nccgroup / singularityLinks
A DNS rebinding attack framework.
☆1,114Updated 2 weeks ago
Alternatives and similar repositories for singularity
Users that are interested in singularity are comparing it to the libraries listed below
Sorting:
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,008Updated 4 years ago
- ☆998Updated last week
- Simple DNS Rebinding Service☆663Updated 5 years ago
- ☆692Updated 6 months ago
- Finds unknown classes of injection vulnerabilities☆687Updated last month
- Subdomain Takeover tool written in Go☆1,979Updated last year
- A tool for embedding XXE/XML exploits into different filetypes☆1,088Updated 6 months ago
- ☆1,338Updated 2 months ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,418Updated 5 months ago
- Convolutional neural network for analyzing pentest screenshots☆1,217Updated last year
- A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP) of different websites.☆714Updated last year
- DotDotPwn - The Directory Traversal Fuzzer☆1,061Updated 2 years ago
- pwning IPv4 via IPv6☆1,807Updated last year
- The XSS Hunter service - a portable version of XSSHunter.com☆1,528Updated 2 years ago
- This repository contains all the supplement material for the book "The art of sub-domain enumeration"☆649Updated 6 years ago
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆733Updated 3 years ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆554Updated 2 years ago
- Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.☆1,255Updated 2 months ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆716Updated 6 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,411Updated 8 months ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,739Updated last year
- A Powerful Subdomain Takeover Tool☆953Updated last year
- A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)☆650Updated 3 years ago
- Notes about attacking Jenkins servers☆2,062Updated 11 months ago
- Advanced Burp Suite Logging Extension☆667Updated last year
- Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease appli…☆1,066Updated 3 months ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,241Updated last year
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,536Updated last year
- Content discovery wordlists generated using BigQuery☆570Updated 5 years ago
- Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed b…☆1,009Updated 4 years ago