Automatic tool for DNS rebinding-based SSRF attacks httprebind is a tool that automates the process of finding and exploiting DNS rebinding vulnerabilities in web applications. It uses a combination of DNS rebinding and SSRF attacks to bypass security restrictions and access internal systems. httprebind is designed to be easy to use and requires minimal configuration. It is a powerful tool for penetration testers and security researchers.
FEATURES
SIMILAR TOOLS
A collection of Python scripts for password spraying attacks against Lync/S4B & OWA, featuring Atomizer, Vaporizer, Aerosol, and Spindrift tools.
Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.
Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.
A suite of tools for Wi-Fi network security assessment and penetration testing.
A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.
Tool for enumerating proxy configurations and generating CobaltStrike-compatible shellcode.
Generates randomized C2 profiles for Cobalt Strike to evade detection.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.