An Automation Tool Written in Python which uses Twitter and GitHub API
☆15Jan 25, 2022Updated 4 years ago
Alternatives and similar repositories for GetTweets
Users that are interested in GetTweets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- Welcome! This repo is a conglomeration of tips, tricks, tools, and data analysis to use while doing web application security assessments,…☆14Jan 13, 2019Updated 7 years ago
- Power of .bashrc and .bash_aliases☆31Nov 6, 2022Updated 3 years ago
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Feb 15, 2022Updated 4 years ago
- Project Morya is just a collection of bash scripts that runs iteratively to carry out various tools and recon process & store output in a…☆72Mar 5, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Feb 4, 2022Updated 4 years ago
- S3 Recon tips and tricks collected from different resources,Sorry if i missed to mention all resources owners☆27Nov 13, 2021Updated 4 years ago
- A series of writes about “Binary Exploitation”.☆85Jun 25, 2023Updated 2 years ago
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 8 months ago
- Tips For Bug Bounty Hunters☆86Jul 16, 2022Updated 3 years ago
- Payloads for Web Application Security Testing☆15Dec 1, 2025Updated 5 months ago
- A BurpSuite extension for vulnerability Scanning☆29Feb 16, 2024Updated 2 years ago
- ☆13Jan 4, 2022Updated 4 years ago
- ☆12Dec 26, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆27Jan 25, 2020Updated 6 years ago
- I will share my bug bounty tips here☆32Mar 6, 2023Updated 3 years ago
- Simple recon tool automates your recon process☆16Apr 15, 2023Updated 3 years ago
- bug bounty automation☆14Jul 2, 2021Updated 4 years ago
- Collection of web app methodology from initial recon into exploit known vulnerability. Used when conducting Bug Bounty, Penetration Testi…☆13Oct 23, 2021Updated 4 years ago
- Solutions for Standard Problems on Algorithms & Data Structures in C++☆16Feb 7, 2024Updated 2 years ago
- Complite Web Application Penetration Testing☆28Jul 9, 2021Updated 4 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Oct 20, 2018Updated 7 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆122Aug 1, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Nuclei Templates - Here you will find the templates I use while hunting☆120Sep 27, 2021Updated 4 years ago
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Nov 9, 2021Updated 4 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- check if the source code compressed and uploaded to the server by mistake☆10Feb 21, 2022Updated 4 years ago
- ☆12Oct 15, 2024Updated last year
- ☆11May 25, 2021Updated 4 years ago
- 🔍LeakScanner - Inspired by Gitleaks☆14Aug 23, 2024Updated last year
- ☆13Jul 13, 2023Updated 2 years ago
- Fast Subdomain Enumeration Tool made with Bash only 💯☆15Nov 3, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆535Jul 16, 2021Updated 4 years ago
- Google Hack Database dork automatic tool.☆27Dec 11, 2017Updated 8 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆12Feb 16, 2021Updated 5 years ago
- ☆12Jan 4, 2022Updated 4 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- Web API for nuclei and subfinder will help you automate your entire security testing workflow since you can host it anywhere and make it …☆61Sep 14, 2022Updated 3 years ago
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago