Collection of scripts that utilize Twitter API for suspicious behavior analysis.
You need to enter new Twitter API values (api_key, api_secrets, access_token, access_secret) on lines: 17, 18, 22 and 23.
Interesting analysis done with similar scripts:
- https://security-net.biz/shared/bots/Analiza_neocekivanog_Twitter_statusa_IM_2022.pdf
- https://security-net.biz/shared/bots/Analiza_neocekivanog_Twitter_statusa_IM_2022_v2.pdf
This script is using oudated API. It requires some rewriting.