MuhammadWaseem29 / intercom-exploitLinks
Identity Verification is not setup on the Intercom widget, allowing an attacker to impersonate a user and access their chat history. reference:
☆0Updated 4 months ago
Alternatives and similar repositories for intercom-exploit
Users that are interested in intercom-exploit are comparing it to the libraries listed below
Sorting:
- xsschecker tool checking reflected endpoints finding possible xss vulnerable endpoints.☆23Updated 9 months ago
- ☆16Updated 6 months ago
- anveshan is a completed script that helps to automate your recon process, It finds subdomains, urls, js files, parameters, screenshots, a…☆32Updated 9 months ago
- Tools and methods that I personally use for Recon and Exploitations☆44Updated 3 months ago
- ☆47Updated last month
- Bypass Reset Password Code Lead to Account Takeover☆26Updated 10 months ago
- KakHunt is a python GUI Tool private tool which earns me 100s of bugs every month. It spawns URLS and filters Sensitive Info.☆50Updated 2 years ago
- ☆64Updated 11 months ago
- ☆27Updated last year
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆23Updated 3 years ago
- Ultimate Wordlist for Web Content Discovery☆68Updated 3 months ago
- Cross Injector — A Python Script for Cross-Site Scripting (XSS) Detection☆39Updated last month
- Gather results of dorks across a number of search engines☆133Updated 3 months ago
- A simple plugin to export JS files from one or multiple targets☆43Updated last year
- BetterBugBounty - Here tools are classic, bugs are hunted, and nostalgia is the ultimate weapon!☆29Updated last year
- ☆17Updated last year
- Zip-Finder is an automated tool that scans the Wayback Machine for ZIP, TAR, SQL, and other backup files. It automatically checks for sna…☆1Updated 2 weeks ago
- RobinHood - Bug Hunting Recon Automation Script☆36Updated 2 years ago
- Welcome to the 403 and 401 Bypass Techniques and Bug Bounty Tips repository! This repo is a collection of methods and strategies to bypas…☆18Updated 7 months ago
- my nuclei templates☆41Updated last year
- Find The Admin Panel & SQL Injection Endpoints, Using Google Dorks !!!☆20Updated 8 months ago
- ☆74Updated 10 months ago
- This python based tool can be used to discover API keys, access tokens, and other sensitive data in JavaScript files. It can scan JavaScr…☆12Updated 9 months ago
- Xssor.go is a xss reflections checker for urls☆71Updated 2 years ago
- Nuclei Templates☆23Updated 9 months ago
- ☆43Updated 10 months ago
- ☆40Updated 3 years ago
- generates unique subdomain names and runs httpx on them☆14Updated last year
- subfalcon is a subdomain enumeration tool that allows you to discover and monitor subdomains for a given list of domains or a single doma…☆48Updated 8 months ago
- ☆3Updated 4 months ago