find historical account IDs for specified twitter @ name using wayback machine captures
☆25Oct 15, 2021Updated 4 years ago
Alternatives and similar repositories for twid
Users that are interested in twid are comparing it to the libraries listed below
Sorting:
- ☆11Feb 8, 2022Updated 4 years ago
- Simple stacking window manager for X11☆11Aug 26, 2020Updated 5 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- ☆12Nov 21, 2023Updated 2 years ago
- Use SQL to instantly query host, DNS and exploit information using Shodan. Open source CLI. No DB required.☆29Feb 18, 2026Updated 2 weeks ago
- ☆30Jan 30, 2021Updated 5 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- ☆10Aug 9, 2024Updated last year
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Feb 7, 2026Updated 3 weeks ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- ☆11Oct 17, 2024Updated last year
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- A download manager in GTK tailored for GNOME☆10Apr 8, 2024Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 9 months ago
- Microbrowser for Microcontroller☆12Aug 2, 2020Updated 5 years ago
- The implementation of sdhash, the algorithm to calculate similarity digests, rewritten in pure go language 🐹☆10Jan 17, 2021Updated 5 years ago
- A common database library for managing and querying security data☆18Jan 12, 2026Updated last month
- The Wrangler plugin for Vim☆10Dec 30, 2016Updated 9 years ago
- Next-gen (SO)und (PRO)cessing: golang native, upscaler, downscaler, transcoder, neural networks, full mem & on-the-fly & streaming.☆14Feb 17, 2025Updated last year
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- An auto-configuring reverse DNS name server☆11Nov 2, 2025Updated 4 months ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- Github Workflows üzerinde Çalışan A101 Aktüel Telegam Bot☆14Sep 29, 2023Updated 2 years ago
- ☆16Jan 17, 2023Updated 3 years ago
- PoC of creating desktop widgets using web technologies, this one uses React + Tailwind☆10Jun 2, 2025Updated 9 months ago
- A radio frequency database☆11Jun 8, 2023Updated 2 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Bruteforce logins with python☆11Jul 12, 2022Updated 3 years ago
- Veil is a code generator which exposes Golang packages via a generated C ABI that is consumed by host languages through FFI. Currently, V…☆10Sep 29, 2017Updated 8 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago