jolle / expired-tweetsLinks
🐦 Find tweets that contain expired or claimable URLs from your Twitter archive.
☆43Updated 6 years ago
Alternatives and similar repositories for expired-tweets
Users that are interested in expired-tweets are comparing it to the libraries listed below
Sorting:
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- ☆25Updated 7 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 8 years ago
- JIRA Secure Attachment Looter☆70Updated 4 years ago
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Updated 10 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- Tampermonkey script to extract information from Meteor applications☆34Updated 8 years ago
- Testing/collecting some container breakouts☆94Updated 5 years ago
- A Firefox extension and WebSocket handler that checks S3/Google/Azure buckets while your browse.☆37Updated 4 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Red Team Resources☆60Updated 6 years ago
- ☆78Updated 9 years ago
- XSS in pastebin.com and reddit.com via unsanitized markdown output☆87Updated 7 years ago
- CTF website frontend for SecGen☆21Updated 7 years ago
- Hunt Open MongoDB instances☆79Updated 5 years ago
- Common Findings Database☆100Updated 5 years ago
- A dashboard for interesting DOM tricks/techniques.☆35Updated 4 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated 11 months ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.☆142Updated 6 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆192Updated 7 years ago
- An open source tool to capture screen and network instantly helping security engineers reproduce bugs☆83Updated 4 years ago
- unhash is a set of tools designed to enable better password auditing☆119Updated 2 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- Amazon S3 bucket spelunking!☆86Updated 7 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- a grep -r for secrets☆178Updated 3 years ago
- The databases, API's and managers behind https://websecweekly.org☆50Updated 10 years ago
- Slides from various talks that I've given over the years☆118Updated last year