TWINT is an advanced Twitter scraping & OSINT tool written in Python that doesn’t use Twitter’s API, allowing you to scrape a user’s followers, following, Tweets and more while evading most API limitations.
Formerly known as Tweep, Twint is an advanced Twitter scraping tool written in Python that allows for scraping Tweets from Twitter profiles without using Twitter’s API.
Twint utilizes Twitter’s search operators to let you scrape Tweets from specific users, scrape Tweets relating to certain topics, hashtags & trends, or sort out sensitive information from Tweets like e-mail and phone numbers. I find this very useful, and you can get really creative with it too.
Twint also makes special queries to Twitter allowing you to also scrape a Twitter user’s followers, Tweets a user has liked, and who they follow without any authentication, API, Selenium, or browser emulation.
tl;dr Benefits
Some of the benefits of using Twint vs Twitter API:
Also Read – Okadminfinder 3 : To Find Admin Panel Of Site
Requirements
Python 3.6
Installing
Git:
git clone https://github.com/twintproject/twint.git
pip3 install -r requirements.txt
Pip:
pip3 install –upgrade -e git+https://github.com/twintproject/twint.git@origin/master#egg=twint
Pipenv:
pipenv install -e git+https://github.com/twintproject/twint.git#egg=twint
CLI Basic Examples and Combos
A few simple examples to help you understand the basics:
Module Example
Twint can now be used as a module and supports custom formatting.
import twin
# Configure
c = twint.Config()
c.Username = “noneprivacy”
c.Search = “#osint”
c.Format = “Tweet id: {id} | Tweet: {tweet}”
# Run
twint.run.Search(c)
Output :
955511208597184512 2018-01-22 18:43:19 GMT pineapples are the best fruit
import twint
c = twint.Config()
c.Username = “noneprivacy”
c.Custom[“tweet”] = [“id”]
c.Custom[“user”] = [“bio”]
c.Limit = 10
c.Store_csv = True
c.Output = “none”
twint.run.Search(c)
Storing Options
Graph Visualisation
We are developing a Twint Desktop App.
More Example
Followers/Following
Userlist
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…