Search & extract tweets without API keys. Search 1B+ tweets, find trending topics, monitor users, export to CSV. No Twitter Developer account needed.
- 🔍 Search tweets by keyword — no API key required
- 🔥 Trending topics — see what's hot right now
- 👤 User timeline — get recent tweets from any user
- 📊 CSV export — save results for analysis
- 🎯 Hack trends mode — one command to find cybersecurity/hacking trends
- 🔐 Cookie auth optional — better rate limits with your session cookies
git clone https://github.com/ridhinva/TwitterScraper.git
cd TwitterScraper
pip install requestspython3 twitterscraper.py search "CVE-2026-9082"
python3 twitterscraper.py search "Drupal SQL injection" --count 50python3 twitterscraper.py trendingpython3 twitterscraper.py user CISACyber
python3 twitterscraper.py user @elonmusk --count 10python3 twitterscraper.py hack-trendspython3 twitterscraper.py search "bugbounty tips" --csv results.csvPlace ~/.twitter_cookies.json with your browser cookies for authenticated access:
[
{"name":"auth_token","value":"...","domain":".x.com","path":"/"},
{"name":"ct0","value":"...","domain":".x.com","path":"/"},
{"name":"twid","value":"...","domain":".x.com","path":"/"}
]Extract cookies from your browser using EditThisCookie or similar extension.
- Bug bounty hunters — track trending CVEs and exploit discussions
- Researchers — collect dataset of tweets for analysis
- Threat intel — monitor CISA KEV additions, 0day chatter
- Social listening — track brand mentions, sentiment analysis
Uses Twitter's public guest API endpoint (no OAuth needed) with a Bearer token extracted from the web client. Falls back to web scraping when API limits are hit.
@c_y_p_h3r — Bug bounty hunter & security researcher
For educational and research purposes only. Respect Twitter's Terms of Service.