<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Assembly on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/tags/assembly/</link><description>Recent content in Assembly on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/tags/assembly/feed.xml" rel="self" type="application/rss+xml"/><item><title>inceptor</title><link>https://rainmana.github.io/hackyfeed/tools/klezvirus-inceptor/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/klezvirus-inceptor/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Inceptor is a Windows-focused penetration testing tool designed to automate the bypassing of anti-virus (AV) and endpoint detection and response (EDR) solutions. It features a template-based PE packer that allows extensive user customization and integrates various encoding methods for encoding, compressing, or encrypting shellcode. Notably, Inceptor supports transformations of existing binaries into shellcode and distinguishes between loader-independent and loader-dependent encoders to enhance payload obfuscation and evade detection.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;:triangular_flag_on_post: This is the public repository of Inceptor, for latest version and updates please consider supporting us through &lt;a href="https://porchetta.industries/"&gt;https://porchetta.industries/&lt;/a&gt;&lt;/p&gt;</description></item><item><title>LADX-Disassembly</title><link>https://rainmana.github.io/hackyfeed/tools/zladx-ladx-disassembly/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zladx-ladx-disassembly/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; LADX-Disassembly is a comprehensive disassembly project for the Game Boy Color game &amp;ldquo;The Legend of Zelda: Link&amp;rsquo;s Awakening DX,&amp;rdquo; enabling developers to build multiple ROM versions in various languages (Japanese, English, German, French) along with their debug symbols. It features tools and documentation for reverse engineering the game engine and understanding data formats, providing a wiki for navigation and contributions. The project also invites community participation to improve its code and documentation.&lt;/p&gt;</description></item><item><title>malware_training_vol1</title><link>https://rainmana.github.io/hackyfeed/tools/hasherezade-malware_training_vol1/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hasherezade-malware_training_vol1/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;malware_training_vol1&amp;rdquo; repository provides a comprehensive training resource designed for individuals looking to deepen their understanding of Windows malware analysis. It offers a blend of theoretical knowledge and practical exercises covering a range of topics including PE structure, process management, and various malware tactics, while leveraging specific tools for effective analysis. Key features include structured modules, hands-on exercises, and a focus on core concepts essential for aspiring malware analysts.&lt;/p&gt;</description></item><item><title>Malware-Exhibit</title><link>https://rainmana.github.io/hackyfeed/tools/alvin-tosh-malware-exhibit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/alvin-tosh-malware-exhibit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Malware-Exhibit is a malware analysis tool designed for researchers and security professionals to dissect and analyze various malware samples. It supports multiple programming languages and platforms, allowing users to examine the behavior and characteristics of malware, providing insights for threat detection and mitigation. Notable features include a comprehensive user interface and the ability to integrate additional analysis tools and scripts.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="./LICENSE"&gt;&lt;img src="https://img.shields.io/github/license/Ileriayo/markdown-badges?style=for-the-badge" alt="Licence"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1 id="-malware-exhibit-"&gt;&lt;h1 align="center"&gt;⚠️⚠️ Malware-Exhibit ⚠️⚠️&lt;/h1&gt;&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://img.shields.io/badge/c-%2300599C.svg?style=for-the-badge&amp;amp;logo=c&amp;amp;logoColor=white" alt="C"&gt;&lt;img src="https://img.shields.io/badge/c++-%2300599C.svg?style=for-the-badge&amp;amp;logo=c%2B%2B&amp;amp;logoColor=white" alt="C++"&gt;&lt;img src="https://img.shields.io/badge/go-%2300ADD8.svg?style=for-the-badge&amp;amp;logo=go&amp;amp;logoColor=white" alt="Go"&gt;&lt;img src="https://img.shields.io/badge/java-%23ED8B00.svg?style=for-the-badge&amp;amp;logo=java&amp;amp;logoColor=white" alt="Java"&gt;&lt;img src="https://img.shields.io/badge/javascript-%23323330.svg?style=for-the-badge&amp;amp;logo=javascript&amp;amp;logoColor=%23F7DF1E" alt="JavaScript"&gt;&lt;img src="https://img.shields.io/badge/perl-%2339457E.svg?style=for-the-badge&amp;amp;logo=perl&amp;amp;logoColor=white" alt="Perl"&gt;&lt;img src="https://img.shields.io/badge/ruby-%23CC342D.svg?style=for-the-badge&amp;amp;logo=ruby&amp;amp;logoColor=white" alt="Ruby"&gt;&lt;img src="https://img.shields.io/badge/php-%23777BB4.svg?style=for-the-badge&amp;amp;logo=php&amp;amp;logoColor=white" alt="PHP"&gt; &lt;img src="https://img.shields.io/badge/PowerShell-%235391FE.svg?style=for-the-badge&amp;amp;logo=powershell&amp;amp;logoColor=white" alt="PowerShell"&gt;&lt;img src="https://img.shields.io/badge/python-3670A0?style=for-the-badge&amp;amp;logo=python&amp;amp;logoColor=ffdd54" alt="Python"&gt;&lt;img src="https://img.shields.io/badge/r-%23276DC3.svg?style=for-the-badge&amp;amp;logo=r&amp;amp;logoColor=white" alt="R"&gt;&lt;img src="https://img.shields.io/badge/.NET-5C2D91?style=for-the-badge&amp;amp;logo=.net&amp;amp;logoColor=white" alt=".Net"&gt;&lt;img src="https://img.shields.io/badge/shell_script-%23121011.svg?style=for-the-badge&amp;amp;logo=gnu-bash&amp;amp;logoColor=white" alt="Shell Script"&gt;&lt;img src="https://img.shields.io/badge/typescript-%23007ACC.svg?style=for-the-badge&amp;amp;logo=typescript&amp;amp;logoColor=white" alt="TypeScript"&gt;&lt;img src="https://img.shields.io/badge/rust-%23000000.svg?style=for-the-badge&amp;amp;logo=rust&amp;amp;logoColor=white" alt="Rust"&gt;&lt;img src="https://img.shields.io/badge/Firefox-FF7139?style=for-the-badge&amp;amp;logo=Firefox-Browser&amp;amp;logoColor=white" alt="Firefox"&gt;&lt;img src="https://img.shields.io/badge/Edge-0078D7?style=for-the-badge&amp;amp;logo=Microsoft-edge&amp;amp;logoColor=white" alt="Edge"&gt;&lt;img src="https://img.shields.io/badge/Firebase-039BE5?style=for-the-badge&amp;amp;logo=Firebase&amp;amp;logoColor=white" alt="Firebase"&gt;&lt;img src="https://img.shields.io/badge/postgres-%23316192.svg?style=for-the-badge&amp;amp;logo=postgresql&amp;amp;logoColor=white" alt="Postgres"&gt;&lt;img src="https://img.shields.io/badge/PayPal-00457C?style=for-the-badge&amp;amp;logo=paypal&amp;amp;logoColor=white" alt="PayPal"&gt;&lt;img src="https://img.shields.io/badge/AWS-%23FF9900.svg?style=for-the-badge&amp;amp;logo=amazon-aws&amp;amp;logoColor=white" alt="AWS"&gt;&lt;img src="https://img.shields.io/badge/azure-%230072C6.svg?style=for-the-badge&amp;amp;logo=microsoftazure&amp;amp;logoColor=white" alt="Azure"&gt;&lt;img src="https://img.shields.io/badge/Oracle-F80000?style=for-the-badge&amp;amp;logo=oracle&amp;amp;logoColor=white" alt="Oracle"&gt;&lt;img src="https://img.shields.io/badge/Microsoft-0078D4?style=for-the-badge&amp;amp;logo=microsoft&amp;amp;logoColor=white" alt="Microsoft"&gt; &lt;img src="https://img.shields.io/badge/Android-3DDC84?style=for-the-badge&amp;amp;logo=android&amp;amp;logoColor=white" alt="Android"&gt; &lt;img src="https://img.shields.io/badge/Linux-FCC624?style=for-the-badge&amp;amp;logo=linux&amp;amp;logoColor=black" alt="Linux"&gt; &lt;img src="https://img.shields.io/badge/Ubuntu-E95420?style=for-the-badge&amp;amp;logo=ubuntu&amp;amp;logoColor=white" alt="Ubuntu"&gt; &lt;img src="https://img.shields.io/badge/mac%20os-000000?style=for-the-badge&amp;amp;logo=macos&amp;amp;logoColor=F0F0F0" alt="macOS"&gt; &lt;img src="https://img.shields.io/badge/Windows-0078D6?style=for-the-badge&amp;amp;logo=windows&amp;amp;logoColor=white" alt="Windows"&gt; &lt;img src="https://img.shields.io/badge/apache-%23D42029.svg?style=for-the-badge&amp;amp;logo=apache&amp;amp;logoColor=white" alt="Apache"&gt; &lt;img src="https://img.shields.io/badge/apache%20tomcat-%23F8DC75.svg?style=for-the-badge&amp;amp;logo=apache-tomcat&amp;amp;logoColor=black" alt="Apache Tomcat"&gt; &lt;img src="https://img.shields.io/badge/Apple-%23000000.svg?style=for-the-badge&amp;amp;logo=apple&amp;amp;logoColor=white" alt="Apple"&gt; &lt;img src="https://img.shields.io/badge/nginx-%23009639.svg?style=for-the-badge&amp;amp;logo=nginx&amp;amp;logoColor=white" alt="Nginx"&gt; &lt;img src="https://img.shields.io/badge/Google_Play-414141?style=for-the-badge&amp;amp;logo=google-play&amp;amp;logoColor=white" alt="Play Store"&gt; &lt;img src="https://img.shields.io/badge/F_Droid-1976D2?style=for-the-badge&amp;amp;logo=f-droid&amp;amp;logoColor=white" alt="F Droid"&gt; &lt;img src="https://img.shields.io/badge/App_Store-0D96F6?style=for-the-badge&amp;amp;logo=app-store&amp;amp;logoColor=white" alt="App Store"&gt; &lt;img src="https://img.shields.io/badge/github-%23121011.svg?style=for-the-badge&amp;amp;logo=github&amp;amp;logoColor=white" alt="GitHub"&gt; &lt;img src="https://img.shields.io/badge/xbox-%23107C10.svg?style=for-the-badge&amp;amp;logo=xbox&amp;amp;logoColor=white" alt="Xbox"&gt;&lt;/p&gt;</description></item><item><title>pokecrystal</title><link>https://rainmana.github.io/hackyfeed/tools/pret-pokecrystal/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pret-pokecrystal/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Pokémon Crystal repository consists of a comprehensive disassembly of the Pokémon Crystal game, designed to facilitate the building of various ROM versions. Primary use cases include reverse engineering, modding, and development of patches for the game, supported by resources such as documentation and tutorials. Notable features include the ability to produce different ROM versions and access to a community-driven platform for additional support and collaboration.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="pokémon-crystal-build-status"&gt;Pokémon Crystal &lt;a href="https://github.com/pret/pokecrystal/actions"&gt;&lt;img src="https://github.com/pret/pokecrystal/actions/workflows/main.yml/badge.svg" alt="Build Status"&gt;&lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;This is a disassembly of Pokémon Crystal.&lt;/p&gt;</description></item><item><title>pokered</title><link>https://rainmana.github.io/hackyfeed/tools/pret-pokered/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pret-pokered/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Pokémon Red and Blue repository provides a disassembly of the original Pokémon games, allowing users to rebuild the ROMs for both Pokémon Red and Blue, along with additional debug versions and patches. Its primary use case is for developers and enthusiasts looking to study, modify, or enhance the original game code, supported by extensive documentation and tutorials through its Wiki. Notable features include automated builds and a structured community for collaboration on Discord.&lt;/p&gt;</description></item><item><title>pokeyellow</title><link>https://rainmana.github.io/hackyfeed/tools/pret-pokeyellow/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pret-pokeyellow/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pokémon Yellow is a disassembly repository for the classic Game Boy Color game, allowing users to build various ROMs, including the standard Pokémon Yellow and a debug version named YELLMONS.GB. The tool provides comprehensive documentation, symbol information, and assembly tools to facilitate modifications and development for enthusiasts. Notable features include the ability to generate different ROM formats and a supportive community for collaborative development and troubleshooting.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="pokémon-yellow-build-status"&gt;Pokémon Yellow &lt;a href="https://github.com/pret/pokeyellow/actions"&gt;&lt;img src="https://github.com/pret/pokeyellow/actions/workflows/main.yml/badge.svg" alt="Build Status"&gt;&lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;This is a disassembly of Pokémon Yellow.&lt;/p&gt;</description></item><item><title>ReC98</title><link>https://rainmana.github.io/hackyfeed/tools/nmlgc-rec98/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nmlgc-rec98/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ReC98 is a reverse-engineering project that aims to reconstruct the source code of the first five Touhou Project games originally released for the NEC PC-9801 system. It allows for perfect replications of the original binaries, thus maintaining the integrity of the source while enabling modding and porting efforts by providing a comprehensible codebase. Notable features include the preservation of the original game&amp;rsquo;s mechanics, position independence, and support for community modifications.&lt;/p&gt;</description></item></channel></rss>