What is HL7 and why does healthcare need it?

4 years ago

If you have been around in the healthcare industry for a while, you might agree that interoperability between systems has…

SharpWebServer : HTTP And WebDAV Server With Net-NTLM Hashes Capture Functionality

4 years ago

SharpWebServer is a Red Team oriented simple HTTP & WebDAV server written in C# with functionality to capture Net-NTLM hashes. To be…

Libinjection : SQL / SQLI Tokenizer Parser Analyzer

4 years ago

Libinjection is a SQL / SQLI tokenizer parser analyzer. For C and C++PHPPythonLuaJava (external port)[LuaJIT/FFI] (https://github.com/p0pr0ck5/lua-ffi-libinjection) (external port) Simple example #include#include#include#include…

Bbscope : Scope Gathering Tool For HackerOne, Bugcrowd, And Intigriti

4 years ago

Bbscope, the ultimate scope gathering tool for HackerOne, Bugcrowd, and Intigriti by sw33tLie. Need to grep all the large scope…

Shepard : In Progress Persistent Download/Upload/Execution Tool Using Windows BITS

4 years ago

Shepard is an IN PROGRESS persistence tool using Windows Background Intelligent Transfer Service (BITS). Functionality: File Download, File Exfiltration, File…

Typodetect : Detect The Active Mutations Of Domains

4 years ago

Typodetect is a tool gives blue teams, SOC's, researchers and companies the ability to detect the active mutations of their…

Krane : Kubernetes RBAC Static Analysis And Visualisation Tool

4 years ago

Krane is a simple Kubernetes RBAC static analysis tool. It identifies potential security risks in K8s RBAC design and makes suggestions…

TotP-SSH-Fluxer : Take Security By Obscurity To The Next Level

4 years ago

Totp-Ssh-Fluxer will take Security By Obscurity To The Next Level. Some people change their SSH port on their servers so…

defenselessV1 : Just Another Vulnerable Web Application

4 years ago

defenselessV1 is a vulnerable web application written in PHP/MySQL. This is the first version of this application. The purpose of…

TChopper : Conduct Lateral Movement Attack By Leveraging Unfiltered Services Display Name To Smuggle Binaries As Chunks Into The Target Machine

4 years ago

TChopper, a new technique I have discovered recently and give it a nickname (Chop chop) to perform lateral movement using…