tcbutler320
M.A. candidate at Georgetown focused on the intersection between cybersecurity and statecraft | Adversary Simulation and Penetration Tester @Deloitte
@Deloitte
tcbutler320's Stars
sherlock-project/sherlock
Hunt down social media accounts by username across social networks
niklasvh/html2canvas
Screenshots with JavaScript
encode/django-rest-framework
Web APIs for Django. 🎸
vxunderground/MalwareSourceCode
Collection of malware source code for a variety of platforms in an array of different programming languages.
faker-js/faker
Generate massive amounts of fake data in the browser and node.js
ritwickdey/vscode-live-server
Launch a development local Server with live reload feature for static & dynamic pages.
cryptpad/cryptpad
Collaborative office suite, end-to-end encrypted and open-source.
halfmoonui/halfmoon
Halfmoon is a highly customizable, drop-in Bootstrap replacement. It comes with three built-in core themes, with dark mode support for all themes and components.
ipfs/ipfs-companion
Browser extension that simplifies access to IPFS resources on the web
LinkedInLearning/javascript-essential-training-2832077
This repository is for the Linkedin Learning course: JavaScript Essential Training
BinaryMuse/planetary.js
:earth_americas: Awesome interactive globes for the web
ViewTube/viewtube
▶️ ViewTube: The open source, privacy-conscious way to enjoy your favorite YouTube content. Docs: https://viewtube.wiki, Status: https://uptime.viewtube.io
hoodie/notify-rust
☝️send desktop notifications from your Rust app.
swanandx/lemmeknow
The fastest way to identify anything!
molly/web3-is-going-great
A timeline of some of the greatest hits in cryptocurrencies, NFTs, and other web3 projects since the beginning of 2021
baderj/domain_generation_algorithms
Some results of my DGA reversing efforts
vinced/namecoin
Vince's tree - see namecoin/namecoin for main integration tree
responsible-financial-innovation-act22/RFIA-bill
sublime-security/sublime-rules
Sublime rules for email attack detection, prevention, and threat hunting.
yahoo/check-log4j
To determine if a host is vulnerable to log4j CVE‐2021‐44228
pussycat0x/malicious-pdf
Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator
SomajitDey/ipfs-chat
Real-time P2P messenger using go-ipfs pubsub. TUI. End-to-end encrypted texting & file-sharing. NAT traversal.
ipld/explore.ipld.io
Explore the Merkle Forest from the comfort of your browser
hasenbanck/egui_example
Simple example on how to use egui with wgpu and winit.
platdrag/UnblockableChains
Unblockable Chains - A POC on using blockchain as infrastructure for malware operations
tornadocash/torn-token
georgetown-cset/GPT3-Disinformation
Data and code related to the report "Truth, Lies, and Automation: How Language Models Could Change Disinformation"
pmarsceill/stately
A Jekyll theme for Government
tcbutler320/BananaCannon
BananaCannon is a series of exploit proof of concepts for MonkeyType.com, a popular typing test web application with a growing community. This repository contains XSS exploits and a python PoC to spoof leaderboard scores
0x90skids/mother-bot