A DNS rebinding attack framework.
-
Updated
Jun 17, 2024 - JavaScript
A DNS rebinding attack framework.
A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)
A front-end JavaScript toolkit for creating DNS rebinding attacks.
DNS Rebinding Exploitation Framework
DNS rebinding toolkit
Express.js middleware for "Host" and "Referer" header validation to protect against DNS rebinding attacks.
A dns server, small and cute. Use it to test web security such as dnslog and dns rebinding. it's kind of like ceye.io
Chrome extension to block DNS rebinding attacks.
Coredns plugin that implement --stop-dns-rebind from dnsmasq
A malicious DNS server for executing DNS Rebinding attacks on the fly. whonow lets you specify DNS responses and rebind rules dynamically using domain requests themselves.
dns rebind tool with custom scripts (Docker version)
A simple solution to have a DNS rebinding server up and running in no time.
Add a description, image, and links to the dns-rebinding topic page so that developers can more easily learn about it.
To associate your repository with the dns-rebinding topic, visit your repo's landing page and select "manage topics."