An index of vendors in the MSP space who have published their Vulnerability Disclosure Program and Bug Bounty Programs.
☆12Apr 19, 2022Updated 3 years ago
Alternatives and similar repositories for MSP-Vendors-VDP-BBP
Users that are interested in MSP-Vendors-VDP-BBP are comparing it to the libraries listed below
Sorting:
- My notes and useful links I used to pass CISSP. I also included some videos talking about each of the eight domains. Happy Hunting on the…☆15Sep 15, 2021Updated 4 years ago
- ☆12Mar 10, 2019Updated 7 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Static HTML | XML | SVG renderer using JSX, suitable for report output.☆20Mar 4, 2023Updated 3 years ago
- PowerShell module for Duo Security REST APIs☆24Aug 30, 2024Updated last year
- 🏄🏼 The DjangoCon US 2022 conference website☆11Jan 8, 2023Updated 3 years ago
- This is a powershell module used to access the Pax8 API☆19Apr 20, 2024Updated last year
- Cheatsheets and other Yealink Phone information.☆17Apr 13, 2018Updated 7 years ago
- Django Template is a cookiecutter that automates the installation and configuration of Django with optional features.☆13Oct 20, 2025Updated 5 months ago
- HTTP error reporting middleware(s) for Django☆17Dec 28, 2020Updated 5 years ago
- Convert Sigma rules to LogRhythm searches☆23Feb 27, 2022Updated 4 years ago
- CTFs I've played so far☆17Feb 1, 2025Updated last year
- Community Rewst Workflows☆18Feb 13, 2024Updated 2 years ago
- Used to make sure the PowerShell Gallery can be used.☆21Aug 4, 2025Updated 7 months ago
- ConnectWise Control - Automate Diagnostics Extension☆28Aug 5, 2024Updated last year
- Restic implementation in Python☆16Sep 3, 2024Updated last year
- This will serve as links to write-ups about solving the challenges on ROOTCON's CTF through the years☆30Oct 5, 2024Updated last year
- Learn-Programming-in-Python-with-Cody-Jackson, published by Packt☆17Jan 30, 2023Updated 3 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- A python module for red teams to support the continuous recon of JavaScript files and HTML script blocks in an active web application.☆14Oct 18, 2023Updated 2 years ago
- Run on new machines to setup quickly. Business and Non-Business modes.☆20Jul 9, 2025Updated 8 months ago
- ☆23Nov 28, 2018Updated 7 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆25Nov 18, 2025Updated 4 months ago
- ☆34Sep 3, 2020Updated 5 years ago
- Yet another machine learning-based WAF research☆26Jun 21, 2022Updated 3 years ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Feb 13, 2022Updated 4 years ago
- This repository contains a python-based replication tool for Zabbix Servers☆16Oct 16, 2019Updated 6 years ago
- Pieces of code that are not big enough to be worth their own repository☆28Aug 21, 2013Updated 12 years ago
- ☆24Oct 28, 2022Updated 3 years ago
- ☆30Updated this week
- The Bro/Zeek language cheat sheet☆53Mar 8, 2013Updated 13 years ago
- Reference implementation of Quack☆63Oct 19, 2019Updated 6 years ago
- Contracts for cBridge, cross-chain liquidity solution powered by Hashed-Timelock Transfers☆11Nov 1, 2021Updated 4 years ago
- A curated list of N8N nodes related to MSP tools (RMM, PSA, Distributors, etc).☆68Updated this week
- elementary cellular automata example☆16Nov 23, 2018Updated 7 years ago
- MsiInv.exe - queries Windows Installer (MSI) registration on current machine. Written as test tool years ago...☆27Sep 7, 2018Updated 7 years ago
- ☆39Dec 20, 2025Updated 3 months ago
- An admission control policy that safeguards against accidental duplicate claiming of Hosts/Domains.☆14Jul 9, 2018Updated 7 years ago
- ☆20Aug 28, 2022Updated 3 years ago