{"id":29275,"date":"2023-07-27T12:49:51","date_gmt":"2023-07-27T12:49:51","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=29275"},"modified":"2023-07-27T12:49:54","modified_gmt":"2023-07-27T12:49:54","slug":"firebaseexploiter","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/","title":{"rendered":"FirebaseExploiter : Vulnerability Discovery Tool That Discovers Firebase Database Which Are Open And Can Be Exploitable"},"content":{"rendered":"\n<p><strong>FirebaseExploiter <\/strong>is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily built for mass hunting bug bounties and for penetration testing.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\"><strong>Features<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Mass vulnerability scanning from list of hosts<\/li>\n\n\n\n<li>Custom JSON data in <code>exploit.json<\/code> to upload during exploit<\/li>\n\n\n\n<li>Custom <code>URI path<\/code> for exploit<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\"><a href=\"https:\/\/github.com\/securebinary\/firebaseExploiter#usage\"><\/a>Usage<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhD-BtV-foKgoQcleVLPm0macG1WliqLht03-mRackrzfhCg_5k3Rk83y7FYYOzO-lv_LW4JJNW9Hbi1QEiPn60V_L1Wm6zUPUruJVLARovrgGZ3KyiDstus6ltAJnwGvmU4VYbFuMPiyO2YL-eP-VcWkhPqj59MHbgxUoWFl3LVzSm_PX6y2UxfNVQ\/s16000\/1.png\" alt=\"\" \/><\/figure>\n\n\n\n<p>This will display help for the CLI tool. Here are all the required arguments it supports.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Installation<\/h2>\n\n\n\n<p>FirebaseExploiter was built using go1.19. Make sure you use latest version of <a href=\"https:\/\/go.dev\/doc\/install\">Go<\/a> to install successfully. Run the following command to install the latest version:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted has-background\" style=\"background-color:#f6f6f6\"><strong>go install -v github.com\/securebinary\/firebaseExploiter@latest<\/strong><\/pre>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiNqpZkYvMQSfcAR3ut7Npv76Qwsg8qonGEChzYVzzJ1LcfwJqDyBKll7E5Su9e0CvUQl7TUEx8am9p45FmC0xFBbdZ28HmkTfD0sJbvlpj1aLp-B9TDaagMU-AxXmpkZDKwUlCFFRayRkLjH97gd3MGIlACxuDSwV1qBd9CmO1hy9v1LB3CvUADIZ3\/s16000\/install.png\" alt=\"\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Running FirebaseExploiter<\/h2>\n\n\n\n<p>To scan a specific domain to check for Insecure Firebase DB.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgJ3AbjBzC02wTC05yv3-ar-vXE80MN7w2NElWXYJMtHuDb4vZm2KuBsqm12Zg4ENEDaswU9tNv0kOuOaiv_vOFC1_cSoX9lq3hzrcBir9FgOvFp4BKk-L-GjixLYIkAhDVhpgXxAXhWk8_hY2uhI29GkaxHpFKFBoVQLuO3LFLYjoQsB8hPsV0Sjvo\/s16000\/2.png\" alt=\"\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgzu3xD8n8AC2QPppu28cXdtClLLm0k5t9DaorcHS5-IfN3VI8ykLTt2RwnZfYHlxkk9RF9jCkIitW23Uwf2CIQ39VrjgspY6lM32PLoExnMxHUOvy5513Pjt_DPiKz0O5xhZnSPNQeLc2ccMf3t33c8jMpuKM1pZ0q1-5puITtaB1LByYILwyOCcxC\/s16000\/3.png\" alt=\"\" \/><\/figure>\n\n\n\n<p>To exploit a Firebase DB to write your own JSON document in it.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjV7MsF-AUd6l0zyuJ6CByYJ6V-Prh20SZjathtBUHcavvv3mPlR2VGMcdqSY7VC4ZrZWZjdYFROxdXrZuaBW1sTW2nmf1F34w5REe2dUJXZPob3Iua9-F0CtWFiPTg5gyVkWfgxAJ26P1JaJpv_rhdpmpPfDAfAk0gMwcTuUvK73w9ACByTsvhzJD6\/s16000\/4.png\" alt=\"\" \/><\/figure>\n\n\n\n<p>Create your own <code>exploit.json<\/code> file in proper JSON format to exploit vulnerable Firebase DBs.<\/p>\n\n\n\n<p>Checking the exploited URL to verify the vulnerability.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiINiz0qKA7uPVcQLP7hIVFprww6mmNUtmOARVQNmtZjolHgEV93HW2irE14urGqv2gGXWPdNgI94TsmdTSdfwXH6eMbUsXMaRhEWW8gQHVgF_8-YLaS5hWvRMBwivFdLaNZcHqlPRTxbK0pARigXpUjNMEiITEEgmK1JHSzSZ867cwG_zEUGVa_isj\/s16000\/urlResponse.png\" alt=\"\" \/><\/figure>\n\n\n\n<p>Adding <code>custom path<\/code> for exploiting Firebase DBs.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgYKj7SuKN1gdlQMtEBdBJbUfXr_mPb2Mm_ErWm9JAjNGcE2X6qN2BB0zHzZ_CR0rtU8RK9CTSBE4PP9l87R4MZk__jpkJ6VJSJE9idwFgQVlCEuKIOFRADh-3I7rvYD6nZ_nFUpIfWEfvO3M4bhQlY1Hx7FxD-jXcp1jh3NCzRLwJmj1fbijJNqA1f\/s16000\/urlPath.png\" alt=\"\" \/><\/figure>\n\n\n\n<p>Mass scanning for Insecure Firebase Databases from list of target hosts.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgj1NuKjNwKsXEsiFcKruOUmjZmKHVJY-T81NVoA9nXGjjGVJQyEoQTMUzpI86tVXPMQ9cWfy2GN3OVhWzD0iDXL7zFRBr1f44eQ8dAGTEloL-D29qysVjght46lxFEK1mT9K33A9XgFNNtMWnbeyFThJJw5GoYeXh_c3Hiwf2SO7oJdkNSAiNi6vmC\/s16000\/fileVuln.png\" alt=\"\" \/><\/figure>\n\n\n\n<p>Exploiting vulnerable Firebase DBs from the list of target hosts.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgETjKns3LBkBGMd2ZwiAzpbXOAE0XCipyKtEJgQafMdF_OTzZfwRaRYDYsZL4kSQZNmBJA-KoG4thlBOkBfAzgh1UDneY_TmOHB-_VVyX-rOWKD9dMvReo9LOu1x43UfmlzoR6tnkuiKMMwcQSlhwB9N7gAsAfkgo9_hqXget8rtqBHYCVnd-w8qw3\/s16000\/fileExploit.png\" alt=\"\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">License<\/h2>\n\n\n\n<p><code>FirebaseExploiter<\/code> is made with ???? by the <code>SecureBinary<\/code> team. Any tweaks \/ community contribution are welcome.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/github.com\/securebinary\/firebaseExploiter\" target=\"_blank\" rel=\"noreferrer noopener\">Click Here To Download<\/a><\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center has-background\" style=\"background-color:#f4f4f4\"><strong>Please consider&nbsp;<a href=\"https:\/\/www.linkedin.com\/company\/kali-linux-tutorials\/\" target=\"_blank\" rel=\"noreferrer noopener\">following and supporting<\/a>&nbsp;us to stay updated with the latest info<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily built for mass hunting bug bounties and for penetration testing. Features Usage This will display help for the CLI tool. Here are all the required arguments it supports. Installation FirebaseExploiter was built using go1.19. Make sure you [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":29281,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWjsJ2VUSR3AIsnPdGwJxdnIh--QSQg1MYLc9bCUUu6FiNNV_mqVS7ki5rPR4doUbOGwm9GtCHOGPF3pPMbIGHo1Xu9cX05UYJPaCQUvkuDRIfrRsa78U-pJQYmU9rNJjYyqlpRZiUP6dhO05qv-dn-sRIWLZLOx7AguHl_jErUJM3TSOQMHdNUfRM\/s16000\/binary.png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[6082,6080,2467,3560,6081],"class_list":["post-29275","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-bug-bounties","tag-firebaseexploiter","tag-penetration-testing","tag-vulnerabilities","tag-vulnerability-discovery-tool"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>FirebaseExploiter :Vulnerability Discovery Tool<\/title>\n<meta name=\"description\" content=\"FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily built\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FirebaseExploiter :Vulnerability Discovery Tool\" \/>\n<meta property=\"og:description\" content=\"FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily built\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-27T12:49:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-27T12:49:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWjsJ2VUSR3AIsnPdGwJxdnIh--QSQg1MYLc9bCUUu6FiNNV_mqVS7ki5rPR4doUbOGwm9GtCHOGPF3pPMbIGHo1Xu9cX05UYJPaCQUvkuDRIfrRsa78U-pJQYmU9rNJjYyqlpRZiUP6dhO05qv-dn-sRIWLZLOx7AguHl_jErUJM3TSOQMHdNUfRM\/s16000\/binary.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWjsJ2VUSR3AIsnPdGwJxdnIh--QSQg1MYLc9bCUUu6FiNNV_mqVS7ki5rPR4doUbOGwm9GtCHOGPF3pPMbIGHo1Xu9cX05UYJPaCQUvkuDRIfrRsa78U-pJQYmU9rNJjYyqlpRZiUP6dhO05qv-dn-sRIWLZLOx7AguHl_jErUJM3TSOQMHdNUfRM\/s16000\/binary.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"FirebaseExploiter : Vulnerability Discovery Tool That Discovers Firebase Database Which Are Open And Can Be Exploitable\",\"datePublished\":\"2023-07-27T12:49:51+00:00\",\"dateModified\":\"2023-07-27T12:49:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/\"},\"wordCount\":210,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWjsJ2VUSR3AIsnPdGwJxdnIh--QSQg1MYLc9bCUUu6FiNNV_mqVS7ki5rPR4doUbOGwm9GtCHOGPF3pPMbIGHo1Xu9cX05UYJPaCQUvkuDRIfrRsa78U-pJQYmU9rNJjYyqlpRZiUP6dhO05qv-dn-sRIWLZLOx7AguHl_jErUJM3TSOQMHdNUfRM\/s16000\/binary.png\",\"keywords\":[\"bug bounties\",\"FirebaseExploiter\",\"Penetration Testing\",\"Vulnerabilities\",\"Vulnerability Discovery Tool\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/\",\"name\":\"FirebaseExploiter :Vulnerability Discovery Tool\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWjsJ2VUSR3AIsnPdGwJxdnIh--QSQg1MYLc9bCUUu6FiNNV_mqVS7ki5rPR4doUbOGwm9GtCHOGPF3pPMbIGHo1Xu9cX05UYJPaCQUvkuDRIfrRsa78U-pJQYmU9rNJjYyqlpRZiUP6dhO05qv-dn-sRIWLZLOx7AguHl_jErUJM3TSOQMHdNUfRM\/s16000\/binary.png\",\"datePublished\":\"2023-07-27T12:49:51+00:00\",\"dateModified\":\"2023-07-27T12:49:54+00:00\",\"description\":\"FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily built\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWjsJ2VUSR3AIsnPdGwJxdnIh--QSQg1MYLc9bCUUu6FiNNV_mqVS7ki5rPR4doUbOGwm9GtCHOGPF3pPMbIGHo1Xu9cX05UYJPaCQUvkuDRIfrRsa78U-pJQYmU9rNJjYyqlpRZiUP6dhO05qv-dn-sRIWLZLOx7AguHl_jErUJM3TSOQMHdNUfRM\/s16000\/binary.png\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWjsJ2VUSR3AIsnPdGwJxdnIh--QSQg1MYLc9bCUUu6FiNNV_mqVS7ki5rPR4doUbOGwm9GtCHOGPF3pPMbIGHo1Xu9cX05UYJPaCQUvkuDRIfrRsa78U-pJQYmU9rNJjYyqlpRZiUP6dhO05qv-dn-sRIWLZLOx7AguHl_jErUJM3TSOQMHdNUfRM\/s16000\/binary.png\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"FirebaseExploiter :Vulnerability Discovery Tool","description":"FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily built","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/","og_locale":"en_US","og_type":"article","og_title":"FirebaseExploiter :Vulnerability Discovery Tool","og_description":"FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily built","og_url":"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2023-07-27T12:49:51+00:00","article_modified_time":"2023-07-27T12:49:54+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWjsJ2VUSR3AIsnPdGwJxdnIh--QSQg1MYLc9bCUUu6FiNNV_mqVS7ki5rPR4doUbOGwm9GtCHOGPF3pPMbIGHo1Xu9cX05UYJPaCQUvkuDRIfrRsa78U-pJQYmU9rNJjYyqlpRZiUP6dhO05qv-dn-sRIWLZLOx7AguHl_jErUJM3TSOQMHdNUfRM\/s16000\/binary.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWjsJ2VUSR3AIsnPdGwJxdnIh--QSQg1MYLc9bCUUu6FiNNV_mqVS7ki5rPR4doUbOGwm9GtCHOGPF3pPMbIGHo1Xu9cX05UYJPaCQUvkuDRIfrRsa78U-pJQYmU9rNJjYyqlpRZiUP6dhO05qv-dn-sRIWLZLOx7AguHl_jErUJM3TSOQMHdNUfRM\/s16000\/binary.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"FirebaseExploiter : Vulnerability Discovery Tool That Discovers Firebase Database Which Are Open And Can Be Exploitable","datePublished":"2023-07-27T12:49:51+00:00","dateModified":"2023-07-27T12:49:54+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/"},"wordCount":210,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWjsJ2VUSR3AIsnPdGwJxdnIh--QSQg1MYLc9bCUUu6FiNNV_mqVS7ki5rPR4doUbOGwm9GtCHOGPF3pPMbIGHo1Xu9cX05UYJPaCQUvkuDRIfrRsa78U-pJQYmU9rNJjYyqlpRZiUP6dhO05qv-dn-sRIWLZLOx7AguHl_jErUJM3TSOQMHdNUfRM\/s16000\/binary.png","keywords":["bug bounties","FirebaseExploiter","Penetration Testing","Vulnerabilities","Vulnerability Discovery Tool"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/","url":"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/","name":"FirebaseExploiter :Vulnerability Discovery Tool","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWjsJ2VUSR3AIsnPdGwJxdnIh--QSQg1MYLc9bCUUu6FiNNV_mqVS7ki5rPR4doUbOGwm9GtCHOGPF3pPMbIGHo1Xu9cX05UYJPaCQUvkuDRIfrRsa78U-pJQYmU9rNJjYyqlpRZiUP6dhO05qv-dn-sRIWLZLOx7AguHl_jErUJM3TSOQMHdNUfRM\/s16000\/binary.png","datePublished":"2023-07-27T12:49:51+00:00","dateModified":"2023-07-27T12:49:54+00:00","description":"FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily built","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/firebaseexploiter\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWjsJ2VUSR3AIsnPdGwJxdnIh--QSQg1MYLc9bCUUu6FiNNV_mqVS7ki5rPR4doUbOGwm9GtCHOGPF3pPMbIGHo1Xu9cX05UYJPaCQUvkuDRIfrRsa78U-pJQYmU9rNJjYyqlpRZiUP6dhO05qv-dn-sRIWLZLOx7AguHl_jErUJM3TSOQMHdNUfRM\/s16000\/binary.png","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWjsJ2VUSR3AIsnPdGwJxdnIh--QSQg1MYLc9bCUUu6FiNNV_mqVS7ki5rPR4doUbOGwm9GtCHOGPF3pPMbIGHo1Xu9cX05UYJPaCQUvkuDRIfrRsa78U-pJQYmU9rNJjYyqlpRZiUP6dhO05qv-dn-sRIWLZLOx7AguHl_jErUJM3TSOQMHdNUfRM\/s16000\/binary.png","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWjsJ2VUSR3AIsnPdGwJxdnIh--QSQg1MYLc9bCUUu6FiNNV_mqVS7ki5rPR4doUbOGwm9GtCHOGPF3pPMbIGHo1Xu9cX05UYJPaCQUvkuDRIfrRsa78U-pJQYmU9rNJjYyqlpRZiUP6dhO05qv-dn-sRIWLZLOx7AguHl_jErUJM3TSOQMHdNUfRM\/s16000\/binary.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":10659,"url":"https:\/\/kalilinuxtutorials.com\/web-hackers-weapons\/","url_meta":{"origin":29275,"position":0},"title":"Web Hacker&#8217;s Weapons : Collection Of Cool Tools Used By Web Hackers","author":"R K","date":"May 29, 2020","format":false,"excerpt":"Web Hacker's Weapons is a collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting. Weapons Army-Knife\/ALLBurpSuitethe BurpSuite projectArmy-Knife\/SCANjaelesThe Swiss Army knife for automated Web Application TestingArmy-Knife\/ALLzaproxyThe OWASP ZAP core projectDiscovery\/ALLOneForAllOneForAll\u662f\u4e00\u6b3e\u529f\u80fd\u5f3a\u5927\u7684\u5b50\u57df\u6536\u96c6\u5de5\u5177Discovery\/ALLaquatoneA Tool for Domain FlyoversDiscovery\/ALLlazyreconThis script is intended to automate your reconnaissance process in an organized fashionDiscovery\/CRAWLPhotonIncredibly\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":27446,"url":"https:\/\/kalilinuxtutorials.com\/utkuici\/","url_meta":{"origin":29275,"position":1},"title":"Utkuici &#8211; Nessus Automation","author":"R K","date":"October 11, 2022","format":false,"excerpt":"Today, with the spread of information technology systems, investments in the field of cyber security have increased to a great extent. Vulnerability management, penetration tests and various analyzes are carried out to accurately determine how much our institutions can be affected by cyber threats. With Tenable Nessus, the industry leader\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiA1hu1X8FkDcncDZFQchWYolD0smi85Oj2-4JtQVJOTi7rtJSQJ6PrHfPcOpzdD56N1E8Znab5w9L93l4gXC2zfthFA6ltbwQN2UTOWZWI5UPAqecsLRfDW5ZGStfZipDUbmqIcNkVxtMoL1TufGiX0oW2GwT-5hrqs5t3PwqSjfjvdJMrQzV15_fV\/s728\/Utkuici-1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiA1hu1X8FkDcncDZFQchWYolD0smi85Oj2-4JtQVJOTi7rtJSQJ6PrHfPcOpzdD56N1E8Znab5w9L93l4gXC2zfthFA6ltbwQN2UTOWZWI5UPAqecsLRfDW5ZGStfZipDUbmqIcNkVxtMoL1TufGiX0oW2GwT-5hrqs5t3PwqSjfjvdJMrQzV15_fV\/s728\/Utkuici-1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiA1hu1X8FkDcncDZFQchWYolD0smi85Oj2-4JtQVJOTi7rtJSQJ6PrHfPcOpzdD56N1E8Znab5w9L93l4gXC2zfthFA6ltbwQN2UTOWZWI5UPAqecsLRfDW5ZGStfZipDUbmqIcNkVxtMoL1TufGiX0oW2GwT-5hrqs5t3PwqSjfjvdJMrQzV15_fV\/s728\/Utkuici-1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiA1hu1X8FkDcncDZFQchWYolD0smi85Oj2-4JtQVJOTi7rtJSQJ6PrHfPcOpzdD56N1E8Znab5w9L93l4gXC2zfthFA6ltbwQN2UTOWZWI5UPAqecsLRfDW5ZGStfZipDUbmqIcNkVxtMoL1TufGiX0oW2GwT-5hrqs5t3PwqSjfjvdJMrQzV15_fV\/s728\/Utkuici-1.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":37175,"url":"https:\/\/kalilinuxtutorials.com\/fuzzlists\/","url_meta":{"origin":29275,"position":2},"title":"FuzzLists : The Ultimate Toolkit For Penetration Testing And Bug Hunting","author":"Varshini","date":"March 20, 2025","format":false,"excerpt":"FuzzLists is a comprehensive collection of lists designed to aid in penetration testing and bug bounty hunting. These lists include dictionaries, payloads, variables, and tools for content discovery, sandbox escaping, and more. The repository, maintained by nu11pointer, provides essential resources for cybersecurity professionals and bug bounty hunters to identify vulnerabilities\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/FuzzLists-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/FuzzLists-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/FuzzLists-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/FuzzLists-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/FuzzLists-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/FuzzLists-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":4258,"url":"https:\/\/kalilinuxtutorials.com\/bug-bounty-program-2019\/","url_meta":{"origin":29275,"position":3},"title":"What is Bug Bounty Program?","author":"R K","date":"March 19, 2019","format":false,"excerpt":"A bug bounty program, likewise called a vulnerability rewards program (VRP), is a publicly supporting activity that rewards people for finding and revealing programming bugs. When developing up a site or application the designers are specialists altogether checks your item up, down and sideways, testing every aspect of its functionality.\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":32613,"url":"https:\/\/kalilinuxtutorials.com\/hunt-for-lfi-local-file-inclusion\/","url_meta":{"origin":29275,"position":4},"title":"Hunt For LFI (Local File Inclusion) &#8211; Automating The Discovery Of Security Vulnerabilities","author":"Varshini","date":"April 4, 2024","format":false,"excerpt":"In the vast expanse of cybersecurity, the Hunt for LFI (Local File Inclusion) stands out as a pivotal tool for ethical hackers and security enthusiasts. This automated brute force attack tool is specially designed for exploiting local file inclusion vulnerabilities, primarily through GET requests. Tailored for both Capture The Flag\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiWZX6c-1k9OuRzolbbyt5txrpPYl8ZTjqBzUPr6WsEDJ1BodiTN0j2UQjaLcKCZTE4ocr-759C_4qFb3bUXaNztOWf_a8gGwisZX2bIPpcuvnUz5gsb_Jhl3jbbhioRXDZlp3L4gjidtJeOKqRhJ3tI2j2SoZ3akxrfK6d0mRW9M_AvFQKVCCsrLJGpe4S\/s16000\/Hunt%20For%20LFI%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiWZX6c-1k9OuRzolbbyt5txrpPYl8ZTjqBzUPr6WsEDJ1BodiTN0j2UQjaLcKCZTE4ocr-759C_4qFb3bUXaNztOWf_a8gGwisZX2bIPpcuvnUz5gsb_Jhl3jbbhioRXDZlp3L4gjidtJeOKqRhJ3tI2j2SoZ3akxrfK6d0mRW9M_AvFQKVCCsrLJGpe4S\/s16000\/Hunt%20For%20LFI%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiWZX6c-1k9OuRzolbbyt5txrpPYl8ZTjqBzUPr6WsEDJ1BodiTN0j2UQjaLcKCZTE4ocr-759C_4qFb3bUXaNztOWf_a8gGwisZX2bIPpcuvnUz5gsb_Jhl3jbbhioRXDZlp3L4gjidtJeOKqRhJ3tI2j2SoZ3akxrfK6d0mRW9M_AvFQKVCCsrLJGpe4S\/s16000\/Hunt%20For%20LFI%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiWZX6c-1k9OuRzolbbyt5txrpPYl8ZTjqBzUPr6WsEDJ1BodiTN0j2UQjaLcKCZTE4ocr-759C_4qFb3bUXaNztOWf_a8gGwisZX2bIPpcuvnUz5gsb_Jhl3jbbhioRXDZlp3L4gjidtJeOKqRhJ3tI2j2SoZ3akxrfK6d0mRW9M_AvFQKVCCsrLJGpe4S\/s16000\/Hunt%20For%20LFI%20%281%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiWZX6c-1k9OuRzolbbyt5txrpPYl8ZTjqBzUPr6WsEDJ1BodiTN0j2UQjaLcKCZTE4ocr-759C_4qFb3bUXaNztOWf_a8gGwisZX2bIPpcuvnUz5gsb_Jhl3jbbhioRXDZlp3L4gjidtJeOKqRhJ3tI2j2SoZ3akxrfK6d0mRW9M_AvFQKVCCsrLJGpe4S\/s16000\/Hunt%20For%20LFI%20%281%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiWZX6c-1k9OuRzolbbyt5txrpPYl8ZTjqBzUPr6WsEDJ1BodiTN0j2UQjaLcKCZTE4ocr-759C_4qFb3bUXaNztOWf_a8gGwisZX2bIPpcuvnUz5gsb_Jhl3jbbhioRXDZlp3L4gjidtJeOKqRhJ3tI2j2SoZ3akxrfK6d0mRW9M_AvFQKVCCsrLJGpe4S\/s16000\/Hunt%20For%20LFI%20%281%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":1717,"url":"https:\/\/kalilinuxtutorials.com\/jcs-joomla-vulnerability\/","url_meta":{"origin":29275,"position":5},"title":"JCS &#8211; Joomla Vulnerability For Penetration Testing Component Scanner","author":"R K","date":"June 24, 2018","format":false,"excerpt":"JCS (Joomla Component Scanner) made for penetration testing purpose on Joomla CMS JCS can help you with the latest component vulnerabilities and exploits. Database can update from several resources and a Crawler has been implemented to find components and component's link. This version supports Exploitdb and Packetstorm vulnerabilities to create\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/JCS.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/JCS.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/JCS.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/JCS.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/29275","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=29275"}],"version-history":[{"count":6,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/29275\/revisions"}],"predecessor-version":[{"id":29282,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/29275\/revisions\/29282"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/29281"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=29275"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=29275"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=29275"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}