jayateertha043 / FireOver
A FireBase DataBase TakeOver Tool along with POC Generator
☆32Updated 3 years ago
Alternatives and similar repositories for FireOver:
Users that are interested in FireOver are comparing it to the libraries listed below
- Burp Suite plugin to copy regex matches from selected requests and/or responses to the clipboard.☆34Updated 3 years ago
- Burpsuite Plugin to detect Directory Traversal vulnerabilities☆28Updated 3 years ago
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Updated 3 years ago
- ☆33Updated 3 years ago
- Messy BurpSuite plugin for SQL Truncation vulnerabilities.☆64Updated 5 years ago
- ☆42Updated 3 years ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Updated 3 years ago
- ☆26Updated 5 years ago
- Alias for storing ffuf results☆20Updated 4 years ago
- ☆46Updated 4 years ago
- ☆60Updated 4 years ago
- ☆24Updated 4 years ago
- SubzzZ to find possible subdomains using passive recon. Tool also support Permutations, Mutations, Alterations.☆38Updated 4 years ago
- ☆33Updated 2 years ago
- A repo for tools, utils, and wrappers that are to small to put in their own repo.☆23Updated 2 years ago
- Additional nuclei templates☆37Updated last year
- A Web-UI for subdomain enumeration (subfinder)☆54Updated 4 years ago
- ☆11Updated 3 years ago
- Subvenkon is a subdomain enumerator from Venkon☆23Updated 4 years ago
- Bug Bounty Tools☆34Updated 4 years ago
- ☆14Updated 3 years ago
- Just lists of lists of lists !☆16Updated 2 weeks ago
- Endpoint monitor tool☆20Updated 4 years ago
- This extension provides a way to discover NoSQL injection vulnerabilities.☆23Updated 2 years ago
- A simple utility to generate domain names with all possible TLDs☆23Updated 2 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆36Updated 11 months ago
- An SSRF detector tool written in golang. I have fixed some errors and added some more payloads to it. But the tool credits go to z0idsec.☆44Updated 4 years ago
- XSS reflector vulnerabilities exploitation extended.☆27Updated 3 years ago
- ☆44Updated 3 years ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago