An Automation Tool Written in Python which uses Twitter and GitHub API
☆15Jan 25, 2022Updated 4 years ago
Alternatives and similar repositories for GetTweets
Users that are interested in GetTweets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Welcome! This repo is a conglomeration of tips, tricks, tools, and data analysis to use while doing web application security assessments,…☆14Jan 13, 2019Updated 7 years ago
- Power of .bashrc and .bash_aliases☆31Nov 6, 2022Updated 3 years ago
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Feb 15, 2022Updated 4 years ago
- Project Morya is just a collection of bash scripts that runs iteratively to carry out various tools and recon process & store output in a…☆72Mar 5, 2022Updated 4 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Feb 4, 2022Updated 4 years ago
- S3 Recon tips and tricks collected from different resources,Sorry if i missed to mention all resources owners☆27Nov 13, 2021Updated 4 years ago
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 6 months ago
- Tips For Bug Bounty Hunters☆86Jul 16, 2022Updated 3 years ago
- Payloads for Web Application Security Testing☆15Dec 1, 2025Updated 3 months ago
- A BurpSuite extension for vulnerability Scanning☆29Feb 16, 2024Updated 2 years ago
- ☆12Dec 26, 2021Updated 4 years ago
- SLAM - Simple Local Area Monitor is a lightweight tool for continuous local network monitoring and device discovery.☆18Jul 9, 2025Updated 8 months ago
- I will share my bug bounty tips here☆32Mar 6, 2023Updated 3 years ago
- Simple recon tool automates your recon process☆16Apr 15, 2023Updated 2 years ago
- bug bounty automation☆13Jul 2, 2021Updated 4 years ago
- Discovery Header Bug Bounty to DoD☆49Aug 20, 2021Updated 4 years ago
- Solutions for Standard Problems on Algorithms & Data Structures in C++☆16Feb 7, 2024Updated 2 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Oct 20, 2018Updated 7 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆122Aug 1, 2022Updated 3 years ago
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Nov 9, 2021Updated 4 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- check if the source code compressed and uploaded to the server by mistake☆10Feb 21, 2022Updated 4 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- ☆12Oct 15, 2024Updated last year
- 🔍LeakScanner - Inspired by Gitleaks☆14Aug 23, 2024Updated last year
- Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development …☆29Aug 13, 2022Updated 3 years ago
- ☆13Jul 13, 2023Updated 2 years ago
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 2 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Mar 16, 2026Updated last week
- 🎯 Chrome Extension - Passive scanner for Dependency Confusion vulnerabilities in npm/PyPI packages☆26Jan 31, 2026Updated last month
- Fast Subdomain Enumeration Tool made with Bash only 💯☆15Nov 3, 2021Updated 4 years ago
- Google Hack Database dork automatic tool.☆27Dec 11, 2017Updated 8 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆12Feb 16, 2021Updated 5 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- ☆12Jan 4, 2022Updated 4 years ago
- Web API for nuclei and subfinder will help you automate your entire security testing workflow since you can host it anywhere and make it …☆61Sep 14, 2022Updated 3 years ago
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- PrettyRecon-cli is an unofficial cli client for PrettyRecon. This tool can be used to trigger various tasks on prettyrecon as well as fe…☆10May 9, 2025Updated 10 months ago