Skip to content
View threatsurfer's full-sized avatar

Block or report threatsurfer

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
16 stars written in JavaScript
Clear filter

The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis

JavaScript 29,563 3,307 Updated Oct 23, 2024

Pentest Report Generator

JavaScript 2,330 440 Updated Dec 12, 2024

ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.

JavaScript 2,299 504 Updated Oct 8, 2024

WarBerryPi - Tactical Exploitation

JavaScript 2,221 288 Updated Nov 9, 2019

Web Desktop Operating System for low power platforms, Now written in Go!

JavaScript 2,027 144 Updated Dec 11, 2024

Open source knowledge base application for Teams

JavaScript 1,231 158 Updated Jun 1, 2023

SimplE RePort wrIting and COllaboration tool

JavaScript 1,093 370 Updated May 3, 2020

BurpSuite using the document and some extensions

JavaScript 967 422 Updated Sep 10, 2022

A Javascript library for browser exploitation

JavaScript 874 108 Updated Feb 12, 2019

Easy automated vulnerability scanning, reporting and analysis

JavaScript 698 159 Updated Jan 10, 2020

A framework for identifying and launching exploits against internal network hosts. Works via WebRTC IP enumeration combined with WebSockets and external resource fingerprinting.

JavaScript 541 75 Updated Nov 6, 2015

Sandia Cyber Omni Tracker (SCOT)

JavaScript 245 48 Updated Nov 4, 2024

A Distributed, Search-Optimized Full Packet Capture System

JavaScript 240 49 Updated Apr 17, 2023

A graphical security analysis tool for IoT networks

JavaScript 201 75 Updated Apr 17, 2019

A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber

JavaScript 98 30 Updated Jun 8, 2016

Secure approach to secure file storage in untrusted environments.

JavaScript 36 6 Updated Mar 26, 2019