A small collection of potentially useful contract templates
☆425Jan 5, 2026Updated 4 months ago
Alternatives and similar repositories for Contracts
Users that are interested in Contracts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆697Jul 4, 2022Updated 3 years ago
- *Unofficial* lgtm.com CLI — Use at your own risk. Also don't add more than 3K projects to "My projects" list.☆13Feb 21, 2022Updated 4 years ago
- Get URLs from the Wayback Machine. Able to handle large outputs.☆35Sep 15, 2023Updated 2 years ago
- ☆73Nov 22, 2021Updated 4 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Client-Side Prototype Pollution Tools☆88Sep 21, 2021Updated 4 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- External monitoring for organization assets☆421Jun 5, 2024Updated last year
- tool for generating wordlists or extending an existing one using mutations.☆390Feb 1, 2026Updated 3 months ago
- 🦄🔒 Awesome list of secrets in environment variables 🖥️☆910Sep 21, 2022Updated 3 years ago
- ☆123Apr 22, 2026Updated 2 weeks ago
- Fetch web pages using headless Chrome, storing all fetched resources including JavaScript files. Run arbitrary JavaScript on many web pag…☆528Apr 23, 2025Updated last year
- BlueHound - pinpoint the security issues that actually matter☆763Jul 12, 2023Updated 2 years ago
- ☆191Jun 17, 2025Updated 10 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆2,103Jan 3, 2026Updated 4 months ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 4 years ago
- Code snippets I find useful☆32Sep 25, 2017Updated 8 years ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆236Feb 1, 2022Updated 4 years ago
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆61Apr 23, 2023Updated 3 years ago
- Convolutional neural network for analyzing pentest screenshots☆1,281Mar 8, 2026Updated 2 months ago
- Feed it a list of subdomains, it will resolve them and tell you which ones are internal☆93Nov 21, 2021Updated 4 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆448Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Rust-based high performance domain permutation generator.☆299Dec 2, 2023Updated 2 years ago
- Slides and demo code for past presentations☆12Feb 17, 2022Updated 4 years ago
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆972Jan 10, 2025Updated last year
- Filter and enrich a list of subdomains by level☆213Sep 25, 2023Updated 2 years ago
- ☆23Mar 29, 2022Updated 4 years ago
- A Burp Suite extension made to automate the process of finding reverse proxy path based SSRF.☆184Nov 22, 2021Updated 4 years ago
- ☆11Dec 19, 2024Updated last year
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Mar 4, 2022Updated 4 years ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Sep 20, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆3,068Apr 25, 2026Updated 2 weeks ago
- Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet☆56Oct 23, 2024Updated last year
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆642Jul 7, 2025Updated 10 months ago
- ☆14Jun 20, 2022Updated 3 years ago
- grep rough audit - source code auditing tool☆1,686Dec 19, 2025Updated 4 months ago
- Turns any junk text into a usable wordlist for brute-forcing.☆227Mar 16, 2024Updated 2 years ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆47Dec 5, 2022Updated 3 years ago