<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Web-Security on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/categories/web-security/</link><description>Recent content in Web-Security on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/categories/web-security/feed.xml" rel="self" type="application/rss+xml"/><item><title>AllHackingTools</title><link>https://rainmana.github.io/hackyfeed/tools/mishakorzik-allhackingtools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mishakorzik-allhackingtools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AllHackingTools is a penetration testing toolkit designed for Termux that automates the installation and management of various hacking tools. Its primary use case is to facilitate the setup and customization of a hacking environment on Termux, allowing users to quickly download and run tools directly from the interface. Notable features include an updated installer with enhanced design elements, streamlined updating capabilities, and improved system stability.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;img width="99.9%" src="https://raw.githubusercontent.com/mishakorzik/mishakorzik.menu.io/master/img/Logo/IMG-cd518796cb4b0527368a1b9dd67a8889-V.jpg"/&gt;
&lt;p align="center"&gt;
&lt;a href="https://github.com/mishakorzik/AllHackingTools"&gt;&lt;img title="Version" src="https://img.shields.io/badge/Version-2.7.4-yellow?style=for-the-badge&amp;logo="&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik/AllHackingTools/blob/main/LICENSE"&gt;&lt;img title="License" src="https://img.shields.io/badge/License-GNU-brightgreen?style=for-the-badge&amp;logo=gnu"&gt;&lt;/a&gt;
&lt;a href=""&gt;&lt;img title="Python" src="https://img.shields.io/badge/Python-3.8-red?style=for-the-badge&amp;logo=python"&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik"&gt;&lt;img title="Report" src="https://img.shields.io/badge/Copyring-2021-red?style=for-the-badge&amp;logo=github"&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik"&gt;&lt;img title="Autor" src="https://img.shields.io/badge/Author-mishakorzik-blue?style=for-the-badge&amp;logo=github"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
• &lt;a href="https://github.com/mishakorzik/AllHackingTools/blob/main/LICENSE"&gt;License&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik/AllHackingTools/issues"&gt;Issues&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik/AllHackingTools/projects"&gt;Project&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik/AllHackingTools/wiki"&gt;Wikipedia&lt;/a&gt; •
&lt;/p&gt;</description></item><item><title>Attiny85</title><link>https://rainmana.github.io/hackyfeed/tools/mtk911-attiny85/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mtk911-attiny85/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The DigiSpark Attiny85 repository provides a cost-effective alternative to Rubber Ducky, enabling users to program the Attiny85 to function as a Human Interface Device (HID) that sends keystrokes to a computer. It includes various pre-built payloads such as a Wi-Fi password stealer, UAC bypass, and keylogger, allowing for a range of offensive actions from data exfiltration to system exploitation. Users can easily set up their development environment and execute these payloads using the Arduino IDE.&lt;/p&gt;</description></item><item><title>awesome-bugbounty-tools</title><link>https://rainmana.github.io/hackyfeed/tools/vavkamil-awesome-bugbounty-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vavkamil-awesome-bugbounty-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome Bug Bounty Tools is a comprehensive, curated repository of various tools utilized in the bug bounty hunting and penetration testing process. It encompasses a wide range of categories including reconnaissance, exploitation, and miscellaneous utilities, featuring tools for tasks such as subdomain enumeration, various injection techniques, and vulnerability scanning. With an extensive selection of resources, this repository aims to streamline the bug hunting workflow for security professionals.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="awesome-bug-bounty-tools-awesome"&gt;Awesome Bug Bounty Tools &lt;a href="https://awesome.re"&gt;&lt;img src="https://awesome.re/badge.svg" alt="Awesome"&gt;&lt;/a&gt;&lt;/h1&gt;
&lt;blockquote&gt;
&lt;p&gt;A curated list of various bug bounty tools&lt;/p&gt;</description></item><item><title>awesome-web-hacking</title><link>https://rainmana.github.io/hackyfeed/tools/infoslack-awesome-web-hacking/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/infoslack-awesome-web-hacking/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;awesome-web-hacking&amp;rdquo; repository serves as a comprehensive resource for individuals seeking to enhance their knowledge of web application security. It includes categorized lists of books, documentation, tools, cheat sheets, and educational courses, making it a valuable starting point for learning about penetration testing and various security vulnerabilities. Notable features include contributions from the community through pull requests and a diverse array of resources for both beginners and experienced security professionals.&lt;/p&gt;</description></item><item><title>bashbunny-payloads</title><link>https://rainmana.github.io/hackyfeed/tools/hak5-bashbunny-payloads/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hak5-bashbunny-payloads/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Bash Bunny Payload Library provides a collection of community-developed payloads and extensions specifically designed for the Hak5 Bash Bunny, utilizing DuckyScript™ and Bash scripting languages. Its primary use case is to enable users to automate various tasks through the intuitive deployment of scripts, with notable features including community contributions and the ability to submit new payloads via pull requests. Additionally, the repository encourages collaboration and offers resources for building payloads through its associated PayloadStudio.&lt;/p&gt;</description></item><item><title>BlackWidow</title><link>https://rainmana.github.io/hackyfeed/tools/1n3-blackwidow/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/1n3-blackwidow/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BlackWidow is a Python-based web application spider designed for gathering critical information from target websites, including subdomains, URLs, dynamic parameters, email addresses, and phone numbers. It features an integrated fuzzer, Inject-X, which scans dynamic URLs for common OWASP vulnerabilities, and automatically saves collected data into organized text files. Notable functionalities include deep crawling with customizable levels, verbose logging, and support for fuzzing unique parameters for enhanced security testing.&lt;/p&gt;</description></item><item><title>burp-ai-agent</title><link>https://rainmana.github.io/hackyfeed/tools/six2dez-burp-ai-agent/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/six2dez-burp-ai-agent/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Burp AI Agent is an extension for Burp Suite that enhances security testing workflows by integrating AI capabilities. It supports multiple AI backends, allowing users to run both passive and active vulnerability scans across a wide array of vulnerability classes, while featuring options for privacy settings and audit logging for compliance. Additionally, it can connect to external AI agents via the MCP, enabling autonomous operation and enriching the security analysis process.&lt;/p&gt;</description></item><item><title>Burp-Suite-Certified-Practitioner-Exam-Study</title><link>https://rainmana.github.io/hackyfeed/tools/botesjuan-burp-suite-certified-practitioner-exam-study/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/botesjuan-burp-suite-certified-practitioner-exam-study/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Burp Suite Certified Practitioner Exam Study repository contains comprehensive study notes and practical labs designed to aid candidates in preparing for the Burp Suite Certified Practitioner (BSCP) Exam. It includes over 110 labs covering essential topics such as scanning, footholds, privilege escalation, and data exfiltration, alongside practical techniques and scripts tailored for effective web application security testing. Notable features include a structured approach to vulnerability assessment and recommendations for additional training materials and resources to enhance exam readiness.&lt;/p&gt;</description></item><item><title>BurpBounty</title><link>https://rainmana.github.io/hackyfeed/tools/wagiro-burpbounty/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wagiro-burpbounty/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Burp Bounty is a Burp Suite extension designed to enhance both active and passive scanning capabilities by allowing users to create personalized scanning rules through an intuitive graphical interface. The tool offers advanced pattern search and payload improvement features to build custom issue profiles, catering to automated and manual penetration testing workflows. A notable aspect is the availability of profiles shared by the community, which further augments its functionality.&lt;/p&gt;</description></item><item><title>BurpCrypto</title><link>https://rainmana.github.io/hackyfeed/tools/whwlsfb-burpcrypto/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/whwlsfb-burpcrypto/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BurpCrypto is a collection of encryption plugins for Burp Suite, supporting multiple encryption algorithms including AES, RSA, and DES, as well as the execution of JavaScript code for encryption tasks. Its primary use case is to enhance the capabilities of security professionals by allowing them to integrate cryptographic functions directly into their testing workflows. Notable features include a user-friendly interface for key management and seamless integration with Burp Suite&amp;rsquo;s payload processing system.&lt;/p&gt;</description></item><item><title>burpgpt</title><link>https://rainmana.github.io/hackyfeed/tools/aress31-burpgpt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/aress31-burpgpt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BurpGPT is an advanced security extension that integrates with Burp Suite to analyze web traffic using AI-driven techniques, specifically utilizing OpenAI&amp;rsquo;s models to uncover security vulnerabilities that conventional scanners may overlook. Its notable features include customizable prompts for tailored analysis, automated report generation summarizing potential security issues, and granular control over the analysis parameters. This tool streamlines the vulnerability assessment process, improving the efficiency and accuracy of security professionals while handling the complexities of web application security.&lt;/p&gt;</description></item><item><title>BurpSuite-collections</title><link>https://rainmana.github.io/hackyfeed/tools/mr-xn-burpsuite-collections/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mr-xn-burpsuite-collections/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BurpSuite-collections is a repository containing various non-BApp Store plugins for Burp Suite, aimed at enhancing penetration testing capabilities. Notable features include SQL injection detection, automated SSRF vulnerability scanning, and the ability to manage variables within Burp, allowing security professionals to effectively discover and exploit vulnerabilities. The project serves primarily as a resource for learning and research related to Burp Suite plugins.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="burp-suite-collections"&gt;Burp-Suite-collections&lt;/h1&gt;
&lt;h4 id="burpsuite-相关收集项目插件主要是非bapp-store商店"&gt;BurpSuite 相关收集项目，插件主要是非BApp Store（商店）&lt;/h4&gt;
&lt;blockquote&gt;
&lt;p&gt;所有的汉化或者使用burpsuite都是在你配置好了Java环境的前提下！！！&lt;a href="./books/%E5%A6%82%E4%BD%95%E5%9C%A864%E4%BD%8DWindows%2010%E4%B8%8B%E5%AE%89%E8%A3%85java%E5%BC%80%E5%8F%91%E7%8E%AF%E5%A2%83.pdf"&gt;相关教程&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;最新版（202212之后）&lt;del&gt;激活参考这个&lt;a href="https://github.com/h3110w0r1d-y/BurpLoaderKeygen"&gt;项目&lt;/a&gt; 自己解决，本项目不提供&lt;/del&gt;&lt;/p&gt;</description></item><item><title>caddy-waf</title><link>https://rainmana.github.io/hackyfeed/tools/fabriziosalmi-caddy-waf/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/fabriziosalmi-caddy-waf/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Caddy WAF is a customizable middleware for the Caddy web server that functions as a Web Application Firewall, designed to provide advanced protection against a wide range of web-based threats. Key features include regex-based filtering, IP blacklisting, geo-blocking, rate limiting, anomaly scoring, and detailed monitoring capabilities, all aimed at securing applications while ensuring high performance through techniques like zero-copy networking and wait-free concurrency. The tool also supports seamless dynamic configuration reloads and offers precise insights into traffic and security events, making it a robust solution for safeguarding web applications.&lt;/p&gt;</description></item><item><title>collection-document</title><link>https://rainmana.github.io/hackyfeed/tools/tom0li-collection-document/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tom0li-collection-document/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Collection Document repository is a curated compilation of quality safety articles aimed at enhancing knowledge in various cybersecurity domains. Its primary use case includes providing resources on topics such as penetration testing, threat detection, cloud security, and personal security, among others. Notable features of the collection include links to deep dives into specialized security areas, ongoing updates, and insights into modern security solutions like AI safety and zero trust architecture.&lt;/p&gt;</description></item><item><title>commix</title><link>https://rainmana.github.io/hackyfeed/tools/commixproject-commix/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/commixproject-commix/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Commix is an open-source penetration testing tool designed for automating the detection and exploitation of command injection vulnerabilities in web applications. It supports multiple Python versions and includes extensive documentation with usage examples, facilitating ease of deployment and operation for security professionals. Notable features include comprehensive exploitation capabilities and a user-friendly interface for navigating various commands and options.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="left"&gt;
 &lt;img alt="CommixProject" src="https://commixproject.com/images/logo.png" height="120" /&gt;
 &lt;p align="left"&gt;
 &lt;a href="https://github.com/commixproject/commix/actions/workflows/builds.yml"&gt;&lt;img alt="Builds Tests" src="https://github.com/commixproject/commix/actions/workflows/builds.yml/badge.svg"&gt;&lt;/a&gt;
 &lt;a href="http://www.python.org/download/"&gt;&lt;img alt="Python 2.6|2.7|3.x" src="https://img.shields.io/badge/python-2.6|2.7|3.x-yellow.svg"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/commixproject/commix/blob/master/LICENSE.txt"&gt;&lt;img alt="GPLv3 License" src="https://img.shields.io/badge/license-GPLv3-red.svg"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/commixproject/commix/issues?q=is%3Aissue+is%3Aclosed"&gt;&lt;img alt="GitHub closed issues" src="https://img.shields.io/github/issues-closed-raw/commixproject/commix.svg?colorB=ff0000"&gt;&lt;/a&gt;
 &lt;a href="https://x.com/commixproject"&gt;&lt;img alt="X" src="https://img.shields.io/badge/x-@commixproject-blue.svg"&gt;&lt;/a&gt;
 &lt;/p&gt;
&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Commix&lt;/strong&gt; (short for [&lt;strong&gt;comm&lt;/strong&gt;]and [&lt;strong&gt;i&lt;/strong&gt;]njection e[&lt;strong&gt;x&lt;/strong&gt;]ploiter) is an open source penetration testing tool, written by &lt;strong&gt;&lt;a href="https://github.com/stasinopoulos"&gt;Anastasios Stasinopoulos&lt;/a&gt;&lt;/strong&gt; (&lt;strong&gt;&lt;a href="https://x.com/ancst"&gt;@ancst&lt;/a&gt;&lt;/strong&gt;), that automates the detection and exploitation of &lt;strong&gt;&lt;a href="https://www.owasp.org/index.php/Command_Injection"&gt;command injection&lt;/a&gt;&lt;/strong&gt; vulnerabilities.&lt;/p&gt;</description></item><item><title>Cracker-Tool</title><link>https://rainmana.github.io/hackyfeed/tools/cracker911181-cracker-tool/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cracker911181-cracker-tool/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Cracker-Tool is a multifunctional hacking and penetration testing toolbox designed for Termux users, featuring a variety of capabilities including IP tools, subdomain scanning, DDoS attacks, SQL injections, and more. Notable functionalities include Cloudflare bypass for DDoS, identity generators, and a variety of administrative tools, making it a comprehensive resource for security testing. The tool is implemented in Python and Bash, emphasizing ease of installation and set up within the Termux environment.&lt;/p&gt;</description></item><item><title>crlfuzz</title><link>https://rainmana.github.io/hackyfeed/tools/dwisiswant0-crlfuzz/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dwisiswant0-crlfuzz/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CRLFuzz is a specialized tool for detecting CRLF injection vulnerabilities in web applications, developed in Go for high performance. It offers flexible scanning options, including targeting individual URLs or multiple URLs from a list, and provides various command line flags to customize request methods, output results to files, and adjust concurrency levels. Notable features include support for custom headers, proxy usage, and integration capabilities with other security tools through standard input.&lt;/p&gt;</description></item><item><title>DDoS-Ripper</title><link>https://rainmana.github.io/hackyfeed/tools/palahsu-ddos-ripper/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/palahsu-ddos-ripper/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DDoS-Ripper is a Python-based tool designed to simulate Distributed Denial-of-Service (DDoS) attacks for educational and testing purposes. It supports various operating systems, including Linux, Termux, Windows, and MacOS, and allows users to specify the target IP address and intensity of the attack through command line parameters. Notable features include multi-platform compatibility and straightforward installation instructions, emphasizing an ethical usage disclaimer.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="ddos-ripper"&gt;DDoS-Ripper&lt;/h1&gt;
&lt;h1 id="what-is-a-ddos-attack"&gt;What is a DDoS Attack?&lt;/h1&gt;
&lt;p&gt;A Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Internet traffic&lt;/p&gt;</description></item><item><title>Ethical-Hacking-Tools</title><link>https://rainmana.github.io/hackyfeed/tools/hhhrrrttt222111-ethical-hacking-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hhhrrrttt222111-ethical-hacking-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ethical-Hacking-Tools is a repository that provides a curated collection of tools and resources for ethical hacking and penetration testing. Its primary use case is to assist cybersecurity professionals in identifying and addressing vulnerabilities within computer systems and networks. Notable features include links to various Linux distributions optimized for security testing, such as Kali Linux and Parrot OS, along with educational content on hacking practices and hacker classifications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="ethical-hacking-tools"&gt;Ethical-Hacking-Tools&lt;/h1&gt;
&lt;br&gt;
&lt;p&gt;&lt;a href="https://forthebadge.com"&gt;&lt;img src="https://forthebadge.com/images/badges/built-with-love.svg" alt="forthebadge"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>faraday</title><link>https://rainmana.github.io/hackyfeed/tools/infobyte-faraday/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/infobyte-faraday/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Faraday is an open-source vulnerability management tool designed to facilitate the organization, aggregation, and visualization of security data in a multiuser environment. Its primary use case is to streamline vulnerability discovery and management by integrating various community tools while providing insightful visualizations for both managers and analysts. Notable features include its command-line interface for direct terminal access, support for multiple installation methods (including Docker and PyPi), and the ability to automate scanning tools within CI/CD pipelines.&lt;/p&gt;</description></item><item><title>FavFreak</title><link>https://rainmana.github.io/hackyfeed/tools/devanshbatham-favfreak/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/devanshbatham-favfreak/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; FavFreak is a reconnaissance tool that streamlines the process of gathering information using favicon hashes from a list of URLs. It fetches the favicon.ico for each URL, computes its hash, and matches it against a predefined fingerprint dictionary to identify known services. Key features include sorting results by favicon hashes and generating Shodan dorks, making it a valuable asset for bug bounty hunters and OSINT investigations.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="favfreak---weaponizing-faviconico-for-bugbounties--osint-and-what-not"&gt;FavFreak - Weaponizing favicon.ico for BugBounties , OSINT and what not&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://raw.githubusercontent.com/devanshbatham/FavFreak/master/static/logo.PNG" alt="FacFreak"&gt;&lt;/p&gt;</description></item><item><title>Garud</title><link>https://rainmana.github.io/hackyfeed/tools/r0x4r-garud/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/r0x4r-garud/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Garud is an automation tool designed for reconnaissance, specifically targeting sub-domain enumeration and vulnerability scanning for injection points such as XSS, SSRF, and SSTI. It integrates multiple popular bug bounty tools, including Assetfinder, Subfinder, and Nuclei, to streamline the scanning process, outputting results systematically while notifying the user upon completion. Notable features include the ability to filter and identify low-hanging vulnerabilities, along with systematic data collection and reporting functionalities.&lt;/p&gt;</description></item><item><title>hack-tools</title><link>https://rainmana.github.io/hackyfeed/tools/hacktoolspack-hack-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hacktoolspack-hack-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;hack-tools&amp;rdquo; repository offers a comprehensive collection of cybersecurity tools including DOS, information gathering utilities, malware creation kits, and remote administration tools, catering to a wide audience from enthusiasts to professionals. Key features include multi-platform support for Windows and Linux, compatibility with several programming languages, and the availability of free tools; however, users are cautioned about the legal implications and varying development statuses of the tools provided.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://i.giphy.com/media/2Y0ecuTsnAvZK/200.gif" alt="animated" /&gt;
&lt;/p&gt;</description></item><item><title>Hacking-Tools</title><link>https://rainmana.github.io/hackyfeed/tools/yogsec-hacking-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/yogsec-hacking-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Hacking-Tools is a curated collection of penetration testing and ethical hacking utilities, including essential tools from Kali Linux. It is organized into categories such as information gathering, vulnerability analysis, and exploitation tools, facilitating easy navigation and use. Notable features include a featured tool, BugBoard, designed to automate vulnerability detection for bug bounty hunters and security researchers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="hacking-tools"&gt;Hacking-Tools&lt;/h1&gt;
&lt;div align="center" style="margin: 30px 0;"&gt;
A curated list of penetration testing and ethical hacking tools, organized by category. This collection includes Kali Linux tools and other notable utilities.
&lt;/br&gt;
&lt;p&gt;&lt;img src="https://media0.giphy.com/media/v1.Y2lkPTc5MGI3NjExdHJjMXpvb2hkdXJvN2Y3cmllNG81YXNsem90ejhwY2NqbXB5OXgzaiZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw/137EaR4vAOCn1S/giphy.gif" alt="Hacking Anime"&gt;&lt;/p&gt;</description></item><item><title>HackTools</title><link>https://rainmana.github.io/hackyfeed/tools/lascc-hacktools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lascc-hacktools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HackTools is an all-in-one browser extension designed for offensive security professionals to facilitate web application penetration testing. It consolidates numerous penetration testing tools, including dynamic reverse shell generators, XSS payloads, and SQL injection payloads, allowing users to access critical functions quickly through a user-friendly command palette. The extension aims to enhance efficiency by eliminating the need to search for payloads across various platforms, all accessible within the browser&amp;rsquo;s DevTools environment.&lt;/p&gt;</description></item><item><title>HackVault</title><link>https://rainmana.github.io/hackyfeed/tools/0xsobky-hackvault/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xsobky-hackvault/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HackVault is a container repository designed for both defensive and offensive hacking tools. Its primary use case is to centralize and share various hacking utilities, which are intended to be continuously updated with new content over time. Notable features include a structured Wiki section for detailed information and ongoing additions to its arsenal of tools.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="hackvault"&gt;HackVault&lt;/h1&gt;
&lt;p&gt;This is a container repository for my defensive/offensive hacks. Go check the &lt;a href="https://github.com/0xsobky/HackVault/wiki"&gt;Wiki section&lt;/a&gt; for more information!
Ideally, it&amp;rsquo;d be continually updated with new interesting stuff over time!&lt;/p&gt;</description></item><item><title>inceptor</title><link>https://rainmana.github.io/hackyfeed/tools/klezvirus-inceptor/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/klezvirus-inceptor/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Inceptor is a Windows-focused penetration testing tool designed to automate the bypassing of anti-virus (AV) and endpoint detection and response (EDR) solutions. It features a template-based PE packer that allows extensive user customization and integrates various encoding methods for encoding, compressing, or encrypting shellcode. Notably, Inceptor supports transformations of existing binaries into shellcode and distinguishes between loader-independent and loader-dependent encoders to enhance payload obfuscation and evade detection.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;:triangular_flag_on_post: This is the public repository of Inceptor, for latest version and updates please consider supporting us through &lt;a href="https://porchetta.industries/"&gt;https://porchetta.industries/&lt;/a&gt;&lt;/p&gt;</description></item><item><title>inql</title><link>https://rainmana.github.io/hackyfeed/tools/doyensec-inql/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/doyensec-inql/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; InQL is an open-source Burp Suite extension tailored for advanced GraphQL testing, enabling security professionals to effectively identify vulnerabilities within GraphQL APIs. It features a user-friendly interface, robust query manipulation capabilities, and integration with Burp&amp;rsquo;s existing tools, significantly enhancing the testing process for GraphQL applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="inql-v612---burp-extension-for-advanced-graphql-testing"&gt;InQL v6.1.2 - Burp Extension for Advanced GraphQL Testing&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://doyensec.com/research.html"&gt;&lt;img src="https://img.shields.io/static/v1?logo=data:image/png;base64,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&amp;amp;link=https://doyensec.com/research.html&amp;amp;message=Research%20Island&amp;amp;&amp;amp;label=Doyensec&amp;amp;color=purple" alt="Doyensec Research Island"&gt;&lt;/a&gt;
&lt;img src="https://img.shields.io/github/license/doyensec/inql?logo=github&amp;amp;color=darkgreen" alt="GitHub"&gt;
&lt;img src="https://img.shields.io/github/v/release/doyensec/inql?label=latest%20release&amp;amp;logo=github" alt="GitHub release (latest by date)"&gt;
&lt;img src="https://img.shields.io/github/release-date/doyensec/inql?display_date=published_at&amp;amp;logo=github" alt="GitHub Release Date"&gt;
&lt;a href="https://github.com/doyensec/inql/tree/dev"&gt;&lt;img src="https://img.shields.io/github/commits-difference/doyensec/inql?base=master&amp;amp;head=dev&amp;amp;label=dev+branch+ahead+by&amp;amp;color=bright&amp;amp;logo=github" alt="dev branch ahead by"&gt;&lt;/a&gt;
&lt;a href="AUTHORS"&gt;&lt;img src="https://img.shields.io/github/contributors/doyensec/inql?logo=github&amp;amp;color=black" alt="GitHub contributors"&gt;&lt;/a&gt;
&lt;a href="https://github.com/doyensec/inql/issues?q=is%3Aissue+is%3Aopen+label%3A%22Help+Wanted%22"&gt;&lt;img src="https://img.shields.io/github/issues/doyensec/inql/Help%20Wanted?color=red&amp;amp;logo=github" alt="GitHub issues by-label"&gt;&lt;/a&gt;
&lt;a href="https://github.com/doyensec/inql/issues?q=is%3Aissue+is%3Aopen+label%3A%22Good+First+Issue%22"&gt;&lt;img src="https://img.shields.io/github/issues/doyensec/inql/Good%20First%20Issue?color=f0a&amp;amp;logo=github" alt="GitHub issues by-label"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>JNDI-Injection-Exploit-Plus</title><link>https://rainmana.github.io/hackyfeed/tools/cckuailong-jndi-injection-exploit-plus/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cckuailong-jndi-injection-exploit-plus/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; JNDI-Injection-Exploit-Plus is a comprehensive tool designed for generating operational JNDI links, facilitating background services with RMI, LDAP, and HTTP servers to test vulnerabilities effectively. It enhances the functionality of standard JNDI exploit tools by offering additional remote and local reference gadgets, support for multiple JDK versions, and the capability to create base64 and hex payloads, making it a robust resource for security testing. With over 75 deserialization gadgets included, it provides a diverse set of options for vulnerability assessments.&lt;/p&gt;</description></item><item><title>jsql-injection</title><link>https://rainmana.github.io/hackyfeed/tools/ron190-jsql-injection/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ron190-jsql-injection/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; jSQL Injection is a lightweight, open-source tool designed for identifying database information from servers, optimized for penetration testing. It is cross-platform, supporting Windows, Linux, and Mac with Java compatibility from versions 21 to 25, and is integrated into various security-focused distributions such as Kali Linux. Notable features include a user-friendly interface, support for multiple database engines, and comprehensive testing functionalities, making it suitable for both novice and experienced security analysts.&lt;/p&gt;</description></item><item><title>KawaiiGPT</title><link>https://rainmana.github.io/hackyfeed/tools/marcmcbri1982-kawaiigpt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/marcmcbri1982-kawaiigpt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; KawaiiGPT is an open-source command-line tool that provides seamless access to various large language models, including DeepSeek, Gemini, and Kimi-K2, through a reverse-engineered Pollinations API without the need for API keys. It features integrated prompt injection capabilities for security research, allowing for uncensored model access and red-team evaluations, along with native support for Linux and Termux, and a user-friendly console interface. Notably, it offers easy configuration options and a streamlined installation process via a single command.&lt;/p&gt;</description></item><item><title>llm-guard</title><link>https://rainmana.github.io/hackyfeed/tools/protectai-llm-guard/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/protectai-llm-guard/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; LLM Guard is a security toolkit designed to enhance the safety of interactions with Large Language Models (LLMs) by providing features such as input sanitization, harmful language detection, data leakage prevention, and protection against prompt injection attacks. It supports easy integration into production environments and offers a variety of prompt and output scanners tailored for specific security concerns. The tool is continuously updated to adapt to emerging threats, ensuring robust security for LLM applications.&lt;/p&gt;</description></item><item><title>lonkero</title><link>https://rainmana.github.io/hackyfeed/tools/bountyyfi-lonkero/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bountyyfi-lonkero/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Lonkero is a professional-grade web security scanner engineered for advanced penetration testing, boasting over 125 sophisticated scanning modules written in Rust. Its notable features include an intelligent mode for context-aware scanning, machine learning capabilities to minimize false positives to 5%, and unique proof-based XSS detection that eliminates reliance on browsers, significantly increasing scan speed and accuracy. By leveraging a robust architecture that focuses on real vulnerabilities, Lonkero delivers efficient and precise security assessments for modern web technologies.&lt;/p&gt;</description></item><item><title>lunasec</title><link>https://rainmana.github.io/hackyfeed/tools/lunasec-io-lunasec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lunasec-io-lunasec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; LunaTrace is an open-source supply chain security and auditing tool that monitors software dependencies for vulnerabilities, integrating seamlessly with GitHub to notify users of new CVEs before deployment. It offers both a free SaaS option and self-hosted deployment capabilities, making it a versatile alternative to commercial tools like GitHub Dependabot and Snyk. Notable features include automatic monitoring, GitHub Pull Request integration, and active development support.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;!--
 ~ Copyright by LunaSec (owned by Refinery Labs, Inc)
 ~
 ~ Licensed under the Creative Commons Attribution-ShareAlike 4.0 International
 ~ (the "License"); you may not use this file except in compliance with the
 ~ License. You may obtain a copy of the License at
 ~
 ~ https://creativecommons.org/licenses/by-sa/4.0/legalcode
 ~
 ~ See the License for the specific language governing permissions and
 ~ limitations under the License.
 ~
--&gt;
&lt;p align="center"&gt;
 &lt;img src='docs/static/img/logo-black-text.svg' width='60%'&gt;
&lt;/p&gt;</description></item><item><title>malicious-pdf</title><link>https://rainmana.github.io/hackyfeed/tools/jonaslejon-malicious-pdf/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jonaslejon-malicious-pdf/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Malicious PDF is a tool designed to generate various malicious PDF files featuring phone-home capabilities for use in penetration testing and red-teaming. It supports integration with platforms like Burp Collaborator and Interact.sh, providing a diverse set of attack vectors through ten different crafted PDF examples meant for testing web applications, security products, and PDF readers. Key features include the ability to create PDFs exploiting vulnerabilities like external file access, JavaScript injection, and form data exfiltration.&lt;/p&gt;</description></item><item><title>Nginx-Lua-Anti-DDoS</title><link>https://rainmana.github.io/hackyfeed/tools/c0nw0nk-nginx-lua-anti-ddos/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/c0nw0nk-nginx-lua-anti-ddos/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Nginx-Lua-Anti-DDoS is a protective tool designed for Nginx web servers, leveraging Lua scripting to mitigate DDoS attacks through a JavaScript-based authentication puzzle inspired by Cloudflare&amp;rsquo;s &amp;ldquo;I&amp;rsquo;m Under Attack&amp;rdquo; mode. The tool features automatic detection and activation of protection mechanisms against various attack types, extensive IP and User-Agent filtering options, as well as capabilities to inspect and block malicious HTTP requests. With no limitation on attack size and built-in logging for monitoring, it offers customizable error responses and caching optimizations to enhance web server performance during attacks.&lt;/p&gt;</description></item><item><title>nmap-formatter</title><link>https://rainmana.github.io/hackyfeed/tools/vdjagilev-nmap-formatter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vdjagilev-nmap-formatter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; NMAP-Formatter is a versatile tool designed to convert NMAP XML output into various formats such as HTML, CSV, JSON, Excel, and more, facilitating the analysis and reporting of network scan results. Notable features include support for output via stdin, the ability to generate diagrams using Graphviz, and options to skip down hosts, enhancing usability for security professionals and network administrators. This tool can also be utilized as a library in Golang for integration into other applications.&lt;/p&gt;</description></item><item><title>Nope-Proxy</title><link>https://rainmana.github.io/hackyfeed/tools/summitt-nope-proxy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/summitt-nope-proxy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; NoPE Proxy is a Burp Suite extension that facilitates the interception and analysis of TCP and UDP traffic, including non-HTTP protocols. Its notable features include a configurable DNS server that routes traffic to Burp, support for multiple listening ports for man-in-the-middle (MiTM) connections, and the ability to define match and replace rules for traffic manipulation. This tool is especially useful for security testing of mobile applications and thick clients, allowing seamless traffic analysis and modification.&lt;/p&gt;</description></item><item><title>NoSQLMap</title><link>https://rainmana.github.io/hackyfeed/tools/codingo-nosqlmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/codingo-nosqlmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; NoSQLMap is a Python tool designed for auditing and automating injection attacks on NoSQL databases, primarily targeting MongoDB and CouchDB, while also preparing for support of others like Redis and Cassandra. It helps identify and exploit default configuration vulnerabilities to disclose or replicate database data through a user-friendly menu-based interface. Key features include options for NoSQL DB access attacks, web application attacks, and scanning for anonymous MongoDB access.&lt;/p&gt;</description></item><item><title>Offensive-Resources</title><link>https://rainmana.github.io/hackyfeed/tools/zeyad-azima-offensive-resources/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zeyad-azima-offensive-resources/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Offensive-Resources V4 is a comprehensive repository designed for offensive security practitioners, providing an extensive collection of learning materials and labs across various cybersecurity domains. Its primary use case is to facilitate skill development in offensive security techniques, with notable features including a wide range of topics from exploit development to IoT and hardware hacking, structured resources for diverse platforms, and an open invitation for community contributions.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="offensive-resources-v4"&gt;Offensive-Resources V4&lt;/h1&gt;
&lt;p&gt;((اللَّهُمَّ انْفَعْنِي بِمَا عَلَّمْتَنِي، وَعَلِّمْنِي مَا يَنْفَعُنِي، وَزِدْنِي عِلْمًا))&lt;/p&gt;</description></item><item><title>Osiris</title><link>https://rainmana.github.io/hackyfeed/tools/danielkrupinski-osiris/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/danielkrupinski-osiris/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Osiris is a cross-platform game hacking tool designed for Counter-Strike 2, featuring a graphical user interface based on the game&amp;rsquo;s Panorama UI. Its primary use case is to enhance gameplay through various functions such as customizable visual indicators for bomb planting and inaccuracy visualizations without relying on traditional C++ runtime libraries or external dependencies. Notable features include customizable color schemes for game elements, enhanced player information rendering, and support for both Windows and Linux compilation.&lt;/p&gt;</description></item><item><title>paradoxiaRAT</title><link>https://rainmana.github.io/hackyfeed/tools/quantumcore-paradoxiarat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/quantumcore-paradoxiarat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Paradoxia is a Remote Access Tool (RAT) designed for covert control of target systems, featuring a user-friendly console that allows users to easily build and deploy client applications. Notable capabilities include multithreading for multiple session management, full file access, keylogging, microphone recording, and remote execution commands, alongside stealth operation and persistent installation. This tool is intended for malicious use, as indicated by its detection as malware by security software.&lt;/p&gt;</description></item><item><title>Penetration_Testing_POC</title><link>https://rainmana.github.io/hackyfeed/tools/mr-xn-penetration_testing_poc/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mr-xn-penetration_testing_poc/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Penetration_Testing_POC is a comprehensive collection of proof of concepts (POCs), scripts, tools, and articles related to penetration testing, intended to serve as a reference resource. It systematically categorizes vulnerabilities across various domains such as IoT, mobile devices, web applications, and privilege escalation methods, providing users with essential insights and practical exploitation techniques. Notable features include organized documentation and links to external resources, ensuring that users can easily navigate and leverage the provided information for security assessments.&lt;/p&gt;</description></item><item><title>PentestTools</title><link>https://rainmana.github.io/hackyfeed/tools/arch3rpro-pentesttools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/arch3rpro-pentesttools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pentest Tools is a comprehensive catalog of penetration testing resources, referencing tools primarily from Kali Linux, and featuring both open-source and readily accessible software. It includes a wide array of categories such as information gathering, vulnerability analysis, and exploitation tools, aimed at facilitating various aspects of security assessments. Notable features include a curated list of essential tools, categorized functionalities, and a long-term commitment to updates and supplementary resources.&lt;/p&gt;</description></item><item><title>PINCE</title><link>https://rainmana.github.io/hackyfeed/tools/korcankaraokcu-pince/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/korcankaraokcu-pince/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PINCE is a front-end tool for the GNU Project Debugger (GDB) tailored for reverse engineering, particularly in gaming contexts. Its noteworthy features include efficient memory and pointer scanning using specialized libraries, background execution for concurrent command execution, and extensive variable inspection and modification capabilities, resembling those of Cheat Engine. Additionally, PINCE supports dynamic address tables, smart casting of data types, and comprehensive disassembly functionalities, enabling users to analyze and manipulate memory with precision.&lt;/p&gt;</description></item><item><title>pixload</title><link>https://rainmana.github.io/hackyfeed/tools/sighook-pixload/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sighook-pixload/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; pixload is a set of tools designed for creating and injecting payloads into image files, supporting formats like BMP, GIF, JPG, PNG, and WebP. Its primary use case is for stealthy payload delivery, enabling users to embed malicious code within legitimate image files while maintaining their validity. Notable features include straightforward command-line usage for various image types and integration with Metasploit for payload generation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="pixload--image-payload-creating-tools"&gt;pixload &amp;ndash; Image Payload Creating tools&lt;/h1&gt;
&lt;h2 id="description"&gt;DESCRIPTION&lt;/h2&gt;
&lt;p&gt;Set of tools for &lt;del&gt;hiding backdoors&lt;/del&gt; creating/injecting payload into images.&lt;/p&gt;</description></item><item><title>Powerful-Plugins</title><link>https://rainmana.github.io/hackyfeed/tools/hack-with-github-powerful-plugins/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hack-with-github-powerful-plugins/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Powerful Plugins is a curated collection of open-source plugins designed to enhance various frameworks and tools such as BurpSuite, Chrome, Firefox, IDA, Immunity, OllyDbg, and the Volatility Framework. Its primary use case is to extend the functionality of these platforms, enabling improved capabilities in tasks such as web application security testing and memory analysis. Notable features include the diverse range of supported tools and the invitation for community contributions to further expand the repository.&lt;/p&gt;</description></item><item><title>pythem</title><link>https://rainmana.github.io/hackyfeed/tools/m4n3dw0lf-pythem/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m4n3dw0lf-pythem/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; pythem is a versatile penetration testing framework written in Python, designed for use by security researchers and professionals to conduct various security assessments within legal boundaries. Notable features include support for attacks such as ARP spoofing, DNS manipulation, brute force attacks on SSH and web forms, as well as tools for exploit development and packet filtering. The framework can be installed on Debian-based Linux distributions, or run as a Docker container, facilitating accessibility and ease of deployment.&lt;/p&gt;</description></item><item><title>requests-ip-rotator</title><link>https://rainmana.github.io/hackyfeed/tools/ge0rg3-requests-ip-rotator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ge0rg3-requests-ip-rotator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; requests-ip-rotator is a Python library designed to leverage AWS API Gateway&amp;rsquo;s extensive IP pool to generate numerous unique IP addresses for web scraping and brute forcing, enabling users to circumvent IP-based rate limits. The tool automatically randomizes the X-Forwarded-For headers to obscure the client&amp;rsquo;s true IP while allowing for easy integration with the requests library. Notably, it offers both manual and automatic gateway management methods for user convenience, along with cost-effective usage under AWS&amp;rsquo;s free tier.&lt;/p&gt;</description></item><item><title>Resources-for-Beginner-Bug-Bounty-Hunters</title><link>https://rainmana.github.io/hackyfeed/tools/nahamsec-resources-for-beginner-bug-bounty-hunters/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nahamsec-resources-for-beginner-bug-bounty-hunters/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Resources-for-Beginner-Bug-Bounty-Hunters&amp;rdquo; repository serves as a comprehensive guide for individuals entering the realm of web hacking and bug bounty hunting. It features a curated selection of tools, tips, and resources aimed at enhancing the skills of both novice and experienced hunters, with notable sections on vulnerability types, testing environments, and coding resources. Additionally, the repository includes links to educational courses and community engagement platforms to foster learning and collaboration.&lt;/p&gt;</description></item><item><title>saas-attacks</title><link>https://rainmana.github.io/hackyfeed/tools/pushsecurity-saas-attacks/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pushsecurity-saas-attacks/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The SaaS Attacks repository provides a structured collection of attack techniques tailored for Software-as-a-Service (SaaS) platforms, aimed at aiding security researchers, penetration testers, and red/blue teams. Notable features include an emphasis on &amp;ldquo;networkless&amp;rdquo; attacks devoid of traditional endpoint interactions, and a matrix inspired by the MITRE ATT&amp;amp;CK framework focusing specifically on SaaS-based threats. This resource is designed to facilitate knowledge sharing and collaboration in the identification and mitigation of SaaS vulnerabilities.&lt;/p&gt;</description></item><item><title>sqlmap</title><link>https://rainmana.github.io/hackyfeed/tools/sqlmapproject-sqlmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sqlmapproject-sqlmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; sqlmap is an open-source penetration testing tool designed for automating the detection and exploitation of SQL injection vulnerabilities in web applications. It features a robust detection engine with capabilities such as database fingerprinting, data extraction, file system access, and command execution through out-of-band connections, making it a comprehensive tool for security professionals. The tool is compatible with Python 2.7 and 3.x, ensuring broad platform support.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="sqlmap"&gt;sqlmap &lt;img src="https://i.imgur.com/fe85aVR.png" alt=""&gt;&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/sqlmapproject/sqlmap/actions/workflows/tests.yml"&gt;&lt;img src="https://github.com/sqlmapproject/sqlmap/actions/workflows/tests.yml/badge.svg" alt=".github/workflows/tests.yml"&gt;&lt;/a&gt; &lt;a href="https://www.python.org/"&gt;&lt;img src="https://img.shields.io/badge/python-2.7%7C3.x-yellow.svg" alt="Python 2.7|3.x"&gt;&lt;/a&gt; &lt;a href="https://raw.githubusercontent.com/sqlmapproject/sqlmap/master/LICENSE"&gt;&lt;img src="https://img.shields.io/badge/license-GPLv2-red.svg" alt="License"&gt;&lt;/a&gt; &lt;a href="https://x.com/sqlmap"&gt;&lt;img src="https://img.shields.io/badge/x-@sqlmap-blue.svg" alt="x"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>top25-parameter</title><link>https://rainmana.github.io/hackyfeed/tools/lutfumertceylan-top25-parameter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lutfumertceylan-top25-parameter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;top25-parameter&amp;rdquo; repository provides a curated list of the 25 most commonly vulnerable parameters associated with various web security vulnerabilities, including Cross-Site Scripting (XSS), SQL Injection (SQLi), and Server-Side Request Forgery (SSRF). It is intended for use in both manual reconnaissance and automation tools, supported by data sourced from OSINT and articles in the cybersecurity community. Notable features include organized parameters for different vulnerabilities, aiding security researchers and practitioners in identifying and mitigating risks effectively.&lt;/p&gt;</description></item><item><title>V3n0M-Scanner</title><link>https://rainmana.github.io/hackyfeed/tools/v3n0m-scanner-v3n0m-scanner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/v3n0m-scanner-v3n0m-scanner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; V3n0M-Scanner is an offensive security framework designed for vulnerability scanning and penetration testing, offering a Python-based toolkit that operates across both Linux and Windows platforms. Notable features include advanced scanning capabilities for SQL injection, local file inclusion to remote code execution, and a Cloudflare resolver, along with extensive target lists and efficient scanning of potentially millions of IPs for known vulnerabilities. The tool is open-source and aims to provide transparency and ease of use for security professionals.&lt;/p&gt;</description></item><item><title>vulnx</title><link>https://rainmana.github.io/hackyfeed/tools/anouarbensaad-vulnx/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/anouarbensaad-vulnx/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VulnX is an intelligent bot designed for automatic shell injection that identifies vulnerabilities across various content management systems (CMS). Key features include multi-threaded vulnerability scanning, target information gathering, subdomain enumeration, and the ability to search for exploits using dorks, which streamline the injection process as opposed to manual methods. The tool supports multiple CMS platforms, enhancing its usability for security assessments and penetration testing.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;br&gt;
 &lt;a href="https://github.com/anouarbensaad/VulnX"&gt;&lt;img src="https://i.ibb.co/ZxxFqxQ/vxv2.png" alt="VulnX"&gt;&lt;/a&gt;
 &lt;br&gt;
 VulnX
 &lt;br&gt;
&lt;/h1&gt;
&lt;h4 align="center"&gt;Vulnx 🕷️ is An Intelligent Bot Auto Shell Injector that detects vulnerabilities in multiple types of Cms &lt;/h4&gt;
&lt;p align="center"&gt;
 &lt;a href="https://github.com/anouarbensaad/vulnx/releases"&gt;
 &lt;img src="https://img.shields.io/github/release/anouarbensaad/vulnx.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://pypi.org/project/vulnx/"&gt;
 &lt;img src="https://img.shields.io/badge/pypi-vulnx-red.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/anouarbensaad/vulnx/issues?q=is%3Aissue+is%3Aclosed"&gt;
 &lt;img src="https://img.shields.io/github/issues-closed/anouarbensaad/vulnx.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://travis-ci.com/anouarbensaad/vulnx"&gt;
 &lt;img src="https://img.shields.io/travis/com/anouarbensaad/vulnx.svg"&gt;
 &lt;/a&gt;
&lt;/p&gt;</description></item><item><title>webcopilot</title><link>https://rainmana.github.io/hackyfeed/tools/h4r5h1t-webcopilot/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/h4r5h1t-webcopilot/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WebCopilot is an automation tool for security assessments that enumerates subdomains of a target domain and scans for vulnerabilities such as XSS, SQLi, and RCE. It employs various open-source tools for subdomain enumeration, active scanning, endpoint crawling, and filtering of vulnerability parameters, ultimately presenting the results in a structured manner. Notable features include comprehensive subdomain enumeration, endpoint crawling, and integration with multiple vulnerability scanning tools.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;&lt;a href="https://github.com/h4r5h1t/webcopilot/"&gt;WebCopilot&lt;/a&gt;&lt;/h1&gt;
&lt;h4 align="center"&gt;An automation tool that enumerate subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities.&lt;/h4&gt;
&lt;p align="center"&gt;
&lt;a href="https://twitter.com/h4r5h1t_hrs"&gt;&lt;img src="https://img.shields.io/twitter/follow/h4r5h1t_hrs?style=social"&gt;&lt;/a&gt;
&lt;a href="https://github.com/h4r5h1t?tab=followers"&gt;&lt;img src="https://img.shields.io/github/followers/h4r5h1t?style=social"&gt;&lt;/a&gt;
&lt;a href="https://github.com/h4r5h1t/webcopilot/issues"&gt;&lt;img src="https://img.shields.io/badge/contributions-welcome-brightgreen.svg?style=flat"&gt;&lt;/a&gt;
&lt;a href="https://github.com/h4r5h1t/webcopilot/blob/master/LICENSE"&gt;&lt;img src="https://img.shields.io/badge/License-MIT-yellow.svg"&gt;&lt;/a&gt;
&lt;a href="#"&gt;&lt;img src="https://img.shields.io/badge/Made%20with-Bash-1f425f.svg"&gt;&lt;/a&gt;
&lt;a href="#"&gt;&lt;img src="https://madewithlove.org.in/badge.svg"&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>WPForce</title><link>https://rainmana.github.io/hackyfeed/tools/n00py-wpforce/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/n00py-wpforce/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WPForce is a comprehensive suite of tools designed for attacking WordPress installations, primarily focusing on brute-forcing login credentials via the API. Its notable features include the ability to automatically upload interactive shells post-authentication, dump WordPress password hashes, and pivot to a meterpreter session, making it suitable for penetration testing and post-exploitation scenarios. The tool leverages multi-threading to optimize the brute-force attack process while providing options for verbose output and error debugging.&lt;/p&gt;</description></item><item><title>xsser</title><link>https://rainmana.github.io/hackyfeed/tools/epsylon-xsser/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/epsylon-xsser/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; XSSer is an automated framework designed for the detection, exploitation, and reporting of Cross-Site Scripting (XSS) vulnerabilities in web applications. It features over 1300 pre-installed XSS attack vectors, sophisticated techniques for bypassing various web application firewalls (WAFs) and browsers, and is capable of operating on multiple platforms with dependencies on Python and essential libraries such as Selenium and BeautifulSoup.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://xsser.03c8.net/xsser/thehive1.png" alt="XSSer" title="XSSer"&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;ul&gt;
&lt;li&gt;Web: &lt;a href="https://xsser.03c8.net"&gt;https://xsser.03c8.net&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;Cross Site &amp;ldquo;Scripter&amp;rdquo; (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.&lt;/p&gt;</description></item><item><title>xssor2</title><link>https://rainmana.github.io/hackyfeed/tools/evilcos-xssor2/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/evilcos-xssor2/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; XSS&amp;rsquo;OR is a versatile tool designed for exploiting cross-site scripting (XSS) vulnerabilities through JavaScript-based payloads. Its primary use case involves encoding, decoding, and probing potential attack vectors, making it applicable for security testing and penetration testing scenarios. Notable features include a web interface for payload manipulation, compatibility with both Python 2 and 3, and robust support for Docker deployment.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="xssor"&gt;XSS&amp;rsquo;OR&lt;/h1&gt;
&lt;p&gt;XSS&amp;rsquo;OR - Hack with JavaScript.&lt;/p&gt;
&lt;h2 id="online"&gt;ONLINE&lt;/h2&gt;
&lt;p&gt;You can have a try:&lt;/p&gt;</description></item><item><title>yakit</title><link>https://rainmana.github.io/hackyfeed/tools/yaklang-yakit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/yaklang-yakit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Yakit is an interactive application security testing platform that integrates the CyberSecurity Domain Specific Language (CDSL) for enhanced security operations. Its primary use case is to provide a comprehensive GUI for manipulating security testing capacities via a gRPC server, fully replacing tools like BurpSuite and offering unique features such as a visual web fuzzing tool and a plugin store for customizable security scripts. Additionally, Yakit allows non-coders to harness advanced security capabilities without programming knowledge, facilitating both local and remote deployment.&lt;/p&gt;</description></item></channel></rss>