whonow:用于即时执行DNS重新绑定攻击的“恶意” DNS服务器(在rebind.network:53上运行的公共实例) 源码
Whonow DNS服务器 恶意DNS服务器,用于动态执行。 whonow可让您指定DNS响应并使用域请求本身动态地重新绑定规则。 # respond to DNS queries for this domain with 34.192.228.43 the first time # it is requested and then 192.168.1.1 every time after that A.34.192.228.43.1time.192.168.1.1.forever.rebind.network # respond first with 34.192.228.43, then
文件列表
whonow-master.zip
(预估有个11文件)
whonow-master
.gitignore
23B
package.json
895B
package-lock.json
5KB
src
DomainRebind.js
3KB
CODE_OF_CONDUCT.md
5KB
LICENSE
1KB
.images
screenshot.png
325KB
暂无评论