Discover known DNS attacks and abuses

The DNS protocol is weak. Knowledge of its vulnerabilities must be shared

This website is under construction

Attack

The ability to quickly identify the attack surface is essential. Whether you are penetration testing or chasing bug bounties.

Defend

Network defenders benefit from passive reconnaissance in a number of ways. With analysis informing information security strategy.

Learn

Understanding network based OSINT helps information technologists to better operate, assess and manage the network.

Why this website

It is hard to find a documentation that centralize all issues with the DNS protocol. This is an effort to list differents abuses of the protocol, how they works and how we can protect when possible. This is an on going project and there’s room for amelioration, don’t hesitate to contact us if you think we should add something!