#cybersecurity #pentesting #security #infosec #linux #Bugbountytip #bugbountytips #malware #hacking #MobileSecurity #AndroidSecurity
Of course, the bot was optimized to use with other Twitter operators queries ( you can know more Twitter operators here : Twitter Operators
A Twitter developer account
tweepy
APScheduler
You can find on the repo 2 folders for deploying and automatizing the bot, All you have to do is changing the Clock.py file
- To get "Access Token & Access Token Secret" to use the bot with another account (other than the app creator account)
NOTE : [FOR CySecbot_user.py] AFTER GETTING THE TOKEN KEYS, YOU CAN SET THE KEY VALUES AS ENV VARIAVLES (RECOMMANDED WAY TO STORE YOUR KEYS)
SO YOU CAN USE DIRECTLY THE BOT USING ENV VARIABLES
export CONSUMER_KEY="KEY"
export CONSUMER_SECRET="KEY"
export ACCESS_TOKEN="KEY"
export ACCESS_TOKEN_SECRET="KEY"
-
- A folder with all required files for deploying the bot on Heroku
-
- A folder with all required files for deploying the bot on a unix/linux machine