Insecure-Firebase-Exploit icon indicating copy to clipboard operation
Insecure-Firebase-Exploit copied to clipboard

A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the app have set the security rules as true for both "read" & "write...

Results 4 Insecure-Firebase-Exploit issues
Sort by recently updated
recently updated
newest added

Change the method to POST before testing because if you're not careful you may delete all the old data

Traceback (most recent call last): File "C:\Users\FOX FH4X\Downloads\Compressed\Insecure-Firebase-Exploit-master\Insecure-Firebase-Exploit-master\Firebase_Exploit.py", line 27, in site = raw_input("[+] Enter firebase Database Name : ") ^^^^^^^^^ NameError: name 'raw_input' is not defined

Does this database enable app check protection, can I replace it with an authenticated app check token and bring it into the request! { "error" : "Missing appcheck token" }...