FireHunter is a proof-of-concept toolkit designed for security researchers and bug hunters to audit Firebase-backed Android applications. It automates the process of extracting authentication tokens, analyzing JWT permissions, and testing Firestore Security Rules for common misconfigurations (e.g., Insecure Direct Object References).
β οΈ Disclaimer: This tool is for educational purposes and authorized security testing only. Do not use this on applications without the owner's explicit permission.
- Universal Token Extraction: Uses Frida to scan the Android file system (
shared_prefs,files) for cached JWT tokens. - Token Analysis: Instantly decodes JWTs to extract
Project ID,User ID, and checks if the token is a valid Firebase Auth token or a Google OAuth token. - Blind Write Exploitation: Exploits insecure Firestore Security Rules by sending "Blind PATCH" requests, bypassing client-side logic and timestamp checks.
- Interactive CLI: A user-friendly command-line interface to view data and modify Integer, Boolean, or String fields.
- Python 3.x
- Frida (
pip install frida-tools) requestslibrary (pip install requests)- A rooted Android device or Emulator (with Frida Server running)
Run the Frida script while the target app is open on your device.
frida -U -f com.target.package -l token_hunter.jsCopy the output starting with eyJ....
Paste the token into decoder.py to extract the Project configuration.
python decoder.pyThis will reveal the PROJECT_ID and USER_ID.
Update attack_bot.py with the credentials found in Step 2.
python attack_bot.pyOption 1: View Profile (Scans for readable data).
Option 2: Blind Write (Forces an update to specific fields like coins, is_vip, etc.).