TwitterShadowBanV2 : Twitter Shadowban Tests

TwitterShadowBanV2 is a One-page web app, testing Twitter users for conventional and QFD shadowbans. Browser compatibility needs transpiling. Nothing fancy, just the usual babel magic.

git clone https://github.com/shadowban-eu/TwitterShadowBanV2 && cd TwitterShadowBanV2 npm install

Since we are using a php backend for request proxying, you will also need PHP. The gulp script uses php-cli’s webserver.

Debian

apt-get install php7.2-cli

Finally, use the default gulp task to start the php-cli webserver and watching for file changes.

Also Read – Ponce : IDA Pro Plugin That Provides Users The Ability To Perform Taint Analysis & Symbolic Execution

npm start

Deploy

Run npm start build! This creates an uglified script bundle and uses minified versions of 3rd party scripts. Then copy dist/‘s content to your server_root.

Misc

Checking for running server (the PID differs, of course)

pgrep php -f
> 20748 php -S localhost:8080 -t ./dist/

If you need to run the php-cli webserver on another port, you will have to change it manually in gulpfile.babel.js, somewhere around line 72.

const args = [‘-S’, ‘localhost:8080’, ‘-t’, ‘./dist/’];

R K

Recent Posts

How to Install Java on Ubuntu 24.04 Easily in 2026

Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…

1 day ago

How to Install DEB Files on Ubuntu in 2026 (Step-by-Step Beginner Guide)

Ubuntu users often download software directly from developer websites instead of using the default app…

1 day ago

Things to Do After Installing Ubuntu 26.04 LTS for a Fast, Secure Setup

Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…

3 days ago

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 month ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 months ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 months ago