<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Post-Exploitation on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/categories/post-exploitation/</link><description>Recent content in Post-Exploitation on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/categories/post-exploitation/feed.xml" rel="self" type="application/rss+xml"/><item><title>A-Red-Teamer-diaries</title><link>https://rainmana.github.io/hackyfeed/tools/ihebski-a-red-teamer-diaries/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ihebski-a-red-teamer-diaries/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; A-Red-Teamer-diaries is a collaborative repository containing publicly accessible notes and resources for penetration testing and red teaming activities, focusing on various tools and techniques employed during security assessments. Key features include a cheatsheet for quick command reference, detailed methodologies for effective exploitation, and practical scripts for network scanning and enumeration, enhancing both learning and efficiency in cybersecurity engagements. This tool serves as a practical guide for professionals aiming to improve their pentesting methodologies in controlled environments.&lt;/p&gt;</description></item><item><title>adbwebkit</title><link>https://rainmana.github.io/hackyfeed/tools/jxroot-adbwebkit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jxroot-adbwebkit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ADB WebKit is a browser-based tool designed for managing Android devices via ADB (Android Debug Bridge) with an intuitive user interface. Its primary use case includes functionalities like application management (installing, uninstalling, granting permissions), shell access, screen capture, and device control commands, making it a comprehensive solution for developers and testers. Notable features include support for live application management, real-time screen interactions, and various device control options, all accessible through a USB connection or IP address.&lt;/p&gt;</description></item><item><title>Awesome-Redteam</title><link>https://rainmana.github.io/hackyfeed/tools/threekiii-awesome-redteam/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/threekiii-awesome-redteam/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome-Redteam is a comprehensive knowledge base designed for red teaming and offensive security research, providing users with a curated collection of tools, scripts, and tips. It features organized sections covering various aspects such as cybersecurity cheat sheets, cryptographic methods, cyberspace search tools, and open-source intelligence resources, all intended for educational purposes. The repository emphasizes legal usage and warns against employing its content for unauthorized activities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="awesome-redteam"&gt;Awesome-Redteam&lt;/h1&gt;
&lt;p align="left"&gt;
 &lt;a href="https://github.com/Threekiii/Awesome-Redteam"&gt;
 &lt;img src="https://badgen.net/github/stars/Threekiii/Awesome-Redteam?color=yellow&amp;icon=github" alt="stars"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/Threekiii/Awesome-POC"&gt;
 &lt;img src="https://badgen.net/github/forks/Threekiii/Awesome-Redteam?color=blue&amp;icon=github" alt="forks"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/Threekiii/Awesome-POC"&gt;
 &lt;img src="https://badgen.net/github/last-commit/Threekiii/Awesome-Redteam?color=green" alt="last-commit"&gt;
 &lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;❗【免责声明】本项目所涉及的技术、思路和工具仅供学习，任何人不得将其用于非法用途和盈利，不得将其用于非授权渗透测试，否则后果自行承担，与本项目无关。 使用本项目前请先阅读 &lt;a href="https://github.com/Threekiii/Awesome-Laws"&gt;法律法规&lt;/a&gt;。&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>Bashark</title><link>https://rainmana.github.io/hackyfeed/tools/redcode-labs-bashark/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/redcode-labs-bashark/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Bashark 2.0 is a post-exploitation toolkit designed for penetration testers and security researchers to facilitate operations during the post-exploitation phase of security audits. It offers a simple command-line interface, where users can source the &lt;code&gt;bashark.sh&lt;/code&gt; script to access various functions and commands, streamlining the process of managing compromised hosts. Key features include ease of use through a help menu and support for Bash scripting, making it a practical tool for enhancing post-exploitation activities.&lt;/p&gt;</description></item><item><title>DeimosC2</title><link>https://rainmana.github.io/hackyfeed/tools/deimosc2-deimosc2/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/deimosc2-deimosc2/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DeimosC2 is a deprecated post-exploitation Command &amp;amp; Control (C2) tool designed to facilitate control over compromised machines across multiple operating systems including Windows, macOS, and Linux. Its notable features include dynamic agent generation, diverse communication methods (TCP, HTTPS, DoH, and QUIC), a graphical interface for managing listeners and agents, and robust security measures such as multi-user support and two-factor authentication. However, it is important to note that the tool has a known XSS vulnerability and is no longer maintained.&lt;/p&gt;</description></item><item><title>DllShimmer</title><link>https://rainmana.github.io/hackyfeed/tools/print3m-dllshimmer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/print3m-dllshimmer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DllShimmer is a tool designed to facilitate DLL hijacking by allowing users to backdoor any function in a DLL without disrupting the normal operation of the host program. It generates proxy DLLs through a boilerplate C++ file and a corresponding &lt;code&gt;.def&lt;/code&gt; file, ensuring that all exported functions maintain their original names and ordinal numbers, thus avoiding detection. Key features include support for both dynamic and static linking, the option to prevent multiple executions of the backdoor, and comprehensive debug logging capabilities.&lt;/p&gt;</description></item><item><title>EvilOSX</title><link>https://rainmana.github.io/hackyfeed/tools/marten4n6-evilosx/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/marten4n6-evilosx/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; EvilOSX is a Remote Administration Tool (RAT) designed for macOS that enables stealthy monitoring and control of compromised systems. It boasts features such as terminal emulation, module extensibility, and the ability to retrieve sensitive user data like passwords and iCloud tokens, all while remaining undetected by antivirus solutions through encrypted payloads. Additionally, it includes functionalities for taking screenshots, recording audio, and executing local privilege escalation attempts, making it a potent tool for unauthorized system access and data exfiltration.&lt;/p&gt;</description></item><item><title>Forensia</title><link>https://rainmana.github.io/hackyfeed/tools/paulnorman01-forensia/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/paulnorman01-forensia/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Forensia is an anti-forensics tool designed for red teamers to eliminate traces during the post-exploitation phase. Its primary use case is to enhance evasion by supporting various functionalities such as unloading Sysmon drivers, employing the Gutmann method for file shredding, and disabling multiple logging mechanisms. Notable features include log erasure, file melting capabilities, and the ability to clear recent user activity and cache, thereby reducing the likelihood of detection by incident response teams.&lt;/p&gt;</description></item><item><title>fsociety</title><link>https://rainmana.github.io/hackyfeed/tools/manisso-fsociety/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/manisso-fsociety/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Fsociety is a comprehensive penetration testing framework designed to provide a wide array of hacking tools utilized in the Mr. Robot series. It features modules for information gathering, password attacks, wireless testing, exploitation, web hacking, and post-exploitation, all implemented in Python 2, with detailed installation instructions for various platforms, including Docker support. Notable tools included are Nmap, sqlmap, WPScan, and several others tailored for diverse security testing scenarios.&lt;/p&gt;</description></item><item><title>Ghost</title><link>https://rainmana.github.io/hackyfeed/tools/entysec-ghost/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/entysec-ghost/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ghost Framework is an Android post-exploitation framework that leverages the Android Debug Bridge to enable remote access to Android devices. Its primary use case is for penetration testing and security assessments of Android applications and devices. Notable features include ease of installation via pip and a focus on facilitating comprehensive exploitation scenarios.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h3 align="center"&gt;
 &lt;img src="https://user-images.githubusercontent.com/54115104/116760735-6da1e780-aa1e-11eb-8c6f-530386487671.png" alt="logo" height="250px"&gt;
&lt;/h3&gt;
&lt;p align="center"&gt;
 &lt;b&gt;Ghost Framework&lt;/b&gt;
 &lt;br&gt;
 &lt;br&gt;
 &lt;a href="https://entysec.com"&gt;
 &lt;img src="https://img.shields.io/badge/developer-EntySec-blue.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/EntySec/Ghost"&gt;
 &lt;img src="https://img.shields.io/badge/language-Python-blue.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/EntySec/Ghost/forks"&gt;
 &lt;img src="https://img.shields.io/github/forks/EntySec/Ghost?style=flat&amp;color=green"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/EntySec/Ghost/stargazers"&gt;
 &lt;img src="https://img.shields.io/github/stars/EntySec/Ghost?style=flat&amp;color=yellow"&gt;
 &lt;/a&gt;
 &lt;a href="https://www.codefactor.io/repository/github/entysec/ghost"&gt;
 &lt;img src="https://www.codefactor.io/repository/github/entysec/ghost/badge"&gt;
 &lt;/a&gt;
 &lt;br&gt;
 &lt;br&gt;
 Ghost Framework is an Android post-exploitation framework that
 &lt;br&gt;exploits the Android Debug Bridge to remotely access an Android device.
 &lt;br&gt;
 &lt;br&gt;
 &lt;b&gt;Installation&lt;/b&gt;&lt;br&gt;
 &lt;br&gt;
 &lt;code&gt;pip3 install git+https://github.com/EntySec/Ghost&lt;/code&gt;
&lt;/p&gt;</description></item><item><title>go-shellcode</title><link>https://rainmana.github.io/hackyfeed/tools/brimstone-go-shellcode/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/brimstone-go-shellcode/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The go-shellcode tool enables users to execute shellcode directly from memory as a standalone process, aiming to circumvent antivirus detection. Its primary use case involves running custom shellcode for penetration testing or exploitation purposes, leveraging features like shellcode size handling via batch scripts and a recommendation for binary obfuscation using the garble tool. The tool requires manual architecture specification and supports 64-bit shellcode execution while providing instructions for building and compressing the resulting binary.&lt;/p&gt;</description></item><item><title>GTFOBins.github.io</title><link>https://rainmana.github.io/hackyfeed/tools/gtfobins-gtfobins.github.io/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gtfobins-gtfobins.github.io/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GTFOBins is a curated repository that catalogs Unix-like executables capable of circumventing local security restrictions in improperly configured systems. Its primary use case is to aid security professionals and penetration testers in identifying and exploiting misconfigurations. Notable features include a comprehensive database of binaries and detailed usage instructions for different scenarios.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="gtfobins"&gt;GTFOBins&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/GTFOBins/GTFOBins.github.io/actions?query=workflow:CI"&gt;&lt;img src="https://github.com/GTFOBins/GTFOBins.github.io/actions/workflows/ci.yml/badge.svg" alt="CI status"&gt;&lt;/a&gt;
&lt;a href="https://github.com/GTFOBins/GTFOBins.github.io/actions?query=workflow:Pages"&gt;&lt;img src="https://github.com/GTFOBins/GTFOBins.github.io/actions/workflows/pages.yml/badge.svg" alt="CI status"&gt;&lt;/a&gt;
&lt;a href="https://github.com/sponsors/GTFOBins"&gt;&lt;img src="https://img.shields.io/static/v1?label=Sponsor&amp;amp;message=%E2%9D%A4&amp;amp;color=%23db61a2" alt="Sponsor"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://gtfobins.org"&gt;&lt;img align="right" src="assets/logo.png" style="width: 100px" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.&lt;/p&gt;</description></item><item><title>Heroinn</title><link>https://rainmana.github.io/hackyfeed/tools/b23r0-heroinn/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/b23r0-heroinn/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Heroinn is a cross-platform command-and-control (C2) and post-exploitation framework developed in Rust, designed primarily for research and educational purposes. Notable features include a graphical user interface (GUI), an interactive PTY shell, system information collection, file management with support for large files and resuming broken transfers, and compatibility with multiple operating systems including Windows, Linux, BSD, and macOS, leveraging various communication protocols such as TCP, HTTP, and reliable UDP.&lt;/p&gt;</description></item><item><title>ligolo-ng</title><link>https://rainmana.github.io/hackyfeed/tools/nicocha30-ligolo-ng/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nicocha30-ligolo-ng/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ligolo-ng is an advanced tunneling tool that establishes connections through a TUN interface, enabling penetration testers to create reverse TCP/TLS tunnels without the need for SOCKS proxies. Notable features include a user-friendly web interface, automatic configuration for certificates, support for multiple platforms, and resilience to network issues with automatic tunnel recovery. Its design facilitates streamlined network management and the ability to run tools directly over these tunnels.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="ligolo-ng--tunneling-like-a-vpn"&gt;Ligolo-ng : Tunneling like a VPN&lt;/h1&gt;
&lt;p&gt;&lt;img src="doc/logo.png" alt="Ligolo Logo"&gt;&lt;/p&gt;</description></item><item><title>mimipenguin</title><link>https://rainmana.github.io/hackyfeed/tools/huntergregal-mimipenguin/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/huntergregal-mimipenguin/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; MimiPenguin is a Linux tool designed to extract cleartext login passwords from the currently logged-in desktop user by dumping process memory. It utilizes a probability-based method to identify possible passwords by cross-referencing hashes from the /etc/shadow file and performing regex searches. Notably, version 2.0 features a C implementation aimed at enhancing speed and portability, while it maintains support for various desktop environments and authentication types including Gnome Keyring and LightDM.&lt;/p&gt;</description></item><item><title>mssqlproxy</title><link>https://rainmana.github.io/hackyfeed/tools/blackarrowsec-mssqlproxy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/blackarrowsec-mssqlproxy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; mssqlproxy is a lateral movement tool designed to facilitate access through a compromised Microsoft SQL Server by utilizing socket reuse. It operates with sysadmin privileges and comprises a CLR assembly, a core DLL, and a client, allowing users to install and manage proxy services for connecting to external systems. Notable features include remote DLL management, commands for file transfer, and options for configuring local listening ports, although it currently supports only IPv4 connections.&lt;/p&gt;</description></item><item><title>phpsploit</title><link>https://rainmana.github.io/hackyfeed/tools/nil0x42-phpsploit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nil0x42-phpsploit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PhpSploit is a full-featured Command and Control (C2) framework that maintains a persistent presence on web servers using a polymorphic PHP one-liner. Its primary use case is for penetration testing and exploitation, enabling users to execute commands, manage files remotely, interact with a SQL console, and escalate privileges through over 20 available plugins. Notable features include obfuscated communication via HTTP headers and seamless file upload/download capabilities, facilitating robust interactions with target systems while bypassing standard PHP security measures.&lt;/p&gt;</description></item><item><title>PowerHub</title><link>https://rainmana.github.io/hackyfeed/tools/adrianvollmer-powerhub/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/adrianvollmer-powerhub/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PowerHub is a post-exploitation tool designed for PowerShell, facilitating the transfer of potentially flagged data during penetration testing engagements. Its notable features include being fileless and stateless, utilizing cert pinning and RC4 encryption for string obfuscation, allowing seamless execution of C# programs in memory, and offering multiple methods to bypass AMSI. The tool simplifies processes such as running scripts and transferring sensitive information like Kerberos tickets or passwords, either through command line or a web interface, enhancing collaboration for testing teams.&lt;/p&gt;</description></item><item><title>PsMapExec</title><link>https://rainmana.github.io/hackyfeed/tools/the-viper-one-psmapexec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/the-viper-one-psmapexec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PsMapExec is a PowerShell-based post-exploitation framework designed to facilitate penetration testing within Active Directory environments. It offers enhancements over similar tools like CrackMapExec and NetExec, allowing for comprehensive Active Directory enumeration and management with a user-friendly interface. The tool is self-contained, making it suitable for use in restricted environments, and emphasizes adherence to ethical guidelines and consent when utilized for security assessments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="psmapexec"&gt;PsMapExec&lt;/h1&gt;
&lt;p align="center"&gt;
 &lt;img src="https://github.com/user-attachments/assets/e471dc70-a4a1-4c5d-8c81-2a67a2927b3a" 
 width="450" 
 alt="PME_Logo"
 style="border:1px solid #ddd; border-radius:8px; box-shadow:2px 2px 10px rgba(0,0,0,0.1);"&gt;
&lt;/p&gt;</description></item><item><title>redamon</title><link>https://rainmana.github.io/hackyfeed/tools/samugit83-redamon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/samugit83-redamon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RedAmon is an autonomous AI framework designed for seamless cybersecurity operations that integrate reconnaissance, exploitation, and post-exploitation processes into a streamlined pipeline. It stands out by automatically triaging findings, applying code fixes, and generating pull requests in repositories, ensuring human oversight at critical junctures. Its notable features include support for over 38 security tools, integration with major vulnerability scanners, and configurable autonomy to adapt to various security assessment needs.&lt;/p&gt;</description></item><item><title>SILENTTRINITY</title><link>https://rainmana.github.io/hackyfeed/tools/byt3bl33d3r-silenttrinity/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/byt3bl33d3r-silenttrinity/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SILENTTRINITY is a modern, asynchronous, multiplayer command and control (C2) and post-exploitation framework designed for flexibility and stealth, utilizing Python 3 and the .NET Dynamic Language Runtime. It offers features such as real-time updates via Websockets, ECDHE encrypted communications, and a fully modular architecture allowing operators to customize their C2 channels and modules. The framework leverages embedded third-party .NET scripting languages for dynamic task evaluation, enhancing usability and providing capabilities akin to PowerShell without its direct use.&lt;/p&gt;</description></item><item><title>Vegile</title><link>https://rainmana.github.io/hackyfeed/tools/screetsec-vegile/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/screetsec-vegile/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Vegile is a post-exploitation tool designed for maintaining stealthy backdoor/rootkit access on Linux systems. Its primary use case involves establishing persistent access to compromised hosts while enabling features such as process hiding and session unlimited capabilities in Metasploit. Notable functionalities include the ability to automatically restart hidden processes, ensuring persistent access even after termination, and support for various backdoor implementations, including those created with msfvenom.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="vegile---ghost-in-the-shell"&gt;Vegile - Ghost In The Shell&lt;/h1&gt;
&lt;p&gt;&lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/Vegile-Beta-brightgreen.svg?maxAge=259200" alt="Version"&gt;&lt;/a&gt;
&lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/Release-Stable-brightgreen.svg" alt="Stage"&gt;&lt;/a&gt;
&lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/Supported_OS-Linux-orange.svg" alt="Build"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>venom</title><link>https://rainmana.github.io/hackyfeed/tools/r00t-3xp10it-venom/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/r00t-3xp10it-venom/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VENOM is a metasploit shellcode generator and compiler that enables users to create and inject shellcode payloads in various formats such as C#, Python, Ruby, and executable formats like ELF and APK. Its primary use case lies in Red Team operations, where it assists in payload delivery through a web server and leverages automation to handle dependencies and remote connections seamlessly. Notable features include support for multiple scripting languages, integration with compilers for building executables, and functionalities similar to other popular evasion tools.&lt;/p&gt;</description></item><item><title>Viper</title><link>https://rainmana.github.io/hackyfeed/tools/funnywolf-viper/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/funnywolf-viper/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VIPER is an advanced red team platform designed for adversary simulation and cybersecurity assessments, providing users with essential tools and functionalities for efficient red teaming operations. Notable features include a user-friendly interface, multi-platform support across Windows, Linux, and macOS, integration of over 100 post-exploitation modules aligned with the MITRE ATT&amp;amp;CK framework, and a built-in LLM agent for enhanced automation and intelligent decision-making. The platform also allows for custom module development, ensuring flexibility to meet diverse operational needs.&lt;/p&gt;</description></item><item><title>VMkatz</title><link>https://rainmana.github.io/hackyfeed/tools/nikaiw-vmkatz/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nikaiw-vmkatz/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VMkatz is a cybersecurity tool designed to extract Windows credentials and secrets directly from virtual machine memory snapshots and disk images without the need for full exfiltration. It supports various input formats, including VMware snapshots and VirtualBox saved states, allowing efficient retrieval of sensitive data such as NTLM hashes, DPAPI master keys, and Kerberos tickets directly from the hypervisor or NAS. Notably, VMkatz operates as a single static binary, requiring minimal setup and enabling rapid credential access in red team engagements.&lt;/p&gt;</description></item><item><title>WADComs.github.io</title><link>https://rainmana.github.io/hackyfeed/tools/wadcoms-wadcoms.github.io/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wadcoms-wadcoms.github.io/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WADComs is an interactive cheat sheet designed for offensive security professionals, offering a curated list of tools and their commands specifically for targeting Windows and Active Directory environments. Its primary use case is to aid security experts in executing effective penetration testing by providing quick access to essential commands. Notable features include its comprehensive tool listings and command syntaxes, all consolidated in a web-based format for ease of use.&lt;/p&gt;</description></item></channel></rss>