jayateertha043 / FireOver
A FireBase DataBase TakeOver Tool along with POC Generator
☆33Updated 3 years ago
Alternatives and similar repositories for FireOver:
Users that are interested in FireOver are comparing it to the libraries listed below
- ☆33Updated 3 years ago
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Updated 3 years ago
- ☆42Updated 3 years ago
- Burp Suite plugin to copy regex matches from selected requests and/or responses to the clipboard.☆33Updated 3 years ago
- ☆25Updated 4 years ago
- Burpsuite Plugin to detect Directory Traversal vulnerabilities☆28Updated 3 years ago
- A repo for tools, utils, and wrappers that are to small to put in their own repo.☆23Updated last year
- ☆60Updated 3 years ago
- Alias for storing ffuf results☆20Updated 4 years ago
- This includes all the templates of nuclei collected from different sources☆17Updated 2 years ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Updated 3 years ago
- ☆11Updated 2 years ago
- Extract SSL certificate data (Subject Name, Subject Alt Names, Organisation)☆42Updated 2 weeks ago
- ☆33Updated 2 years ago
- Bug Bounty Tools☆34Updated 4 years ago
- Messy BurpSuite plugin for SQL Truncation vulnerabilities.☆63Updated 4 years ago
- Fast AEM scope gathering tool for all your public and private BugCrowd Programs☆11Updated 3 years ago
- A simple utility to generate domain names with all possible TLDs☆23Updated 2 years ago
- SubzzZ to find possible subdomains using passive recon. Tool also support Permutations, Mutations, Alterations.☆38Updated 3 years ago
- ☆14Updated 3 years ago
- ☆46Updated 3 years ago
- tool that generates bypasses for open redirects☆52Updated 2 years ago
- collection of various grep patterns collected from tomnomnom/gf and other places☆21Updated 4 years ago
- Additional nuclei templates☆36Updated last year
- 10 Reset Password Flaws Based on Web Application Security☆11Updated 4 years ago
- ☆24Updated 4 years ago
- XSS reflector vulnerabilities exploitation extended.☆26Updated 3 years ago
- Just lists of lists of lists !☆16Updated this week
- Learn what is NoSQL injection and how to find them ?☆11Updated 3 years ago
- Subvenkon is a subdomain enumerator from Venkon☆23Updated 4 years ago