Do DNS rebinding attacks matter for home users?
It depend on your threat model, there is much more than just dns rebinding to worry about. Default windows have so much stuff ON by default and gateway very often get compromised. Segmenting layer 2 ( vlan and subnetting ) , enforce dnssec and uses solutions like dnscrypt and you should be fine. Sadly home network are very often targeted by threat actor for multiple reasons like reselling residential proxy is just one.
Even if you use nextdns or controld ALOT of applications do use internal DNS nowaday most of electron based will resolve cloudflare cdn instead of yours. Portmaster is a userfriendly tool that might helps but any experienced attacker will figures it out.
You should restrict Multicast, aliases
You should understand read a bit about BCP38,vxlan,how threat actor can leverage ISP BRAS to exfil and do lot's of stuff.
NOTE: When an attacker compromise ur system ALOT of exe , dll will be replaced by living out the land binary aka lolbin
A good practice is to have decent blocklist , blacklisting ASN, Country u do not expect to ever have connections with and are known to be part of large scale attacks.
Known blacklisted c2, scanner, ddos bot etc. Peerblock and hardening your host file will do it for you but this do not replace having a DMZ device setup for proper filtering
This is only few common one but without an actual threat models it is imposible to properly cover and comprehend someone needs.
Security is not a tool or something u just apply once either
I would never recommend those 3RD party dns when you can achieve more without paying with dnscrypt, u can even use dns relay, anonymize request and much more
if you need an easy to use ui go for simplednscrypt