<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Exploit on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/categories/exploit/</link><description>Recent content in Exploit on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/categories/exploit/feed.xml" rel="self" type="application/rss+xml"/><item><title>A-Red-Teamer-diaries</title><link>https://rainmana.github.io/hackyfeed/tools/ihebski-a-red-teamer-diaries/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ihebski-a-red-teamer-diaries/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; A-Red-Teamer-diaries is a collaborative repository containing publicly accessible notes and resources for penetration testing and red teaming activities, focusing on various tools and techniques employed during security assessments. Key features include a cheatsheet for quick command reference, detailed methodologies for effective exploitation, and practical scripts for network scanning and enumeration, enhancing both learning and efficiency in cybersecurity engagements. This tool serves as a practical guide for professionals aiming to improve their pentesting methodologies in controlled environments.&lt;/p&gt;</description></item><item><title>Active-Directory-Exploitation-Cheat-Sheet</title><link>https://rainmana.github.io/hackyfeed/tools/integration-it-active-directory-exploitation-cheat-sheet/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/integration-it-active-directory-exploitation-cheat-sheet/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Active Directory Exploitation Cheat Sheet serves as a comprehensive resource for cybersecurity professionals, detailing methodologies and commands for navigating the Active Directory environment. Its primary use case involves facilitating reconnaissance, privilege escalation, and lateral movement within a network through structured commands using Powershell and .Net. Notable features include a systematic approach to various stages of the exploitation process, including domain enumeration, persistence techniques, and monitoring account vulnerabilities.&lt;/p&gt;</description></item><item><title>Active-Directory-Exploitation-Cheat-Sheet</title><link>https://rainmana.github.io/hackyfeed/tools/s1ckb0y1337-active-directory-exploitation-cheat-sheet/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/s1ckb0y1337-active-directory-exploitation-cheat-sheet/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Active Directory Exploitation Cheat Sheet serves as a comprehensive resource for security professionals, detailing various enumeration and attack techniques within Windows Active Directory environments. It encompasses methods for domain enumeration, local privilege escalation, lateral movement, and domain persistence, while providing actionable insights and references to essential tools such as PowerView, Mimikatz, and BloodHound. This tool is particularly notable for its structured approach to various exploitation vectors, facilitating an efficient and systematic exploitation process.&lt;/p&gt;</description></item><item><title>adbwebkit</title><link>https://rainmana.github.io/hackyfeed/tools/jxroot-adbwebkit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jxroot-adbwebkit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ADB WebKit is a browser-based tool designed for managing Android devices via ADB (Android Debug Bridge) with an intuitive user interface. Its primary use case includes functionalities like application management (installing, uninstalling, granting permissions), shell access, screen capture, and device control commands, making it a comprehensive solution for developers and testers. Notable features include support for live application management, real-time screen interactions, and various device control options, all accessible through a USB connection or IP address.&lt;/p&gt;</description></item><item><title>afrog</title><link>https://rainmana.github.io/hackyfeed/tools/zan8in-afrog/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zan8in-afrog/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Afrog is a security tool designed for bug bounty programs, penetration testing, and red teaming efforts. It facilitates the creation and execution of Proofs of Concept (PoCs) to help security professionals identify vulnerabilities in systems. Notable features include a streamlined PoC writing guide, multi-language support, and a community-driven approach to contribute new exploit techniques.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;a href="http://afrog.net"&gt;&lt;img src="images/afrog-logo.svg" width="60px" alt="afrog"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;!-- &lt;/a&gt; &lt;h1 align="center"&gt;afrog&lt;/h1&gt; --&gt;
&lt;h4 align="center"&gt;A Security Tool for Bug Bounty, Pentest and Red Teaming&lt;/h4&gt;
&lt;p align="center"&gt;
 &lt;a href="README.md"&gt;English&lt;/a&gt; •
 &lt;a href="docs/README_CN.md"&gt;中文&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>ambiguous-png-packer</title><link>https://rainmana.github.io/hackyfeed/tools/davidbuchanan314-ambiguous-png-packer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/davidbuchanan314-ambiguous-png-packer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ambiguous PNG Packer is a tool designed to create PNG files that display differently when viewed in Apple software versus non-Apple software. Its primary use case is to demonstrate the manipulation of image rendering based on the viewer&amp;rsquo;s platform, showcasing unique features such as the ability to produce different images through refreshes, highlighting potential vulnerabilities in Apple&amp;rsquo;s image handling mechanisms.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="ambiguous-png-packer"&gt;Ambiguous PNG Packer&lt;/h1&gt;
&lt;p&gt;Craft PNG files that appear completely different in Apple software&lt;/p&gt;</description></item><item><title>Android-Exploits</title><link>https://rainmana.github.io/hackyfeed/tools/sundaysec-android-exploits/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sundaysec-android-exploits/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Android-Exploits is a repository that consolidates various Android exploits and provides a comprehensive guide for conducting Android exploitation. Its primary use case is to facilitate the testing and assessment of Android application security vulnerabilities through categorized exploits such as Denial of Service, local, remote, and web application exploits. Notable features include detailed instructions for utilizing the exploits alongside third-party tools like ExploitPack, along with references to common mobile hacking tools and resources related to Android security risks.&lt;/p&gt;</description></item><item><title>Android-Security-Exploits-YouTube-Curriculum</title><link>https://rainmana.github.io/hackyfeed/tools/actuator-android-security-exploits-youtube-curriculum/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/actuator-android-security-exploits-youtube-curriculum/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Android Security &amp;amp; Reverse Engineering YouTube Curriculum is a comprehensive educational resource focused on various aspects of Android security, including exploits, reverse engineering, and vulnerabilities in mobile applications. It features a curated collection of talks and demonstrations from prominent security conferences, addressing topics like heap exploitation, mobile permissions, and countermeasures against mobile threats. Notably, it educates on advanced concepts such as Bluetooth security, malware analysis, and attack vectors affecting the Android ecosystem, making it essential for cybersecurity practitioners and researchers.&lt;/p&gt;</description></item><item><title>AndroRAT</title><link>https://rainmana.github.io/hackyfeed/tools/karma9874-androrat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/karma9874-androrat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AndroRAT is a remote access tool for Android devices that allows users to control and retrieve information from the device. Its primary use case includes monitoring and managing Android systems covertly, featuring capabilities such as persistent backdoor access, audio and video recording, and obtaining device location and SIM details. Notably, AndroRAT consists of a client/server architecture implemented in Java for Android and Python for the server side, enabling it to run on a wide range of Android versions from 4.1 to 9.0, with additional functionalities on Android 10.&lt;/p&gt;</description></item><item><title>AndroRAT</title><link>https://rainmana.github.io/hackyfeed/tools/the404hacking-androrat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/the404hacking-androrat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AndroRAT is a Remote Administration Tool designed for Android devices, enabling the remote control and data retrieval from the Android system. Key functionalities include accessing contacts, call logs, messages, GPS location, and multimedia capabilities like capturing photos and streaming audio and video. The tool operates as a background service triggered by SMS or calls, providing a comprehensive suite for remote monitoring and management.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="androrat"&gt;&lt;a href="https://github.com/The404Hacking/AndroRAT"&gt;AndroRAT&lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;Remote Administration Tool for Android&lt;/p&gt;</description></item><item><title>AntiCheat-Testing-Framework</title><link>https://rainmana.github.io/hackyfeed/tools/niemand-sec-anticheat-testing-framework/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/niemand-sec-anticheat-testing-framework/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The AntiCheat-Testing-Framework is a comprehensive tool designed for testing and analyzing various anti-cheat mechanisms in the gaming industry. It provides a modular architecture with several integrated modules, allowing users to customize their setup for specific testing purposes. This framework aims to democratize knowledge in the field of anti-cheat research, facilitating both learning and practical application.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="anticheat-testing-framework"&gt;AntiCheat-Testing-Framework&lt;/h1&gt;
&lt;p&gt;Framework to test any Anti-Cheat on the market. This can be used as Template or Code Base to test any Anti-Cheat and learn along the way. The entry level to reverse AntiCheats and Cheats is quite high, therefore, I&amp;rsquo;m realeasing all the code I developed during my research. The main idea is to help people and motive them to get into this topic which is really interesting and there is a lot to research about it.&lt;/p&gt;</description></item><item><title>apple-knowledge</title><link>https://rainmana.github.io/hackyfeed/tools/hack-different-apple-knowledge/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hack-different-apple-knowledge/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;hack-different/apple-knowledge&amp;rdquo; repository hosts a compilation of reverse-engineered Apple data formats and protocols, primarily serving as a resource for jailbreak developers and hobbyists. Notable features include the availability of YAML files for machine-readable data, a collection of binary analysis and modification tools, and a Homebrew tap for easy installation of jailbreak-related utilities. The project emphasizes adherence to copyright laws while encouraging community contributions.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="apple-data-formats-and-knowledge"&gt;Apple Data Formats and Knowledge&lt;/h1&gt;
&lt;p&gt;A collection of reverse engineered Apple formats, protocols, or other interesting bits.&lt;/p&gt;</description></item><item><title>APT_REPORT</title><link>https://rainmana.github.io/hackyfeed/tools/blackorbird-apt_report/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/blackorbird-apt_report/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; APT_REPORT is a comprehensive collection of threat intelligence, samples, and reports on advanced persistent threat (APT) groups, particularly those linked to specific countries. It focuses on detailed analyses of various APT campaigns, enabling users to understand tactics and recent developments in cyber threat landscapes. Notable features include references to extensive case studies and operational details of prominent threat actor groups, enhancing situational awareness for cybersecurity professionals.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="apt_report-collected-by-blackorbird"&gt;APT_REPORT collected by @blackorbird &lt;a href="https://x.com/blackorbird"&gt;https://x.com/blackorbird&lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;Interesting apt report &amp;amp; sample &amp;amp; malware &amp;amp; technology &amp;amp; intellegence collection&lt;/p&gt;</description></item><item><title>archerysec</title><link>https://rainmana.github.io/hackyfeed/tools/archerysec-archerysec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/archerysec-archerysec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ArcherySec is an open-source vulnerability assessment and management tool designed to integrate with CI/CD pipelines, allowing for automated security testing based on scan results. It utilizes popular open-source scanning tools to perform comprehensive web and network vulnerability assessments, while also providing features for vulnerability prioritization, management, and collaboration of scan data. Key functionalities include integration with REST APIs for developers, authenticated web scanning, and support for various third-party tools like OpenVAS and OWASP ZAP.&lt;/p&gt;</description></item><item><title>Artemis</title><link>https://rainmana.github.io/hackyfeed/tools/cert-polska-artemis/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cert-polska-artemis/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Artemis is a modular vulnerability scanner designed for assessing website security, primarily used by CERT PL for scanning activities. Its notable features include the ability to automatically generate user-friendly reports detailing specific vulnerabilities, such as exposed version control system data and outdated software versions, which aids organizations in mitigating security risks.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1&gt;
 &lt;picture&gt;
 &lt;source media="(prefers-color-scheme: dark)" srcset="static/images/logo_dark.png"&gt;
 &lt;img alt="logo" width="400px" src="static/images/logo.png"&gt;
 &lt;/picture&gt;
&lt;/h1&gt;
&lt;p&gt;Artemis is a modular vulnerability scanner. It&amp;rsquo;s the tool that powers CERT PL scanning activities by
&lt;a href="https://artemis-scanner.readthedocs.io/en/latest/features.html"&gt;checking various aspects of website security&lt;/a&gt;
and &lt;a href="https://artemis-scanner.readthedocs.io/en/latest/generating-reports.html"&gt;building easy-to-read messages ready to be sent to the scanned organizations&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>AutoPentestX</title><link>https://rainmana.github.io/hackyfeed/tools/gowtham-darkseid-autopentestx/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gowtham-darkseid-autopentestx/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AutoPentestX is an automated penetration testing toolkit designed for streamlined security assessments. Its primary use case is to facilitate vulnerability scanning and testing in Linux environments, offering features that simplify the process of identifying and exploiting security weaknesses. The toolkit supports Python 3.8 and above, underscoring its compatibility with modern scripting standards and enhancing its applicability in cybersecurity workflows.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="autopentestx---automated-penetration-testing-toolkit"&gt;AutoPentestX - Automated Penetration Testing Toolkit&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://opensource.org/licenses/MIT"&gt;&lt;img src="https://img.shields.io/badge/License-MIT-yellow.svg" alt="License: MIT"&gt;&lt;/a&gt;
&lt;a href="https://www.python.org/downloads/"&gt;&lt;img src="https://img.shields.io/badge/python-3.8+-blue.svg" alt="Python 3.8+"&gt;&lt;/a&gt;
&lt;a href="https://www.linux.org/"&gt;&lt;img src="https://img.shields.io/badge/platform-Linux-lightgrey.svg" alt="Platform"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>AutoPWN-Suite</title><link>https://rainmana.github.io/hackyfeed/tools/gamehunterkaan-autopwn-suite/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gamehunterkaan-autopwn-suite/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AutoPWN Suite is a comprehensive tool designed for automatic vulnerability scanning and exploitation of systems, leveraging advanced scanning techniques such as nmap TCP-SYN scans to identify software versions and associated vulnerabilities. Key features include automatic vulnerability detection, web application testing for various exploits (LFI, XSS, SQLI), configurable scanning options, noise and evasion modes, along with easy result sharing via webhooks or email, and compatibility across multiple operating systems.&lt;/p&gt;</description></item><item><title>AutoSploit</title><link>https://rainmana.github.io/hackyfeed/tools/nullarray-autosploit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nullarray-autosploit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AutoSploit is a tool designed to automate the exploitation of remote hosts by leveraging data from services like Shodan, Censys, and Zoomeye for target acquisition. It facilitates the execution of Metasploit modules aimed at achieving Remote Code Execution and establishing reverse connections or Meterpreter sessions. Notable features include the ability to specify custom targets, set proxy configurations, and manage operational security through options like using a VPS for operation.&lt;/p&gt;</description></item><item><title>awesome-aws-security</title><link>https://rainmana.github.io/hackyfeed/tools/jassics-awesome-aws-security/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jassics-awesome-aws-security/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome AWS Security is a curated repository that aggregates a wide range of resources related to AWS security practices, including whitepapers, books, videos, tutorials, and security tools. It serves as a comprehensive educational tool for professionals and enthusiasts seeking to enhance their knowledge of AWS security, featuring a well-structured table of contents and links to valuable references and training materials. Notable features include categorized resources for various learning preferences, from free content to paid courses, as well as a focus on contemporary security issues and best practices.&lt;/p&gt;</description></item><item><title>awesome-hacker-search-engines</title><link>https://rainmana.github.io/hackyfeed/tools/edoardottt-awesome-hacker-search-engines/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/edoardottt-awesome-hacker-search-engines/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome Hacker Search Engines is a curated repository of search engines specifically designed for penetration testing, vulnerability assessments, and red/blue team operations. It categorizes various resources including general search engines, servers, vulnerabilities, exploits, and more, providing tools for effective reconnaissance and threat intelligence gathering. Notable features include links to specialized engines like Shodan and the NIST NVD, enabling streamlined access to critical information for security professionals.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;b&gt;Awesome Hacker Search Engines&lt;/b&gt; &lt;img src="https://raw.githubusercontent.com/edoardottt/images/main/awesome-hacker-search-engines/awesome.svg"/&gt;
&lt;/h1&gt;
&lt;p align="center"&gt;
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
&lt;/p&gt;</description></item><item><title>Awesome-Hacking-Resources</title><link>https://rainmana.github.io/hackyfeed/tools/vitalysim-awesome-hacking-resources/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vitalysim-awesome-hacking-resources/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome Hacking Resources is a comprehensive collection of materials designed for individuals looking to enhance their skills in hacking and penetration testing. The repository includes various categories such as learning resources, online courses, forums, and tools crucial for topics like malware analysis and network scanning, promoting community contribution and knowledge sharing within the cybersecurity field. Notably, it features a dedicated list of tools and links to educational content, making it a valuable resource for both beginners and advanced practitioners.&lt;/p&gt;</description></item><item><title>awesome-list</title><link>https://rainmana.github.io/hackyfeed/tools/0xor0ne-awesome-list/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xor0ne-awesome-list/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Awesome Cybersecurity List&amp;rdquo; repository aggregates a personal collection of insightful blog posts, research papers, and write-ups pertaining to various aspects of cybersecurity. It serves as a resource for both enthusiasts and professionals looking for in-depth analysis on contemporary cybersecurity topics and advancements. Notable features include a chronological outline of topics and a dedicated section for cybersecurity tools, ensuring users can easily navigate through valuable content.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="awesome-cybersecurity-list"&gt;Awesome Cybersecurity List&lt;/h1&gt;
&lt;p&gt;My personal collection of awesome blog posts, write-ups, and papers focusing on cybersecurity.&lt;/p&gt;</description></item><item><title>awesome-list-of-secrets-in-environment-variables</title><link>https://rainmana.github.io/hackyfeed/tools/puliczek-awesome-list-of-secrets-in-environment-variables/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/puliczek-awesome-list-of-secrets-in-environment-variables/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Awesome List of Secrets in Environment Variables&amp;rdquo; repository provides a comprehensive compilation of sensitive information, such as secrets, API keys, and tokens commonly stored in environment variables across various platforms. Its primary use case is to educate and inform developers about potential vulnerabilities associated with storing secrets in environment variables and to suggest better security practices to avoid data leaks. Notable features include categorized listings of secrets from different services, security recommendations, and links to relevant documentation for each entry.&lt;/p&gt;</description></item><item><title>Awesome-RCE-techniques</title><link>https://rainmana.github.io/hackyfeed/tools/p0dalirius-awesome-rce-techniques/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/p0dalirius-awesome-rce-techniques/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Awesome RCE Techniques&amp;rdquo; repository is an open-source knowledge database that compiles various methods for achieving Remote Code Execution (RCE) across different applications. It features a collection of 24 RCE techniques categorized by platform type, including Content Management Systems and frameworks, each accompanied by Docker images for practical training and testing. This resource facilitates learning and experimentation for security professionals and developers interested in RCE dynamics.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="awesome-rce-techniques"&gt;Awesome RCE techniques&lt;/h1&gt;
&lt;p align="center"&gt;
 Awesome list of techniques to achieve Remote Code Execution (RCE) on various apps!
 &lt;br&gt;
 &lt;img alt="Number of RCE techniques" src="https://img.shields.io/badge/techniques-24-brightgreen"&gt;
 &lt;a href="https://twitter.com/intent/follow?screen_name=podalirius_" title="Follow"&gt;&lt;img src="https://img.shields.io/twitter/follow/podalirius_?label=Podalirius&amp;style=social"&gt;&lt;/a&gt;
 &lt;a href="https://www.youtube.com/c/Podalirius_?sub_confirmation=1" title="Subscribe"&gt;&lt;img alt="YouTube Channel Subscribers" src="https://img.shields.io/youtube/channel/subscribers/UCF_x5O7CSfr82AfNVTKOv_A?style=social"&gt;&lt;/a&gt;
 &lt;br&gt;
&lt;/p&gt;</description></item><item><title>Awesome-Redteam</title><link>https://rainmana.github.io/hackyfeed/tools/threekiii-awesome-redteam/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/threekiii-awesome-redteam/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome-Redteam is a comprehensive knowledge base designed for red teaming and offensive security research, providing users with a curated collection of tools, scripts, and tips. It features organized sections covering various aspects such as cybersecurity cheat sheets, cryptographic methods, cyberspace search tools, and open-source intelligence resources, all intended for educational purposes. The repository emphasizes legal usage and warns against employing its content for unauthorized activities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="awesome-redteam"&gt;Awesome-Redteam&lt;/h1&gt;
&lt;p align="left"&gt;
 &lt;a href="https://github.com/Threekiii/Awesome-Redteam"&gt;
 &lt;img src="https://badgen.net/github/stars/Threekiii/Awesome-Redteam?color=yellow&amp;icon=github" alt="stars"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/Threekiii/Awesome-POC"&gt;
 &lt;img src="https://badgen.net/github/forks/Threekiii/Awesome-Redteam?color=blue&amp;icon=github" alt="forks"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/Threekiii/Awesome-POC"&gt;
 &lt;img src="https://badgen.net/github/last-commit/Threekiii/Awesome-Redteam?color=green" alt="last-commit"&gt;
 &lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;❗【免责声明】本项目所涉及的技术、思路和工具仅供学习，任何人不得将其用于非法用途和盈利，不得将其用于非授权渗透测试，否则后果自行承担，与本项目无关。 使用本项目前请先阅读 &lt;a href="https://github.com/Threekiii/Awesome-Laws"&gt;法律法规&lt;/a&gt;。&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>awesome-web-hacking</title><link>https://rainmana.github.io/hackyfeed/tools/infoslack-awesome-web-hacking/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/infoslack-awesome-web-hacking/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;awesome-web-hacking&amp;rdquo; repository serves as a comprehensive resource for individuals seeking to enhance their knowledge of web application security. It includes categorized lists of books, documentation, tools, cheat sheets, and educational courses, making it a valuable starting point for learning about penetration testing and various security vulnerabilities. Notable features include contributions from the community through pull requests and a diverse array of resources for both beginners and experienced security professionals.&lt;/p&gt;</description></item><item><title>Bashark</title><link>https://rainmana.github.io/hackyfeed/tools/redcode-labs-bashark/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/redcode-labs-bashark/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Bashark 2.0 is a post-exploitation toolkit designed for penetration testers and security researchers to facilitate operations during the post-exploitation phase of security audits. It offers a simple command-line interface, where users can source the &lt;code&gt;bashark.sh&lt;/code&gt; script to access various functions and commands, streamlining the process of managing compromised hosts. Key features include ease of use through a help menu and support for Bash scripting, making it a practical tool for enhancing post-exploitation activities.&lt;/p&gt;</description></item><item><title>BinAbsInspector</title><link>https://rainmana.github.io/hackyfeed/tools/keensecuritylab-binabsinspector/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/keensecuritylab-binabsinspector/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BinAbsInspector is a static analysis tool designed for automated reverse engineering and vulnerability scanning of binary files, utilizing abstract interpretation and integrating with Ghidra. It supports multiple architectures including x86, x64, armv7, and aarch64, and can operate in headless mode, GUI mode, or within a Docker environment. Notable features include customizable analysis parameters, Z3 integration for constraint solving, and the ability to output results in JSON format.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="what-is--binabsinspector"&gt;What is BinAbsInspector?&lt;/h1&gt;
&lt;p&gt;BinAbsInspector (Binary Abstract Inspector) is a static analyzer for automated reverse engineering and scanning vulnerabilities in binaries, which is a long-term research project incubated at &lt;a href="https://keenlab.tencent.com/"&gt;Keenlab&lt;/a&gt;. It is based on abstract interpretation with the support from Ghidra. It works on Ghidra&amp;rsquo;s Pcode instead of assembly. Currently it supports binaries on x86,x64, armv7 and aarch64.&lt;/p&gt;</description></item><item><title>BlackFriday-GPTs-Prompts</title><link>https://rainmana.github.io/hackyfeed/tools/friuns2-blackfriday-gpts-prompts/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/friuns2-blackfriday-gpts-prompts/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AnyClaw is an Android application that integrates OpenClaw and Codex, enabling two AI coding agents to perform tasks without requiring root access or Termux. Its primary use case is to facilitate coding assistance and prompt generation across various domains, including programming and marketing. Notable features include a user-friendly interface and the ability to handle multiple types of prompts, making it versatile for different user needs.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
&lt;h3 id="anyclaw--openclaw--codex-running-natively-on-android"&gt;&lt;a href="https://github.com/friuns2/openclaw-android-assistant"&gt;AnyClaw&lt;/a&gt; — OpenClaw + Codex running natively on Android&lt;/h3&gt;
&lt;p&gt;Two AI coding agents in one APK. No root. No Termux.&lt;/p&gt;</description></item><item><title>BlackWidow</title><link>https://rainmana.github.io/hackyfeed/tools/1n3-blackwidow/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/1n3-blackwidow/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BlackWidow is a Python-based web application spider designed for gathering critical information from target websites, including subdomains, URLs, dynamic parameters, email addresses, and phone numbers. It features an integrated fuzzer, Inject-X, which scans dynamic URLs for common OWASP vulnerabilities, and automatically saves collected data into organized text files. Notable functionalities include deep crawling with customizable levels, verbose logging, and support for fuzzing unique parameters for enhanced security testing.&lt;/p&gt;</description></item><item><title>BlueTeam-Tools</title><link>https://rainmana.github.io/hackyfeed/tools/a-poc-blueteam-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/a-poc-blueteam-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BlueTeam-Tools is a comprehensive repository comprising over 65 tools and resources tailored for blue teaming activities, encompassing tasks such as network discovery, vulnerability management, and security monitoring. Notable features include a variety of specialized scanners like Nmap and OpenVAS, as well as systems for data visualization and malicious traffic detection, aimed at enhancing defensive cybersecurity measures. This collection serves as an essential toolkit for security professionals focusing on threat detection and incident response.&lt;/p&gt;</description></item><item><title>brakeman</title><link>https://rainmana.github.io/hackyfeed/tools/presidentbeef-brakeman/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/presidentbeef-brakeman/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Brakeman is a static analysis tool designed to identify security vulnerabilities in Ruby on Rails applications. It supports a wide range of output formats, includes features for ignoring specific checks, and allows for comparing current scans with previous results. Built to be compatible with various Rails versions, it can be run locally or via Docker, providing extensive configuration options for detailed security assessments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="http://brakemanscanner.org/"&gt;&lt;img src="http://brakemanscanner.org/images/logo_medium.png" alt="Brakeman Logo"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://circleci.com/gh/presidentbeef/brakeman"&gt;&lt;img src="https://circleci.com/gh/presidentbeef/brakeman.svg?style=svg" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://qlty.sh/gh/presidentbeef/projects/brakeman"&gt;&lt;img src="https://qlty.sh/gh/presidentbeef/projects/brakeman/coverage.svg" alt="Code Coverage"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Bug-Bounty-Methodology</title><link>https://rainmana.github.io/hackyfeed/tools/tuhin1729-bug-bounty-methodology/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tuhin1729-bug-bounty-methodology/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Bug-Bounty-Methodology is a collection of checklists designed for systematic bug bounty hunting. It covers various security testing scenarios, including 2FA testing, CAPTCHA bypass, CSRF protection, and OAuth misconfiguration, providing comprehensive guidelines for identifying vulnerabilities in web applications. Notable features include a structured compilation of methodologies tailored for different attack vectors and documentation that serves as a practical resource for penetration testers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="bug-bounty-methodology"&gt;Bug-Bounty-Methodology&lt;/h1&gt;
&lt;p&gt;These are my checklists which I use during my bug bounty hunting.&lt;/p&gt;</description></item><item><title>Burp-Suite-Certified-Practitioner-Exam-Study</title><link>https://rainmana.github.io/hackyfeed/tools/botesjuan-burp-suite-certified-practitioner-exam-study/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/botesjuan-burp-suite-certified-practitioner-exam-study/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Burp Suite Certified Practitioner Exam Study repository contains comprehensive study notes and practical labs designed to aid candidates in preparing for the Burp Suite Certified Practitioner (BSCP) Exam. It includes over 110 labs covering essential topics such as scanning, footholds, privilege escalation, and data exfiltration, alongside practical techniques and scripts tailored for effective web application security testing. Notable features include a structured approach to vulnerability assessment and recommendations for additional training materials and resources to enhance exam readiness.&lt;/p&gt;</description></item><item><title>BurpBounty</title><link>https://rainmana.github.io/hackyfeed/tools/wagiro-burpbounty/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wagiro-burpbounty/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Burp Bounty is a Burp Suite extension designed to enhance both active and passive scanning capabilities by allowing users to create personalized scanning rules through an intuitive graphical interface. The tool offers advanced pattern search and payload improvement features to build custom issue profiles, catering to automated and manual penetration testing workflows. A notable aspect is the availability of profiles shared by the community, which further augments its functionality.&lt;/p&gt;</description></item><item><title>ByePg</title><link>https://rainmana.github.io/hackyfeed/tools/can1357-byepg/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/can1357-byepg/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ByePg is a kernel-level tool that circumvents Windows PatchGuard and HVCI by leveraging an early-bugcheck hook through the hijacking of the HalPrivateDispatchTable. Its primary use case is to facilitate the implementation of exception-based hooks, allowing for the registration of high-level system-wide exception handlers and offering capabilities for kernel manipulation previously restricted by PatchGuard. Notably, the tool includes a base library and various examples that demonstrate syscall hooking and SEH handling, showcasing its potential for creating new attack surfaces.&lt;/p&gt;</description></item><item><title>CDK</title><link>https://rainmana.github.io/hackyfeed/tools/cdk-team-cdk/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cdk-team-cdk/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CDK is a zero dependency container penetration toolkit designed for security testing, enabling stable exploitation across slimmed containers. Its primary use case revolves around container escaping, persistence, and lateral movement within Kubernetes clusters, featuring modules for evaluating container weaknesses, executing various exploits, and providing essential network tools. Notable capabilities include information gathering, direct interaction with the container&amp;rsquo;s environment, and the ability to initiate and manage attacks seamlessly.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="cdk---zero-dependency-container-penetration-toolkit"&gt;CDK - Zero Dependency Container Penetration Toolkit&lt;/h1&gt;
&lt;p&gt;English | &lt;a href="https://github.com/cdk-team/CDK/wiki/CDK-Home-CN"&gt;简体中文&lt;/a&gt;&lt;/p&gt;</description></item><item><title>claude-bug-bounty</title><link>https://rainmana.github.io/hackyfeed/tools/shuvonsec-claude-bug-bounty/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/shuvonsec-claude-bug-bounty/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Claude Bug Bounty is an AI-powered agent harness tailored for professional bug bounty hunting, enabling users to streamline their testing processes. It intelligently orchestrates over 25 tools, remembers past findings across targets, validates vulnerabilities to reduce false positives, and generates ready-to-submit reports in under a minute. Notable features include Burp MCP integration for live traffic monitoring and an autonomous hunting mode that simplifies the testing workflow.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
&lt;img src="https://img.shields.io/badge/v3.0.0-Bionic_Hunter-blueviolet?style=for-the-badge" alt="v3.0.0"&gt;
&lt;h1 id="claude-bug-bounty"&gt;Claude Bug Bounty&lt;/h1&gt;
&lt;h3 id="the-ai-powered-agent-harness-for-professional-bug-bounty-hunting"&gt;The AI-Powered Agent Harness for Professional Bug Bounty Hunting&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;Your AI copilot that sees live traffic, remembers past hunts, and hunts autonomously.&lt;/em&gt;&lt;/p&gt;</description></item><item><title>commix</title><link>https://rainmana.github.io/hackyfeed/tools/commixproject-commix/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/commixproject-commix/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Commix is an open-source penetration testing tool designed for automating the detection and exploitation of command injection vulnerabilities in web applications. It supports multiple Python versions and includes extensive documentation with usage examples, facilitating ease of deployment and operation for security professionals. Notable features include comprehensive exploitation capabilities and a user-friendly interface for navigating various commands and options.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="left"&gt;
 &lt;img alt="CommixProject" src="https://commixproject.com/images/logo.png" height="120" /&gt;
 &lt;p align="left"&gt;
 &lt;a href="https://github.com/commixproject/commix/actions/workflows/builds.yml"&gt;&lt;img alt="Builds Tests" src="https://github.com/commixproject/commix/actions/workflows/builds.yml/badge.svg"&gt;&lt;/a&gt;
 &lt;a href="http://www.python.org/download/"&gt;&lt;img alt="Python 2.6|2.7|3.x" src="https://img.shields.io/badge/python-2.6|2.7|3.x-yellow.svg"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/commixproject/commix/blob/master/LICENSE.txt"&gt;&lt;img alt="GPLv3 License" src="https://img.shields.io/badge/license-GPLv3-red.svg"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/commixproject/commix/issues?q=is%3Aissue+is%3Aclosed"&gt;&lt;img alt="GitHub closed issues" src="https://img.shields.io/github/issues-closed-raw/commixproject/commix.svg?colorB=ff0000"&gt;&lt;/a&gt;
 &lt;a href="https://x.com/commixproject"&gt;&lt;img alt="X" src="https://img.shields.io/badge/x-@commixproject-blue.svg"&gt;&lt;/a&gt;
 &lt;/p&gt;
&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Commix&lt;/strong&gt; (short for [&lt;strong&gt;comm&lt;/strong&gt;]and [&lt;strong&gt;i&lt;/strong&gt;]njection e[&lt;strong&gt;x&lt;/strong&gt;]ploiter) is an open source penetration testing tool, written by &lt;strong&gt;&lt;a href="https://github.com/stasinopoulos"&gt;Anastasios Stasinopoulos&lt;/a&gt;&lt;/strong&gt; (&lt;strong&gt;&lt;a href="https://x.com/ancst"&gt;@ancst&lt;/a&gt;&lt;/strong&gt;), that automates the detection and exploitation of &lt;strong&gt;&lt;a href="https://www.owasp.org/index.php/Command_Injection"&gt;command injection&lt;/a&gt;&lt;/strong&gt; vulnerabilities.&lt;/p&gt;</description></item><item><title>copacetic</title><link>https://rainmana.github.io/hackyfeed/tools/project-copacetic-copacetic/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/project-copacetic-copacetic/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Copa is a CLI tool designed to directly patch container images for vulnerabilities without requiring a full rebuild, thereby enhancing DevSecOps workflows. Leveraging vulnerability scan results from tools like Trivy, Copa reduces the operational downtime associated with patching, minimizes storage needs by creating only additional patch layers, and allows any user to perform patches, irrespective of image ownership. Its extensible architecture supports multiple package managers and vulnerability report formats, making it adaptable to various container ecosystems.&lt;/p&gt;</description></item><item><title>Corsy</title><link>https://rainmana.github.io/hackyfeed/tools/s0md3v-corsy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/s0md3v-corsy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Corsy is a lightweight CORS misconfiguration scanner designed to identify vulnerabilities in web applications&amp;rsquo; Cross-Origin Resource Sharing implementations. It features a versatile command-line interface that supports scanning URLs directly or from files, utilizes customizable HTTP headers, and provides options for threading, request delays, and exporting results to JSON. Notably, it implements a comprehensive suite of tests to uncover various CORS-related bypass opportunities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;br&gt;
 &lt;a href="https://github.com/s0md3v/Corsy"&gt;&lt;img src="https://i.ibb.co/K0Z7X99/corsy.png" alt="Corsy"&gt;&lt;/a&gt;
 &lt;br&gt;
 Corsy
 &lt;br&gt;
&lt;/h1&gt;
&lt;h4 align="center"&gt;CORS Misconfiguration Scanner&lt;/h4&gt;
&lt;p align="center"&gt;
 &lt;a href="https://github.com/s0md3v/Corsy/releases"&gt;
 &lt;img src="https://img.shields.io/github/release/s0md3v/Corsy.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/s0md3v/Corsy/issues?q=is%3Aissue+is%3Aclosed"&gt;
 &lt;img src="https://img.shields.io/github/issues-closed-raw/s0md3v/Corsy.svg"&gt;
 &lt;/a&gt;
&lt;/p&gt;</description></item><item><title>crawlergo</title><link>https://rainmana.github.io/hackyfeed/tools/qianlitp-crawlergo/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/qianlitp-crawlergo/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; crawlergo is a robust web vulnerability scanner that utilizes a headless Chrome browser to collect URLs and interact with web pages, capable of intelligent form submission and JavaScript event triggering. Its key features include automatic URL de-duplication, support for different browser environments, request proxying, and the ability to push results to passive vulnerability scanners, making it an essential tool for comprehensive web application security assessments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="crawlergo"&gt;crawlergo&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://img.shields.io/badge/chromedp-v0.5.2-brightgreen.svg" alt="chromedp"&gt; &lt;a href="https://www.blackhat.com/eu-21/arsenal/schedule/index.html#crawlergo-a-powerful-browser-crawler-for-web-vulnerability-scanners-25113"&gt;&lt;img src="https://img.shields.io/badge/BlackHat%20Europe-2021%20Arsenal-blue.svg" alt="BlackHat EU Arsenal"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>crlfuzz</title><link>https://rainmana.github.io/hackyfeed/tools/dwisiswant0-crlfuzz/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dwisiswant0-crlfuzz/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CRLFuzz is a specialized tool for detecting CRLF injection vulnerabilities in web applications, developed in Go for high performance. It offers flexible scanning options, including targeting individual URLs or multiple URLs from a list, and provides various command line flags to customize request methods, output results to files, and adjust concurrency levels. Notable features include support for custom headers, proxy usage, and integration capabilities with other security tools through standard input.&lt;/p&gt;</description></item><item><title>CTF</title><link>https://rainmana.github.io/hackyfeed/tools/crypto-cat-ctf/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/crypto-cat-ctf/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Crypto-Cat/CTF repository serves as a comprehensive resource for Capture The Flag (CTF) challenges, offering write-ups, scripts, and files aligned with video walkthroughs. Its primary use case is to aid users in learning and solving various CTF challenges through curated links to additional resources, including pentesting and reverse engineering tools. Notable features include an extensive directory of CTF platforms, resources for blue team activities, and a collection of cybersecurity educational content.&lt;/p&gt;</description></item><item><title>ctf-skills</title><link>https://rainmana.github.io/hackyfeed/tools/ljagiello-ctf-skills/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ljagiello-ctf-skills/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The ctf-skills repository provides an extensive collection of agent skills designed to facilitate the solving of Capture The Flag (CTF) challenges across various domains, including web exploitation, binary pwn, reverse engineering, and more. Notable features include support for multiple installation methods, a comprehensive tool installer script, and detailed skill documentation for on-demand use, allowing users to efficiently integrate the necessary tools as challenges arise. It is compatible with any tool adhering to the Agent Skills specification, enhancing its versatility in competitive cybersecurity contexts.&lt;/p&gt;</description></item><item><title>CTFs</title><link>https://rainmana.github.io/hackyfeed/tools/adamkadaban-ctfs/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/adamkadaban-ctfs/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CTFs is a repository containing write-ups and resources for various Cyber Capture The Flag (CTF) challenges. It offers a comprehensive cheat sheet detailing strategies and techniques across diverse categories, including forensics, binary exploitation, web challenges, and cryptography. Notable features include curated educational resources, practice sites, and a web mirror for easy access.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="ctfs"&gt;CTFs&lt;/h1&gt;
&lt;p&gt;Writeups / Files for some of the Cyber CTFs that I&amp;rsquo;ve done&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ve also included a list of &lt;strong&gt;CTF resources&lt;/strong&gt; as well as a comprehensive &lt;strong&gt;cheat sheet&lt;/strong&gt; covering tons of common CTF challenges&lt;/p&gt;</description></item><item><title>cve</title><link>https://rainmana.github.io/hackyfeed/tools/trickest-cve/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/trickest-cve/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The CVE PoC tool aggregates nearly every publicly available Proof-of-Concept (PoC) for Common Vulnerabilities and Exposures (CVEs), providing a comprehensive database of exploits for security professionals. It employs automated workflows to scrape and validate CVE details from various sources, including GitHub and HackerOne reports, while also allowing users to browse, search, and monitor PoCs for specific vulnerabilities. Noteworthy features include real-time updates, easy-to-read markdown documentation, and the ability to generate GitHub badges for affected software versions.&lt;/p&gt;</description></item><item><title>CVE-2020-0796</title><link>https://rainmana.github.io/hackyfeed/tools/danigargu-cve-2020-0796/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/danigargu-cve-2020-0796/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CVE-2020-0796 is a Windows SMBv3 local privilege escalation exploit that targets a vulnerability in the SMB protocol, enabling unauthorized users to elevate their permissions. The tool includes proof of concept (PoC) and analysis references for users seeking to understand and replicate the exploit. Notable features include detailed documentation and references to further resources for in-depth exploitation and analysis of the vulnerability.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="cve-2020-0796"&gt;CVE-2020-0796&lt;/h1&gt;
&lt;p&gt;Windows SMBv3 LPE Exploit&lt;/p&gt;
&lt;p&gt;&lt;img src="https://user-images.githubusercontent.com/1675387/77913732-110d4f80-7295-11ea-9af6-f17201c66673.gif" alt="exploit"&gt;&lt;/p&gt;</description></item><item><title>CVE-2021-44228-PoC-log4j-bypass-words</title><link>https://rainmana.github.io/hackyfeed/tools/puliczek-cve-2021-44228-poc-log4j-bypass-words/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/puliczek-cve-2021-44228-poc-log4j-bypass-words/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The CVE-2021-44228-PoC-log4j-bypass-words tool demonstrates various methods to exploit the Apache Log4j vulnerability, specifically focusing on bypassing WAF protections and patched versions. It provides multiple techniques, including the use of system environment variables, case manipulation, and invalid Unicode to obfuscate the exploit strings. Notable features include dynamic manipulation of Java naming lookups and the ability to use non-existent lookups for stealthy exploitation attempts.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center" &gt;🤝 Show your support - give a ⭐️ if you liked the content | &lt;a target="_blank" href='https://twitter.com/intent/tweet?url=https%3A%2F%2Fgithub.com%2FPuliczek%2FCVE-2021-44228-PoC-log4j-bypass-words&amp;via=pulik_io&amp;text=%20LOG4J%20Java%20exploit%20-%20WAF%20and%20patches%20bypass%20tricks'&gt;SHARE on Twitter&lt;/a&gt;
| Follow me on
 &lt;a target="_blank" href='https://twitter.com/pulik_io'&gt;&lt;img src='https://img.shields.io/badge/Twitter-%231DA1F2.svg?&amp;style=flat&amp;logo=twitter&amp;logoColor=white'/&gt;&lt;/a&gt;
 &lt;a target="_blank" href='https://www.youtube.com/channel/UCaAdOBH2hnqLvEri1M7eg5Q'&gt;&lt;img src='https://img.shields.io/badge/YouTube-%23FF0000.svg?&amp;style=flat&amp;logo=youtube&amp;logoColor=white'/&gt;&lt;/a&gt;
&lt;/div&gt;
&lt;hr&gt;
&lt;h1 id="---log4j-java-exploit---waf-and-patches-bypass-tricks"&gt;&lt;strong&gt;🐱‍💻 ✂️ 🤬 LOG4J Java exploit - WAF and patches bypass tricks&lt;/strong&gt;&lt;/h1&gt;
&lt;h1 id="-description"&gt;📝 Description&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;CVE-2021-44228&lt;/strong&gt; works on:&lt;/p&gt;</description></item><item><title>CVE-2023-38831-winrar-exploit</title><link>https://rainmana.github.io/hackyfeed/tools/b1tg-cve-2023-38831-winrar-exploit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/b1tg-cve-2023-38831-winrar-exploit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The CVE-2023-38831 winrar exploit generator is a tool designed to create proof-of-concept (PoC) exploits for a recently discovered vulnerability in WinRAR versions up to 6.22. It allows users to customize bait files, such as images or documents, along with malicious script files to generate a malicious RAR archive. Notable features include an easy-to-use command-line interface for generating exploits and the ability to customize payloads according to user specifications.&lt;/p&gt;</description></item><item><title>CVE-2024-1086</title><link>https://rainmana.github.io/hackyfeed/tools/notselwyn-cve-2024-1086/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/notselwyn-cve-2024-1086/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CVE-2024-1086 is a universal local privilege escalation exploit targeting Linux kernels from v5.14 to v6.6, with a notable success rate of 99.4% in KernelCTF environments. It allows users to gain root access under specific conditions related to user namespaces and kernel configurations, while also showcasing a deliberate kernel panic after execution to deter malicious exploitation. The tool includes both source code for building as well as a compiled binary for ease of use.&lt;/p&gt;</description></item><item><title>cve-bin-tool</title><link>https://rainmana.github.io/hackyfeed/tools/ossf-cve-bin-tool/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ossf-cve-bin-tool/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CVE-bin-tool is a static analysis tool designed to identify vulnerable dependencies in binary artifacts by comparing them against known Common Vulnerabilities and Exposures (CVEs). Its primary use case is to streamline the security assessment process in software projects, enabling developers to detect and remediate vulnerabilities efficiently. Notable features include support for various package formats, a comprehensive vulnerability database, and integration capabilities with CI/CD pipelines for automated security checks.&lt;/p&gt;</description></item><item><title>DDOS-RootSec</title><link>https://rainmana.github.io/hackyfeed/tools/r00ts3c-ddos-rootsec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/r00ts3c-ddos-rootsec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The RootSec Archive is a comprehensive collection of tools and resources designed for conducting Distributed Denial-of-Service (DDoS) attacks, vulnerability scanning, and botnet management. Notable features include a variety of botnet variants (such as Mirai and QBot), password cracking tools, real-time statistics through DStat, and C2 sources for effective botnet control. This archive serves both as a point of reference and a toolkit for security testing and exploitation practices.&lt;/p&gt;</description></item><item><title>DeauthDetector</title><link>https://rainmana.github.io/hackyfeed/tools/spacehuhntech-deauthdetector/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/spacehuhntech-deauthdetector/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DeauthDetector is an open-source tool designed to monitor and detect Wi-Fi deauthentication attacks using an ESP8266 microcontroller. Its primary use case involves real-time identification of malicious deauth frames, indicated by an LED activation, making it an effective low-cost solution for network security monitoring. Notable features include customizable scanning options, support for multiple channels, and easy installation via precompiled binaries or Arduino integration.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="deauthdetector"&gt;DeauthDetector&lt;/h1&gt;
&lt;p&gt;Detect deauthentication frames using an ESP8266&lt;/p&gt;</description></item><item><title>DedSec</title><link>https://rainmana.github.io/hackyfeed/tools/dedsec1121fk-dedsec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dedsec1121fk-dedsec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The DedSec Project is an educational toolkit designed for Android using Termux, integrating various scripts, utilities, and local web interfaces to facilitate learning about cybersecurity tools and workflows. It aims to enhance users&amp;rsquo; understanding of defensive awareness through practical exercises and organized scripts, while supporting both English and Greek interfaces. Notable features include a comprehensive installation guide, diverse categories of tools, and a focus on educational usage, including personal information capture and simulated environments.&lt;/p&gt;</description></item><item><title>deepce</title><link>https://rainmana.github.io/hackyfeed/tools/stealthcopter-deepce/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/stealthcopter-deepce/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DeepCE is a lightweight tool designed for Docker container enumeration, privilege escalation, and container escapes, written in pure shell script to maximize compatibility. It performs a variety of enumerations, including container-specific data collection and host system scanning, and offers multiple exploits such as Docker group privilege escalation and command execution in privileged mode. Notably, DeepCE minimizes disk writes during enumeration, making it suitable for stealthy assessments in containerized environments.&lt;/p&gt;</description></item><item><title>DefaultCreds-cheat-sheet</title><link>https://rainmana.github.io/hackyfeed/tools/ihebski-defaultcreds-cheat-sheet/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ihebski-defaultcreds-cheat-sheet/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Default Credentials Cheat Sheet is a tool designed for penetration testers and blue teamers, providing a comprehensive repository of default login credentials for various products to aid in security assessments. Notable features include a searchable database of over 3,700 default credentials, the ability to export results for use in brute force attacks, and automated updates to maintain current data. The tool is easily installable via pip and supports operations across multiple operating systems.&lt;/p&gt;</description></item><item><title>DeimosC2</title><link>https://rainmana.github.io/hackyfeed/tools/deimosc2-deimosc2/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/deimosc2-deimosc2/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DeimosC2 is a deprecated post-exploitation Command &amp;amp; Control (C2) tool designed to facilitate control over compromised machines across multiple operating systems including Windows, macOS, and Linux. Its notable features include dynamic agent generation, diverse communication methods (TCP, HTTPS, DoH, and QUIC), a graphical interface for managing listeners and agents, and robust security measures such as multi-user support and two-factor authentication. However, it is important to note that the tool has a known XSS vulnerability and is no longer maintained.&lt;/p&gt;</description></item><item><title>dep-scan</title><link>https://rainmana.github.io/hackyfeed/tools/owasp-dep-scan-dep-scan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/owasp-dep-scan-dep-scan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OWASP dep-scan is an advanced security audit tool designed for analyzing project dependencies against known vulnerabilities, advisories, and license issues, applicable to both local repositories and container images. Its primary use case is to facilitate integration within Application Security Posture Management (ASPM) and Vulnerability Management (VM) platforms, especially in Continuous Integration (CI) environments. Notable features include advanced reachability analysis, fast local vulnerability scanning without a server, generation of Software Bills of Materials (SBOM), and clear insights for prioritization of vulnerabilities.&lt;/p&gt;</description></item><item><title>device-activity-tracker</title><link>https://rainmana.github.io/hackyfeed/tools/gommzystudio-device-activity-tracker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gommzystudio-device-activity-tracker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Device Activity Tracker is a proof-of-concept tool designed for the analysis of WhatsApp and Signal user activity through Round-Trip Time (RTT) measurement of message delivery receipts. Its primary use case is to uncover privacy vulnerabilities in these messaging apps by detecting user activity levels, device state, and potential location changes, all while presenting real-time data through an accessible web interface. Notable features include an easy setup via Docker, a client-server architecture, and a CLI option for direct tracking of WhatsApp users.&lt;/p&gt;</description></item><item><title>diodb</title><link>https://rainmana.github.io/hackyfeed/tools/disclose-diodb/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/disclose-diodb/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Diodb is a community-driven, vendor-agnostic database designed to catalog Vulnerability Disclosure Programs (VDPs) and Bug Bounty Programs (BBPs), including essential details such as contact information, policy locations, and reward structures. It facilitates streamlined engagement between security researchers and organizations, promoting best practices like Safe Harbor for ethical hacking. Notable features include a searchable front-end interface, options to download raw data in JSON format, and tools for generating VDPs easily.&lt;/p&gt;</description></item><item><title>dockle</title><link>https://rainmana.github.io/hackyfeed/tools/goodwithtech-dockle/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/goodwithtech-dockle/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dockle is a container image linter designed to enhance the security and compliance of Docker images by identifying vulnerabilities and recommending adherence to best practices, including CIS Benchmarks. It offers a simple command-line interface for scanning images, supports integration with CI/CD pipelines, and provides detailed checkpoint reports regarding security issues and Dockerfile practices. Notable features include vulnerability detection and the ability to customize scan parameters for fine-tuning results.&lt;/p&gt;</description></item><item><title>DogeRat</title><link>https://rainmana.github.io/hackyfeed/tools/shivaya-dav-dogerat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/shivaya-dav-dogerat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DogeRat is an advanced Android remote administration tool (RAT) that enables real-time control over Android devices through a Telegram-based interface without the need for port forwarding. Notable features include the ability to send and receive messages, capture multimedia, access location data, manage contacts, and utilize keylogger functionality, with additional capabilities available in its paid version, such as encryption and undetectable injections. The tool is intended solely for educational purposes and boasts a comprehensive set of functionalities for thorough device management.&lt;/p&gt;</description></item><item><title>EggShell</title><link>https://rainmana.github.io/hackyfeed/tools/lucasjacks0n-eggshell/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lucasjacks0n-eggshell/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; EggShell is a post-exploitation surveillance tool developed in Python, designed for establishing command line sessions on target machines with extended functionalities. Notable features include file uploading/downloading, tab completion, command execution, photo capturing, and device location tracking, with enhanced security through SSL and support for Linux and iOS in version 3.0.0. This tool serves as a proof of concept for penetration testing on devices that users own.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="eggshell"&gt;&lt;a href="http://lucasjackson.io/eggshell"&gt;EggShell&lt;/a&gt;&lt;/h1&gt;
&lt;h2 id="about"&gt;About&lt;/h2&gt;
&lt;p&gt;EggShell is a post exploitation surveillance tool written in Python. It gives you a command line session with extra functionality between you and a target machine. EggShell gives you the power and convenience of uploading/downloading files, tab completion, taking pictures, location tracking, shell command execution, persistence, escalating privileges, password retrieval, and much more. This is project is a proof of concept, intended for use on machines you own.&lt;/p&gt;</description></item><item><title>EvilOSX</title><link>https://rainmana.github.io/hackyfeed/tools/marten4n6-evilosx/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/marten4n6-evilosx/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; EvilOSX is a Remote Administration Tool (RAT) designed for macOS that enables stealthy monitoring and control of compromised systems. It boasts features such as terminal emulation, module extensibility, and the ability to retrieve sensitive user data like passwords and iCloud tokens, all while remaining undetected by antivirus solutions through encrypted payloads. Additionally, it includes functionalities for taking screenshots, recording audio, and executing local privilege escalation attempts, making it a potent tool for unauthorized system access and data exfiltration.&lt;/p&gt;</description></item><item><title>exphub</title><link>https://rainmana.github.io/hackyfeed/tools/zhzyker-exphub/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zhzyker-exphub/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Exphub is a vulnerability exploitation script repository containing various Proof of Concept (PoC) and exploit scripts for commonly exploited vulnerabilities across platforms like Weblogic, Struts2, Tomcat, and Drupal. It includes detailed usage documentation for a wide range of scripts, such as remote command execution (RCE) and Webshell uploader scripts, all of which have been tested for effectiveness. The tool aims to streamline the process of vulnerability scanning and exploitation by consolidating multiple scripts for easy access and execution.&lt;/p&gt;</description></item><item><title>exploitnotes</title><link>https://rainmana.github.io/hackyfeed/tools/hdks-bug-exploitnotes/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hdks-bug-exploitnotes/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Exploit Notes is a comprehensive resource platform designed for security research, focusing on hacking techniques and tools applicable to penetration testing, bug bounty programs, and Capture The Flag (CTF) challenges. It encompasses a wide array of topics including reconnaissance, various operating systems, web applications, databases, networks, and emerging technologies such as AI and blockchain. Users can leverage this repository for educational purposes, with the option to run it locally via a straightforward setup process.&lt;/p&gt;</description></item><item><title>faraday</title><link>https://rainmana.github.io/hackyfeed/tools/infobyte-faraday/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/infobyte-faraday/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Faraday is an open-source vulnerability management tool designed to facilitate the organization, aggregation, and visualization of security data in a multiuser environment. Its primary use case is to streamline vulnerability discovery and management by integrating various community tools while providing insightful visualizations for both managers and analysts. Notable features include its command-line interface for direct terminal access, support for multiple installation methods (including Docker and PyPi), and the ability to automate scanning tools within CI/CD pipelines.&lt;/p&gt;</description></item><item><title>featherduster</title><link>https://rainmana.github.io/hackyfeed/tools/nccgroup-featherduster/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nccgroup-featherduster/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; FeatherDuster is a cryptographic analysis tool designed to facilitate the identification and exploitation of weaknesses in cryptosystems, leveraging its underlying library, Cryptanalib. It offers capabilities for automatic encoding detection and decoding, interaction with multiple ciphertext formats, and supports various cryptographic analysis functions, making it suitable for both researchers and practitioners in the field of cryptography. The tool aims to simplify the process of analyzing flawed cryptographic implementations, while Cryptanalib serves as a flexible engine for developing custom crypto attack methods.&lt;/p&gt;</description></item><item><title>Forensia</title><link>https://rainmana.github.io/hackyfeed/tools/paulnorman01-forensia/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/paulnorman01-forensia/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Forensia is an anti-forensics tool designed for red teamers to eliminate traces during the post-exploitation phase. Its primary use case is to enhance evasion by supporting various functionalities such as unloading Sysmon drivers, employing the Gutmann method for file shredding, and disabling multiple logging mechanisms. Notable features include log erasure, file melting capabilities, and the ability to clear recent user activity and cache, thereby reducing the likelihood of detection by incident response teams.&lt;/p&gt;</description></item><item><title>Frida-Labs</title><link>https://rainmana.github.io/hackyfeed/tools/dere-ad2001-frida-labs/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dere-ad2001-frida-labs/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Frida-Labs is a repository designed to facilitate learning Frida for Android through a series of structured challenges, ranging from basic setup to intermediate-level tasks. The primary use case is to help users grasp the fundamentals of using Frida by engaging with practical scenarios that involve hooking methods, changing variable values, and native function invocation. Notable features include a variety of challenges, organized solutions, and an emphasis on understanding Frida scripts, making it an ideal starting point for beginners.&lt;/p&gt;</description></item><item><title>fscan</title><link>https://rainmana.github.io/hackyfeed/tools/shadow1ng-fscan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/shadow1ng-fscan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Fscan is a comprehensive internal network scanning tool designed for automated vulnerability assessment and information gathering. Its primary use case encompasses host discovery, port scanning, credential brute-forcing across various protocols, system vulnerability detection, and web application scanning, including comprehensive support for various databases and frameworks. Notable features include the ability to exploit vulnerabilities such as MS17-010, SSH remote command execution, and the storage of scan results for further analysis.&lt;/p&gt;</description></item><item><title>fsociety</title><link>https://rainmana.github.io/hackyfeed/tools/manisso-fsociety/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/manisso-fsociety/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Fsociety is a comprehensive penetration testing framework designed to provide a wide array of hacking tools utilized in the Mr. Robot series. It features modules for information gathering, password attacks, wireless testing, exploitation, web hacking, and post-exploitation, all implemented in Python 2, with detailed installation instructions for various platforms, including Docker support. Notable tools included are Nmap, sqlmap, WPScan, and several others tailored for diverse security testing scenarios.&lt;/p&gt;</description></item><item><title>fuxploider</title><link>https://rainmana.github.io/hackyfeed/tools/almandin-fuxploider/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/almandin-fuxploider/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Fuxploider is an open-source penetration testing tool designed to automate the detection and exploitation of vulnerabilities in file upload forms. Its primary use case is to identify permissible file types and effectively upload web shells or malicious files to targeted web servers using optimized techniques. Notable features include support for Python 3.6 and the ability to utilize Docker for installation, providing flexibility across different environments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="fuxploider"&gt;fuxploider&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://www.python.org/"&gt;&lt;img src="https://img.shields.io/badge/python-3.6%20%2B-green.svg" alt="Python 3.6"&gt;&lt;/a&gt; &lt;a href="https://raw.githubusercontent.com/almandin/fuxploider/master/LICENSE.md"&gt;&lt;img src="https://img.shields.io/badge/license-GPLv3-red.svg" alt="License"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>fuzzforge_ai</title><link>https://rainmana.github.io/hackyfeed/tools/fuzzinglabs-fuzzforge_ai/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/fuzzinglabs-fuzzforge_ai/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; FuzzForge AI is an open-source orchestration platform that leverages AI agents to automate security research workflows via the Model Context Protocol (MCP). It enables seamless interaction with containerized security tools, allowing AI agents to discover, chain, and execute tasks for vulnerability assessment and analysis autonomously. Notable features include a hub architecture for tool discovery, support for AI-native workflows, and the capability to create automated pipelines tailored for specific use cases such as firmware vulnerability research or Rust fuzzing.&lt;/p&gt;</description></item><item><title>Galaxy-Bugbounty-Checklist</title><link>https://rainmana.github.io/hackyfeed/tools/0xmaximus-galaxy-bugbounty-checklist/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xmaximus-galaxy-bugbounty-checklist/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Galaxy Bugbounty Checklist is a comprehensive tool designed to aid bug bounty hunters by providing an organized and detailed checklist of security assessment techniques. It includes specific references for various testing methodologies such as Account Takeover, CSRF Bypass, and OSINT, making it an essential resource for systematic vulnerability evaluation. Notable features include its structured format and accessibility for users to seek assistance directly through the provided contact.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="notes"&gt;Notes&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;Try to make best Bug Bounty Checklist.&lt;/li&gt;
&lt;li&gt;All checklists come with references.&lt;/li&gt;
&lt;li&gt;Feel free to contact me maximus0xday [at] gmail if you have any question.&lt;/li&gt;
&lt;/ul&gt;
&lt;!--- ![bug bou](https://user-images.githubusercontent.com/63053441/121688913-3de40600-cad9-11eb-81b2-33d85ec42b57.jpg) --&gt;
&lt;img src="https://socialify.git.ci/0xmaximus/Galaxy-Bugbounty-Checklist/image?font=KoHo&amp;forks=1&amp;owner=1&amp;pattern=Circuit%20Board&amp;stargazers=1&amp;theme=Dark" alt="Galaxy-Bugbounty-Checklist" width="640" height="320" /&gt;
&lt;p&gt;To do list:&lt;/p&gt;</description></item><item><title>Garud</title><link>https://rainmana.github.io/hackyfeed/tools/r0x4r-garud/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/r0x4r-garud/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Garud is an automation tool designed for reconnaissance, specifically targeting sub-domain enumeration and vulnerability scanning for injection points such as XSS, SSRF, and SSTI. It integrates multiple popular bug bounty tools, including Assetfinder, Subfinder, and Nuclei, to streamline the scanning process, outputting results systematically while notifying the user upon completion. Notable features include the ability to filter and identify low-hanging vulnerabilities, along with systematic data collection and reporting functionalities.&lt;/p&gt;</description></item><item><title>GDA-android-reversing-Tool</title><link>https://rainmana.github.io/hackyfeed/tools/charles2gan-gda-android-reversing-tool/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/charles2gan-gda-android-reversing-tool/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GDA (GJoy Dex Analyzer) is a powerful Dalvik bytecode decompiler designed for fast analysis of APK, DEX, ODEX, OAT, JAR, CLASS, and AAR files, with minimal memory and disk consumption. It features advanced capabilities including malicious behavior detection, vulnerability scanning, path solving, and deobfuscation, as well as various utilities for interactive operation and assisted analysis. GDA operates natively without requiring a Java VM, making it suitable for use on various Windows systems and virtual machines.&lt;/p&gt;</description></item><item><title>Ghost</title><link>https://rainmana.github.io/hackyfeed/tools/entysec-ghost/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/entysec-ghost/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ghost Framework is an Android post-exploitation framework that leverages the Android Debug Bridge to enable remote access to Android devices. Its primary use case is for penetration testing and security assessments of Android applications and devices. Notable features include ease of installation via pip and a focus on facilitating comprehensive exploitation scenarios.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h3 align="center"&gt;
 &lt;img src="https://user-images.githubusercontent.com/54115104/116760735-6da1e780-aa1e-11eb-8c6f-530386487671.png" alt="logo" height="250px"&gt;
&lt;/h3&gt;
&lt;p align="center"&gt;
 &lt;b&gt;Ghost Framework&lt;/b&gt;
 &lt;br&gt;
 &lt;br&gt;
 &lt;a href="https://entysec.com"&gt;
 &lt;img src="https://img.shields.io/badge/developer-EntySec-blue.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/EntySec/Ghost"&gt;
 &lt;img src="https://img.shields.io/badge/language-Python-blue.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/EntySec/Ghost/forks"&gt;
 &lt;img src="https://img.shields.io/github/forks/EntySec/Ghost?style=flat&amp;color=green"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/EntySec/Ghost/stargazers"&gt;
 &lt;img src="https://img.shields.io/github/stars/EntySec/Ghost?style=flat&amp;color=yellow"&gt;
 &lt;/a&gt;
 &lt;a href="https://www.codefactor.io/repository/github/entysec/ghost"&gt;
 &lt;img src="https://www.codefactor.io/repository/github/entysec/ghost/badge"&gt;
 &lt;/a&gt;
 &lt;br&gt;
 &lt;br&gt;
 Ghost Framework is an Android post-exploitation framework that
 &lt;br&gt;exploits the Android Debug Bridge to remotely access an Android device.
 &lt;br&gt;
 &lt;br&gt;
 &lt;b&gt;Installation&lt;/b&gt;&lt;br&gt;
 &lt;br&gt;
 &lt;code&gt;pip3 install git+https://github.com/EntySec/Ghost&lt;/code&gt;
&lt;/p&gt;</description></item><item><title>go-shellcode</title><link>https://rainmana.github.io/hackyfeed/tools/brimstone-go-shellcode/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/brimstone-go-shellcode/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The go-shellcode tool enables users to execute shellcode directly from memory as a standalone process, aiming to circumvent antivirus detection. Its primary use case involves running custom shellcode for penetration testing or exploitation purposes, leveraging features like shellcode size handling via batch scripts and a recommendation for binary obfuscation using the garble tool. The tool requires manual architecture specification and supports 64-bit shellcode execution while providing instructions for building and compressing the resulting binary.&lt;/p&gt;</description></item><item><title>Goby</title><link>https://rainmana.github.io/hackyfeed/tools/gobysec-goby/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gobysec-goby/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Goby is a network security assessment tool designed for efficient vulnerability scanning and comprehensive attack surface analysis of target enterprises. It features over 100,000 rule recognition engines and 200 protocol recognition engines, facilitating identification of various network and software vulnerabilities, along with access to preset account information for more than 1,000 devices. Additionally, Goby supports cross-platform functionality on Windows, MacOS, and Linux, and employs a user-friendly interface built with Electron and Vue.&lt;/p&gt;</description></item><item><title>GobyVuls</title><link>https://rainmana.github.io/hackyfeed/tools/gobysec-gobyvuls/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gobysec-gobyvuls/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GobyVuls is a collection of exploitation scripts specifically designed for vulnerabilities identified by the Goby scanning tool. The primary use case is to facilitate the exploitation of detected vulnerabilities, allowing users to perform actions such as command execution or establishing reverse shells. Notable features include a user-friendly interface for scanning and verification, as well as a collaborative framework for contributing new vulnerabilities and enhancing existing exploitation methods.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="gobyvuls"&gt;GobyVuls&lt;/h1&gt;
&lt;p&gt;&lt;a href="vulnerability_list.md"&gt;Vulnerabilities&lt;/a&gt; of Goby supported with exploitation.&lt;/p&gt;</description></item><item><title>GTFOBins.github.io</title><link>https://rainmana.github.io/hackyfeed/tools/gtfobins-gtfobins.github.io/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gtfobins-gtfobins.github.io/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GTFOBins is a curated repository that catalogs Unix-like executables capable of circumventing local security restrictions in improperly configured systems. Its primary use case is to aid security professionals and penetration testers in identifying and exploiting misconfigurations. Notable features include a comprehensive database of binaries and detailed usage instructions for different scenarios.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="gtfobins"&gt;GTFOBins&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/GTFOBins/GTFOBins.github.io/actions?query=workflow:CI"&gt;&lt;img src="https://github.com/GTFOBins/GTFOBins.github.io/actions/workflows/ci.yml/badge.svg" alt="CI status"&gt;&lt;/a&gt;
&lt;a href="https://github.com/GTFOBins/GTFOBins.github.io/actions?query=workflow:Pages"&gt;&lt;img src="https://github.com/GTFOBins/GTFOBins.github.io/actions/workflows/pages.yml/badge.svg" alt="CI status"&gt;&lt;/a&gt;
&lt;a href="https://github.com/sponsors/GTFOBins"&gt;&lt;img src="https://img.shields.io/static/v1?label=Sponsor&amp;amp;message=%E2%9D%A4&amp;amp;color=%23db61a2" alt="Sponsor"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://gtfobins.org"&gt;&lt;img align="right" src="assets/logo.png" style="width: 100px" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.&lt;/p&gt;</description></item><item><title>h-encore</title><link>https://rainmana.github.io/hackyfeed/tools/theofficialflow-h-encore/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/theofficialflow-h-encore/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; h-encore is a jailbreak tool for the PS Vita that enables kernel and user-mode modifications on firmware versions 3.65, 3.67, and 3.68. Its primary use case is to allow users to install plugins, run homebrew applications, and customize their device&amp;rsquo;s performance. Notable features include the ability to auto-exit the bootstrap menu, personalize savedata to remove trophy warnings, and a streamlined kernel ROP chain for enhanced stability and compatibility.&lt;/p&gt;</description></item><item><title>hack-tools</title><link>https://rainmana.github.io/hackyfeed/tools/hacktoolspack-hack-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hacktoolspack-hack-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;hack-tools&amp;rdquo; repository offers a comprehensive collection of cybersecurity tools including DOS, information gathering utilities, malware creation kits, and remote administration tools, catering to a wide audience from enthusiasts to professionals. Key features include multi-platform support for Windows and Linux, compatibility with several programming languages, and the availability of free tools; however, users are cautioned about the legal implications and varying development statuses of the tools provided.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://i.giphy.com/media/2Y0ecuTsnAvZK/200.gif" alt="animated" /&gt;
&lt;/p&gt;</description></item><item><title>hacking-resources</title><link>https://rainmana.github.io/hackyfeed/tools/lifka-hacking-resources/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lifka-hacking-resources/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Lifka/hacking-resources repository is a curated collection of hacking utilities and cheat sheets, aimed at assisting cybersecurity professionals and enthusiasts in their studies. It includes a variety of resources such as tools, OS distributions, tutorials, and specific cheat sheets for cloud, web, network, and system hacking. Notable features involve a comprehensive index and contributions from the community, facilitating an ongoing accumulation of valuable cybersecurity knowledge.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="hacking-resources-and-cheat-sheets"&gt;Hacking resources and cheat sheets&lt;/h1&gt;
&lt;!-- ALL-CONTRIBUTORS-BADGE:START - Do not remove or modify this section --&gt;
&lt;p&gt;&lt;a href="#contributors-"&gt;&lt;img src="https://img.shields.io/badge/all_contributors-0-orange.svg?style=flat-square" alt="All Contributors"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Hacking-Tools</title><link>https://rainmana.github.io/hackyfeed/tools/yogsec-hacking-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/yogsec-hacking-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Hacking-Tools is a curated collection of penetration testing and ethical hacking utilities, including essential tools from Kali Linux. It is organized into categories such as information gathering, vulnerability analysis, and exploitation tools, facilitating easy navigation and use. Notable features include a featured tool, BugBoard, designed to automate vulnerability detection for bug bounty hunters and security researchers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="hacking-tools"&gt;Hacking-Tools&lt;/h1&gt;
&lt;div align="center" style="margin: 30px 0;"&gt;
A curated list of penetration testing and ethical hacking tools, organized by category. This collection includes Kali Linux tools and other notable utilities.
&lt;/br&gt;
&lt;p&gt;&lt;img src="https://media0.giphy.com/media/v1.Y2lkPTc5MGI3NjExdHJjMXpvb2hkdXJvN2Y3cmllNG81YXNsem90ejhwY2NqbXB5OXgzaiZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw/137EaR4vAOCn1S/giphy.gif" alt="Hacking Anime"&gt;&lt;/p&gt;</description></item><item><title>HackVault</title><link>https://rainmana.github.io/hackyfeed/tools/0xsobky-hackvault/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xsobky-hackvault/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HackVault is a container repository designed for both defensive and offensive hacking tools. Its primary use case is to centralize and share various hacking utilities, which are intended to be continuously updated with new content over time. Notable features include a structured Wiki section for detailed information and ongoing additions to its arsenal of tools.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="hackvault"&gt;HackVault&lt;/h1&gt;
&lt;p&gt;This is a container repository for my defensive/offensive hacks. Go check the &lt;a href="https://github.com/0xsobky/HackVault/wiki"&gt;Wiki section&lt;/a&gt; for more information!
Ideally, it&amp;rsquo;d be continually updated with new interesting stuff over time!&lt;/p&gt;</description></item><item><title>heap-viewer</title><link>https://rainmana.github.io/hackyfeed/tools/danigargu-heap-viewer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/danigargu-heap-viewer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HeapViewer is an IDA Pro plugin designed for analyzing heap memory, particularly for exploit development focusing on the glibc malloc implementation (ptmalloc2). Notable features include heap tracing for memory allocation functions, detection of overlaps and double-frees, visualization tools, chunk and arena information, and various utilities for manipulating and understanding heap structures. This tool aids in the identification of vulnerabilities related to memory management in software applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="heapviewer"&gt;HeapViewer&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://www.gnu.org/licenses/gpl-3.0"&gt;&lt;img src="https://img.shields.io/badge/License-GPLv3-blue.svg" alt="License: GPL v3"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Heroinn</title><link>https://rainmana.github.io/hackyfeed/tools/b23r0-heroinn/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/b23r0-heroinn/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Heroinn is a cross-platform command-and-control (C2) and post-exploitation framework developed in Rust, designed primarily for research and educational purposes. Notable features include a graphical user interface (GUI), an interactive PTY shell, system information collection, file management with support for large files and resuming broken transfers, and compatibility with multiple operating systems including Windows, Linux, BSD, and macOS, leveraging various communication protocols such as TCP, HTTP, and reliable UDP.&lt;/p&gt;</description></item><item><title>herpaderping</title><link>https://rainmana.github.io/hackyfeed/tools/jxy-s-herpaderping/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jxy-s-herpaderping/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Herpaderping is a process obfuscation tool that manipulates the content of a file on disk after it has been mapped for execution, thereby misleading security products and the operating system about the actual process being run. Its primary use case is to facilitate stealthy execution of binaries by exploiting the timing of process creation callbacks and on-write scanning mechanisms, allowing an actor to modify the file after mapping but before the process starts. Notable features include the ability to remain undetected during file inspections and the execution of a binary while obscuring its original content through a specific workflow of creating, mapping, modifying, and executing targets.&lt;/p&gt;</description></item><item><title>hexstrike-ai</title><link>https://rainmana.github.io/hackyfeed/tools/0x4m4-hexstrike-ai/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0x4m4-hexstrike-ai/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HexStrike AI is an advanced penetration testing platform that integrates over 150 security tools and more than 12 autonomous AI agents for automated cybersecurity assessment. Its primary use case focuses on cybersecurity automation, employing intelligent decision-making and vulnerability intelligence to optimize attack strategies and resource management. Notable features include real-time dashboards, progress visualization, and a multi-agent architecture that facilitates comprehensive penetration testing and threat analysis.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
&lt;img src="assets/hexstrike-logo.png" alt="HexStrike AI Logo" width="220" style="margin-bottom: 20px;"/&gt;
&lt;h1 id="hexstrike-ai-mcp-agents-v60"&gt;HexStrike AI MCP Agents v6.0&lt;/h1&gt;
&lt;h3 id="ai-powered-mcp-cybersecurity-automation-platform"&gt;AI-Powered MCP Cybersecurity Automation Platform&lt;/h3&gt;
&lt;p&gt;&lt;a href="https://www.python.org/"&gt;&lt;img src="https://img.shields.io/badge/Python-3.8%2B-blue.svg" alt="Python"&gt;&lt;/a&gt;
&lt;a href="LICENSE"&gt;&lt;img src="https://img.shields.io/badge/License-MIT-green.svg" alt="License"&gt;&lt;/a&gt;
&lt;a href="https://github.com/0x4m4/hexstrike-ai"&gt;&lt;img src="https://img.shields.io/badge/Security-Penetration%20Testing-red.svg" alt="Security"&gt;&lt;/a&gt;
&lt;a href="https://github.com/0x4m4/hexstrike-ai"&gt;&lt;img src="https://img.shields.io/badge/MCP-Compatible-purple.svg" alt="MCP"&gt;&lt;/a&gt;
&lt;a href="https://github.com/0x4m4/hexstrike-ai/releases"&gt;&lt;img src="https://img.shields.io/badge/Version-6.0.0-orange.svg" alt="Version"&gt;&lt;/a&gt;
&lt;a href="https://github.com/0x4m4/hexstrike-ai"&gt;&lt;img src="https://img.shields.io/badge/Security%20Tools-150%2B-brightgreen.svg" alt="Tools"&gt;&lt;/a&gt;
&lt;a href="https://github.com/0x4m4/hexstrike-ai"&gt;&lt;img src="https://img.shields.io/badge/AI%20Agents-12%2B-purple.svg" alt="Agents"&gt;&lt;/a&gt;
&lt;a href="https://github.com/0x4m4/hexstrike-ai"&gt;&lt;img src="https://img.shields.io/github/stars/0x4m4/hexstrike-ai?style=social" alt="Stars"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>htshells</title><link>https://rainmana.github.io/hackyfeed/tools/wireghoul-htshells/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wireghoul-htshells/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HTSHELLS is a toolkit that facilitates the deployment of self-contained web shells and various web-based attack vectors by utilizing .htaccess files. Its primary use case is for penetration testing and exploitation, allowing users to execute commands remotely and conduct denial-of-service, information disclosure, directory traversal, and other attacks through a structured directory of attack modules. Notable features include the ability to generate custom .htaccess files for specific attack types and execute commands via query parameters, enhancing flexibility for security assessments.&lt;/p&gt;</description></item><item><title>Information_Collection_Handbook</title><link>https://rainmana.github.io/hackyfeed/tools/qftm-information_collection_handbook/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/qftm-information_collection_handbook/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Information Collection Handbook is a comprehensive resource designed for penetration testers, focusing on effective information gathering techniques essential for vulnerability exploitation. It consolidates various methods and tools for domain and subdomain information collection, including online services, browser plugins, and advanced querying techniques, thereby enabling security professionals to uncover assets and vulnerabilities that may otherwise remain hidden. Notable features include detailed sections on Whois queries, DNS historical analysis, and strategies for bypassing content delivery networks (CDNs) to uncover real IP addresses.&lt;/p&gt;</description></item><item><title>Infosec_Reference</title><link>https://rainmana.github.io/hackyfeed/tools/rmusser01-infosec_reference/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rmusser01-infosec_reference/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The InfoSec Reference project serves as a comprehensive resource for individuals seeking to enhance their understanding of Information Security, offering a curated list of techniques, tools, and tactics. Its primary use case revolves around providing a &amp;ldquo;Yellow Pages&amp;rdquo; style reference for users to browse and learn about various aspects of infosec, helping them build skills and recall pertinent information. Notably, it encourages community contributions and maintains regular updates, while emphasizing a commitment to ethical practices in cybersecurity.&lt;/p&gt;</description></item><item><title>inql</title><link>https://rainmana.github.io/hackyfeed/tools/doyensec-inql/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/doyensec-inql/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; InQL is an open-source Burp Suite extension tailored for advanced GraphQL testing, enabling security professionals to effectively identify vulnerabilities within GraphQL APIs. It features a user-friendly interface, robust query manipulation capabilities, and integration with Burp&amp;rsquo;s existing tools, significantly enhancing the testing process for GraphQL applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="inql-v612---burp-extension-for-advanced-graphql-testing"&gt;InQL v6.1.2 - Burp Extension for Advanced GraphQL Testing&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://doyensec.com/research.html"&gt;&lt;img src="https://img.shields.io/static/v1?logo=data:image/png;base64,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&amp;amp;link=https://doyensec.com/research.html&amp;amp;message=Research%20Island&amp;amp;&amp;amp;label=Doyensec&amp;amp;color=purple" alt="Doyensec Research Island"&gt;&lt;/a&gt;
&lt;img src="https://img.shields.io/github/license/doyensec/inql?logo=github&amp;amp;color=darkgreen" alt="GitHub"&gt;
&lt;img src="https://img.shields.io/github/v/release/doyensec/inql?label=latest%20release&amp;amp;logo=github" alt="GitHub release (latest by date)"&gt;
&lt;img src="https://img.shields.io/github/release-date/doyensec/inql?display_date=published_at&amp;amp;logo=github" alt="GitHub Release Date"&gt;
&lt;a href="https://github.com/doyensec/inql/tree/dev"&gt;&lt;img src="https://img.shields.io/github/commits-difference/doyensec/inql?base=master&amp;amp;head=dev&amp;amp;label=dev+branch+ahead+by&amp;amp;color=bright&amp;amp;logo=github" alt="dev branch ahead by"&gt;&lt;/a&gt;
&lt;a href="AUTHORS"&gt;&lt;img src="https://img.shields.io/github/contributors/doyensec/inql?logo=github&amp;amp;color=black" alt="GitHub contributors"&gt;&lt;/a&gt;
&lt;a href="https://github.com/doyensec/inql/issues?q=is%3Aissue+is%3Aopen+label%3A%22Help+Wanted%22"&gt;&lt;img src="https://img.shields.io/github/issues/doyensec/inql/Help%20Wanted?color=red&amp;amp;logo=github" alt="GitHub issues by-label"&gt;&lt;/a&gt;
&lt;a href="https://github.com/doyensec/inql/issues?q=is%3Aissue+is%3Aopen+label%3A%22Good+First+Issue%22"&gt;&lt;img src="https://img.shields.io/github/issues/doyensec/inql/Good%20First%20Issue?color=f0a&amp;amp;logo=github" alt="GitHub issues by-label"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>jexboss</title><link>https://rainmana.github.io/hackyfeed/tools/joaomatosf-jexboss/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/joaomatosf-jexboss/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; JexBoss is a tool designed to test and exploit Java deserialization vulnerabilities primarily in JBoss Application Server and other Java platforms. It supports versions 3 to 6 of JBoss and is effective against a variety of frameworks and applications, utilizing exploitation vectors such as admin and JMX consoles, servlet deserialization, and specific vulnerabilities like CVE-2017-5638. Notable features include easy installation, support for multiple target applications, and demonstration videos for practical use cases.&lt;/p&gt;</description></item><item><title>JNDI-Injection-Exploit-Plus</title><link>https://rainmana.github.io/hackyfeed/tools/cckuailong-jndi-injection-exploit-plus/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cckuailong-jndi-injection-exploit-plus/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; JNDI-Injection-Exploit-Plus is a comprehensive tool designed for generating operational JNDI links, facilitating background services with RMI, LDAP, and HTTP servers to test vulnerabilities effectively. It enhances the functionality of standard JNDI exploit tools by offering additional remote and local reference gadgets, support for multiple JDK versions, and the capability to create base64 and hex payloads, making it a robust resource for security testing. With over 75 deserialization gadgets included, it provides a diverse set of options for vulnerability assessments.&lt;/p&gt;</description></item><item><title>jok3r</title><link>https://rainmana.github.io/hackyfeed/tools/koutto-jok3r/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/koutto-jok3r/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Jok3r is a Python CLI application designed to assist penetration testers in executing automated network infrastructure and web security assessments. With over 50 integrated open-source tools, it streamlines vulnerability identification through context-aware checks, CVE lookups, and brute force attacks, all packaged within a Docker image for ease of use and customization. Notable features include automatic service fingerprinting, a comprehensive library of security checks for various network services, and automated post-authentication testing.&lt;/p&gt;</description></item><item><title>joomscan</title><link>https://rainmana.github.io/hackyfeed/tools/owasp-joomscan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/owasp-joomscan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OWASP JoomScan is an open-source vulnerability scanning tool designed specifically for Joomla CMS deployments, enabling automated detection of vulnerabilities and misconfigurations that could be exploited by attackers. Developed in Perl, it features a lightweight, modular architecture and provides a user-friendly interface with comprehensive reporting capabilities in both text and HTML formats. Notable features include component enumeration, version checks, firewall detection, and the ability to compile detailed reports to assist administrators in maintaining system security.&lt;/p&gt;</description></item><item><title>K8tools</title><link>https://rainmana.github.io/hackyfeed/tools/k8gege-k8tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/k8gege-k8tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; K8tools is a collection of security research and penetration testing tools designed for use in various environments, including remote command execution and web shells. Notably, these tools are modified to enhance compatibility and stability, catering to security professionals who require reliable functionalities. The repository serves as a hub for downloading tools, accessing documentation, and submitting feedback for continuous improvement.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="k8tools"&gt;K8tools&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/k8gege"&gt;&lt;img src="https://img.shields.io/badge/Author-k8gege-blueviolet" alt="Author"&gt;&lt;/a&gt;
&lt;a href="https://github.com/k8gege/K8tools/issues"&gt;&lt;img src="https://img.shields.io/github/issues/k8gege/K8tools" alt="GitHub issues"&gt;&lt;/a&gt;
&lt;a href="https://github.com/k8gege/K8tools/stargazers"&gt;&lt;img src="https://img.shields.io/github/stars/k8gege/K8tools" alt="Github Stars"&gt;&lt;/a&gt;
&lt;a href="https://github.com/k8gege/K8tools/network/members"&gt;&lt;img src="https://img.shields.io/github/forks/k8gege/K8tools" alt="GitHub forks"&gt;&lt;/a&gt;
&lt;a href="https://github.com/k8gege/K8tools/blob/master/LICENSE"&gt;&lt;img src="https://img.shields.io/github/license/k8gege/K8tools" alt="GitHub license"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="http://k8gege.org/k8img/title/gun5.jpg" alt="image"&gt;&lt;/p&gt;
&lt;p&gt;声明: 工具仅供安全研究或授权渗透，非法用途后果自负。&lt;br&gt;
下载: &lt;a href="https://github.com/k8gege/K8tools"&gt;https://github.com/k8gege/K8tools&lt;/a&gt;&lt;br&gt;
文档: &lt;a href="http://k8gege.org/p/72f1fea6.html"&gt;http://k8gege.org/p/72f1fea6.html&lt;/a&gt;&lt;br&gt;&lt;/p&gt;</description></item><item><title>kernel-exploits</title><link>https://rainmana.github.io/hackyfeed/tools/bcoles-kernel-exploits/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bcoles-kernel-exploits/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The bcoles/kernel-exploits repository provides various updated local root exploit implementations targeting vulnerabilities in the Linux kernel, specifically those identified by their CVEs. Each exploit enables privilege escalation through vulnerabilities such as improper memory handling or mismanaged user namespaces, allowing attackers to gain root access under certain conditions. Notable features include detailed exploit descriptions and references to original sources for further investigation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="kernel-exploits"&gt;Kernel Exploits&lt;/h1&gt;
&lt;p&gt;Various kernel exploits&lt;/p&gt;
&lt;h2 id="cve-2021-22555"&gt;CVE-2021-22555&lt;/h2&gt;
&lt;p&gt;Linux local root exploit.&lt;/p&gt;</description></item><item><title>kernel-exploits</title><link>https://rainmana.github.io/hackyfeed/tools/xairy-kernel-exploits/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/xairy-kernel-exploits/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The xairy/kernel-exploits repository contains a collection of Linux kernel exploit code samples for various vulnerabilities, primarily focusing on local privilege escalation (LPE) and information leak scenarios. Each entry is associated with specific Common Vulnerabilities and Exposures (CVEs), detailing the exploit&amp;rsquo;s impact and vector, enhancing understanding and mitigation strategies for kernel security vulnerabilities. Notable features include the absence of licensing, making the code freely available for educational and research purposes.&lt;/p&gt;</description></item><item><title>kernelpwn</title><link>https://rainmana.github.io/hackyfeed/tools/smallkirby-kernelpwn/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/smallkirby-kernelpwn/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The kernelpwn repository serves as a comprehensive resource for Capture The Flag (CTF) challenges focused on kernel exploitation, providing both challenge write-ups and educational material for beginners in the field. It features a collection of solved kernel-pwn challenges with detailed write-ups, covering various complex exploitation techniques such as SMEP, SMAP, KPTI, and KASLR bypasses. Notable features include a focus on both kernel and non-userland vulnerabilities, as well as an invitation for community contributions to enhance the repository’s challenge offerings.&lt;/p&gt;</description></item><item><title>Keylogger</title><link>https://rainmana.github.io/hackyfeed/tools/ajayrandhawa-keylogger/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ajayrandhawa-keylogger/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Keylogger is a lightweight, open-source tool developed in Visual C++ for educational purposes, designed to monitor system activity by capturing keystrokes, mouse clicks, and periodic screenshots in stealth mode. Its notable features include FTP integration for automatic log uploads, the ability to run unnoticed in the background, and persistence through auto-start and auto-copy mechanisms. The tool emphasizes ethical use, warning against unauthorized application.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="keylogger"&gt;Keylogger&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://visitor-badge.laobi.icu/badge?page_id=ajayrandhawa.Keylogger&amp;amp;title=Visitor" alt="Visitor Badge"&gt;&lt;br&gt;
&lt;strong&gt;Please don&amp;rsquo;t forget to give us a ⭐ if you find this project useful!&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>kics</title><link>https://rainmana.github.io/hackyfeed/tools/checkmarx-kics/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/checkmarx-kics/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; KICS (Keeping Infrastructure as Code Secure) is an open-source tool designed to identify security vulnerabilities, compliance issues, and infrastructure misconfigurations in infrastructure-as-code early in the development cycle. It supports various platforms and offers a comprehensive set of queries for thorough analysis, making it essential for maintaining security in cloud-native projects. Notable features include its integration capabilities and extensive documentation for ease of use, enhancing security throughout the software development lifecycle.&lt;/p&gt;</description></item><item><title>killshot</title><link>https://rainmana.github.io/hackyfeed/tools/bahaabdelwahed-killshot/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bahaabdelwahed-killshot/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; KillShot is a comprehensive penetration testing framework designed for information gathering and website vulnerability scanning. Its primary use case involves automating data collection through integrated tools such as WhatWeb and Nmap, while offering features like a CMS Exploit Scanner and web application vulnerability assessments, including XSS and SQL injection detection. The framework also facilitates backdoor generation and includes a fuzzer, making it a versatile tool for security professionals.&lt;/p&gt;</description></item><item><title>KubeHound</title><link>https://rainmana.github.io/hackyfeed/tools/datadog-kubehound/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/datadog-kubehound/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; KubeHound is a Kubernetes attack graph tool designed to automatically calculate attack paths between assets within a cluster. It enables users to query and analyze security vulnerabilities through a graph-based representation of their Kubernetes environment, utilizing the Gremlin query language for advanced data exploration. Notable features include compatibility with Docker and Docker Compose, deployment as a service (KHaaS), and integration with graph query UIs, including a Jupyter notebook for user-friendly interaction with the attack graph data.&lt;/p&gt;</description></item><item><title>labs</title><link>https://rainmana.github.io/hackyfeed/tools/nixawk-labs/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nixawk-labs/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The nixawk/labs repository serves as a catalog of documented vulnerabilities, specifically Common Vulnerabilities and Exposures (CVEs), across various software systems, tools, and devices. The primary use case is to provide security professionals with a reference for known vulnerabilities and their implications, enhancing awareness and response strategies regarding potential exploits. Notable features include detailed entries for each CVE, outlining affected systems and specific attack vectors for exploitation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th style="text-align: left"&gt;&lt;em&gt;Name&lt;/em&gt;&lt;/th&gt;
 &lt;th style="text-align: left"&gt;&lt;em&gt;Description&lt;/em&gt;&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2015-5531&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2016-1909&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Fortinet FortiAnalyzer before 5.0.12 and 5.2.x before 5.2.5; FortiSwitch 3.3.x before 3.3.3; FortiCache 3.0.x before 3.0.8; and FortiOS 4.1.x before 4.1.11, 4.2.x before 4.2.16, 4.3.x before 4.3.17 and 5.0.x before 5.0.8 have a hardcoded passphrase for the Fortimanager_Access account, which allows remote attackers to obtain administrative access via an SSH session.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2016-10225&lt;/td&gt;
 &lt;td style="text-align: left"&gt;The sunxi-debug driver in Allwinner 3.4 legacy kernel for H3, A83T and H8 devices allows local users to gain root privileges by sending &amp;ldquo;rootmydevice&amp;rdquo; to /proc/sunxi_debug/sunxi_debug.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2016-3087&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Apache Struts 2.3.20.x before 2.3.20.3, 2.3.24.x before 2.3.24.3, and 2.3.28.x before 2.3.28.1, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via vectors related to an ! (exclamation mark) operator to the REST Plugin.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2016-4338&lt;/td&gt;
 &lt;td style="text-align: left"&gt;The mysql user parameter configuration script (userparameter_mysql.conf) in the agent in Zabbix before 2.0.18, 2.2.x before 2.2.13, and 3.0.x before 3.0.3, when used with a shell other than bash, allows context-dependent attackers to execute arbitrary code or SQL commands via the mysql.size parameter.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2016-5195&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka &amp;ldquo;Dirty COW.&amp;rdquo;&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2016-6277&lt;/td&gt;
 &lt;td style="text-align: left"&gt;NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2016-6415&lt;/td&gt;
 &lt;td style="text-align: left"&gt;The server IKEv1 implementation in Cisco IOS 12.2 through 12.4 and 15.0 through 15.6, IOS XE through 3.18S, IOS XR 4.3.x and 5.0.x through 5.2.x, and PIX before 7.0 allows remote attackers to obtain sensitive information from device memory via a Security Association (SA) negotiation request, aka Bug IDs CSCvb29204 and CSCvb36055 or BENIGNCERTAIN.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2016-7124&lt;/td&gt;
 &lt;td style="text-align: left"&gt;ext/standard/var_unserializer.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles certain invalid objects, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that leads to a (1) __destruct call or (2) magic method call.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2017-0199&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka &amp;ldquo;Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API.&amp;rdquo;&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2017-1000353&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java &lt;code&gt;SignedObject&lt;/code&gt; object to the Jenkins CLI, that would be deserialized using a new &lt;code&gt;ObjectInputStream&lt;/code&gt;, bypassing the existing blacklist-based protection mechanism. We&amp;rsquo;re fixing this issue by adding &lt;code&gt;SignedObject&lt;/code&gt; to the blacklist. We&amp;rsquo;re also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2017-12615&lt;/td&gt;
 &lt;td style="text-align: left"&gt;When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2017-17411&lt;/td&gt;
 &lt;td style="text-align: left"&gt;This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Linksys WVBR0 WVBR0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web management portal. The issue lies in the lack of proper validation of user data before executing a system call. An attacker could leverage this vulnerability to execute code with root privileges. Was ZDI-CAN-4892.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2017-5135&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Certain Technicolor devices have an SNMP access-control bypass, possibly involving an ISP customization in some cases. The Technicolor (formerly Cisco) DPC3928SL with firmware D3928SL-P15-13-A386-c3420r55105-160127a could be reached by any SNMP community string from the Internet; also, you can write in the MIB because it provides write properties, aka Stringbleed. NOTE: the string-bleed/StringBleed-CVE-2017-5135 GitHub repository is not a valid reference as of 2017-04-27; it contains Trojan horse code purported to exploit this vulnerability.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2017-5638&lt;/td&gt;
 &lt;td style="text-align: left"&gt;The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2017-5689&lt;/td&gt;
 &lt;td style="text-align: left"&gt;An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2017-7494&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2017-8464&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows local users or remote attackers to execute arbitrary code via a crafted .LNK file, which is not properly handled during icon display in Windows Explorer or any other application that parses the icon of the shortcut. aka &amp;ldquo;LNK Remote Code Execution Vulnerability.&amp;rdquo;&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2017-9791&lt;/td&gt;
 &lt;td style="text-align: left"&gt;The Struts 1 plugin in Apache Struts 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2018-4407&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Apple iOS 11 and earlier, Apple macOS High Sierra, up to and including 10.13.6, Apple macOS Sierra, up to and including 10.12.6, Apple OS X El Capitan and earlier. A heap buffer overflow is allowed in Apple&amp;rsquo;s XNU operating system kernel.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2018-7600&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2018-10562&lt;/td&gt;
 &lt;td style="text-align: left"&gt;An issue was discovered on Dasan GPON home routers. Command Injection can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it&amp;rsquo;s quite simple to execute commands and retrieve their output.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;MS17_010&lt;/td&gt;
 &lt;td style="text-align: left"&gt;&lt;a href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2017/ms17-010"&gt;https://docs.microsoft.com/en-us/security-updates/securitybulletins/2017/ms17-010&lt;/a&gt;&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;NETCORE_NETDIS_UDP-53413-BACKDOOR&lt;/td&gt;
 &lt;td style="text-align: left"&gt;&lt;a href="http://blog.trendmicro.com/trendlabs-security-intelligence/netis-routers-leave-wide-open-backdoor/"&gt;http://blog.trendmicro.com/trendlabs-security-intelligence/netis-routers-leave-wide-open-backdoor/&lt;/a&gt;&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;</description></item><item><title>libc-database</title><link>https://rainmana.github.io/hackyfeed/tools/niklasb-libc-database/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/niklasb-libc-database/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; libc-database is a tool for building and querying a database of libc offsets, primarily used for security research and exploitation analysis. It offers features such as identifying libraries via hashes, downloading and extracting libc libraries, and a web interface for user interaction. Users can also add custom libc versions and retrieve relevant offsets for specific symbols, enhancing their ability to work with different environments in cybersecurity applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="web-interface"&gt;Web interface&lt;/h2&gt;
&lt;p&gt;libc-database now has a web service and frontend. Visit &lt;a href="https://libc.rip/"&gt;https://libc.rip/&lt;/a&gt; to
try it out! Read &lt;a href="https://github.com/niklasb/libc-database/tree/master/searchengine"&gt;https://github.com/niklasb/libc-database/tree/master/searchengine&lt;/a&gt;
if you are interested in the API.&lt;/p&gt;</description></item><item><title>ligolo-ng</title><link>https://rainmana.github.io/hackyfeed/tools/nicocha30-ligolo-ng/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nicocha30-ligolo-ng/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ligolo-ng is an advanced tunneling tool that establishes connections through a TUN interface, enabling penetration testers to create reverse TCP/TLS tunnels without the need for SOCKS proxies. Notable features include a user-friendly web interface, automatic configuration for certificates, support for multiple platforms, and resilience to network issues with automatic tunnel recovery. Its design facilitates streamlined network management and the ability to run tools directly over these tunnels.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="ligolo-ng--tunneling-like-a-vpn"&gt;Ligolo-ng : Tunneling like a VPN&lt;/h1&gt;
&lt;p&gt;&lt;img src="doc/logo.png" alt="Ligolo Logo"&gt;&lt;/p&gt;</description></item><item><title>like-dbg</title><link>https://rainmana.github.io/hackyfeed/tools/0xricksanchez-like-dbg/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xricksanchez-like-dbg/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; LIKE-DBG is a tool designed to simplify the setup of a Linux kernel debugging environment by automating essential steps such as kernel building, root file system creation, and kernel launching within Docker containers. It offers a highly customizable configuration approach and supports multiple architectures, enabling researchers in kernel exploitation to focus on their work rather than the complexities of environment setup. Notable features include a dedicated Docker setup for each phase, support for various compilation methods, and integrated code quality measures.&lt;/p&gt;</description></item><item><title>linux-exploit-suggester</title><link>https://rainmana.github.io/hackyfeed/tools/the-z-labs-linux-exploit-suggester/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/the-z-labs-linux-exploit-suggester/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Linux Exploit Suggester (LES) is a tool for auditing Linux systems to identify potential privilege escalation vulnerabilities, assessing the system&amp;rsquo;s exposure to known exploits by utilizing heuristic methods. It calculates the likelihood of exploitation for each vulnerability and verifies kernel hardening configurations, offering a comprehensive analysis of both compile-time and run-time security settings. Notable features include detailed exploit documentation, exposure assessment ratings, and integration with kernel hardening verification, making it a valuable resource for security assessments on Linux-based environments.&lt;/p&gt;</description></item><item><title>linux-kernel-exploitation</title><link>https://rainmana.github.io/hackyfeed/tools/xairy-linux-kernel-exploitation/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/xairy-linux-kernel-exploitation/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Linux Kernel Exploitation repository serves as a curated collection of resources pertaining to Linux kernel security and exploitation techniques. It provides extensive links to books, methodologies, tools for fuzzing, and training exercises, making it a comprehensive reference for security researchers and practitioners interested in kernel vulnerabilities and exploitation strategies. Notable features include regular updates, categorized content on various exploitation techniques, and a community-driven approach encouraging contributions via pull requests.&lt;/p&gt;</description></item><item><title>linux-kernel-exploits</title><link>https://rainmana.github.io/hackyfeed/tools/secwiki-linux-kernel-exploits/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/secwiki-linux-kernel-exploits/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The linux-kernel-exploits repository provides a catalog of various known vulnerabilities within the Linux kernel, detailing specific CVEs along with their descriptions and affected kernel versions. Its primary use case is to aid security researchers and penetration testers in identifying and exploiting kernel vulnerabilities for testing and mitigation purposes. Notable features include a comprehensive list of CVEs organized by year, along with linked folders containing additional exploit details.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="linux-kernel-exploits"&gt;linux-kernel-exploits&lt;/h1&gt;
&lt;h3 id="简介"&gt;简介&lt;/h3&gt;
&lt;p&gt;linux-kernel-exploits&lt;/p&gt;</description></item><item><title>linWinPwn</title><link>https://rainmana.github.io/hackyfeed/tools/lefayjey-linwinpwn/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lefayjey-linwinpwn/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; linWinPwn is a comprehensive bash script designed for Active Directory penetration testing on Linux, integrating various tools for enumeration, vulnerability checks, modifications, and password dumping. It features both an interactive mode for manual checks and an automated mode for streamlined enumeration, allowing users to perform a wide array of security assessments including LDAP, Kerberos, and MSSQL interactions. Notably, it supports a range of authentication methods and can execute critical checks for known vulnerabilities such as NoPac and ZeroLogon, making it an essential tool for security professionals.&lt;/p&gt;</description></item><item><title>lisa.py</title><link>https://rainmana.github.io/hackyfeed/tools/ant4g0nist-lisa.py/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ant4g0nist-lisa.py/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; lisa.py is a Model-Context Protocol (MCP) integration for LLDB, enabling AI assistants like Claude to interact with debugging sessions through a structured interface. It consists of a server component to handle communication and a plugin for LLDB that exposes debugging functionalities via JSON-RPC, allowing users to execute commands verbally and enhance the debugging experience with natural language processing. Notable features include the capability to create targets, manage breakpoints, control process execution, and evaluate expressions directly from the AI assistant.&lt;/p&gt;</description></item><item><title>lonkero</title><link>https://rainmana.github.io/hackyfeed/tools/bountyyfi-lonkero/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bountyyfi-lonkero/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Lonkero is a professional-grade web security scanner engineered for advanced penetration testing, boasting over 125 sophisticated scanning modules written in Rust. Its notable features include an intelligent mode for context-aware scanning, machine learning capabilities to minimize false positives to 5%, and unique proof-based XSS detection that eliminates reliance on browsers, significantly increasing scan speed and accuracy. By leveraging a robust architecture that focuses on real vulnerabilities, Lonkero delivers efficient and precise security assessments for modern web technologies.&lt;/p&gt;</description></item><item><title>lunasec</title><link>https://rainmana.github.io/hackyfeed/tools/lunasec-io-lunasec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lunasec-io-lunasec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; LunaTrace is an open-source supply chain security and auditing tool that monitors software dependencies for vulnerabilities, integrating seamlessly with GitHub to notify users of new CVEs before deployment. It offers both a free SaaS option and self-hosted deployment capabilities, making it a versatile alternative to commercial tools like GitHub Dependabot and Snyk. Notable features include automatic monitoring, GitHub Pull Request integration, and active development support.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;!--
 ~ Copyright by LunaSec (owned by Refinery Labs, Inc)
 ~
 ~ Licensed under the Creative Commons Attribution-ShareAlike 4.0 International
 ~ (the "License"); you may not use this file except in compliance with the
 ~ License. You may obtain a copy of the License at
 ~
 ~ https://creativecommons.org/licenses/by-sa/4.0/legalcode
 ~
 ~ See the License for the specific language governing permissions and
 ~ limitations under the License.
 ~
--&gt;
&lt;p align="center"&gt;
 &lt;img src='docs/static/img/logo-black-text.svg' width='60%'&gt;
&lt;/p&gt;</description></item><item><title>lynis</title><link>https://rainmana.github.io/hackyfeed/tools/cisofy-lynis/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cisofy-lynis/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Lynis is a security auditing and hardening tool designed for UNIX-based systems, including Linux, macOS, and BSD. It conducts comprehensive security scans to evaluate system defenses, identify vulnerabilities, and suggest improvements for hardening systems against potential threats. Notable features include automated compliance testing, vulnerability detection, configuration management assistance, and adaptability for use by system administrators, auditors, and penetration testers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://linuxsecurity.expert/tools/lynis/"&gt;&lt;img src="https://badges.linuxsecurity.expert/tools/ranking/lynis.svg" alt="Linux Security Expert badge"&gt;&lt;/a&gt;
&lt;a href="https://travis-ci.org/CISOfy/lynis"&gt;&lt;img src="https://travis-ci.org/CISOfy/lynis.svg?branch=master" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://bestpractices.coreinfrastructure.org/projects/96"&gt;&lt;img src="https://bestpractices.coreinfrastructure.org/projects/96/badge" alt="CII Best Practices"&gt;&lt;/a&gt;
&lt;a href="https://cisofy.com/documentation/lynis/"&gt;Documentation&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Do you like this software? &lt;strong&gt;Star the project&lt;/strong&gt; and become a &lt;a href="https://github.com/CISOfy/lynis/stargazers"&gt;stargazer&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>malwoverview</title><link>https://rainmana.github.io/hackyfeed/tools/alexandreborges-malwoverview/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/alexandreborges-malwoverview/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Malwoverview is a versatile malware analysis tool designed for cybersecurity professionals to visualize and understand malware architecture without submitting samples to external endpoints, thereby ensuring compliance with Non-Disclosure Agreements. Its primary use case involves generating detailed reports on malware characteristics, and it offers a variety of analysis features, including dynamic and static analysis capabilities, and an intuitive user interface for enhanced usability. The tool is free and open-source, allowing users to modify and redistribute it under the GNU General Public License.&lt;/p&gt;</description></item><item><title>mantis</title><link>https://rainmana.github.io/hackyfeed/tools/phonepe-mantis/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/phonepe-mantis/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Mantis is a command-line framework that automates the processes of asset discovery, reconnaissance, and scanning for vulnerabilities. It efficiently identifies subdomains, certificates, and active assets, culminating in comprehensive scans for misconfigurations and secrets using a combination of open-source and custom tools. Notable features include distributed scanning capabilities, customizable scans, a dashboard for vulnerability management, and integration with various DNS services.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;img src="./images/mantis.png" align="middle"&gt;
&lt;p align="center"&gt;
 &lt;a href="#features-rocket"&gt;Features&lt;/a&gt; •
 &lt;a href="#modules-"&gt;Modules&lt;/a&gt; •
 &lt;a href="#installation-%EF%B8%8F"&gt;Installation&lt;/a&gt; •
 &lt;a href="#command-line-options-%EF%B8%8F"&gt;Command Line Options&lt;/a&gt; •
 &lt;a href="https://phonepe.github.io/mantis/"&gt;Documentation&lt;/a&gt; •
 &lt;a href="#contributors"&gt;Contributors&lt;/a&gt; •
 &lt;a href="https://discord.gg/uJV8Y3uSGu"&gt;Join Discord&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes</title><link>https://rainmana.github.io/hackyfeed/tools/xalgord-massive-web-application-penetration-testing-bug-bounty-notes/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/xalgord-massive-web-application-penetration-testing-bug-bounty-notes/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Massive Web Application Penetration Testing Bug Bounty Notes repository provides a comprehensive guide tailored for both novice and advanced penetration testers, emphasizing methodologies for web application security assessments. It covers essential topics such as setting up testing environments, identifying and exploiting the OWASP Top 10 vulnerabilities, and practical resources like video tutorials for enhanced learning. Notable features include a structured approach to various testing phases, from foundational concepts to specific attack vectors related to session management, authentication, and business logic vulnerabilities.&lt;/p&gt;</description></item><item><title>metarget</title><link>https://rainmana.github.io/hackyfeed/tools/metarget-metarget/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/metarget-metarget/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Metarget is a framework designed to automatically deploy vulnerable cloud-native infrastructures for security research purposes. It allows users to swiftly instantiate environments with known vulnerabilities (e.g., Docker and Kubernetes exploits) using simple command-line instructions, thus minimizing setup time for ethical hacking and testing scenarios. Notable features include the ability to &amp;ldquo;install&amp;rdquo; vulnerabilities like software packages, enabling researchers to quickly create multilayer vulnerable scenes for comprehensive testing and learning.&lt;/p&gt;</description></item><item><title>mimipenguin</title><link>https://rainmana.github.io/hackyfeed/tools/huntergregal-mimipenguin/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/huntergregal-mimipenguin/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; MimiPenguin is a Linux tool designed to extract cleartext login passwords from the currently logged-in desktop user by dumping process memory. It utilizes a probability-based method to identify possible passwords by cross-referencing hashes from the /etc/shadow file and performing regex searches. Notably, version 2.0 features a C implementation aimed at enhancing speed and portability, while it maintains support for various desktop environments and authentication types including Gnome Keyring and LightDM.&lt;/p&gt;</description></item><item><title>moonwalk</title><link>https://rainmana.github.io/hackyfeed/tools/mufeedvh-moonwalk/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mufeedvh-moonwalk/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Moonwalk is a lightweight tool designed for penetration testing on Unix systems, enabling users to erase their traces during exploitation by restoring system logs and filesystem timestamps to their previous state. Key features include a fast execution time of under 5 milliseconds, the ability to save and revert user shell history, and a world-writable path for session logging, ensuring that no evidence of the testing remains.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
 &lt;h1&gt;&lt;code&gt;moonwalk&lt;/code&gt;&lt;/h1&gt; 
 &lt;p&gt;&lt;strong&gt;&lt;em&gt;Cover your tracks during Linux Exploitation / Penetration Testing by leaving zero traces on system logs and filesystem timestamps.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>mssqlproxy</title><link>https://rainmana.github.io/hackyfeed/tools/blackarrowsec-mssqlproxy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/blackarrowsec-mssqlproxy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; mssqlproxy is a lateral movement tool designed to facilitate access through a compromised Microsoft SQL Server by utilizing socket reuse. It operates with sysadmin privileges and comprises a CLR assembly, a core DLL, and a client, allowing users to install and manage proxy services for connecting to external systems. Notable features include remote DLL management, commands for file transfer, and options for configuring local listening ports, although it currently supports only IPv4 connections.&lt;/p&gt;</description></item><item><title>Nettacker</title><link>https://rainmana.github.io/hackyfeed/tools/owasp-nettacker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/owasp-nettacker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OWASP Nettacker is an automated penetration testing and information-gathering framework designed for cybersecurity professionals to conduct reconnaissance, vulnerability assessments, and network security audits. Key features include a modular architecture for customizable task execution, support for multi-protocol and multithreaded scanning, comprehensive output formats, and a user-friendly interface for managing scans, all of which enhance its efficacy in identifying weaknesses across diverse systems and applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="owasp-nettacker"&gt;OWASP Nettacker&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/OWASP/Nettacker/actions/workflows/ci_cd.yml/badge.svg?branch=master"&gt;&lt;img src="https://github.com/OWASP/Nettacker/actions/workflows/ci_cd.yml/badge.svg?branch=master" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://github.com/OWASP/Nettacker/blob/master/LICENSE"&gt;&lt;img src="https://img.shields.io/badge/License-Apache%20v2-green.svg" alt="Apache License"&gt;&lt;/a&gt;
&lt;a href="https://twitter.com/iotscan"&gt;&lt;img src="https://img.shields.io/badge/Twitter-@iotscan-blue.svg" alt="Twitter"&gt;&lt;/a&gt;
&lt;img src="https://img.shields.io/github/contributors/OWASP/Nettacker" alt="GitHub contributors"&gt;
&lt;a href="https://nettacker.readthedocs.io/en/latest/?badge=latest"&gt;&lt;img src="https://readthedocs.org/projects/nettacker/badge/?version=latest" alt="Documentation Status"&gt;&lt;/a&gt;
&lt;a href="https://github.com/OWASP/Nettacker"&gt;&lt;img src="https://img.shields.io/github/repo-size/OWASP/Nettacker" alt="repo size "&gt;&lt;/a&gt;
&lt;a href="https://hub.docker.com/r/owasp/nettacker"&gt;&lt;img src="https://img.shields.io/docker/pulls/owasp/nettacker" alt="Docker Pulls"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Nginx-Lua-Anti-DDoS</title><link>https://rainmana.github.io/hackyfeed/tools/c0nw0nk-nginx-lua-anti-ddos/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/c0nw0nk-nginx-lua-anti-ddos/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Nginx-Lua-Anti-DDoS is a protective tool designed for Nginx web servers, leveraging Lua scripting to mitigate DDoS attacks through a JavaScript-based authentication puzzle inspired by Cloudflare&amp;rsquo;s &amp;ldquo;I&amp;rsquo;m Under Attack&amp;rdquo; mode. The tool features automatic detection and activation of protection mechanisms against various attack types, extensive IP and User-Agent filtering options, as well as capabilities to inspect and block malicious HTTP requests. With no limitation on attack size and built-in logging for monitoring, it offers customizable error responses and caching optimizations to enhance web server performance during attacks.&lt;/p&gt;</description></item><item><title>nocom-explanation</title><link>https://rainmana.github.io/hackyfeed/tools/nerdsinspace-nocom-explanation/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nerdsinspace-nocom-explanation/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; No Comment is a tool designed for analyzing and visualizing gameplay data, specifically focusing on tracking player movements and in-game events within the Minecraft server 2b2t. Its primary use case is to create detailed heatmaps and monitor activity trends, enabling users to comprehend the dynamics of player interactions and exploit occurrences. Notable features include high-resolution visual outputs of player activities and integration with community resources for enhanced data representation.&lt;/p&gt;</description></item><item><title>NoSQLMap</title><link>https://rainmana.github.io/hackyfeed/tools/codingo-nosqlmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/codingo-nosqlmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; NoSQLMap is a Python tool designed for auditing and automating injection attacks on NoSQL databases, primarily targeting MongoDB and CouchDB, while also preparing for support of others like Redis and Cassandra. It helps identify and exploit default configuration vulnerabilities to disclose or replicate database data through a user-friendly menu-based interface. Key features include options for NoSQL DB access attacks, web application attacks, and scanning for anonymous MongoDB access.&lt;/p&gt;</description></item><item><title>npq</title><link>https://rainmana.github.io/hackyfeed/tools/lirantal-npq/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lirantal-npq/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; npq is a tool designed to audit npm packages prior to installation, enhancing security during the package management process. It performs multiple checks, including vulnerability assessments using the Snyk database, package age, popularity metrics, and the presence of essential documentation files. Notable features include an auto-continue mode after warnings and customizable settings for strict security reviews.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;npq allows you to audit npm packages &lt;em&gt;before&lt;/em&gt; you install them&lt;/p&gt;</description></item><item><title>nuclei-wordfence-cve</title><link>https://rainmana.github.io/hackyfeed/tools/topscoder-nuclei-wordfence-cve/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/topscoder-nuclei-wordfence-cve/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Nuclei + Wordfence CVE project provides a comprehensive set of 71,889 Nuclei templates specifically designed for assessing security vulnerabilities in WordPress, including core, plugins, and themes. Notably, the templates are regularly updated to reflect the latest threats identified by Wordfence, offering users a robust tool for proactive site protection and vulnerability identification. This open-source solution allows for customization, giving users the flexibility to adapt templates to meet specific security needs.&lt;/p&gt;</description></item><item><title>one_gadget</title><link>https://rainmana.github.io/hackyfeed/tools/david942j-one_gadget/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/david942j-one_gadget/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OneGadget is a Ruby gem designed for locating one-gadget RCE exploits within libc binaries, simplifying the process for participants in Capture The Flag (CTF) challenges. It leverages symbolic execution to efficiently identify gadgets that result in the execution of &lt;code&gt;/bin/sh&lt;/code&gt;, supports multiple architectures (i386, amd64, aarch64), and offers a command-line interface for user-friendly interaction with customizable output options.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://rubygems.org/gems/one_gadget"&gt;&lt;img src="https://img.shields.io/endpoint?url=https://gem-badge-h3lg.onrender.com/downloads/one_gadget" alt="Downloads"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://badge.fury.io/rb/one_gadget"&gt;&lt;img src="https://badge.fury.io/rb/one_gadget.svg" alt="Gem Version"&gt;&lt;/a&gt;
&lt;a href="https://github.com/david942j/one_gadget/actions"&gt;&lt;img src="https://github.com/david942j/one_gadget/workflows/build/badge.svg" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://qlty.sh/gh/david942j/projects/one_gadget"&gt;&lt;img src="https://qlty.sh/gh/david942j/projects/one_gadget/maintainability.svg" alt="Maintainability"&gt;&lt;/a&gt;
&lt;a href="https://qlty.sh/gh/david942j/projects/one_gadget"&gt;&lt;img src="https://qlty.sh/gh/david942j/projects/one_gadget/coverage.svg" alt="Code Coverage"&gt;&lt;/a&gt;
&lt;a href="https://inch-ci.org/github/david942j/one_gadget"&gt;&lt;img src="https://inch-ci.org/github/david942j/one_gadget.svg?branch=master" alt="Inline docs"&gt;&lt;/a&gt;
&lt;a href="https://www.rubydoc.info/github/david942j/one_gadget/"&gt;&lt;img src="http://img.shields.io/badge/yard-docs-blue.svg" alt="Yard Docs"&gt;&lt;/a&gt;
&lt;a href="http://choosealicense.com/licenses/mit/"&gt;&lt;img src="https://img.shields.io/badge/license-MIT-blue.svg" alt="MIT License"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 id="onegadget"&gt;OneGadget&lt;/h2&gt;
&lt;p&gt;When playing ctf pwn challenges we usually need the one-gadget RCE (remote code execution),
which leads to call &lt;code&gt;execve('/bin/sh', NULL, NULL)&lt;/code&gt;.&lt;/p&gt;</description></item><item><title>Open-Source-Security-Guide</title><link>https://rainmana.github.io/hackyfeed/tools/mikeroyal-open-source-security-guide/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mikeroyal-open-source-security-guide/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Open Source Security Guide serves as a comprehensive resource for enhancing the security of systems and networks by providing tutorials, standards, and tools relevant to open-source security practices. It includes sections on security certifications, threat models, and various security frameworks, along with a curated list of tools and resources to improve security operations. Notably, it aims to foster a collaborative environment for sharing best practices and advancing security through community initiatives.&lt;/p&gt;</description></item><item><title>opencve</title><link>https://rainmana.github.io/hackyfeed/tools/opencve-opencve/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/opencve-opencve/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OpenCVE is a Vulnerability Intelligence Platform designed to efficiently monitor and manage Common Vulnerabilities and Exposures (CVEs). It provides features such as aggregation from multiple sources, customizable filtering, alert subscriptions, and collaboration tools for tracking CVE progress within teams. Notable functionalities include AI-driven enrichment, customizable dashboards, and detailed reporting capabilities to streamline vulnerability management processes.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img alt="OpenCVE" src="https://raw.githubusercontent.com/opencve/opencve/v2/logo.png" width="400px;"&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
 &lt;a href="https://github.com/opencve/opencve/actions?query=workflow%3ATests"&gt;
 &lt;img alt="Tests" src="https://github.com/opencve/opencve/actions/workflows/tests.yml/badge.svg?branch=master"&gt;
 &lt;/a&gt;
 &lt;a href="https://www.python.org/"&gt;
 &lt;img alt="Python versions" src="https://img.shields.io/badge/python-3.10%2B-blue.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/python/black"&gt;
 &lt;img alt="Code style: black" src="https://img.shields.io/badge/code%20style-black-000000.svg"&gt;
 &lt;/a&gt;
&lt;/p&gt;
&lt;h2 id="what-is-opencve"&gt;What is OpenCVE?&lt;/h2&gt;
&lt;p&gt;OpenCVE is a Vulnerability Intelligence Platform that helps you monitor and manage CVEs efficiently.&lt;/p&gt;</description></item><item><title>OSCP</title><link>https://rainmana.github.io/hackyfeed/tools/ihack4falafel-oscp/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ihack4falafel-oscp/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The OSCP repository contains a collection of scripts and tools designed to assist in penetration testing and privilege escalation, particularly for the OSCP exam. Notable features include custom scripts for Linux privilege checks, port knocking, cron job analysis, and a comprehensive Windows privilege escalation check, along with a SQL injection cheatsheet for manual exploitation techniques. This repository is aimed at providing streamlined and efficient tools for security practitioners during their testing processes.&lt;/p&gt;</description></item><item><title>ossa</title><link>https://rainmana.github.io/hackyfeed/tools/bloodzer0-ossa/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bloodzer0-ossa/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ossa is an open-source security architecture tool designed to assist small to medium-sized enterprises in implementing security measures through accessible tools and resources. Its primary use case is to guide users in the installation and practical application of various security tools to address common vulnerabilities and improve overall security posture. Notable features include a focus on application security fundamentals, intrusion detection, and detailed documentation on tool usage, aimed at enhancing security for organizations lacking dedicated security personnel.&lt;/p&gt;</description></item><item><title>osv-scanner</title><link>https://rainmana.github.io/hackyfeed/tools/google-osv-scanner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/google-osv-scanner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OSV-Scanner is a tool designed to identify vulnerabilities in project dependencies by leveraging the OSV database through a user-friendly CLI interface. It supports a diverse range of programming languages, package managers, and includes features such as vulnerability detection in container images and guided remediation recommendations based on various criteria. The tool&amp;rsquo;s extensibility and comprehensive data sourcing improve the accuracy and effectiveness of vulnerability notifications for developers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;picture&gt;
 &lt;source srcset="https://rainmana.github.io/hackyfeed/docs/images/osv-scanner-full-logo-darkmode.svg" media="(prefers-color-scheme: dark)"&gt;
 &lt;!-- markdown-link-check-disable-next-line --&gt;
 &lt;img src="https://rainmana.github.io/hackyfeed/docs/images/osv-scanner-full-logo-lightmode.svg"&gt;
&lt;/picture&gt;
&lt;hr&gt;
&lt;p&gt;&lt;a href="https://scorecard.dev/viewer/?uri=github.com/google/osv-scanner"&gt;&lt;img src="https://api.securityscorecards.dev/projects/github.com/google/osv-scanner/badge" alt="OpenSSF Scorecard"&gt;&lt;/a&gt;
&lt;a href="https://goreportcard.com/report/github.com/google/osv-scanner"&gt;&lt;img src="https://goreportcard.com/badge/github.com/google/osv-scanner" alt="Go Report Card"&gt;&lt;/a&gt;
&lt;a href="https://codecov.io/gh/google/osv-scanner"&gt;&lt;img src="https://codecov.io/gh/google/osv-scanner/graph/badge.svg?token=C8IDVX9LP5" alt="codecov"&gt;&lt;/a&gt;
&lt;a href="https://slsa.dev"&gt;&lt;img src="https://slsa.dev/images/gh-badge-level3.svg" alt="SLSA 3"&gt;&lt;/a&gt;
&lt;a href="https://github.com/google/osv-scanner/releases"&gt;&lt;img src="https://img.shields.io/github/v/release/google/osv-scanner" alt="GitHub Release"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>osv.dev</title><link>https://rainmana.github.io/hackyfeed/tools/google-osv.dev/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/google-osv.dev/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The OSV.dev tool provides a platform for scanning software dependencies against a comprehensive database of known vulnerabilities. It features a Go-based scanner capable of analyzing various types of lockfiles, Docker containers, SBOMs, and git repositories, while enabling users to access a web UI and APIs for data integration and management. Notably, it includes tools for vulnerability data publishing, bisection, impact analysis, and leverages Google Cloud Platform for deployment and scalability.&lt;/p&gt;</description></item><item><title>OWASP-Web-Checklist</title><link>https://rainmana.github.io/hackyfeed/tools/0xradi-owasp-web-checklist/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xradi-owasp-web-checklist/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The OWASP Web Application Security Testing Checklist tool provides a comprehensive framework for evaluating the security posture of web applications through a series of structured assessments. Designed for security professionals, it covers multiple areas including information gathering, authentication, session management, and secure transmission, ensuring that all critical aspects of web application security are systematically addressed. Notable features include a user-friendly format available in both PDF and Docx, as well as a Trello board for effective task management and tracking.&lt;/p&gt;</description></item><item><title>Penetration_Testing_POC</title><link>https://rainmana.github.io/hackyfeed/tools/mr-xn-penetration_testing_poc/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mr-xn-penetration_testing_poc/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Penetration_Testing_POC is a comprehensive collection of proof of concepts (POCs), scripts, tools, and articles related to penetration testing, intended to serve as a reference resource. It systematically categorizes vulnerabilities across various domains such as IoT, mobile devices, web applications, and privilege escalation methods, providing users with essential insights and practical exploitation techniques. Notable features include organized documentation and links to external resources, ensuring that users can easily navigate and leverage the provided information for security assessments.&lt;/p&gt;</description></item><item><title>penetration-testing-cheat-sheet</title><link>https://rainmana.github.io/hackyfeed/tools/ivan-sincek-penetration-testing-cheat-sheet/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ivan-sincek-penetration-testing-cheat-sheet/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Penetration Testing Cheat Sheet is a comprehensive checklist designed to assist cybersecurity professionals in performing penetration testing tasks. It aggregates various tools and techniques for phases such as reconnaissance, scanning, and vulnerability exploitation, while emphasizing the importance of complementarity among tools for better results. Noteworthy features include automation of certain tasks and links to crucial resources for penetration testing methodologies.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="penetration-testing-cheat-sheet"&gt;Penetration Testing Cheat Sheet&lt;/h1&gt;
&lt;p&gt;This is more of a checklist for myself. May contain useful tips and tricks.&lt;/p&gt;</description></item><item><title>Penetration-Testing-Tools</title><link>https://rainmana.github.io/hackyfeed/tools/mgeeky-penetration-testing-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mgeeky-penetration-testing-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Penetration Testing Tools repository is a comprehensive collection of over 160 scripts, utilities, and cheatsheets designed for Penetration Testing and IT security audits. It encompasses a wide range of categories including cloud assessments, network protocols, web security, and red teaming, enabling practitioners to increase efficiency and improve technical assurance in their engagements. Notable features include modular organization by function, a focus on real-world applicability, and the absence of sensitive client-specific information.&lt;/p&gt;</description></item><item><title>PentestTools</title><link>https://rainmana.github.io/hackyfeed/tools/arch3rpro-pentesttools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/arch3rpro-pentesttools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pentest Tools is a comprehensive catalog of penetration testing resources, referencing tools primarily from Kali Linux, and featuring both open-source and readily accessible software. It includes a wide array of categories such as information gathering, vulnerability analysis, and exploitation tools, aimed at facilitating various aspects of security assessments. Notable features include a curated list of essential tools, categorized functionalities, and a long-term commitment to updates and supplementary resources.&lt;/p&gt;</description></item><item><title>PhoneSploit</title><link>https://rainmana.github.io/hackyfeed/tools/prbhtkumr-phonesploit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/prbhtkumr-phonesploit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PhoneSploit is a Python3 tool designed for remote exploitation through ADB (Android Debug Bridge), enabling users to perform a variety of actions on victim devices. Its notable features include the ability to access the device shell, capture screenshots and screen recordings, uninstall applications, and obtain system information in real time, along with file management capabilities such as pulling folders and sending files. The framework serves primarily as a penetration testing tool for assessing the security of Android devices, but it contains mandatory ethical usage disclaimers.&lt;/p&gt;</description></item><item><title>PhoneSploit-Pro</title><link>https://rainmana.github.io/hackyfeed/tools/azeemidrisi-phonesploit-pro/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/azeemidrisi-phonesploit-pro/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PhoneSploit Pro is an advanced Python-based tool designed for penetration testing and exploiting Android devices remotely through the Android Debug Bridge (ADB) and Metasploit Framework integration. It automates the process of creating, installing, and launching payloads to gain a Meterpreter session in a single click, along with extensive ADB functionalities for managing connected devices, such as file transfers, device control, and data extraction. Notable features include remote screen recording, SMS management, and capabilities for controlling device operations, making it a comprehensive toolkit for security assessments on Android platforms.&lt;/p&gt;</description></item><item><title>PHP-Antimalware-Scanner</title><link>https://rainmana.github.io/hackyfeed/tools/marcocesarato-php-antimalware-scanner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/marcocesarato-php-antimalware-scanner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PHP Antimalware Scanner is a PHP-based tool designed to scan projects for malicious code embedded within PHP files. Its primary use case is to detect potential malware through an interactive console interface or in a reporting mode that generates results in HTML or text. Notable features include customizable scanning options for file paths, action prompts upon detection of malware, and compatibility with various PHP configurations.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
&lt;p&gt;&lt;img src="images/logo.png" alt="Version"&gt;&lt;/p&gt;
&lt;h1 align="center"&gt;PHP Antimalware Scanner&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://img.shields.io/badge/version-0.15.1-brightgreen?style=for-the-badge" alt="Version"&gt;
&lt;img src="https://img.shields.io/badge/php-%3E%3D%207.4-4F5D95?style=for-the-badge" alt="Requirements"&gt;
&lt;img src="https://img.shields.io/badge/code%20style-PSR-blue?style=for-the-badge" alt="Code Style"&gt;
&lt;img src="https://img.shields.io/github/license/marcocesarato/PHP-Antimalware-Scanner?style=for-the-badge" alt="License"&gt;
&lt;a href="https://github.com/marcocesarato/PHP-Antimalware-Scanner"&gt;&lt;img src="https://img.shields.io/badge/GitHub-Repo-6f42c1?style=for-the-badge" alt="GitHub"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>phpsploit</title><link>https://rainmana.github.io/hackyfeed/tools/nil0x42-phpsploit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nil0x42-phpsploit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PhpSploit is a full-featured Command and Control (C2) framework that maintains a persistent presence on web servers using a polymorphic PHP one-liner. Its primary use case is for penetration testing and exploitation, enabling users to execute commands, manage files remotely, interact with a SQL console, and escalate privileges through over 20 available plugins. Notable features include obfuscated communication via HTTP headers and seamless file upload/download capabilities, facilitating robust interactions with target systems while bypassing standard PHP security measures.&lt;/p&gt;</description></item><item><title>PoC</title><link>https://rainmana.github.io/hackyfeed/tools/thezdi-poc/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/thezdi-poc/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Proofs-of-concept&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Proofs-of-concept&lt;/p&gt;</description></item><item><title>POC-T</title><link>https://rainmana.github.io/hackyfeed/tools/xyntax-poc-t/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/xyntax-poc-t/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; POC-T (Pentest Over Concurrent Toolkit) is a versatile framework designed for penetration testing that facilitates concurrent tasks such as data collection, web crawling, brute-force attacks, and bulk PoC management. Its notable features include support for both multithreading and Gevent concurrency modes, simplified script writing without extensive documentation, built-in script extensions, and integration with popular search engine APIs like ZoomEye, Shodan, and Google.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="poc-t-pentest-over-concurrent-toolkit"&gt;POC-T: &lt;em&gt;Pentest Over Concurrent Toolkit&lt;/em&gt;&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://www.python.org/"&gt;&lt;img src="https://img.shields.io/badge/python-2.7-yellow.svg" alt="Python 2.7"&gt;&lt;/a&gt; &lt;a href="https://raw.githubusercontent.com/Xyntax/POC-T/master/doc/LICENSE.txt"&gt;&lt;img src="https://img.shields.io/badge/license-GPLv2-red.svg" alt="License"&gt;&lt;/a&gt; &lt;a href="https://www.codacy.com/app/xyntax/POC-T?utm_source=github.com&amp;amp;utm_medium=referral&amp;amp;utm_content=Xyntax/POC-T&amp;amp;utm_campaign=Badge_Grade"&gt;&lt;img src="https://api.codacy.com/project/badge/Grade/1413552d34bc4a4aa84539db1780eb56" alt="Codacy Badge"&gt;&lt;/a&gt; &lt;a href="https://github.com/Xyntax/POC-T/wiki/%E5%86%85%E7%BD%AE%E8%84%9A%E6%9C%AC%E5%BA%93"&gt;&lt;img src="https://img.shields.io/badge/PoC/Scripts-52-blue.svg" alt="PoC/Scripts"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>PocOrExp_in_Github</title><link>https://rainmana.github.io/hackyfeed/tools/ycdxsb-pocorexp_in_github/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ycdxsb-pocorexp_in_github/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PocOrExp in Github is a tool designed for aggregating proof of concepts (PoCs) and exploitation scripts (Exp) associated with Common Vulnerabilities and Exposures (CVE) directly from GitHub. Its primary use case is to assist cybersecurity professionals in quickly locating relevant PoCs by year and monitoring updates for existing vulnerabilities. Notable features include year-specific data retrieval, initialization options to avoid processing handled CVEs, and the ability to track changes to PoCs over time.&lt;/p&gt;</description></item><item><title>pocsuite3</title><link>https://rainmana.github.io/hackyfeed/tools/knownsec-pocsuite3/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/knownsec-pocsuite3/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; pocsuite3 is an open-source framework designed for remote vulnerability testing and proof-of-concept (PoC) development, focused on empowering penetration testers and security researchers. Notable features include a versatile PoC engine supporting multiple execution modes, dynamic loading of PoC scripts and targets from various sources, as well as comprehensive integration with tools like Seebug, Shodan, and ZoomEye. The tool also offers robust capabilities such as plugin support, multi-target loading, and HTTP/SOCKS proxy configuration, making it a powerful asset in the security testing arsenal.&lt;/p&gt;</description></item><item><title>Pompem</title><link>https://rainmana.github.io/hackyfeed/tools/rfunix-pompem/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rfunix-pompem/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Find exploit tool&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Find exploit tool&lt;/p&gt;</description></item><item><title>PowerHub</title><link>https://rainmana.github.io/hackyfeed/tools/adrianvollmer-powerhub/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/adrianvollmer-powerhub/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PowerHub is a post-exploitation tool designed for PowerShell, facilitating the transfer of potentially flagged data during penetration testing engagements. Its notable features include being fileless and stateless, utilizing cert pinning and RC4 encryption for string obfuscation, allowing seamless execution of C# programs in memory, and offering multiple methods to bypass AMSI. The tool simplifies processes such as running scripts and transferring sensitive information like Kerberos tickets or passwords, either through command line or a web interface, enhancing collaboration for testing teams.&lt;/p&gt;</description></item><item><title>PrivEsc</title><link>https://rainmana.github.io/hackyfeed/tools/1n3-privesc/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/1n3-privesc/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PrivEsc is a collection of privilege escalation scripts and exploits designed for Windows, Linux, and MySQL environments. Its primary use case is to help security professionals identify and exploit privilege escalation vulnerabilities in various systems. Notable features include compatibility with multiple operating systems and exploitation capabilities tailored for common service vulnerabilities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="privesc-by-1n3crowdshield"&gt;PrivEsc by 1N3@CrowdShield&lt;/h1&gt;
&lt;p&gt;&lt;a href="http://crowdshield.com"&gt;http://crowdshield.com&lt;/a&gt;&lt;/p&gt;
&lt;h2 id="about"&gt;ABOUT:&lt;/h2&gt;
&lt;p&gt;A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.&lt;/p&gt;</description></item><item><title>pwn_jenkins</title><link>https://rainmana.github.io/hackyfeed/tools/gquere-pwn_jenkins/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gquere-pwn_jenkins/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pwn_jenkins is a tool designed for exploiting various remote code execution vulnerabilities within Jenkins instances, specifically targeting misconfigurations and outdated versions. It enables authenticated and unauthenticated access to sensitive files, allows for arbitrary command execution via deserialization exploits, and identifies authentication bypass issues through crafted requests. Notable features include support for multiple CVEs, including CVE-2014-23897 and CVE-2019-1003002, making it a comprehensive toolkit for assessing the security of Jenkins environments.&lt;/p&gt;</description></item><item><title>pwndbg</title><link>https://rainmana.github.io/hackyfeed/tools/pwndbg-pwndbg/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pwndbg-pwndbg/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pwndbg is a Python module designed as a plugin for GDB and LLDB, enhancing the debugging experience for developers working on low-level software, reverse engineering, and exploit development. Its primary use case is to streamline common debugging tasks by providing user-friendly features and a suite of utilities that address the shortcomings of vanilla GDB and LLDB. Notable features include an improved hexdump command, a clean interface for quick navigation, and a range of custom tools to facilitate debugging across different platforms and architectures.&lt;/p&gt;</description></item><item><title>pwninit</title><link>https://rainmana.github.io/hackyfeed/tools/io12-pwninit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/io12-pwninit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; pwninit is a tool designed to automate the setup for binary exploitation challenges by preparing the necessary executables and library files. Key features include the ability to set the challenge binary as executable, download an appropriate linker and debug symbols, patch the binary using patchelf, and generate a customizable pwntools solve script. This streamlines the initial configuration process for security professionals and students engaging in binary exploitation tasks.&lt;/p&gt;</description></item><item><title>pythem</title><link>https://rainmana.github.io/hackyfeed/tools/m4n3dw0lf-pythem/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m4n3dw0lf-pythem/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; pythem is a versatile penetration testing framework written in Python, designed for use by security researchers and professionals to conduct various security assessments within legal boundaries. Notable features include support for attacks such as ARP spoofing, DNS manipulation, brute force attacks on SSH and web forms, as well as tools for exploit development and packet filtering. The framework can be installed on Debian-based Linux distributions, or run as a Docker container, facilitating accessibility and ease of deployment.&lt;/p&gt;</description></item><item><title>Raccoon</title><link>https://rainmana.github.io/hackyfeed/tools/evyatarmeged-raccoon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/evyatarmeged-raccoon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Raccoon is an offensive security tool designed for reconnaissance and information gathering, offering a wide range of features like DNS enumeration, WHOIS lookup, TLS data analysis, port scanning, and directory fuzzing. With support for asynchronous scanning via Python&amp;rsquo;s asyncio and anonymity through Tor/proxies, it provides efficient and robust scanning capabilities while organizing outputs by target and scan type. Additionally, it leverages default wordlists from SecLists for various reconnaissance tasks, enhancing its operational effectiveness.&lt;/p&gt;</description></item><item><title>randar-explanation</title><link>https://rainmana.github.io/hackyfeed/tools/spawnmason-randar-explanation/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/spawnmason-randar-explanation/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Randar is a Minecraft exploit targeting versions Beta 1.8 to 1.12.2 that uses LLL lattice reduction to manipulate the game&amp;rsquo;s random number generator, &lt;code&gt;java.util.Random&lt;/code&gt;, allowing attackers to derive the precise coordinates of other players&amp;rsquo; locations based on item drop positions from mined blocks. The exploit hinges on a vulnerability in the game&amp;rsquo;s code, where improper reuse of RNG instances can be exploited to track players across vast distances, making it particularly significant on anarchic servers like 2b2t, where player anonymity and location security are critical. Notable features include the ability to reverse-engineer the RNG state to pinpoint player coordinates efficiently and the reliance on advanced mathematical techniques to achieve this.&lt;/p&gt;</description></item><item><title>rapidscan</title><link>https://rainmana.github.io/hackyfeed/tools/skavngr-rapidscan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/skavngr-rapidscan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RapidScan is a multifaceted web vulnerability scanner that automates the execution of various security scanning tools to efficiently uncover and assess vulnerabilities in web applications. Notable features include its one-step installation, support for multiple tools like nmap and nikto, the ability to correlate results to reduce false positives, and the provision of detailed vulnerability definitions and remediation strategies. The tool is designed to streamline the penetration testing process, saving valuable time while offering comprehensive reporting and future plans for AI-driven tool deployment based on detected issues.&lt;/p&gt;</description></item><item><title>reconmap</title><link>https://rainmana.github.io/hackyfeed/tools/reconmap-reconmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/reconmap-reconmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Reconmap is an open-source penetration testing management and automation platform that aids security professionals throughout the engagement lifecycle by efficiently planning, executing, and reporting on security assessments. Its notable features include real-time execution and scheduling of security commands, automated output capture, vulnerability tracking, and the generation of professional reports in multiple formats, all aimed at streamlining workflows and enhancing collaboration among InfoSec teams.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div style="text-align: center;"&gt;
&lt;h1&gt;Reconmap&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://bsky.app/profile/netfoe.com"&gt;&lt;img src="https://img.shields.io/badge/dynamic/json?url=https%3A%2F%2Fpublic.api.bsky.app%2Fxrpc%2Fapp.bsky.actor.getProfile%2F%3Factor%3Dnetfoe.com&amp;amp;query=%24.followersCount&amp;amp;style=social&amp;amp;logo=bluesky&amp;amp;label=Follow%20us%20on%20BlueSky&amp;amp;style=flat" alt="Bluesky"&gt;&lt;/a&gt;
&lt;a href="https://www.youtube.com/reconmap"&gt;&lt;img src="https://img.shields.io/youtube/channel/subscribers/UCKJM12YKHqvvATHkdIKopeQ?style=flat&amp;amp;logo=youtube&amp;amp;label=Subscribe%20to%20our%20YouTube%20channel&amp;amp;link=https%3A%2F%2Fwww.youtube.com%2Freconmap" alt="YouTube Channel Subscribers"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>redamon</title><link>https://rainmana.github.io/hackyfeed/tools/samugit83-redamon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/samugit83-redamon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RedAmon is an autonomous AI framework designed for seamless cybersecurity operations that integrate reconnaissance, exploitation, and post-exploitation processes into a streamlined pipeline. It stands out by automatically triaging findings, applying code fixes, and generating pull requests in repositories, ensuring human oversight at critical junctures. Its notable features include support for over 38 security tools, integration with major vulnerability scanners, and configurable autonomy to adapt to various security assessment needs.&lt;/p&gt;</description></item><item><title>reentrancy-attacks</title><link>https://rainmana.github.io/hackyfeed/tools/pcaversaccio-reentrancy-attacks/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pcaversaccio-reentrancy-attacks/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;reentrancy-attacks&amp;rdquo; repository provides a comprehensive historical collection of reentrancy attack incidents on smart contracts. It categorizes various types of attacks, including single-function and cross-chain reentrancy, and includes detailed timelines, victim contracts, and exploit transactions for notable cases. This tool serves as a reference for understanding and analyzing reentrancy vulnerabilities in blockchain applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="-a-historical-collection-of-reentrancy-attacks"&gt;⚔️ A Historical Collection of Reentrancy Attacks&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/pcaversaccio/reentrancy-attacks/actions/workflows/checks.yml"&gt;&lt;img src="https://github.com/pcaversaccio/reentrancy-attacks/actions/workflows/checks.yml/badge.svg" alt="👮‍♂️ Sanity checks"&gt;&lt;/a&gt;
&lt;a href="https://www.gnu.org/licenses/agpl-3.0"&gt;&lt;img src="https://img.shields.io/badge/License-AGPL--3.0--only-blue" alt="License: AGPL-3.0-only"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;📌 Definition of a Reentrancy Attack&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>remote-method-guesser</title><link>https://rainmana.github.io/hackyfeed/tools/qtc-de-remote-method-guesser/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/qtc-de-remote-method-guesser/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &lt;em&gt;remote-method-guesser&lt;/em&gt; (rmg) is a Java RMI vulnerability scanner designed to identify and verify common security vulnerabilities on Java RMI endpoints. It features practical examples, including servers that facilitate testing for standard RMI services, SSRF attacks, and Spring Remoting integration, making it a valuable tool for penetration testers and security researchers. The tool&amp;rsquo;s compatibility with Docker allows for efficient setup and execution of security assessments in isolated environments.&lt;/p&gt;</description></item><item><title>reverse-shell</title><link>https://rainmana.github.io/hackyfeed/tools/lukechilds-reverse-shell/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lukechilds-reverse-shell/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; reverse-shell is a tool that facilitates setting up reverse shells on Unix-like systems, primarily intended for penetration testing and educational purposes. It automatically detects the target&amp;rsquo;s available software to execute the appropriate payload, enabling users to bypass firewalls and gain remote shell access effortlessly. Notable features include ease of use with commands for listening and executing reverse shells, options for reconnecting after disconnection, and the ability to run in the background to avoid detection.&lt;/p&gt;</description></item><item><title>ronin</title><link>https://rainmana.github.io/hackyfeed/tools/ronin-rb-ronin/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ronin-rb-ronin/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ronin is an open-source Ruby toolkit designed for security research and development, featuring a comprehensive suite of CLI commands and libraries tailored for various security tasks such as data encoding/decoding, vulnerability scanning, fuzzing, and reconnaissance. Notable features include a fully-loaded Ruby REPL, a lightweight web UI for database interaction, and the ability to install and run third-party exploits or payloads. This tool is primarily used by security researchers, bug bounty hunters, and developers for efficient data processing and rapid script prototyping.&lt;/p&gt;</description></item><item><title>RootMyTV.github.io</title><link>https://rainmana.github.io/hackyfeed/tools/rootmytv-rootmytv.github.io/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rootmytv-rootmytv.github.io/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RootMyTV is an exploit tool designed for rooting or jailbreaking LG webOS smart TVs, primarily facilitating the installation of the webOS Homebrew Channel with elevated privileges. Notable features include its user-friendly interface and detailed instructions for exploiting unpatched webOS versions, enabling users to run third-party applications on their TVs. However, due to LG&amp;rsquo;s security updates, the tool is unlikely to work on models with firmware released after mid-2022.&lt;/p&gt;</description></item><item><title>ROPgadget</title><link>https://rainmana.github.io/hackyfeed/tools/jonathansalwan-ropgadget/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jonathansalwan-ropgadget/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ROPgadget is a tool designed to facilitate Return-Oriented Programming (ROP) exploitation by allowing users to search for gadgets within binary files. It supports multiple file formats (ELF, PE, Mach-O, Raw) and architectures (x86, x64, ARM, ARM64, MIPS, PowerPC, Sparc, RISC-V 64) and employs the Capstone disassembler for efficient gadget identification. Notable features include customizable search parameters, ROP chain generation, and support for various opcode and string searching capabilities.&lt;/p&gt;</description></item><item><title>scan4all</title><link>https://rainmana.github.io/hackyfeed/tools/ghosttroops-scan4all/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ghosttroops-scan4all/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; scan4all is a versatile cybersecurity tool designed for automated web scanning and vulnerability detection, integrating various tools such as vscan, nuclei, and subfinder. It supports a wide range of protocols for password blasting and includes built-in detection capabilities for over 15,000 proof-of-concept (PoC) exploits. Built on Golang, it is cross-platform, lightweight, customizable, and features intelligent scanning mechanisms that optimize performance while ensuring comprehensive coverage of vulnerabilities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://twitter.com/intent/follow?screen_name=Hktalent3135773"&gt;&lt;img src="https://img.shields.io/twitter/url/http/Hktalent3135773.svg?style=social" alt="Twitter"&gt;&lt;/a&gt; &lt;a href="https://twitter.com/intent/follow?screen_name=Hktalent3135773"&gt;&lt;img src="https://img.shields.io/twitter/follow/Hktalent3135773.svg?style=social&amp;amp;label=Follow" alt="Follow on Twitter"&gt;&lt;/a&gt; &lt;a href="https://github.com/hktalent/"&gt;&lt;img src="https://img.shields.io/github/followers/hktalent.svg?style=social&amp;amp;label=Follow" alt="GitHub Followers"&gt;&lt;/a&gt; &lt;a target=_blank href="https://chat.51pwn.com:2083/?cnId=51pwn&amp;atRd=true&amp;stChat=1"&gt;💬&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Scanners-Box</title><link>https://rainmana.github.io/hackyfeed/tools/we5ter-scanners-box/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/we5ter-scanners-box/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Scanners Box is a comprehensive hacker toolkit that consolidates over 335 open-source scanners across various categories, such as subdomain enumeration, SQL injection vulnerability detection, and malware detection. The tool is designed for modular vulnerability assessment and does not include well-known scanning tools like Nmap or Metasploit, focusing instead on specialized scanning capabilities. Notable features include AI-powered autonomous scanners, dynamic and static code analysis, and comprehensive scanning for web applications and IoT devices.&lt;/p&gt;</description></item><item><title>ScopeSentry</title><link>https://rainmana.github.io/hackyfeed/tools/autumn-27-scopesentry/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/autumn-27-scopesentry/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Scope Sentry is a versatile cybersecurity tool that provides functionalities such as asset mapping, subdomain enumeration, vulnerability scanning, and information leakage detection. Its primary use case is to facilitate comprehensive security assessments of web assets through a distributed scanning approach, allowing users to configure multiple scanning nodes. Notably, it features a plugin system for extensibility, supports multi-node scanning, and includes components for web monitoring and sensitive data leakage detection.&lt;/p&gt;</description></item><item><title>SecretScanner</title><link>https://rainmana.github.io/hackyfeed/tools/deepfence-secretscanner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/deepfence-secretscanner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Deepfence SecretScanner is a standalone tool designed to identify unprotected secrets, such as API keys and passwords, within container images and file systems. It matches content against a comprehensive database of approximately 140 secret types, outputting detailed findings in JSON format. Furthermore, SecretScanner can be integrated into the ThreatMapper platform, allowing for holistic vulnerability scanning and risk assessment in cloud-native applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="secretscanner"&gt;SecretScanner&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://threatmapper.org/docs/secretscanner/"&gt;&lt;img src="https://img.shields.io/badge/documentation-read-green" alt="Documentation"&gt;&lt;/a&gt;
&lt;a href="https://github.com/deepfence/SecretScanner/blob/master/LICENSE"&gt;&lt;img src="https://img.shields.io/github/license/deepfence/SecretScanner" alt="GitHub license"&gt;&lt;/a&gt;
&lt;a href="https://github.com/deepfence/SecretScanner/stargazers"&gt;&lt;img src="https://img.shields.io/github/stars/deepfence/SecretScanner" alt="GitHub stars"&gt;&lt;/a&gt;
&lt;a href="https://github.com/deepfence/SecretScanner/issues"&gt;&lt;img src="https://img.shields.io/github/issues/deepfence/SecretScanner" alt="GitHub issues"&gt;&lt;/a&gt;
&lt;a href="https://join.slack.com/t/deepfence-community/shared_invite/zt-podmzle9-5X~qYx8wMaLt9bGWwkSdgQ"&gt;&lt;img src="https://img.shields.io/badge/slack-@deepfence-blue.svg?logo=slack" alt="Slack"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1 id="secretscanner-1"&gt;SecretScanner&lt;/h1&gt;
&lt;p&gt;Deepfence SecretScanner can find unprotected secrets in container images or file systems.&lt;/p&gt;</description></item><item><title>sectemplates</title><link>https://rainmana.github.io/hackyfeed/tools/securitytemplates-sectemplates/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/securitytemplates-sectemplates/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SecTemplates is a resource repository designed for infosec professionals and engineering teams lacking dedicated security personnel, providing templates for various security programs such as bug bounties, incident response, and vulnerability management. The tool offers structured starting points including checklists, runbooks, and document templates, facilitating the establishment and scaling of security initiatives while maintaining neutrality towards specific vendors. Content is freely available for personal and commercial use, barring resale in other products.&lt;/p&gt;</description></item><item><title>Selenium-Driverless</title><link>https://rainmana.github.io/hackyfeed/tools/ttlns-selenium-driverless/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ttlns-selenium-driverless/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Selenium-Driverless is a Python package that enables web automation using Selenium without the need for a chromedriver, allowing for interactions with sites that commonly employ anti-bot mechanisms like Cloudflare. Its notable features include support for multiple tabs and incognito contexts, proxy authentication, and network interception, making it suitable for use cases that require more advanced browser automation scenarios while maintaining anonymity. The tool is designed primarily for non-commercial use and provides integration with asyncio for asynchronous operations.&lt;/p&gt;</description></item><item><title>shad0w</title><link>https://rainmana.github.io/hackyfeed/tools/bats3c-shad0w/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bats3c-shad0w/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SHAD0W is a modular command and control (C2) framework designed for advanced threat operations within mature environments, leveraging techniques to evade endpoint detection and antivirus systems. Built with Python and C, it enables the execution of payloads including .NET assemblies and scripts entirely in memory, while offering features such as HTTPS communication, dynamic process injection, and extensive modularity for tasking beacons. Notable components include built-in privilege escalation exploits, a live web proxy feature, and a robust command-line interface, facilitating customization and effective covert operations.&lt;/p&gt;</description></item><item><title>shannon</title><link>https://rainmana.github.io/hackyfeed/tools/keygraphhq-shannon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/keygraphhq-shannon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Shannon is an autonomous AI penetration testing tool designed for web applications and APIs, capable of performing white-box security assessments through source code analysis and real exploit execution. It identifies potential vulnerabilities such as injection attacks and authentication bypasses, generating reports that include only verified exploits with reproducible proof-of-concept evidence. Key features include fully automated operation, OWASP vulnerability coverage, and integrated security tooling, making it suitable for continuous security testing throughout the software development lifecycle.&lt;/p&gt;</description></item><item><title>shellen</title><link>https://rainmana.github.io/hackyfeed/tools/konatabrk-shellen/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/konatabrk-shellen/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Shellen is an interactive shellcoding environment designed for writing and utilizing shellcodes, supporting both assembly and disassembly operations. Leveraging the keystone and capstone engines, Shellen allows users to seamlessly switch between different modes, search syscall tables, and run shellcodes within a subprocess, while providing a user-friendly prompt that displays the current status and architecture. This tool caters primarily to developers and security researchers working with low-level code, making shellcode manipulation intuitive and efficient.&lt;/p&gt;</description></item><item><title>shortscan</title><link>https://rainmana.github.io/hackyfeed/tools/bitquark-shortscan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bitquark-shortscan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Shortscan is an IIS short filename enumeration tool that rapidly identifies files with short filenames on an IIS web server and attempts to discover their corresponding full filenames using a unique checksum matching method. Its notable features include support for custom headers, concurrency settings, and vulnerability checks without full file enumeration, as well as the ability to utilize custom wordlists and generate rainbow tables through an accompanying utility named &lt;code&gt;shortutil&lt;/code&gt;.&lt;/p&gt;</description></item><item><title>sicat</title><link>https://rainmana.github.io/hackyfeed/tools/justakazh-sicat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/justakazh-sicat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SICAT is a comprehensive vulnerability and exploit finder that streamlines the reconnaissance process by aggregating data from multiple reputable databases based on user-defined keywords, Nmap scan results, or detected web technologies. Notable features include a modern web interface with real-time feedback, detailed HTML reporting with interactive elements, and intelligent keyword generation for enhanced search accuracy, all while supporting multithreaded scanning for optimized performance. This tool significantly aids security professionals in identifying vulnerabilities across various platforms and frameworks.&lt;/p&gt;</description></item><item><title>SILENTTRINITY</title><link>https://rainmana.github.io/hackyfeed/tools/byt3bl33d3r-silenttrinity/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/byt3bl33d3r-silenttrinity/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SILENTTRINITY is a modern, asynchronous, multiplayer command and control (C2) and post-exploitation framework designed for flexibility and stealth, utilizing Python 3 and the .NET Dynamic Language Runtime. It offers features such as real-time updates via Websockets, ECDHE encrypted communications, and a fully modular architecture allowing operators to customize their C2 channels and modules. The framework leverages embedded third-party .NET scripting languages for dynamic task evaluation, enhancing usability and providing capabilities akin to PowerShell without its direct use.&lt;/p&gt;</description></item><item><title>Silver</title><link>https://rainmana.github.io/hackyfeed/tools/s0md3v-silver/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/s0md3v-silver/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Silver is a mass vulnerability scanner that integrates with masscan and nmap to provide rapid, comprehensive TCP port scanning and vulnerability assessment. Notable features include resumable scanning, multi-core utilization, caching of vulnerability data, and integration with Shodan, allowing for efficient parallel processing and streamlined notifications through Slack. Its support for various input formats and customizable scanning options enhances its usability for security assessments across different environments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;br&gt;
 &lt;a href="https://github.com/s0md3v/Silver"&gt;&lt;img src="https://i.ibb.co/bv3rqXs/silver.png" alt="Silver"&gt;&lt;/a&gt;
 &lt;br&gt;
 Silver
 &lt;br&gt;
&lt;/h1&gt;
&lt;h4 align="center"&gt;Mass Vulnerability Scanner&lt;/h4&gt;
&lt;p align="center"&gt;
 &lt;a href="https://github.com/s0md3v/Silver/releases"&gt;
 &lt;img src="https://img.shields.io/github/release/s0md3v/Silver.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/s0md3v/Silver/issues?q=is%3Aissue+is%3Aclosed"&gt;
 &lt;img src="https://img.shields.io/github/issues-closed-raw/s0md3v/Silver.svg"&gt;
 &lt;/a&gt;
&lt;/p&gt;</description></item><item><title>spectre-attack</title><link>https://rainmana.github.io/hackyfeed/tools/eugnis-spectre-attack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/eugnis-spectre-attack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Spectre Attack Example repository demonstrates an exploit based on the Spectre vulnerability (CVE-2017-5753 and CVE-2017-5715), which allows attackers to read sensitive information from memory by exploiting speculative execution. The tool constructs a scenario where out-of-bounds memory reads can leak data via cache timing attacks, highlighting how seemingly safe coding practices can inadvertently increase vulnerability. Notable features include the ability to test system vulnerability, read specified memory addresses, and compile with both GCC and Visual Studio.&lt;/p&gt;</description></item><item><title>sqlmap</title><link>https://rainmana.github.io/hackyfeed/tools/sqlmapproject-sqlmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sqlmapproject-sqlmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; sqlmap is an open-source penetration testing tool designed for automating the detection and exploitation of SQL injection vulnerabilities in web applications. It features a robust detection engine with capabilities such as database fingerprinting, data extraction, file system access, and command execution through out-of-band connections, making it a comprehensive tool for security professionals. The tool is compatible with Python 2.7 and 3.x, ensuring broad platform support.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="sqlmap"&gt;sqlmap &lt;img src="https://i.imgur.com/fe85aVR.png" alt=""&gt;&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/sqlmapproject/sqlmap/actions/workflows/tests.yml"&gt;&lt;img src="https://github.com/sqlmapproject/sqlmap/actions/workflows/tests.yml/badge.svg" alt=".github/workflows/tests.yml"&gt;&lt;/a&gt; &lt;a href="https://www.python.org/"&gt;&lt;img src="https://img.shields.io/badge/python-2.7%7C3.x-yellow.svg" alt="Python 2.7|3.x"&gt;&lt;/a&gt; &lt;a href="https://raw.githubusercontent.com/sqlmapproject/sqlmap/master/LICENSE"&gt;&lt;img src="https://img.shields.io/badge/license-GPLv2-red.svg" alt="License"&gt;&lt;/a&gt; &lt;a href="https://x.com/sqlmap"&gt;&lt;img src="https://img.shields.io/badge/x-@sqlmap-blue.svg" alt="x"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>stunner</title><link>https://rainmana.github.io/hackyfeed/tools/firefart-stunner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/firefart-stunner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Stunner is a specialized tool designed for testing and exploiting STUN and TURN servers, particularly in the context of videoconferencing and audio chat applications utilizing the TURN protocol. Its primary use case involves identifying misconfigurations in TURN servers, enabling users to establish a SOCKS proxy that routes traffic through these servers into internal networks. Notable features include the ability to enumerate accessible IP addresses, perform detailed server information queries, and set up a local SOCKS server for traffic relaying.&lt;/p&gt;</description></item><item><title>SUDO_KILLER</title><link>https://rainmana.github.io/hackyfeed/tools/th3xace-sudo_killer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/th3xace-sudo_killer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SUDO_KILLER is a cybersecurity tool designed for professionals such as pentesters and security auditors, focusing on privilege escalation vulnerabilities in Linux systems related to SUDO configuration and usage. It manually identifies issues such as misconfigurations, risky binaries, and version-based vulnerabilities (CVEs), enabling users to exploit these weaknesses for gaining root-level privileges. The tool provides a detailed checklist of potential local exploits and requires users to perform the exploitation process manually, ensuring a controlled approach to privilege escalation testing.&lt;/p&gt;</description></item><item><title>TegraRcmGUI</title><link>https://rainmana.github.io/hackyfeed/tools/eliboa-tegrarcmgui/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/eliboa-tegrarcmgui/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; TegraRcmGUI is a Windows-based graphical user interface that facilitates the injection of payloads into Nintendo Switch consoles utilizing the Fusée Gelée exploit for RCM mode. Key features include the ability to manage favorites, run Linux on the Switch, mount the device as USB mass storage, and dump BIS keys for eMMC content decryption. The tool also offers conveniences such as auto-injection options, minimizing to the system tray, and automatic startup with Windows.&lt;/p&gt;</description></item><item><title>Terrapin-Scanner</title><link>https://rainmana.github.io/hackyfeed/tools/rub-nds-terrapin-scanner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rub-nds-terrapin-scanner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Terrapin Vulnerability Scanner is a Go-based utility designed to assess the vulnerability of SSH clients and servers against the Terrapin Attack. It utilizes a single connection to retrieve supported algorithms without initiating a full SSH key exchange, allowing it to identify potential vulnerabilities and support for known countermeasures like strict key exchange. Notable features include JSON output for results, support for various operating systems via pre-compiled binaries and Docker, and ease of building from source.&lt;/p&gt;</description></item><item><title>THC-Archive</title><link>https://rainmana.github.io/hackyfeed/tools/hackerschoice-thc-archive/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hackerschoice-thc-archive/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; THC-Archive is a repository that consolidates all releases from The Hacker&amp;rsquo;s Choice, a prominent security research group. This collection serves as a backup for their work, ensuring that projects are preserved despite the lack of a full web server. Notable active projects include THC-Hydra, THC-IPv6, and utilities aimed at various hacking and security tasks.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="thc-archive"&gt;THC-Archive&lt;/h1&gt;
&lt;p&gt;All releases of the security research group (a.k.a. hackers) The Hacker&amp;rsquo;s Choice&lt;/p&gt;</description></item><item><title>TIDoS-Framework</title><link>https://rainmana.github.io/hackyfeed/tools/0xinfection-tidos-framework/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xinfection-tidos-framework/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; TIDoS is an advanced offensive web application penetration testing framework designed to facilitate comprehensive security assessments by automating tasks across multiple phases, including reconnaissance, scanning, and vulnerability analysis. With over 100 modules and features such as multiprocessing for performance enhancement, a Metasploit-like console interface, and a graphical user interface, TIDoS streamlines the penetration testing process, enabling users to conduct efficient and thorough web application security assessments with minimal configuration. Additional capabilities like Tor integration further enhance anonymity during testing efforts.&lt;/p&gt;</description></item><item><title>TOP</title><link>https://rainmana.github.io/hackyfeed/tools/ghosttroops-top/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ghosttroops-top/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; TOP is a vulnerability cataloging tool designed for bug bounty hunters and penetration testers, focusing on proof-of-concept (PoC) exploits for various Common Vulnerabilities and Exposures (CVEs) from recent years. It compiles a list of notable CVEs along with their respective exploits and corresponding GitHub repositories, thereby facilitating ease of access and research for security professionals. Key features include organized yearly summaries of significant vulnerabilities, making it an essential resource for monitoring and exploiting security weaknesses.&lt;/p&gt;</description></item><item><title>top25-parameter</title><link>https://rainmana.github.io/hackyfeed/tools/lutfumertceylan-top25-parameter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lutfumertceylan-top25-parameter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;top25-parameter&amp;rdquo; repository provides a curated list of the 25 most commonly vulnerable parameters associated with various web security vulnerabilities, including Cross-Site Scripting (XSS), SQL Injection (SQLi), and Server-Side Request Forgery (SSRF). It is intended for use in both manual reconnaissance and automation tools, supported by data sourced from OSINT and articles in the cybersecurity community. Notable features include organized parameters for different vulnerabilities, aiding security researchers and practitioners in identifying and mitigating risks effectively.&lt;/p&gt;</description></item><item><title>traitor</title><link>https://rainmana.github.io/hackyfeed/tools/liamg-traitor/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/liamg-traitor/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Traitor is a privilege escalation tool designed to automatically exploit local vulnerabilities and misconfigurations in Unix-like systems to achieve a root shell. It incorporates various methods from GTFOBins and specific CVEs, allowing users to discover potential exploits with options to directly attempt them if necessary. Notable features include the ability to analyze sudo permissions, the option to exploit specific vulnerabilities, and support for various privilege escalation vectors.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="traitor"&gt;Traitor&lt;/h1&gt;
&lt;p&gt;Automatically exploit low-hanging fruit to pop a root shell. Linux privilege escalation made easy!&lt;/p&gt;</description></item><item><title>trivy-operator</title><link>https://rainmana.github.io/hackyfeed/tools/aquasecurity-trivy-operator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/aquasecurity-trivy-operator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Trivy Operator is a Kubernetes-native security toolkit that utilizes Trivy to perform continuous security scans of Kubernetes clusters. It automatically generates and updates comprehensive security reports, including vulnerability assessments, configuration audits, and compliance checks, which are accessible through the Kubernetes API. Notable features include automated scans for workloads, RBAC assessments, secret exposure detection, and generation of Software Bill of Materials (SBOM) for workloads, aiding in the identification and mitigation of potential security risks in real-time.&lt;/p&gt;</description></item><item><title>V3n0M-Scanner</title><link>https://rainmana.github.io/hackyfeed/tools/v3n0m-scanner-v3n0m-scanner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/v3n0m-scanner-v3n0m-scanner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; V3n0M-Scanner is an offensive security framework designed for vulnerability scanning and penetration testing, offering a Python-based toolkit that operates across both Linux and Windows platforms. Notable features include advanced scanning capabilities for SQL injection, local file inclusion to remote code execution, and a Cloudflare resolver, along with extensive target lists and efficient scanning of potentially millions of IPs for known vulnerabilities. The tool is open-source and aims to provide transparency and ease of use for security professionals.&lt;/p&gt;</description></item><item><title>Vegile</title><link>https://rainmana.github.io/hackyfeed/tools/screetsec-vegile/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/screetsec-vegile/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Vegile is a post-exploitation tool designed for maintaining stealthy backdoor/rootkit access on Linux systems. Its primary use case involves establishing persistent access to compromised hosts while enabling features such as process hiding and session unlimited capabilities in Metasploit. Notable functionalities include the ability to automatically restart hidden processes, ensuring persistent access even after termination, and support for various backdoor implementations, including those created with msfvenom.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="vegile---ghost-in-the-shell"&gt;Vegile - Ghost In The Shell&lt;/h1&gt;
&lt;p&gt;&lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/Vegile-Beta-brightgreen.svg?maxAge=259200" alt="Version"&gt;&lt;/a&gt;
&lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/Release-Stable-brightgreen.svg" alt="Stage"&gt;&lt;/a&gt;
&lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/Supported_OS-Linux-orange.svg" alt="Build"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>venom</title><link>https://rainmana.github.io/hackyfeed/tools/r00t-3xp10it-venom/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/r00t-3xp10it-venom/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VENOM is a metasploit shellcode generator and compiler that enables users to create and inject shellcode payloads in various formats such as C#, Python, Ruby, and executable formats like ELF and APK. Its primary use case lies in Red Team operations, where it assists in payload delivery through a web server and leverages automation to handle dependencies and remote connections seamlessly. Notable features include support for multiple scripting languages, integration with compilers for building executables, and functionalities similar to other popular evasion tools.&lt;/p&gt;</description></item><item><title>Viper</title><link>https://rainmana.github.io/hackyfeed/tools/funnywolf-viper/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/funnywolf-viper/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VIPER is an advanced red team platform designed for adversary simulation and cybersecurity assessments, providing users with essential tools and functionalities for efficient red teaming operations. Notable features include a user-friendly interface, multi-platform support across Windows, Linux, and macOS, integration of over 100 post-exploitation modules aligned with the MITRE ATT&amp;amp;CK framework, and a built-in LLM agent for enhanced automation and intelligent decision-making. The platform also allows for custom module development, ensuring flexibility to meet diverse operational needs.&lt;/p&gt;</description></item><item><title>VMkatz</title><link>https://rainmana.github.io/hackyfeed/tools/nikaiw-vmkatz/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nikaiw-vmkatz/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VMkatz is a cybersecurity tool designed to extract Windows credentials and secrets directly from virtual machine memory snapshots and disk images without the need for full exfiltration. It supports various input formats, including VMware snapshots and VirtualBox saved states, allowing efficient retrieval of sensitive data such as NTLM hashes, DPAPI master keys, and Kerberos tickets directly from the hypervisor or NAS. Notably, VMkatz operates as a single static binary, requiring minimal setup and enabling rapid credential access in red team engagements.&lt;/p&gt;</description></item><item><title>vulhunt</title><link>https://rainmana.github.io/hackyfeed/tools/vulhunt-re-vulhunt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vulhunt-re-vulhunt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VulHunt is a vulnerability hunting framework aimed at assisting security researchers in identifying vulnerabilities within software binaries and UEFI firmware. Built on Binarly&amp;rsquo;s BIAS, it supports large-scale vulnerability management and integrates community-developed rulepacks while offering scanning capabilities for various binary formats, including BA2 and Binary Ninja databases. Additionally, it features an MCP server for integration with AI assistants, facilitating real-time vulnerability analysis and reporting.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="vulhunt-community-edition"&gt;VulHunt Community Edition&lt;/h1&gt;
&lt;p&gt;VulHunt is a vulnerability hunting framework developed by Binarly&amp;rsquo;s Research
team. It is designed to help security researchers and practitioners identify
vulnerabilities in software binaries and UEFI firmware. VulHunt is built on top
of Binarly&amp;rsquo;s Binary Analysis and Inspection System (BIAS), which provides a
powerful and flexible environment for analysing and understanding binaries.
VulHunt integrates with the capabilities of the Binarly Transparency Platform
(BTP) to enable large-scale vulnerability management, hunting, and triage
capabilities.&lt;/p&gt;</description></item><item><title>vulnx</title><link>https://rainmana.github.io/hackyfeed/tools/anouarbensaad-vulnx/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/anouarbensaad-vulnx/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VulnX is an intelligent bot designed for automatic shell injection that identifies vulnerabilities across various content management systems (CMS). Key features include multi-threaded vulnerability scanning, target information gathering, subdomain enumeration, and the ability to search for exploits using dorks, which streamline the injection process as opposed to manual methods. The tool supports multiple CMS platforms, enhancing its usability for security assessments and penetration testing.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;br&gt;
 &lt;a href="https://github.com/anouarbensaad/VulnX"&gt;&lt;img src="https://i.ibb.co/ZxxFqxQ/vxv2.png" alt="VulnX"&gt;&lt;/a&gt;
 &lt;br&gt;
 VulnX
 &lt;br&gt;
&lt;/h1&gt;
&lt;h4 align="center"&gt;Vulnx 🕷️ is An Intelligent Bot Auto Shell Injector that detects vulnerabilities in multiple types of Cms &lt;/h4&gt;
&lt;p align="center"&gt;
 &lt;a href="https://github.com/anouarbensaad/vulnx/releases"&gt;
 &lt;img src="https://img.shields.io/github/release/anouarbensaad/vulnx.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://pypi.org/project/vulnx/"&gt;
 &lt;img src="https://img.shields.io/badge/pypi-vulnx-red.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/anouarbensaad/vulnx/issues?q=is%3Aissue+is%3Aclosed"&gt;
 &lt;img src="https://img.shields.io/github/issues-closed/anouarbensaad/vulnx.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://travis-ci.com/anouarbensaad/vulnx"&gt;
 &lt;img src="https://img.shields.io/travis/com/anouarbensaad/vulnx.svg"&gt;
 &lt;/a&gt;
&lt;/p&gt;</description></item><item><title>vulscan</title><link>https://rainmana.github.io/hackyfeed/tools/scipag-vulscan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/scipag-vulscan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Vulscan is a powerful Nmap module that transforms the commonly used network scanning tool into an effective vulnerability scanner by leveraging version detection to identify potential flaws in services. It utilizes various pre-defined vulnerability databases such as VulDB and CVE, with the capability of supporting custom databases for enhanced flexibility. Notable features include automatic updates for vulnerability databases and configurable settings to optimize match priority and version detection.&lt;/p&gt;</description></item><item><title>w13scan</title><link>https://rainmana.github.io/hackyfeed/tools/w-digital-scanner-w13scan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/w-digital-scanner-w13scan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; W13Scan is an open-source web vulnerability scanner written in Python3, capable of both active and passive scanning modes across Windows, Linux, and Mac platforms. It features a comprehensive suite of detection plugins, including XSS, SQL injection, and file leakage checks, along with customizable modules for specialized environments, ensuring high accuracy and adaptability for security professionals.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;W13Scan&lt;/h1&gt;
&lt;blockquote&gt;
&lt;p&gt;W13scan 是基于Python3的一款开源的Web漏洞发现工具,它支持主动扫描模式和被动扫描模式，能运行在Windows、Linux、Mac上。&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://github.com/boy-hack/w13scan/issues"&gt;&lt;img src="https://img.shields.io/github/issues/boy-hack/w13scan" alt="GitHub issues"&gt;&lt;/a&gt; &lt;a href="https://github.com/boy-hack/w13scan/stargazers"&gt;&lt;img src="https://img.shields.io/github/stars/boy-hack/w13scan" alt="GitHub stars"&gt;&lt;/a&gt; &lt;a href="https://github.com/boy-hack/w13scan/network"&gt;&lt;img src="https://img.shields.io/github/forks/boy-hack/w13scan" alt="GitHub forks"&gt;&lt;/a&gt; &lt;a href="https://github.com/boy-hack/w13scan/blob/master/LICENSE"&gt;&lt;img src="https://img.shields.io/github/license/boy-hack/w13scan" alt="GitHub license"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="./doc/logo.jpg" alt="Jietu20200516-184214"&gt;&lt;/p&gt;
&lt;p&gt;html模板源码:&lt;a href="https://github.com/boy-hack/w13scan-report"&gt;w13scan-report&lt;/a&gt;&lt;/p&gt;
&lt;h2 id="声明"&gt;声明&lt;/h2&gt;
&lt;p&gt;使用W13Scan前请遵守当地法律,W13Scan仅提供给教育行为使用。&lt;/p&gt;</description></item><item><title>WADComs.github.io</title><link>https://rainmana.github.io/hackyfeed/tools/wadcoms-wadcoms.github.io/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wadcoms-wadcoms.github.io/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WADComs is an interactive cheat sheet designed for offensive security professionals, offering a curated list of tools and their commands specifically for targeting Windows and Active Directory environments. Its primary use case is to aid security experts in executing effective penetration testing by providing quick access to essential commands. Notable features include its comprehensive tool listings and command syntaxes, all consolidated in a web-based format for ease of use.&lt;/p&gt;</description></item><item><title>wazuh</title><link>https://rainmana.github.io/hackyfeed/tools/wazuh-wazuh/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wazuh-wazuh/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Wazuh is an open-source security platform designed for threat prevention, detection, and response across various environments, including on-premises, virtualized, containerized, and cloud settings. It features an endpoint security agent that collects data for analysis by a centralized management server, fully integrated with the Elastic Stack for enhanced search and visualization of security alerts. Key capabilities include intrusion detection, log data analysis, file integrity monitoring, vulnerability detection, configuration assessment, and automated incident response, making it a comprehensive tool for maintaining security compliance and mitigating threats.&lt;/p&gt;</description></item><item><title>Web_Hacking</title><link>https://rainmana.github.io/hackyfeed/tools/mehdi0x90-web_hacking/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mehdi0x90-web_hacking/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Web Hacking is a comprehensive repository of notes focused on bug bounty hunting and penetration testing, collating various techniques for vulnerability discovery and exploitation. The tool features extensive reconnaissance and OSINT methods, a detailed list of common vulnerabilities, and bypass techniques, making it a valuable resource for security professionals seeking to enhance their skills and methodologies in web application security. Additionally, it encourages community contributions, fostering continuous improvement and updates of its content.&lt;/p&gt;</description></item><item><title>Web-Cache-Vulnerability-Scanner</title><link>https://rainmana.github.io/hackyfeed/tools/hackmanit-web-cache-vulnerability-scanner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hackmanit-web-cache-vulnerability-scanner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Web Cache Vulnerability Scanner (WCVS) is a command-line interface tool designed to identify and exploit web cache poisoning and deception vulnerabilities across various web applications. It supports multiple techniques for both attack types, features a crawler for discovering additional URLs, and can be integrated into CI/CD processes to streamline security practices. Notable functionalities include customizable request handling, JSON report generation, and the ability to route traffic through a proxy for enhanced testing versatility.&lt;/p&gt;</description></item><item><title>wesng</title><link>https://rainmana.github.io/hackyfeed/tools/bitsadmin-wesng/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bitsadmin-wesng/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Windows Exploit Suggester - Next Generation (WES-NG) is a vulnerability assessment tool for Windows operating systems from XP to 11, leveraging the output of the &lt;code&gt;systeminfo&lt;/code&gt; utility to identify potential vulnerabilities and applicable exploits. The tool supports multiple methods for patch assessment and incorporates a database updated from various security sources, including the Microsoft Security Update API. Notable features include the ability to validate missing patches against Microsoft&amp;rsquo;s Update Catalog and a collector for maintaining an up-to-date vulnerability database.&lt;/p&gt;</description></item><item><title>windows-kernel-exploits</title><link>https://rainmana.github.io/hackyfeed/tools/secwiki-windows-kernel-exploits/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/secwiki-windows-kernel-exploits/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The windows-kernel-exploits repository provides a collection of exploit code snippets for various vulnerabilities in the Windows kernel, leveraging known CVEs to demonstrate potential elevation of privilege and remote code execution attacks. This tool primarily serves security researchers and penetration testers conducting vulnerability assessments on Windows operating systems. Notable features include comprehensive listings of CVEs, along with links to proof-of-concept exploits and detailed descriptions for a wide range of Windows versions.&lt;/p&gt;</description></item><item><title>WinPwn</title><link>https://rainmana.github.io/hackyfeed/tools/s3cur3th1ssh1t-winpwn/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/s3cur3th1ssh1t-winpwn/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WinPwn is a comprehensive PowerShell-based tool designed for internal penetration testing, emphasizing automation and proxy support for reconnaissance and exploitation tasks. Its notable features include modules for session management, credential dumping, local and domain reconnaissance, and privilege escalation checks, alongside the ability to operate offline and integrate well-known offensive security scripts. The tool streamlines the penetration testing process with an interactive menu for selecting various attack methods and extensive built-in reconnaissance capabilities.&lt;/p&gt;</description></item><item><title>WPForce</title><link>https://rainmana.github.io/hackyfeed/tools/n00py-wpforce/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/n00py-wpforce/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WPForce is a comprehensive suite of tools designed for attacking WordPress installations, primarily focusing on brute-forcing login credentials via the API. Its notable features include the ability to automatically upload interactive shells post-authentication, dump WordPress password hashes, and pivot to a meterpreter session, making it suitable for penetration testing and post-exploitation scenarios. The tool leverages multi-threading to optimize the brute-force attack process while providing options for verbose output and error debugging.&lt;/p&gt;</description></item><item><title>wpprobe</title><link>https://rainmana.github.io/hackyfeed/tools/chocapikk-wpprobe/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/chocapikk-wpprobe/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WPProbe is a rapid scanning tool designed to detect installed WordPress plugins and themes through REST API enumeration and HTML discovery, mapping them to known vulnerabilities. It supports multiple scanning modes, including stealthy, brute-force, and hybrid methods, allowing detection of over 5,000 plugins without brute-force and many more with it. The tool fetches an updated vulnerability database automatically, eliminating the need for an API key by default, while still allowing for custom configurations and output formats.&lt;/p&gt;</description></item><item><title>XAttacker</title><link>https://rainmana.github.io/hackyfeed/tools/moham3driahi-xattacker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/moham3driahi-xattacker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; XAttacker is a comprehensive exploitation tool designed for scanning and auto-exploiting vulnerabilities in web applications, particularly those using popular Content Management Systems (CMS). It identifies the target website&amp;rsquo;s architecture, detects vulnerabilities, generates exploits, and provides the user with the relevant exploit link. Notable features include a vulnerability scanner, auto-exploiting capabilities, and support for multiple CMS platforms, along with dork search functionality across various search engines.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1&gt;XAttacker V2.5 Tool FREE&lt;/h1&gt;
&lt;img align="left" width="120" height="120" src="https://i.ibb.co/hWRd9g5/hacker-icon-on-white-background-vector-27223273-1.jpg"&gt;
&lt;p&gt;&lt;strong&gt;XATTACKER&lt;/strong&gt; A Massive Exploiting Tool capable of scanning and auto-exploiting vulnerabilities in web applications, By providing a target website to the tool, it auto detects its’ architecture if using a Content Management Service (CMS) and tries to find vulnerabilities based on the detected CMS, After finding the vulnerabilities the tool will generate an exploit for the website and send the user the link of the exploit.&lt;/p&gt;</description></item><item><title>xhunter</title><link>https://rainmana.github.io/hackyfeed/tools/anirudhmalik-xhunter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/anirudhmalik-xhunter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; XHUNTER is an advanced Android Remote Access Tool (RAT) designed for penetration testing and ethical hacking purposes. It simplifies the connection process between the attacker and victim by eliminating the need for complex port forwarding, offering a user-friendly interface for controlling a victim&amp;rsquo;s Android device. Notable features include the capability to build and bind payloads to legitimate applications and an intuitive setup process for immediate usability.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div id="top"&gt;&lt;/div&gt;
&lt;!-- PROJECT SHIELDS --&gt;
&lt;p&gt;&lt;a href="https://github.com/anirudhmalik/xhunter/graphs/contributors"&gt;&lt;img src="https://img.shields.io/github/contributors/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Contributors"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/network/members"&gt;&lt;img src="https://img.shields.io/github/forks/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Forks"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/stargazers"&gt;&lt;img src="https://img.shields.io/github/stars/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Stargazers"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/issues"&gt;&lt;img src="https://img.shields.io/github/issues/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Issues"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/blob/master/LICENSE.md"&gt;&lt;img src="https://img.shields.io/github/license/anirudhmalik/xhunter.svg?style=for-the-badge" alt="MIT License"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/commits/master"&gt;&lt;img src="https://img.shields.io/github/last-commit/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Last Commit"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/releases"&gt;&lt;img src="https://img.shields.io/github/repo-size/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Repo Size"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>xmir-patcher</title><link>https://rainmana.github.io/hackyfeed/tools/openwrt-xiaomi-xmir-patcher/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/openwrt-xiaomi-xmir-patcher/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; XMiR-Patcher is a firmware patching tool specifically designed for Xiaomi routers, facilitating the modification of router firmware for enhanced functionality. It supports both Windows and Linux/Mac operating systems, requiring Python 3.8+ and OpenSSL for operation. Notable features include straightforward execution through batch and shell scripts, making it accessible for users across different platforms.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://github.com/openwrt-xiaomi/xmir-patcher/archive/refs/heads/main.zip"&gt;&lt;img src="https://img.shields.io/badge/%E2%8F%AC-Download_latest-green" alt="Download latest"&gt;&lt;/a&gt;
&lt;a href="https://github.com/openwrt-xiaomi/xmir-patcher/archive/refs/heads/main.zip"&gt;&lt;img src="https://raw.githubusercontent.com/openwrt-xiaomi/xmir-patcher/gh-pages/traffic/clones.svg" alt="dowloads"&gt;&lt;/a&gt;
&lt;a href="https://github.com/openwrt-xiaomi/xmir-patcher/stargazers"&gt;&lt;img src="https://img.shields.io/github/stars/openwrt-xiaomi/xmir-patcher?style=flat" alt="GitHub Stars"&gt;&lt;/a&gt;
&lt;a href="https://github.com/openwrt-xiaomi/xmir-patcher"&gt;&lt;img src="https://views.whatilearened.today/views/github/openwrt-xiaomi/xmir-patcher.svg" alt="ViewCount"&gt;&lt;/a&gt;
&lt;a href="https://github.com/remittor/donate"&gt;&lt;img src="https://github.com/andry81-cache/gh-content-static-cache/raw/master/common/badges/donate/donate.svg" alt="Donations Page"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1 id="xmir-patcher"&gt;XMiR-Patcher&lt;/h1&gt;
&lt;p&gt;Firmware patcher for Xiaomi routers&lt;/p&gt;
&lt;h2 id="usage"&gt;Usage&lt;/h2&gt;
&lt;h3 id="windows"&gt;Windows&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Run &lt;code&gt;run.bat&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="linux--mac-os"&gt;Linux / Mac OS&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Install python 3.8+ and openssl&lt;/li&gt;
&lt;li&gt;Run &lt;code&gt;run.sh&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="donations"&gt;Donations&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://github.com/remittor/donate"&gt;&lt;img src="https://github.com/andry81-cache/gh-content-static-cache/raw/master/common/badges/donate/donate.svg" alt="Donations Page"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>xsser</title><link>https://rainmana.github.io/hackyfeed/tools/epsylon-xsser/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/epsylon-xsser/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; XSSer is an automated framework designed for the detection, exploitation, and reporting of Cross-Site Scripting (XSS) vulnerabilities in web applications. It features over 1300 pre-installed XSS attack vectors, sophisticated techniques for bypassing various web application firewalls (WAFs) and browsers, and is capable of operating on multiple platforms with dependencies on Python and essential libraries such as Selenium and BeautifulSoup.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://xsser.03c8.net/xsser/thehive1.png" alt="XSSer" title="XSSer"&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;ul&gt;
&lt;li&gt;Web: &lt;a href="https://xsser.03c8.net"&gt;https://xsser.03c8.net&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;Cross Site &amp;ldquo;Scripter&amp;rdquo; (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.&lt;/p&gt;</description></item><item><title>yakit</title><link>https://rainmana.github.io/hackyfeed/tools/yaklang-yakit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/yaklang-yakit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Yakit is an interactive application security testing platform that integrates the CyberSecurity Domain Specific Language (CDSL) for enhanced security operations. Its primary use case is to provide a comprehensive GUI for manipulating security testing capacities via a gRPC server, fully replacing tools like BurpSuite and offering unique features such as a visual web fuzzing tool and a plugin store for customizable security scripts. Additionally, Yakit allows non-coders to harness advanced security capabilities without programming knowledge, facilitating both local and remote deployment.&lt;/p&gt;</description></item><item><title>ysoserial</title><link>https://rainmana.github.io/hackyfeed/tools/frohoff-ysoserial/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/frohoff-ysoserial/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ysoserial is a proof-of-concept tool designed to generate payloads for exploiting vulnerabilities related to unsafe Java object deserialization. It includes a collection of property-oriented programming &amp;ldquo;gadget chains&amp;rdquo; for various Java libraries, allowing users to execute arbitrary commands on an application host when deserialization occurs under vulnerable conditions. Notable features include support for multiple payload types and compatibility with various Java libraries, making it a versatile tool for security researchers focusing on Java application vulnerabilities.&lt;/p&gt;</description></item></channel></rss>