<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Forensics on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/categories/forensics/</link><description>Recent content in Forensics on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/categories/forensics/feed.xml" rel="self" type="application/rss+xml"/><item><title>Anthropic-Cybersecurity-Skills</title><link>https://rainmana.github.io/hackyfeed/tools/mukul975-anthropic-cybersecurity-skills/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mukul975-anthropic-cybersecurity-skills/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Anthropic Cybersecurity Skills is an extensive open-source repository that provides AI agents access to 753 structured cybersecurity skills across 26 domains, offering capabilities such as memory forensics and Kubernetes RBAC auditing. The skills adhere to the agentskills.io standard, featuring a YAML structure for quick discovery and are fully mapped to MITRE ATT&amp;amp;CK and aligned with NIST CSF 2.0, enabling AI agents to perform advanced security tasks with enhanced contextual knowledge. This tool simplifies installation and empowers various platforms like Claude Code and GitHub Copilot to integrate these capabilities efficiently.&lt;/p&gt;</description></item><item><title>APKiD</title><link>https://rainmana.github.io/hackyfeed/tools/rednaga-apkid/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rednaga-apkid/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; APKiD is a tool designed to analyze Android APK files by identifying various compilers, packers, and obfuscators used in their creation, functioning similarly to PEiD for Windows applications. It supports configurable scanning options, outputs results in JSON format, and facilitates contributions for recognizing additional packaging methods. The tool is primarily used for Android security analysis, aiding in the detection of pirated or malicious applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="apkid"&gt;APKiD&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://app.travis-ci.com/rednaga/APKiD"&gt;&lt;img src="https://app.travis-ci.com/rednaga/APKiD.svg?branch=master" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://pypi.org/project/apkid/"&gt;&lt;img src="https://img.shields.io/pypi/v/apkid.svg" alt="PyPI"&gt;&lt;/a&gt;
&lt;a href="https://pypi.org/project/apkid/"&gt;&lt;img src="https://img.shields.io/pypi/pyversions/apkid.svg" alt="PyPI - Python Version"&gt;&lt;/a&gt;
&lt;a href="https://pypi.org/project/apkid/"&gt;&lt;img src="https://img.shields.io/pypi/format/apkid.svg" alt="PyPI - Format"&gt;&lt;/a&gt;
&lt;a href="https://pypi.org/project/apkid/"&gt;&lt;img src="https://img.shields.io/pypi/l/apkid.svg" alt="PyPI - License"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>asn</title><link>https://rainmana.github.io/hackyfeed/tools/nitefood-asn/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nitefood-asn/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The ASN Lookup Tool and Traceroute Server is a command line utility designed for network analysis, facilitating OSINT investigations through various capabilities including ASN lookup, RPKI validity checks, and geolocation of IP addresses. Key features include JSON output for API integration, support for querying multiple simultaneous targets, and integration with Shodan for reconnaissance without direct interaction with the target systems. This tool is particularly useful in incident response scenarios, providing comprehensive network data insights while maintaining stealth.&lt;/p&gt;</description></item><item><title>Awesome-Blackhat-Tools</title><link>https://rainmana.github.io/hackyfeed/tools/ucybers-awesome-blackhat-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ucybers-awesome-blackhat-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome Black Hat Tools is a curated repository of cybersecurity tools showcased at Black Hat events globally, serving as a practical reference for professionals in offensive, defensive, and research-driven cybersecurity. The tools are systematically organized by event location, year, and category, including Red Teaming, OSINT, and more, ensuring easy accessibility for users seeking field-tested solutions. This repository encourages community contributions to continually enhance the collection, making it a dynamic resource for current cybersecurity methodologies.&lt;/p&gt;</description></item><item><title>awesome-hacking</title><link>https://rainmana.github.io/hackyfeed/tools/jekil-awesome-hacking/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jekil-awesome-hacking/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome hacking is an awesome collection of hacking tools.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Awesome hacking is an awesome collection of hacking tools.&lt;/p&gt;</description></item><item><title>Bashfuscator</title><link>https://rainmana.github.io/hackyfeed/tools/bashfuscator-bashfuscator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bashfuscator-bashfuscator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Bashfuscator is a modular Bash obfuscation framework implemented in Python 3 that specializes in generating highly obfuscated Bash commands and scripts to evade detection on Linux systems. Designed for both Red Team and Blue Team operations, it allows users to produce randomized, convoluted Bash code that still executes the intended commands, effectively aiding in the development of obfuscation techniques and detection testing. Key features include command line and library usage, a variety of obfuscation mutators, and compatibility with GNU Linux systems running Bash 4.0 or newer.&lt;/p&gt;</description></item><item><title>BlueTeam-Tools</title><link>https://rainmana.github.io/hackyfeed/tools/a-poc-blueteam-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/a-poc-blueteam-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BlueTeam-Tools is a comprehensive repository comprising over 65 tools and resources tailored for blue teaming activities, encompassing tasks such as network discovery, vulnerability management, and security monitoring. Notable features include a variety of specialized scanners like Nmap and OpenVAS, as well as systems for data visualization and malicious traffic detection, aimed at enhancing defensive cybersecurity measures. This collection serves as an essential toolkit for security professionals focusing on threat detection and incident response.&lt;/p&gt;</description></item><item><title>ctf-skills</title><link>https://rainmana.github.io/hackyfeed/tools/ljagiello-ctf-skills/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ljagiello-ctf-skills/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The ctf-skills repository provides an extensive collection of agent skills designed to facilitate the solving of Capture The Flag (CTF) challenges across various domains, including web exploitation, binary pwn, reverse engineering, and more. Notable features include support for multiple installation methods, a comprehensive tool installer script, and detailed skill documentation for on-demand use, allowing users to efficiently integrate the necessary tools as challenges arise. It is compatible with any tool adhering to the Agent Skills specification, enhancing its versatility in competitive cybersecurity contexts.&lt;/p&gt;</description></item><item><title>cybersecurity-career-path</title><link>https://rainmana.github.io/hackyfeed/tools/rezaduty-cybersecurity-career-path/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rezaduty-cybersecurity-career-path/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The cybersecurity-career-path repository provides a comprehensive guide to various career trajectories within cybersecurity, detailing essential skills, training, and resources for both offensive and defensive roles. Notable features include a structured overview of job titles, practical utilities, and a free platform called Career Coach for personalized career advancement. It serves as a valuable resource for individuals at any stage of their cybersecurity journey.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="allv1.png" alt="ROADMAP"&gt;&lt;/p&gt;
&lt;h1 id="update-weve-expanded-our-repository-with-complete-career-paths-essential-skills-training-and-a-ton-of-practical-utilities-and-materials-named-career-coach--all-available-for-free-whether-youre-just-starting-out-or-looking-to-level-up-enroll-in-any-career-path-at-no-cost-keep-progressing-and-fuel-your-professional-growth-with-these-comprehensive-tools-designed-to-help-you-succeed-check-out-our-app-for-seamless-access-and-personalized-guidance-career-coach-career-coach"&gt;UPDATE: We&amp;rsquo;ve expanded our repository with complete career paths, essential skills training, and a ton of practical utilities and materials named &lt;a href="https://career.hadess.io"&gt;Career Coach&lt;/a&gt; ; all available for free! Whether you&amp;rsquo;re just starting out or looking to level up, enroll in any career path at no cost, keep progressing, and fuel your professional growth with these comprehensive tools designed to help you succeed. Check out our app for seamless access and personalized guidance! &lt;a href="https://career.hadess.io"&gt;Career Coach&lt;/a&gt; &lt;a href="https://career.hadess.io"&gt;&lt;img src="https://img.shields.io/badge/CLICK%20ME-8A2BE2" alt="Career Coach"&gt;&lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;Cybersecurity Career Path ⬆️&lt;/p&gt;</description></item><item><title>DataSurgeon</title><link>https://rainmana.github.io/hackyfeed/tools/drew-alleman-datasurgeon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/drew-alleman-datasurgeon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DataSurgeon is a comprehensive tool for extracting sensitive information pertinent to incident response, DLP, penetration testing, and CTF challenges. It supports extraction of a wide range of data types—including emails, credit cards, URLs, and various hashes—across multiple operating systems, and features a plugin management system that allows users to extend its functionality. Notable features include recursive file analysis, CSV output capabilities, and multi-platform support enabling usage on Windows, Linux, and macOS.&lt;/p&gt;</description></item><item><title>Digital-Forensics-Guide</title><link>https://rainmana.github.io/hackyfeed/tools/mikeroyal-digital-forensics-guide/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mikeroyal-digital-forensics-guide/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Digital Forensics Guide serves as a comprehensive resource for those engaged in digital forensics, providing a compilation of applications, libraries, and tools essential for effectively conducting forensic investigations. The guide includes sections on various forensic fields such as computer, mobile, and network forensics, along with curated lists of tutorials, certifications, and frameworks to enhance practitioners&amp;rsquo; skills and knowledge. Notable features include playbooks for practical application and a structured format for easy navigation through key topics.&lt;/p&gt;</description></item><item><title>fame</title><link>https://rainmana.github.io/hackyfeed/tools/certsocietegenerale-fame/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/certsocietegenerale-fame/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; FAME (FAME Automates Malware Evaluation) is a Python-based framework designed to automate and enhance the analysis of malicious files, enabling analysts to quickly identify malware families and extract relevant configurations and indicators of compromise (IOCs). The tool utilizes Flask for its web interface and Celery for managing background tasks, streamlining the end-to-end analysis process. FAME aims to empower malware analysis efforts by providing an efficient and user-friendly solution for processing malware samples.&lt;/p&gt;</description></item><item><title>FBI-tools</title><link>https://rainmana.github.io/hackyfeed/tools/danieldurnea-fbi-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/danieldurnea-fbi-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; FBI-tools is a comprehensive Open Source Intelligence (OSINT) toolkit featuring a variety of tools for analysts to gather and analyze data from multiple online sources. Its notable features include domain squatting detection with SquatSquasher, web reconnaissance capabilities with reNgine, and efficient user account searches across platforms using UsernameSearchOSINT. Additionally, the collection encompasses specialized tools for investigating social media, phone numbers, and dark web intelligence, streamlining the OSINT process.&lt;/p&gt;</description></item><item><title>Forensia</title><link>https://rainmana.github.io/hackyfeed/tools/paulnorman01-forensia/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/paulnorman01-forensia/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Forensia is an anti-forensics tool designed for red teamers to eliminate traces during the post-exploitation phase. Its primary use case is to enhance evasion by supporting various functionalities such as unloading Sysmon drivers, employing the Gutmann method for file shredding, and disabling multiple logging mechanisms. Notable features include log erasure, file melting capabilities, and the ability to clear recent user activity and cache, thereby reducing the likelihood of detection by incident response teams.&lt;/p&gt;</description></item><item><title>hackdroid</title><link>https://rainmana.github.io/hackyfeed/tools/thehackingsage-hackdroid/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/thehackingsage-hackdroid/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HackDroid is a comprehensive collection of penetration testing and security-related applications tailored for Android devices. It organizes applications into diverse categories, including forensics, networking, and cryptography, to facilitate easy access and download, while emphasizing the necessity of root permissions and ethical use cases. Notable features include a wide range of tools for various hacking and security tasks, and guidance for use on secondary devices to mitigate risks.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
	&lt;a href="https://thehackingsage.com/hackdroid/"&gt;&lt;img src="https://thehackingsage.com/hackdroid/assets/img/hackdroid/logo.png" alt="HACKDROID"&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>Hacking-Tools</title><link>https://rainmana.github.io/hackyfeed/tools/yogsec-hacking-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/yogsec-hacking-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Hacking-Tools is a curated collection of penetration testing and ethical hacking utilities, including essential tools from Kali Linux. It is organized into categories such as information gathering, vulnerability analysis, and exploitation tools, facilitating easy navigation and use. Notable features include a featured tool, BugBoard, designed to automate vulnerability detection for bug bounty hunters and security researchers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="hacking-tools"&gt;Hacking-Tools&lt;/h1&gt;
&lt;div align="center" style="margin: 30px 0;"&gt;
A curated list of penetration testing and ethical hacking tools, organized by category. This collection includes Kali Linux tools and other notable utilities.
&lt;/br&gt;
&lt;p&gt;&lt;img src="https://media0.giphy.com/media/v1.Y2lkPTc5MGI3NjExdHJjMXpvb2hkdXJvN2Y3cmllNG81YXNsem90ejhwY2NqbXB5OXgzaiZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw/137EaR4vAOCn1S/giphy.gif" alt="Hacking Anime"&gt;&lt;/p&gt;</description></item><item><title>hollows_hunter</title><link>https://rainmana.github.io/hackyfeed/tools/hasherezade-hollows_hunter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hasherezade-hollows_hunter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Hollows Hunter is a command-line tool designed to identify and dump potentially malicious implants in processes by utilizing the PE-sieve passive memory scanner. Its primary use case includes scanning processes based on various criteria, such as process name and creation time, and it offers capabilities for continuous memory scanning and ETW listening. Notable features include the ability to scan all processes if no specific targets are specified, and support for multiple input criteria for enhanced targeting.&lt;/p&gt;</description></item><item><title>Infosec_Reference</title><link>https://rainmana.github.io/hackyfeed/tools/rmusser01-infosec_reference/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rmusser01-infosec_reference/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The InfoSec Reference project serves as a comprehensive resource for individuals seeking to enhance their understanding of Information Security, offering a curated list of techniques, tools, and tactics. Its primary use case revolves around providing a &amp;ldquo;Yellow Pages&amp;rdquo; style reference for users to browse and learn about various aspects of infosec, helping them build skills and recall pertinent information. Notably, it encourages community contributions and maintains regular updates, while emphasizing a commitment to ethical practices in cybersecurity.&lt;/p&gt;</description></item><item><title>mal_unpack</title><link>https://rainmana.github.io/hackyfeed/tools/hasherezade-mal_unpack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hasherezade-mal_unpack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; mal_unpack is a dynamic malware unpacker that leverages PE-sieve to deploy packed malware, allowing it to unpack and dump the payload while terminating the original process. Its primary use case is for malware analysis in controlled environments, with notable features including options for dumping implanted PEs, shellcodes, and modified artifacts, as well as performance enhancements through an auxiliary driver.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="mal_unpack"&gt;mal_unpack&lt;/h1&gt;
&lt;p&gt;&lt;img src="./logo/logo.png" alt=""&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://ci.appveyor.com/project/hasherezade/mal-unpack"&gt;&lt;img src="https://ci.appveyor.com/api/projects/status/3cqqlah6unfhasik?svg=true" alt="Build status"&gt;&lt;/a&gt;
&lt;a href="https://app.codacy.com/gh/hasherezade/mal_unpack/dashboard?branch=master"&gt;&lt;img src="https://app.codacy.com/project/badge/Grade/fedbe124aa694761907bbe51bfc8d6f9" alt="Codacy Badge"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/mal_unpack/commits"&gt;&lt;img src="https://img.shields.io/github/commit-activity/m/hasherezade/mal_unpack" alt="Commit activity"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/mal_unpack/commits"&gt;&lt;img src="https://img.shields.io/github/last-commit/hasherezade/mal_unpack/master" alt="Last Commit"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://github.com/hasherezade/mal_unpack/releases"&gt;&lt;img src="https://img.shields.io/github/release/hasherezade/mal_unpack.svg" alt="GitHub release"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/mal_unpack/releases"&gt;&lt;img src="https://img.shields.io/github/release-date/hasherezade/mal_unpack?color=blue" alt="GitHub release date"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/mal_unpack/releases"&gt;&lt;img src="https://img.shields.io/github/downloads/hasherezade/mal_unpack/total.svg" alt="Github All Releases"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/mal_unpack/releases"&gt;&lt;img src="https://img.shields.io/github/downloads/hasherezade/mal_unpack/latest/total.svg" alt="Github Latest Release"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>malcom</title><link>https://rainmana.github.io/hackyfeed/tools/tomchop-malcom/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tomchop-malcom/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Malcom is a malware communication analyzer that visualizes network traffic to identify interactions with known malware sources, thereby aiding in malware analysis and intelligence gathering. Its primary use case is to detect command and control servers, monitor peer-to-peer networks, and unravel DNS fast-flux infrastructures. Notable features include its ability to convert complex network traffic data into actionable intelligence and a user-friendly graphical interface for rapid analysis.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="malcom---malware-communication-analyzer"&gt;Malcom - Malware Communication Analyzer&lt;/h1&gt;
&lt;p&gt;Malcom is a tool designed to analyze a system&amp;rsquo;s network communication using graphical representations of network traffic, and cross-reference them with known malware sources. This comes handy when analyzing how certain malware species try to communicate with the outside world.&lt;/p&gt;</description></item><item><title>matano</title><link>https://rainmana.github.io/hackyfeed/tools/matanolabs-matano/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/matanolabs-matano/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Matano is an open-source cloud-native security data lake specifically designed for AWS, enabling security teams to normalize and manage security logs effectively. Its notable features include the ability to integrate with over 50 log sources, support for Detection-as-Code using Python, serverless architecture for scalability, and vendor-neutral ownership through open standards. The tool aims to enhance SIEM capabilities by providing a cost-effective and versatile solution for security data management and analysis.&lt;/p&gt;</description></item><item><title>my-arsenal-of-aws-security-tools</title><link>https://rainmana.github.io/hackyfeed/tools/toniblyx-my-arsenal-of-aws-security-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/toniblyx-my-arsenal-of-aws-security-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; My Arsenal of AWS Security Tools is a curated collection of open-source tools designed to enhance security in AWS environments through various functionalities, including defensive hardening, offensive testing, and security auditing. Notable features include comprehensive coverage of cloud security best practices and continuous monitoring capabilities, facilitating improved incident response and compliance with standards such as CIS and GDPR. This repository serves as a resource for security practitioners aiming to bolster their AWS security posture.&lt;/p&gt;</description></item><item><title>oletools</title><link>https://rainmana.github.io/hackyfeed/tools/decalage2-oletools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/decalage2-oletools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; oletools is a Python package designed for analyzing Microsoft OLE2 files, including older Microsoft Office documents, MSI files, and Outlook messages, primarily for malware detection, forensics, and debugging. Key features include the ability to detect, extract, and analyze VBA macros, OLE objects, Excel 4 macros (XLM), DDE links, and capabilities for analyzing RTF and OpenXML files. The tool is built on the olefile parser, enhancing its functionality with various detection mechanisms and logging options.&lt;/p&gt;</description></item><item><title>Open-Source-Security-Guide</title><link>https://rainmana.github.io/hackyfeed/tools/mikeroyal-open-source-security-guide/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mikeroyal-open-source-security-guide/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Open Source Security Guide serves as a comprehensive resource for enhancing the security of systems and networks by providing tutorials, standards, and tools relevant to open-source security practices. It includes sections on security certifications, threat models, and various security frameworks, along with a curated list of tools and resources to improve security operations. Notably, it aims to foster a collaborative environment for sharing best practices and advancing security through community initiatives.&lt;/p&gt;</description></item><item><title>operative-framework</title><link>https://rainmana.github.io/hackyfeed/tools/graniet-operative-framework/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/graniet-operative-framework/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Operative Framework is a digital investigation tool designed for interacting with multiple targets, executing a variety of modules, and managing links with these targets. Its notable features include the ability to export reports in PDF format, support for crafting custom modules, and a RESTful API for integration, all underpinned by a redesigned architecture in Rust for enhanced performance and functionality.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;img src="https://i.ibb.co/ZBf2T77/PNG.png" width="200"&gt;
&lt;p&gt;&lt;strong&gt;operative framework&lt;/strong&gt; is a digital investigation framework, you can interact with multiple targets, execute multiple modules, create links with target, export rapport to PDF file, add note to target or results, interact with RESTFul API, write your own modules.&lt;/p&gt;</description></item><item><title>pe-sieve</title><link>https://rainmana.github.io/hackyfeed/tools/hasherezade-pe-sieve/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hasherezade-pe-sieve/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PE-sieve is a lightweight malware detection tool that scans individual processes for malicious implants such as injected PEs, shellcodes, and various in-memory modifications. It effectively identifies techniques like Process Hollowing and Reflective DLL Injection, allowing for the extraction and analysis of detected threats. Additionally, PE-sieve can be integrated as a DLL with a simple API for use in other applications, enhancing its versatility in malware analysis workflows.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;img src="./logo/PE-SIEVE_small.png" alt=""&gt;
&lt;p&gt;&lt;a href="https://ci.appveyor.com/project/hasherezade/pe-sieve"&gt;&lt;img src="https://ci.appveyor.com/api/projects/status/crlo8iyvi4bm80yp?svg=true" alt="Build status"&gt;&lt;/a&gt;
&lt;a href="https://app.codacy.com/gh/hasherezade/pe-sieve/dashboard?branch=master"&gt;&lt;img src="https://api.codacy.com/project/badge/Grade/b75fd4d95bd94629879381241e4a7c02" alt="Codacy Badge"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/pe-sieve/commits"&gt;&lt;img src="https://img.shields.io/github/commit-activity/m/hasherezade/pe-sieve" alt="Commit activity"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/pe-sieve/commits"&gt;&lt;img src="https://img.shields.io/github/last-commit/hasherezade/pe-sieve/master" alt="Last Commit"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>prowler</title><link>https://rainmana.github.io/hackyfeed/tools/prowler-cloud-prowler/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/prowler-cloud-prowler/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Prowler is an open-source cloud security platform that automates security assessments and compliance checks across various cloud environments. It features hundreds of customizable security checks and integration capabilities, enabling organizations to implement real-time monitoring and remediation for enhanced cloud security. Designed for scalability and cost-effectiveness, Prowler simplifies the complexities of cloud security management for organizations of all sizes.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img align="center" src="https://github.com/prowler-cloud/prowler/blob/master/docs/img/prowler-logo-black.png#gh-light-mode-only" width="50%" height="50%"&gt;
 &lt;img align="center" src="https://github.com/prowler-cloud/prowler/blob/master/docs/img/prowler-logo-white.png#gh-dark-mode-only" width="50%" height="50%"&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
 &lt;b&gt;&lt;i&gt;Prowler&lt;/b&gt; is the Open Cloud Security platform trusted by thousands to automate security and compliance in any cloud environment. With hundreds of ready-to-use checks and compliance frameworks, Prowler delivers real-time, customizable monitoring and seamless integrations, making cloud security simple, scalable, and cost-effective for organizations of any size.
&lt;/p&gt;</description></item><item><title>RecoverPy</title><link>https://rainmana.github.io/hackyfeed/tools/pablolec-recoverpy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pablolec-recoverpy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RecoverPy is a data recovery tool that scans raw disk partitions to recover deleted files by directly inspecting disk blocks and searching for specific byte patterns. Designed primarily for forensic data recovery, it allows users to navigate adjacent blocks to retrieve fragmented data while ensuring that the entire scanning process is memory-efficient and focused solely on raw data, without attempting any filesystem interpretations. Notably, it facilitates efficient block inspection and content extraction, though success depends on the integrity of the underlying disk blocks.&lt;/p&gt;</description></item><item><title>sectemplates</title><link>https://rainmana.github.io/hackyfeed/tools/securitytemplates-sectemplates/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/securitytemplates-sectemplates/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SecTemplates is a resource repository designed for infosec professionals and engineering teams lacking dedicated security personnel, providing templates for various security programs such as bug bounties, incident response, and vulnerability management. The tool offers structured starting points including checklists, runbooks, and document templates, facilitating the establishment and scaling of security initiatives while maintaining neutrality towards specific vendors. Content is freely available for personal and commercial use, barring resale in other products.&lt;/p&gt;</description></item><item><title>sysmon-modular</title><link>https://rainmana.github.io/hackyfeed/tools/olafhartong-sysmon-modular/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/olafhartong-sysmon-modular/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; sysmon-modular is a modular Sysmon configuration repository designed for customization and maintenance of Microsoft Sysinternals&amp;rsquo; Sysmon tool. Its primary use case is to generate tailored event logging configurations for monitoring system behavior and enhancing threat detection in diverse environments. Notable features include pre-generated configurations catering to different verbosity levels, a flexible module system for incorporating custom configurations, and automated XML generation through a PowerShell script integrated with Azure Pipelines.&lt;/p&gt;</description></item><item><title>TryHackMe-Roadmap</title><link>https://rainmana.github.io/hackyfeed/tools/rng70-tryhackme-roadmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rng70-tryhackme-roadmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The TryHackMe Road Map repository provides a comprehensive list of over 350 free TryHackMe rooms categorized by various cybersecurity topics to facilitate learning and practice in ethical hacking. Its primary use case is to help individuals, from beginners to advanced users, streamline their training by accessing a structured pathway through challenges in areas such as Linux fundamentals, web security, and more. Notable features include the organization of topics for a sequential learning approach and the inclusion of various practical scenarios to enhance hands-on experience in cybersecurity.&lt;/p&gt;</description></item><item><title>Watcher</title><link>https://rainmana.github.io/hackyfeed/tools/thalesgroup-cert-watcher/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/thalesgroup-cert-watcher/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Watcher is an AI-powered automated cybersecurity threat detection platform built on Django and React JS, enabling organizations to proactively identify and monitor emerging cybersecurity threats. Its primary use case includes automated intelligence analysis, real-time alerts for trending cybersecurity topics, and comprehensive domain management to combat potential cyber threats. Notable features encompass information leak monitoring, malicious domain surveillance, and integration with external threat intelligence sources for enhanced situational awareness.&lt;/p&gt;</description></item><item><title>wazuh</title><link>https://rainmana.github.io/hackyfeed/tools/wazuh-wazuh/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wazuh-wazuh/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Wazuh is an open-source security platform designed for threat prevention, detection, and response across various environments, including on-premises, virtualized, containerized, and cloud settings. It features an endpoint security agent that collects data for analysis by a centralized management server, fully integrated with the Elastic Stack for enhanced search and visualization of security alerts. Key capabilities include intrusion detection, log data analysis, file integrity monitoring, vulnerability detection, configuration assessment, and automated incident response, making it a comprehensive tool for maintaining security compliance and mitigating threats.&lt;/p&gt;</description></item></channel></rss>