shivsahni / FireBaseScannerLinks
The scripts helps security analsts to identify misconfigured firebase instances.
☆228Updated 3 years ago
Alternatives and similar repositories for FireBaseScanner
Users that are interested in FireBaseScanner are comparing it to the libraries listed below
Sorting:
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆252Updated 3 years ago
- ☆431Updated 4 years ago
- A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the a…☆324Updated last year
- A tool to automate the boring process of APK recon☆346Updated 3 years ago
- A tool for exploring Firebase datastores.☆235Updated 5 months ago
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆176Updated last year
- Print out URL schemas from an Android app☆127Updated 11 months ago
- AndroGoat☆307Updated last month
- Tool to mass analyse potentially exposed Firebase databases on Android apps☆66Updated 6 years ago
- Covers Top 10 OWASP Mobile Vulnerabilities☆123Updated last year
- xss development frameworks, with the goal of making payload writing easier.☆153Updated last year
- An actively maintained, Self curated notes related to android application security for security professionals, bugbounty hunters, pentes…☆224Updated 4 years ago
- A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.☆314Updated last month
- Unofficial documentation for the great tool Param Miner☆185Updated 3 years ago
- A blind XSS detection and XSS data capture framework☆174Updated last month
- 🐙 Cross-document messaging security research tool powered by https://enso.security☆300Updated 2 years ago
- A tool to inspect and attack version 1 GUIDs☆239Updated 3 years ago
- Massive Mobile Security Framework☆300Updated 4 months ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆234Updated 3 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆324Updated last year
- A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.