oliviagallucci / delete-twitter-likes
Bulk delete Tweets you have liked on Twitter!
☆13Updated last year
Alternatives and similar repositories for delete-twitter-likes:
Users that are interested in delete-twitter-likes are comparing it to the libraries listed below
- A tool to generate macOS initial access vectors using Prelude Operator payloads☆17Updated 2 years ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- Write-Ups for TryHackMe☆22Updated 3 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆24Updated 4 months ago
- Some security by obscurity using port-jumping.☆14Updated last week
- Python support package to parse IP and host inputs from network based tooling☆11Updated last year
- A feed of malware samples curated from threat intelligence sources.☆25Updated last year
- Custom Binary Ninja Themes☆12Updated last year
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆47Updated 2 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Updated last year
- Rebuild of portspoof in GO with additional features.☆17Updated last week
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆19Updated 3 weeks ago
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆12Updated last year
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆40Updated 2 years ago
- ☆30Updated 5 months ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 6 months ago
- Proof-of-concept modular implant platform leveraging v8☆52Updated last month
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- find historical account IDs for specified twitter @ name using wayback machine captures☆23Updated 3 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆18Updated 4 months ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆21Updated 2 months ago
- Collection of my own detection rules☆20Updated last year
- Python wrappers for mal_unpack☆36Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Manage and access your Kali Linux or Parrot Security VM from the terminal (SSH support + file sharing, especially convenient during CTFs,…☆20Updated 2 months ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- ECC Public Key Cryptography☆37Updated last year
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 3 years ago