shivsahni / FireBaseScannerLinks
The scripts helps security analsts to identify misconfigured firebase instances.
☆219Updated 3 years ago
Alternatives and similar repositories for FireBaseScanner
Users that are interested in FireBaseScanner are comparing it to the libraries listed below
Sorting:
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆248Updated 3 years ago
- ☆417Updated 4 years ago
- AndroGoat☆268Updated 3 years ago
- A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the a…☆319Updated last year
- A tool for exploring Firebase datastores.☆225Updated last month
- A tool to automate the boring process of APK recon☆349Updated 2 years ago
- Print out URL schemas from an Android app☆122Updated 7 months ago
- Tool to mass analyse potentially exposed Firebase databases on Android apps☆63Updated 5 years ago
- xss development frameworks, with the goal of making payload writing easier.☆147Updated last year
- Hands-on content for Humla/Puliya sessions at null community☆92Updated 4 years ago
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆171Updated last year
- Detectify Crowdsource Challenge☆70Updated 3 years ago
- A script for installing private Burp Collaborator with free Let's Encrypt SSL-certificate☆212Updated last year
- 🐙 Cross-document messaging security research tool powered by https://enso.security☆297Updated 2 years ago
- An actively maintained, Self curated notes related to android application security for security professionals, bugbounty hunters, pentes…☆220Updated 4 years ago
- Mobile penetration testing android & iOS command cheatsheet☆375Updated 3 weeks ago
- ☆143Updated 5 years ago
- ☆151Updated 2 years ago
- Unofficial documentation for the great tool Param Miner☆182Updated 3 years ago
- A tool to inspect and attack version 1 GUIDs☆234Updated 2 years ago
- Covers Top 10 OWASP Mobile Vulnerabilities☆123Updated last year
- Predict Mongo ObjectIds☆145Updated 7 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆321Updated last year
- Awesome information for WebSockets security research☆275Updated 3 years ago
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆99Updated 3 years ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆234Updated 3 years ago
- Repository to house markdown templates for researchers☆205Updated last month
- This repository contains various media files for known attacks on web applications processing media files. Useful for penetration tests a…☆340Updated 4 years ago
- Web Application Security Testing Tools☆249Updated last year
- ☆103Updated 4 years ago