TWINT is an advanced Twitter scraping & OSINT tool written in Python that doesn’t use Twitter’s API, allowing you to scrape a user’s followers, following, Tweets and more while evading most API limitations.
Formerly known as Tweep, Twint is an advanced Twitter scraping tool written in Python that allows for scraping Tweets from Twitter profiles without using Twitter’s API.
Twint utilizes Twitter’s search operators to let you scrape Tweets from specific users, scrape Tweets relating to certain topics, hashtags & trends, or sort out sensitive information from Tweets like e-mail and phone numbers. I find this very useful, and you can get really creative with it too.
Twint also makes special queries to Twitter allowing you to also scrape a Twitter user’s followers, Tweets a user has liked, and who they follow without any authentication, API, Selenium, or browser emulation.
tl;dr Benefits
Some of the benefits of using Twint vs Twitter API:
Also Read – Okadminfinder 3 : To Find Admin Panel Of Site
Requirements
Python 3.6
Installing
Git:
git clone https://github.com/twintproject/twint.git
pip3 install -r requirements.txt
Pip:
pip3 install –upgrade -e git+https://github.com/twintproject/twint.git@origin/master#egg=twint
Pipenv:
pipenv install -e git+https://github.com/twintproject/twint.git#egg=twint
CLI Basic Examples and Combos
A few simple examples to help you understand the basics:
Module Example
Twint can now be used as a module and supports custom formatting.
import twin
# Configure
c = twint.Config()
c.Username = “noneprivacy”
c.Search = “#osint”
c.Format = “Tweet id: {id} | Tweet: {tweet}”
# Run
twint.run.Search(c)
Output :
955511208597184512 2018-01-22 18:43:19 GMT pineapples are the best fruit
import twint
c = twint.Config()
c.Username = “noneprivacy”
c.Custom[“tweet”] = [“id”]
c.Custom[“user”] = [“bio”]
c.Limit = 10
c.Store_csv = True
c.Output = “none”
twint.run.Search(c)
Storing Options
Graph Visualisation
We are developing a Twint Desktop App.
More Example
Followers/Following
Userlist
Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…
If you are working with Linux or writing bash scripts, one of the most common…
What is a bash case statement? A bash case statement is a way to control…
Why Do We Check Files in Bash? When writing a Bash script, you often work…