jolle / expired-tweetsLinks
π¦ Find tweets that contain expired or claimable URLs from your Twitter archive.
β44Updated 6 years ago
Alternatives and similar repositories for expired-tweets
Users that are interested in expired-tweets are comparing it to the libraries listed below
Sorting:
- An open source tool to capture screen and network instantly helping security engineers reproduce bugsβ83Updated 4 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.β45Updated last month
- The databases, API's and managers behind https://websecweekly.orgβ50Updated 10 years ago
- β78Updated 10 years ago
- Slack message encryptor/decryptor for desktop app and browserβ170Updated 7 years ago
- An example of obtaining RCE via Redis and CSRFβ76Updated 9 years ago
- β105Updated 6 years ago
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacksβ19Updated 10 years ago
- β25Updated 8 years ago
- β145Updated 9 years ago
- Testing/collecting some container breakoutsβ94Updated 6 years ago
- Common Findings Databaseβ102Updated 6 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ouβ¦β80Updated last year
- Mass zone transfer python scriptβ16Updated 9 years ago
- Tampermonkey script to extract information from Meteor applicationsβ34Updated 8 years ago
- a grep -r for secretsβ178Updated 3 years ago
- Analysis Suite For EAP Enabled Wireless Networksβ125Updated 6 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.β41Updated 6 years ago
- Use burp's JS static code analysis on code from your local system.β42Updated 8 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any languβ¦β157Updated 6 years ago
- Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.β143Updated 7 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) Fileβ161Updated 9 years ago
- PwnableWeb is a suite of web applications for use in information security training.β87Updated 11 years ago
- A toolkit to generate an offline Chrome extension to detect phishing attacks using a bespoke convolutional neural network.β132Updated 8 years ago
- A collection of my quick and dirty scripts for vulnerability POC and detectionsβ76Updated 3 months ago
- Test a network's egress controls with various levels of success and failure.β104Updated 3 years ago
- Stargateβ95Updated 9 years ago
- A monitoring tool for certificate transparency of ProtonMail's SSL/TLS certificatesβ51Updated 7 years ago
- Loot email addresses from commit entriesβ56Updated 3 years ago
- Continuous Integration and Development ExploiteRβ86Updated 2 years ago