<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>C on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/tags/c/</link><description>Recent content in C on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/tags/c/feed.xml" rel="self" type="application/rss+xml"/><item><title>android-unpacker</title><link>https://rainmana.github.io/hackyfeed/tools/strazzere-android-unpacker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/strazzere-android-unpacker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Android Unpacker tool facilitates the reverse engineering and unpacking of Android applications protected by various obfuscation techniques, including APKProtect and Bangcle. Its notable features include a native unpacker that operates without dependencies on GDB, scripts for unpacking specific protections, and methods for hiding debugging environments from detection. This tool is primarily intended for educational and research purposes in the field of malware analysis.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="android-unpacker"&gt;android-unpacker&lt;/h1&gt;
&lt;p&gt;Android Unpacker presented at Defcon 22: Android Hacker Protection Level 0&lt;/p&gt;</description></item><item><title>awesome-flipperzero-withModules</title><link>https://rainmana.github.io/hackyfeed/tools/roguemaster-awesome-flipperzero-withmodules/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/roguemaster-awesome-flipperzero-withmodules/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Awesome Flipper Zero with Modules&amp;rdquo; repository is an enhanced resource collection for the Flipper Zero device, providing a variety of plugins, payloads, and databases to extend its functionality. Notable features include access to numerous pre-configured BadUSB payloads, IR device dumps, and various custom files for generating or interacting with Flipper Zero formats. This repository serves as a comprehensive toolkit for users looking to maximize their experience and capabilities with the Flipper Zero platform.&lt;/p&gt;</description></item><item><title>CTFs</title><link>https://rainmana.github.io/hackyfeed/tools/adamkadaban-ctfs/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/adamkadaban-ctfs/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CTFs is a repository containing write-ups and resources for various Cyber Capture The Flag (CTF) challenges. It offers a comprehensive cheat sheet detailing strategies and techniques across diverse categories, including forensics, binary exploitation, web challenges, and cryptography. Notable features include curated educational resources, practice sites, and a web mirror for easy access.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="ctfs"&gt;CTFs&lt;/h1&gt;
&lt;p&gt;Writeups / Files for some of the Cyber CTFs that I&amp;rsquo;ve done&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ve also included a list of &lt;strong&gt;CTF resources&lt;/strong&gt; as well as a comprehensive &lt;strong&gt;cheat sheet&lt;/strong&gt; covering tons of common CTF challenges&lt;/p&gt;</description></item><item><title>ctftool</title><link>https://rainmana.github.io/hackyfeed/tools/taviso-ctftool/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/taviso-ctftool/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ctftool is an interactive command-line tool designed for exploring and experimenting with the CTF protocol used in Windows for Text Services. Its primary use case includes studying Windows internals, debugging Text Input Processors, and analyzing security within the CTF environment, with notable features such as support for scripting, automated interactions, and various commands for managing connections and clients. The tool is compatible with Windows 7, 8, and 10, supporting both 32-bit and x64 architectures.&lt;/p&gt;</description></item><item><title>CVE-2020-0796</title><link>https://rainmana.github.io/hackyfeed/tools/danigargu-cve-2020-0796/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/danigargu-cve-2020-0796/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CVE-2020-0796 is a Windows SMBv3 local privilege escalation exploit that targets a vulnerability in the SMB protocol, enabling unauthorized users to elevate their permissions. The tool includes proof of concept (PoC) and analysis references for users seeking to understand and replicate the exploit. Notable features include detailed documentation and references to further resources for in-depth exploitation and analysis of the vulnerability.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="cve-2020-0796"&gt;CVE-2020-0796&lt;/h1&gt;
&lt;p&gt;Windows SMBv3 LPE Exploit&lt;/p&gt;
&lt;p&gt;&lt;img src="https://user-images.githubusercontent.com/1675387/77913732-110d4f80-7295-11ea-9af6-f17201c66673.gif" alt="exploit"&gt;&lt;/p&gt;</description></item><item><title>CVE-2024-1086</title><link>https://rainmana.github.io/hackyfeed/tools/notselwyn-cve-2024-1086/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/notselwyn-cve-2024-1086/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CVE-2024-1086 is a universal local privilege escalation exploit targeting Linux kernels from v5.14 to v6.6, with a notable success rate of 99.4% in KernelCTF environments. It allows users to gain root access under specific conditions related to user namespaces and kernel configurations, while also showcasing a deliberate kernel panic after execution to deter malicious exploitation. The tool includes both source code for building as well as a compiled binary for ease of use.&lt;/p&gt;</description></item><item><title>DDOS-RootSec</title><link>https://rainmana.github.io/hackyfeed/tools/r00ts3c-ddos-rootsec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/r00ts3c-ddos-rootsec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The RootSec Archive is a comprehensive collection of tools and resources designed for conducting Distributed Denial-of-Service (DDoS) attacks, vulnerability scanning, and botnet management. Notable features include a variety of botnet variants (such as Mirai and QBot), password cracking tools, real-time statistics through DStat, and C2 sources for effective botnet control. This archive serves both as a point of reference and a toolkit for security testing and exploitation practices.&lt;/p&gt;</description></item><item><title>DEFCON-31-Syscalls-Workshop</title><link>https://rainmana.github.io/hackyfeed/tools/virtualalllocex-defcon-31-syscalls-workshop/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/virtualalllocex-defcon-31-syscalls-workshop/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The DEFCON 31 Syscalls Workshop repository provides educational materials focusing on direct and indirect syscalls within Windows operating systems, particularly aimed at enhancing understanding of Win32 and Native APIs for Red Team activities. It includes theoretical content, practical exercises, and proof of concepts (POCs) to facilitate learning about syscall mechanisms and their implications in EDR evasion. Notable features include an emphasis on manual techniques over complex automation, offering foundational insights into call stacks and shellcode execution dynamics.&lt;/p&gt;</description></item><item><title>dethrace</title><link>https://rainmana.github.io/hackyfeed/tools/dethrace-labs-dethrace/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dethrace-labs-dethrace/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dethrace is a recreation project aimed at reverse-engineering the 1997 game Carmageddon to enable it to run natively on contemporary systems. The tool supports building with CMake and SDL2, and allows users to leverage original game assets or demo versions for gameplay. Notably, it offers configuration options through an INI file and supports CD audio playback from compatible folders, enhancing the authenticity of the gaming experience.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="dethrace"&gt;Dethrace&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/dethrace-labs/dethrace/actions/workflows/workflow.yml"&gt;&lt;img src="https://github.com/dethrace-labs/dethrace/actions/workflows/workflow.yaml/badge.svg" alt="Workflow"&gt;&lt;/a&gt;
&lt;a href="https://twitter.com/dethrace_labs"&gt;&lt;img src="https://badgen.net/badge/icon/twitter?icon=twitter&amp;amp;label" alt="Twitter"&gt;&lt;/a&gt;
&lt;a href="https://discord.gg/f5StsuP"&gt;&lt;img src="https://badgen.net/badge/icon/discord?icon=discord&amp;amp;label" alt="Discord Carmageddon server"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>dumpulator</title><link>https://rainmana.github.io/hackyfeed/tools/mrexodia-dumpulator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mrexodia-dumpulator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dumpulator is a dynamic code emulation library designed for analyzing minidump files, facilitating the reverse engineering of malware and other binaries. Its primary use case includes emulating function calls and tracing execution paths within dumped memory structures, allowing users to decrypt strings and execute code snippets easily. Notable features comprise memory allocation, UTF-16 string reading, and the ability to trace execution for debugging purposes, all while presenting a clean interface for integration within Python scripts.&lt;/p&gt;</description></item><item><title>e9patch</title><link>https://rainmana.github.io/hackyfeed/tools/gjduck-e9patch/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gjduck-e9patch/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; E9Patch is a static binary rewriting tool designed for &lt;code&gt;x86_64&lt;/code&gt; Linux ELF binaries that enables users to modify and patch binaries without introducing dependencies, making the output a drop-in replacement. Notable features include its scalability for large binaries, fast rewriting capability, low overhead performance, and programmability for integration with other projects. With functionalities such as instruction instrumentation and various supported modes, E9Patch can effectively enhance binary behavior for tasks such as fuzzing and system call interception.&lt;/p&gt;</description></item><item><title>eDBG</title><link>https://rainmana.github.io/hackyfeed/tools/shinoleah-edbg/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/shinoleah-edbg/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; eDBG is a lightweight CLI debugger based on eBPF, designed for Android ARM64 platforms, which offers enhanced resistance to anti-debugging mechanisms compared to traditional ptrace-based debuggers. Its notable features include a user-friendly CLI interface akin to pwndbg, support for standard debugging functionalities, and a file and offset-based breakpoint registration system that facilitates fast startup and multi-threaded or multi-process debugging. Additionally, eDBG operates without direct program attachment, enabling stable dynamic analysis with minimal intrusion.&lt;/p&gt;</description></item><item><title>h-encore</title><link>https://rainmana.github.io/hackyfeed/tools/theofficialflow-h-encore/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/theofficialflow-h-encore/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; h-encore is a jailbreak tool for the PS Vita that enables kernel and user-mode modifications on firmware versions 3.65, 3.67, and 3.68. Its primary use case is to allow users to install plugins, run homebrew applications, and customize their device&amp;rsquo;s performance. Notable features include the ability to auto-exit the bootstrap menu, personalize savedata to remove trophy warnings, and a streamlined kernel ROP chain for enhanced stability and compatibility.&lt;/p&gt;</description></item><item><title>Hacking-Windows</title><link>https://rainmana.github.io/hackyfeed/tools/mytechnotalent-hacking-windows/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mytechnotalent-hacking-windows/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Hacking Windows is a comprehensive resource that provides insights into reverse engineering and hacking techniques specifically for Windows applications using Assembly language. It includes practical examples, tutorials, and chapters dedicated to debugging and analyzing various Windows API functions in both x86 and x64 architectures. Notable features include accessible self-study material, a free downloadable book, and hands-on exercises focused on real-world programming scenarios.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://github.com/mytechnotalent/Hacking-Windows/blob/main/Hacking%20Windows.png?raw=true" alt="image"&gt;&lt;/p&gt;
&lt;h2 id="free-reverse-engineering-self-study-course-here"&gt;FREE Reverse Engineering Self-Study Course &lt;a href="https://github.com/mytechnotalent/Reverse-Engineering-Tutorial"&gt;HERE&lt;/a&gt;&lt;/h2&gt;
&lt;br&gt;
&lt;h1 id="hacking-windows"&gt;Hacking Windows&lt;/h1&gt;
&lt;p&gt;The book and code repo for the FREE Hacking Windows book by Kevin Thomas.&lt;/p&gt;</description></item><item><title>hidden</title><link>https://rainmana.github.io/hackyfeed/tools/jkornev-hidden/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jkornev-hidden/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Hidden is a Windows driver designed for reverse engineering and research purposes, enabling users to conceal specific environmental indicators on their machines, such as debugging tools and virtual machine infrastructure. It offers advanced features to hide registry keys, files, directories, and processes, while providing a usermode interface through a library and command-line interface for comprehensive management capabilities. Notably, it includes the functionality to protect specific processes and exclude others from hiding features, all compatible with Windows Vista and later versions.&lt;/p&gt;</description></item><item><title>hollows_hunter</title><link>https://rainmana.github.io/hackyfeed/tools/hasherezade-hollows_hunter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hasherezade-hollows_hunter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Hollows Hunter is a command-line tool designed to identify and dump potentially malicious implants in processes by utilizing the PE-sieve passive memory scanner. Its primary use case includes scanning processes based on various criteria, such as process name and creation time, and it offers capabilities for continuous memory scanning and ETW listening. Notable features include the ability to scan all processes if no specific targets are specified, and support for multiple input criteria for enhanced targeting.&lt;/p&gt;</description></item><item><title>HyperDbg</title><link>https://rainmana.github.io/hackyfeed/tools/hyperdbg-hyperdbg/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hyperdbg-hyperdbg/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HyperDbg is an open-source, hypervisor-assisted debugger designed for advanced analysis, fuzzing, and reversing of Windows applications at both user and kernel levels. It leverages modern hardware features like Intel VT-x and EPT, enabling stealthy operation that resists detection by classic anti-debugging techniques, while offering unique capabilities such as hidden hooks and code coverage measurement. This tool is tailored for users with deep low-level system knowledge, providing full control over the operating system for intricate debugging tasks.&lt;/p&gt;</description></item><item><title>kernel-exploits</title><link>https://rainmana.github.io/hackyfeed/tools/bcoles-kernel-exploits/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bcoles-kernel-exploits/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The bcoles/kernel-exploits repository provides various updated local root exploit implementations targeting vulnerabilities in the Linux kernel, specifically those identified by their CVEs. Each exploit enables privilege escalation through vulnerabilities such as improper memory handling or mismanaged user namespaces, allowing attackers to gain root access under certain conditions. Notable features include detailed exploit descriptions and references to original sources for further investigation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="kernel-exploits"&gt;Kernel Exploits&lt;/h1&gt;
&lt;p&gt;Various kernel exploits&lt;/p&gt;
&lt;h2 id="cve-2021-22555"&gt;CVE-2021-22555&lt;/h2&gt;
&lt;p&gt;Linux local root exploit.&lt;/p&gt;</description></item><item><title>kernel-exploits</title><link>https://rainmana.github.io/hackyfeed/tools/xairy-kernel-exploits/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/xairy-kernel-exploits/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The xairy/kernel-exploits repository contains a collection of Linux kernel exploit code samples for various vulnerabilities, primarily focusing on local privilege escalation (LPE) and information leak scenarios. Each entry is associated with specific Common Vulnerabilities and Exposures (CVEs), detailing the exploit&amp;rsquo;s impact and vector, enhancing understanding and mitigation strategies for kernel security vulnerabilities. Notable features include the absence of licensing, making the code freely available for educational and research purposes.&lt;/p&gt;</description></item><item><title>kernelpwn</title><link>https://rainmana.github.io/hackyfeed/tools/smallkirby-kernelpwn/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/smallkirby-kernelpwn/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The kernelpwn repository serves as a comprehensive resource for Capture The Flag (CTF) challenges focused on kernel exploitation, providing both challenge write-ups and educational material for beginners in the field. It features a collection of solved kernel-pwn challenges with detailed write-ups, covering various complex exploitation techniques such as SMEP, SMAP, KPTI, and KASLR bypasses. Notable features include a focus on both kernel and non-userland vulnerabilities, as well as an invitation for community contributions to enhance the repository’s challenge offerings.&lt;/p&gt;</description></item><item><title>ksm</title><link>https://rainmana.github.io/hackyfeed/tools/asamy-ksm/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/asamy-ksm/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; KSM is a lightweight x64 hypervisor designed for Intel processors that functions primarily as an extra layer of protection for existing operating systems, rather than running other OS instances. Notable features include a self-contained physical memory introspection engine, userspace physical memory virtualization, IDT shadowing, and experimental support for nesting and APIC virtualization. It is compatible with both Windows and Linux kernels, making it suitable for security applications such as anti-virus and sandboxing.&lt;/p&gt;</description></item><item><title>learning-reverse-engineering</title><link>https://rainmana.github.io/hackyfeed/tools/jstrosch-learning-reverse-engineering/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jstrosch-learning-reverse-engineering/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Learning Reverse Engineering repository provides a collection of programs aimed at enhancing skills in reverse engineering and malware analysis. It organizes content by specific concepts related to reverse engineering, delivers both source code and compiled binaries, and includes links to supplementary online courses and video playlists. Notable features include guidance on using various tools like Ghidra and IDA Pro, as well as instructions for compiling the source code with Microsoft’s C/C++ compiler.&lt;/p&gt;</description></item><item><title>linux-kernel-exploits</title><link>https://rainmana.github.io/hackyfeed/tools/secwiki-linux-kernel-exploits/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/secwiki-linux-kernel-exploits/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The linux-kernel-exploits repository provides a catalog of various known vulnerabilities within the Linux kernel, detailing specific CVEs along with their descriptions and affected kernel versions. Its primary use case is to aid security researchers and penetration testers in identifying and exploiting kernel vulnerabilities for testing and mitigation purposes. Notable features include a comprehensive list of CVEs organized by year, along with linked folders containing additional exploit details.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="linux-kernel-exploits"&gt;linux-kernel-exploits&lt;/h1&gt;
&lt;h3 id="简介"&gt;简介&lt;/h3&gt;
&lt;p&gt;linux-kernel-exploits&lt;/p&gt;</description></item><item><title>mal_unpack</title><link>https://rainmana.github.io/hackyfeed/tools/hasherezade-mal_unpack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hasherezade-mal_unpack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; mal_unpack is a dynamic malware unpacker that leverages PE-sieve to deploy packed malware, allowing it to unpack and dump the payload while terminating the original process. Its primary use case is for malware analysis in controlled environments, with notable features including options for dumping implanted PEs, shellcodes, and modified artifacts, as well as performance enhancements through an auxiliary driver.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="mal_unpack"&gt;mal_unpack&lt;/h1&gt;
&lt;p&gt;&lt;img src="./logo/logo.png" alt=""&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://ci.appveyor.com/project/hasherezade/mal-unpack"&gt;&lt;img src="https://ci.appveyor.com/api/projects/status/3cqqlah6unfhasik?svg=true" alt="Build status"&gt;&lt;/a&gt;
&lt;a href="https://app.codacy.com/gh/hasherezade/mal_unpack/dashboard?branch=master"&gt;&lt;img src="https://app.codacy.com/project/badge/Grade/fedbe124aa694761907bbe51bfc8d6f9" alt="Codacy Badge"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/mal_unpack/commits"&gt;&lt;img src="https://img.shields.io/github/commit-activity/m/hasherezade/mal_unpack" alt="Commit activity"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/mal_unpack/commits"&gt;&lt;img src="https://img.shields.io/github/last-commit/hasherezade/mal_unpack/master" alt="Last Commit"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://github.com/hasherezade/mal_unpack/releases"&gt;&lt;img src="https://img.shields.io/github/release/hasherezade/mal_unpack.svg" alt="GitHub release"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/mal_unpack/releases"&gt;&lt;img src="https://img.shields.io/github/release-date/hasherezade/mal_unpack?color=blue" alt="GitHub release date"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/mal_unpack/releases"&gt;&lt;img src="https://img.shields.io/github/downloads/hasherezade/mal_unpack/total.svg" alt="Github All Releases"&gt;&lt;/a&gt;
&lt;a href="https://github.com/hasherezade/mal_unpack/releases"&gt;&lt;img src="https://img.shields.io/github/downloads/hasherezade/mal_unpack/latest/total.svg" alt="Github Latest Release"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>mimipenguin</title><link>https://rainmana.github.io/hackyfeed/tools/huntergregal-mimipenguin/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/huntergregal-mimipenguin/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; MimiPenguin is a Linux tool designed to extract cleartext login passwords from the currently logged-in desktop user by dumping process memory. It utilizes a probability-based method to identify possible passwords by cross-referencing hashes from the /etc/shadow file and performing regex searches. Notably, version 2.0 features a C implementation aimed at enhancing speed and portability, while it maintains support for various desktop environments and authentication types including Gnome Keyring and LightDM.&lt;/p&gt;</description></item><item><title>netcat</title><link>https://rainmana.github.io/hackyfeed/tools/diegocr-netcat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/diegocr-netcat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Netcat for Windows is a TCP/IP utility designed for network diagnostics and exploration, functioning as a versatile &amp;ldquo;Swiss Army knife&amp;rdquo; for admins on the Windows platform. It supports both inbound and outbound connections over TCP or UDP, features built-in port scanning, DNS checks, and allows for custom local network configurations. Notably, this version excludes the potentially insecure -e switch to mitigate false positives from antivirus software, while also resolving issues encountered during telnet sessions.&lt;/p&gt;</description></item><item><title>panda</title><link>https://rainmana.github.io/hackyfeed/tools/panda-re-panda/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/panda-re-panda/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PANDA is an open-source platform designed for architecture-neutral dynamic analysis, utilizing the QEMU whole system emulator to provide deep insights into code execution and data handling across various CPU architectures. It features capabilities for recording and replaying executions, allowing for compact and shareable replay logs, and supports a plugin architecture for enhanced code reusability in dynamic taint analysis and other complex analyses. The tool is developed in collaboration with academic institutions and is available as a Docker container as well as a Python interface for flexible integration into analysis workflows.&lt;/p&gt;</description></item><item><title>papermario</title><link>https://rainmana.github.io/hackyfeed/tools/pmret-papermario/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pmret-papermario/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Paper Mario is an ongoing decompilation project aimed at recreating the original Paper Mario video game for multiple regions including US, JP, PAL, and iQue. The tool generates corresponding ROMs, providing a clear progress tracking system for each version. Notable features include a dedicated setup guide, active community support via Discord, and a public website for monitoring development progress.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="paper-mario"&gt;Paper Mario&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://jenkins.deco.mp/job/papermario/job/main"&gt;&lt;img src="https://img.shields.io/jenkins/build?jobUrl=https%3A%2F%2Fjenkins.deco.mp%2Fjob%2Fpapermario%2Fjob%2Fmain" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://discord.gg/PgcMpQTzh5"&gt;&lt;img src="https://img.shields.io/discord/1141775228440158338?color=%237289DA&amp;amp;logo=discord&amp;amp;logoColor=ffffff" alt="Discord Channel"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This is a work-in-progress decompilation of Paper Mario.&lt;/p&gt;</description></item><item><title>paradoxiaRAT</title><link>https://rainmana.github.io/hackyfeed/tools/quantumcore-paradoxiarat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/quantumcore-paradoxiarat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Paradoxia is a Remote Access Tool (RAT) designed for covert control of target systems, featuring a user-friendly console that allows users to easily build and deploy client applications. Notable capabilities include multithreading for multiple session management, full file access, keylogging, microphone recording, and remote execution commands, alongside stealth operation and persistent installation. This tool is intended for malicious use, as indicated by its detection as malware by security software.&lt;/p&gt;</description></item><item><title>PDBRipper</title><link>https://rainmana.github.io/hackyfeed/tools/horsicq-pdbripper/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/horsicq-pdbripper/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PDBRipper is a utility designed for extracting information from PDB (Program Database) files, primarily used in software development and reverse engineering. Notable features include a graphical user interface and console mode for flexibility, as well as support for building on Windows using Visual Studio and Qt. The tool facilitates in-depth analysis and manipulation of debugging information contained within PDB files.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&amp;amp;hosted_button_id=NF3FBD3KHMXDN"&gt;&lt;img src="https://img.shields.io/badge/Donate-PayPal-green.svg" alt="Donate"&gt;&lt;/a&gt;
&lt;a href="https://github.com/horsicq/PDBRipper/releases"&gt;&lt;img src="https://img.shields.io/github/tag/horsicq/PDBRipper.svg" alt="GitHub tag (latest SemVer)"&gt;&lt;/a&gt;
&lt;a href="https://github.com/horsicq/PDBRipper/releases"&gt;&lt;img src="https://img.shields.io/github/downloads/horsicq/PDBRipper/total.svg" alt="GitHub All Releases"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1 id="pdbripper"&gt;PDBRipper&lt;/h1&gt;
&lt;p&gt;PDBRipper is an utility for extract an information from PDB-files.&lt;/p&gt;</description></item><item><title>php-spx</title><link>https://rainmana.github.io/hackyfeed/tools/noisebynorthwest-php-spx/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/noisebynorthwest-php-spx/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SPX (Simple Profiling eXtension) is a lightweight PHP profiling tool designed to enhance performance analysis without external dependencies, ensuring data privacy on user infrastructure. It offers seamless profiling activation, requiring minimal setup, and supports multiple metrics like execution time, memory usage, and object tracking. Its integrated web UI enables interactive visualizations, including timelines and Flamegraphs, to facilitate detailed performance insights and troubleshooting.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="spx---a-simple-profiler-for-php"&gt;SPX - A simple profiler for PHP&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/NoiseByNorthwest/php-spx/actions/workflows/main.yml"&gt;&lt;img src="https://github.com/NoiseByNorthwest/php-spx/actions/workflows/main.yml/badge.svg" alt="Build Status"&gt;&lt;/a&gt;
&lt;img src="https://img.shields.io/badge/php-5.4--8.5-blue.svg" alt="Supported PHP versions: 5.4 .. 8.x"&gt;
&lt;img src="https://img.shields.io/badge/platform-GNU/Linux%20%7C%20macOS%20%7C%20FreeBSD%20-yellow" alt="Supported platforms: GNU/Linux, macOS &amp;amp; FreeBSD"&gt;
&lt;img src="https://img.shields.io/badge/architecture-x86--64%20%7C%20ARM64%20-silver" alt="Supported architectures: x86-64 or ARM64"&gt;
&lt;a href="https://github.com/NoiseByNorthwest/php-spx/blob/master/LICENSE"&gt;&lt;img src="https://img.shields.io/github/license/NoiseByNorthwest/php-spx" alt="License"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>pixiewps</title><link>https://rainmana.github.io/hackyfeed/tools/wiire-a-pixiewps/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wiire-a-pixiewps/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pixiewps is a C-based tool that performs offline brute-force attacks on WPS PINs utilizing the &amp;ldquo;pixie-dust attack,&amp;rdquo; allowing it to potentially recover vulnerable pins in seconds to minutes, as opposed to hours. Notably, since version 1.4, it can also retrieve WPA-PSK from passive captures and includes support for multi-threading to enhance performance. Designed primarily for educational purposes, Pixiewps requires specific input parameters related to WPS authentication, and offers various operational modes for advanced usage.&lt;/p&gt;</description></item><item><title>pokeemerald</title><link>https://rainmana.github.io/hackyfeed/tools/pret-pokeemerald/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pret-pokeemerald/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pokémon Emerald is a decompilation project that allows users to build the ROM file for the Pokémon Emerald game. Its primary use case is for developers and enthusiasts looking to analyze, modify, or enhance the original game code. Notable features include the ability to reconstruct the game’s ROM and support for custom modifications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="pokémon-emerald"&gt;Pokémon Emerald&lt;/h1&gt;
&lt;p&gt;This is a decompilation of Pokémon Emerald.&lt;/p&gt;
&lt;p&gt;It builds the following ROM:&lt;/p&gt;</description></item><item><title>pokefirered</title><link>https://rainmana.github.io/hackyfeed/tools/pret-pokefirered/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pret-pokefirered/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Pokémon FireRed and LeafGreen repository provides a comprehensive decompilation of the popular Pokémon games, enabling users to create various ROM images of FireRed and LeafGreen. Its primary use case is for game developers and modders looking to analyze, modify, or enhance the original games. Notable features include the generation of multiple ROM versions, including revisions and switch-compatible formats, along with detailed SHA1 checksums for verification.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="pokémon-firered-and-leafgreen"&gt;Pokémon FireRed and LeafGreen&lt;/h1&gt;
&lt;p&gt;This is a decompilation of English Pokémon FireRed and LeafGreen.&lt;/p&gt;</description></item><item><title>pokeruby</title><link>https://rainmana.github.io/hackyfeed/tools/pret-pokeruby/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pret-pokeruby/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pokémon Ruby and Sapphire is a comprehensive disassembly of the Game Boy Advance titles Pokémon Ruby and Sapphire, enabling developers to understand and modify the game&amp;rsquo;s code. The primary use case focuses on ROM development and enhancement, allowing users to compile the original game files, pokeruby.gba and pokesapphire.gba. Notable features include built-in support for building ROMs, making it an essential tool for enthusiasts involved in Pokémon game development and reverse engineering.&lt;/p&gt;</description></item><item><title>PrivEsc</title><link>https://rainmana.github.io/hackyfeed/tools/1n3-privesc/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/1n3-privesc/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PrivEsc is a collection of privilege escalation scripts and exploits designed for Windows, Linux, and MySQL environments. Its primary use case is to help security professionals identify and exploit privilege escalation vulnerabilities in various systems. Notable features include compatibility with multiple operating systems and exploitation capabilities tailored for common service vulnerabilities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="privesc-by-1n3crowdshield"&gt;PrivEsc by 1N3@CrowdShield&lt;/h1&gt;
&lt;p&gt;&lt;a href="http://crowdshield.com"&gt;http://crowdshield.com&lt;/a&gt;&lt;/p&gt;
&lt;h2 id="about"&gt;ABOUT:&lt;/h2&gt;
&lt;p&gt;A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.&lt;/p&gt;</description></item><item><title>radare2-book</title><link>https://rainmana.github.io/hackyfeed/tools/radareorg-radare2-book/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/radareorg-radare2-book/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The r2book is a collaboratively maintained documentation resource for the Radare2 reverse engineering framework, serving as an updated version of the original radare1 book. Its primary use case is to provide users with comprehensive information and guidance on utilizing Radare2 effectively, while notable features include community contributions for continuous content improvement and online accessibility.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="r2book"&gt;r2book&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/radareorg/radare2-book/actions/workflows/mdbook.yml"&gt;&lt;img src="https://github.com/radareorg/radare2-book/actions/workflows/mdbook.yml/badge.svg" alt="mdbook"&gt;&lt;/a&gt;
&lt;a href="https://github.com/radareorg/radare2-book/actions/workflows/ci.yml"&gt;&lt;img src="https://github.com/radareorg/radare2-book/actions/workflows/ci.yml/badge.svg" alt="CI document uploads"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This book is an updated version maintained by the community of the original radare1 book written by pancake.&lt;/p&gt;</description></item><item><title>readpe</title><link>https://rainmana.github.io/hackyfeed/tools/mentebinaria-readpe/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mentebinaria-readpe/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; readpe is a comprehensive command line toolkit designed for the analysis and manipulation of PE (Portable Executable) binaries across multiple platforms. Its primary use case involves providing developers and security analysts with tools to inspect, modify, and understand the structure of PE files. Notable features include easy installation and building on various operating systems, as well as its background as a successor to the original pev tool, with enhanced functionality integrated into a single repository.&lt;/p&gt;</description></item><item><title>REDRIVER2</title><link>https://rainmana.github.io/hackyfeed/tools/opendriver2-redriver2/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/opendriver2-redriver2/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; REDRIVER2 is a reverse-engineered reimplementation of the original game, translating MIPS code back to C without emulation, and significantly enhancing it beyond the original PlayStation version. The tool supports modding with replacement of textures and models, runs on multiple platforms including Windows and Linux, and integrates a custom porting layer based on the Psy-X emulator. It utilizes advanced reverse engineering methods, including debugging symbols and semi-automatic decompilation techniques to achieve a fully playable game experience.&lt;/p&gt;</description></item><item><title>ret-sync</title><link>https://rainmana.github.io/hackyfeed/tools/bootleg-ret-sync/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bootleg-ret-sync/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; &lt;strong&gt;ret-sync&lt;/strong&gt; is a synchronization tool designed for reverse engineering, enabling the integration of various debugging environments (WinDbg, GDB, LLDB, etc.) with static analysis disassemblers (IDA, Ghidra, Binary Ninja). Its primary use case is to facilitate a seamless analysis workflow by synchronizing debugger states with disassembler views, allowing for real-time insights during dynamic analysis while providing the broader context from static analysis. Notable features include on-the-fly address rebasing, support for multiple simultaneous sessions across different systems, and the ability to pass contextual information between debug and disassembly tools.&lt;/p&gt;</description></item><item><title>shad0w</title><link>https://rainmana.github.io/hackyfeed/tools/bats3c-shad0w/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bats3c-shad0w/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SHAD0W is a modular command and control (C2) framework designed for advanced threat operations within mature environments, leveraging techniques to evade endpoint detection and antivirus systems. Built with Python and C, it enables the execution of payloads including .NET assemblies and scripts entirely in memory, while offering features such as HTTPS communication, dynamic process injection, and extensive modularity for tasking beacons. Notable components include built-in privilege escalation exploits, a live web proxy feature, and a robust command-line interface, facilitating customization and effective covert operations.&lt;/p&gt;</description></item><item><title>spectre-attack</title><link>https://rainmana.github.io/hackyfeed/tools/eugnis-spectre-attack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/eugnis-spectre-attack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Spectre Attack Example repository demonstrates an exploit based on the Spectre vulnerability (CVE-2017-5753 and CVE-2017-5715), which allows attackers to read sensitive information from memory by exploiting speculative execution. The tool constructs a scenario where out-of-bounds memory reads can leak data via cache timing attacks, highlighting how seemingly safe coding practices can inadvertently increase vulnerability. Notable features include the ability to test system vulnerability, read specified memory addresses, and compile with both GCC and Visual Studio.&lt;/p&gt;</description></item><item><title>thc-hydra</title><link>https://rainmana.github.io/hackyfeed/tools/vanhauser-thc-thc-hydra/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vanhauser-thc-thc-hydra/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; THC-Hydra is a versatile password-cracking tool designed for testing the security of various network services by attempting to gain unauthorized access through brute-force attacks. It supports multiple protocols, including FTP, HTTP, SSH, and many others, enabling security researchers and consultants to evaluate password strength and recognize vulnerabilities across a wide range of applications. Notable features include its ability to conduct parallelized connection attempts and an extensible module engine for easy addition of new protocols.&lt;/p&gt;</description></item><item><title>TRX</title><link>https://rainmana.github.io/hackyfeed/tools/lostartefacts-trx/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lostartefacts-trx/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; TRX is an open-source reimplementation of the classic Tomb Raider games (I, II, and III), designed to enhance gameplay through decompilation and integration of open-source components. The engine supports distinct mechanics for all three titles and features enhancements such as customizable draw distances, a developer console, updated UI elements, and the capability to run custom levels. Notably, TRX is cross-platform, supporting Windows, Linux, and macOS, with extensive controller compatibility and customizable control options.&lt;/p&gt;</description></item><item><title>VAC</title><link>https://rainmana.github.io/hackyfeed/tools/danielkrupinski-vac/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/danielkrupinski-vac/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VAC is a user-mode anti-cheat system developed by Valve, designed to operate non-invasively on Windows systems. The tool utilizes a set of modules to gather critical system information, enumerate processes, and monitor game performance, primarily focusing on maintaining the integrity of online gaming environments. Notable features include the use of various encryption and hashing methods, such as MD5 and CRC32, to secure operations and information within its modules.&lt;/p&gt;</description></item><item><title>Validity90</title><link>https://rainmana.github.io/hackyfeed/tools/nmikhailov-validity90/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nmikhailov-validity90/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Validity90 is a tool focused on reverse engineering the communication protocol of various Validity fingerprint readers, such as models 138a:0090 and 138a:0094. It aims to create an open-source driver for integration with the libfprint library, featuring a Wireshark dissector for analyzing encrypted communication and a standalone prototype for testing device functionalities. Notably, the project is actively developing specifications and protocols for multiple devices, with partial implementation already achieving scan and internal database check capabilities.&lt;/p&gt;</description></item><item><title>windows-kernel-exploits</title><link>https://rainmana.github.io/hackyfeed/tools/secwiki-windows-kernel-exploits/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/secwiki-windows-kernel-exploits/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The windows-kernel-exploits repository provides a collection of exploit code snippets for various vulnerabilities in the Windows kernel, leveraging known CVEs to demonstrate potential elevation of privilege and remote code execution attacks. This tool primarily serves security researchers and penetration testers conducting vulnerability assessments on Windows operating systems. Notable features include comprehensive listings of CVEs, along with links to proof-of-concept exploits and detailed descriptions for a wide range of Windows versions.&lt;/p&gt;</description></item><item><title>xAnalyzer</title><link>https://rainmana.github.io/hackyfeed/tools/thundercls-xanalyzer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/thundercls-xanalyzer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; xAnalyzer is a plugin for the x64dbg debugger designed to enhance static code analysis of debugged applications. It leverages extensive API function call detection and provides detailed function definitions, argument types, and additional debugging information, greatly improving the user&amp;rsquo;s comprehension before commencing debugging tasks. Notable features include automatic loop detection, user-maintained definition files, and support for over 13,000 API definitions from approximately 200 DLLs.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;&lt;img src ="images/header.png" /&gt;&lt;/p&gt;</description></item><item><title>Zygisk-Il2CppDumper</title><link>https://rainmana.github.io/hackyfeed/tools/perfare-zygisk-il2cppdumper/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/perfare-zygisk-il2cppdumper/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Zygisk-Il2CppDumper is a tool designed for dumping IL2CPP data at runtime while leveraging Zygisk to effectively bypass various protections, encryptions, and obfuscations. Its primary use case is for developers and security researchers needing to extract and analyze IL2CPP binaries from Android applications. Notable features include its compatibility with Magisk, flexible installation methods, and the ability to automate the dumping process through GitHub Actions or Android Studio.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="zygisk-il2cppdumper"&gt;Zygisk-Il2CppDumper&lt;/h1&gt;
&lt;p&gt;Il2CppDumper with Zygisk, dump il2cpp data at runtime, can bypass protection, encryption and obfuscation.&lt;/p&gt;</description></item></channel></rss>