oliviagallucci / delete-twitter-likes
Bulk delete Tweets you have liked on Twitter!
☆13Updated last year
Alternatives and similar repositories for delete-twitter-likes:
Users that are interested in delete-twitter-likes are comparing it to the libraries listed below
- Some security by obscurity using port-jumping.☆14Updated 5 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 3 months ago
- Local Privilege Escalation Miner☆23Updated 2 years ago
- Parser for Windows PowerShell script block logs☆13Updated last month
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- ☆25Updated 3 months ago
- find historical account IDs for specified twitter @ name using wayback machine captures☆23Updated 3 years ago
- Configurable, Community driven, HTTP C2 Profile☆14Updated 2 months ago
- A tool to generate macOS initial access vectors using Prelude Operator payloads☆17Updated 2 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆23Updated 2 months ago
- Yara rules written by me, for free use.☆18Updated 3 years ago
- ☆18Updated 4 months ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆40Updated 2 years ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆47Updated 2 years ago
- A feed of malware samples curated from threat intelligence sources.☆25Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- Open YARA scan- and search engine☆19Updated 2 months ago
- ☆14Updated 8 months ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆22Updated 11 months ago
- Python support package to parse IP and host inputs from network based tooling☆11Updated last year
- ☆12Updated 2 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆14Updated 3 months ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Database for custom made as well as publicly available stage-2 or beacons or stageless payloads, used by loaders/stage-1/stagers, or for …☆11Updated last week
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆17Updated last year
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago