jolle / expired-tweets
🐦 Find tweets that contain expired or claimable URLs from your Twitter archive.
☆43Updated 6 years ago
Alternatives and similar repositories for expired-tweets:
Users that are interested in expired-tweets are comparing it to the libraries listed below
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 7 years ago
- Tampermonkey script to extract information from Meteor applications☆34Updated 8 years ago
- ☆25Updated 7 years ago
- Utility to generate similar IDN domain names☆48Updated 7 years ago
- ☆53Updated 8 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Updated 10 years ago
- Common Findings Database☆100Updated 5 years ago
- ☆78Updated 9 years ago
- Loot email addresses from commit entries☆56Updated 2 years ago
- ☆61Updated 7 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆123Updated 6 years ago
- ☆104Updated 5 years ago
- ☆27Updated 7 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆159Updated 8 years ago
- ☆141Updated 8 years ago
- ☆17Updated 7 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆79Updated 9 months ago
- Burp Scanner XML Parser☆36Updated 10 years ago
- ☆32Updated 9 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆56Updated 3 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- An open source tool to capture screen and network instantly helping security engineers reproduce bugs☆83Updated 4 years ago
- jPurify☆66Updated 8 years ago
- The knife of the Admin & Security auditor☆42Updated 5 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆191Updated 7 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 6 years ago
- Chrome extension that spots web accessible Git repos.☆25Updated 9 years ago
- Amazon S3 bucket spelunking!☆86Updated 7 years ago