|User since||June 2, 2012|
|Number of add-ons developed||0 add-ons|
|Average rating of developer's add-ons||Not yet rated|
false positives Rated 1 out of 5 stars
Tested the product for a couple of hours. Consistently produces false positives.First I installed it on owasp medusa. The dialogues it produces are pretty meaningless. So I thought that maybe the plugin required a more current version of ff.Installed on ff 23. The same meaningless dialogues came up.When actually running it against a username/password field, fireforce consistently produced false positives.Against DVWA, I kept getting "password found" for an attack using a dictionary. The passwords "found" by fireforce were not the actual passwords.This product seems pretty broken.
Malware. Do not touch. Rated 1 out of 5 stars
This product still injects malware that contiminates the browser with third-party advertising.
Maleare injection Rated 1 out of 5 stars
The script injects html into dom, inserting code that displays the authors affiliate links.
Effectively, the author hijacks amazon's identity to try and make sales from superfish.
Joel, the author, got busted a while ago for hijacking users browsers with his affiliate links. He apologized for it. But now he is at it again: