Use one communication platform to enhance clinical workflows and improve patient care
Communication among care team members involves a complex relationship between people, devices, and hospital systems. You might be struggling with an overwhelming surge of data, gaps in your communication, or inefficient communication workflows. These challenges make your job harder and negatively impact patient outcomes. There’s a solution to help – Spok Care Connect®. Spok Care Connect is the unified communication platform that provides care team collaboration, closed loop communication, and secure messaging to enhance your clinical workflows. It’s possible for one unified communication platform to solve the multiple challenges across different areas, departments, and locations in your health system.
A security testing tool to facilitate GraphQL technology security auditing efforts. InQL can be used as a stand-alone script or as a Burp Suite extension. Since version 1.0.0 of the tool, InQL was extended to operate within Burp Suite. In this mode, the tool will retain all the stand-alone script capabilities and add a handy user interface for manipulating queries. Search for known GraphQL URL paths; the tool will grep and match known values to detect GraphQL endpoints within the target website...
Wapiti is a vulnerability scanner for web applications.
It currently search vulnerabilities like XSS, SQL and XPath injections, file inclusions, command execution, XXE injections, CRLF injections, Server Side Request Forgery, Open Redirects...
It use the Python 3 programming language.
BoTube2 is another IRC BOT with an advanced plugin system that makes easy to develop new capabilities, by now there are only 12 plugins developed, you can develop more if you want. Added first revision of documentation for the plugin developer (spanish only by now). Would you like to enpower Botube2 with your own plugin? Lots of bugfixes here!
A web interface for various penetration testing tools
Penetration-Testing-Toolkit is a web based project to automate Scanning a network,Exploring CMS, Generating Undectable metasploit payload, DNS-Queries, IP related informations, Information Gathering, Domain related info etc