Rapidscan🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+520%)
Covid Twitter BertPretrained BERT model for analysing COVID-19 Twitter data
Stars: ✭ 101 (-19.2%)
PerunPerun是一款主要适用于乙方安服、渗透测试人员和甲方RedTeam红队人员的网络资产漏洞扫描器/扫描框架
Stars: ✭ 773 (+518.4%)
StocktalkData collection tool for social media analytics
Stars: ✭ 765 (+512%)
TwitterbotGolang smart Twitter bot
Stars: ✭ 111 (-11.2%)
TwitterTwitter API for Laravel 5.5+, 6.x, 7.x & 8.x
Stars: ✭ 755 (+504%)
21 Recipes📕 An R/rtweet edition of Matthew A. Russell's Python Twitter Recipes Book
Stars: ✭ 69 (-44.8%)
SpoilerwallSpoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!
Stars: ✭ 754 (+503.2%)
SarcasmdetectionSarcasm detection on tweets using neural network
Stars: ✭ 99 (-20.8%)
NotifyA dead simple Go library for sending notifications to various messaging services.
Stars: ✭ 727 (+481.6%)
Red Team Curation ListA list to discover work of red team tooling and methodology for penetration testing and security assessment
Stars: ✭ 68 (-45.6%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (+482.4%)
Ssrf TestingSSRF (Server Side Request Forgery) testing resources
Stars: ✭ 1,718 (+1274.4%)
IntegrationsConnect your App to Multiple Messaging Channels with the W3C Open standard.
Stars: ✭ 721 (+476.8%)
AutohookAutomatically setup and serve webhooks for the Twitter Account Activity API
Stars: ✭ 67 (-46.4%)
Trump2cashA stock trading bot powered by Trump tweets
Stars: ✭ 6,054 (+4743.2%)
TiaYour Advanced Twitter stalking tool
Stars: ✭ 98 (-21.6%)
DevtwitterBringing dev.to headlines to your Twitter browsing experience.
Stars: ✭ 66 (-47.2%)
CtfrAbusing Certificate Transparency logs for getting HTTPS websites subdomains.
Stars: ✭ 1,535 (+1128%)
AutordpwnThe Shadow Attack Framework
Stars: ✭ 688 (+450.4%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+808.8%)
GorsairGorsair hacks its way into remote docker containers that expose their APIs
Stars: ✭ 678 (+442.4%)
Share Selected Textshare selected text on twitter, buffer, and some others. Inspired by medium.com
Stars: ✭ 64 (-48.8%)
Powershell RatPython based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+408.8%)
Flutter twitter cloneFully functional Twitter clone built in flutter framework using Firebase realtime database and storage
Stars: ✭ 1,123 (+798.4%)
Rtweet🐦 R client for interacting with Twitter's [stream and REST] APIs
Stars: ✭ 623 (+398.4%)
DeepseaDeepSea Phishing Gear
Stars: ✭ 96 (-23.2%)
Clone Wars100+ open-source clones of popular sites like Airbnb, Amazon, Instagram, Netflix, Tiktok, Spotify, Whatsapp, Youtube etc. See source code, demo links, tech stack, github stars.
Stars: ✭ 12,604 (+9983.2%)
Attack Surface Detector BurpThe Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters
Stars: ✭ 63 (-49.6%)
SuboverA Powerful Subdomain Takeover Tool
Stars: ✭ 607 (+385.6%)
Simplified TwitterRemove distractions from the new Twitter layout. Extension for Chrome, Firefox, Safari, Edge & More
Stars: ✭ 111 (-11.2%)
Git HoundReconnaissance tool for GitHub code search. Finds exposed API keys using pattern matching, commit history searching, and a unique result scoring system.
Stars: ✭ 602 (+381.6%)
Peony TwitterAn asynchronous Twitter API client for Python 3.5+
Stars: ✭ 62 (-50.4%)
Holeheholehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function.
Stars: ✭ 568 (+354.4%)
Resource filesmosquito - Automating reconnaissance and brute force attacks
Stars: ✭ 95 (-24%)
BettertweetdeckA browser extension to improve TweetDeck with a lot of features
Stars: ✭ 558 (+346.4%)
TwootAn open source light-weight OS X twitter client based on jQuery and Fluid (deprecated!)
Stars: ✭ 61 (-51.2%)
Platypus🔨 A modern multiple reverse shell sessions manager wrote in go
Stars: ✭ 559 (+347.2%)
SarenkaOSINT tool - gets data from services like shodan, censys etc. in one app
Stars: ✭ 120 (-4%)
DawsAdvanced Web Shell
Stars: ✭ 551 (+340.8%)
RedsnarfRedSnarf is a pen-testing / red-teaming tool for Windows environments
Stars: ✭ 1,109 (+787.2%)
AwspxA graph-based tool for visualizing effective access and resource relationships in AWS environments.
Stars: ✭ 546 (+336.8%)
Kafka Connect TwitterKafka Connect connector to stream data in real time from Twitter.
Stars: ✭ 94 (-24.8%)
Pentesting CookbookA set of recipes useful in pentesting and red teaming scenarios
Stars: ✭ 82 (-34.4%)
JetweetJetweet is a mini twitter clone with basic functionalities, Made using ASP.NET CORE and Entity framework technologies
Stars: ✭ 29 (-76.8%)
Ransom0Ransom0 is a open source ransomware made with Python, designed to find and encrypt user data.
Stars: ✭ 105 (-16%)
PrismaticaResponsive Command and Control System
Stars: ✭ 81 (-35.2%)
GogitdumperDump exposed HTTP .git fast
Stars: ✭ 27 (-78.4%)
HuginnCreate agents that monitor and act on your behalf. Your agents are standing by!
Stars: ✭ 33,694 (+26855.2%)
VenomVenom - A Multi-hop Proxy for Penetration Testers
Stars: ✭ 1,228 (+882.4%)