ProZachJ / ducktalesLinks
Python's handling of NaN is....interesting?broken?...this project illustrates the issue
☆13Updated 3 years ago
Alternatives and similar repositories for ducktales
Users that are interested in ducktales are comparing it to the libraries listed below
Sorting:
- ☆90Updated 3 years ago
- A collection of BBRF agents that can be deployed to AWS lambda☆23Updated 8 months ago
- ☆15Updated 4 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 3 years ago
- ☆94Updated 3 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆65Updated last year
- ☆18Updated last year
- ☆21Updated 7 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆34Updated 3 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated last year
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Updated 10 months ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆22Updated 3 years ago
- ☆38Updated 4 years ago
- ☆23Updated 2 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆50Updated 2 years ago
- ☆26Updated 3 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 3 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 4 years ago
- Ffuf output browser☆39Updated 2 years ago
- Python script to launch burp scans automatically☆32Updated 4 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆32Updated 4 months ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- A collection of my Semgrep rules☆49Updated 2 years ago
- Stay within program scope☆37Updated 2 years ago
- ☆10Updated 6 years ago
- Dependency Confusion Security Testing Tool☆48Updated 3 years ago
- ☆48Updated 4 years ago
- CVE PoCs☆21Updated 5 years ago