<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Cryptography on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/categories/cryptography/</link><description>Recent content in Cryptography on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/categories/cryptography/feed.xml" rel="self" type="application/rss+xml"/><item><title>BurpCrypto</title><link>https://rainmana.github.io/hackyfeed/tools/whwlsfb-burpcrypto/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/whwlsfb-burpcrypto/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BurpCrypto is a collection of encryption plugins for Burp Suite, supporting multiple encryption algorithms including AES, RSA, and DES, as well as the execution of JavaScript code for encryption tasks. Its primary use case is to enhance the capabilities of security professionals by allowing them to integrate cryptographic functions directly into their testing workflows. Notable features include a user-friendly interface for key management and seamless integration with Burp Suite&amp;rsquo;s payload processing system.&lt;/p&gt;</description></item><item><title>CaptfEncoder</title><link>https://rainmana.github.io/hackyfeed/tools/guyoung-captfencoder/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/guyoung-captfencoder/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CaptfEncoder is an open-source, cross-platform network security tool suite designed for code conversion, cryptography, and a variety of online query tools. It features a wide range of encoding methods, classical ciphers, and modern cryptographic algorithms, enabling users to perform tasks such as data encoding, encryption, and security analysis efficiently. The tool is built in Rust, ensuring enhanced performance and supports a variety of operating systems including Windows, Linux, and macOS.&lt;/p&gt;</description></item><item><title>Ciphey</title><link>https://rainmana.github.io/hackyfeed/tools/bee-san-ciphey/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bee-san-ciphey/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ciphey is a fully automated tool designed for decryption, decoding, and cracking of encoded data, leveraging natural language processing and artificial intelligence techniques. Its primary use case is to assist cybersecurity professionals and enthusiasts in deciphering encrypted messages and files without requiring prior knowledge of the encryption methods used. Notable features include support for various installation methods (Python, Docker, MacPorts, Homebrew) and a user-friendly interface that simplifies the decryption process.&lt;/p&gt;</description></item><item><title>cli</title><link>https://rainmana.github.io/hackyfeed/tools/smallstep-cli/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/smallstep-cli/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Step CLI is a robust command-line interface tool designed for building and managing Public Key Infrastructure (PKI) systems and workflows, providing functionalities for cryptographic operations and X.509 certificate management. Key features include the ability to create, revoke, and validate certificates, generate key pairs and Certificate Signing Requests (CSRs), and automate certificate issuance via integration with the step-ca server and ACME-compliant CAs. The tool simplifies the setup and maintenance of secure TLS/HTTPS environments, making it essential for developers and system administrators working with PKI.&lt;/p&gt;</description></item><item><title>Cloakify</title><link>https://rainmana.github.io/hackyfeed/tools/trycatchhcf-cloakify/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/trycatchhcf-cloakify/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CloakifyFactory is a tool designed for text-based steganography that transforms any file type into a list of innocuous strings, enabling covert data exfiltration and infiltration while evading detection by data loss prevention systems and analysts. Key features include the ability to cloak various file formats, social engineering capabilities to mislead security reviews, and the option to add noise for enhanced resistance against frequency analysis. It serves as an educational tool for introducing concepts of cryptography and steganography, though it is not secure for sensitive data without prior encryption.&lt;/p&gt;</description></item><item><title>console</title><link>https://rainmana.github.io/hackyfeed/tools/phasehq-console/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/phasehq-console/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Phase Console is an open-source platform designed for engineering teams to efficiently manage and secure application secrets throughout the development lifecycle. Its notable features include a comprehensive dashboard for secret management, role-based access control, seamless integration with various CI/CD platforms and Kubernetes, as well as SDK support for multiple programming languages, enabling secure secret injection and synchronization across environments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
 &lt;!-- Phase Console --&gt;
 &lt;a href="https://phase.dev"&gt;
 &lt;img height="120" width="450" src="img/phase-lattice-logo.svg" alt="Phase"&gt;
 &lt;/a&gt;
 &lt;h5&gt;Repos&lt;/h5&gt;
 &lt;p&gt;
 &lt;a href="https://github.com/phasehq/docs"&gt;Docs&lt;/a&gt; |
 &lt;a href="https://github.com/phasehq/cli"&gt;CLI&lt;/a&gt; |
 &lt;a href="https://github.com/phasehq/node-sdk"&gt;Node SDK&lt;/a&gt; |
 &lt;a href="https://github.com/phasehq/python-sdk"&gt;Python SDK&lt;/a&gt;
 &lt;br/&gt;
 &lt;a href="https://github.com/phasehq/golang-sdk"&gt;Golang SDK&lt;/a&gt; |
 &lt;a href="https://github.com/phasehq/kubernetes-secrets-operator/tree/main/phase-console"&gt;Helm Chart&lt;/a&gt; |
 &lt;a href="https://github.com/phasehq/kubernetes-secrets-operator"&gt;Kubernetes Operator&lt;/a&gt; |
 &lt;a href="https://github.com/phasehq/terraform-provider-phase"&gt;Terraform Provider&lt;/a&gt;
 &lt;/p&gt;</description></item><item><title>crypto-attacks</title><link>https://rainmana.github.io/hackyfeed/tools/jvdsn-crypto-attacks/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jvdsn-crypto-attacks/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &lt;code&gt;crypto-attacks&lt;/code&gt; repository provides Python implementations of various cryptographic attacks and utilities, primarily focusing on attacking RSA using methods such as the Boneh-Durfee attack. Notable features include the ability to customize parameters for specific attacks, integration with SageMath for advanced mathematical computations, and a structured approach for unit testing and utilizing the attack scripts.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Python implementations of cryptographic attacks and utilities.&lt;/p&gt;
&lt;h2 id="requirements"&gt;Requirements&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.sagemath.org/"&gt;SageMath&lt;/a&gt; with Python 3.9&lt;/li&gt;
&lt;li&gt;&lt;a href="https://pycryptodome.readthedocs.io/"&gt;PyCryptodome&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;You can check your SageMath Python version using the following command:&lt;/p&gt;</description></item><item><title>ctf-skills</title><link>https://rainmana.github.io/hackyfeed/tools/ljagiello-ctf-skills/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ljagiello-ctf-skills/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The ctf-skills repository provides an extensive collection of agent skills designed to facilitate the solving of Capture The Flag (CTF) challenges across various domains, including web exploitation, binary pwn, reverse engineering, and more. Notable features include support for multiple installation methods, a comprehensive tool installer script, and detailed skill documentation for on-demand use, allowing users to efficiently integrate the necessary tools as challenges arise. It is compatible with any tool adhering to the Agent Skills specification, enhancing its versatility in competitive cybersecurity contexts.&lt;/p&gt;</description></item><item><title>CTFever</title><link>https://rainmana.github.io/hackyfeed/tools/uniiemstudio-ctfever/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/uniiemstudio-ctfever/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CTFever is a comprehensive toolkit designed for Capture The Flag (CTF) participants, offering a variety of utilities to assist in solving challenges. It includes a range of tools for tasks such as encoding/decoding, cryptography, and data analysis, featuring notable options like Base64 encoding, Caesar ciphers, and hash calculations. This resource is particularly beneficial for cybersecurity enthusiasts engaged in competitive environments, aiming to streamline their workflow and enhance their problem-solving capabilities.&lt;/p&gt;</description></item><item><title>CTFs</title><link>https://rainmana.github.io/hackyfeed/tools/adamkadaban-ctfs/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/adamkadaban-ctfs/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CTFs is a repository containing write-ups and resources for various Cyber Capture The Flag (CTF) challenges. It offers a comprehensive cheat sheet detailing strategies and techniques across diverse categories, including forensics, binary exploitation, web challenges, and cryptography. Notable features include curated educational resources, practice sites, and a web mirror for easy access.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="ctfs"&gt;CTFs&lt;/h1&gt;
&lt;p&gt;Writeups / Files for some of the Cyber CTFs that I&amp;rsquo;ve done&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ve also included a list of &lt;strong&gt;CTF resources&lt;/strong&gt; as well as a comprehensive &lt;strong&gt;cheat sheet&lt;/strong&gt; covering tons of common CTF challenges&lt;/p&gt;</description></item><item><title>DeepTraffic</title><link>https://rainmana.github.io/hackyfeed/tools/echowei-deeptraffic/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/echowei-deeptraffic/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DeepTraffic is a toolkit that employs deep learning models specifically for the classification of network traffic, focusing on identifying malware and anomalies. Its primary application lies in enhancing cybersecurity measures through effective traffic analysis and representation learning using convolutional neural networks. Notable features include end-to-end encrypted traffic classification and the ability to learn hierarchical spatial-temporal features for improved intrusion detection.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="deep-learning-models-for-network-traffic-classification"&gt;Deep Learning models for network traffic classification&lt;/h1&gt;
&lt;p&gt;For more information please read our papers.&lt;br&gt;&lt;/p&gt;</description></item><item><title>destroylist</title><link>https://rainmana.github.io/hackyfeed/tools/phishdestroy-destroylist/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/phishdestroy-destroylist/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Destroylist is a comprehensive phishing and scam domain blacklist that provides real-time threat intelligence to protect users globally. This tool maintains an extensive database of over 100,000 phishing domains and features active statistics on domain additions and removals, ensuring up-to-date protection against online threats. The repository supports community contributions, fostering collaborative efforts in enhancing online security.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="destroylist-phishing--scam-domain-blacklist"&gt;&lt;img src="https://raw.githubusercontent.com/Tarikul-Islam-Anik/Animated-Fluent-Emojis/master/Emojis/Activities/Performing%20Arts.png" alt="Performing Arts" width="28" height="28" /&gt; Destroylist: Phishing &amp;amp; Scam Domain Blacklist&lt;/h1&gt;
&lt;p&gt;&lt;img src="scripts/destroyolist_image.png" alt="Destroyolist Illustration"&gt;&lt;/p&gt;</description></item><item><title>dotenvx</title><link>https://rainmana.github.io/hackyfeed/tools/dotenvx-dotenvx/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dotenvx-dotenvx/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dotenvx is a secure dotenv tool that allows developers to manage environment variables across multiple platforms and programming languages. Its primary use case is to enhance the safety and flexibility of environment variable handling by providing support for encrypted environment files and easy integration into existing applications. Notable features include cross-platform compatibility, multi-environment management, and straightforward installation options via various package managers and direct execution methods.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://dotenvx.com"&gt;&lt;img src="https://dotenvx.com/banner.png" alt="dotenvx"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>featherduster</title><link>https://rainmana.github.io/hackyfeed/tools/nccgroup-featherduster/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nccgroup-featherduster/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; FeatherDuster is a cryptographic analysis tool designed to facilitate the identification and exploitation of weaknesses in cryptosystems, leveraging its underlying library, Cryptanalib. It offers capabilities for automatic encoding detection and decoding, interaction with multiple ciphertext formats, and supports various cryptographic analysis functions, making it suitable for both researchers and practitioners in the field of cryptography. The tool aims to simplify the process of analyzing flawed cryptographic implementations, while Cryptanalib serves as a flexible engine for developing custom crypto attack methods.&lt;/p&gt;</description></item><item><title>FilelessPELoader</title><link>https://rainmana.github.io/hackyfeed/tools/saadahla-filelesspeloader/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/saadahla-filelesspeloader/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; FilelessPELoader is a tool designed to load and execute AES-encrypted Portable Executable (PE) files directly into memory, bypassing the need for traditional file storage. Its primary use case is to facilitate stealthy execution of payloads in memory, enhancing evasion techniques commonly utilized in cybersecurity attacks. Notable features include the ability to decrypt the PE file in-memory and execute it without leaving traces on disk.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="filelesspeloader"&gt;FilelessPELoader&lt;/h1&gt;
&lt;p&gt;Loading Remote AES Encrypted PE in memory , Decrypted it and run it&lt;/p&gt;</description></item><item><title>frida-ios-dump</title><link>https://rainmana.github.io/hackyfeed/tools/alonemonkey-frida-ios-dump/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/alonemonkey-frida-ios-dump/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; frida-ios-dump is a tool designed for extracting decrypted IPA files from jailbroken iOS devices. The primary use case involves leveraging Frida to automate the process of dumping application binaries, making it particularly useful for security researchers and developers analyzing iOS applications. Notable features include support for both Python 2.x and 3.x, as well as a straightforward command-line interface for initiating the dump process with either the display name or bundle identifier of the target app.&lt;/p&gt;</description></item><item><title>GDA-android-reversing-Tool</title><link>https://rainmana.github.io/hackyfeed/tools/charles2gan-gda-android-reversing-tool/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/charles2gan-gda-android-reversing-tool/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GDA (GJoy Dex Analyzer) is a powerful Dalvik bytecode decompiler designed for fast analysis of APK, DEX, ODEX, OAT, JAR, CLASS, and AAR files, with minimal memory and disk consumption. It features advanced capabilities including malicious behavior detection, vulnerability scanning, path solving, and deobfuscation, as well as various utilities for interactive operation and assisted analysis. GDA operates natively without requiring a Java VM, making it suitable for use on various Windows systems and virtual machines.&lt;/p&gt;</description></item><item><title>GonnaCry</title><link>https://rainmana.github.io/hackyfeed/tools/tarcisio-marinho-gonnacry/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tarcisio-marinho-gonnacry/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GonnaCry is a Linux-based ransomware designed to encrypt user files using a robust AES-256-CBC encryption scheme, featuring per-file random AES keys and initialization vectors. Its primary use case is to serve as an educational tool for understanding malware, cryptography, and operating systems, with capabilities such as communicating with a server for key management, altering system wallpapers, and terminating database services. Notable features include a built-in decryptor and the use of RSA-2048 for secure key encryption, making it a comprehensive demonstration of ransomware mechanics.&lt;/p&gt;</description></item><item><title>GpgFrontend</title><link>https://rainmana.github.io/hackyfeed/tools/saturneric-gpgfrontend/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/saturneric-gpgfrontend/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GpgFrontend is a modern encryption tool that leverages GnuPG to facilitate easy and secure encryption and signing of texts and files across multiple platforms, including Windows, macOS, and Linux. Key features include a portable solution that can be run from a USB drive, flexible management of key databases, and a strong focus on user privacy through various safety measures. The tool also supports extensive module development, allowing for customizable user experiences and features.&lt;/p&gt;</description></item><item><title>HackBrowserData</title><link>https://rainmana.github.io/hackyfeed/tools/moond4rk-hackbrowserdata/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/moond4rk-hackbrowserdata/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HackBrowserData is a command-line utility designed for decrypting and exporting sensitive data, such as passwords, cookies, and browsing history, from various popular web browsers on Windows, macOS, and Linux. Its notable features include support for the latest encryption standards, like AES-256-CBC for Firefox 144 and beyond, and comprehensive compatibility with a wide range of browsers including Google Chrome, Microsoft Edge, and Opera. The tool emphasizes its intended use for security research while disclaiming legal responsibilities associated with its application.&lt;/p&gt;</description></item><item><title>hackdroid</title><link>https://rainmana.github.io/hackyfeed/tools/thehackingsage-hackdroid/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/thehackingsage-hackdroid/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HackDroid is a comprehensive collection of penetration testing and security-related applications tailored for Android devices. It organizes applications into diverse categories, including forensics, networking, and cryptography, to facilitate easy access and download, while emphasizing the necessity of root permissions and ethical use cases. Notable features include a wide range of tools for various hacking and security tasks, and guidance for use on secondary devices to mitigate risks.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
	&lt;a href="https://thehackingsage.com/hackdroid/"&gt;&lt;img src="https://thehackingsage.com/hackdroid/assets/img/hackdroid/logo.png" alt="HACKDROID"&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>hrtng</title><link>https://rainmana.github.io/hackyfeed/tools/kasperskylab-hrtng/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/kasperskylab-hrtng/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The hrtng IDA plugin provides a suite of tools designed to enhance the reverse engineering process within the IDA Pro environment, specifically leveraging the Hex-Rays decompiler. Its notable features include automation of variable renaming, interactive pseudocode transformations, various decryption capabilities, and assistance with obfuscated code analysis, all aimed at improving the efficiency and accuracy of binary analysis tasks. The plugin integrates seamlessly into IDA’s existing functionality, offering a structured approach to handling complex code scenarios.&lt;/p&gt;</description></item><item><title>Malware-Exhibit</title><link>https://rainmana.github.io/hackyfeed/tools/alvin-tosh-malware-exhibit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/alvin-tosh-malware-exhibit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Malware-Exhibit is a malware analysis tool designed for researchers and security professionals to dissect and analyze various malware samples. It supports multiple programming languages and platforms, allowing users to examine the behavior and characteristics of malware, providing insights for threat detection and mitigation. Notable features include a comprehensive user interface and the ability to integrate additional analysis tools and scripts.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="./LICENSE"&gt;&lt;img src="https://img.shields.io/github/license/Ileriayo/markdown-badges?style=for-the-badge" alt="Licence"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1 id="-malware-exhibit-"&gt;&lt;h1 align="center"&gt;⚠️⚠️ Malware-Exhibit ⚠️⚠️&lt;/h1&gt;&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://img.shields.io/badge/c-%2300599C.svg?style=for-the-badge&amp;amp;logo=c&amp;amp;logoColor=white" alt="C"&gt;&lt;img src="https://img.shields.io/badge/c++-%2300599C.svg?style=for-the-badge&amp;amp;logo=c%2B%2B&amp;amp;logoColor=white" alt="C++"&gt;&lt;img src="https://img.shields.io/badge/go-%2300ADD8.svg?style=for-the-badge&amp;amp;logo=go&amp;amp;logoColor=white" alt="Go"&gt;&lt;img src="https://img.shields.io/badge/java-%23ED8B00.svg?style=for-the-badge&amp;amp;logo=java&amp;amp;logoColor=white" alt="Java"&gt;&lt;img src="https://img.shields.io/badge/javascript-%23323330.svg?style=for-the-badge&amp;amp;logo=javascript&amp;amp;logoColor=%23F7DF1E" alt="JavaScript"&gt;&lt;img src="https://img.shields.io/badge/perl-%2339457E.svg?style=for-the-badge&amp;amp;logo=perl&amp;amp;logoColor=white" alt="Perl"&gt;&lt;img src="https://img.shields.io/badge/ruby-%23CC342D.svg?style=for-the-badge&amp;amp;logo=ruby&amp;amp;logoColor=white" alt="Ruby"&gt;&lt;img src="https://img.shields.io/badge/php-%23777BB4.svg?style=for-the-badge&amp;amp;logo=php&amp;amp;logoColor=white" alt="PHP"&gt; &lt;img src="https://img.shields.io/badge/PowerShell-%235391FE.svg?style=for-the-badge&amp;amp;logo=powershell&amp;amp;logoColor=white" alt="PowerShell"&gt;&lt;img src="https://img.shields.io/badge/python-3670A0?style=for-the-badge&amp;amp;logo=python&amp;amp;logoColor=ffdd54" alt="Python"&gt;&lt;img src="https://img.shields.io/badge/r-%23276DC3.svg?style=for-the-badge&amp;amp;logo=r&amp;amp;logoColor=white" alt="R"&gt;&lt;img src="https://img.shields.io/badge/.NET-5C2D91?style=for-the-badge&amp;amp;logo=.net&amp;amp;logoColor=white" alt=".Net"&gt;&lt;img src="https://img.shields.io/badge/shell_script-%23121011.svg?style=for-the-badge&amp;amp;logo=gnu-bash&amp;amp;logoColor=white" alt="Shell Script"&gt;&lt;img src="https://img.shields.io/badge/typescript-%23007ACC.svg?style=for-the-badge&amp;amp;logo=typescript&amp;amp;logoColor=white" alt="TypeScript"&gt;&lt;img src="https://img.shields.io/badge/rust-%23000000.svg?style=for-the-badge&amp;amp;logo=rust&amp;amp;logoColor=white" alt="Rust"&gt;&lt;img src="https://img.shields.io/badge/Firefox-FF7139?style=for-the-badge&amp;amp;logo=Firefox-Browser&amp;amp;logoColor=white" alt="Firefox"&gt;&lt;img src="https://img.shields.io/badge/Edge-0078D7?style=for-the-badge&amp;amp;logo=Microsoft-edge&amp;amp;logoColor=white" alt="Edge"&gt;&lt;img src="https://img.shields.io/badge/Firebase-039BE5?style=for-the-badge&amp;amp;logo=Firebase&amp;amp;logoColor=white" alt="Firebase"&gt;&lt;img src="https://img.shields.io/badge/postgres-%23316192.svg?style=for-the-badge&amp;amp;logo=postgresql&amp;amp;logoColor=white" alt="Postgres"&gt;&lt;img src="https://img.shields.io/badge/PayPal-00457C?style=for-the-badge&amp;amp;logo=paypal&amp;amp;logoColor=white" alt="PayPal"&gt;&lt;img src="https://img.shields.io/badge/AWS-%23FF9900.svg?style=for-the-badge&amp;amp;logo=amazon-aws&amp;amp;logoColor=white" alt="AWS"&gt;&lt;img src="https://img.shields.io/badge/azure-%230072C6.svg?style=for-the-badge&amp;amp;logo=microsoftazure&amp;amp;logoColor=white" alt="Azure"&gt;&lt;img src="https://img.shields.io/badge/Oracle-F80000?style=for-the-badge&amp;amp;logo=oracle&amp;amp;logoColor=white" alt="Oracle"&gt;&lt;img src="https://img.shields.io/badge/Microsoft-0078D4?style=for-the-badge&amp;amp;logo=microsoft&amp;amp;logoColor=white" alt="Microsoft"&gt; &lt;img src="https://img.shields.io/badge/Android-3DDC84?style=for-the-badge&amp;amp;logo=android&amp;amp;logoColor=white" alt="Android"&gt; &lt;img src="https://img.shields.io/badge/Linux-FCC624?style=for-the-badge&amp;amp;logo=linux&amp;amp;logoColor=black" alt="Linux"&gt; &lt;img src="https://img.shields.io/badge/Ubuntu-E95420?style=for-the-badge&amp;amp;logo=ubuntu&amp;amp;logoColor=white" alt="Ubuntu"&gt; &lt;img src="https://img.shields.io/badge/mac%20os-000000?style=for-the-badge&amp;amp;logo=macos&amp;amp;logoColor=F0F0F0" alt="macOS"&gt; &lt;img src="https://img.shields.io/badge/Windows-0078D6?style=for-the-badge&amp;amp;logo=windows&amp;amp;logoColor=white" alt="Windows"&gt; &lt;img src="https://img.shields.io/badge/apache-%23D42029.svg?style=for-the-badge&amp;amp;logo=apache&amp;amp;logoColor=white" alt="Apache"&gt; &lt;img src="https://img.shields.io/badge/apache%20tomcat-%23F8DC75.svg?style=for-the-badge&amp;amp;logo=apache-tomcat&amp;amp;logoColor=black" alt="Apache Tomcat"&gt; &lt;img src="https://img.shields.io/badge/Apple-%23000000.svg?style=for-the-badge&amp;amp;logo=apple&amp;amp;logoColor=white" alt="Apple"&gt; &lt;img src="https://img.shields.io/badge/nginx-%23009639.svg?style=for-the-badge&amp;amp;logo=nginx&amp;amp;logoColor=white" alt="Nginx"&gt; &lt;img src="https://img.shields.io/badge/Google_Play-414141?style=for-the-badge&amp;amp;logo=google-play&amp;amp;logoColor=white" alt="Play Store"&gt; &lt;img src="https://img.shields.io/badge/F_Droid-1976D2?style=for-the-badge&amp;amp;logo=f-droid&amp;amp;logoColor=white" alt="F Droid"&gt; &lt;img src="https://img.shields.io/badge/App_Store-0D96F6?style=for-the-badge&amp;amp;logo=app-store&amp;amp;logoColor=white" alt="App Store"&gt; &lt;img src="https://img.shields.io/badge/github-%23121011.svg?style=for-the-badge&amp;amp;logo=github&amp;amp;logoColor=white" alt="GitHub"&gt; &lt;img src="https://img.shields.io/badge/xbox-%23107C10.svg?style=for-the-badge&amp;amp;logo=xbox&amp;amp;logoColor=white" alt="Xbox"&gt;&lt;/p&gt;</description></item><item><title>MetaOSINT.github.io</title><link>https://rainmana.github.io/hackyfeed/tools/metaosint-metaosint.github.io/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/metaosint-metaosint.github.io/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; MetaOSINT is an open-source intelligence aggregation tool designed to assist OSINT practitioners in efficiently identifying and accessing relevant publicly available tools and resources. Its primary purpose is to streamline investigations by providing a curated list of top tools, significantly enhancing the speed and effectiveness of research and analysis. Notable features include an intuitive interface for surfacing resources and the ongoing community contribution model that allows users to submit additional tools.&lt;/p&gt;</description></item><item><title>mongoaudit</title><link>https://rainmana.github.io/hackyfeed/tools/stampery-mongoaudit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/stampery-mongoaudit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; mongoaudit is a command-line interface tool designed for auditing MongoDB servers to identify security misconfigurations and vulnerabilities. Its primary use case is to enhance security by detecting poor configuration settings and providing actionable advice to rectify them, thus helping administrators implement best practices. Notable features include automated penetration testing capabilities and comprehensive reporting with guidance on securing MongoDB installations.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
 &lt;h1&gt;&lt;a href="https://mongoaud.it"&gt;&lt;img src="https://raw.githubusercontent.com/stampery/mongoaudit/master/rsc/github-header.png" alt="mongoaudit"/&gt;&lt;/a&gt;&lt;/h1&gt;
 &lt;a href="https://travis-ci.org/stampery/mongoaudit"&gt;&lt;img src="https://travis-ci.org/stampery/mongoaudit.svg?branch=master"&gt;&lt;/a&gt;
 &lt;a href="https://landscape.io/github/stampery/mongoaudit/master"&gt;&lt;img alt="Code Health" src="https://landscape.io/github/stampery/mongoaudit/master/landscape.svg?style=flat"/&gt;&lt;/a&gt;
 &lt;a href="https://codeclimate.com/repos/588f61f717e4fe24b80046f6/feed"&gt;&lt;img alt="Code Climate" src="https://codeclimate.com/repos/588f61f717e4fe24b80046f6/badges/ed691ca1655c0eb8a4a5/gpa.svg" /&gt;&lt;/a&gt;
 &lt;a href="https://codeclimate.com/repos/588f61f717e4fe24b80046f6/feed"&gt;&lt;img alt="Issue Count" src="https://codeclimate.com/repos/588f61f717e4fe24b80046f6/badges/ed691ca1655c0eb8a4a5/issue_count.svg" /&gt;&lt;/a&gt;
 &lt;br/&gt;&lt;br/&gt;
 &lt;p&gt;&lt;strong&gt;mongoaudit&lt;/strong&gt; is a CLI tool for auditing MongoDB servers, detecting poor security settings and performing automated penetration testing.&lt;/p&gt;</description></item><item><title>Nginx-Lua-Anti-DDoS</title><link>https://rainmana.github.io/hackyfeed/tools/c0nw0nk-nginx-lua-anti-ddos/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/c0nw0nk-nginx-lua-anti-ddos/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Nginx-Lua-Anti-DDoS is a protective tool designed for Nginx web servers, leveraging Lua scripting to mitigate DDoS attacks through a JavaScript-based authentication puzzle inspired by Cloudflare&amp;rsquo;s &amp;ldquo;I&amp;rsquo;m Under Attack&amp;rdquo; mode. The tool features automatic detection and activation of protection mechanisms against various attack types, extensive IP and User-Agent filtering options, as well as capabilities to inspect and block malicious HTTP requests. With no limitation on attack size and built-in logging for monitoring, it offers customizable error responses and caching optimizations to enhance web server performance during attacks.&lt;/p&gt;</description></item><item><title>On-Chain-Investigations-Tools-List</title><link>https://rainmana.github.io/hackyfeed/tools/offciercia-on-chain-investigations-tools-list/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/offciercia-on-chain-investigations-tools-list/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The On-Chain Investigations Tools List is a comprehensive repository designed for conducting thorough investigations into blockchain-related activities. Its primary use case is to provide a curated compilation of tools and resources for tracking crypto hacks, security incidents, and on-chain analysis, featuring various utilities for data analysis, such as Nansen, Dune, and Metasleuth. Notable features include diverse categories of tools, a knowledge hub, and educational articles that guide users in developing effective investigative methodologies.&lt;/p&gt;</description></item><item><title>Open-Source-Security-Guide</title><link>https://rainmana.github.io/hackyfeed/tools/mikeroyal-open-source-security-guide/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mikeroyal-open-source-security-guide/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Open Source Security Guide serves as a comprehensive resource for enhancing the security of systems and networks by providing tutorials, standards, and tools relevant to open-source security practices. It includes sections on security certifications, threat models, and various security frameworks, along with a curated list of tools and resources to improve security operations. Notably, it aims to foster a collaborative environment for sharing best practices and advancing security through community initiatives.&lt;/p&gt;</description></item><item><title>osint-tools</title><link>https://rainmana.github.io/hackyfeed/tools/howtofind-bot-osint-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/howtofind-bot-osint-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The OSINT tools repository provides a comprehensive collection of 308 scripts and tools designed for Open Source Intelligence (OSINT) investigations. Users can select tools based on various input data types across numerous categories, including account identifiers, file types, and network analysis. Notable features include easy navigation through categorized tools and the ability to access the latest version of each tool by modifying the repository commit reference.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="osint-tools"&gt;OSINT tools&lt;/h1&gt;
&lt;p&gt;Various OSINT tools and scripts, total 308 repos.&lt;/p&gt;</description></item><item><title>PasswordPusher</title><link>https://rainmana.github.io/hackyfeed/tools/pglombardo-passwordpusher/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pglombardo-passwordpusher/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Password Pusher is an open-source web application designed for securely sharing sensitive information such as passwords, notes, files, and URLs via self-destructing links. Its notable features include encrypted storage, customizable expiry controls, comprehensive audit logging, and the ability to self-host or utilize a hosted service, making it suitable for individual users and teams. The tool supports multiple languages and offers integrations through a JSON API and command-line interface, enhancing its versatility in secure information sharing.&lt;/p&gt;</description></item><item><title>refinery</title><link>https://rainmana.github.io/hackyfeed/tools/binref-refinery/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/binref-refinery/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Binary Refinery is a command-line toolkit designed for the transformation of binary data, focusing on malware triage analysis through various scripts that handle tasks like compression and encryption. It enables users to create flexible processing pipelines by chaining scripts with the piping operator. Key features include the ability to read from stdin and write to stdout, extensive documentation accessible via command-line help, and an emphasis on modular units that perform singular tasks efficiently.&lt;/p&gt;</description></item><item><title>simple-security-toolkit</title><link>https://rainmana.github.io/hackyfeed/tools/nascentxyz-simple-security-toolkit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nascentxyz-simple-security-toolkit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Simple Security Toolkit is a collection of practical guides and checklists designed to enhance the security of smart contract development, primarily targeting early-stage protocol teams. Key features include a structured development process, audit readiness and pre-launch security checklists, and an incident response plan template, all aimed at preventing vulnerabilities and ensuring robust deployment practices. This resource is intended to streamline security preparations and foster efficient auditing processes while encouraging contributions from the community.&lt;/p&gt;</description></item><item><title>stegcloak</title><link>https://rainmana.github.io/hackyfeed/tools/kurolabs-stegcloak/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/kurolabs-stegcloak/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; StegCloak is a JavaScript steganography module that conceals secrets within text by using invisible Unicode characters after compressing and encrypting the data. It is designed for covert communication, allowing users to safely embed strings in various platforms while ensuring cryptographic security through AES-256-CTR encryption and HMAC integrity checks. Key features include high-speed processing, support for hiding file links, and a flexible interface available via API, command-line, and web interface.&lt;/p&gt;</description></item><item><title>Stowaway</title><link>https://rainmana.github.io/hackyfeed/tools/ph4ntonn-stowaway/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ph4ntonn-stowaway/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Stowaway is a multi-tier proxy tool written in Go, designed specifically for penetration testers to route external traffic through multiple nodes into an internal network, thereby overcoming access restrictions. Notable features include user-friendly command-line interface, tree structure node management, support for various connection types (socks5, HTTP, SSH), traffic encryption using TLS/AES-256-GCM, and capabilities for remote shell, file transfer, and port mapping, all while maintaining compatibility across multiple platforms such as Linux, Mac, and Windows.&lt;/p&gt;</description></item><item><title>Terrapin-Scanner</title><link>https://rainmana.github.io/hackyfeed/tools/rub-nds-terrapin-scanner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rub-nds-terrapin-scanner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Terrapin Vulnerability Scanner is a Go-based utility designed to assess the vulnerability of SSH clients and servers against the Terrapin Attack. It utilizes a single connection to retrieve supported algorithms without initiating a full SSH key exchange, allowing it to identify potential vulnerabilities and support for known countermeasures like strict key exchange. Notable features include JSON output for results, support for various operating systems via pre-compiled binaries and Docker, and ease of building from source.&lt;/p&gt;</description></item><item><title>xencrypt</title><link>https://rainmana.github.io/hackyfeed/tools/the-xentropy-xencrypt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/the-xentropy-xencrypt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Xencrypt is a PowerShell-based crypter designed to compress and encrypt PowerShell scripts while bypassing AMSI and modern antivirus solutions. Its notable features include variable name randomization, support for recursive layering of encrypted scripts, and a minimal overhead due to compression. This open-source tool serves as a demonstration for users looking to develop their own crypters, offering flexibility for customization and ease of use.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="xencrypt"&gt;Xencrypt&lt;/h1&gt;
&lt;h3 id="powershell-crypter-v-10"&gt;PowerShell crypter v 1.0&lt;/h3&gt;
&lt;h2 id="authors"&gt;Authors&lt;/h2&gt;
&lt;p&gt;Xentropy ( &lt;a href="http://twitter.com/SamuelAnttila"&gt;@SamuelAnttila&lt;/a&gt; )&lt;br&gt;
SecForce ( &lt;a href="http://twitter.com/SECFORCE_LTD"&gt;@SECFORCE_LTD&lt;/a&gt; )&lt;/p&gt;</description></item></channel></rss>