<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>C++ on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/tags/c++/</link><description>Recent content in C++ on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/tags/c++/feed.xml" rel="self" type="application/rss+xml"/><item><title>Andromeda</title><link>https://rainmana.github.io/hackyfeed/tools/secrary-andromeda/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/secrary-andromeda/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Andromeda is a performance-oriented tool designed for accelerating the initial reverse engineering of Android applications, leveraging its C/C++ implementation. It aims to simplify the analysis process with a straightforward command-line interface, making it accessible for security researchers and developers. Currently in early development, Andromeda highlights the potential for speed improvements over alternative solutions in the same domain.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://user-images.githubusercontent.com/16405698/65393541-89490480-dd8a-11e9-92a3-727799c30b02.png" alt="andromeda"&gt;&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Andromeda&lt;/code&gt; makes initial reverse engineering work of &lt;code&gt;Android&lt;/code&gt; applications bit faster and easier.
Compared to other alternatives, it&amp;rsquo;s written in &lt;code&gt;C/C++&lt;/code&gt; and has a noticeable performance advantage.&lt;/p&gt;</description></item><item><title>AntiCheat-Testing-Framework</title><link>https://rainmana.github.io/hackyfeed/tools/niemand-sec-anticheat-testing-framework/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/niemand-sec-anticheat-testing-framework/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The AntiCheat-Testing-Framework is a comprehensive tool designed for testing and analyzing various anti-cheat mechanisms in the gaming industry. It provides a modular architecture with several integrated modules, allowing users to customize their setup for specific testing purposes. This framework aims to democratize knowledge in the field of anti-cheat research, facilitating both learning and practical application.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="anticheat-testing-framework"&gt;AntiCheat-Testing-Framework&lt;/h1&gt;
&lt;p&gt;Framework to test any Anti-Cheat on the market. This can be used as Template or Code Base to test any Anti-Cheat and learn along the way. The entry level to reverse AntiCheats and Cheats is quite high, therefore, I&amp;rsquo;m realeasing all the code I developed during my research. The main idea is to help people and motive them to get into this topic which is really interesting and there is a lot to research about it.&lt;/p&gt;</description></item><item><title>AntiDBG</title><link>https://rainmana.github.io/hackyfeed/tools/hackovert-antidbg/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hackovert-antidbg/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AntiDBG is a tool designed for implementing various anti-debugging techniques on Windows, categorized by methods such as memory, CPU, timing, and forced exceptions. The primary use case is to create self-contained checks that automatically detach debuggers, enhancing the security of applications against reverse engineering. Notable features include a simple API for integration, a testing application named The Gauntlet to evaluate resistance against these techniques, and an emphasis on readability for educational purposes.&lt;/p&gt;</description></item><item><title>apkstudio</title><link>https://rainmana.github.io/hackyfeed/tools/vaibhavpandeyvpz-apkstudio/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vaibhavpandeyvpz-apkstudio/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; APK Studio is an open-source, cross-platform Integrated Development Environment (IDE) designed for reverse-engineering Android application packages (APKs). Its notable features include a built-in code editor with syntax highlighting for smali and other file types, automatic installation of essential tools, and support for manufacturer-specific frameworks, making it a comprehensive tool for decompiling, recompiling, and signing APKs. Additionally, APK Studio supports command-line operations, theming, and provides quick search functionalities across projects, enhancing the user experience for developers and analysts.&lt;/p&gt;</description></item><item><title>Attiny85</title><link>https://rainmana.github.io/hackyfeed/tools/mtk911-attiny85/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mtk911-attiny85/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The DigiSpark Attiny85 repository provides a cost-effective alternative to Rubber Ducky, enabling users to program the Attiny85 to function as a Human Interface Device (HID) that sends keystrokes to a computer. It includes various pre-built payloads such as a Wi-Fi password stealer, UAC bypass, and keylogger, allowing for a range of offensive actions from data exfiltration to system exploitation. Users can easily set up their development environment and execute these payloads using the Arduino IDE.&lt;/p&gt;</description></item><item><title>binaryninja-api</title><link>https://rainmana.github.io/hackyfeed/tools/vector35-binaryninja-api/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vector35-binaryninja-api/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Binary Ninja API repository provides comprehensive C++, Python, and Rust APIs for the Binary Ninja reverse engineering platform, enabling developers to create plugins and enhance functionality. Notable features include extensive online documentation, examples for various applications, and support for building UI and headless plugins. The setup process includes CMake-based build instructions, ensuring compatibility with specific Binary Ninja versions through a revision hash.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://slack.binary.ninja/"&gt;&lt;img src="https://img.shields.io/badge/slack-binaryninja-red.svg?logo=slack" alt="slack"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1 id="binary-ninja-api"&gt;Binary Ninja API&lt;/h1&gt;
&lt;p&gt;This repository contains documentation and source code of the C++, Python, and Rust APIs for the &lt;a href="https://binary.ninja/"&gt;Binary Ninja&lt;/a&gt; reverse engineering platform.&lt;/p&gt;</description></item><item><title>binexport</title><link>https://rainmana.github.io/hackyfeed/tools/google-binexport/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/google-binexport/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BinExport is a plugin for disassemblers such as IDA Pro, Binary Ninja, and Ghidra that facilitates the export of disassembly data into Protocol Buffer format, which is essential for use with the BinDiff tool. Its primary use case is in binary analysis and reverse engineering, enabling users to perform efficient comparison and analysis of executable files. Notable features include support for multiple platforms (Linux, macOS, Windows) and seamless integration with popular static analysis tools.&lt;/p&gt;</description></item><item><title>BLUESPAWN</title><link>https://rainmana.github.io/hackyfeed/tools/ion28-bluespawn/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ion28-bluespawn/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BLUESPAWN is an active defense and endpoint detection and response tool designed for blue teams to monitor systems in real-time and identify malicious activities within a network. Its notable features include the ability to detect, identify, and eliminate malware, as well as its open-source nature, fostering community collaboration for continuous improvement. The tool emphasizes rapid detection and understanding of the Windows attack surface against advanced threats, while providing visibility into its detection capabilities aligned with the MITRE ATT&amp;amp;CK framework.&lt;/p&gt;</description></item><item><title>botw</title><link>https://rainmana.github.io/hackyfeed/tools/zeldaret-botw/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zeldaret-botw/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The zeldaret/botw repository is an experimental work-in-progress decompilation of &lt;em&gt;The Legend of Zelda: Breath of the Wild&lt;/em&gt; version 1.5.0 for the Nintendo Switch. Its primary use case is to facilitate the understanding of the game&amp;rsquo;s internal mechanics, support glitch hunting efforts, and provide comprehensive documentation for future reverse engineering initiatives. Notable features include ongoing progress tracking and community collaboration through Discord for contributors.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="the-legend-of-zelda-breath-of-the-wild"&gt;The Legend of Zelda: Breath of the Wild&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://botw.link/progress"&gt;&lt;img src="https://img.shields.io/endpoint?url=https://botw.link/badges/progress.json" alt="Decompilation Progress"&gt;&lt;/a&gt; &lt;a href="https://botw.link/progress"&gt;&lt;img src="https://img.shields.io/endpoint?url=https://botw.link/badges/fn_progress.json" alt="Decompilation Progress (functions)"&gt;&lt;/a&gt; &lt;a href="https://github.com/zeldaret/botw/graphs/contributors"&gt;&lt;img src="https://img.shields.io/github/contributors/zeldaret/botw" alt="Contributors"&gt;&lt;/a&gt; &lt;a href="https://discord.zelda.deco.mp"&gt;&lt;img src="https://img.shields.io/discord/688807550715560050?color=%237289DA&amp;amp;logo=discord&amp;amp;logoColor=%23FFFFFF" alt="Discord Channel"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>ByePg</title><link>https://rainmana.github.io/hackyfeed/tools/can1357-byepg/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/can1357-byepg/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ByePg is a kernel-level tool that circumvents Windows PatchGuard and HVCI by leveraging an early-bugcheck hook through the hijacking of the HalPrivateDispatchTable. Its primary use case is to facilitate the implementation of exception-based hooks, allowing for the registration of high-level system-wide exception handlers and offering capabilities for kernel manipulation previously restricted by PatchGuard. Notably, the tool includes a base library and various examples that demonstrate syscall hooking and SEH handling, showcasing its potential for creating new attack surfaces.&lt;/p&gt;</description></item><item><title>ddisasm</title><link>https://rainmana.github.io/hackyfeed/tools/grammatech-ddisasm/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/grammatech-ddisasm/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DDisasm is a high-performance disassembler that accurately translates binaries from ELF and PE formats into a reassemblable assembly code representation using the GTIRB intermediate format. Utilizing the Datalog declarative logic programming language, it derives code locations, symbolization, and function boundaries, supporting multiple instruction set architectures including x86, ARM, and MIPS. Notable features include Docker support for easy setup and integration with GTIRB for further binary analysis and manipulation.&lt;/p&gt;</description></item><item><title>DeauthDetector</title><link>https://rainmana.github.io/hackyfeed/tools/spacehuhntech-deauthdetector/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/spacehuhntech-deauthdetector/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DeauthDetector is an open-source tool designed to monitor and detect Wi-Fi deauthentication attacks using an ESP8266 microcontroller. Its primary use case involves real-time identification of malicious deauth frames, indicated by an LED activation, making it an effective low-cost solution for network security monitoring. Notable features include customizable scanning options, support for multiple channels, and easy installation via precompiled binaries or Arduino integration.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="deauthdetector"&gt;DeauthDetector&lt;/h1&gt;
&lt;p&gt;Detect deauthentication frames using an ESP8266&lt;/p&gt;</description></item><item><title>drakvuf</title><link>https://rainmana.github.io/hackyfeed/tools/tklengyel-drakvuf/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tklengyel-drakvuf/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DRAKVUF is an agentless, virtualization-based binary analysis tool designed for in-depth execution tracing of arbitrary binaries, including operating systems. Its primary use case is malware analysis, leveraging minimal footprint to remain stealthy during the examination process while supporting a range of Windows and Linux environments. Notable features include the ability to operate without installing additional software in the virtual machine and compatibility with hardware virtualization extensions in Intel CPUs.&lt;/p&gt;</description></item><item><title>edb-debugger</title><link>https://rainmana.github.io/hackyfeed/tools/eteran-edb-debugger/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/eteran-edb-debugger/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; edb-debugger is a cross-platform debugger that supports AArch32, x86, and x86-64 architectures, facilitating development and debugging across multiple operating systems, with Linux as the officially supported platform. Notable features include a user-friendly interface, compatibility with modern compilers and libraries, and ongoing development for additional platforms such as FreeBSD, OpenBSD, OSX, and Windows. The tool aims to replicate and extend the capabilities of Ollydbg while adding multi-architecture support.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://gitter.im/eteran/edb-debugger?utm_source=badge&amp;amp;utm_medium=badge&amp;amp;utm_campaign=pr-badge"&gt;&lt;img src="https://badges.gitter.im/eteran/edb-debugger.svg" alt="Gitter"&gt;&lt;/a&gt;
&lt;a href="https://github.com/eteran/edb-debugger/actions/workflows/build.yaml"&gt;&lt;img src="https://github.com/eteran/edb-debugger/actions/workflows/build.yaml/badge.svg?branch=master" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://ci.appveyor.com/project/eteran/edb-debugger"&gt;&lt;img src="https://ci.appveyor.com/api/projects/status/91jfbbyg075wk96q?svg=true" alt="Build status"&gt;&lt;/a&gt;
&lt;a href="https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html"&gt;&lt;img src="https://img.shields.io/badge/license-GPL2-blue.svg" alt="License"&gt;&lt;/a&gt;
&lt;a href="https://www.paypal.com/cgi-bin/webscr?cmd=_donations&amp;amp;business=evan%2eteran%40gmail%2ecom&amp;amp;lc=US&amp;amp;item_name=edb%2ddebugger&amp;amp;currency_code=USD&amp;amp;bn=PP%2dDonationsBF%3a68747470733a2f2f696d672e736869656c64732e696f2f62616467652f446f6e6174652d50617950616c2d677265656e2e737667%3aNonHosted"&gt;&lt;img src="https://img.shields.io/badge/Donate-PayPal-green.svg" alt="Paypal"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>efiXplorer</title><link>https://rainmana.github.io/hackyfeed/tools/rehints-efixplorer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rehints-efixplorer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; efiXplorer is an IDA plugin and loader designed for the analysis and automation of reverse engineering UEFI firmware. Its primary use case is to facilitate the discovery of vulnerabilities in UEFI firmware through automated static analysis, and it provides features that enhance the recovery of service function calls within such firmware. Notably, it supports integration with various hex-ray tools and includes comprehensive documentation for installation and usage.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="http://www.gnu.org/licenses/gpl-3.0"&gt;&lt;img src="https://img.shields.io/badge/License-GPL%20v3-blue.svg" alt="License: GPL v3"&gt;&lt;/a&gt;
&lt;a href="https://github.com/rehints/efiXplorer/actions"&gt;&lt;img src="https://github.com/rehints/efiXplorer/actions/workflows/build.yml/badge.svg" alt="efiXplorer CI"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>ESP32-DIV</title><link>https://rainmana.github.io/hackyfeed/tools/cifertech-esp32-div/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cifertech-esp32-div/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ESP32-DIV is an open-source multi-band wireless toolkit based on the ESP32, designed for wireless testing, signal analysis, jammer development, and protocol spoofing across Wi-Fi, BLE, 2.4GHz, and Sub-GHz frequency bands. Notable features include real-time packet monitoring, Wi-Fi deauthentication attacks, Bluetooth advertisement spoofing, and Sub-GHz command replay capabilities. The toolkit is intended strictly for educational and research purposes to ensure ethical usage in wireless security assessments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
&lt;div align="center"&gt;
 &lt;img src="https://github.com/user-attachments/assets/a30bde48-e39d-4b11-8749-3401bcb82a68" width="150"&gt;
 &lt;h1&gt;&lt;span&gt;ESP32-DIV&lt;/span&gt;&lt;/h1&gt;
&lt;/div&gt;
 &lt;p&gt;
 ESP32DIV - Advanced Wireless Toolkit
 &lt;/p&gt;</description></item><item><title>FilelessPELoader</title><link>https://rainmana.github.io/hackyfeed/tools/saadahla-filelesspeloader/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/saadahla-filelesspeloader/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; FilelessPELoader is a tool designed to load and execute AES-encrypted Portable Executable (PE) files directly into memory, bypassing the need for traditional file storage. Its primary use case is to facilitate stealthy execution of payloads in memory, enhancing evasion techniques commonly utilized in cybersecurity attacks. Notable features include the ability to decrypt the PE file in-memory and execute it without leaving traces on disk.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="filelesspeloader"&gt;FilelessPELoader&lt;/h1&gt;
&lt;p&gt;Loading Remote AES Encrypted PE in memory , Decrypted it and run it&lt;/p&gt;</description></item><item><title>Forensia</title><link>https://rainmana.github.io/hackyfeed/tools/paulnorman01-forensia/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/paulnorman01-forensia/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Forensia is an anti-forensics tool designed for red teamers to eliminate traces during the post-exploitation phase. Its primary use case is to enhance evasion by supporting various functionalities such as unloading Sysmon drivers, employing the Gutmann method for file shredding, and disabling multiple logging mechanisms. Notable features include log erasure, file melting capabilities, and the ability to clear recent user activity and cache, thereby reducing the likelihood of detection by incident response teams.&lt;/p&gt;</description></item><item><title>GameTracking-CS2</title><link>https://rainmana.github.io/hackyfeed/tools/steamtracking-gametracking-cs2/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/steamtracking-gametracking-cs2/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GameTracking-CS2 is a tool designed to automate the tracking of in-game statistics and events for Counter-Strike 2, thereby reducing the manual effort involved in monitoring gameplay data. It provides seamless integration with existing GameTracking functionalities, allowing users to monitor game performance effortlessly. Notable features include real-time tracking capabilities and community support through its Discord channel.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="game-tracker-counter-strike-2"&gt;Game Tracker: Counter-Strike 2&lt;/h2&gt;
&lt;p&gt;Tracking things, so you don&amp;rsquo;t have to.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://github.com/SteamDatabase/GameTracking#readme"&gt;See readme in main GameTracking repository for more information on how files are tracked.&lt;/a&gt;&lt;/p&gt;</description></item><item><title>GameTracking-Dota2</title><link>https://rainmana.github.io/hackyfeed/tools/steamtracking-gametracking-dota2/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/steamtracking-gametracking-dota2/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GameTracking-Dota2 is a tool designed to automate the tracking of in-game statistics and player performance in Dota 2. Its primary use case is to relieve players of the manual effort involved in monitoring game data, providing streamlined insights into gameplay trends. Notable features include integration with a broader GameTracking ecosystem and community support via Discord.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="game-tracker-dota-2"&gt;Game Tracker: Dota 2&lt;/h2&gt;
&lt;p&gt;Tracking things, so you don&amp;rsquo;t have to.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://github.com/SteamDatabase/GameTracking#readme"&gt;See readme in main GameTracking repository for more information on how files are tracked.&lt;/a&gt;&lt;/p&gt;</description></item><item><title>GhostStrike</title><link>https://rainmana.github.io/hackyfeed/tools/stivenhacker-ghoststrike/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/stivenhacker-ghoststrike/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GhostStrike is a sophisticated cybersecurity tool developed for Red Team operations, utilizing techniques such as process hollowing and dynamic API resolution to execute covert actions on Windows systems while evading detection. Its notable features include shellcode encoding/decoding, cryptographic key generation for enhanced security, and control flow flattening to complicate analysis efforts. Designed for educational use in controlled environments, GhostStrike emphasizes the importance of responsible usage.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="ghoststrike-"&gt;GhostStrike ⚔️&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;GhostStrike&lt;/strong&gt; is an advanced cybersecurity tool designed for Red Team operations, featuring sophisticated techniques to evade detection and perform process hollowing on Windows systems.&lt;/p&gt;</description></item><item><title>GpgFrontend</title><link>https://rainmana.github.io/hackyfeed/tools/saturneric-gpgfrontend/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/saturneric-gpgfrontend/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GpgFrontend is a modern encryption tool that leverages GnuPG to facilitate easy and secure encryption and signing of texts and files across multiple platforms, including Windows, macOS, and Linux. Key features include a portable solution that can be run from a USB drive, flexible management of key databases, and a strong focus on user privacy through various safety measures. The tool also supports extensive module development, allowing for customizable user experiences and features.&lt;/p&gt;</description></item><item><title>hal</title><link>https://rainmana.github.io/hackyfeed/tools/emsec-hal/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/emsec-hal/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HAL is a sophisticated framework designed for netlist reverse engineering and manipulation, allowing users to parse and analyze netlists from various hardware sources, such as FPGAs and ASICs, into a graph-based representation. Key features include high performance through an optimized C++ core, flexibility via Python bindings, a modular plugin system for extended functionality, and a rich GUI for visual inspection and interactive analysis. The tool aims to serve as a common baseline for researchers and analysts in the field of hardware reverse engineering, facilitating reproducibility and efficiency in research efforts.&lt;/p&gt;</description></item><item><title>herpaderping</title><link>https://rainmana.github.io/hackyfeed/tools/jxy-s-herpaderping/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jxy-s-herpaderping/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Herpaderping is a process obfuscation tool that manipulates the content of a file on disk after it has been mapped for execution, thereby misleading security products and the operating system about the actual process being run. Its primary use case is to facilitate stealthy execution of binaries by exploiting the timing of process creation callbacks and on-write scanning mechanisms, allowing an actor to modify the file after mapping but before the process starts. Notable features include the ability to remain undetected during file inspections and the execution of a binary while obscuring its original content through a specific workflow of creating, mapping, modifying, and executing targets.&lt;/p&gt;</description></item><item><title>HookCase</title><link>https://rainmana.github.io/hackyfeed/tools/steven-michaud-hookcase/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/steven-michaud-hookcase/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HookCase is a powerful debugging and reverse engineering tool for macOS that enhances the capabilities of Apple&amp;rsquo;s &lt;code&gt;DYLD_INSERT_LIBRARIES&lt;/code&gt;. It allows users to hook methods in any module, including non-exported functions, and can target both parent and child processes simultaneously. Key features include support for watchpoints and the ability to bypass Apple&amp;rsquo;s restrictions on &lt;code&gt;DYLD_INSERT_LIBRARIES&lt;/code&gt;, making it suitable for working with applications that have entitlements.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="hookcase"&gt;HookCase&lt;/h1&gt;
&lt;p&gt;HookCase is a tool for debugging and reverse engineering applications
on macOS (aka OS X), and the operating system itself. It re-implements
and extends
&lt;a href="https://books.google.com/books?id=K8vUkpOXhN4C&amp;amp;pg=PA73&amp;amp;lpg=PA73&amp;amp;dq=%22dyld+interposing%22+Singh."&gt;Apple&amp;rsquo;s &lt;code&gt;DYLD_INSERT_LIBRARIES&lt;/code&gt; functionality&lt;/a&gt;.
It can be used to hook any method in any module (even non-exported
ones, and even those that don&amp;rsquo;t have an entry in their own module&amp;rsquo;s
symbol table). In a single operation, it can be applied to a parent
process and all its child processes, whether or not the child
processes inherit their parent&amp;rsquo;s environment. It supports
watchpoints. So HookCase is considerably more powerful than
&lt;code&gt;DYLD_INSERT_LIBRARIES&lt;/code&gt;. It also doesn&amp;rsquo;t have the restrictions Apple
has placed on &lt;code&gt;DYLD_INSERT_LIBRARIES&lt;/code&gt;. So, for example, HookCase can
be used with applications that have
&lt;a href="https://developer.apple.com/library/content/documentation/Miscellaneous/Reference/EntitlementKeyReference/Chapters/AboutEntitlements.html"&gt;entitlements&lt;/a&gt;.
HookCase runs on OS X 10.9 (Mavericks) through macOS 26 (Tahoe).&lt;/p&gt;</description></item><item><title>hrtng</title><link>https://rainmana.github.io/hackyfeed/tools/kasperskylab-hrtng/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/kasperskylab-hrtng/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The hrtng IDA plugin provides a suite of tools designed to enhance the reverse engineering process within the IDA Pro environment, specifically leveraging the Hex-Rays decompiler. Its notable features include automation of variable renaming, interactive pseudocode transformations, various decryption capabilities, and assistance with obfuscated code analysis, all aimed at improving the efficiency and accuracy of binary analysis tasks. The plugin integrates seamlessly into IDA’s existing functionality, offering a structured approach to handling complex code scenarios.&lt;/p&gt;</description></item><item><title>iaito</title><link>https://rainmana.github.io/hackyfeed/tools/hteso-iaito/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hteso-iaito/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Iaitō is a GUI application developed in Qt and C++ that serves as a frontend for the radare2 reverse engineering framework, specifically targeting users who are not familiar with command-line interfaces. The tool is designed to lower the barrier of entry for new users by providing a more accessible interface, although it is currently in an alpha state and primarily intended for developers. Notable features include cross-platform support for OS X, Linux, and Windows, along with installation requirements for radare2 and Qt.&lt;/p&gt;</description></item><item><title>juicy-potato</title><link>https://rainmana.github.io/hackyfeed/tools/ohpe-juicy-potato/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ohpe-juicy-potato/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Juicy Potato is a Local Privilege Escalation tool designed to exploit COM servers for escalating privileges from Windows Service Accounts to NT AUTHORITY\SYSTEM. Notable features include customizable CLSID targeting, flexible COM listening configurations (IP and port), and multiple process creation modes, enabling users to launch executables or scripts with different impersonation privileges. This tool is particularly effective for users with &lt;code&gt;SeImpersonate&lt;/code&gt; or &lt;code&gt;SeAssignPrimaryToken&lt;/code&gt; privileges, allowing them to bypass security mechanisms on Windows systems.&lt;/p&gt;</description></item><item><title>Keylogger</title><link>https://rainmana.github.io/hackyfeed/tools/ajayrandhawa-keylogger/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ajayrandhawa-keylogger/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Keylogger is a lightweight, open-source tool developed in Visual C++ for educational purposes, designed to monitor system activity by capturing keystrokes, mouse clicks, and periodic screenshots in stealth mode. Its notable features include FTP integration for automatic log uploads, the ability to run unnoticed in the background, and persistence through auto-start and auto-copy mechanisms. The tool emphasizes ethical use, warning against unauthorized application.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="keylogger"&gt;Keylogger&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://visitor-badge.laobi.icu/badge?page_id=ajayrandhawa.Keylogger&amp;amp;title=Visitor" alt="Visitor Badge"&gt;&lt;br&gt;
&lt;strong&gt;Please don&amp;rsquo;t forget to give us a ⭐ if you find this project useful!&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>Keylogger</title><link>https://rainmana.github.io/hackyfeed/tools/giacomolaw-keylogger/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/giacomolaw-keylogger/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Keylogger is a lightweight multi-platform tool designed to record keystrokes on Windows, Linux, and Mac OS, saving them to a local log file. Its primary use case includes personal monitoring for computer security and self-analysis, with notable features such as the ability to run in both visible and invisible modes on Windows, and a straightforward installation process across all supported operating systems.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="a-simple-keylogger-for-windows-linux-and-mac"&gt;A simple keylogger for Windows, Linux and Mac&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://opensource.org/licenses/mit-license.php"&gt;&lt;img src="https://badges.frapsoft.com/os/mit/mit.png?v=103" alt="MIT Licence"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>keystone</title><link>https://rainmana.github.io/hackyfeed/tools/keystone-engine-keystone/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/keystone-engine-keystone/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Keystone is a lightweight and versatile multi-platform assembler framework supporting various architectures including Arm, RISC-V, and X86, among others. It features a clean architecture-neutral API, is thread-safe, and provides bindings for multiple programming languages, making it an ideal tool for developers needing assembly capabilities across different environments. Built on LLVM, Keystone enhances functionality and offers open-source licensing options suitable for both personal and commercial use.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="keystone-engine"&gt;Keystone Engine&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://travis-ci.org/keystone-engine/keystone"&gt;&lt;img src="https://travis-ci.org/keystone-engine/keystone.svg?branch=master" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://semaphoreci.com/aquynh/keystone"&gt;&lt;img src="https://semaphoreci.com/api/v1/aquynh/keystone/branches/master/badge.svg" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://ci.appveyor.com/project/aquynh/keystone"&gt;&lt;img src="https://ci.appveyor.com/api/projects/status/c27slvyrijiejvqs?svg=true" alt="Build status"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>lazy_importer</title><link>https://rainmana.github.io/hackyfeed/tools/justasmasiulis-lazy_importer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/justasmasiulis-lazy_importer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; lazy_importer is a C++ library designed to obfuscate API calls, enhancing the difficulty of reverse engineering software by ensuring that no identifiable strings or import declarations remain in memory or the executable. Key features include inlining capabilities, zero memory allocation, randomized function hashes for each compilation, and the ability to call functions without leaving a trace in data sections. This tool is particularly valuable for developers aiming to protect their software from static analysis and reverse engineering techniques.&lt;/p&gt;</description></item><item><title>librw</title><link>https://rainmana.github.io/hackyfeed/tools/aap-librw/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/aap-librw/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; librw is a cross-platform library designed to re-implement parts of RenderWare graphics, facilitating rendering and file format conversion across various platforms. It supports DFF and TXD file formats for PS2, D3D8, D3D9, and Xbox, with rendering capabilities via D3D9 and OpenGL backends, while being particularly useful for rendering within projects like GTA. Notable features include adaptable file format support, backend rendering versatility, and ongoing compatibility for multiple platforms.&lt;/p&gt;</description></item><item><title>LunaTranslator</title><link>https://rainmana.github.io/hackyfeed/tools/hillya51-lunatranslator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hillya51-lunatranslator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; 视觉小说翻译器 / Visual Novel Translator&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;视觉小说翻译器 / Visual Novel Translator&lt;/p&gt;</description></item><item><title>makin</title><link>https://rainmana.github.io/hackyfeed/tools/secrary-makin/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/secrary-makin/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; &lt;code&gt;makin&lt;/code&gt; is a malware assessment tool designed to simplify the process of identifying anti-debugging techniques employed by malicious samples. It injects a DLL into the target process to monitor specific API calls, providing insights into debugger detection methods, and can generate IDA Pro scripts for setting breakpoints at the identified APIs. Notable features include the ability to hook various functions from &lt;code&gt;ntdll.dll&lt;/code&gt; and &lt;code&gt;kernelbase.dll&lt;/code&gt;, effectively revealing complex anti-debugging strategies.&lt;/p&gt;</description></item><item><title>medusa</title><link>https://rainmana.github.io/hackyfeed/tools/wisk-medusa/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wisk-medusa/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Medusa is a modular and interactive disassembler that supports Windows, Linux, and OSX platforms, tailored for analyzing various file formats such as ELF, PE, Mach-O, and GameBoy binaries. It integrates seamlessly with libraries like Boost and Qt5, offering an extensible architecture for disassembly and limited semantic analysis, particularly for specific instruction sets like x86 and GameBoy. Notable features include support for file imports and exports, varying levels of symbol handling, and the ability to work with multiple architectures and binary types.&lt;/p&gt;</description></item><item><title>Millennium</title><link>https://rainmana.github.io/hackyfeed/tools/steamclienthomebrew-millennium/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/steamclienthomebrew-millennium/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Millennium is an open-source low-code framework that enables users to create, manage, and utilize plugins and themes for the desktop Steam Client without complex system interactions. Key features include a TypeScript frontend and Lua backend architecture, the ability to customize themes with JavaScript and CSS, and a curated Plugin Database to ensure version compatibility and stability when enhancing the Steam experience. This framework simplifies modding for users, allowing extensive personalization while avoiding low-level code manipulation.&lt;/p&gt;</description></item><item><title>mtasa-blue</title><link>https://rainmana.github.io/hackyfeed/tools/multitheftauto-mtasa-blue/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/multitheftauto-mtasa-blue/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Multi Theft Auto: San Andreas (MTA) is an open-source modification that enables multiplayer gameplay for the single-player version of Grand Theft Auto: San Andreas through an advanced game engine framework. It incorporates networking and GUI rendering capabilities while allowing extensive customization via a Lua scripting language, making it possible to create custom game modes and content for multiple players. Notable features include code injection techniques for game manipulation without altering original files, a robust resource management system for asynchronous content delivery, and a collaborative community for development and support.&lt;/p&gt;</description></item><item><title>Nidhogg</title><link>https://rainmana.github.io/hackyfeed/tools/idov31-nidhogg/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/idov31-nidhogg/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Nidhogg is a versatile kernel-level rootkit designed for Windows 10 and 11, enabling a wide array of operations directly from kernel space. Its primary use case is to facilitate stealthy and powerful control over system processes, threads, files, and registry items, featuring advanced capabilities such as process hiding, memory scanner bypassing, and credential dumping. Notable features include a built-in AMSI bypass, support for reflective loading, and a Nidhogg Object File (NOF) for custom kernel-mode code execution, enhancing its integration with command-and-control (C2) frameworks.&lt;/p&gt;</description></item><item><title>obfuscator</title><link>https://rainmana.github.io/hackyfeed/tools/es3n1n-obfuscator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/es3n1n-obfuscator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Obfuscator is a native C++23 code obfuscation tool designed to enhance software security by transforming executable code through various methods such as bogus control flow and constant encryption. Its primary use case is to protect applications from decompilation and reverse engineering, making it compatible with popular disassemblers like IDA and Ghidra. Notable features include customizable function and transform configurations, support for both Linux and Windows platforms, and the ability to specify additional debugging information through PDB and MAP files.&lt;/p&gt;</description></item><item><title>openappsec</title><link>https://rainmana.github.io/hackyfeed/tools/openappsec-openappsec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/openappsec-openappsec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; open-appsec is a machine learning-based web application and API threat protection tool designed to guard against OWASP Top 10 vulnerabilities and zero-day attacks. It employs a dual-phase evaluation process using both supervised and unsupervised models to intelligently assess the legitimacy of HTTP requests based on user interaction patterns and predefined attack indicators. Notable features include support for deployment on Linux, Docker, and Kubernetes environments, along with flexible management options through declarative configuration, Helm charts, and a SaaS web interface.&lt;/p&gt;</description></item><item><title>openblack</title><link>https://rainmana.github.io/hackyfeed/tools/openblack-openblack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/openblack-openblack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; openblack is an open-source reimplementation of the classic game &amp;ldquo;Black &amp;amp; White&amp;rdquo; (2001), developed using modern C++ and contemporary rendering technologies like OpenGL and Vulkan. This tool primarily serves to allow users to experience the original gameplay while requiring the original game assets for operation. Noteworthy features include pre-built binaries for multiple platforms, including Windows, Linux, and macOS, along with experimental builds for additional architectures and devices.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="openblack"&gt;openblack&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/openblack/openblack/actions/workflows/ci-vcpkg.yml?query=branch%3Amaster+event%3Apush"&gt;&lt;img src="https://github.com/openblack/openblack/actions/workflows/ci-vcpkg.yml/badge.svg?branch=master&amp;amp;event=push" alt="VCPKG CI"&gt;&lt;/a&gt;
&lt;a href="https://github.com/openblack/openblack/actions/workflows/packaging.yml?query=branch%3Amaster+event%3Apush"&gt;&lt;img src="https://github.com/openblack/openblack/actions/workflows/packaging.yml/badge.svg?branch=master&amp;amp;event=push" alt="Packaging CI"&gt;&lt;/a&gt;
&lt;a href="https://github.com/openblack/openblack/stargazers"&gt;&lt;img src="https://img.shields.io/github/stars/openblack/openblack?logo=github" alt="GitHub Stars"&gt;&lt;/a&gt;
&lt;a href="https://discord.gg/5QTexBU"&gt;&lt;img src="https://img.shields.io/discord/608729286513262622?logo=discord&amp;amp;logoColor=white" alt="Discord chat"&gt;&lt;/a&gt;
&lt;a href="LICENSE.md"&gt;&lt;img src="https://img.shields.io/github/license/openblack/openblack" alt="License"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Osiris</title><link>https://rainmana.github.io/hackyfeed/tools/danielkrupinski-osiris/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/danielkrupinski-osiris/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Osiris is a cross-platform game hacking tool designed for Counter-Strike 2, featuring a graphical user interface based on the game&amp;rsquo;s Panorama UI. Its primary use case is to enhance gameplay through various functions such as customizable visual indicators for bomb planting and inaccuracy visualizations without relying on traditional C++ runtime libraries or external dependencies. Notable features include customizable color schemes for game elements, enhanced player information rendering, and support for both Windows and Linux compilation.&lt;/p&gt;</description></item><item><title>pe-bear</title><link>https://rainmana.github.io/hackyfeed/tools/hasherezade-pe-bear/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hasherezade-pe-bear/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PE-bear is a multiplatform reversing tool designed for analyzing PE (Portable Executable) files, focusing on providing a quick and flexible initial inspection for malware analysts. It supports handling malformed PE files and comes equipped with an updated signature database from PEiD, enhancing its detection capabilities. Additionally, PE-bear can be easily installed on various platforms, including Windows and Linux, and is compatible with multiple package managers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="pe-bear"&gt;PE-bear&lt;/h2&gt;
&lt;img src="./logo/main_ico.png" alt="PE-bear logo" width=128&gt;
&lt;p&gt;&lt;a href="https://ci.appveyor.com/project/hasherezade/pe-bear"&gt;&lt;img src="https://ci.appveyor.com/api/projects/status/q2smuy32pqqo0oyn?svg=true" alt="Build status"&gt;&lt;/a&gt;
&lt;a href="https://app.codacy.com/gh/hasherezade/pe-bear/dashboard?utm_source=gh&amp;amp;utm_medium=referral&amp;amp;utm_content=&amp;amp;utm_campaign=Badge_grade"&gt;&lt;img src="https://app.codacy.com/project/badge/Grade/14648384b52b4d979bc1f2246edbd496" alt="Codacy Badge"&gt;&lt;/a&gt;
&lt;a href="https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html"&gt;&lt;img src="https://img.shields.io/badge/License-GPL_v2-blue.svg" alt="License: GPL v2"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/pe-bear/commits"&gt;&lt;img src="https://img.shields.io/github/last-commit/hasherezade/pe-bear/main" alt="Last Commit"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>pe-sieve</title><link>https://rainmana.github.io/hackyfeed/tools/hasherezade-pe-sieve/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hasherezade-pe-sieve/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PE-sieve is a lightweight malware detection tool that scans individual processes for malicious implants such as injected PEs, shellcodes, and various in-memory modifications. It effectively identifies techniques like Process Hollowing and Reflective DLL Injection, allowing for the extraction and analysis of detected threats. Additionally, PE-sieve can be integrated as a DLL with a simple API for use in other applications, enhancing its versatility in malware analysis workflows.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;img src="./logo/PE-SIEVE_small.png" alt=""&gt;
&lt;p&gt;&lt;a href="https://ci.appveyor.com/project/hasherezade/pe-sieve"&gt;&lt;img src="https://ci.appveyor.com/api/projects/status/crlo8iyvi4bm80yp?svg=true" alt="Build status"&gt;&lt;/a&gt;
&lt;a href="https://app.codacy.com/gh/hasherezade/pe-sieve/dashboard?branch=master"&gt;&lt;img src="https://api.codacy.com/project/badge/Grade/b75fd4d95bd94629879381241e4a7c02" alt="Codacy Badge"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/pe-sieve/commits"&gt;&lt;img src="https://img.shields.io/github/commit-activity/m/hasherezade/pe-sieve" alt="Commit activity"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/pe-sieve/commits"&gt;&lt;img src="https://img.shields.io/github/last-commit/hasherezade/pe-sieve/master" alt="Last Commit"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>PoC</title><link>https://rainmana.github.io/hackyfeed/tools/thezdi-poc/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/thezdi-poc/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Proofs-of-concept&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Proofs-of-concept&lt;/p&gt;</description></item><item><title>project-restoration</title><link>https://rainmana.github.io/hackyfeed/tools/leoetlino-project-restoration/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/leoetlino-project-restoration/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Project Restoration is a patch for &lt;em&gt;Majora&amp;rsquo;s Mask 3D&lt;/em&gt; that reintroduces mechanics from the original game while resolving gameplay issues to enhance player experience. Notable features include an improved swimming mechanic for Zora Link, adjustments to the Inverted Song of Time&amp;rsquo;s effect, and modifications to the Twinmold battle for clarity and pacing. The project aims to blend the best aspects of the original game with the enhanced graphics of the remaster, ensuring a polished gameplay experience without game-breaking issues.&lt;/p&gt;</description></item><item><title>PS2Recomp</title><link>https://rainmana.github.io/hackyfeed/tools/ran-j-ps2recomp/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ran-j-ps2recomp/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PS2Recomp is an experimental static recompiler for PlayStation 2 ELF binaries that translates MIPS R5900 instructions into C++ code. Its primary use case involves recompiling and executing PS2 games while allowing configuration for stubs, skips, and instruction patches. Notable features include customizable syscall handling, support for PS2-specific macros, and integration with Ghidra for efficient function export and mapping.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="ps2recomp-playstation-2-static-recompiler-experimental"&gt;PS2Recomp: PlayStation 2 Static Recompiler (Experimental)&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://discord.gg/JQ8mawxUEf"&gt;&lt;img src="https://img.shields.io/badge/Discord-Join%20Server-5865F2?logo=discord&amp;amp;logoColor=white" alt="Discord"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Also check our &lt;a href="https://github.com/ran-j/PS2Recomp/wiki"&gt;WIKI&lt;/a&gt;&lt;/p&gt;</description></item><item><title>QBDI</title><link>https://rainmana.github.io/hackyfeed/tools/qbdi-qbdi/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/qbdi-qbdi/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; QBDI is a modular dynamic binary instrumentation (DBI) framework designed for cross-platform and cross-architecture use, supporting various operating systems including Linux, macOS, Android, iOS, and Windows. It provides C/C++ APIs along with Python and JavaScript bindings, facilitating scripting while integrating seamlessly with external injection tools like Frida. Notable features include the ability to instrument binaries without a preferred injection method and an LD_PRELOAD-based injector for dynamic executables on Linux and macOS, although it currently does not support multithreading or C++ exception handling.&lt;/p&gt;</description></item><item><title>REDasm</title><link>https://rainmana.github.io/hackyfeed/tools/redasmorg-redasm/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/redasmorg-redasm/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; REDasm is a cross-platform disassembler designed for both hobbyists and professional reverse engineers, featuring a modern codebase and a user-friendly Qt frontend. It supports C++ and Python 3 plugins, multithreaded analysis, and various binary formats including Portable Executable and ELF, while providing capabilities like binary lifting and intermediate language analysis. The underlying architecture, driven by LibREDasm, allows for extensive customization and the addition of new languages.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
 &lt;img src="https://raw.githubusercontent.com/REDasmOrg/REDasm/master/artwork/logo_readme_20200905.png"/&gt;
&lt;/div&gt;
&lt;br&gt;
&lt;div align="center"&gt;
 &lt;a href="https://github.com/REDasmOrg/REDasm/actions?query=workflow%3AREDasm-Builds"&gt;
 &lt;img src="https://github.com/REDasmOrg/REDasm/workflows/REDasm-Builds/badge.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://lgtm.com/projects/g/REDasmOrg/REDasm/context:cpp"&gt;
 &lt;img alt="Language grade: C/C++" src="https://img.shields.io/lgtm/grade/cpp/g/REDasmOrg/REDasm.svg?logo=lgtm&amp;logoWidth=18"&gt;
 &lt;/a&gt;
 &lt;img src="https://img.shields.io/badge/license-GPL3-8e725e.svg?style=flat-square"&gt;
 &lt;a href="https://github.com/ellerbrock/open-source-badges/"&gt;
 &lt;img src="https://badges.frapsoft.com/os/v1/open-source.png?v=103"&gt;
 &lt;/a&gt;
&lt;/div&gt;
&lt;h5 align="center"&gt;
 &lt;a href="#features"&gt;Features&lt;/a&gt;
 &lt;span&gt; | &lt;/span&gt;
 &lt;a href="https://github.com/REDasmOrg/REDasm/blob/master/COMPILE.md"&gt;Compile&lt;/a&gt;
 &lt;span&gt; | &lt;/span&gt;
 &lt;a href="https://www.reddit.com/r/REDasm"&gt;Reddit&lt;/a&gt;
 &lt;span&gt; | &lt;/span&gt;
 &lt;a href="https://twitter.com/re_dasm"&gt;Twitter&lt;/a&gt;
 &lt;span&gt; | &lt;/span&gt;
 &lt;a href="https://t.me/REDasmDisassembler"&gt;Telegram&lt;/a&gt;
&lt;/h5&gt;
&lt;hr&gt;
REDasm is a cross platform disassembler with a modern codebase useful 
from the hobbyist to the professional reverse engineer.&lt;br&gt;
All features are provided by &lt;a href="https://github.com/REDasmOrg/REDasm-Library/tree/master"&gt;LibREDasm&lt;/a&gt; which loads
plugins developed in C, C++ and Python3 (you can also support new languages if you want!) and an user friendly Qt frontend.&lt;br&gt;
LibREDasm also provides a plain C API for maximum ABI compatibility along with a C++17 core.&lt;br&gt;
&lt;br&gt;
&lt;p align="right"&gt;&lt;i&gt;Tested on Windows and Linux.&lt;/i&gt;&lt;/p&gt;</description></item><item><title>RigelEngine</title><link>https://rainmana.github.io/hackyfeed/tools/lethal-guitar-rigelengine/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lethal-guitar-rigelengine/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Rigel Engine is a modern re-implementation of the classic game Duke Nukem II, enabling it to run natively on today’s operating systems while maintaining compatibility with the original game&amp;rsquo;s data files. Its key features include widescreen support, improved graphics and performance with smooth scrolling, quick save functionality, enhanced controller support, and extended modding capabilities, all achieved through reverse engineering due to the absence of the original source code. The tool is stable and supports multiple platforms, including Windows, Linux, and macOS, with minimal system requirements.&lt;/p&gt;</description></item><item><title>rz-ghidra</title><link>https://rainmana.github.io/hackyfeed/tools/rizinorg-rz-ghidra/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rizinorg-rz-ghidra/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; rz-ghidra is an integration of the Ghidra decompiler and Sleigh disassembler specifically designed for the Rizin framework. This plugin allows users to decompile functions, output various formats such as XML and JSON, and customize settings for decompilation in a self-contained manner without requiring the full Ghidra suite. Notable features include seamless integration with Rizin, side-by-side decompilation views, and extensive configurability through various parameters for enhanced user experience.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;img width="150" height="150" align="left" style="float: left; margin: 0 10px 0 0;" alt="rz-ghidra logo" src="https://raw.githubusercontent.com/rizinorg/rz-ghidra/master/assets/logo.svg"&gt;
&lt;h1 id="rz-ghidra"&gt;rz-ghidra&lt;/h1&gt;
&lt;!--[![Build Status](https://travis-ci.com/rizinorg/rz-ghidra-dec.svg?token=JDmXp2pDhXxtPErySVHM&amp;branch=master)](https://travis-ci.com/rizinorg/rz-ghidra)--&gt;
&lt;p&gt;This is an integration of the Ghidra decompiler and Sleigh Disassembler for &lt;a href="https://github.com/rizinorg/rizin"&gt;Rizin&lt;/a&gt;.
It is solely based on the decompiler part of Ghidra, which is written entirely in
C++, so Ghidra itself is not required at all and the plugin can be built self-contained.
This project was presented, initially for radare2, at r2con 2019 as part of the Cutter talk: &lt;a href="https://youtu.be/eHtMiezr7l8?t=950"&gt;https://youtu.be/eHtMiezr7l8?t=950&lt;/a&gt;&lt;/p&gt;</description></item><item><title>sogen</title><link>https://rainmana.github.io/hackyfeed/tools/momo5502-sogen/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/momo5502-sogen/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Sogen is a high-performance Windows user space emulator designed for syscall-level operation, granting detailed control over process execution, particularly useful in security analysis, malware dissection, and DRM research. Notable features include advanced memory management, complete PE loading support, implemented Windows structured exception handling, a scheduled threading model, and comprehensive debugging interfaces, including GDB compatibility for seamless integration with popular debugging tools.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
	&lt;img src="https://momo5502.com/sogen/banner.png" height="300" /&gt;
	&lt;br&gt;
	&lt;a href="https://github.com/momo5502/sogen?tab=GPL-2.0-1-ov-file"&gt;&lt;img src="https://img.shields.io/github/license/momo5502/sogen?color=00B0F8"/&gt;&lt;/a&gt;
	&lt;a href="https://github.com/momo5502/sogen/actions"&gt;&lt;img src="https://img.shields.io/github/actions/workflow/status/momo5502/sogen/build.yml?branch=main&amp;label=build"/&gt;&lt;/a&gt;
	&lt;a href="https://github.com/momo5502/sogen/issues"&gt;&lt;img src="https://img.shields.io/github/issues/momo5502/sogen?color=F8B000"/&gt;&lt;/a&gt;
	&lt;img src="https://img.shields.io/github/commit-activity/m/momo5502/sogen?color=FF3131"/&gt;
&lt;/h1&gt;
&lt;p&gt;Sogen is a high-performance Windows user space emulator that operates at syscall level, providing full control over process execution through comprehensive hooking capabilities.&lt;/p&gt;</description></item><item><title>SpecialK</title><link>https://rainmana.github.io/hackyfeed/tools/specialko-specialk/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/specialko-specialk/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Special K is a versatile tool designed for PC gaming that enhances graphics and performance through code injection. It allows users to modify game behavior by injecting its DLL into applications, supporting both local and global injection methods, which enables a wide range of visual and performance adjustments. Notable features include performance analysis tools, shader and texture modifications, and compatibility with various graphics APIs in both Windows and WINE environments.&lt;/p&gt;</description></item><item><title>stegseek</title><link>https://rainmana.github.io/hackyfeed/tools/rickdejager-stegseek/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rickdejager-stegseek/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Stegseek is a high-performance steghide cracker designed to efficiently extract hidden data from files, achieving remarkable speeds by leveraging a comprehensive wordlist, such as &lt;code&gt;rockyou.txt&lt;/code&gt;, to crack passwords in under two seconds. Its primary use case includes both password cracking and the detection of steghide metadata without requiring passwords, enabling users to ascertain file contents speedily. Notable features include the ability to brute-force the random number generator used in steghide to recover unencrypted files and detailed metadata extraction.&lt;/p&gt;</description></item><item><title>TegraRcmGUI</title><link>https://rainmana.github.io/hackyfeed/tools/eliboa-tegrarcmgui/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/eliboa-tegrarcmgui/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; TegraRcmGUI is a Windows-based graphical user interface that facilitates the injection of payloads into Nintendo Switch consoles utilizing the Fusée Gelée exploit for RCM mode. Key features include the ability to manage favorites, run Linux on the Switch, mount the device as USB mass storage, and dump BIS keys for eMMC content decryption. The tool also offers conveniences such as auto-injection options, minimizing to the system tray, and automatic startup with Windows.&lt;/p&gt;</description></item><item><title>TelemetrySourcerer</title><link>https://rainmana.github.io/hackyfeed/tools/jthuraisamy-telemetrysourcerer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jthuraisamy-telemetrysourcerer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Telemetry Sourcerer is a tool designed for red teamers and security researchers to enumerate and disable various sources of telemetry utilized by antivirus and endpoint detection and response (EDR) systems on Windows. It features the ability to suppress kernel-mode callbacks, unhook inline user-mode hooks, and identify relevant Event Tracing for Windows (ETW) sessions, making it instrumental in identifying blind spots and validating evasion techniques within lab environments. However, it is primarily for research applications and carries OPSEC risks if deployed in production settings.&lt;/p&gt;</description></item><item><title>Textractor</title><link>https://rainmana.github.io/hackyfeed/tools/artikash-textractor/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/artikash-textractor/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Textractor is an open-source text hooking tool designed for x86/x64 video games on Windows and Wine, enabling users to extract in-game text for translation or accessibility purposes. It features automatic hooking for multiple game engines, extensive customization options, and support for AGTH hook codes, making it adaptable for varied gaming environments. The tool also allows for the development of custom extensions, enhancing its functionality and user experience.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="textractor"&gt;Textractor&lt;/h1&gt;
&lt;p&gt;&lt;img src="screenshot.png" alt="How it looks"&gt;&lt;/p&gt;</description></item><item><title>TiltedEvolution</title><link>https://rainmana.github.io/hackyfeed/tools/tiltedphoques-tiltedevolution/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tiltedphoques-tiltedevolution/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Tilted Online is a framework designed to facilitate multiplayer gameplay in Bethesda&amp;rsquo;s Skyrim Special Edition. It provides essential components such as game client sources, an immersive launcher, and server implementations, all structured to enhance the multiplayer experience. Notable features include a modular architecture for client-server interactions and community-driven development, allowing contributors with C++ experience to actively participate.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="tilted-online"&gt;Tilted Online&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://github.com/tiltedphoques/TiltedEvolution/workflows/Build%20windows/badge.svg?branch=master" alt="Build status"&gt; &lt;a href="https://github.com/tiltedphoques/TiltedEvolution/actions/workflows/linux.yml"&gt;&lt;img src="https://github.com/tiltedphoques/TiltedEvolution/actions/workflows/linux.yml/badge.svg" alt="Build linux"&gt;&lt;/a&gt; &lt;a href="https://discord.gg/skyrimtogether"&gt;&lt;img src="https://img.shields.io/discord/247835175860305931.svg?label=&amp;amp;logo=discord&amp;amp;logoColor=ffffff&amp;amp;color=7389D8&amp;amp;labelColor=6A7EC2" alt="Discord"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://avatars.githubusercontent.com/u/52131158?s=200&amp;v=4" align="right"
alt="Size Limit logo by Anton Lovchikov" width="110" height="100"&gt;&lt;/p&gt;</description></item><item><title>tiny_tracer</title><link>https://rainmana.github.io/hackyfeed/tools/hasherezade-tiny_tracer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hasherezade-tiny_tracer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Tiny Tracer is a binary instrumentation tool designed for tracing API calls, defined local functions, selected instructions, and inline system calls, while also evading various anti-debug and anti-VM techniques. It generates detailed reports in a .tag format, which can be utilized by other analysis tools, facilitating deeper insights into a program&amp;rsquo;s execution flow. The tool is primarily aimed at security researchers and analysts who need to examine malicious binaries or analyze software behavior in a controlled environment.&lt;/p&gt;</description></item><item><title>tripwire-open-source</title><link>https://rainmana.github.io/hackyfeed/tools/tripwire-tripwire-open-source/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tripwire-tripwire-open-source/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Open Source Tripwire® is a file integrity monitoring tool designed to detect and alert users about unauthorized changes to files and directories by comparing the current filesystem state against a predefined baseline. It features a highly configurable policy file system for specifying which attributes to monitor, the capability to sign configuration and report files for added security, and the ability to generate and manage cryptographic keys for multiple machines. Users can utilize it to establish secure baselines and automate periodic checks, enhancing overall system integrity and security.&lt;/p&gt;</description></item><item><title>Triton</title><link>https://rainmana.github.io/hackyfeed/tools/jonathansalwan-triton/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jonathansalwan-triton/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Triton is a dynamic binary analysis library designed for building program analysis tools, enabling automated reverse engineering and software verification. It supports dynamic symbolic execution and taint analysis across multiple architectures including x86, ARM, and RISC-V, and features a powerful API in both C++ and Python, as well as capabilities for expression synthesis, SMT solver integration, and LLVM lifting.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;&lt;img width="50%" src="https://triton-library.github.io/files/triton2.png"/&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Triton&lt;/strong&gt; is a dynamic binary analysis library. It provides internal components that allow you to build your program analysis tools,
automate reverse engineering, perform software verification or just emulate code.&lt;/p&gt;</description></item><item><title>vulhunt</title><link>https://rainmana.github.io/hackyfeed/tools/vulhunt-re-vulhunt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vulhunt-re-vulhunt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VulHunt is a vulnerability hunting framework aimed at assisting security researchers in identifying vulnerabilities within software binaries and UEFI firmware. Built on Binarly&amp;rsquo;s BIAS, it supports large-scale vulnerability management and integrates community-developed rulepacks while offering scanning capabilities for various binary formats, including BA2 and Binary Ninja databases. Additionally, it features an MCP server for integration with AI assistants, facilitating real-time vulnerability analysis and reporting.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="vulhunt-community-edition"&gt;VulHunt Community Edition&lt;/h1&gt;
&lt;p&gt;VulHunt is a vulnerability hunting framework developed by Binarly&amp;rsquo;s Research
team. It is designed to help security researchers and practitioners identify
vulnerabilities in software binaries and UEFI firmware. VulHunt is built on top
of Binarly&amp;rsquo;s Binary Analysis and Inspection System (BIAS), which provides a
powerful and flexible environment for analysing and understanding binaries.
VulHunt integrates with the capabilities of the Binarly Transparency Platform
(BTP) to enable large-scale vulnerability management, hunting, and triage
capabilities.&lt;/p&gt;</description></item><item><title>wazuh</title><link>https://rainmana.github.io/hackyfeed/tools/wazuh-wazuh/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wazuh-wazuh/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Wazuh is an open-source security platform designed for threat prevention, detection, and response across various environments, including on-premises, virtualized, containerized, and cloud settings. It features an endpoint security agent that collects data for analysis by a centralized management server, fully integrated with the Elastic Stack for enhanced search and visualization of security alerts. Key capabilities include intrusion detection, log data analysis, file integrity monitoring, vulnerability detection, configuration assessment, and automated incident response, making it a comprehensive tool for maintaining security compliance and mitigating threats.&lt;/p&gt;</description></item><item><title>XELFViewer</title><link>https://rainmana.github.io/hackyfeed/tools/horsicq-xelfviewer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/horsicq-xelfviewer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; XELFViewer is a cross-platform ELF file viewer and editor designed for Windows, Linux, and MacOS environments. Its primary use case includes analyzing and modifying ELF (Executable and Linkable Format) files, which are commonly used in Unix-based operating systems. Notable features include a user-friendly interface for navigation, functionality for both viewing and editing file contents, and support for community translations.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&amp;amp;hosted_button_id=NF3FBD3KHMXDN"&gt;&lt;img src="https://img.shields.io/badge/Donate-PayPal-green.svg" alt="Donate"&gt;&lt;/a&gt;
&lt;a href="https://github.com/horsicq/XELFViewer/releases"&gt;&lt;img src="https://img.shields.io/github/tag/horsicq/XELFViewer.svg" alt="GitHub tag (latest SemVer)"&gt;&lt;/a&gt;
&lt;a href="https://github.com/horsicq/XELFViewer/releases"&gt;&lt;img src="https://img.shields.io/github/downloads/horsicq/XELFViewer/total.svg" alt="GitHub All Releases"&gt;&lt;/a&gt;
&lt;a href="https://github.com/horsicq/XTranslation"&gt;&lt;img src="https://gitlocalize.com/repo/4736/whole_project/badge.svg" alt="gitlocalized "&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;ELF file viewer/editor for Windows, Linux and MacOS.&lt;/p&gt;</description></item><item><title>XMachOViewer</title><link>https://rainmana.github.io/hackyfeed/tools/horsicq-xmachoviewer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/horsicq-xmachoviewer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; XMachOViewer is a cross-platform Mach-O file analysis tool designed for Windows, Linux, and macOS. Its primary use case involves examining Mach-O binaries through features such as heuristic scanning, string and hex viewing, disassembly, entropy analysis, and dynamic library linking, enabling users to uncover characteristics, anomalies, and cryptographic signatures within the files. Notable features include support for multiple architectures, automatic file format detection, and a detailed symbol table viewer.&lt;/p&gt;</description></item><item><title>xoreos</title><link>https://rainmana.github.io/hackyfeed/tools/xoreos-xoreos/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/xoreos-xoreos/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; xoreos is an open-source reimplementation of BioWare&amp;rsquo;s Aurora engine, targeting classic games like Neverwinter Nights and Dragon Age II to provide portable access across platforms. The tool currently supports basic graphics rendering and sound playback, with partial in-game graphics and a starting point for a scripting system, though no full gameplay mechanics are implemented yet. Its modular design allows for contributions from the community, fostering ongoing development and enhancement of supported titles.&lt;/p&gt;</description></item></channel></rss>