks
☆73May 15, 2023Updated 2 years ago
Alternatives and similar repositories for DNSrebinder
Users that are interested in DNSrebinder are comparing it to the libraries listed below
Sorting:
- A tool collection of various attacks on TLS based on TLS-Attacker☆21Jun 25, 2025Updated 8 months ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆62Nov 16, 2022Updated 3 years ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆144Oct 27, 2019Updated 6 years ago
- ☆18Sep 22, 2024Updated last year
- Yet another Werkzeug Console Pin Exploit Explanation☆23Jul 30, 2021Updated 4 years ago
- Default Linux files/images location☆28Jan 12, 2021Updated 5 years ago
- ☆98Jul 23, 2025Updated 7 months ago
- CVE-2022-39227 : Proof of Concept☆22Mar 19, 2024Updated last year
- This has all of my resources advised in my youtube channel for the TMUA exam☆20Jan 7, 2025Updated last year
- A Security Tool for Enumerating WebSockets☆366Jan 10, 2022Updated 4 years ago
- Simple DNS Rebinding Service☆729Jan 16, 2020Updated 6 years ago
- ☆27Dec 20, 2022Updated 3 years ago
- BurpSuite Standard/Private Collaborator Library☆25Oct 11, 2021Updated 4 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆130Aug 20, 2018Updated 7 years ago
- ☆124Dec 6, 2023Updated 2 years ago
- Privilege escalation in Docker☆31Jun 30, 2022Updated 3 years ago
- A DNS rebinding attack framework.☆1,266Dec 4, 2025Updated 3 months ago
- This script will bruteforce the credential of tomcat manager or host-manager☆32Jun 24, 2020Updated 5 years ago
- A wordlist repository with human-curated and reviewed content.☆125Oct 24, 2023Updated 2 years ago
- Enumerate AWS permissions and resources.☆71Jun 23, 2022Updated 3 years ago
- CVE-2009-2698 compiled for CentOS 4.8☆28Feb 16, 2018Updated 8 years ago
- Installation tools for CircleCI Server - Static☆10Jan 14, 2023Updated 3 years ago
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 9 months ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆1,153Jan 21, 2026Updated last month
- ☆105Feb 11, 2026Updated 3 weeks ago
- Deriving RSA public keys from message-signature pairs☆376Jan 30, 2026Updated last month
- This shell script fix VMWare 17.x "cannot open /dev/vmmon" error in Ubuntu 21.10 and Ubuntu 22.04☆11Feb 5, 2023Updated 3 years ago
- we are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-…☆13Dec 17, 2021Updated 4 years ago
- Auto-deploy to GitHub using WP2Static☆11May 18, 2019Updated 6 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- jws2pubkey tool☆43Jun 27, 2025Updated 8 months ago
- ☆12Jul 4, 2024Updated last year
- Cloud-Z gathers performance related information and benchmarks on cloud instances with support for multiple cloud providers.☆15Feb 18, 2023Updated 3 years ago
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 3 years ago
- ☆10Mar 1, 2026Updated last week
- ☆12Sep 15, 2025Updated 5 months ago
- Resources for the Kubernetes Fundamentals course.☆13Jan 14, 2025Updated last year
- Code samples of querying the API services of Whois XML Api.☆12Dec 14, 2023Updated 2 years ago
- A page with resources, and problem editorials, relating to Cyprus Olympiad in Informatics☆10Feb 16, 2026Updated 3 weeks ago