tinkersec / TwitterAccountTakeoverLinks
Hijacks Twitter Accounts and Automates Sending to Bitcoin Address: bc1qxy2kgdygjrsqtzq2n0yrf2493p83kkfjhx0wlh
☆50Updated 3 years ago
Alternatives and similar repositories for TwitterAccountTakeover
Users that are interested in TwitterAccountTakeover are comparing it to the libraries listed below
Sorting:
- Pastebin-scraper tool leverages the API of https://psbdmp.ws/ to find emails/domains dumped in pastebin.☆133Updated last year
- An OSINT tool to find contacts in order to report security vulnerabilities.☆268Updated 6 years ago
- Bug Bounty writeups, Vulnerability Research, Tutorials, Tips&Tricks☆207Updated last year
- Some random scripts. Just trying to be like the cool kids.☆101Updated 7 years ago
- ☆64Updated last year
- Anti-Automation System☆130Updated 4 years ago
- A list of universities with vulnerability disclosure policies☆53Updated 4 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆82Updated 4 years ago
- A tool written in python for scraping firebase data☆44Updated 5 years ago
- A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (crypto…☆205Updated 3 years ago
- A simple Pastebin monitor which looks for interesting things and saves them to disk.☆51Updated 4 years ago
- An XMLRPC brute forcer targeting Wordpress written in Python 3. (DISCONTINUED)☆64Updated 6 months ago
- Exploiting misconfigured firebase databases☆123Updated 6 years ago
- Passive reconnaissance/enumeration of interesting targets by watching for SSL certificates being issued☆68Updated 3 years ago
- Web Application recon automation☆125Updated 5 years ago
- Improved DOS exploit for wordpress websites (CVE-2018-6389)☆127Updated 5 years ago
- Search engine scraper tool with BASH script.☆83Updated 6 years ago
- scylla.sh db dumps and more☆139Updated 2 months ago
- Pown.js is a security testing an exploitation toolkit built on top of Node.js and NPM.☆262Updated 2 years ago
- Extension of sublister tool to check for subdomain takeovers☆23Updated 7 years ago
- Simple PHP webshell with a JPEG header to bypass weak image verification checks☆67Updated 10 years ago
- Slides from my talk at ISC 2018 in Beijing 2018☆94Updated 6 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆166Updated 6 years ago
- Tool for exploiting SQL injection vulnerabilities that sqlmap can't find.☆97Updated 7 years ago
- 🔓Crack hashes using online rainbow & lookup table attack services, right from your terminal.☆234Updated 3 years ago
- Scrape/Parse Pastebin using GO and expression grammar (PEG)☆96Updated last year
- Locky generates "really" strong yet easy to remember passwords.☆71Updated 6 years ago
- Decipher hashes using online rainbow & lookup table attack services.☆155Updated 3 years ago
- List of domains in scope for bug bounties (HackerOne, Bugcrowd, etc.)☆74Updated 4 years ago
- Search .git folders for emails and URL's that should otherwise be hidden☆33Updated 4 years ago