0xbigshaq / firepwn-toolView external linksLinks
Firepwn is a tool made for testing the Security Rules of a firebase application.
☆618Feb 8, 2026Updated last week
Alternatives and similar repositories for firepwn-tool
Users that are interested in firepwn-tool are comparing it to the libraries listed below
Sorting:
- A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the a…☆326Jun 4, 2024Updated last year
- A tool for exploring Firebase datastores.☆238Jul 25, 2025Updated 6 months ago
- Automated Firebase security scanner to check for unauthorized read and write access on firestore, realtime databases, storage buckets and…☆39Oct 4, 2025Updated 4 months ago
- An IIS short filename enumeration tool☆1,109Nov 25, 2024Updated last year
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆22Apr 22, 2024Updated last year
- Python code to Serialize and Unserialize java binary serialization format.☆30Jan 9, 2026Updated last month
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆15Sep 10, 2024Updated last year
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Apr 5, 2024Updated last year
- ☆154Aug 18, 2023Updated 2 years ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Feb 16, 2024Updated 2 years ago
- The scripts helps security analsts to identify misconfigured firebase instances.☆232Aug 9, 2022Updated 3 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆157Feb 11, 2025Updated last year
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆719Feb 3, 2026Updated last week
- Obtain GraphQL API schema even if the introspection is disabled☆1,383Dec 5, 2025Updated 2 months ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆749Dec 19, 2023Updated 2 years ago
- Extract JavaScript source trees from Sourcemap files☆1,279Mar 22, 2024Updated last year
- WebSocket REPL for pentesters☆234Jul 24, 2024Updated last year
- Decompress Xamarin .NET compressed binaries so they can be decompiled.☆48Oct 7, 2020Updated 5 years ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆119Jul 12, 2025Updated 7 months ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- Identify virtual hosts by similarity comparison☆137Aug 12, 2024Updated last year
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,755May 22, 2024Updated last year
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,042Aug 14, 2024Updated last year
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆2,012Jul 12, 2025Updated 7 months ago
- Webshell agent in aspx and php☆28Dec 11, 2025Updated 2 months ago
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆775Aug 19, 2024Updated last year
- List DTDs and generate XXE payloads using those local DTDs.☆645Feb 21, 2024Updated last year
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆148Dec 9, 2024Updated last year
- A tool to automate the boring process of APK recon☆346Sep 30, 2022Updated 3 years ago
- Gotta go fast☆155Dec 5, 2025Updated 2 months ago
- CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.☆158Jul 2, 2024Updated last year
- ☆383May 17, 2023Updated 2 years ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,287Aug 7, 2025Updated 6 months ago
- Search for sensitive data in Postman public library.☆214Aug 28, 2025Updated 5 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆669Oct 23, 2025Updated 3 months ago
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated 10 months ago
- ☆118Nov 21, 2024Updated last year
- APK downloader from few sources☆136Aug 18, 2025Updated 5 months ago