iosiro / baserunner
A tool for exploring Firebase datastores.
☆216Updated 2 years ago
Alternatives and similar repositories for baserunner:
Users that are interested in baserunner are comparing it to the libraries listed below
- A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the a…☆300Updated 9 months ago
- GQLSpection - parses GraphQL introspection schema and generates possible queries☆79Updated 2 weeks ago
- ☆402Updated 3 years ago
- Burp Suite extension that offers a toolkit for testing GraphQL endpoints.☆191Updated 7 months ago
- Unofficial documentation for the great tool Param Miner☆178Updated 2 years ago
- PP-finder Help you find gadget for prototype pollution exploitation☆152Updated 7 months ago
- The scripts helps security analsts to identify misconfigured firebase instances.☆209Updated 2 years ago
- xss development frameworks, with the goal of making payload writing easier.☆139Updated 7 months ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆307Updated 4 months ago
- 🐙 Cross-document messaging security research tool powered by https://enso.security☆287Updated last year
- ☆166Updated 5 months ago
- Burp extension to create target specific and tailored wordlist from burp history.☆237Updated 3 years ago
- You can find hardcoded Api-Key,Secret,Token Etc..☆79Updated 2 years ago
- Burpsuite plugin for Interact.sh☆216Updated 8 months ago
- Tool to mass analyse potentially exposed Firebase databases on Android apps☆59Updated 5 years ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆170Updated 5 months ago
- EvenBetter is a frontend Caido plugin that makes the Caido experience even better 😎☆141Updated this week
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆134Updated 3 months ago
- Secret and/or credential patterns used for gf.☆240Updated 2 years ago
- ☆151Updated 2 years ago
- Quickly generate context-specific wordlists for content discovery from lists of URLs or paths☆220Updated 2 years ago
- A fast and minimal JS endpoint extractor☆342Updated 4 months ago
- ☆150Updated last year
- Tool to find the real IP behind CDNs/WAFs like cloudflare using passive recon by retrieving the favicon hash. For the same hash value, al…☆176Updated 4 years ago
- A tool to perform permutations, mutations and alteration of subdomains in golang.☆158Updated last year
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…