iosiro / baserunnerLinks
A tool for exploring Firebase datastores.
☆231Updated 3 months ago
Alternatives and similar repositories for baserunner
Users that are interested in baserunner are comparing it to the libraries listed below
Sorting:
- A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the a…☆323Updated last year
- ☆418Updated 4 years ago
- Burp Suite extension that offers a toolkit for testing GraphQL endpoints.☆196Updated last year
- A tool to inspect and attack version 1 GUIDs☆238Updated 3 years ago
- A Firefox Web Extension to improve the discovery of DOM XSS.☆279Updated 11 months ago
- PP-finder Help you find gadget for prototype pollution exploitation☆180Updated last year
- ☆153Updated 2 years ago
- The scripts helps security analsts to identify misconfigured firebase instances.☆226Updated 3 years ago
- Obtain GraphQL API schema despite disabled introspection!☆72Updated 4 years ago
- GQLSpection - parses GraphQL introspection schema and generates possible queries☆93Updated 7 months ago
- xss development frameworks, with the goal of making payload writing easier.☆149Updated last year
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆249Updated 3 years ago
- Unofficial documentation for the great tool Param Miner☆183Updated 3 years ago
- Insecure Firebase | Bugbounty | Hacking Insecure Firbase☆92Updated 4 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆322Updated 3 months ago
- 🐙 Cross-document messaging security research tool powered by https://enso.security☆299Updated 2 years ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆235Updated 3 years ago
- Fleex makes it easy to create multiple VPS on cloud providers and use them to distribute workloads.☆263Updated last year
- Burp extension to create target specific and tailored wordlist from burp history.☆249Updated 3 years ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆149Updated 10 months ago
- EvenBetter is a frontend Caido plugin that makes the Caido experience even better 😎☆158Updated last week
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆143Updated 7 months ago
- GraphQL automated security testing toolkit☆327Updated last year
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆254Updated last year
- This repository contains various media files for known attacks on web applications processing media files. Useful for penetration tests a…☆343Updated 4 years ago
- ☆183Updated last year
- Archive Alchemist is a tool for creating specially crafted archives to test extraction vulnerabilities.☆216Updated 3 months ago
- Rust-based high performance domain permutation generator.☆294Updated last year
- Quickly generate context-specific wordlists for content discovery from lists of URLs or paths☆230Updated 3 years ago
- The only GraphQL wordlist you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.☆417Updated 2 years ago