DNS Rebind Toolkit Logo

DNS Rebind Toolkit

0
Free
Visit Website

A front-end JavaScript toolkit for creating DNS rebinding attacks. This toolkit provides a set of tools and utilities for creating and testing DNS rebinding attacks. Features: * DNS rebinding attack creation and testing * DNS query and response analysis * DNS server simulation This toolkit is designed to help security researchers and penetration testers create and test DNS rebinding attacks. Note: This toolkit is for educational and research purposes only. Please do not use this toolkit for malicious purposes.

FEATURES

ALTERNATIVES

Utilizes dirtyc0w kernel exploit for privilege escalation in a Docker container.

Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.

A standalone man-in-the-middle attack framework used for phishing login credentials and bypassing 2-factor authentication.

Modular framework for pentesting Modbus protocol with diagnostic and offensive features.

Comprehensive tutorial on modern exploitation techniques with a focus on understanding exploitation from scratch.

OWASP OWTF is a penetration testing framework focused on efficiency and alignment with security standards.

A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.

Hidden parameters discovery suite

PINNED