FirePrint is a security tool for finding misconfigured Firebase realtime databases in Android or iOS applications.
☆22Apr 4, 2024Updated last year
Alternatives and similar repositories for Fireprint
Users that are interested in Fireprint are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- ☆54Nov 5, 2024Updated last year
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆16Mar 31, 2021Updated 4 years ago
- This tool will scan all the URL's in the file and will provide Content-Length, Status-Code, Server and more.☆36Dec 22, 2021Updated 4 years ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- Validate proxies for specific domain☆39Aug 14, 2021Updated 4 years ago
- Web Application Firewall (WAF) Detector☆35Mar 13, 2023Updated 3 years ago
- ☆16Jan 4, 2023Updated 3 years ago
- ☆25Sep 5, 2017Updated 8 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- 'apk-yara-checker' is a little CLI tool written in Rust to check Yara rules against a folder of APK files.☆16Jul 6, 2024Updated last year
- ☆102Oct 5, 2020Updated 5 years ago
- ☆13May 9, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Conveniently generate shareable URLs for various social media websites.☆10Mar 9, 2025Updated last year
- 🔍 A simple tool to obtain long lists of ips from domains using goroutines☆26Jul 29, 2019Updated 6 years ago
- Scan secrets from Continuous Integration Build Logs☆53Oct 14, 2019Updated 6 years ago
- Signatures for jaeles scanner by @j3ssie☆117Apr 20, 2024Updated last year
- CmdRunner is a modular command encoder used to easily encode data run through various systems and commands. It's primary use is to run co…☆16Jun 10, 2019Updated 6 years ago
- little helping scripts that I use daily☆11Aug 30, 2021Updated 4 years ago
- A wrapper around jq, to help you parse jq output!☆30Aug 23, 2020Updated 5 years ago
- Collection of web app methodology from initial recon into exploit known vulnerability. Used when conducting Bug Bounty, Penetration Testi…☆13Oct 23, 2021Updated 4 years ago
- All challenges I created for CTF☆12Jun 7, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Oblivion-X is a high-risk script designed to modify system configurations on Samsung government-issued devices, disabling security featur…☆24Dec 16, 2024Updated last year
- Sudo exploit☆12Oct 15, 2019Updated 6 years ago
- CVE-2021-21975 vRealize Operations Manager SSRF☆13Mar 31, 2021Updated 4 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Dump all available paths and/or endpoints on WADL file.☆98Nov 24, 2025Updated 4 months ago
- ⚡️ Multiple target ZAP Scanning☆106Mar 14, 2026Updated last week
- WAF Cookie Fetcher is a Burp Suite extension written in Python, which uses a headless browser to obtain the values of WAF-injected cookie…☆16Jan 16, 2018Updated 8 years ago
- This is a repository for reporting any issues in any of my software☆13May 15, 2018Updated 7 years ago
- whoareyou is a tool to find the underlying technology/software used in a list of websites passed through stdin (using Wappalyzer dataset)☆32Jun 15, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A list of resources for those interested in getting started in bug bounties☆13Jun 18, 2020Updated 5 years ago
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆93Jul 9, 2025Updated 8 months ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- ☆11Jun 19, 2024Updated last year
- FCM push notification with PHP☆15Dec 18, 2024Updated last year
- Welcome! This repo is a conglomeration of tips, tricks, tools, and data analysis to use while doing web application security assessments,…☆14Jan 13, 2019Updated 7 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆25Mar 23, 2023Updated 3 years ago