A front-end JavaScript toolkit for creating DNS rebinding attacks. This toolkit provides a set of tools and utilities for creating and testing DNS rebinding attacks. Features: * DNS rebinding attack creation and testing * DNS query and response analysis * DNS server simulation This toolkit is designed to help security researchers and penetration testers create and test DNS rebinding attacks. Note: This toolkit is for educational and research purposes only. Please do not use this toolkit for malicious purposes.
FEATURES
ALTERNATIVES
Open source penetration testing tool for detecting and exploiting command injection vulnerabilities.
A collection of Microsoft PowerShell modules for penetration testing purposes.
Back-end component for red team operations with crucial design considerations.
Very vulnerable ARM/ARM64[AARCH64] application with various levels of vulnerabilities for exploitation training.
Inceptor is a template-driven framework for evading Anti-Virus and Endpoint Detection and Response solutions, allowing users to create custom evasion techniques and test their security controls.
RedWarden is a Cobalt Strike C2 Reverse proxy that evades detection by Blue Teams, AVs, EDRs, and scanners through packet inspection and malleable profile correlation.
Weaponize Word documents with PowerShell Empire using the Microsoft DDE exploit.
PINNED
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.