Jump to content

Search the Community

Showing results for tags 'twitter'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges
    • Bug Bounty
    • Programare
    • Reverse engineering & exploit development
    • Mobile phones
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Sugestii
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics

Categories

There are no results to display.

There are no results to display.

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Biography


Location


Interests


Occupation

Found 15 results

  1. Cumpar conturi twitter cu peste 5000 followers . Ofer 5$ / cont ! Plata prin PayPal sau Paxum .
  2. Aveam de parsat dimineata asta texturile tweeturilor rezultate in urma interogarii API-ului public de la Twitter. Ele vin ca si text simplu dar pentru prezentarea/afisarea lor pe o pagina probabil vreti sa adaugati hyperlink pe hashtag-uri sau user mentions. Doua librarii ce v-ar putea ajuta: 1. Python - https://github.com/edburnett/twitter-text-python Daca vreti sa faceti magia in backend 2. JS - https://github.com/twitter/twitter-text/tree/master/js Daca vreti doar la nivel de frontend.
  3. Dupa cum spune si titlul, bag 10,000 Twitter followers pentru 10 eur (btc/paypal) Plata inainte pentru userii noi sau fara rep. Livrare: 48-72h. Locatie: worldwide Pentru 5 eur aditional la pachetul de Twitter, pot baga si 5000 like-uri Facebook la status-uri, poze, video-uri (nu fan page).
  4. OKQL

    conturi twitter

    aprox 2.5k conturi twitter worlwide Download: OrhDWPZlVi3zO92C05IBLr3l4GfD3q1sdDMs rc4 key https://rstforums.com/forum/100971-conturi-twitter.rst
  5. 335 conturi Twitter BASE 64 
Tamara_May@msn.com:cabinJ12
shirleythomason@kw.com:lagrange15
tiffl0607@gmail.com:doll0607
jenny1@hawaii.rr.com:leiko1
roywbeaver@tx.rr.com:1palabras1
LCORSIGLIA@YAHOO.COM:HH27cabanas
letsgocoastal@gmail.com:camelot7
philstergn@bellsouth.net:phil1burt
mberjr@aol.com:sissy1
tndreamtrips@bellsouth.net:4margaret
bsweetk7@yahoo.com:bk262626
wakeupmakeup@rraz.net:merlot
swyadon@yahoo.com:divorce2008
samuelpriddy@sbcglobal.net:snickers
gregkseidel@yahoo.com:1611butter
ttthornberry@aol.com:pher95
durwin.world@gmail.com:green150
zoomtravelgroup@live.com:ztg.7556
jfoster@satx.rr.com:wi2482506
rhihab@me.com:iloveu2
kurt@theaddedbenefit.com:autocash
rachaelbabe91@yahoo.com:kac13rmc
marisa1926@yahoo.com:asher01
alexrozinski@hotmail.com:redseven7
dhopper.travel@gmail.com:dar123
Ldarrah@comcast.net:Lsdjhd97
elisahwright@gmail.com:G0gat0rs
fjmiramontes@yahoo.com:jennlipe85
c8262c@gmail.com:chris0892
jimmy@jimmymonk.com:greatness
clementeguzman@hotmail.com:shaman3
florworldfreedom@yahoo.com:g0nzales
fedusoksana@yahoo.com:ksenija78
sheri@cbcaaa.com:cbcaaa0711
mike.spurlin@gmail.com:M0use00
ed@hardcastleentertainment.com:discjockey
pooch7812@aol.com:sis1932
mil.mom03@gmail.com:Triniti619
dbucktravel@yahoo.com:AbundAns1
mittemouse@gmail.com:djlktdb7
sjewett@tds.net:den123
greenem007@gmail.com:bang1234
esims@kc.rr.com:ezed34
mikebarbersemail@gmail.com:success123
lpark34@columbus.rr.com:grandmapark
fbcoachvb@yahoo.com:hitman
TJsnapon@verizon.net:cowboys
shorrell@horrellcompany.com:saradarby1
johigh8349@gmail.com:tuckerfern
titaniumhomes@insightbb.com:marykg55
JAMESPARK8461@sbcglobal.net:Park1234
ongard4@bigpond.com:fg252525
godschild3@bellsouth.net:miguel11
awestinmarketing@gmail.com:2dreambig
darwint50cal@msn.com:Dt509502
rich@concentricsoftware.com:iceman27
tbear216@gmail.com:ra3udxgh
sab.sabatel@us.army.mil:sycamore
osborneatlanta@aol.com:Buddy25
debbierojas@hotmail.com:tklover1$$
connie@shootpromotions.com:ybconnie
tolbert4bama@bellsouth.net:bamawin1
tnaegele87@yahoo.com:Dalton_06
clieffring@frontier.com:polaris
samayers293@comcast.net:football18
psawatski13@yahoo.com:swatman
SwisherTravel@me.com:snoopy
colettewalls@aol.com:5coasters
MOlagues@live.com:mo122260
afaulkner10@gmail.com:noahaiden
jandebusk@aol.com:smdnld
michaelmcclenney@att.net:drum5752
thesupersotin@gmail.com:level400
mjluckett69@yahoo.com:Corona69
kwet@mchsi.com:Alaska2011!
merlegirl2004@yahoo.com:dyerdrake
teipeltravis@gmail.com:mplslinecook
jakubickitravel@gmail.com:Miracle!0521
smelly_skis@hotmail.com:igablaga
mikejmorgan@bellsouth.net:razorback
sleuck17@gmail.com:spatrickl
footedenverj@gmail.com:foote81
bob-o@msn.com:boss302
RBARABE@KOCKEYEDKANDLES.COM:ponce1822
judybru@lpbroadband.net:bas24ket
jakenned@gmail.com:We2Goofed
mldc414@gmail.com:cgray726
hsb0407@yahoo.com:sanjamvir7
jamietravis91@yahoo.com:jamie6885
kelleytribe@aol.com:getfuzzy
bmarshall28@sbcglobal.net:bm02202002
flintravels@gmail.com:jamies13
wmeaglin66@netzero.com:jasper66
mhjandjhj@yahoo.com:5260jj
ashley@cdc-tx.com:ethan1
jw.mistermaster@gmail.com:Sara4202
vrwj5@aol.com:1520vrw9
Mauricemc8@gmail.com:mj050809
clmorawe07@yahoo.com:lizabeth
myra.hensley@hotmail.com:kuahaka
rodonnell@beckleydrilling.com:n8077h
ducpham817@yahoo.com:bananapens2
psychopup26@hotmail.com:Drewowen1
brianwoodard777@msn.com:rustic
fitzie73@comcast.net:united11
casey30@pldi.net:sooners001
devans30@comcast.net:Family1st
rosanisino@gmail.com:toribio123
luvurdoodle@hotmail.com:longhorn58
mzdip@aol.com:orsr2009
Sharese92@hotmail.com:imbroke2
scribner.patrick@gmail.com:c0l0rad0
anphilli@hotmail.com:mendelson42
phco@ubtanet.com:Craig123
tgcoblerdc@kdsi.net:walleyes
rstull7@gmail.com:deanrs1
squez007@gmail.com:FNpassword1
jeanniecoggins@hotmail.com:monalisa
b1cl@aol.com:cameryn3
wherkelman@cfu.net:63goldberg
snnxumalo1011@yahoo.com:nwnxs4
stefan.doerrfeld@gmail.com:Greatcare34
debbie_kreider@yahoo.com:dsk98310
shelton_smith@baylor.edu:madden08
thaminiboss@gmail.com:1karmella
wrcol695@yahoo.com:peanut99
justo747@gmail.com:Isu3435p
pt_nikolopoulos@yahoo.com:maria11
beth@carbinecompany.com:newhomes
shnnnjon@aol.com:jones7
jblong865@gmail.com:jbl9jbl9
denise_diez@yahoo.com:tunia1220
olightnermd@hotmail.com:doctor69
p.ryan.ruble@gmail.com:deaffury32
travelbusiness2@gmail.com:km444405
tdavis@bmc.edu:toddy5858!
schmidt5432@sbcglobal.net:tbtjmdsl
bandf80766@sbcglobal.net:baf3241
jay_hernandez17@yahoo.com:chiquit017
rtseal1@q.com:12monkeys
litebrown18@aol.com:damian070578
latrask@iastate.edu:lovelove6.6
dmuller@cfl.rr.com:famita4766
Cherrysoda25@sbcglobal.net:bunbun12
karinpratts@hotmail.com:karin19
Nobs80104@hotmail.com:tojocad922
amhbbh@mchsi.com:mickey21
h_richey@yahoo.com:mooney78
gary@katiecocomputers.com:mady2227
crethwisch08@hotmail.com:Calimame23
danielsalinas15@hotmail.com:salinas15
whitney.schreder@gmail.com:kay806
natecullen40@aol.com:baller40
ambermbrinkley@yahoo.com:roman01
mayerzev@aol.com:bd040688
e_lenko@yahoo.com:Bawbcat1
rcworrell@nc.rr.com:RGBS64718901
shondellhazer@yahoo.com:5kidsandme
chriselgert@gmail.com:golf3568
BwanaGotshall@yahoo.com:rich7663
info@Mundomio.org:Predator2011
shelleykudialis@comcast.net:michigan1
rsemenov@gmail.com:251600777
martiux66@hotmail.com:manchas67
lainedobson@gmail.com:godislife
jjyeackle@crimson.ua.edu:blazer90
gloriacaraway@gmail.com:ashley03
xburnzx69@hotmail.com:mjrdn23
steve.hoglund@gmail.com:hoagy2112
hicks.jan01@gmail.com:4235661858
javier_gordillo9@hotmail.com:miller92
anm376@hotmail.com:sefcik37
nursesowersby@yahoo.com:steven
woodj88@gmail.com:106988
k.meerendonk@gmail.com:km121793
DRJBS@msn.com:first01
sheffield_rodney@yahoo.com:fred1234
lalubben@iastate.edu:vegas2588
karenrhamilton@gmail.com:christopherian
drabrtek@yahoo.com:Tony37
nataliekeiser@gmail.com:wil1109nat
drummertim@hotmail.com:dwdrums1
hikeleb@msn.com:daughter7798
cindy@cindyedwards.com:sprite12
billyharsh@ymail.com:55555555
matth30@gmail.com:kimisagr8mom
sp.youknowme@yahoo.com:broncos07
jaysnangil@msn.com:gj0408
ayopprn@yahoo.com:yopp8799
theduke197480@yahoo.com:lexie1995
uchenwamkpa@sbcglobal.net:ol0630
headiyeh_farahmand@hotmail.com:Joseph31
cameron@2ticketmen.com:593259
kimber9965@gmail.com:kace9Tayvy
vorhiesj@gmail.com:ryaa4248
africkson_89@yahoo.com:arenee68
dorrmobile@yahoo.com:33PLYMOUTH
cornpops1111@yahoo.com:cookie1111
mikeinoakdale@gmail.com:amr7683
sathompson15@yahoo.com:skylimit99
karaleeannshaffer@hotmail.com:buzz07
rubycarol@msn.com:sneaker
rdraper@embarqmail.com:bubba1955
jeff_lisa@charter.net:joseph1208
mattsplana@gmail.com:smallville1
shaunaraisch@gmail.com:twiggs01
bebopeep9229@gmail.com:a115108z
byoung5@embarqmail.com:furbee12
meyertrucking@pldi.net:montell
Zac_Williamson34@hotmail.com:zacbritt09
r_eveliap@yahoo.com:oakhaven1219
karijschmitt@hotmail.com:tripper1
Fivestarrcoach@yahoo.com:orion1975
tim.jester@gmail.com:Riverside360
SecondWindSchultzie@yahoo.com:bogart1
fetchitup7@hotmail.com:LuckySeven7
teeko007@gmail.com:looking007
tcopeland06@gmail.com:sunny04
crain_brain@yahoo.com:coachc73
angela.rogerswells@gmail.com:john00angie
bhairston@live.com:sadie99
joereliv@aol.com:jeffrey1
BeckysAdventures@hotmail.com:G0dlovesme
crystalhornsby@hotmail.com:Auburn12
MRMREnterprises@gmail.com:Roberts3864
Starrz_007@yahoo.com:starrz007
farrow_88@hotmail.com:878913125
ramone_vasser@hotmail.com:manman04
whitesidelinn@yahoo.com:adynjwd05
dgraf@cox.net:Mulligan5
markboot@ecobusiness.com:chaucer0
necodreus@gmail.com:dD7kG69G
jh7_2008@yahoo.com:dreamer73
jshelton27@yahoo.com:smiley69
monjon98@yahoo.com:jon072598
joyce_mayes42@yahoo.com:football42
perrysy@yahoo.com:squid4211
mswcb88@yahoo.com:lsuSinger88
krpudil@coe.edu:krobin
desilaurelllc@gmail.com:desil7890
alwellman88@gmail.com:amelia99
denaliittu@aol.com:nikki310
angella_rene@yahoo.com:libracc01
mrsafeman@charter.net:lakers09
gloriahnurse@yahoo.com:needle
kiester8@aol.com:blue6789
gilbertjr@gbmoreno.com:gilbert5676
edwinrosadojr@gmail.com:er16001600
shainagaul@hotmail.com:hanson
schroederthree@comcast.net:Codyjak044
sharonvanwyhe@comcast.net:2032sogden
shelburton777@yahoo.com:ryanismylife777
dkdreamvacations@ymail.com:Nov232008
ladyfayej@gmail.com:ruby2edc
mccarter1011@yahoo.com:deco4u
cmartinez99@austin.rr.com:gcmjcs66
jordanaquinn@aol.com:ninotof54
jdarduser@yahoo.com:Kyle2007
bradster_30@hotmail.com:wscfootball31
bill_m63@yahoo.com:Lucilleno1
lfarrar305@yahoo.com:D1amond11
bpbrash@gmail.com:shiner889
wramz@sbcglobal.net:buzzie
thocker1@comcast.net:131313th
KellyCamp77@gmail.com:86Camaro
kniegge@hotmail.com:1million
freeplanet1776@yahoo.com:infowars1776
rashaadadeyemi@gmail.com:blacktiger11
cortneysouthard@gmail.com:southard2
vjunkin@cesltc.com:wesley87
meli2630@hotmail.com:rangel2630
sw7148@yahoo.com:may1804
mbuhly@gmail.com:66Pacoboy
kauaiatheart@gmail.com:kailua1969
joeangel.sanchez@gmail.com:jesus1
j.johnson@msn.com:9494jj
makaysmom1998@comcast.net:micahboy01
leon.walker12@gmail.com:bigboogie
MissKittyMT@yahoo.com:trustme2
zhoover21@hotmail.com:ekzh21
alejop1@hotmail.com:alejokhamis1
mjohnson9586@gmail.com:rumple123
nellie@ntwilliams.com:072522gt
wealthtimefreedom@gmail.com:kiska123
harmonyw79@gmail.com:demarcus05
kvscheufler@yahoo.com:kye21903
maggielittell@gmail.com:jade63need
stacyadesjarlais@gmail.com:keepkenout
bmanning67@gmail.com:thumpu42
lbricker@centurylink.net:lanlar
tjgunerr@gmail.com:smoky6791@
trish1646@sbcglobal.net:w68wm2
sureenuff@verizon.net:central
shanj731@gmail.com:tekedogg
justanotherguy@gmx.us:goodbar7669
jnctrent@yahoo.com:carrib85
dorraineg@gmail.com:dg4532bw
dodgersyque@gmail.com:darkman1
mybrand87@live.com:mestre87
rmansel@comcast.net:usmc2109645
vwade@scrtc.com:ricky31
mona.hope@comcast.net:mona1957
claudio21@sbcglobal.net:clgtps
s_maggio@suddenlink.net:27goofy1
krull24@aol.com:alyssa18
hondamanriggs@yahoo.com:rochus355
wishinwell.danice@gmail.com:4894453g
kellycollins11@yahoo.com:mermaid
castillo_ricky89@hotmail.com:dizzle117
cwgibby@yahoo.com:Christopher
bluestar981@gmail.com:rcr337792
joshlynvinson@yahoo.com:jaidyn16
boogie9660@msn.com:julie4me
bro_dsmith@yahoo.com:BLOSSOM
keowee51@hotmail.com:wstv3419
jen@portofinojewelry.com:binky12345
kevinccole@hotmail.com:sammy20
kkhbud8@aol.com:chelsea21
mrhazeleyes1218@yahoo.com:fuckyou1
tijake2@comcast.net:fordtr11
dfd709@hotmail.com:jcrs728
monicacuevas1@yahoo.com:tennis83
jptub@hotmail.com:polepatch
ryan.eighme@yahoo.com:money2
dustin-ford@utulsa.edu:Spartans07!
jeorgia@movingcedarrapids.com:Huskers1
Robert@MessingerGroup.com:amscray2121
worldventures.hosale@gmail.com:mikeyhosale
debcalhoon@yahoo.com:vanna77
akuns10@hotmail.com:delete2413!
limegreen16ae@hotmail.com:bubble18
cfarthing@mchsi.com:lumpster8*
judy.razor@gmail.com:maxwell8
dbramow@mchsi.com:kristin3
lydvelas@gmail.com:tigers83v
  6. MyBB’s official Twitter profile and a staff member’s accounts were hijacked in late January. The developers of the popular open source forum software have now provided details on the incident. According to the MyBB team, someone gained unauthorized access to the community forum account and the personal website of a staff member. The password for the @mybB Twitter account was stored in plaintext in one of the threads, allowing the attacker to take over the organization’s social media account. The hacker used the hijacked Twitter account to post offensive messages, MyBB staff IP addresses, and installation statistics. The attacker also claimed to have gained access to information on unpatched SQL injection and cross-site scripting (XSS) vulnerabilities affecting the forum software. “Within two hours, we had isolated the breach and banned the staff member’s account to prevent any further purusing of private data,” MyBB wrote in a blog post on Monday. MyBB pointed out that the staff member whose account had been compromised did not have access to the Admin Control Panel, so the hacker couldn’t have gained access to private user data. The developers say there is no evidence to suggest that other information has been compromised. The attacker changed the Twitter account’s password and email address to prevent MyBB staff from recovering it. The developers regained access to the profile after contacting Twitter, which locked out the hacker during its investigation. A few days ago, someone posted screenshots of what seemed to be the MyBB 2.0 GitHub repository on a forum. The poster offered to sell the MyBB 2.0 source code for an unspecified amount of Bitcoins. It appears that the staff member whose account was compromised used the same password for GitHub and he didn’t have two-factor authentication enabled. However, MyBB said the hacked GitHub account didn’t store anything of value. “The code the user had was simply the initial commit of Laravel into the repository, none of the actual 2.0 code was present,” MyBB noted. MyBB 2.0, a complete rewrite of the software, is currently under development and in pre-alpha. “At MyBB we have a strong commitment to security. All staff with ACP access use a secret PIN, a form of 2FA. We release patches to any serious issues usually within hours of them being reported. We have Two Factor Authentication enabled on our staff email accounts and Github, and are actively working on getting 2FA for our other development tools,” MyBB said. Sursa: securityweek.com
  7. * Twitter Email extractor v.1.2 * * author: spikyy @ BlackHatWorld * thx to weaselstomp and HTTP_REFERER */ set_time_limit(1800); // 30 minutes $break = Explode('/', $_SERVER["SCRIPT_NAME"]); $pfile = $break[count($break) - 1]; if(!isset($_GET['action'])) { echo '<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <html><head><title>Twitter Extractor v1.5</title> </head><body bgcolor="#7DE3F9"> <center> <h1>Twitter Extractor v1.5</h1> <br /> <form action="'.$pfile.'?action=do" method="post"> <table width="70%" height="70%" bgcolor="#BBEFFA" border="0"> <tr> <td width="33%" height="100%" valign="center" align="left" > <center><b> Starting page: </b><br /> <input name="start" type="text" size="2" value="1"><br /> <br /> <b> How many Twitter pages: </b><br /> <input name="pagenr" type="text" size="2" value="10"> <br /><br /><b>Tweple country:</b><br /> (English = en, Spanish = es) <br /><input type="text" name="country" value="en" size="2"> <br /><br /><b>Extract Mode: </b><br /><select name="mode"> <option>Usernames</option><option>Emails</option> <option selected="selected">Both</option> </select> <br /><br /><input type="submit" value="Search" size="6"> </center></td><td width="33%" height="100%" valign="center" ><center> <b>Are you using keywords ? </b><select name="keyword"> <option>no</option> <option selected="selected">yes</option> </select> <br /><br /><textarea name="keywords" rows="10" cols="20"> keyword1 keyword2 </textarea></center></td> <td width="33%" height="100%" valign="center" > <center><b>Domain type:</b><br /><br /> <textarea name="domains" rows="10" cols="20"> gmail.com yahoo.com msn.com aol.com hotmail.com</textarea></center></td> </tr></table></form> <b>Extract Mode:</b> Usernames: extract usernames only, Emails: extract emails only, Both: crystal clear. <br /> <b>Domain type</b> is not used with Extract Mode "Usernames". </center> </body></html> '; } else if (isset($_GET['action']) && $_GET['action'] == "do") { echo '<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <html> <head> <title>Twitter Email Extractor</title> </head> <body bgcolor="#7DE3F9"> <center> <h1>Twitter Email Extractor</h1> <br /> <table width="70%" height="70%" bgcolor="#BBEFFA" border="0"> <tr> <td width="100%" height="100%" valign="center" align="center"> <b>Extracting ... </b><br /><br /> <form action="'.$pfile.'?action=remove" method="POST">'; $err = 0; if(isset($_POST['pagenr']) && $_POST['pagenr'] != "") { $pagenr = $_POST['pagenr']; } else { $err = 1; $errn = $errn."\n Number of pages is missing"; } if(isset($_POST['country']) && $_POST['country'] != "") { $country = $_POST['country']; } else { $err = 1; $errn = $errn."\n Country is missing"; } if(isset($_POST['mode']) && $_POST['mode'] != "") { $mode = $_POST['mode']; } else { $err = 1; $errn = $errn."\n Keyword option is missing"; } if(isset($_POST['keyword']) && $_POST['keyword'] != "") { $keyword = $_POST['keyword']; } else { $err = 1; $errn = $errn."\n Keyword option is missing"; } if($keyword == "yes") { if(isset($_POST['keywords']) && $_POST['keywords'] != "") { $keywords = $_POST['keywords']; } else { $err = 1; $errn = $errn."\n Keywords missing"; } } if(isset($_POST['domains']) && $_POST['domains'] != "") {$domains = $_POST['domains']; } else { $err = 1; $errn = $errn."\n Domains missing"; } if(isset($_POST['start'])) { $start = $_POST['start']; } else { $err=1; $errn = $errn."\n Starting page missing";} $matches = ""; $ue_matches = ""; if($err == 0) { $domains = nl2br($domains); $domains = explode('<br />', $domains); foreach($domains as $dd) { $domainsvar = $domainsvar.trim($dd)."+"; } $domainsvar = strrev(substr(strrev($domainsvar), 1)); if($keyword == "yes") { $keywords = nl2br($keywords); $keywords = explode('<br />', $keywords); foreach($keywords as $key) { for($i=$start; $i <= $pagenr; $i++) { if($mode != "Usernames") { $file = file_get_contents("http://search.twitter.com/search?page=".$i."&rpp=100&ands=".trim($key)."&ors=".$domainsvar."?=".$country); } else { $file = file_get_contents("http://search.twitter.com/search?page=".$i."&rpp=100&ands=".trim($key)."?=".$country); } $file_st = strip_tags($file); if($mode != "Usernames") { preg_match_all("([a-z0-9!#$%&'*+/=?^_`{|}~-]+(?:\.[a-z0-9!#$%&'*+/=?^_`{|}~-]+)*@(?:[a-z0-9](?:[a-z0-9-]*[a-z0-9])?\.)+(?:[A-Z]{2}|com|org|net|gov|mil|biz|info|mobi|name|aero|jobs|museum)\b)siU", $file_st, $matches); } if($mode != "Emails") { preg_match_all("/<a href=\"http:\/\/twitter.com\/([A-z]*)\"/",$file,$ue_matches); } } } } else { for($i=$start; $i <= $pagenr; $i++) { if($mode != "Usernames") { $file = file_get_contents("http://search.twitter.com/search?page=".$i."&rpp=100&ors=".$domainsvar."?=".$country); } else { $file = file_get_contents("http://search.twitter.com/search?page=".$i."&rpp=100&q=+a+OR+i+OR+e?=".$country); } $file_st = strip_tags($file); if($mode != "Usernames") { preg_match_all("([a-z0-9!#$%&'*+/=?^_`{|}~-]+(?:\.[a-z0-9!#$%&'*+/=?^_`{|}~-]+)*@(?:[a-z0-9](?:[a-z0-9-]*[a-z0-9])?\.)+(?:[A-Z]{2}|com|org|net|gov|mil|biz|info|mobi|name|aero|jobs|museum)\b)siU", $file_st, $matches); } if($mode != "Emails") { preg_match_all("/<a href=\"http:\/\/twitter.com\/([A-z]*)\"/",$file,$ue_matches); } } } if($mode != "Emails") { $ue_matches[1] = array_unique($ue_matches[1]); echo '<form><textarea id="twtUsernames" name="usernames" cols="40" rows="20">'; foreach($ue_matches[1] as $key => $mtt) { echo trim($mtt)."\n"; ob_flush(); flush(); } echo '</textarea>'; } if($mode != "Usernames") { $matches[0] = array_unique($matches[0]); echo '<textarea id="twtEmails" name="emails" cols="40" rows="20">'; foreach($matches[0] as $key => $mtt) { echo trim($mtt)."\n"; ob_flush(); flush(); } echo '</textarea>'; } } else { echo "Errors:".$errn; } echo '<br /><br /><br />'; if($mode!="Emails") { echo '<input type="button" value="Select Usernames" onClick="javascript:this.form.twtUsernames.focus();this.form.twtUsernames.select();">'; } if($mode!="Usernames") { echo '<input type="button" value="Select Mails" onClick="javascript:this.form.twtEmails.focus();this.form.twtEmails.select();">'; }; echo '<br /><br /></form><font color="red" size="5"><b> DONE !!! </b></font><br /><br /></td></tr> </table> </body> </html>'; } else { echo '<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <html> <head> <title>Twitter Extractor v1.5</title> </head> <body bgcolor="#7DE3F9"> <center> <h1>Twitter Extractor v1.5</h1> <br /> <table width="70%" height="70%" bgcolor="#BBEFFA" border="0"> <tr> <td width="100%" height="100%" valign="center" align="center"> <br /><br /> <font color="red" size="40"><b>YOU BROKE DA MACH1NE !1!!1 </b></font> </td></tr> </table> </body> </html>'; } ?>
  8. Twitter has revised and simplified its rules and process for reporting abusive behavior on the service, and users now have the ability to report people who are posting their personal information. The change essentially gives Twitter users a method to combat doxing, which is the process of dumping a victim’s personal information online. This often is done as a form of revenge or to embarrass someone. Doxing used to be done in forums or on underground sites, but Twitter has made it possible to broadcast the information to a much larger audience more quickly. Twitter officials are well aware of this problem, as well as the issue of more traditional abusive behavior on the service. So the company has changed the way that users can report such behavior and what kind of things they can report. Twitter said it has greatly increased the size of its staff handling these reports and is processing many more reports than just a few months ago. “Over the last six months, in addition to the product changes, we have overhauled how we review user reports about abuse. As an example, allowing bystanders to report abuse – which can now be done for reports of private information and impersonation as well – involved not only an update to our in-product reporting process, but significant changes to our tools, processes and staffing behind the scenes. Overall, we now review five times as many user reports as we did previously, and we have tripled the size of the support team focused on handling abuse reports,” Tina Bhatnagar, vice president of user services at Twitter said in a blog post. The change is a significant one for Twitter, as the service has evolved into the place where many people not only get their news, but also where people share remarkable personal and private information. The new reporting option also allows users to report abusive behavior that’s targeted at other people and not themselves. Twitter also is changing the way that is enforces the rules against problematic accounts. “We are also beginning to add several new enforcement actions for use against accounts that violate our rules. These new actions will not be visible to the vast majority of rule-abiding Twitter users – but they give us new options for acting against the accounts that don’t follow the rules and serve to discourage behavior that goes against our policies,” Bhatnagar said. Source
  9. Twitter has seen a surge in government requests for user information, according to its latest transparency report. The social media platform has seen a 40% rise in the number of requests from governments around the world since its last report, in July 2014. Hundreds came from the government of Turkey, which has previously attempted to ban Twitter. The most requests came from the US government. All of the large internet companies, including Google, Facebook and Yahoo, now release regular transparency reports in order to keep users informed about how much data is shared with governments. It is part of the industry's response to revelations from former National Security Agency contractor Edward Snowden, which pointed to mass government surveillance programs in the US and abroad. "Providing this insight is simply the right thing to do, especially in an age of increasing concerns about government surveillance," Twitter senior manager of legal policy Jeremy Kessel said in a blogpost. Twitter received 2,871 requests from governments across the world asking it to reveal data about 7,144 of its users in the second half of 2014. Just over half (52%) of the requests had been fulfilled, it said. Most of the requests came from the US government - with 1,622 requests. 80% of which were complied with. The Turkish government made 356 requests, putting it second place behind the US. None of its data requests had been complied with, said Twitter, although it did not go into details about what they had been about. The company also saw an 84% increase in government demands to remove content from Twitter. The top three requesting countries were: Turkey (477) Russia (91) Germany (43) In Turkey, these requests tended to focus on claimed violations of personal rights either for citizens or government officials. Prime Minister Recep Tayyip Erdogan blocked Twitter in Turkey in March after an anonymous source posted allegations of government corruption. The ban was overturned in the courts and the service restored. Russia had sent 108 requests for account information since July, according to Twitter. Previously it had not sent any. It had also sent 91 requests for the removal of content, ranging from posts promoting illegal drugs to attempts to suppress non-violent demonstration. "We denied several requests to silence popular critics of the Russian government and other demands to limit speech about non-violent demonstration in Ukraine," said Mr Kessel. In August, Russia passed laws placing restrictions on users of social media. Bloggers with more than 3,000 daily readers were forced to register with the media regulator, social networks were required to retain six months' worth of data on its users and bloggers were not allowed to remain anonymous. Source
  10. Hello, Un nene a descoperit cum sa traga followers de pe conturi de twitter, Collecting Twitter Followers with 25 lines of Python, si a scris un script in Python2 dupa cum urmeaza: " import tweepy import time #insert your Twitter keys here consumer_key ='bla bla' consumer_secret='bla bla' access_token='bla bla' access_secret='bla bla' auth = tweepy.auth.OAuthHandler(consumer_key, consumer_secret) auth.set_access_token(access_token, access_secret) api = tweepy.API(auth) list= open('/go-to-war/Desktop/twitter_list.txt','w') if(api.verify_credentials): print 'We sucessfully logged in' user = tweepy.Cursor(api.followers, screen_name="<targeted_twitter_account>").items() while True: try: u = next(user) list.write(u.screen_name +' n') except: time.sleep(15*60) print 'We got a timeout ... Sleeping for 15 minutes' u = next(user) list.write(u.screen_name +' n') list.close() " Intrebarea mea este, l-a incercat cineva si i-a mers? Eu l-am pornit, sta o perioda pana expira cele 15 minute alocate unui interval valid de interogare si pe urma iese cu urmatoarea eroare: "Traceback (most recent call last): File "twitter_followers_harvesting.py", line 28, in <module> u = next(user) File "/usr/lib/python2.7/dist-packages/tweepy/cursor.py", line 110, in next self.current_page = self.page_iterator.next() File "/usr/lib/python2.7/dist-packages/tweepy/cursor.py", line 60, in next cursor=self.next_cursor, *self.args, **self.kargs File "/usr/lib/python2.7/dist-packages/tweepy/binder.py", line 179, in _call return method.execute() File "/usr/lib/python2.7/dist-packages/tweepy/binder.py", line 162, in execute raise TweepError(error_msg, resp) tweepy.error.TweepError: [{'message': 'Sorry, that page does not exist', 'code': 34}] " Merci fain.
  11. The Twitter accounts of the New York Post and United Press International (UPI) have been hacked with fake tweets on economic and military news. In one post, the Pope was quoted on UPI's Twitter feed as saying that "World War III has begun". Meanwhile, the New York Post's account said that hostilities had broken out between the United States and China. It is the latest hack of a high-profile social media account, four days after US military command was compromised. UPI, which is based in Washington, confirmed in a statement that both its Twitter account and news website had been hacked. Six fake headlines were posted on its Twitter account and a breaking news banner was added to a fake story about the Federal Reserve on its homepage, the statement added. A tweet on the New York Post's account said the USS George Washington, an aircraft carrier, was "engaged in active combat" against Chinese warships in the South China Sea. A Pentagon official said the tweet about hostilities with China was "not true", AFP reports. The tweets have all since been deleted. The New York Post says it is investigating the hack. It comes just days after US President Barack Obama unveiled proposals to strengthen cyber security laws after a spate of attacks on high-profile US targets, including the Pentagon Twitter feed and Sony Pictures. The Twitter account of the US military command was suspended last Monday following an attack by hackers claiming to support Islamic State. In November hackers also released reams of confidential data stolen from Sony Pictures, and in recent years cyber criminals have attacked other US companies such as Home Depot and Target. A number of media organisations, including AFP and the BBC, have also been subjected to cyber attacks over the past two years. Source
  12. <?php function image_upload($image, $status){ require ('tmhOAuth.php'); //https://github.com/themattharris/tmhOAuth $tmhOAuth = new tmhOAuth(array( 'consumer_key' => "sfdgdsgsdfg", 'consumer_secret' => "dsfgdsfgdsfgsd", 'user_token' => "sdfsdfsdf", 'user_secret' => "fgdgdfgdf", )); $code = $tmhOAuth->request( 'POST','https://api.twitter.com/1.1/statuses/update_with_media.json', array( 'media[]' => "@{$image};type=image/jpeg;filename={$image}", 'status' => $status, ), true, // use auth true // multipart ); return $code; } echo image_upload('/var/www/crawl/img/62845745.jpg','Postat prin API'); ?> 1. creati o aplicatie in twitter developer si adaugati tokenurile 2. rulati functia image_upload('calea/absoluta/a/pozei','Postat prin API'); 3. il puteti cupla cu cel de facebook 4. adaugati in cron
  13. As you may have read, there’s been a recent uptick in large-scale security attacks aimed at U.S. technology and media companies. Within the last two weeks, the New York Times and Wall Street Journal have chronicled breaches of their systems, and Apple and Mozilla have turned off Java by default in their browsers. This week, we detected unusual access patterns that led to us identifying unauthorized access attempts to Twitter user data. We discovered one live attack and were able to shut it down in process moments later. However, our investigation has thus far indicated that the attackers may have had access to limited user information – usernames, email addresses, session tokens and encrypted/salted versions of passwords – for approximately 250,000 users. As a precautionary security measure, we have reset passwords and revoked session tokens for these accounts. If your account was one of them, you will have recently received (or will shortly) an email from us at the address associated with your Twitter account notifying you that you will need to create a new password. Your old password will not work when you try to log in to Twitter. Though only a very small percentage of our users were potentially affected by this attack, we encourage all users to take this opportunity to ensure that they are following good password hygiene, on Twitter and elsewhere on the Internet. Make sure you use a strong password – at least 10 (but more is better) characters and a mixture of upper- and lowercase letters, numbers, and symbols – that you are not using for any other accounts or sites. Using the same password for multiple online accounts significantly increases your odds of being compromised. If you are not using good password hygiene, take a moment now to change your Twitter passwords. For more information about making your Twitter and other Internet accounts more secure, read our Help Center documentation or the FTC’s guide on passwords. We also echo the advisory from the U.S. Department of Homeland Security and security experts to encourage users to disable Java on their computers in their browsers. For instructions on how to disable Java, read this recent Slate article. This attack was not the work of amateurs, and we do not believe it was an isolated incident. The attackers were extremely sophisticated, and we believe other companies and organizations have also been recently similarly attacked. For that reason we felt that it was important to publicize this attack while we still gather information, and we are helping government and federal law enforcement in their effort to find and prosecute these attackers to make the Internet safer for all users. Updated 4:47pm: Corrected detail on disabling Java in penultimate paragraph. Posted by Bob Lord (@boblord) Director of Information Security Via Twitter Blog: Keeping our users secure
  14. Ieri, 1 februarie, ?eful departamentului de securitate al Twitter, Bob Lord, a anun?at c? s?pt?mâna trecut? un grup de infractori cibernetici au atacat serverele acestei companii ?i au reu?it s? ob?in? acces la datele confiden?iale ale utilizatorilor. Ca rezultat, infractorii, probabil, au reu?it s? afle numele utilizatorilor, adresele de email, identificatorii de sesiune ?i parolele încriptate a aproximativ 250.000 de utilizatori. Tot ieri, compania Twitter a trimis email-uri utilizatorilor a c?ror conturi, într-un fel sau altul, se afl? în pericol. Mai multe detalii despre acest incident pute?i g?si pe blogul oficial, în articolul Keeping our users secure ps. Personal nu am primit nici un mesaj, chiar dac? de?in mai multe conturi Twitter.
  15. TRAFFIC EXCHANGE WEBSITE Like-uri pe Facebook, Trafic pe site, Vizite pe YouTube, Followeri pe Twitter, Plus-uri pe Google Site-ul este la inceput avem nevoie de utilizatori pentru a va oferi cat mai mult trafic posibil GRATIS! LINK: --> GiveMeHits Va multumesc anticipat si sper sa ne ajutati sa facem o comunitate!
×
×
  • Create New...