Categories: Kali Linux

Twitter-Intelligence : OSINT Project Performs Tracking & Analysis Of The Twitter

Twitter-Intelligence is a project written in Python to twitter tracking and analysis without using Twitter API.

  • This project is a Python 3.x application.
  • The package dependencies are in the file requirements.txt. Run that command to install the dependencies.
pip3 install -r requirements.txt
  • SQLite is used as the database.
  • Tweet data are stored on the Tweet, User, Location, Hashtag, HashtagTweet tables.
  • The database is created automically.

Also ReadLibssh-Scanner : Script to identify hosts vulnerable to CVE-2018-10933

Twitter-Intelligence Usage Example

Application work view:

  • Get help
 python3 tracking.py -h 
  • Get tweets by username
 python3 tracking.py --username "HaberSau" 
  • Get tweets by query
 python3 tracking.py --query "sakarya" 
  • Get tweet at a specific date range
 python3 tracking.py --username "HaberSau" --since 2015-09-10 --until 2015-09-12 --maxtweets 10 
  • If you get location of tweets, add –location “True” param but application will be slower due to new response times.
     python3 tracking.py --query "sakarya" --location "True"

Analysis

analysis.py performs analysis processing. User, hashtag and location analyzes are performed.

 

  • Get help:

 

python3 analysis.py -h

 

  • for location analysis

 

python3 analysis py --location

location analysis runs through address http://localhost:5000/locations

You must write Google Map Api Key in setting.py to display google map.

GOOGLE_MAP_API_KEY='YOUR_GOOGLE_MAP_API_KEY'

 

  • Runs hashtag analysis.

 

python3 analysis.py --hashtag

 

  • Runs user analysis.

 

python3 analysis.py --user

Graphical User Interface

socialgui.py used for GUI application

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago