A DNS rebinding attack framework.
☆1,274Dec 4, 2025Updated 4 months ago
Alternatives and similar repositories for singularity
Users that are interested in singularity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DNS Rebinding Exploitation Framework☆492Apr 27, 2021Updated 4 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆499Oct 2, 2021Updated 4 years ago
- A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)☆660Dec 17, 2021Updated 4 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,486Oct 12, 2024Updated last year
- ☆705Nov 27, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Prototype Pollution and useful Script Gadgets☆1,606Jan 27, 2024Updated 2 years ago
- Client Side Prototype Pollution Scanner☆525Sep 17, 2022Updated 3 years ago
- DNS rebinding toolkit☆253May 22, 2023Updated 2 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆612Mar 4, 2021Updated 5 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆963Dec 31, 2021Updated 4 years ago
- Deserialization payload generator for a variety of .NET formatters☆3,700Dec 23, 2024Updated last year
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆2,067Jan 2, 2024Updated 2 years ago
- Automatic SSRF fuzzer and exploitation tool☆3,519Sep 4, 2025Updated 7 months ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆583Sep 7, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.☆3,784Sep 29, 2025Updated 6 months ago
- Simple DNS Rebinding Service☆735Jan 16, 2020Updated 6 years ago
- Automatic tool for DNS rebinding-based SSRF attacks☆305Aug 21, 2020Updated 5 years ago
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,341Apr 18, 2023Updated 2 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,135Apr 21, 2024Updated last year
- The cheat sheet about Java Deserialization vulnerabilities☆3,173May 26, 2023Updated 2 years ago
- InQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable…☆1,758Feb 16, 2026Updated last month
- List DTDs and generate XXE payloads using those local DTDs.☆655Feb 21, 2024Updated 2 years ago
- A Tool for Domain Flyovers☆5,921May 22, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆661Feb 1, 2025Updated last year
- Reverse proxies cheatsheet☆1,857Nov 4, 2023Updated 2 years ago
- ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.☆2,259Jan 8, 2026Updated 3 months ago
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆6,476May 1, 2025Updated 11 months ago
- HTTP parameter discovery suite.☆6,184Feb 20, 2025Updated last year
- Convolutional neural network for analyzing pentest screenshots☆1,281Mar 8, 2026Updated last month
- ☆1,197Jan 21, 2026Updated 2 months ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,618Feb 8, 2025Updated last year
- ☆563Mar 27, 2025Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A collection of browser-based side channel attack vectors.☆759Mar 19, 2024Updated 2 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆447Sep 7, 2022Updated 3 years ago
- ☆696Jul 4, 2022Updated 3 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,479Jan 9, 2025Updated last year
- A python script that finds endpoints in JavaScript files☆4,322Apr 13, 2024Updated last year
- DNS Takeover tool written in Go☆2,044Mar 16, 2026Updated 3 weeks ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,837Dec 4, 2025Updated 4 months ago