tinkersec / TwitterAccountTakeoverLinks
Hijacks Twitter Accounts and Automates Sending to Bitcoin Address: bc1qxy2kgdygjrsqtzq2n0yrf2493p83kkfjhx0wlh
☆50Updated 3 years ago
Alternatives and similar repositories for TwitterAccountTakeover
Users that are interested in TwitterAccountTakeover are comparing it to the libraries listed below
Sorting:
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 3 years ago
- An OSINT tool to find contacts in order to report security vulnerabilities.☆267Updated 5 years ago
- ☆64Updated last year
- find out when and where someone is posting to reddit☆133Updated 5 years ago
- Pastebin-scraper tool leverages the API of https://psbdmp.ws/ to find emails/domains dumped in pastebin.☆129Updated last year
- Search engine scraper tool with BASH script.☆83Updated 5 years ago
- Passive reconnaissance/enumeration of interesting targets by watching for SSL certificates being issued☆68Updated 3 years ago
- A simple Pastebin monitor which looks for interesting things and saves them to disk.☆51Updated 4 years ago
- Some random scripts. Just trying to be like the cool kids.☆96Updated 7 years ago
- System based on +500 blacklists and 5 external intelligences to detect internet potencially malicious hosts☆150Updated 3 years ago
- A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (crypto…☆207Updated 3 years ago
- Pown.js is a security testing an exploitation toolkit built on top of Node.js and NPM.☆261Updated 2 years ago
- Bug Bounty writeups, Vulnerability Research, Tutorials, Tips&Tricks☆202Updated last year
- A list of universities with vulnerability disclosure policies☆51Updated 4 years ago
- Search .git folders for emails and URL's that should otherwise be hidden☆34Updated 4 years ago
- scylla.sh db dumps and more☆139Updated 5 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆72Updated 5 years ago
- Tool for exploiting SQL injection vulnerabilities that sqlmap can't find.☆95Updated 7 years ago
- Retrieve an array of possible hash types corresponding to a given string.☆17Updated 2 years ago
- Anti-Automation System☆129Updated 4 years ago
- Decipher hashes using online rainbow & lookup table attack services.☆157Updated 2 years ago
- Facebook OSINT Collection and Analysis Tool☆53Updated 5 years ago
- URL fuzzing tool made of Python☆62Updated 7 months ago
- Scrape/Parse Pastebin using GO and expression grammar (PEG)☆97Updated 10 months ago
- Shared reverse shell over Discord☆133Updated 4 years ago
- Chrome extension designed for WordPress Vulnerability Scanning and information gathering!☆113Updated 2 years ago
- Simple PHP webshell with a JPEG header to bypass weak image verification checks☆65Updated 10 years ago
- A tool that serves as a Proof of Concept for the research I presented at DEF CON 26, "Compromising online accounts by cracking voicemail …☆160Updated last year
- recon-ng modules for Censys☆38Updated last year
- Parser for data dumps Collection #1 / Collection #2-5☆147Updated 6 years ago