A DNS rebinding attack framework.
-
Updated
Jun 17, 2024 - JavaScript
A DNS rebinding attack framework.
A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)
A front-end JavaScript toolkit for creating DNS rebinding attacks.
DNS Rebinding Exploitation Framework
DNS rebinding toolkit
Express.js middleware for "Host" and "Referer" header validation to protect against DNS rebinding attacks.
A dns server, small and cute. Use it to test web security such as dnslog and dns rebinding. it's kind of like ceye.io
Chrome extension to block DNS rebinding attacks.
A malicious DNS server for executing DNS Rebinding attacks on the fly. whonow lets you specify DNS responses and rebind rules dynamically using domain requests themselves.
Coredns plugin that implement --stop-dns-rebind from dnsmasq
dns rebind tool with custom scripts (Docker version)
A simple solution to have a DNS rebinding server up and running in no time.
Add a description, image, and links to the dns-rebinding topic page so that developers can more easily learn about it.
To associate your repository with the dns-rebinding topic, visit your repo's landing page and select "manage topics."