Whonow is a malicious DNS server designed to execute DNS Rebinding attacks in real-time. The tool operates as a specialized DNS server that facilitates DNS rebinding attacks by manipulating DNS responses to bypass same-origin policy restrictions in web browsers. DNS rebinding attacks allow attackers to access internal network resources and services that would normally be protected by network boundaries. The server can be deployed to respond to DNS queries with crafted responses that enable the rebinding attack vector. This technique is commonly used in penetration testing and security research to demonstrate vulnerabilities in network configurations and web application security models. A public instance of the tool is available at rebind.network:53 for testing and demonstration purposes. The tool provides an on-demand approach to DNS rebinding, allowing security professionals to execute these attacks without requiring extensive setup or configuration.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
An Azure Function that validates and relays Cobalt Strike beacon traffic based on Malleable C2 profile authentication.
Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.
A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
Explore the top million websites, ranked by referring subnets, and gain insights into online influence and popularity.
SauronEye helps in identifying files containing sensitive data such as passwords through targeted directory searches.
A suite of tools for Wi-Fi network security assessment and penetration testing.
Interactive online malware sandbox for real-time analysis and threat intelligence
Tool for enumerating proxy configurations and generating CobaltStrike-compatible shellcode.
SharpShares efficiently enumerates and maps network shares and resolves names within a domain.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.