MuhammadKhizerJaved / Insecure-Firebase-Exploit
A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the app have set the security rules as true for both "read" & "write" an attacker can probably dump database and write his own data to firebase db.
☆292Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for Insecure-Firebase-Exploit
- ☆393Updated 3 years ago
- Pass in a list of URLs with query strings, get back a unique list of URLs and query string combinations☆338Updated 4 years ago
- Js File Scanner☆160Updated 2 years ago
- A script for installing private Burp Collaborator with free Let's Encrypt SSL-certificate☆205Updated 4 months ago
- Turbo Intruder Scripts☆215Updated 4 years ago
- Unofficial documentation for the great tool Param Miner☆173Updated 2 years ago
- Burp extension to create target specific and tailored wordlist from burp history.☆232Updated 2 years ago
- Burp Extension for easily creating Wordlists☆210Updated 3 years ago
- List of reporting templates I have used since I started doing BBH.☆235Updated 2 months ago
- Secret and/or credential patterns used for gf.☆235Updated last year
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆400Updated last month
- ☆286Updated 2 years ago
- A list of useful payloads and Bypass for Web Application Security and Bug Bounty/CTF☆162Updated 4 years ago
- Signatures for jaeles scanner by @j3ssie☆116Updated 7 months ago
- A fuzzer for detecting open redirect vulnerabilities☆712Updated 4 months ago
- Automating XSS using Bash☆350Updated 7 months ago
- Monitoring framework to detect and report newly found subdomains on a specific target using various scanning tools☆265Updated 4 months ago
- A tool to check a bunch of URLs that contain reflecting params.☆536Updated 3 months ago
- The scripts helps security analsts to identify misconfigured firebase instances.☆203Updated 2 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆295Updated this week
- ☆223Updated 5 months ago
- ☆354Updated 2 years ago
- Default signature for Jaeles Scanner☆319Updated 2 years ago
- Gotator is a tool to generate DNS wordlists through permutations.☆457Updated 2 years ago
- You can read the writeup on this script here☆267Updated 4 years ago
- This a adaption of tomnomnom's kxss tool with a different output format☆426Updated last year
- bug bounty disclosed reports☆111Updated 3 years ago
- Collection of XSS Payloads for fun and profit☆170Updated 4 years ago
- Quickly generate context-specific wordlists for content discovery from lists of URLs or paths☆217Updated 2 years ago