oliviagallucci / delete-twitter-likes
Bulk delete Tweets you have liked on Twitter!
☆11Updated last year
Related projects ⓘ
Alternatives and complementary repositories for delete-twitter-likes
- API and CLI tool to fetch and query Chome DevTools heap snapshots (Python & Playwright)☆14Updated 5 months ago
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆16Updated 2 years ago
- A TikTok - Live Watcher application for tty / cli - for the unlikely situation when you live in tty, but want to watch TikTok Live.☆25Updated last month
- Offensive Security Vault structure for Obsidian☆17Updated last year
- Notify is a helper utility written in Go that allows you to post output to multiple platforms.☆15Updated 2 years ago
- Some security by obscurity using port-jumping.☆14Updated 2 months ago
- A port scanner written in PowerShell☆13Updated 3 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Hackers Don't Give A Shit☆15Updated 4 years ago
- A collection of my public security advisories.☆23Updated 5 months ago
- Python support package to parse IP and host inputs from network based tooling☆10Updated last year
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 2 years ago
- ☆16Updated last year
- Open YARA scan- and search engine☆16Updated last year
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆14Updated 2 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆12Updated 2 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆30Updated 3 years ago
- Developper-proof prevention of SQL injection (java library)☆11Updated 3 years ago
- Ransomware for demonstration☆14Updated last year
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 3 years ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆15Updated this week
- Search Google Dorks like Chad. / Broken link hijacking tool.☆24Updated last month
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆26Updated 3 weeks ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Create an AMI with CobaltStrike and related tools.☆8Updated 2 months ago
- Manage and access your Kali Linux or Parrot Security VM from the terminal (SSH support + file sharing, especially convenient during CTFs,…☆20Updated 3 months ago
- ☆13Updated 3 months ago
- The Hacker's Choice☆13Updated this week
- List of sources for cybersecurity news☆34Updated last year
- Computer Network Exploitation (CNE) Field Manual☆13Updated 7 months ago