TwitterShadowBanV2 : Twitter Shadowban Tests

TwitterShadowBanV2 is a One-page web app, testing Twitter users for conventional and QFD shadowbans. Browser compatibility needs transpiling. Nothing fancy, just the usual babel magic.

git clone https://github.com/shadowban-eu/TwitterShadowBanV2 && cd TwitterShadowBanV2 npm install

Since we are using a php backend for request proxying, you will also need PHP. The gulp script uses php-cli’s webserver.

Debian

apt-get install php7.2-cli

Finally, use the default gulp task to start the php-cli webserver and watching for file changes.

Also Read – Ponce : IDA Pro Plugin That Provides Users The Ability To Perform Taint Analysis & Symbolic Execution

npm start

Deploy

Run npm start build! This creates an uglified script bundle and uses minified versions of 3rd party scripts. Then copy dist/‘s content to your server_root.

Misc

Checking for running server (the PID differs, of course)

pgrep php -f
> 20748 php -S localhost:8080 -t ./dist/

If you need to run the php-cli webserver on another port, you will have to change it manually in gulpfile.babel.js, somewhere around line 72.

const args = [‘-S’, ‘localhost:8080’, ‘-t’, ‘./dist/’];

R K

Recent Posts

Log Analysis Fundamentals

Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…

1 day ago

Networking Devices 101: Understanding Routers, Switches, Hubs, and More

What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…

2 days ago

Sock Puppets in OSINT: How to Build and Use Research Accounts

Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…

2 days ago

What is SIEM? Complete Guide to Security Information and Event Management

Introduction As cyber threats grow more sophisticated, organizations need more than just firewalls and antivirus…

2 days ago

Website OSINT: Tools and Techniques for Reconnaissance

Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…

3 days ago

Top OSINT Tools to Find Emails, Usernames and Passwords

Introduction In the world of cybersecurity, knowledge is power. One of the most powerful skillsets…

3 days ago