Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/joker-x/anontwi

Protects you on social networks.
https://github.com/joker-x/anontwi

Last synced: 3 months ago
JSON representation

Protects you on social networks.

Awesome Lists containing this project

README

        

=============================================
Introduction: AnonTwi (http://anontwi.sf.net)
=============================================

FIGHT CENSORSHIP!! being more safe on Twitter...

. : .
'. . : . .'
._ '._.-'''-._.' _.
'-..' '..-'
--._ /.==. .==.\ _.--
;/_o__\ /_o__\;
-----|` ) ( `|-----
_: \_) (\_/) (_/ ;_
--' \ '._.=._.' / '--
_.-''. '._.' .''-._
' .''-.(_).-''. '
' ' : ' '.
' : '
'

AnonTwi gives you:

+ AES + HMAC-SHA1 encryption on Tweets and Direct Messages
+ Secure Sockets Layer (SSL) to interact with API
+ Proxy Socks (for example, to connect to the TOR network)
+ Random HTTP header values
+ Send long messages splitted automatically
+ Automatic decryption of tweet's urls or raw inputs
+ Backup messages to your disk (max: 3200)
+ Send fake geolocation places
+ Remove data and close account (suicide)
+ View global Trending Topics
+ UTF-8 + Unicode support (chinese, arabic, symbols, etc)
+ Multiplatform: GNU/Linux, MacOS, Win32
+ Detailed colourful output results
+ Generate tools and modules
+ GTK + WebGUI interfaces
+ An IRC bot slave

And many other features than you can see detailed below:

======
INDEX:
======

1) How-To Start
2) Examples
3) Contribute
3) Contact

=============
How-To Start:
=============

--------
Install:
--------
Code runs on many platforms. It requires Python and the following libraries:

- python-crypto - cryptographic algorithms and protocols for Python

- python-httplib2 - comprehensive HTTP client library written for Python

- python-pycurl - python bindings to libcurl

On Debian-based systems (ex: Ubuntu), run:

- directly:

sudo apt-get install python-crypto python-httplib2 python-pycurl

- using setup-tools (http://pypi.python.org/pypi/setuptools):

easy_install

On Windows systems, is working (tested!) with:

- python 2.7 - http://www.python.org/getit/
- httplib2 0.7.4 - http://httplib2.googlecode.com/files/httplib2-0.7.4.zip
- pycrypto 2.3 - http://www.voidspace.org.uk/downloads/pycrypto-2.3.win32-py2.7.zip

- using setup-tools (http://pypi.python.org/pypi/setuptools):

easy_install.exe

------------------------
Step 1) "Consumer" keys:
------------------------
+ To use OAuth with Twitter, you need this tokens: 'consumer key' and 'consumer secret'.

- First, you need to create a third party APP in your developers twitter account. Login on: https://dev.twitter.com
- In your icon profile, go to: "My applications" and/or click on: "Create new application"
- Enter data to the form:

"Name : Your application name (This will be visible when you post)"
"Description: Your description name (for example: AnonTwi")
"Website: Your application website (for example: http://anontwi.sf.net)"

"If you accept Twitter rules, click on: 'Yes, I agree'"
"Solve captcha" ;-)
"Click on: "Create your Twitter application"

- On "My application", click on your application
- Search for: 'OAuth Settings' and keep your:

"Consumer key: xxxxxxxxxxxxxxxxxxxx
Consumer secret: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"

- Open "config.py" file with a text editor, and enter that tokens. Save changes!.

- IMPORTANT: You must put access level for AnonTwi like: Read, write, and direct messages

- Now, you are ready to generate your: secret "Token" keys. Step 2.

---------------------
Step 2) "Token" keys:
---------------------
+ To use AnonTwi like API with Twitter, you need this tokens: 'token key' and 'token secret'.

- Launch: ./anontwi --tokens
- Follow the link to read your "PinCode"
- Enter your PinCode
- After a few seconds, you will reviece a response like this:

"Generating and signing request for an access token
Your Twitter Access Token key: xxxxxxxx-xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Access Token secret: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"

+ With these tokens, you can start to launch -AnonTwi- commands like this:

./anontwi [-m 'text' | -r 'ID' | -d @user | -f @nick | -u @nick] [OPTIONS] 'token key' 'token secret'

+ Remember that you can EXPORT tokens like environment variables to your system, to don't use them every time
If you did it, you can start to launch -AnonTwi- commands like this:

./anontwi [-m 'text' | -r 'ID' | -d @user | -f @nick | -u @nick] [OPTIONS]

=========
Examples:
=========

+ To remember:

- Connections to API are using fake headers automatically
- To launch TOR, add this command: --proxy "http://127.0.0.1:8118"
- Check if you are doing geolocation in your messages (usually is 'off' by default)
- You can generate 'token key' and 'token secret' every time that you need
- View output results with colours using parameter: --rgb (better with obscure backgrounds)
- Use --gen to generate STRONG PIN/keys (ex: --pin '1Geh0RBm9Cfj82NNhuQyIFFHR8F7fI4q7+7d0a3FrAI=')
- Try to add encryption to your life :)

-----------------------------------
Retrieve you API tokens, using TOR:
-----------------------------------

./anontwi --tokens --proxy "http://127.0.0.1:8118"

----------------------------------------------------
Generate PIN key for encrypting/decrypting messages:
----------------------------------------------------

./anontwi --gen

PIN key: K7DccSf3QPVxvbux85Tx/VIMkkDkcK+tFzi45YZ5E+g=

Share this key privately with the recipients of your encrypted messages.
Don't send this key over insecure channels such as email, SMS, IM or Twitter.
Use the sneakernet! ;)

----------------------
Launch GTK+ Interface:
----------------------

Enjoy visual mode experience ;)

./anontwi --gtk

------------------------
Launch an IRC bot slave:
------------------------

Launch it and you will have a bot slave waiting your orders on IRC.

./anontwi --irc='nickname@server:port#channel'

If you don't put a nickname or a channel, AnonTwi will generate randoms for you :)

./anontwi --irc='irc.freenode.net:6667'

------------------------
Short an url, using TOR:
------------------------

./anontwi --short "url" --proxy "http://127.0.0.1:8118"

-----------------------------------
Send a plain-text tweet, using TOR:
-----------------------------------

./anontwi -m "Hello World" --proxy "http://127.0.0.1:8118"

------------------------
Send an encrypted tweet:
------------------------

./anontwi -m "Hello World" --enc --pin "K7DccSf3QPVxvbux85Tx/VIMkkDkcK+tFzi45YZ5E+g="

--------------
Remove a tweet:
---------------

You need the ID of the tweet that you want to remove.

- launch "--tu @your_nick 'num'" to see tweets IDs of your timeline.

./anontwi --rm-m "ID"

------------------
Retweet a message:
------------------

You need the ID of the tweet that you want to RT.

- launch "--tu @nick 'num'" to see tweets IDs of a user.

./anontwi -r "ID"

-------------------------------------------------
Send a plain-text DM (Direct Message), using TOR:
-------------------------------------------------

./anontwi -m "See you later" -d "@nick" --proxy "http://127.0.0.1:8118"

---------------------
Send an encrypted DM:
---------------------

./anontwi -m "See you later" -d "@nick" --enc --pin "K7DccSf3QPVxvbux85Tx/VIMkkDkcK+tFzi45YZ5E+g="

---------------
Remove a DM:
---------------

You need the ID of the DM that you want to remove.

- launch "--td 'num'" to see Direct Messages IDs of your account.

./anontwi --rm-d "ID"

--------------------------------------
Send a media message, using TOR:
--------------------------------------

Twitter will show your media links. For example, if you put a link to an image

./anontwi -m "https://host/path/file.jpg" --proxy "http://127.0.0.1:8118"

----------------------------------------
Send reply in a conversation, using TOR:
----------------------------------------

You need the ID of the message of the conversation.

- launch "--tu @nick 'num'" to see tweets IDs of a user timeline.
- launch "--tf 'num'" to see tweets IDs of your 'home'.

Add names of users that participates on conversation at start of your message.

./anontwi -m "@user1 @user2 text" --reply "ID" --proxy "http://127.0.0.1:8118"

---------------------------------
Send a friend request, using TOR:
---------------------------------

./anontwi -f "@nick" --proxy "http://127.0.0.1:8118"

----------------------------------
Stop to follow a user, using TOR:
----------------------------------

./anontwi -u "@nick" --proxy "http://127.0.0.1:8118"

----------------------------------
Create a favorite, using TOR:
----------------------------------

./anontwi --fav "ID" --proxy "http://127.0.0.1:8118"

----------------------------------
Destroy favorite, using TOR:
----------------------------------

./anontwi --unfav "ID" --proxy "http://127.0.0.1:8118"

------------------------
Block a user, using TOR:
------------------------

./anontwi --block "@nick" --proxy "http://127.0.0.1:8118"

--------------------------
Unblock a user, using TOR:
--------------------------

./anontwi --unblock "@nick" --proxy "http://127.0.0.1:8118"

-----------------------------------------
Show a number of recent tweets of a user:
-----------------------------------------

You can control number of tweets to be reported. For example, 10 most recent tweets is like this:

./anontwi --tu "@nick 10"

-------------------------------------------------------
Show a number of recent tweets of your 'home' timeline:
-------------------------------------------------------

You can control number of tweets to be reported. For example, 10 most recent tweets is like this:

./anontwi --tf "10"

-------------------------------------------------------
Show a number of recent favorites
-------------------------------------------------------

You can control number of tweets to be reported. For example, 10 most recent tweets is like this:

./anontwi --tfav "@nick 10"

----------------------------------
Split a long message into "waves":
----------------------------------

Very usefull if you want to send long messages.
It uses Twitter restrictions as much efficient as possible.
Encryption is allowed :)

./anontwi -m "this is a very long message with more than 140 characters..." --waves

----------------------------------
Send fake geolocation coordenates:
----------------------------------

If you dont put any (--gps), coordenates will be random :)

./anontwi -m "text" --gps "(-43.5209),146.6015"

-------------------------------------------------
Show a number of Direct Messages of your account:
-------------------------------------------------

You can control number of DMs to be reported. For example, 5 most recent DMs is like this:

./anontwi --td "5"

-------------------------------------------
Returns global Trending Topics, using TOR:
-------------------------------------------

./anontwi --tt --proxy "http://127.0.0.1:8118"

-------------------------------------------
Returns last mentions about you, using TOR:
-------------------------------------------

You can control number of tweets to be reported. For example last recent tweet:

./anontwi --me "1" --proxy "http://127.0.0.1:8118"

---------------------------------------------
Decrypt a tweet directly from URL, using TOR:
---------------------------------------------

Remeber, to decrypt, you need the PIN/Key that another user has used to encrypt the message (symmetric keys)
To decrypt you don't need 'token key' and 'token secret' :)

./anontwi --dec "http://twitter.com/encrypted_message_path" --pin "K7DccSf3QPVxvbux85Tx/VIMkkDkcK+tFzi45YZ5E+g=" --proxy "http://127.0.0.1:8118"

----------------------------------------
Decrypt a tweet directly from raw input:
----------------------------------------

Remeber, to decrypt, you need the PIN/Key that another user has used to encrypt the message (symmetric keys)
To decrypt you don't need 'token key' and 'token secret' :)

./anontwi --dec "7asNGpFFDKQl7ku9om9CQfEKDq1ablUW+srgaFiEMa+YK0no8pXsx8pR" --pin "K7DccSf3QPVxvbux85Tx/VIMkkDkcK+tFzi45YZ5E+g="

----------------------------------------------------------
Save tweets starting from the last (max: 3200), using Tor:
----------------------------------------------------------

You can control number of tweets to be reported. For example last 1000 tweets:

./anontwi --save "1000" --proxy "http://127.0.0.1:8118"

-------------------------------------------------
Save favorites starting from the last, using Tor:
-------------------------------------------------

You can control number of tweets to be reported. For example last 100 tweets:

./anontwi --sfav "@nick 100" --proxy "http://127.0.0.1:8118"

-------------------
Suicide, using TOR:
-------------------

This will try to delete your tweets, your DMs and if is possible, your account.

./anontwi --suicide --proxy "http://127.0.0.1:8118"

===========
Contribute:
===========

Send bitcoins to this hash: 1Q56VRyageaaC6Rs7cT9t6eC7xTrKMp94a

========
Contact:
========

To report bugs, questions and help, for suggestions or new development tasking forces, you welcome on:

- irc.freenode.net (channel: #AnonTwi)