jolle / expired-tweets
🐦 Find tweets that contain expired or claimable URLs from your Twitter archive.
☆43Updated 5 years ago
Alternatives and similar repositories for expired-tweets:
Users that are interested in expired-tweets are comparing it to the libraries listed below
- ☆25Updated 7 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆44Updated 7 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Updated 9 years ago
- ☆61Updated 7 years ago
- Common Findings Database☆100Updated 5 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆47Updated 9 years ago
- A Firefox extension and WebSocket handler that checks S3/Google/Azure buckets while your browse.☆37Updated 4 years ago
- XSS in pastebin.com and reddit.com via unsanitized markdown output☆87Updated 6 years ago
- Quickly add disruptive unicode, dangerous strings, and more to your clipboard.☆25Updated 8 years ago
- Utility to generate similar IDN domain names☆47Updated 6 years ago
- The databases, API's and managers behind https://websecweekly.org☆50Updated 9 years ago
- Run DependencyCheck Against Your Orgs GitHub Repos.☆14Updated 7 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- ☆15Updated 9 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆158Updated 8 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Use burp's JS static code analysis on code from your local system.☆42Updated 8 years ago
- Loot email addresses from commit entries☆56Updated 2 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆190Updated 7 years ago
- Proof of Concept - Utilize misconfigured newsletter forms to spam / deny service to an inbox☆55Updated 3 years ago
- A collection of useful scripts for penetration testers☆81Updated 12 years ago
- Tampermonkey script to extract information from Meteor applications☆34Updated 8 years ago
- This is a list of Computer and Network Security Axioms☆30Updated 4 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆44Updated 5 years ago
- Analysis of wifi probe request data☆11Updated 7 years ago
- HackerTracker for iOS using Swift☆36Updated 2 years ago