jolle / expired-tweets
🐦 Find tweets that contain expired or claimable URLs from your Twitter archive.
☆42Updated 5 years ago
Related projects: ⓘ
- ☆25Updated 7 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆44Updated 7 years ago
- An open source tool to capture screen and network instantly helping security engineers reproduce bugs☆83Updated 3 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆78Updated 3 months ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- Tampermonkey script to extract information from Meteor applications☆33Updated 7 years ago
- ☆77Updated 9 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Updated 9 years ago
- A Firefox extension and WebSocket handler that checks S3/Google/Azure buckets while your browse.☆37Updated 4 years ago
- The databases, API's and managers behind https://websecweekly.org☆51Updated 9 years ago
- Chrome extension that spots web accessible Git repos.☆25Updated 8 years ago
- Common Findings Database☆100Updated 5 years ago
- ☆27Updated 7 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆158Updated 8 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆57Updated 2 years ago
- Puny Domain Name Check☆36Updated 5 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆44Updated 5 years ago
- jPurify☆64Updated 7 years ago
- Utility to generate similar IDN domain names☆47Updated 6 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆120Updated 5 years ago
- ☆52Updated 8 years ago
- A service for monitoring whether chat apps etc. leak URLs☆56Updated 6 years ago
- This is a list of Computer and Network Security Axioms☆29Updated 4 years ago
- Loot email addresses from commit entries☆56Updated 2 years ago
- unhash is a set of tools designed to enable better password auditing☆119Updated 2 years ago
- This tool is based on regex with effective standards for detecting phishing sites in real time using certstream and can also detect puny…☆80Updated 5 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆188Updated 6 years ago
- Vulnerable Web applications Generator☆83Updated 6 years ago
- Mass zone transfer python script☆15Updated 8 years ago