Tweets metadata scraper & activity analyzer
☆2,977Nov 14, 2023Updated 2 years ago
Alternatives and similar repositories for tweets_analyzer
Users that are interested in tweets_analyzer are comparing it to the libraries listed below
Sorting:
- The most complete open-source tool for Twitter intelligence analysis☆1,966Feb 6, 2019Updated 7 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,227Nov 20, 2025Updated 3 months ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆203Jan 4, 2017Updated 9 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,291Jul 10, 2024Updated last year
- Phishing catcher using Certstream☆1,791Aug 13, 2024Updated last year
- Analyze the security of any domain by finding all the information possible. Made in python.☆1,861Dec 29, 2022Updated 3 years ago
- Data analysis and OSINT framework for Twitter☆413Oct 18, 2020Updated 5 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,691Nov 3, 2019Updated 6 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆9,219Oct 4, 2023Updated 2 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Decrypted content of eqgrp-auction-file.tar.xz☆4,198May 24, 2017Updated 8 years ago
- Command line utility for searching and downloading exploits☆1,813Sep 10, 2025Updated 5 months ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,651Nov 24, 2020Updated 5 years ago
- raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees usin…☆796May 18, 2020Updated 5 years ago
- Know the dangers of credential reuse attacks.☆2,094Dec 9, 2025Updated 2 months ago
- WarBerryPi - Tactical Exploitation☆2,224Nov 9, 2019Updated 6 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,600Jun 20, 2024Updated last year
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆629Oct 16, 2018Updated 7 years ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,213Feb 6, 2022Updated 4 years ago
- A Tool for Domain Flyovers☆5,906May 22, 2022Updated 3 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,069Apr 26, 2020Updated 5 years ago
- An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, fo…☆16,339Feb 23, 2023Updated 3 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆1,407Jan 9, 2024Updated 2 years ago
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,606Apr 15, 2025Updated 10 months ago
- Incredibly fast crawler designed for OSINT.☆12,712Feb 10, 2026Updated 3 weeks ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,941Mar 22, 2024Updated last year
- Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg☆1,986Apr 14, 2017Updated 8 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,092Feb 19, 2019Updated 7 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Scrape the Twitter Frontend API without authentication.☆4,005Oct 30, 2023Updated 2 years ago
- Find interesting Amazon S3 Buckets by watching certificate transparency logs.☆1,800Feb 28, 2025Updated last year
- Tool to scan for secret files on HTTP servers☆2,103Feb 4, 2026Updated last month
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,863Jun 28, 2024Updated last year
- HTA encryption tool for RedTeams☆1,422Nov 9, 2022Updated 3 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆411May 8, 2023Updated 2 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Sep 11, 2017Updated 8 years ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,958Feb 20, 2026Updated last week
- A tool to dump the login password from the current linux user☆4,089Sep 5, 2025Updated 6 months ago