Categories: Kali Linux

Twitter-Intelligence : OSINT Project Performs Tracking & Analysis Of The Twitter

Twitter-Intelligence is a project written in Python to twitter tracking and analysis without using Twitter API.

  • This project is a Python 3.x application.
  • The package dependencies are in the file requirements.txt. Run that command to install the dependencies.
pip3 install -r requirements.txt
  • SQLite is used as the database.
  • Tweet data are stored on the Tweet, User, Location, Hashtag, HashtagTweet tables.
  • The database is created automically.

Also ReadLibssh-Scanner : Script to identify hosts vulnerable to CVE-2018-10933

Twitter-Intelligence Usage Example

Application work view:

  • Get help
 python3 tracking.py -h 
  • Get tweets by username
 python3 tracking.py --username "HaberSau" 
  • Get tweets by query
 python3 tracking.py --query "sakarya" 
  • Get tweet at a specific date range
 python3 tracking.py --username "HaberSau" --since 2015-09-10 --until 2015-09-12 --maxtweets 10 
  • If you get location of tweets, add –location “True” param but application will be slower due to new response times.
     python3 tracking.py --query "sakarya" --location "True"

Analysis

analysis.py performs analysis processing. User, hashtag and location analyzes are performed.

 

  • Get help:

 

python3 analysis.py -h

 

  • for location analysis

 

python3 analysis py --location

location analysis runs through address http://localhost:5000/locations

You must write Google Map Api Key in setting.py to display google map.

GOOGLE_MAP_API_KEY='YOUR_GOOGLE_MAP_API_KEY'

 

  • Runs hashtag analysis.

 

python3 analysis.py --hashtag

 

  • Runs user analysis.

 

python3 analysis.py --user

Graphical User Interface

socialgui.py used for GUI application

R K

Recent Posts

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 days ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

6 days ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

6 days ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

6 days ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

7 days ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

2 weeks ago