<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Crystal on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/tags/crystal/</link><description>Recent content in Crystal on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/tags/crystal/feed.xml" rel="self" type="application/rss+xml"/><item><title>noir</title><link>https://rainmana.github.io/hackyfeed/tools/owasp-noir-noir/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/owasp-noir-noir/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OWASP Noir is a security tool designed to analyze source code and generate comprehensive inventories of application endpoints, including the detection of shadow APIs and hidden routes that traditional methods might overlook. It serves as a bridge between Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST), enabling white-box security teams and penetration testers to identify the complete attack surface of an application. Notable features include AI-powered analysis across various programming languages, integration capabilities with popular DAST tools, and the ability to output results in multiple formats for seamless workflow integration.&lt;/p&gt;</description></item></channel></rss>