Brannon Dorsey
Brannon Dorsey
Great, I'm a bit swamped this week but should be able to get on this and hopefully make a PR by early next week.
Hey @trinitronx, thanks so much for your interest in this project! It was great to meet you this weekend as well. I wish I had a chance to chat a...
Thanks for getting back to me. I've been playing with FakeDNS for the past few days, and I've got to say, really nice work :+1:. I see that [this behavior...
One solution would be to include a `--unique-by ` cli param. `--unique-by ip` is the current behavior as is. `--unique-by subdomain` would be the version I've got in my fork,...
No problem, thanks for making such a rad tool. I'll be using it in my research for a while and I'm happy to help with development and discussion along the...
Great to hear you are on bored with this functionality :+1:. Rot13 sounds like a nice solution for obfuscation, especially considering it doesn't add any extra characters. It would probably...
> FAKEDNS.A.example.com.BD.27.2A.59.attacker.domain - `FAKEDNS` makes sense to have a constant here, but would that have to be "FAKEDNS"? Or is the goal just to signify that the domain name is...
> I wonder if there are legitimate uses for such a service? Something something something cloudflare. How exactly do you mean legitimate? Penetration testing would def be my most use...
It looks like Tavis Ormandy's [rbndr](https://github.com/taviso/rbndr) actually provides this type of functionality. He's got a public server up that allows anyone to use his malicious DNS server too: https://lock.cmpxchg8b.com/rebinder.html Granted,...
Hey @Crypt0s, I've implemented this basic functionality as a standalone DNS server called [`whonow`](https://github.com/brannondorsey/whonow). I opted for the human-readable version of the automangler rules proposed and went with a keep-it-simple-stupid...