Hijacks Twitter Accounts and Automates Sending to Bitcoin Address: bc1qxy2kgdygjrsqtzq2n0yrf2493p83kkfjhx0wlh
☆50Mar 28, 2022Updated 3 years ago
Alternatives and similar repositories for TwitterAccountTakeover
Users that are interested in TwitterAccountTakeover are comparing it to the libraries listed below
Sorting:
- This is a multi-use bash script for Linux systems to automate best hacking tools installation.☆12Jun 25, 2025Updated 8 months ago
- Coverage-guided fuzzing for Python☆20Oct 31, 2017Updated 8 years ago
- nmap -> searchploit -> GoBuster/Eyewitness & LDAPsearch & SMBclient & Showmount☆21Apr 26, 2020Updated 5 years ago
- PhantomsGate: Advanced Shellcode Injection Technique☆27Jul 15, 2024Updated last year
- This is a malware analyzer for Mac OS X that extends the Cuckoo Sandbox project (https://cuckoosandbox.org/)☆23Jul 8, 2016Updated 9 years ago
- LangChain Agent☆11Nov 25, 2025Updated 3 months ago
- SI.py☆14Oct 28, 2022Updated 3 years ago
- A simple Commandline Program Developed Using Python3 to make GNU Privacy Guard Program easy to use for beginners.☆10Updated this week
- A tool for finding CNAME of subdomains and checking clickjacking vulnerability.☆12Jun 15, 2025Updated 8 months ago
- PassWord List Maker☆17Oct 29, 2018Updated 7 years ago
- This tool is uses for SQLI+LFI+XSS+LFI+RCE Dorking and finding vulnerable sites.☆31Feb 19, 2019Updated 7 years ago
- TOK.PY☆11Nov 14, 2022Updated 3 years ago
- Pentesting, Red Teaming. Reports☆11May 25, 2023Updated 2 years ago
- User Recon Find usernames across over 75 social networks This is useful if you are running an investigation to determine the usage of the…☆15Feb 8, 2021Updated 5 years ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- Diameter TCP to SCTP proxy☆13Feb 4, 2012Updated 14 years ago
- ☆12Aug 1, 2025Updated 7 months ago
- A tool which can perform advance recon automatically. Sit back and enjoy this tool work for you and find target's subdomains automaticall…☆11Sep 17, 2021Updated 4 years ago
- Python substitute and transposition ciphers including Vigenère Cipher, Rail Fence Cipher, Caesar Cipher☆10Jul 16, 2021Updated 4 years ago
- INTERNATIONAL 30 COUNTRY CRACKER 6,7,AND CRACKING FROM OWN PASSWORD HAS BEEN ADDED ENJOY GUYS🥰☆11Feb 1, 2022Updated 4 years ago
- ☆10Jan 3, 2022Updated 4 years ago
- IDA Terminal☆17Feb 27, 2026Updated last week
- An OSINT tool to easily generate Facebook url's to access publicly available information from Facebook profiles☆12Feb 22, 2017Updated 9 years ago
- Recover private keys from a (corrupted) wallet.dat (Reddcoin)☆11Dec 17, 2020Updated 5 years ago
- This is how you can merge multiple java files into one file. This is very useful for CodinGame participants because CodinGame requires yo…☆12May 16, 2020Updated 5 years ago
- ☆12Aug 16, 2024Updated last year
- Dynamic lock for GNOME. Use your smart phone/watch/band to lock your desktop automatically when you step away.☆12Jul 11, 2025Updated 7 months ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆14Aug 30, 2021Updated 4 years ago
- Lockstitch is an incremental, stateful cryptographic primitive for symmetric-key cryptographic operations (e.g. hashing, encryption, mess…☆12Feb 5, 2026Updated last month
- Uses the Google Places API to get the name, email-address and website of businesses☆10Sep 14, 2019Updated 6 years ago
- ☆13May 9, 2023Updated 2 years ago
- IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It a…☆15May 2, 2022Updated 3 years ago
- procs to work with multicast groups and ip broadcast☆14May 20, 2024Updated last year
- FACEBOOK CLONING NEW TOOL NUMBER CLONING , MAIL CLONING , AND FRIENDLIST CLONING ALL IN ONE TOOL …☆12Jan 8, 2022Updated 4 years ago
- Trove guest image elements☆12Apr 6, 2017Updated 8 years ago
- Five Icons on your iOS 11 and 12 Dock☆11Feb 25, 2020Updated 6 years ago
- Filter URLs that match your scope file for bugbounty.☆11May 23, 2023Updated 2 years ago
- Valgrind tool for tracing memory accesses☆13Feb 6, 2025Updated last year