<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security-Tools on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/categories/security-tools/</link><description>Recent content in Security-Tools on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/categories/security-tools/feed.xml" rel="self" type="application/rss+xml"/><item><title>AdminHack</title><link>https://rainmana.github.io/hackyfeed/tools/mishakorzik-adminhack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mishakorzik-adminhack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AdminHack is a script designed to identify admin login pages and assess potential EAR vulnerabilities across web applications by utilizing multi-threading and an extensive wordlist. It supports various web technologies, including PHP, ASP, and HTML, and includes features such as web crawling, custom path support, and results exportation to files. This tool is particularly useful for penetration testing and security assessments of web environments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;img width="99.9%" src="https://raw.githubusercontent.com/mishakorzik/mishakorzik.menu.io/master/img/AdminHackImg/IMG-adc29ed25806177260186a4fbdbe70c9-V.jpg"/&gt;
&lt;p align="center"&gt;
&lt;a href="mailto:developer.mishakorzhik@gmail.com"&gt;&lt;img title="Report bug" src="https://img.shields.io/badge/email-developer.mishakorzhik%40gmail.com-darkred?style=for-the-badge&amp;logo=gmail"&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik/AdminHack"&gt;&lt;img title="Version" src="https://img.shields.io/badge/Version-1.7.6-red?style=for-the-badge&amp;logo="&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik/AdminHack/blob/main/LICENSE"&gt;&lt;img title="License" src="https://img.shields.io/badge/License-GNU-red?style=for-the-badge&amp;logo=gnu"&gt;&lt;/a&gt;
&lt;a href=""&gt;&lt;img title="Python" src="https://img.shields.io/badge/Python-3.x-orange?style=for-the-badge&amp;logo=python"&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik"&gt;&lt;img title="Report" src="https://img.shields.io/badge/Copyring-2021-yellow?style=for-the-badge&amp;logo=github"&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik"&gt;&lt;img title="Autor" src="https://img.shields.io/badge/Author-mishakorzik-yellow?style=for-the-badge&amp;logo=github"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
• &lt;a href="https://github.com/mishakorzik/AdminHack/blob/main/LICENSE"&gt;License&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik/AdminHack/issues"&gt;Issues&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik"&gt;Developer&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik/AdminHack/wiki"&gt;Wikipedia&lt;/a&gt; •
&lt;/p&gt;</description></item><item><title>Android-PIN-Bruteforce</title><link>https://rainmana.github.io/hackyfeed/tools/urbanadventurer-android-pin-bruteforce/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/urbanadventurer-android-pin-bruteforce/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Android-PIN-Bruteforce is a tool that allows users to unlock Android devices by executing a brute-force attack on the lockscreen PIN. Utilizing a rooted Kali Nethunter phone connected via USB OTG, it emulates keyboard input to automatically input and retry PIN combinations, supporting lengths from 1 to 10 digits and providing features such as configurable delays, optimized PIN lists, and the ability to bypass phone pop-ups. The tool does not require the locked device to be rooted and works across various Android versions.&lt;/p&gt;</description></item><item><title>APISecurityBestPractices</title><link>https://rainmana.github.io/hackyfeed/tools/gitguardian-apisecuritybestpractices/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gitguardian-apisecuritybestpractices/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GitGuardian offers a proactive solution for developers to detect and mitigate the exposure of sensitive API secrets, database credentials, and certificates in real-time within their GitHub repositories. Notable features include immediate alerts upon detecting potential leaks before the git process completes, along with comprehensive resources for best development practices and leak mitigation strategies.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="gitguardian-documentation-and-resources"&gt;GitGuardian Documentation and Resources&lt;/h1&gt;
&lt;p&gt;This repository provides resources for developers to keep their secrets secret.&lt;/p&gt;</description></item><item><title>AppVerifier</title><link>https://rainmana.github.io/hackyfeed/tools/soupslurpr-appverifier/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/soupslurpr-appverifier/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AppVerifier is a tool designed for verifying the authenticity of mobile applications by comparing their package names and signing certificate hashes against provided or internally stored information. Its primary use case is to ensure users can confirm the genuineness of apps and share verification results with others efficiently. Notable features include a user-friendly interface for sharing and receiving verification information and compatibility with the Accrescent app store for enhanced security during downloads.&lt;/p&gt;</description></item><item><title>awesome-golang-security</title><link>https://rainmana.github.io/hackyfeed/tools/guardrailsio-awesome-golang-security/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/guardrailsio-awesome-golang-security/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;awesome-golang-security&amp;rdquo; repository is a curated collection of security-related resources tailored specifically for the Go programming language. It includes a variety of tools, libraries, and educational materials aimed at enhancing security in Go applications, notably covering aspects such as web framework hardening, static code analysis, and vulnerability management. Key features include middleware for CSRF protection, static analysis tools to identify security vulnerabilities in code, and comprehensive lists of known vulnerabilities for Go libraries.&lt;/p&gt;</description></item><item><title>awesome-php-security</title><link>https://rainmana.github.io/hackyfeed/tools/guardrailsio-awesome-php-security/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/guardrailsio-awesome-php-security/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;awesome-php-security&amp;rdquo; repository is a curated collection of resources focused on enhancing security in PHP applications. Its primary use case is to provide developers with tools, educational materials, and best practices to mitigate security vulnerabilities. Notable features include sections on web framework hardening, static code analysis tools, and a comprehensive list of vulnerabilities and security advisories.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;br/&gt;
&lt;div align="center"&gt;
&lt;p&gt;A curated list of awesome PHP Security related resources.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://awesome.re"&gt;&lt;img src="https://awesome.re/badge.svg" alt="Awesome"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>awesome-python-security</title><link>https://rainmana.github.io/hackyfeed/tools/guardrailsio-awesome-python-security/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/guardrailsio-awesome-python-security/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;awesome-python-security&amp;rdquo; repository is a curated collection of resources focused on security related to Python programming. Its primary use case is to serve developers and security professionals by aggregating tools, educational materials, and references for secure coding practices, vulnerability detection, and compliance. Notable features include a categorized list of security tools like static code analysis, frameworks for web application security, and links to vulnerability databases and educational resources.&lt;/p&gt;</description></item><item><title>awesome-security-hardening</title><link>https://rainmana.github.io/hackyfeed/tools/decalage2-awesome-security-hardening/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/decalage2-awesome-security-hardening/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome Security Hardening is a comprehensive repository that compiles best practices, guides, and resources for security hardening across various platforms including operating systems, network devices, and cloud services. Its notable features include detailed checklists, benchmarks (like CIS and ANSSI), and a curated list of tools for assessing and implementing security measures, catering to both general users and cybersecurity professionals. The project encourages community contributions to continually enhance its breadth and usability.&lt;/p&gt;</description></item><item><title>BLUESPAWN</title><link>https://rainmana.github.io/hackyfeed/tools/ion28-bluespawn/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ion28-bluespawn/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BLUESPAWN is an active defense and endpoint detection and response tool designed for blue teams to monitor systems in real-time and identify malicious activities within a network. Its notable features include the ability to detect, identify, and eliminate malware, as well as its open-source nature, fostering community collaboration for continuous improvement. The tool emphasizes rapid detection and understanding of the Windows attack surface against advanced threats, while providing visibility into its detection capabilities aligned with the MITRE ATT&amp;amp;CK framework.&lt;/p&gt;</description></item><item><title>bundler-audit</title><link>https://rainmana.github.io/hackyfeed/tools/rubysec-bundler-audit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rubysec-bundler-audit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Bundler-audit is a vulnerability checker for Ruby applications that audits a project&amp;rsquo;s Gemfile.lock for insecure gem versions and insecure sources. It features the ability to ignore certain advisories, provides detailed advisory information, and does not require an active network connection to perform audits. Ideal for integrating into CI workflows, it enables developers to ensure their applications are secure by identifying and suggesting updates for vulnerable gems.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="bundler-audit"&gt;bundler-audit&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/rubysec/bundler-audit/actions/workflows/ruby.yml"&gt;&lt;img src="https://github.com/rubysec/bundler-audit/actions/workflows/ruby.yml/badge.svg" alt="CI"&gt;&lt;/a&gt;
&lt;a href="https://codeclimate.com/github/rubysec/bundler-audit"&gt;&lt;img src="https://codeclimate.com/github/rubysec/bundler-audit.svg" alt="Code Climate"&gt;&lt;/a&gt;
&lt;a href="https://badge.fury.io/rb/bundler-audit"&gt;&lt;img src="https://badge.fury.io/rb/bundler-audit.svg" alt="Gem Version"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>can-i-take-over-dns</title><link>https://rainmana.github.io/hackyfeed/tools/indianajson-can-i-take-over-dns/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/indianajson-can-i-take-over-dns/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Can I Take Over DNS?&amp;rdquo; tool is a resource for security researchers that identifies DNS providers and assesses their vulnerability to DNS takeover attacks. It features a comprehensive list of DNS providers, along with their statuses, fingerprints, and guidance for conducting takeover attempts, facilitating informed bug bounty reporting. The project encourages community contributions to enhance its coverage and accuracy in identifying potential vulnerabilities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;Can I Take Over DNS?&lt;br&gt;&lt;sup&gt;&lt;sub&gt;A list of DNS providers and whether their zones are vulnerable to DNS takeover!&lt;br&gt;&lt;sup&gt; Maintained by&lt;/sup&gt; &lt;a target="_blank" href="https://twitter.com/intent/user?screen_name=indianajson"&gt;&lt;img src="https://img.shields.io/twitter/follow/indianajson?style=social&amp;label=%40indianajson"/&gt;&lt;/a&gt;&amp;nbsp;&lt;/sub&gt;&lt;/sup&gt; &lt;/h1&gt;
&lt;p&gt;Inspired by the popular &lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz"&gt;Can I Take Over XYZ?&lt;/a&gt; project by &lt;a href="https://github.com/EdOverflow"&gt;@EdOverflow&lt;/a&gt; this project is uniquely oriented towards &lt;a href="#what-is-a-dns-takeover"&gt;DNS takeovers&lt;/a&gt;. DNS takeovers pose a high threat to companies, warrant high bounties, and are easy to find. We are trying to make this list comprehensive, so please &lt;a href="#contributions"&gt;contribute&lt;/a&gt;!&lt;/p&gt;</description></item><item><title>cargo-auditable</title><link>https://rainmana.github.io/hackyfeed/tools/rust-secure-code-cargo-auditable/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rust-secure-code-cargo-auditable/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; cargo-auditable is a Rust tool that embeds the dependency tree of a Rust executable in JSON format within the compiled binary, allowing for precise auditing of crate versions against known vulnerabilities. It facilitates vulnerability scanning in production without additional bookkeeping, supporting major operating systems and WebAssembly. Notably, it integrates seamlessly with existing Cargo commands and works in conjunction with tools like cargo-audit to enhance security practices in Rust development.&lt;/p&gt;</description></item><item><title>certificates</title><link>https://rainmana.github.io/hackyfeed/tools/smallstep-certificates/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/smallstep-certificates/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; &lt;code&gt;step-ca&lt;/code&gt; is an online certificate authority designed for secure and automated certificate management in DevOps environments. It features the capability to issue HTTPS and TLS certificates for various services like VMs, containers, and APIs, as well as SSH certificates, while supporting automated certificate management through ACME protocols. Its flexibility allows users to select key types and certificate lifetimes, making it an essential tool for managing cryptographic needs within modern infrastructures.&lt;/p&gt;</description></item><item><title>chromepass</title><link>https://rainmana.github.io/hackyfeed/tools/darkarp-chromepass/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/darkarp-chromepass/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Chromepass is a Python-based console application designed to decrypt saved passwords and cookies from various web browsers, including Google Chrome, Chromium, and others. Its primary use case is for extracting sensitive credentials with minimal detection by antivirus software through custom build methodologies. Notable features include the ability to remotely send the recovered data, customizable error messages, and a tailored user interface.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align='center'&gt;Chromepass - Hacking Chrome Saved Passwords and Cookies&lt;/h1&gt;
&lt;p align="center"&gt;	
 &lt;img src="https://img.shields.io/badge/Platform-Windows-green" /&gt;
	&lt;a href="https://github.com/darkarp/chromepass/releases/latest"&gt;
	&lt;img src="https://img.shields.io/github/v/release/darkarp/chromepass" alt="Release" /&gt;
	&lt;/a&gt;
 &lt;a href="https://travis-ci.org/darkarp/chrome-password-hacking"&gt;
 &lt;img src="https://img.shields.io/badge/build-passing-green" alt="Build Status on CircleCI" /&gt;
	&lt;/a&gt;
 &lt;img src="https://img.shields.io/maintenance/yes/2021" /&gt;
	&lt;/br&gt;
 &lt;a href="https://github.com/darkarp/chromepass/commits/master"&gt;
 &lt;img src="https://img.shields.io/github/last-commit/darkarp/chromepass" /&gt;
 &lt;/a&gt;
 &lt;img alt="Scrutinizer code quality (GitHub/Bitbucket)" src="https://img.shields.io/scrutinizer/quality/g/darkarp/chromepass?style=flat"&gt;
 &lt;a href="https://github.com/darkarp/chromepass/blob/master/LICENSE"&gt;
 &lt;img src="http://img.shields.io/github/license/darkarp/chromepass" /&gt;
 &lt;/a&gt;
 &lt;/br&gt;
 &lt;a href="https://github.com/darkarp/chromepass/issues?q=is%3Aopen+is%3Aissue"&gt;
	&lt;img alt="GitHub issues" src="https://img.shields.io/github/issues/darkarp/chromepass"&gt;
&lt;/a
&lt;a href="https://github.com/darkarp/chromepass/issues?q=is%3Aissue+is%3Aclosed"&gt;
	&lt;img alt="GitHub closed issues" src="https://img.shields.io/github/issues-closed/darkarp/chromepass"&gt;
&lt;/a&gt;
&lt;/br&gt;
 &lt;a href="https://discord.gg/beczNYP"&gt;
 &lt;img src="https://img.shields.io/badge/discord-join-7289DA.svg?logo=discord&amp;longCache=true&amp;style=flat" /&gt;
 &lt;/a&gt;
 &lt;/br&gt;
 &lt;a href="https://github.com/darkarp/chromepass/blob/master/templates/resources/demo.gif" target="_blank"&gt;View Demo&lt;/a&gt;
 ·
 &lt;a href="https://github.com/darkarp/chromepass/issues/new?assignees=&amp;labels=&amp;template=bug_report.md&amp;title="&gt;Report Bug&lt;/a&gt;
 ·
 &lt;a href="https://github.com/darkarp/chromepass/issues/new?assignees=&amp;labels=&amp;template=feature_request.md&amp;title="&gt;Request Feature&lt;/a&gt;
 &lt;/p&gt;</description></item><item><title>cli</title><link>https://rainmana.github.io/hackyfeed/tools/cloudgraphdev-cli/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cloudgraphdev-cli/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CloudGraph is an open-source tool that serves as both a GraphQL API and a Cloud Security Posture Management (CSPM) solution, providing comprehensive compliance checks and type-safe asset inventories across AWS, Azure, GCP, and Kubernetes. Key features include automatic query validation, historical data snapshots, and a unified endpoint for querying resources across multiple cloud environments. Designed for ease of use, CloudGraph allows users to quickly assess their cloud infrastructure and maintain compliance with various security standards.&lt;/p&gt;</description></item><item><title>ContainerSSH</title><link>https://rainmana.github.io/hackyfeed/tools/containerssh-containerssh/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/containerssh-containerssh/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ContainerSSH is an SSH server designed to dynamically launch containers in Kubernetes and Docker, primarily aimed at facilitating lab environments, debugging production systems, and running honeypots. Notable features include ephemeral container management with automatic cleanup, secure and logged access for developers, and comprehensive auditing capabilities that allow for monitoring and analysis of SSH attack patterns. This tool enhances security workflows by leveraging containerization to isolate user activities and preserve system integrity.&lt;/p&gt;</description></item><item><title>content</title><link>https://rainmana.github.io/hackyfeed/tools/complianceascode-content/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/complianceascode-content/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ComplianceAsCode/content is a framework designed to facilitate the creation and maintenance of security policy content for various platforms, including Linux distributions and applications like Firefox. It generates SCAP content, Ansible playbooks, and Bash scripts from easily editable YAML rule files, allowing organizations to automate compliance checks and remediations. Notable features include a powerful build system that reduces redundancy, multi-format outputs tailored to different organizational needs, and comprehensive documentation resources for users.&lt;/p&gt;</description></item><item><title>dpt-shell</title><link>https://rainmana.github.io/hackyfeed/tools/luoyesiqiu-dpt-shell/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/luoyesiqiu-dpt-shell/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; dpt-shell is an Android Dex protection tool designed to hollow out method implementations within DEX files, facilitating runtime reconstruction for enhanced protection of Android applications. Primary use cases include securing APKs and AABs against reverse engineering, with notable features such as customizable protection configurations, exclusion of specific ABIs, and the ability to dump DEX code items for analysis.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="dpt-shell"&gt;dpt-shell&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/luoyesiqiu/dpt-shell/blob/main/LICENSE"&gt;&lt;img src="https://img.shields.io/github/license/luoyesiqiu/dpt-shell" alt=""&gt;&lt;/a&gt; &lt;a href="https://github.com/luoyesiqiu/dpt-shell/releases/latest"&gt;&lt;img src="https://img.shields.io/github/downloads/luoyesiqiu/dpt-shell/total?color=blue" alt=""&gt;&lt;/a&gt; &lt;a href="https://github.com/luoyesiqiu/dpt-shell/issues"&gt;&lt;img src="https://img.shields.io/github/issues-raw/luoyesiqiu/dpt-shell?color=red" alt=""&gt;&lt;/a&gt; &lt;img src="https://img.shields.io/badge/Android-5.0%2B-brightgreen" alt=""&gt;&lt;/p&gt;
&lt;p&gt;English | &lt;a href="./README.zh-CN.md"&gt;简体中文&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;dpt-shell is an Android Dex protection shell that hollows out Dex method implementations and reconstructs them at runtime.&lt;/p&gt;</description></item><item><title>ethereum-lists</title><link>https://rainmana.github.io/hackyfeed/tools/myetherwallet-ethereum-lists/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/myetherwallet-ethereum-lists/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ethereum-lists is a collaborative repository that maintains and updates lists of malicious URLs, fake token addresses, Ethereum addresses, and contract details, facilitating community contributions through pull requests. Its primary use case is to serve as a resource for users to identify and avoid phishing attempts and fraudulent tokens within the Ethereum ecosystem. Notable features include an easily accessible structure for submitting changes and clear guidelines for contributions, promoting community involvement in enhancing security awareness.&lt;/p&gt;</description></item><item><title>extract_otp_secrets</title><link>https://rainmana.github.io/hackyfeed/tools/scito-extract_otp_secrets/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/scito-extract_otp_secrets/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &lt;code&gt;extract_otp_secrets&lt;/code&gt; tool is a Python script designed to extract one-time password (OTP) secrets from QR codes generated by two-factor authentication applications, such as Google Authenticator. It supports multiple input methods, including live capture from a camera, image files, and text files from external QR code readers, while allowing users to export the extracted secrets to JSON or CSV formats or print them as QR codes. Notable features include a built-in GUI for live QR code capture and flexible output options.&lt;/p&gt;</description></item><item><title>Facebook-BugBounty-Writeups</title><link>https://rainmana.github.io/hackyfeed/tools/jaiswalakshansh-facebook-bugbounty-writeups/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jaiswalakshansh-facebook-bugbounty-writeups/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Meta(Facebook) Bug Bounty Writeups repository compiles a collection of documented vulnerabilities discovered on Facebook, showcasing varying bounty rewards ranging from account takeovers to remote code execution. Its primary use case is to serve as a resource for security researchers and ethical hackers to share and learn from reported vulnerabilities in Meta&amp;rsquo;s platforms. Notable features include a chronological organization of writeups, contributing guidelines, and links to detailed analysis articles for each reported bug.&lt;/p&gt;</description></item><item><title>fail2ban</title><link>https://rainmana.github.io/hackyfeed/tools/fail2ban-fail2ban/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/fail2ban-fail2ban/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Fail2Ban is a security tool that monitors log files for multiple failed authentication attempts, automatically banning IP addresses that exceed a specified threshold by updating firewall rules. It supports various standard log files, including those from SSH and Apache, and can be configured to monitor custom log files as needed. Notable features include its capability to work with both IPv4 and IPv6 addresses, and a client-server architecture for managing configurations and interactions.&lt;/p&gt;</description></item><item><title>GH05T-INSTA</title><link>https://rainmana.github.io/hackyfeed/tools/gh05t-hunter5-gh05t-insta/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gh05t-hunter5-gh05t-insta/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GH05T-INSTA is a cybersecurity tool designed for brute-force password recovery on Instagram accounts, suitable for both rooted and non-rooted Android devices. It features automatic IP address anonymization, error detection and resolution, and allows users to create custom password lists for enhanced effectiveness. While marketed as a hacking tool, the developers emphasize the legal implications and responsibility of ethical usage.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;The best way to hack Instagram&lt;/b&gt;&lt;/p&gt;
&lt;img src="https://media.tenor.com/qMER41oNWx8AAAAC/youve-been-hacked-gregory-brown.gif"&gt;
&lt;h1&gt;New Working Tool Link : &lt;a href="https://github.com/GH05T-HUNTER5/insta-breaker"&gt;Click&lt;/a&gt;&lt;/h1&gt;
&lt;h2 id="installation-kali"&gt;Installation {Kali}&lt;/h2&gt;
&lt;h3 id="bruteforce-gh05t-insta"&gt;BruteForce (GH05T-INSTA)&lt;/h3&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;apt install git
&lt;/code&gt;&lt;/pre&gt;&lt;pre tabindex="0"&gt;&lt;code&gt;git clone https://github.com/GH05T-HUNTER5/GH05T-INSTA
&lt;/code&gt;&lt;/pre&gt;&lt;pre tabindex="0"&gt;&lt;code&gt;cd GH05T-INSTA
&lt;/code&gt;&lt;/pre&gt;&lt;pre tabindex="0"&gt;&lt;code&gt;sudo bash setup.sh
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;code&gt;Configuring Tor server to open control port&lt;/code&gt;&lt;/p&gt;</description></item><item><title>gitleaks</title><link>https://rainmana.github.io/hackyfeed/tools/gitleaks-gitleaks/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gitleaks-gitleaks/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Gitleaks is a tool designed for the detection of sensitive information, such as passwords, API keys, and tokens, within Git repositories and other files. Its primary use case is to identify and prevent the accidental exposure of secrets in code, and it offers notable features such as integration with GitHub Actions and pre-commit hooks for continuous monitoring. Additionally, Gitleaks utilizes a robust detection engine based on regular expressions to analyze codebases efficiently.&lt;/p&gt;</description></item><item><title>Gmail-Hack</title><link>https://rainmana.github.io/hackyfeed/tools/zard2007-gmail-hack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zard2007-gmail-hack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Gmail-Hack is a Python-based tool designed for unauthorized access to Gmail accounts, primarily focused on users operating in Termux or Linux environments. It features a straightforward installation process and is intended for educational purposes, with caveats regarding its ethical use. Notably, the tool claims to facilitate hacking actions with minimal setup time, emphasizing its ease of use for individuals familiar with command-line interfaces.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="gmail-hack"&gt;Gmail-Hack&lt;/h1&gt;
&lt;h4 id="easy-gmail-hacking-in-python"&gt;Easy gmail hacking in python&lt;/h4&gt;
&lt;blockquote&gt;
&lt;p&gt;Я не несу ответственности за ваши действия. Скачивая программное обеспечение из этого репозитория, вы соглашаетесь с &lt;a href="https://github.com/mishakorzik/Gmail-Hack/blob/main/LICENSE"&gt;лицензией&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>gosec</title><link>https://rainmana.github.io/hackyfeed/tools/securego-gosec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/securego-gosec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; gosec is a security analysis tool designed to inspect Go source code for potential security vulnerabilities by scanning the Abstract Syntax Tree (AST) and Static Single Assignment (SSA) representation. It utilizes pattern-based rules, SSA-based analyzers, and taint analysis to identify common issues like SQL injection and XSS. Notable features include customizable rule selection, various output formats, and integration as a GitHub Action for continuous security monitoring.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="gosec---go-security-checker"&gt;gosec - Go Security Checker&lt;/h1&gt;
&lt;p&gt;Inspects source code for security problems by scanning the Go AST and SSA code representation.&lt;/p&gt;</description></item><item><title>gotestwaf</title><link>https://rainmana.github.io/hackyfeed/tools/wallarm-gotestwaf/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wallarm-gotestwaf/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GoTestWAF is a versatile tool designed for simulating API and web application attacks, supporting a multitude of protocols like REST, GraphQL, and gRPC, among others. It evaluates the effectiveness of security solutions such as Web Application Firewalls and API gateways by generating malicious HTTP requests with encoded payloads, allowing for comprehensive security testing and reporting of vulnerabilities. Notable features include customizable payloads, diverse encoding options, and the ability to specify request placeholders for precise attack simulations.&lt;/p&gt;</description></item><item><title>grapefruit</title><link>https://rainmana.github.io/hackyfeed/tools/chichou-grapefruit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/chichou-grapefruit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Grapefruit is an open-source mobile security testing suite designed for runtime mobile application instrumentation, supporting both iOS and Android platforms through a web-based interface powered by Frida. It allows users to inspect, hook, and modify mobile apps with features including method hooking, cryptographic API interception, filesystem and SQLite database inspection, memory scanning, and real-time log monitoring. Additionally, it provides support for various frameworks like Flutter and React Native, as well as advanced analysis and decompilation capabilities for a comprehensive security assessment.&lt;/p&gt;</description></item><item><title>h2csmuggler</title><link>https://rainmana.github.io/hackyfeed/tools/bishopfox-h2csmuggler/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bishopfox-h2csmuggler/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; h2cSmuggler is a specialized tool that facilitates the smuggling of HTTP traffic past insecure proxy configurations by leveraging HTTP/2 cleartext (h2c) communications with compatible back-end servers. Its primary use case involves testing web servers for vulnerabilities related to improperly configured &lt;code&gt;proxy_pass&lt;/code&gt; directives that could allow attackers to bypass access controls and proxy rules. Notable features include the ability to scan multiple endpoints concurrently, integration with popular security tools like Burp Suite, and a test environment for demonstration and experimentation with h2c smuggling techniques.&lt;/p&gt;</description></item><item><title>hackbar2.1.3</title><link>https://rainmana.github.io/hackyfeed/tools/mr-xn-hackbar2.1.3/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mr-xn-hackbar2.1.3/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Hackbar 2.1.3 is a Firefox extension designed for penetration testing that facilitates web application security assessments by allowing users to manipulate HTTP requests. The tool enables users to load specific payloads and automate tasks, making it suitable for security professionals. Notable features include compatibility with various versions of browsers, and updates that offer newer functionalities and security patches.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;h1 id="hackbar213"&gt;hackbar2.1.3&lt;/h1&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;firefox hackbar收费前的残留版本&lt;/br&gt;
使用方法&lt;/br&gt;
打开firefox的插件目录&lt;/br&gt;
&lt;img src="./img/1.png" alt="Image text"&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;然后点这里&lt;/br&gt;
&lt;img src="./img/2.png" alt="Image text"&gt;&lt;/br&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;h3 id="加载4c98c9c7-fc13-4622-b08a-a18923469c1cxpi--即可"&gt;加载{4c98c9c7-fc13-4622-b08a-a18923469c1c}.xpi 即可&lt;/h3&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;h3 id="一定记住要关闭插件的自动更新否则浏览器会自动更新插件到收费版本"&gt;一定记住要关闭插件的自动更新！！！，否则浏览器会自动更新插件到收费版本！！!&lt;/h3&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;设置方法如下图所示:&lt;/br&gt;
&lt;img src="./img/3.png" alt="unable updae"&gt;&lt;/p&gt;</description></item><item><title>hardening</title><link>https://rainmana.github.io/hackyfeed/tools/konstruktoid-hardening/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/konstruktoid-hardening/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Hardening Ubuntu. Systemd edition.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Hardening Ubuntu. Systemd edition.&lt;/p&gt;</description></item><item><title>ighack</title><link>https://rainmana.github.io/hackyfeed/tools/noob-hackers-ighack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/noob-hackers-ighack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ighack is a Bash-based tool designed for testing the password strength of Instagram accounts through brute-force attacks, compatible with both rooted and non-rooted Android devices using Termux. It offers features such as a stable Instagram API, support for Tor to enhance anonymity during attacks, and both auto and manual attack options for user flexibility. The tool is maintained and provides a beginner-friendly interface, allowing easy installation and usage.&lt;/p&gt;</description></item><item><title>Impulse</title><link>https://rainmana.github.io/hackyfeed/tools/limerboy-impulse/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/limerboy-impulse/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Impulse is a modern denial-of-service toolkit designed for executing various DDoS attack methods, including SMS, email, and multiple network traffic overload techniques like SYN and UDP floods. Its notable features include a user-friendly interface and support for methods such as Slowloris and NTP amplification, allowing attackers to exploit vulnerabilities across multiple platforms including Windows, Linux, and Termux. This tool can be leveraged to stress test and demonstrate the potential impact of denial-of-service attacks on targeted systems.&lt;/p&gt;</description></item><item><title>insta-hack</title><link>https://rainmana.github.io/hackyfeed/tools/incrediblehacker-insta-hack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/incrediblehacker-insta-hack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Insta-hack is a comprehensive tool designed for Instagram account compromise, featuring capabilities for information gathering, brute force attacks, and automated reporting. It operates on both Termux and Kali Linux without the need for root access and includes essential functionalities such as script updates and removals. The tool is intended strictly for educational use, with a clear emphasis on responsible usage.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="about-tool"&gt;About tool&lt;/h2&gt;
&lt;p&gt;All in one Instagram hacking tool available (Insta information gathering, Insta brute force, Insta account auto repoter)&lt;/p&gt;</description></item><item><title>Instabruteforce</title><link>https://rainmana.github.io/hackyfeed/tools/hackertrackersj-instabruteforce/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hackertrackersj-instabruteforce/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Instabruteforce is a Python-based tool designed for brute-forcing Instagram accounts using a list of proxies. Its primary use case is to test account security by attempting to crack passwords from a supplied list, with features that include proxy management, statistics tracking, and customizable bot modes for varying performance. The program also incorporates a pruning system to optimize proxy usage by removing underperforming proxies from its database.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="instagram-bruter"&gt;Instagram Bruter&lt;/h1&gt;
&lt;p&gt;This program will brute force any Instagram account you send it its way given a list of proxies.&lt;/p&gt;</description></item><item><title>Instagram-Hacker</title><link>https://rainmana.github.io/hackyfeed/tools/importctf-instagram-hacker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/importctf-instagram-hacker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Instagram-Hacker is a Python script designed for performing bruteforce attacks on Instagram accounts. Its primary use case is to automate the process of testing multiple password combinations for a given username using predefined password lists. Notable features include the requirement for the mechanize and requests libraries, and the option to integrate with Tor for enhanced anonymity during the attack process.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="instagram-hacker"&gt;Instagram-Hacker&lt;/h1&gt;
&lt;p&gt;This is a script for Instagram bruteforce attacks. WARNING THIS IS A REAL TOOL!&lt;/p&gt;</description></item><item><title>instahack</title><link>https://rainmana.github.io/hackyfeed/tools/evildevill-instahack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/evildevill-instahack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Instahack is a robust brute-force framework designed for testing Instagram accounts, utilizing Bash and Python for efficient password testing. It features multi-threading, Tor integration for anonymity, and customizable attack options, enabling users to conduct ethical penetration testing and OSINT gathering. The tool supports auto-resume capabilities and is optimized for high-volume password attempts.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;🚀 Instahack - Advanced Instagram Brute Force Framework&lt;/h1&gt;
&lt;p align="center"&gt;
 &lt;a href="https://instagram.com/blckspidr"&gt;&lt;img src="https://img.shields.io/badge/MADE%20IN-Pakistan-success?style=for-the-badge"&gt;&lt;/a&gt;
 &lt;a href="https://youtube.com/Hackerwasii"&gt;&lt;img src="https://img.shields.io/badge/Tool-Instahack-green?style=for-the-badge"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/evildevill/instahack"&gt;&lt;img src="https://img.shields.io/github/v/release/evildevill/instahack?style=for-the-badge"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/evildevill"&gt;&lt;img src="https://img.shields.io/badge/Maintained%3F-Yes-brightgreen?style=for-the-badge"&gt;&lt;/a&gt;
 &lt;img src="https://visitor-badge.laobi.icu/badge?page_id=HackerWaSi" alt="visitor badge"/&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
 &lt;img width="60%" src="https://github.com/evildevill/instahack/blob/master/assets/20210219_144319.jpg" alt="Instahack Screenshot"/&gt;
&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id="-about-instahack"&gt;🔍 About Instahack&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Instahack&lt;/strong&gt; is a high-performance Instagram brute-force tool crafted in Bash and Python, capable of testing millions of passwords efficiently. It uses &lt;strong&gt;Tor routing&lt;/strong&gt;, &lt;strong&gt;Instagram Android app signatures&lt;/strong&gt;, and &lt;strong&gt;customizable attack logic&lt;/strong&gt; for stealthy, anonymous operations.&lt;/p&gt;</description></item><item><title>IP-Tracer</title><link>https://rainmana.github.io/hackyfeed/tools/rajkumardusad-ip-tracer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rajkumardusad-ip-tracer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; IP-Tracer is a command-line tool designed for Termux and Linux systems that allows users to track IP addresses by retrieving detailed information through the ip-api service. Its primary use case includes identifying the geographic and network details of both the user&amp;rsquo;s own IP address and that of other targets, with straightforward command syntax for operation. Notable features include installation ease, simple command-based usage, and the ability to gather IP data quickly.&lt;/p&gt;</description></item><item><title>ipdrone</title><link>https://rainmana.github.io/hackyfeed/tools/noob-hackers-ipdrone/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/noob-hackers-ipdrone/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ipdrone is a Python-based tool designed for IP lookup and geolocation tracking, intended for use on both rooted and non-rooted Android devices via Termux. Notable features include real-time location tracking, ease of use for beginners, and consistent updates, enabling users to gather detailed information about specific IP addresses.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
&lt;a href="https://www.noob-hackers.com/"&gt;&lt;img title="Made in INDIA" src="https://img.shields.io/badge/MADE%20IN-INDIA-SCRIPT?colorA=%23ff8100&amp;colorB=%23017e40&amp;colorC=%23ff0000&amp;style=for-the-badge"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
&lt;a href="https://www.noob-hackers.com/"&gt;&lt;img title="Made in INDIA" src="https://img.shields.io/badge/Tool-Ipdrone-green.svg"&gt;&lt;/a&gt;
&lt;a href="https://www.noob-hackers.com/"&gt;&lt;img title="Version" src="https://img.shields.io/badge/Version-1.0-green.svg?style=flat-square"&gt;&lt;/a&gt;
&lt;a href="https://www.noob-hackers.com/"&gt;&lt;img title="Maintainence" src="https://img.shields.io/badge/Maintained%3F-yes-green.svg"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
&lt;a href="https://www.noob-hackers.com/"&gt;&lt;img title="Ipdrone" src="https://user-images.githubusercontent.com/49580304/96668887-f96ce580-1310-11eb-9849-2ee012aecdf5.jpg"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
&lt;a href="https://github.com/noob-hackers"&gt;&lt;img title="Github" src="https://img.shields.io/badge/noob-hackers-brightgreen?style=for-the-badge&amp;logo=github"&gt;&lt;/a&gt;
&lt;a href="https://rebrand.ly/noobhackers"&gt;&lt;img title="YouTube" src="https://img.shields.io/badge/YouTube-Noob Hackers-red?style=for-the-badge&amp;logo=Youtube"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
&lt;a href="https://github.com/noob-hackers"&gt;&lt;img title="Language" src="https://img.shields.io/badge/Made%20with-Bash-1f425f.svg?v=103"&gt;&lt;/a&gt;
&lt;a href="https://github.com/noob-hackers"&gt;&lt;img title="Followers" src="https://img.shields.io/github/followers/noob-hackers?color=blue&amp;style=flat-square"&gt;&lt;/a&gt;
&lt;a href="https://github.com/noob-hackers"&gt;&lt;img title="Stars" src="https://img.shields.io/github/stars/noob-hackers/ipdrone?color=red&amp;style=flat-square"&gt;&lt;/a&gt;
&lt;a href="https://github.com/noob-hackers"&gt;&lt;img title="Forks" src="https://img.shields.io/github/forks/noob-hackers/ipdrone?color=red&amp;style=flat-square"&gt;&lt;/a&gt;
&lt;a href="https://github.com/noob-hackers"&gt;&lt;img title="Watching" src="https://img.shields.io/github/watchers/noob-hackers/ipdrone?label=Watchers&amp;color=blue&amp;style=flat-square"&gt;&lt;/a&gt;
&lt;a href="https://github.com/noob-hackers"&gt;&lt;img title="Licence" src="https://img.shields.io/badge/License-MIT-blue.svg"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;h2 id="about-tool-"&gt;ABOUT TOOL :&lt;/h2&gt;
&lt;p&gt;Ipdrone is a simply python script, which can be used to Ip lookup and to get information of perticualr target Ip. This tool works on both rooted Android device and Non-rooted Android device.&lt;/p&gt;</description></item><item><title>IpHack</title><link>https://rainmana.github.io/hackyfeed/tools/mishakorzik-iphack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mishakorzik-iphack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; IpHack is a Python-based tool designed for tracking IP locations and performing network testing. Its primary use case includes determining the geographical location of IP addresses, checking proxy status, and gathering detailed device information based on IP, with notable features such as an enhanced design, the ability to search for IPs behind Cloudflare, and various inquiry methods for making requests. The tool can be easily installed via pip and offers functionalities to track both direct IP addresses and domains, as well as to verify proxies.&lt;/p&gt;</description></item><item><title>keychain</title><link>https://rainmana.github.io/hackyfeed/tools/danielrobbins-keychain/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/danielrobbins-keychain/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Keychain is a tool designed to manage SSH and GPG keys efficiently by serving as a persistent frontend to &lt;code&gt;ssh-agent&lt;/code&gt; and &lt;code&gt;gpg-agent&lt;/code&gt;, allowing a single long-running instance per system. Its primary use case is to minimize the frequency of passphrase entries to once per reboot, enhancing security and convenience, especially for remote cron jobs. Notable features include seamless integration with key management, bash completion support for various command-line options, and user-friendly installation procedures.&lt;/p&gt;</description></item><item><title>Keylogger</title><link>https://rainmana.github.io/hackyfeed/tools/aydinnyunus-keylogger/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/aydinnyunus-keylogger/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Keylogger tool captures keyboard, mouse, screenshot, and microphone inputs on a target computer and sends the collected data to the user&amp;rsquo;s email for security testing purposes. Notable features include self-deletion capabilities if the target discovers the code and automated data transmission every 10 seconds. The tool is easy to deploy by running a single script with minimal setup requirements.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="inputs-to-mail"&gt;Inputs To Mail.&lt;/h1&gt;
&lt;p&gt;Get Keyboard,Mouse,ScreenShot,Microphone Inputs and Send to your Mail.
Purpose of the project is testing the security of information systems&lt;/p&gt;</description></item><item><title>kubestriker</title><link>https://rainmana.github.io/hackyfeed/tools/vchinnipilli-kubestriker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vchinnipilli-kubestriker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Kubestriker is a robust security auditing tool designed specifically for Kubernetes environments, facilitating the identification and mitigation of misconfigurations that may expose clusters to attacks. It offers extensive checks across multiple platforms, including self-hosted Kubernetes, Amazon EKS, Azure AKS, and Google GKE, alongside visualized attack path analytics to enhance situational awareness. Additionally, Kubestriker supports CI/CD pipeline integrations, enabling continuous security scanning during the deployment process.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;br&gt;
 &lt;a href="https://github.com/vchinnipilli/kubestriker"&gt;&lt;img align="center" src="https://raw.githubusercontent.com/vchinnipilli/kubestriker/master/media/kube-striker.png" height="400" width="400"&gt;&lt;/a&gt;
&lt;/h1&gt;
&lt;h4 align="center"&gt; A Blazing fast Security Auditing tool for &lt;a href="https://kubernetes.io/" target="_blank"&gt;kubernetes&lt;/a&gt;!!&lt;/h4&gt;
&lt;p&gt;&lt;img src="https://img.shields.io/badge/python-v3.0+-blue.svg?style=plastic" alt="Python"&gt;
&lt;img src="https://img.shields.io/badge/contributions-welcome-orange.svg?style=plastic" alt="Contributions welcome"&gt;
&lt;a href="https://github.com/vchinnipilli/kubestrike/issues"&gt;&lt;img src="https://img.shields.io/github/issues/vchinnipilli/kubestriker?style=plastic" alt="GitHub Issues"&gt;&lt;/a&gt;
&lt;img src="https://img.shields.io/github/stars/vchinnipilli/kubestriker?style=plastic" alt="Stars Badge"&gt;
&lt;a href="https://hits.seeyoufarm.com"&gt;&lt;img src="https://hits.seeyoufarm.com/api/count/incr/badge.svg?url=https%3A%2F%2Fgithub.com%2Fvchinnipilli%2Fkubestriker&amp;amp;count_bg=%2379C83D&amp;amp;title_bg=%23555555&amp;amp;icon=&amp;amp;icon_color=%23E7E7E7&amp;amp;title=Visitors&amp;amp;edge_flat=false" alt="Hits"&gt;&lt;/a&gt;
&lt;a href="https://github.com/vchinnipilli/kubestriker"&gt;&lt;img src="https://img.shields.io/badge/Maintained%3F-yes-green.svg?style=plastic" alt="Maintenance"&gt;&lt;/a&gt;
&lt;a href="https://opensource.org/licenses/Apache_License_2.0"&gt;&lt;img src="https://img.shields.io/badge/license-Apache_License_2.0-blue.svg?style=plastic" alt="License"&gt;&lt;/a&gt;
&lt;br/&gt;&lt;br/&gt;&lt;/p&gt;</description></item><item><title>landrun</title><link>https://rainmana.github.io/hackyfeed/tools/zouuup-landrun/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zouuup-landrun/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Landrun is a lightweight sandboxing tool for Linux designed to run processes securely using the Landlock kernel security module, enabling fine-grained control over filesystem and network access without the need for root privileges or containerization. Notable features include kernel-level security, customizable read, write, and execution permissions for files and directories, and TCP access control, making it suitable for securely executing commands in an isolated environment. With a minimal overhead architecture, it offers a practical solution for developers needing enhanced process security.&lt;/p&gt;</description></item><item><title>MHDDoS</title><link>https://rainmana.github.io/hackyfeed/tools/matrixtm-mhddos/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/matrixtm-mhddos/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; MHDDoS is a Python-based DDoS attack scripting tool that features 57 distinct attack methods, primarily targeting Layer 7 protocols. It offers advanced techniques such as GET and POST floods, as well as bypass mechanisms for various DDoS protection services, enabling users to perform sophisticated denial-of-service attacks while adhering to ethical guidelines. Notable capabilities include methods for random subdomains, slowloris attacks, and cookie manipulation, making it a versatile tool for testing web application resilience.&lt;/p&gt;</description></item><item><title>MySQL_Fake_Server</title><link>https://rainmana.github.io/hackyfeed/tools/fnmsd-mysql_fake_server/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/fnmsd-mysql_fake_server/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; MySQL Fake Server is a tool designed for penetration testing, specifically emulating a MySQL server to exploit vulnerabilities related to file reading and Java deserialization in MySQL JDBC clients. Notable features include the ability to read large binary files, support for custom configuration through a JSON file, and the option to preview or save the contents of read files, all implemented in pure Python 3 without external dependencies.&lt;/p&gt;</description></item><item><title>Name-That-Hash</title><link>https://rainmana.github.io/hackyfeed/tools/bee-san-name-that-hash/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bee-san-name-that-hash/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Name-That-Hash is a modern hash identification tool designed to accurately identify various hash types, such as MD5 and NTLM. Its notable features include popularity ratings to prioritize common hashes, hash summaries for informed selection, accessible color output, and JSON-based API access for integration into other projects. The tool is intended to provide a more user-friendly and up-to-date alternative to older hash identification systems.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
&lt;img src="logo.gif"&gt;
&lt;p align="center"&gt;➡️ &lt;a href="http://discord.skerritt.blog"&gt;Discord&lt;/a&gt; | &lt;a href="https://nth.skerritt.blog"&gt;Website&lt;/a&gt; ⬅️&lt;/p&gt;
&lt;p align="center"&gt;The Modern Hash Identification System&lt;br&gt;
&lt;code&gt;pip3 install name-that-hash &amp;&amp; nth&lt;/code&gt;
 &lt;br&gt;
 &lt;a href="https://nth.skerritt.blog"&gt;Web App with no install needed&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>onecli</title><link>https://rainmana.github.io/hackyfeed/tools/onecli-onecli/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/onecli-onecli/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OneCLI is an open-source credential management gateway designed for AI agents, providing a secure method to store and inject API keys without exposing them to the agents themselves. It offers features such as AES-256-GCM encrypted secret storage, transparent credential injection, host and path matching for secret routing, and support for multiple agents with scoped permissions. The system enables easy setup via Docker and integrates with external vaults like Bitwarden for on-demand credential access, enhancing security and manageability in API interactions.&lt;/p&gt;</description></item><item><title>OSCE3-Complete-Guide</title><link>https://rainmana.github.io/hackyfeed/tools/joasasantos-osce3-complete-guide/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/joasasantos-osce3-complete-guide/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The OSCE³ and OSEE Study Guide provides comprehensive resources for mastering web security concepts and techniques relevant to the Offensive Security Certified Expert (OSCE) and Offensive Security Exploitation Expert (OSEE) certifications. Its primary use case is to aid cybersecurity professionals in studying various attack vectors and methodologies, including but not limited to SQL injections, cross-site scripting, and remote code execution. Notable features include an extensive list of reference materials, as well as detailed discussions of numerous vulnerabilities and exploitation strategies.&lt;/p&gt;</description></item><item><title>OSCP-Exam-Report-Template</title><link>https://rainmana.github.io/hackyfeed/tools/whoisflynn-oscp-exam-report-template/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/whoisflynn-oscp-exam-report-template/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The OSCP Exam Report Template provides structured templates for documenting OSCP Lab and Exam reports, designed to reduce the anxiety associated with report writing. Notable features include a detailed Table of Contents, machine-specific sections with links for easy navigation, and additional headers for crucial elements such as scan results and proof documentation. The template facilitates a comprehensive and organized representation of a penetration testing process following the OSCP guidelines.&lt;/p&gt;</description></item><item><title>OSCP-Exam-Report-Template-Markdown</title><link>https://rainmana.github.io/hackyfeed/tools/noraj-oscp-exam-report-template-markdown/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/noraj-oscp-exam-report-template-markdown/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The OSCP Exam Report Template in Markdown is designed to streamline the report writing process for Offensive Security exams, eliminating the need for traditional word processors like LaTeX and Microsoft Word. It allows users to write reports in Markdown, which enhances efficiency, reduces formatting issues, and integrates version control capabilities. Notable features include a script for automatic report generation, support for various text editors, and a clean, professional layout for certification documentation.&lt;/p&gt;</description></item><item><title>pdfrip</title><link>https://rainmana.github.io/hackyfeed/tools/mufeedvh-pdfrip/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mufeedvh-pdfrip/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PDFRip is a multithreaded PDF password cracking tool written in Rust, featuring advanced capabilities such as wordlist attacks, custom query builders, and structured password brute-forcing techniques. Notable features include prepared verifier hot paths for efficient password attempts, exact progress tracking, checkpointing for session resumption, and output in JSON format for automation. It supports various brute-force methods, including bounded masks, date, and number generators, making it a versatile utility for recovering PDF passwords.&lt;/p&gt;</description></item><item><title>penelope</title><link>https://rainmana.github.io/hackyfeed/tools/brightio-penelope/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/brightio-penelope/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Penelope is a modern shell handler designed to replace netcat for remote code execution (RCE) exploitation, focusing on enhancing post-exploitation workflows. It supports multiple listeners, session management, and dynamic interaction with target systems through modules, facilitating features such as file transfers, logging, and shell activity management. Built entirely in Python, it offers a standalone operation mode and compatibility across Unix-like systems, thereby streamlining the exploitation process for security professionals.&lt;/p&gt;</description></item><item><title>personal-security-checklist</title><link>https://rainmana.github.io/hackyfeed/tools/lissy93-personal-security-checklist/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lissy93-personal-security-checklist/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; 🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2026&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2026&lt;/p&gt;</description></item><item><title>privacy.sexy</title><link>https://rainmana.github.io/hackyfeed/tools/undergroundwires-privacy.sexy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/undergroundwires-privacy.sexy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; privacy.sexy is a cross-platform tool designed to enforce privacy and security best practices on Windows, macOS, and Linux systems. Its notable features include integration with unit, integration, and end-to-end testing workflows, as well as security checks for dependencies using Static Analysis Security Testing (SAST), ensuring a robust and secure user experience.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="privacysexy--privacy-is-sexy"&gt;privacy.sexy — Privacy is sexy&lt;/h1&gt;
&lt;blockquote&gt;
&lt;p&gt;Enforce privacy &amp;amp; security best-practices on Windows, macOS and Linux, because privacy is sexy.&lt;/p&gt;</description></item><item><title>raven</title><link>https://rainmana.github.io/hackyfeed/tools/cycodelabs-raven/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cycodelabs-raven/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Raven is a developer security tool designed to enhance the security of software projects by providing capabilities for managing and monitoring secrets, vulnerabilities, and compliance across development environments. Its primary use case is to integrate seamlessly into CI/CD pipelines, ensuring that code remains secure throughout the software development lifecycle. Notable features include real-time detection of security risks, a user-friendly interface, and integration with various popular development tools and platforms.&lt;/p&gt;</description></item><item><title>Search-That-Hash</title><link>https://rainmana.github.io/hackyfeed/tools/jayy001-search-that-hash/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jayy001-search-that-hash/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Search-That-Hash is a hash cracking automation tool that quickly queries popular online hash databases and utilizes Hashcat for local cracking when offline. It features automatic type identification through integration with Name-That-Hash, a fast search capability, extensibility for adding new hash sources, and an accessible design. Additionally, the tool offers both CLI and JSON API outputs, ensuring flexibility in usage for security professionals.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
&lt;img src="Pictures/logo.gif"&gt;
&lt;p align="center"&gt;➡️ &lt;a href="http://discord.skerritt.blog"&gt;Discord&lt;/a&gt; ⬅️&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://codecov.io/gh/HashPals/Search-That-Hash/branch/main/graph/badge.svg?token=5CYVJ15U4T"/&gt; &lt;img src="https://pepy.tech/badge/search-that-hash/month"&gt; &lt;img alt="Discord" src="https://img.shields.io/discord/754001738184392704"&gt;&lt;/p&gt;
&lt;p align="center"&gt;The Fastest Hash Cracking System&lt;br&gt;
&lt;code&gt;pip3 install search-that-hash &amp;&amp; sth&lt;/code&gt;
&lt;/p&gt;</description></item><item><title>Smart-Contract-Auditor-Tools-and-Techniques</title><link>https://rainmana.github.io/hackyfeed/tools/shanzson-smart-contract-auditor-tools-and-techniques/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/shanzson-smart-contract-auditor-tools-and-techniques/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Smart Contract Auditor Tools and Techniques repository provides a compilation of resources and tools aimed at enhancing the security and auditing processes for smart contracts. It features a variety of transaction visualization tools, educational pathways for aspiring auditors, and various miscellaneous tools for detecting vulnerabilities, simulating attacks, and analyzing smart contract behavior across Ethereum and other EVM-compatible blockchains. Notably, it includes links to web-based platforms for on-chain investigation and defense against potential exploits, making it a critical resource for both new and experienced blockchain security professionals.&lt;/p&gt;</description></item><item><title>SocialBox-Termux</title><link>https://rainmana.github.io/hackyfeed/tools/samsesh-socialbox-termux/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/samsesh-socialbox-termux/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SocialBox-Termux is a brute-force attack framework designed for social media platforms such as Facebook, Gmail, Instagram, and Twitter. It facilitates penetration testing by automating the login attempts using various credentials, making it useful for security professionals. Notable features include compatibility with Termux on Android, easy installation via a shell script, and the ability to run under a VPN for enhanced privacy.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="socialbox-termux"&gt;SocialBox-Termux&lt;/h1&gt;
&lt;p&gt;SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By samsesh&lt;/p&gt;</description></item><item><title>spicedb</title><link>https://rainmana.github.io/hackyfeed/tools/authzed-spicedb/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/authzed-spicedb/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SpiceDB is an open-source authorization database inspired by Google&amp;rsquo;s Zanzibar system, designed to provide scalable and secure permission checks for applications. It allows developers to define schemas, manage relationships, and conduct queries to assess user permissions on resources, addressing critical access control threats. Notable features include its relational-like structure for defining authorization models and its capability to handle complex permission queries for enhanced security management.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;a href="https://authzed.com#gh-dark-mode-only" target="_blank"&gt;
 &lt;img width="300" src="https://github.com/user-attachments/assets/0ebf4718-283b-4c40-b567-1d577c0a2e03" alt="spicedb logo"&gt;
 &lt;/a&gt;
 &lt;a href="https://authzed.com#gh-light-mode-only" target="_blank"&gt;
 &lt;img width="300" src="https://github.com/user-attachments/assets/577a72f9-4fdd-49f8-b1d6-e53025d219b8" alt="spicedb Logo"&gt;
 &lt;/a&gt;
&lt;/h1&gt;
&lt;h3 align="center"&gt;
 SpiceDB sets the standard for authorization that &lt;i&gt;scales&lt;/i&gt;.
 &lt;br/&gt;&lt;br/&gt;Scale with&lt;br/&gt;
 Traffic • Dev Velocity • Functionality • Geography
&lt;/h3&gt;
&lt;p align="center"&gt;
 &lt;a href="https://github.com/authzed/spicedb/releases"&gt;&lt;img alt="release badge" src="https://img.shields.io/github/v/release/authzed/spicedb?color=%236EC93F&amp;label=latest%20release&amp;sort=semver&amp;style=flat-square"&gt;&lt;/a&gt;
 &amp;nbsp;
 &lt;a href="https://hub.docker.com/repository/docker/authzed/spicedb" target="_blank"&gt;&lt;img alt="docker pulls badge" src="https://img.shields.io/docker/pulls/authzed/spicedb?color=%23448CE6&amp;style=flat-square"&gt;&lt;/a&gt;
 &amp;nbsp;
 &lt;a href="https://authzed.com/blog/go-ecosystem"&gt;&lt;img alt="built with Go badge" src="https://img.shields.io/badge/built_with-Go-367B99.svg?style=flat-square"&gt;&lt;/a&gt;
 &amp;nbsp;
 &lt;a href="https://app.codecov.io/gh/authzed/spicedb"&gt;&lt;img alt="coverage" src="https://img.shields.io/codecov/c/github/authzed/spicedb"&gt;&lt;/a&gt;
 &amp;nbsp;
 &lt;a href="https://www.bestpractices.dev/en/projects/6348" target="_blank"&gt;&lt;img alt="cii badge" src="https://img.shields.io/cii/percentage/6348?style=flat-square&amp;label=cii%20best%20practices&amp;color=F8D44B"&gt;&lt;/a&gt;
 &amp;nbsp;
 &lt;a href="https://securityscorecards.dev/viewer/?uri=github.com/authzed/spicedb" target="_blank"&gt;&lt;img alt="ssf badge" src="https://api.securityscorecards.dev/projects/github.com/authzed/spicedb/badge"&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>stego-toolkit</title><link>https://rainmana.github.io/hackyfeed/tools/dominicbreuker-stego-toolkit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dominicbreuker-stego-toolkit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Stego-Toolkit is a Docker image designed for tackling steganography challenges frequently encountered in CTF platforms. It comes pre-loaded with a variety of popular tools and screening scripts that facilitate the analysis of images and audio files for hidden data, allowing users to effortlessly run command-line and GUI applications within a containerized environment. Notable features include automation scripts for file screening and support for both Linux and Windows tools via Wine, ensuring a comprehensive toolkit for steganography analysis.&lt;/p&gt;</description></item><item><title>Storm-Breaker</title><link>https://rainmana.github.io/hackyfeed/tools/ultrasecurity-storm-breaker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ultrasecurity-storm-breaker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Storm-Breaker is a versatile cybersecurity tool that enables unauthorized access to device information, including location, webcam, and microphone on smartphones, without requiring user permissions. Notable features include a revamped web user interface, the ability to operate on personal hosting environments, auto-download functionality for Ngrok, and comprehensive logging capabilities. This tool is primarily designed for penetration testing and social engineering exercises within controlled environments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;br&gt;
 &lt;a href="https://github.com/ultrasecurity/Storm-Breaker"&gt;&lt;img src=".imgs/1demo.png" alt="StormBreaker"&gt;&lt;/a&gt;
&lt;/h1&gt;
&lt;h4 align="center"&gt;A Tool With Attractive Capabilities. &lt;/h4&gt;
&lt;p align="center"&gt;
 &lt;a href="http://python.org"&gt;
 &lt;img src="https://img.shields.io/badge/python-v3-blue"&gt;
 &lt;/a&gt;
 &lt;a href="https://php.net"&gt;
 &lt;img src="https://img.shields.io/badge/php-7.4.4-green"
 alt="php"&gt;
 &lt;/a&gt;
 &lt;a href="https://en.wikipedia.org/wiki/Linux"&gt;
 &lt;img src="https://img.shields.io/badge/Platform-Linux-red"&gt;
 &lt;/a&gt;
&lt;/p&gt;</description></item><item><title>Swift-Keylogger</title><link>https://rainmana.github.io/hackyfeed/tools/skreweverything-swift-keylogger/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/skreweverything-swift-keylogger/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Swift-Keylogger is a macOS tool designed to monitor and log keystrokes while providing contextual information about the applications generating those keystrokes. It utilizes low-level HID APIs to ensure stability despite Apple’s deprecation of certain high-level APIs and organizes the logged data by application and timestamps in a structured directory format. The tool can be integrated with Cocoa applications, offering both executable usage and source code incorporation, making it flexible for developers.&lt;/p&gt;</description></item><item><title>T-LOAD</title><link>https://rainmana.github.io/hackyfeed/tools/noob-hackers-t-load/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/noob-hackers-t-load/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; T-load is a bash-based script designed for customizing the Termux terminal interface on both rooted and non-rooted Android devices. Its primary use case is to enhance the user experience by providing an attractive and engaging terminal environment, complete with sound effects and an updated layout. Notable features include an easy installation process, new interface options, and the ability to revert to the default terminal settings.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
&lt;a href="https://bit.ly/3jPqXEB"&gt;&lt;img title="Made in INDIA" src="https://img.shields.io/badge/MADE%20IN-INDIA-SCRIPT?colorA=%23ff8100&amp;colorB=%23017e40&amp;colorC=%23ff0000&amp;style=for-the-badge"&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>tabby</title><link>https://rainmana.github.io/hackyfeed/tools/tabby-sec-tabby/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tabby-sec-tabby/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; TABBY is a static code analysis tool designed for Java that rapidly identifies various types of vulnerabilities within Java applications. It utilizes the Soot framework to transform Java bytecode (JAR/WAR/CLASS files) into a code property graph (CPG), which is then stored in a Neo4j graph database, allowing for complex taint analysis and vulnerability chain detection through simple Cypher queries. Notable features include the ability to discover deserialization attack chains and common web vulnerabilities, significantly enhancing the efficiency of code audits by reducing manual search efforts.&lt;/p&gt;</description></item><item><title>TermuxCyberArmy</title><link>https://rainmana.github.io/hackyfeed/tools/err0r-ica-termuxcyberarmy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/err0r-ica-termuxcyberarmy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; TermuxCyberArmy is a cybersecurity toolkit designed for Termux, primarily facilitating various hacking and scripting tasks. Notable features include compatibility with multiple Linux distributions such as Kali Linux and Parrot OS, as well as ease of installation using basic command-line operations. The tool is particularly suited for security practitioners seeking to enhance their skills in penetration testing and ethical hacking.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://i.postimg.cc/xCkjVwLD/OIG3-t8bf-O0ft.jpg" alt="logo"&gt;&lt;/p&gt;
&lt;h2 id="update-19062024"&gt;Update 19/06/2024&lt;/h2&gt;
&lt;p&gt;Login form has been removed&lt;/p&gt;</description></item><item><title>thug</title><link>https://rainmana.github.io/hackyfeed/tools/buffer-thug/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/buffer-thug/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Thug is a low-interaction honeyclient developed in Python that emulates the behavior of a web browser to detect and analyze client-side attacks by allowing malicious content to exploit its simulated environment. Its primary use case is research and detection of vulnerabilities in client applications, akin to a honeypot but focused on the client side. Notable features include its ability to mimic user interactions and support for detailed analysis of malicious payloads in a controlled setting.&lt;/p&gt;</description></item><item><title>tripwire-open-source</title><link>https://rainmana.github.io/hackyfeed/tools/tripwire-tripwire-open-source/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tripwire-tripwire-open-source/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Open Source Tripwire® is a file integrity monitoring tool designed to detect and alert users about unauthorized changes to files and directories by comparing the current filesystem state against a predefined baseline. It features a highly configurable policy file system for specifying which attributes to monitor, the capability to sign configuration and report files for added security, and the ability to generate and manage cryptographic keys for multiple machines. Users can utilize it to establish secure baselines and automate periodic checks, enhancing overall system integrity and security.&lt;/p&gt;</description></item><item><title>v3-periphery</title><link>https://rainmana.github.io/hackyfeed/tools/uniswap-v3-periphery/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/uniswap-v3-periphery/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Uniswap V3 Periphery is a collection of smart contracts designed to facilitate interactions with the Uniswap V3 Protocol, providing essential functionalities such as token swaps and liquidity operations. Its primary use case involves integrating these periphery functions into decentralized applications, enabling developers to leverage the protocol&amp;rsquo;s capabilities. Notable features include the ability to import Solidity interfaces for seamless contract interactions and comprehensive local deployment options for testing against mainnet bytecode.&lt;/p&gt;</description></item><item><title>VAmPI</title><link>https://rainmana.github.io/hackyfeed/tools/erev0s-vampi/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/erev0s-vampi/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VAmPI is a vulnerable API built on Flask that includes the OWASP Top 10 vulnerabilities for APIs, designed to assess the efficacy of security tools in detecting API-related security issues. It features a global toggle to enable or disable vulnerabilities during testing, along with token-based authentication and a Swagger UI for direct interaction. The tool serves both educational and practical purposes, allowing users to practice security testing and improve their understanding of API vulnerabilities.&lt;/p&gt;</description></item><item><title>zizmor</title><link>https://rainmana.github.io/hackyfeed/tools/zizmorcore-zizmor/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zizmorcore-zizmor/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; &lt;code&gt;zizmor&lt;/code&gt; is a static analysis tool designed specifically for GitHub Actions, aimed at identifying common security vulnerabilities within CI/CD workflows. It detects issues such as template injection vulnerabilities, accidental credential leakage, excessive permission grants, and misleading &lt;code&gt;git&lt;/code&gt; references, among others. The tool&amp;rsquo;s primary use case is to enhance the security posture of automated workflows by providing insights and recommendations for remediation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="-zizmor"&gt;🌈 zizmor&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://zizmor.sh/"&gt;&lt;img src="https://img.shields.io/badge/%F0%9F%8C%88-zizmor-white?labelColor=white" alt="zizmor"&gt;&lt;/a&gt;
&lt;a href="https://github.com/zizmorcore/zizmor/actions/workflows/ci.yml"&gt;&lt;img src="https://github.com/zizmorcore/zizmor/actions/workflows/ci.yml/badge.svg" alt="CI"&gt;&lt;/a&gt;
&lt;a href="https://crates.io/crates/zizmor"&gt;&lt;img src="https://img.shields.io/crates/v/zizmor" alt="Crates.io"&gt;&lt;/a&gt;
&lt;a href="https://repology.org/project/zizmor/versions"&gt;&lt;img src="https://repology.org/badge/tiny-repos/zizmor.svg" alt="Packaging status"&gt;&lt;/a&gt;
&lt;a href="https://github.com/sponsors/woodruffw"&gt;&lt;img src="https://img.shields.io/github/sponsors/woodruffw?style=flat&amp;amp;logo=githubsponsors&amp;amp;labelColor=white&amp;amp;color=white" alt="GitHub Sponsors"&gt;&lt;/a&gt;
&lt;a href="https://discord.com/invite/PGU3zGZuGG"&gt;&lt;img src="https://img.shields.io/badge/Discord-%235865F2.svg?logo=discord&amp;amp;logoColor=white" alt="Discord"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;code&gt;zizmor&lt;/code&gt; is a static analysis tool for GitHub Actions.&lt;/p&gt;</description></item></channel></rss>