tinkersec / TwitterAccountTakeover
Hijacks Twitter Accounts and Automates Sending to Bitcoin Address: bc1qxy2kgdygjrsqtzq2n0yrf2493p83kkfjhx0wlh
☆49Updated 3 years ago
Alternatives and similar repositories for TwitterAccountTakeover:
Users that are interested in TwitterAccountTakeover are comparing it to the libraries listed below
- Some random scripts. Just trying to be like the cool kids.☆92Updated 6 years ago
- A simple Pastebin monitor which looks for interesting things and saves them to disk.☆51Updated 4 years ago
- Search .git folders for emails and URL's that should otherwise be hidden☆33Updated 4 years ago
- Simple Karma Attack☆69Updated 4 years ago
- Detect exposed API keys on GitHub commits.☆34Updated 2 years ago
- Get URLs from the Wayback Machine. Able to handle large outputs.☆22Updated last year
- A list of universities with vulnerability disclosure policies☆50Updated 3 years ago
- A tool written in python for scraping firebase data☆42Updated 5 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Updated 7 years ago
- Everything You Need☆18Updated 4 years ago
- Passive reconnaissance/enumeration of interesting targets by watching for SSL certificates being issued☆67Updated 2 years ago
- PHP Cookie Stealing Scripts for use in XSS☆27Updated 6 years ago
- Search engine scraper tool with BASH script.☆84Updated 5 years ago
- Serbian/English wordlist for https://github.com/maurosoria/dirsearch☆19Updated 8 years ago
- Reverse engineers GQL Schema and generates template payloads☆46Updated 6 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 6 years ago
- An XMLRPC brute forcer targeting Wordpress written in Python 3. (DISCONTINUED)☆63Updated 4 years ago
- ☆19Updated 5 years ago
- Personal Collection of Awesome Google Dorks☆30Updated 5 years ago
- Social Network Tabs Wordpress Plugin Vulnerability - CVE-2018-20555☆73Updated 4 years ago
- Tool for exploiting SQL injection vulnerabilities that sqlmap can't find.☆96Updated 6 years ago
- scylla.sh db dumps and more☆135Updated 4 years ago
- Sync RGB devices to your spotify songs. Sync your keyboard, sync your headset, sync your mouse, sync your toaster, sync your toilet, sync…☆32Updated 4 years ago
- A static website template for security pages.☆50Updated 8 months ago
- PortForce - A custom port Brute Forcing Tool for CTF's & Pentests☆33Updated 7 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Updated 2 years ago
- A tool to exploit imagetragick vulnerability to gain remote code execution☆20Updated 7 years ago
- Framework for exploiting local vulnerabilities☆84Updated last year
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 3 years ago