Difference between revisions of "ORP APK Bot"
From Exploitee.rs
Jump to navigationJump to search
Line 18: | Line 18: | ||
* Rackspace Cloud Drive Buckets | * Rackspace Cloud Drive Buckets | ||
* AliBaba Cloud Storage | * AliBaba Cloud Storage | ||
* E2E Networks Buckets | |||
* Google Cloud Buckets | * Google Cloud Buckets | ||
* RSA Private Keys | * RSA Private Keys |
Latest revision as of 03:48, 6 September 2022
About
The Discord bot "ORP_APK" iterates through applications in the Google Play store looking for instances of insecure cloud storage, open real time databases, and private keys. After manual verification of the finding, a user can then report the finding to the affected app developer through the use of bot commands.
Services
- Amazon AWS S3 Buckets
- Linode Objects Buckets
- Digital Ocean Spaces
- DreamHost Buckets
- Azure Blobs
- BackBlaze S3
- IBM Cloud Buckets
- Wasabi Object Buckets
- Vultr Objects Buckets
- FireBase Database
- FireBase Cloud Storage
- Rackspace Cloud Drive Buckets
- AliBaba Cloud Storage
- E2E Networks Buckets
- Google Cloud Buckets
- RSA Private Keys
- AWS Creds
Usage
Command | Description |
---|---|
!start | Starts the bot in the specified channel. |
!scan <app_id> | Scans the provided app id (ex: com.google.play) |
!get_findings <app_id> | Gets previously found findings for a specified app id |
!update_notified <finding_id_num> | Used to set the finding (based on the finding id) as reported (for reports handled outside of bot). |
!get_email <finding_id_num> <researcher_name> | Create a report for the specified finding with the specified researchers name (submission is previewed before sending). |
!add_note <Not to application developer here> | Adds a note to a finding submission (used after !get_email) |
!cancel_email | Cancels an email after being previewed through !get_email |
!send_email | Sends an email after being previewed through !get_email |