<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Go on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/tags/go/</link><description>Recent content in Go on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/tags/go/feed.xml" rel="self" type="application/rss+xml"/><item><title>afrog</title><link>https://rainmana.github.io/hackyfeed/tools/zan8in-afrog/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zan8in-afrog/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Afrog is a security tool designed for bug bounty programs, penetration testing, and red teaming efforts. It facilitates the creation and execution of Proofs of Concept (PoCs) to help security professionals identify vulnerabilities in systems. Notable features include a streamlined PoC writing guide, multi-language support, and a community-driven approach to contribute new exploit techniques.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;a href="http://afrog.net"&gt;&lt;img src="images/afrog-logo.svg" width="60px" alt="afrog"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;!-- &lt;/a&gt; &lt;h1 align="center"&gt;afrog&lt;/h1&gt; --&gt;
&lt;h4 align="center"&gt;A Security Tool for Bug Bounty, Pentest and Red Teaming&lt;/h4&gt;
&lt;p align="center"&gt;
 &lt;a href="README.md"&gt;English&lt;/a&gt; •
 &lt;a href="docs/README_CN.md"&gt;中文&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>APKHunt</title><link>https://rainmana.github.io/hackyfeed/tools/cyber-buddy-apkhunt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cyber-buddy-apkhunt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; APKHunt is a static code analysis tool specifically designed for Android applications, leveraging the OWASP MASVS framework to identify and rectify security vulnerabilities. It offers comprehensive scanning capabilities, including support for multiple APK files, a low false-positive rate, and optimized rules for accurate vulnerability detection, making it suitable for both mobile developers and security testers. Notably, it produces results in a user-friendly TXT format and is tailored for Linux environments.&lt;/p&gt;</description></item><item><title>apkurlgrep</title><link>https://rainmana.github.io/hackyfeed/tools/ndelphit-apkurlgrep/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ndelphit-apkurlgrep/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ApkUrlGrep is a tool designed for extracting endpoints from APK files. Its primary use case is to facilitate the analysis of mobile applications by identifying URLs and their paths embedded within the app. Notable features include the ability to output both the discovered URLs and their corresponding paths, making it a valuable resource for security researchers and penetration testers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="apkurlgrep"&gt;ApkUrlGrep&lt;/h1&gt;
&lt;p&gt;Tool that allow extract endpoints from APK files
&lt;img src="https://i.ibb.co/V3nFRwJ/image-2020-05-06-21-30-30.png" alt="alt text"&gt;&lt;/p&gt;</description></item><item><title>asnmap</title><link>https://rainmana.github.io/hackyfeed/tools/projectdiscovery-asnmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/projectdiscovery-asnmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; asnmap is a Go CLI and library designed for quickly mapping organizational network ranges by leveraging Autonomous System Number (ASN) information. Its primary use case is for cybersecurity analysts to perform lookups for CIDR ranges based on various inputs such as ASN, organization name, domain, or IP addresses, with flexibility in output formats including JSON, CSV, and plain text. Notable features include support for multiple input types, integration with a Project Discovery Cloud Platform API for enhanced data retrieval, and the ability to operate with standard input/output.&lt;/p&gt;</description></item><item><title>BounceBack</title><link>https://rainmana.github.io/hackyfeed/tools/d00movenok-bounceback/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/d00movenok-bounceback/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BounceBack is a versatile reverse proxy tool designed to enhance the security of red team operations by obfuscating the command-and-control (C2) or phishing infrastructure from detection by blue teams and security tools. It features a highly customizable filtering system that leverages real-time traffic analysis, extensive blacklists, and support for multiple protocols, enabling precise control over which traffic is allowed or denied. Notable capabilities include malleable C2 profile parsing, comprehensive IP address validation, domain fronting, and a robust logging mechanism for monitoring incoming requests and potential security threats.&lt;/p&gt;</description></item><item><title>brutespray</title><link>https://rainmana.github.io/hackyfeed/tools/x90skysn3k-brutespray/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/x90skysn3k-brutespray/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Brutespray is a credential brute-forcing tool designed to automatically test default credentials against discovered services from various scan outputs, including Nmap and Nessus. It supports over 30 protocols and features capabilities such as multi-auth support, password spray mode, an interactive terminal UI, and resume functionality, allowing for efficient and comprehensive credential testing across networks. The tool is built in Go and offers extensive customization options through YAML configuration files and embedded wordlists.&lt;/p&gt;</description></item><item><title>caddy-waf</title><link>https://rainmana.github.io/hackyfeed/tools/fabriziosalmi-caddy-waf/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/fabriziosalmi-caddy-waf/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Caddy WAF is a customizable middleware for the Caddy web server that functions as a Web Application Firewall, designed to provide advanced protection against a wide range of web-based threats. Key features include regex-based filtering, IP blacklisting, geo-blocking, rate limiting, anomaly scoring, and detailed monitoring capabilities, all aimed at securing applications while ensuring high performance through techniques like zero-copy networking and wait-free concurrency. The tool also supports seamless dynamic configuration reloads and offers precise insights into traffic and security events, making it a robust solution for safeguarding web applications.&lt;/p&gt;</description></item><item><title>cameradar</title><link>https://rainmana.github.io/hackyfeed/tools/ullaakut-cameradar/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ullaakut-cameradar/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Cameradar is a tool designed for scanning RTSP endpoints on authorized targets, utilizing dictionary attacks to discover credentials and stream routes. Its primary use case is to assess the security of RTSP streams by detecting open hosts, identifying device models, and generating comprehensive reports of findings. Notable features include the ability to enumerate multiple RTSP stream routes and credentials through customizable dictionaries, as well as support for Docker for streamlined deployment.&lt;/p&gt;</description></item><item><title>CDK</title><link>https://rainmana.github.io/hackyfeed/tools/cdk-team-cdk/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cdk-team-cdk/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CDK is a zero dependency container penetration toolkit designed for security testing, enabling stable exploitation across slimmed containers. Its primary use case revolves around container escaping, persistence, and lateral movement within Kubernetes clusters, featuring modules for evaluating container weaknesses, executing various exploits, and providing essential network tools. Notable capabilities include information gathering, direct interaction with the container&amp;rsquo;s environment, and the ability to initiate and manage attacks seamlessly.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="cdk---zero-dependency-container-penetration-toolkit"&gt;CDK - Zero Dependency Container Penetration Toolkit&lt;/h1&gt;
&lt;p&gt;English | &lt;a href="https://github.com/cdk-team/CDK/wiki/CDK-Home-CN"&gt;简体中文&lt;/a&gt;&lt;/p&gt;</description></item><item><title>cent</title><link>https://rainmana.github.io/hackyfeed/tools/xm1k3-cent/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/xm1k3-cent/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Cent is a tool designed to organize community-contributed Nuclei templates, simplifying the process of managing and utilizing these resources for vulnerability scanning. Key features include the ability to clone templates from multiple repositories, validate their integrity, and generate detailed summaries of the templates&amp;rsquo; metadata, including statistics on validation and severity distribution. Additionally, Cent supports multi-threading for efficient repository management and offers commands for initializing configurations, updating templates, and accessing versioning information.&lt;/p&gt;</description></item><item><title>certificates</title><link>https://rainmana.github.io/hackyfeed/tools/smallstep-certificates/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/smallstep-certificates/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; &lt;code&gt;step-ca&lt;/code&gt; is an online certificate authority designed for secure and automated certificate management in DevOps environments. It features the capability to issue HTTPS and TLS certificates for various services like VMs, containers, and APIs, as well as SSH certificates, while supporting automated certificate management through ACME protocols. Its flexibility allows users to select key types and certificate lifetimes, making it an essential tool for managing cryptographic needs within modern infrastructures.&lt;/p&gt;</description></item><item><title>chain-bench</title><link>https://rainmana.github.io/hackyfeed/tools/aquasecurity-chain-bench/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/aquasecurity-chain-bench/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Chain-bench is an open-source tool designed for auditing software supply chain security compliance based on the CIS Software Supply Chain benchmark. It examines the entire Software Development Life Cycle (SDLC) to identify risks from code inception to deployment, ensuring adherence to organizational security policies. Notable features include CLI-based scanning capabilities, integration options with various SCM platforms, and support for Docker deployment.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
&lt;picture&gt;
 &lt;source media="(prefers-color-scheme: dark)" srcset="docs/imgs/banner_dm.png"&gt;
 &lt;source media="(prefers-color-scheme: light)" srcset="docs/imgs/banner_lm.png"&gt;
 &lt;img alt="chain-bench logo" src="docs/imgs/banner_lm.png"&gt;
&lt;/picture&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
&lt;p&gt;&lt;a href="https://github.com/aquasecurity/chain-bench/blob/main/docs/"&gt;📖 Documentation&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Chain-bench is an open-source tool for auditing your software supply chain stack for security compliance based on a new
&lt;a href="docs/CIS-Software-Supply-Chain-Security-Guide-v1.0.pdf"&gt;CIS Software Supply Chain benchmark&lt;/a&gt;.
The auditing focuses on the entire SDLC process, where it can reveal risks from code time into deploy time. To win the race against hackers and protect your sensitive data and customer trust, you need to ensure your code is compliant with your organization’s policies.&lt;/p&gt;</description></item><item><title>CHAOS</title><link>https://rainmana.github.io/hackyfeed/tools/tiagorlampert-chaos/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tiagorlampert-chaos/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CHAOS is an open-source Remote Administration Tool developed in Golang, designed for generating binaries that facilitate control over remote operating systems. It features robust capabilities such as reverse shell access, file manipulation (upload, download, delete), remote system information retrieval, and several system control functions like shutdown and restart, making it a versatile tool for remote administration tasks across both Windows and Linux platforms.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;a href="#"&gt;
 &lt;img src="https://raw.githubusercontent.com/tiagorlampert/CHAOS/master/public/logo.png" alt="CHAOS logo" width="400" height="130"&gt;
 &lt;/a&gt;
&lt;/p&gt;
&lt;h1 align="center"&gt;CHAOS: Remote Administration Tool&lt;/h1&gt;
&lt;p align="center"&gt;
 &lt;a href="https://golang.org/"&gt;
 &lt;img src="https://img.shields.io/badge/Golang-1.18+-blue.svg?style=flat-square"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/tiagorlampert/CHAOS/releases"&gt;
 &lt;img src="https://img.shields.io/badge/Release-v5 Beta-red.svg?style=flat-square"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/tiagorlampert/CHAOS/blob/master/LICENSE"&gt;
 &lt;img src="https://img.shields.io/badge/License-MIT-yellow.svg?style=flat-square"&gt;
 &lt;/a&gt;
 &lt;a href="https://hub.docker.com/r/tiagorlampert/chaos"&gt;
 &lt;img src="https://img.shields.io/docker/pulls/tiagorlampert/chaos.svg?style=flat-square"&gt;
 &lt;/a&gt;
 &lt;a href="https://opensource.org"&gt;
 &lt;img src="https://img.shields.io/badge/Open%20Source-%E2%9D%A4-brightgreen.svg?style=flat-square"&gt;
 &lt;/a&gt;
&lt;/p&gt;</description></item><item><title>cli</title><link>https://rainmana.github.io/hackyfeed/tools/smallstep-cli/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/smallstep-cli/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Step CLI is a robust command-line interface tool designed for building and managing Public Key Infrastructure (PKI) systems and workflows, providing functionalities for cryptographic operations and X.509 certificate management. Key features include the ability to create, revoke, and validate certificates, generate key pairs and Certificate Signing Requests (CSRs), and automate certificate issuance via integration with the step-ca server and ACME-compliant CAs. The tool simplifies the setup and maintenance of secure TLS/HTTPS environments, making it essential for developers and system administrators working with PKI.&lt;/p&gt;</description></item><item><title>CloudBrute</title><link>https://rainmana.github.io/hackyfeed/tools/0xsha-cloudbrute/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xsha-cloudbrute/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CloudBrute is a reconnaissance tool designed for uncovering infrastructure, files, and applications across major cloud providers, including Amazon, Google, Microsoft, and others. Its primary use case targets bug bounty hunters, red teamers, and penetration testers, providing features such as black-box detection, user-agent and proxy randomization, and modular customization to facilitate efficient cloud enumeration and vulnerability assessment without requiring authentication.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="cloudbrute"&gt;CloudBrute&lt;/h1&gt;
&lt;p&gt;A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean, Alibaba, Vultr, Linode).
The outcome is useful for bug bounty hunters, red teamers, and penetration testers alike.&lt;/p&gt;</description></item><item><title>ContainerSSH</title><link>https://rainmana.github.io/hackyfeed/tools/containerssh-containerssh/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/containerssh-containerssh/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ContainerSSH is an SSH server designed to dynamically launch containers in Kubernetes and Docker, primarily aimed at facilitating lab environments, debugging production systems, and running honeypots. Notable features include ephemeral container management with automatic cleanup, secure and logged access for developers, and comprehensive auditing capabilities that allow for monitoring and analysis of SSH attack patterns. This tool enhances security workflows by leveraging containerization to isolate user activities and preserve system integrity.&lt;/p&gt;</description></item><item><title>copacetic</title><link>https://rainmana.github.io/hackyfeed/tools/project-copacetic-copacetic/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/project-copacetic-copacetic/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Copa is a CLI tool designed to directly patch container images for vulnerabilities without requiring a full rebuild, thereby enhancing DevSecOps workflows. Leveraging vulnerability scan results from tools like Trivy, Copa reduces the operational downtime associated with patching, minimizes storage needs by creating only additional patch layers, and allows any user to perform patches, irrespective of image ownership. Its extensible architecture supports multiple package managers and vulnerability report formats, making it adaptable to various container ecosystems.&lt;/p&gt;</description></item><item><title>crawlergo</title><link>https://rainmana.github.io/hackyfeed/tools/qianlitp-crawlergo/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/qianlitp-crawlergo/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; crawlergo is a robust web vulnerability scanner that utilizes a headless Chrome browser to collect URLs and interact with web pages, capable of intelligent form submission and JavaScript event triggering. Its key features include automatic URL de-duplication, support for different browser environments, request proxying, and the ability to push results to passive vulnerability scanners, making it an essential tool for comprehensive web application security assessments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="crawlergo"&gt;crawlergo&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://img.shields.io/badge/chromedp-v0.5.2-brightgreen.svg" alt="chromedp"&gt; &lt;a href="https://www.blackhat.com/eu-21/arsenal/schedule/index.html#crawlergo-a-powerful-browser-crawler-for-web-vulnerability-scanners-25113"&gt;&lt;img src="https://img.shields.io/badge/BlackHat%20Europe-2021%20Arsenal-blue.svg" alt="BlackHat EU Arsenal"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>crlfuzz</title><link>https://rainmana.github.io/hackyfeed/tools/dwisiswant0-crlfuzz/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dwisiswant0-crlfuzz/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CRLFuzz is a specialized tool for detecting CRLF injection vulnerabilities in web applications, developed in Go for high performance. It offers flexible scanning options, including targeting individual URLs or multiple URLs from a list, and provides various command line flags to customize request methods, output results to files, and adjust concurrency levels. Notable features include support for custom headers, proxy usage, and integration capabilities with other security tools through standard input.&lt;/p&gt;</description></item><item><title>CyberStrikeAI</title><link>https://rainmana.github.io/hackyfeed/tools/ed1s0nz-cyberstrikeai/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ed1s0nz-cyberstrikeai/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CyberStrikeAI is an AI-integrated security testing platform developed in Go, designed for automated vulnerability discovery and attack-chain analysis. It features a vast integration of over 100 security tools, AI-driven orchestration, role-based testing, and lifecycle management to create a collaborative and auditable environment for security teams. Notable features include a web console, AI decision engine with OpenAI compatibility, detailed vulnerability management, and a comprehensive knowledge base for enhanced security expertise.&lt;/p&gt;</description></item><item><title>DetectDee</title><link>https://rainmana.github.io/hackyfeed/tools/willin22-detectdee/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/willin22-detectdee/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DetectDee is a reconnaissance tool designed to track down social media accounts using identifiers such as usernames, emails, and phone numbers across various social networks. Notable features include precise control over request handling to evade web application firewalls, support for multiple input types for user detection, and the option for integration with ChatGPT for enhanced result tagging. Its extensibility and ease of use make it suitable for cybersecurity practitioners in their investigations.&lt;/p&gt;</description></item><item><title>DllShimmer</title><link>https://rainmana.github.io/hackyfeed/tools/print3m-dllshimmer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/print3m-dllshimmer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DllShimmer is a tool designed to facilitate DLL hijacking by allowing users to backdoor any function in a DLL without disrupting the normal operation of the host program. It generates proxy DLLs through a boilerplate C++ file and a corresponding &lt;code&gt;.def&lt;/code&gt; file, ensuring that all exported functions maintain their original names and ordinal numbers, thus avoiding detection. Key features include support for both dynamic and static linking, the option to prevent multiple executions of the backdoor, and comprehensive debug logging capabilities.&lt;/p&gt;</description></item><item><title>dockle</title><link>https://rainmana.github.io/hackyfeed/tools/goodwithtech-dockle/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/goodwithtech-dockle/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dockle is a container image linter designed to enhance the security and compliance of Docker images by identifying vulnerabilities and recommending adherence to best practices, including CIS Benchmarks. It offers a simple command-line interface for scanning images, supports integration with CI/CD pipelines, and provides detailed checkpoint reports regarding security issues and Dockerfile practices. Notable features include vulnerability detection and the ability to customize scan parameters for fine-tuning results.&lt;/p&gt;</description></item><item><title>fridare</title><link>https://rainmana.github.io/hackyfeed/tools/suifei-fridare/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/suifei-fridare/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Fridare is an automation tool for modifying the Frida server on iOS, Android, Linux, and Windows platforms, designed to enhance security and flexibility by allowing users to change server names and ports while bypassing jailbreak detection. The tool features a dual-mode interface, offering both a robust command line and a modern graphical user interface (GUI) based on the Fyne framework, facilitating intuitive server modifications and visual feedback. Notable functionalities include cross-platform support, binary replacement, custom packaging, and dependency management, making it a comprehensive solution for Frida users across different environments.&lt;/p&gt;</description></item><item><title>fscan</title><link>https://rainmana.github.io/hackyfeed/tools/shadow1ng-fscan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/shadow1ng-fscan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Fscan is a comprehensive internal network scanning tool designed for automated vulnerability assessment and information gathering. Its primary use case encompasses host discovery, port scanning, credential brute-forcing across various protocols, system vulnerability detection, and web application scanning, including comprehensive support for various databases and frameworks. Notable features include the ability to exploit vulnerabilities such as MS17-010, SSH remote command execution, and the storage of scan results for further analysis.&lt;/p&gt;</description></item><item><title>geacon</title><link>https://rainmana.github.io/hackyfeed/tools/darkr4y-geacon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/darkr4y-geacon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Geacon is a tool designed for implementing CobaltStrike&amp;rsquo;s Beacon using Go, primarily aimed at protocol analysis and reverse engineering. It supports CobaltStrike 4.1 and includes functionalities such as command execution, file upload/download, and directory navigation. The tool emphasizes learning and experimentation, with a strong caution against illegal use.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="geacon"&gt;Geacon&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;Using Go to implement CobaltStrike&amp;rsquo;s Beacon&lt;/strong&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;&lt;em&gt;This project is for learning protocol analysis and reverse engineering only, if someone&amp;rsquo;s rights have been violated, please contact me to remove the project, and the last DO NOT USE IT ILLEGALLY&lt;/em&gt;&lt;/p&gt;</description></item><item><title>getJS</title><link>https://rainmana.github.io/hackyfeed/tools/003random-getjs/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/003random-getjs/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; getJS is a command-line tool and Go package designed for extracting JavaScript sources from URLs and HTTP responses, catering primarily to penetration testers, bug bounty hunters, and developers. Its notable features include customizable request options, support for input from files, and the ability to resolve relative URLs, enhancing the efficiency of JavaScript extraction processes.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;JavaScript Extraction CLI &amp; Package&lt;/h1&gt;
&lt;p align="center"&gt;
 &lt;a href="https://pkg.go.dev/github.com/003random/getJS"&gt;
 &lt;img src="https://pkg.go.dev/badge/github.com/003random/getJS"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/003random/getJS/releases"&gt;
 &lt;img src="https://img.shields.io/github/release/003random/getJS.svg"&gt;
 &lt;/a&gt;
 &lt;a href="https://github.com/003random/getJS/blob/master/LICENSE"&gt;
 &lt;img src="https://img.shields.io/badge/license-MIT-blue.svg"&gt;
 &lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;This is a powerful tool for extracting JavaScript sources from URLs and web pages / HTTP responses. It offers a command-line interface (CLI) for straightforward URL processing and a package interface for custom integrations, making it ideal for pentesters, bug bounty hunters, and developers needing to extract JS sources efficiently.&lt;/p&gt;</description></item><item><title>git-hound</title><link>https://rainmana.github.io/hackyfeed/tools/tillson-git-hound/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tillson-git-hound/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GitHound is a secret detection tool designed to identify exposed API keys, secrets, and credentials across GitHub repositories using advanced pattern matching and commit-history analysis. Its notable features include global GitHub search capabilities, smart API key detection mechanisms, and the ability to visualize results in real-time through the GitHound Explore dashboard. This tool is particularly useful for security professionals in corporate environments and bug bounty hunters seeking to uncover sensitive information that may lead to vulnerabilities.&lt;/p&gt;</description></item><item><title>github-subdomains</title><link>https://rainmana.github.io/hackyfeed/tools/gwen001-github-subdomains/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gwen001-github-subdomains/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The github-subdomains tool is designed to search GitHub for subdomains related to a specified domain and parse the search results efficiently. Key features include the ability to use multiple GitHub tokens to manage rate limits, an option for extended searches, and customizable output formats for the collected subdomains. This tool is particularly useful for security researchers and analysts looking to identify exposed subdomains for threat assessment or reconnaissance purposes.&lt;/p&gt;</description></item><item><title>gitjacker</title><link>https://rainmana.github.io/hackyfeed/tools/liamg-gitjacker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/liamg-gitjacker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Gitjacker is a tool designed to retrieve git repositories and their contents from web servers where the &lt;code&gt;.git&lt;/code&gt; directory has been unintentionally exposed. It effectively extracts repository data even when directory listings are disabled, making it suitable for educational purposes and penetration testing. Notable features include ease of installation via a simple script and the ability to operate in scenarios where access to traditional repository resources is restricted.&lt;/p&gt;</description></item><item><title>gitleaks</title><link>https://rainmana.github.io/hackyfeed/tools/gitleaks-gitleaks/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gitleaks-gitleaks/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Gitleaks is a tool designed for the detection of sensitive information, such as passwords, API keys, and tokens, within Git repositories and other files. Its primary use case is to identify and prevent the accidental exposure of secrets in code, and it offers notable features such as integration with GitHub Actions and pre-commit hooks for continuous monitoring. Additionally, Gitleaks utilizes a robust detection engine based on regular expressions to analyze codebases efficiently.&lt;/p&gt;</description></item><item><title>go-shellcode</title><link>https://rainmana.github.io/hackyfeed/tools/brimstone-go-shellcode/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/brimstone-go-shellcode/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The go-shellcode tool enables users to execute shellcode directly from memory as a standalone process, aiming to circumvent antivirus detection. Its primary use case involves running custom shellcode for penetration testing or exploitation purposes, leveraging features like shellcode size handling via batch scripts and a recommendation for binary obfuscation using the garble tool. The tool requires manual architecture specification and supports 64-bit shellcode execution while providing instructions for building and compressing the resulting binary.&lt;/p&gt;</description></item><item><title>go-whatsapp</title><link>https://rainmana.github.io/hackyfeed/tools/rhymen-go-whatsapp/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rhymen-go-whatsapp/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The go-whatsapp package offers a Go interface for interacting with the WhatsApp Web API, enabling developers to integrate WhatsApp functionalities in their applications. Its primary use case is to facilitate the sending and receiving of messages, management of user sessions, and handling various types of media messages through a websocket connection. Notable features include session restoration, customizable message handlers for different message types, and the ability to send contact information in the vCard format; however, the package is not actively maintained and may soon become obsolete due to WhatsApp&amp;rsquo;s evolving architecture.&lt;/p&gt;</description></item><item><title>GobyVuls</title><link>https://rainmana.github.io/hackyfeed/tools/gobysec-gobyvuls/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gobysec-gobyvuls/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GobyVuls is a collection of exploitation scripts specifically designed for vulnerabilities identified by the Goby scanning tool. The primary use case is to facilitate the exploitation of detected vulnerabilities, allowing users to perform actions such as command execution or establishing reverse shells. Notable features include a user-friendly interface for scanning and verification, as well as a collaborative framework for contributing new vulnerabilities and enhancing existing exploitation methods.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="gobyvuls"&gt;GobyVuls&lt;/h1&gt;
&lt;p&gt;&lt;a href="vulnerability_list.md"&gt;Vulnerabilities&lt;/a&gt; of Goby supported with exploitation.&lt;/p&gt;</description></item><item><title>gogo</title><link>https://rainmana.github.io/hackyfeed/tools/chainreactors-gogo/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/chainreactors-gogo/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; gogo is a versatile network scanning tool designed for both active and passive fingerprinting, featuring customizable port configurations and the extraction of key information such as titles and certificates through regex patterns. It supports the integration of Nuclei proof of concepts (POCs) and offers a heuristic scanning mode for improved performance with minimal resource usage, making it highly efficient for vulnerability detection. The tool is entirely written in Go, ensuring compatibility with minimal dependencies across various operating systems, including legacy versions like Windows 2003.&lt;/p&gt;</description></item><item><title>goscan</title><link>https://rainmana.github.io/hackyfeed/tools/marco-lancini-goscan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/marco-lancini-goscan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GoScan is an interactive network scanner client designed to automate and provide abstraction over nmap, facilitating host discovery, port scanning, and service enumeration. It is particularly suitable for use in CTFs, OSCP exams, or professional engagements, capable of maintaining scan state in an SQLite database, allowing for asynchronous results upload even in unstable network conditions. Notable features include service enumeration integration with additional tools such as EyeWitness and Hydra, real-time auto-completion, and support for importing data at various stages of the scanning process.&lt;/p&gt;</description></item><item><title>gosearch</title><link>https://rainmana.github.io/hackyfeed/tools/ibnaleem-gosearch/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ibnaleem-gosearch/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GoSearch is an OSINT tool designed to automate the process of searching for online profiles associated with specific usernames, utilizing concurrency for efficiency. It integrates searches across multiple extensive databases, including 900,000 leaked credentials from HudsonRock and over 18 billion from BreachDirectory, enhancing its capability to detect compromised accounts. Notable features include the ability to filter results for accuracy with the &lt;code&gt;--no-false-positives&lt;/code&gt; flag and the option to crack found password hashes using Weakpass, significantly boosting the tool&amp;rsquo;s effectiveness in cybersecurity investigations.&lt;/p&gt;</description></item><item><title>gosec</title><link>https://rainmana.github.io/hackyfeed/tools/securego-gosec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/securego-gosec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; gosec is a security analysis tool designed to inspect Go source code for potential security vulnerabilities by scanning the Abstract Syntax Tree (AST) and Static Single Assignment (SSA) representation. It utilizes pattern-based rules, SSA-based analyzers, and taint analysis to identify common issues like SQL injection and XSS. Notable features include customizable rule selection, various output formats, and integration as a GitHub Action for continuous security monitoring.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="gosec---go-security-checker"&gt;gosec - Go Security Checker&lt;/h1&gt;
&lt;p&gt;Inspects source code for security problems by scanning the Go AST and SSA code representation.&lt;/p&gt;</description></item><item><title>gotestwaf</title><link>https://rainmana.github.io/hackyfeed/tools/wallarm-gotestwaf/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wallarm-gotestwaf/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GoTestWAF is a versatile tool designed for simulating API and web application attacks, supporting a multitude of protocols like REST, GraphQL, and gRPC, among others. It evaluates the effectiveness of security solutions such as Web Application Firewalls and API gateways by generating malicious HTTP requests with encoded payloads, allowing for comprehensive security testing and reporting of vulnerabilities. Notable features include customizable payloads, diverse encoding options, and the ability to specify request placeholders for precise attack simulations.&lt;/p&gt;</description></item><item><title>greenmask</title><link>https://rainmana.github.io/hackyfeed/tools/greenmaskio-greenmask/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/greenmaskio-greenmask/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Greenmask is an open-source utility designed for logical database dumping, anonymization, and synthetic data generation, primarily targeting PostgreSQL with ongoing support for MySQL. It enables users to create smaller, referentially intact development databases while offering features such as deterministic transformations, dynamic parameters, and storage support for S3-compatible systems, ensuring flexibility and data integrity. Ideal for sanitizing sensitive data, backing up and restoring databases, and streamlining local development processes, Greenmask operates statelessly and produces outputs compatible with standard database tools.&lt;/p&gt;</description></item><item><title>HackBrowserData</title><link>https://rainmana.github.io/hackyfeed/tools/moond4rk-hackbrowserdata/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/moond4rk-hackbrowserdata/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HackBrowserData is a command-line utility designed for decrypting and exporting sensitive data, such as passwords, cookies, and browsing history, from various popular web browsers on Windows, macOS, and Linux. Its notable features include support for the latest encryption standards, like AES-256-CBC for Firefox 144 and beyond, and comprehensive compatibility with a wide range of browsers including Google Chrome, Microsoft Edge, and Opera. The tool emphasizes its intended use for security research while disclaiming legal responsibilities associated with its application.&lt;/p&gt;</description></item><item><title>jaeles</title><link>https://rainmana.github.io/hackyfeed/tools/jaeles-project-jaeles/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jaeles-project-jaeles/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Jaeles is a robust and extensible web application scanning framework developed in Go, designed to facilitate the creation of customized scanners for identifying vulnerabilities. Its primary use case is in the security assessment of web applications, featuring capabilities such as signature-based scanning, integration with Burp Suite, and extensive reporting options. Notable features include the ability to scan multiple URLs concurrently, customizable signature definitions, and Docker support for streamlined deployment.&lt;/p&gt;</description></item><item><title>KubeHound</title><link>https://rainmana.github.io/hackyfeed/tools/datadog-kubehound/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/datadog-kubehound/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; KubeHound is a Kubernetes attack graph tool designed to automatically calculate attack paths between assets within a cluster. It enables users to query and analyze security vulnerabilities through a graph-based representation of their Kubernetes environment, utilizing the Gremlin query language for advanced data exploration. Notable features include compatibility with Docker and Docker Compose, deployment as a service (KHaaS), and integration with graph query UIs, including a Jupyter notebook for user-friendly interaction with the attack graph data.&lt;/p&gt;</description></item><item><title>landrun</title><link>https://rainmana.github.io/hackyfeed/tools/zouuup-landrun/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zouuup-landrun/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Landrun is a lightweight sandboxing tool for Linux designed to run processes securely using the Landlock kernel security module, enabling fine-grained control over filesystem and network access without the need for root privileges or containerization. Notable features include kernel-level security, customizable read, write, and execution permissions for files and directories, and TCP access control, making it suitable for securely executing commands in an isolated environment. With a minimal overhead architecture, it offers a practical solution for developers needing enhanced process security.&lt;/p&gt;</description></item><item><title>ligolo-ng</title><link>https://rainmana.github.io/hackyfeed/tools/nicocha30-ligolo-ng/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nicocha30-ligolo-ng/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ligolo-ng is an advanced tunneling tool that establishes connections through a TUN interface, enabling penetration testers to create reverse TCP/TLS tunnels without the need for SOCKS proxies. Notable features include a user-friendly web interface, automatic configuration for certificates, support for multiple platforms, and resilience to network issues with automatic tunnel recovery. Its design facilitates streamlined network management and the ability to run tools directly over these tunnels.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="ligolo-ng--tunneling-like-a-vpn"&gt;Ligolo-ng : Tunneling like a VPN&lt;/h1&gt;
&lt;p&gt;&lt;img src="doc/logo.png" alt="Ligolo Logo"&gt;&lt;/p&gt;</description></item><item><title>metabigor</title><link>https://rainmana.github.io/hackyfeed/tools/j3ssie-metabigor/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/j3ssie-metabigor/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Metabigor is an open-source intelligence (OSINT) tool designed for various information-gathering tasks without the need for API keys. It features capabilities such as network discovery, subdomain enumeration through certificate transparency logs, IP enrichment with Shodan InternetDB, and the ability to detect CDNs or WAFs, making it versatile for cybersecurity research and analysis. Notably, it allows users to automate input processing and batch queries for efficient data collection and analysis.&lt;/p&gt;</description></item><item><title>misconfig-mapper</title><link>https://rainmana.github.io/hackyfeed/tools/intigriti-misconfig-mapper/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/intigriti-misconfig-mapper/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Misconfig Mapper is a CLI tool developed by Intigriti designed to automate the detection and resolution of common security misconfigurations across various services and technologies. It leverages a flexible template-based system stored in &lt;code&gt;services.json&lt;/code&gt;, allowing users to easily add new services and perform extensive checks tailored to their specific environments. Key features include service enumeration, customizable detection templates, and the option to check only for service presence without performing misconfiguration assessments.&lt;/p&gt;</description></item><item><title>Modlishka</title><link>https://rainmana.github.io/hackyfeed/tools/drk1wi-modlishka/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/drk1wi-modlishka/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Modlishka is an open-source penetration testing tool that operates as a man-in-the-middle proxy, allowing seamless proxying of multi-domain HTTP and HTTPS traffic without requiring client certificate installation. Its primary use case is in security testing, particularly for ethical phishing assessments and 2FA bypass demonstrations, providing features such as pattern-based JavaScript payload injection, user credential harvesting, and extensive support for various 2FA schemes. Additionally, Modlishka&amp;rsquo;s modular and stateless design enhances scalability, while its cross-platform compatibility ensures usability across major operating systems.&lt;/p&gt;</description></item><item><title>mosint</title><link>https://rainmana.github.io/hackyfeed/tools/alpkeskin-mosint/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/alpkeskin-mosint/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Mosint is an automated Open Source Intelligence (OSINT) tool designed for efficient email investigations and scanning. It consolidates various services to validate emails, check for social media accounts, investigate data breaches, and extract associated information rapidly, all while being lightweight and user-friendly. Notable features include email verification, data breach checks, Pastebin scans, DNS/IP lookups, and the ability to output results in JSON format.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;img src="static/mosint-logo.png" alt="mosint" width="150px"&gt;
 &lt;br&gt;
&lt;/h1&gt;
&lt;p align="center"&gt;
&lt;a href="https://opensource.org/licenses/MIT"&gt;&lt;img src="https://img.shields.io/badge/license-MIT-_red.svg"&gt;&lt;/a&gt;
&lt;a href="https://goreportcard.com/badge/github.com/alpkeskin/mosint"&gt;&lt;img src="https://goreportcard.com/badge/github.com/alpkeskin/mosint"&gt;&lt;/a&gt;
&lt;a href="https://github.com/alpkeskin/mosint/releases"&gt;&lt;img src="https://img.shields.io/github/release/alpkeskin/mosint"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
 &lt;a href="#features"&gt;Features&lt;/a&gt; •
 &lt;a href="#installation"&gt;Installation&lt;/a&gt; •
 &lt;a href="#services"&gt;Services&lt;/a&gt; •
 &lt;a href="#usage"&gt;Usage&lt;/a&gt; •
 &lt;a href="#docker"&gt;Docker&lt;/a&gt; •
 &lt;a href="#configuration-file"&gt;Config&lt;/a&gt; •
 &lt;a href="#screen"&gt;Screen&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>nmap</title><link>https://rainmana.github.io/hackyfeed/tools/ullaakut-nmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ullaakut-nmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Ullaakut/nmap library offers Go developers a comprehensive interface to leverage the features of the Nmap network scanner within their applications, facilitating the creation of security audit tools. By utilizing the Go language&amp;rsquo;s capabilities, the library allows for robust network scans, service detection, and easy parsing of XML outputs produced by the Nmap binary. Notable features include support for various scan types and the ability to manage scan timeouts, enhancing both flexibility and performance in penetration testing scenarios.&lt;/p&gt;</description></item><item><title>nmap-formatter</title><link>https://rainmana.github.io/hackyfeed/tools/vdjagilev-nmap-formatter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vdjagilev-nmap-formatter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; NMAP-Formatter is a versatile tool designed to convert NMAP XML output into various formats such as HTML, CSV, JSON, Excel, and more, facilitating the analysis and reporting of network scan results. Notable features include support for output via stdin, the ability to generate diagrams using Graphviz, and options to skip down hosts, enhancing usability for security professionals and network administrators. This tool can also be utilized as a library in Golang for integration into other applications.&lt;/p&gt;</description></item><item><title>nodepass</title><link>https://rainmana.github.io/hackyfeed/tools/nodepassproject-nodepass/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nodepassproject-nodepass/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; NodePass is an open-source network tunneling solution that provides enterprise-grade TCP/UDP tunneling with minimal configuration and high performance, designed for managing complex network scenarios. Key features include seamless protocol conversion, a connection pooling architecture for reduced latency, multi-level TLS security mechanisms, and real-time monitoring capabilities. The tool targets DevOps professionals and system administrators, facilitating effortless deployment and control in diverse networking conditions.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
 &lt;img src="https://nodepass.eu/assets/np-gopher.png" width="300"&gt;
&lt;p&gt;&lt;a href="https://github.com/avelino/awesome-go#networking"&gt;&lt;img src="https://awesome.re/mentioned-badge.svg" alt="Mentioned in Awesome Go"&gt;&lt;/a&gt;
&lt;a href="https://github.com/NodePassProject/nodepass/releases"&gt;&lt;img src="https://img.shields.io/github/v/release/NodePassProject/nodepass" alt="GitHub release"&gt;&lt;/a&gt;
&lt;a href="https://github.com/NodePassProject/nodepass/releases"&gt;&lt;img src="https://img.shields.io/github/downloads/NodePassProject/nodepass/total.svg" alt="GitHub downloads"&gt;&lt;/a&gt;
&lt;a href="https://goreportcard.com/report/github.com/NodePassProject/nodepass"&gt;&lt;img src="https://goreportcard.com/badge/github.com/NodePassProject/nodepass" alt="Go Report Card"&gt;&lt;/a&gt;
&lt;a href="https://opensource.org/licenses/BSD-3-Clause"&gt;&lt;img src="https://img.shields.io/badge/License-BSD_3--Clause-blue.svg" alt="License"&gt;&lt;/a&gt;
&lt;a href="https://pkg.go.dev/github.com/NodePassProject/nodepass"&gt;&lt;img src="https://pkg.go.dev/badge/github.com/NodePassProject/nodepass.svg" alt="Go Reference"&gt;&lt;/a&gt;
&lt;a href="https://deepwiki.com/NodePassProject/nodepass"&gt;&lt;img src="https://deepwiki.com/badge.svg" alt="Ask DeepWiki"&gt;&lt;/a&gt;
&lt;img src="https://img.shields.io/github/last-commit/NodePassProject/nodepass" alt="GitHub last commit"&gt;&lt;/p&gt;</description></item><item><title>nomore403</title><link>https://rainmana.github.io/hackyfeed/tools/devploit-nomore403/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/devploit-nomore403/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; NoMore403 is a specialized tool for cybersecurity professionals aimed at bypassing HTTP 40X errors during web security assessments. It employs multiple techniques such as header manipulation, method tampering, and custom path testing to automate the bypass process, featuring smart output filtering to highlight significant results and high concurrency for efficient testing. Notable capabilities include auto-calibration, deduplication of results, color-coded output, and customizable payloads for enhanced flexibility.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://i.imgur.com/F4D1zhr.png" width="350" height="200" alt="logo"&gt;
&lt;/p&gt;
&lt;h1 align="center"&gt;NoMore403&lt;/h1&gt;
&lt;p align="center"&gt;
 &lt;a href="https://github.com/devploit/nomore403/stargazers"&gt;&lt;img alt="GitHub stars" src="https://img.shields.io/github/stars/devploit/nomore403?style=flat&amp;logo=github"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/devploit/nomore403/forks"&gt;&lt;img alt="GitHub forks" src="https://img.shields.io/github/forks/devploit/nomore403?style=flat&amp;logo=github"&gt;&lt;/a&gt;
 &lt;a href="https://goreportcard.com/report/github.com/devploit/nomore403"&gt;&lt;img alt="Go Report Card" src="https://goreportcard.com/badge/github.com/devploit/nomore403"&gt;&lt;/a&gt;
 &lt;img alt="Go version" src="https://img.shields.io/badge/go-1.24-blue"&gt;
 &lt;img alt="License: MIT" src="https://img.shields.io/badge/license-MIT-green"&gt;
 &lt;img alt="Contributions welcome" src="https://img.shields.io/badge/contributions-welcome-brightgreen.svg"&gt;
&lt;/p&gt;</description></item><item><title>OneListForAll</title><link>https://rainmana.github.io/hackyfeed/tools/six2dez-onelistforall/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/six2dez-onelistforall/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OneListForAll is a web fuzzing tool that generates a variety of curated wordlists for penetration testing, focusing on efficiency and organization. Its notable features include automated synchronization of multiple source repositories, categorization of wordlists into short and long versions, deduplication, and a streamlined CLI for pipeline management. The tool consolidates wordlists into manageable files, supporting broad use cases from local fuzzing to advanced vulnerability assessments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="onelistforall"&gt;OneListForAll&lt;/h1&gt;
&lt;p&gt;Wordlists for web fuzzing: curated &lt;code&gt;micro&lt;/code&gt;, categorized &lt;code&gt;short&lt;/code&gt;/&lt;code&gt;long&lt;/code&gt;, and combined final lists.&lt;/p&gt;</description></item><item><title>Open-Source-Security-Guide</title><link>https://rainmana.github.io/hackyfeed/tools/mikeroyal-open-source-security-guide/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mikeroyal-open-source-security-guide/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Open Source Security Guide serves as a comprehensive resource for enhancing the security of systems and networks by providing tutorials, standards, and tools relevant to open-source security practices. It includes sections on security certifications, threat models, and various security frameworks, along with a curated list of tools and resources to improve security operations. Notably, it aims to foster a collaborative environment for sharing best practices and advancing security through community initiatives.&lt;/p&gt;</description></item><item><title>osmedeus</title><link>https://rainmana.github.io/hackyfeed/tools/j3ssie-osmedeus/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/j3ssie-osmedeus/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Osmedeus is a security-focused orchestration engine designed for automating complex workflows through declarative YAML definitions, enhancing the audibility and management of security tasks. It features distributed execution, a rich library of over 80 utility functions, and supports cloud infrastructure provisioning for robust penetration testing and scanning. Key functionalities include event-driven scheduling, agentic LLM integration for tool orchestration, and a REST API for seamless integration and visualization through a web interface.&lt;/p&gt;</description></item><item><title>osv-scanner</title><link>https://rainmana.github.io/hackyfeed/tools/google-osv-scanner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/google-osv-scanner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OSV-Scanner is a tool designed to identify vulnerabilities in project dependencies by leveraging the OSV database through a user-friendly CLI interface. It supports a diverse range of programming languages, package managers, and includes features such as vulnerability detection in container images and guided remediation recommendations based on various criteria. The tool&amp;rsquo;s extensibility and comprehensive data sourcing improve the accuracy and effectiveness of vulnerability notifications for developers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;picture&gt;
 &lt;source srcset="https://rainmana.github.io/hackyfeed/docs/images/osv-scanner-full-logo-darkmode.svg" media="(prefers-color-scheme: dark)"&gt;
 &lt;!-- markdown-link-check-disable-next-line --&gt;
 &lt;img src="https://rainmana.github.io/hackyfeed/docs/images/osv-scanner-full-logo-lightmode.svg"&gt;
&lt;/picture&gt;
&lt;hr&gt;
&lt;p&gt;&lt;a href="https://scorecard.dev/viewer/?uri=github.com/google/osv-scanner"&gt;&lt;img src="https://api.securityscorecards.dev/projects/github.com/google/osv-scanner/badge" alt="OpenSSF Scorecard"&gt;&lt;/a&gt;
&lt;a href="https://goreportcard.com/report/github.com/google/osv-scanner"&gt;&lt;img src="https://goreportcard.com/badge/github.com/google/osv-scanner" alt="Go Report Card"&gt;&lt;/a&gt;
&lt;a href="https://codecov.io/gh/google/osv-scanner"&gt;&lt;img src="https://codecov.io/gh/google/osv-scanner/graph/badge.svg?token=C8IDVX9LP5" alt="codecov"&gt;&lt;/a&gt;
&lt;a href="https://slsa.dev"&gt;&lt;img src="https://slsa.dev/images/gh-badge-level3.svg" alt="SLSA 3"&gt;&lt;/a&gt;
&lt;a href="https://github.com/google/osv-scanner/releases"&gt;&lt;img src="https://img.shields.io/github/v/release/google/osv-scanner" alt="GitHub Release"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>pentagi</title><link>https://rainmana.github.io/hackyfeed/tools/vxcontrol-pentagi/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vxcontrol-pentagi/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PentAGI is an AI-powered penetration testing framework that automates security assessments for information security professionals and researchers. Notable features include a fully autonomous AI agent capable of executing penetration test steps, integration with over 20 professional tools, a smart memory system for storing results, and comprehensive monitoring and reporting capabilities. The tool operates within a secure Docker environment and includes a modern web interface along with APIs for automation and integration, making it a flexible solution for advanced cybersecurity testing.&lt;/p&gt;</description></item><item><title>phoneinfoga</title><link>https://rainmana.github.io/hackyfeed/tools/sundowndev-phoneinfoga/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sundowndev-phoneinfoga/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PhoneInfoga is an advanced information-gathering framework specifically designed for scanning international phone numbers. Its primary use case involves collecting detailed information such as country, area, carrier, and line type, while employing various OSINT techniques to uncover more about the phone number in question. Notable features include a graphical user interface for scans, programmatic access through a REST API, and the ability to check for the existence of a number and its associated reputation across different platforms.&lt;/p&gt;</description></item><item><title>Platypus</title><link>https://rainmana.github.io/hackyfeed/tools/wangyihang-platypus/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wangyihang-platypus/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Platypus is a modern terminal-based tool for managing multiple reverse shell sessions and clients, implemented in Go. Its primary use case is to facilitate secure and efficient reverse shell connections across various protocols, featuring functionalities such as multiple service listening ports, a RESTful API for management, file download/upload capabilities, and an interactive shell interface that supports common control commands. Notable features include automatic server initiation, port forwarding, and a web UI for enhanced usability.&lt;/p&gt;</description></item><item><title>pretender</title><link>https://rainmana.github.io/hackyfeed/tools/redteampentesting-pretender/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/redteampentesting-pretender/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; &lt;code&gt;pretender&lt;/code&gt; is a versatile tool designed for executing man-in-the-middle (MitM) attacks by spoofing local name resolutions and performing DHCPv6 DNS takeover. It specializes in relaying attacks primarily against Windows hosts, leveraging protocols such as mDNS, LLMNR, and NetBIOS-NS spoofing. Notable features include the ability to log network queries in dry run mode, tailored domain responses, and integration with relaying tools like Impacket&amp;rsquo;s &lt;code&gt;ntlmrelayx.py&lt;/code&gt; and &lt;code&gt;krbrelayx&lt;/code&gt;.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;h1 align="center"&gt;&lt;b&gt;pretender&lt;/b&gt;&lt;/h1&gt;
 &lt;p align="center"&gt;&lt;i&gt;Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover&lt;br&gt;as well as mDNS, LLMNR and NetBIOS-NS spoofing&lt;/i&gt;&lt;/p&gt;</description></item><item><title>pspy</title><link>https://rainmana.github.io/hackyfeed/tools/dominicbreuker-pspy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dominicbreuker-pspy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; pspy is an unprivileged Linux process monitoring tool that allows users to observe commands executed by other processes, including cron jobs, in real-time without requiring root access. It leverages procfs scans and inotify filesystem watchers to detect short-lived processes and can be particularly useful for system enumeration in Capture The Flag (CTF) challenges, as well as for demonstrating secure coding practices regarding command-line argument handling. Notable features include customizable process and filesystem event monitoring, with options for output formatting and scan intervals.&lt;/p&gt;</description></item><item><title>reverse_ssh</title><link>https://rainmana.github.io/hackyfeed/tools/nhas-reverse_ssh/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nhas-reverse_ssh/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Reverse SSH is a tool designed for establishing reverse shells using SSH, enabling secure connections for remote management and file transfer. Its primary use case revolves around providing a reliable method for accessing and controlling remote systems, featuring capabilities such as dynamic port forwarding, native SCP/SFTP support, and multiple network transports like HTTP and TLS. Notable features include mutual client-server authentication, a full Windows shell experience, and advanced functionalities like fileless execution and built-in HTTP server capabilities for dynamic client generation.&lt;/p&gt;</description></item><item><title>reverse-shell</title><link>https://rainmana.github.io/hackyfeed/tools/lukechilds-reverse-shell/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lukechilds-reverse-shell/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; reverse-shell is a tool that facilitates setting up reverse shells on Unix-like systems, primarily intended for penetration testing and educational purposes. It automatically detects the target&amp;rsquo;s available software to execute the appropriate payload, enabling users to bypass firewalls and gain remote shell access effortlessly. Notable features include ease of use with commands for listening and executing reverse shells, options for reconnecting after disconnection, and the ability to run in the background to avoid detection.&lt;/p&gt;</description></item><item><title>reverse-ssh</title><link>https://rainmana.github.io/hackyfeed/tools/fahrj-reverse-ssh/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/fahrj-reverse-ssh/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ReverseSSH is a lightweight, statically-linked SSH server designed for establishing reverse connections, primarily useful for remote access during CTFs and penetration tests like the OSCP exam. It offers fully interactive shell access, file transfer through SFTP, and supports various port forwarding options, making it a versatile tool for bridging initial access with privilege escalation on target systems running Unix or Windows. Notable features include its compact size of less than 1.5MB and compatibility with both operating systems, enhancing its utility in diverse environments.&lt;/p&gt;</description></item><item><title>ruler</title><link>https://rainmana.github.io/hackyfeed/tools/sensepost-ruler/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sensepost-ruler/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ruler is a remote interaction tool designed for Exchange servers, exploiting MAPI/HTTP and RPC/HTTP protocols to manipulate Outlook features for shell access. Its primary use case includes enumerating valid users, creating malicious mail rules, and executing VBScript via Outlook forms or home pages. Notable features include the ability to leverage the Autodiscover service for efficient interaction and a variety of built-in functions for customized exploitation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="introduction"&gt;Introduction&lt;/h1&gt;
&lt;p&gt;Ruler is a tool that allows you to interact with Exchange servers remotely, through either the MAPI/HTTP or RPC/HTTP protocol. The main aim is abuse the client-side Outlook features and gain a shell remotely.&lt;/p&gt;</description></item><item><title>SatIntel</title><link>https://rainmana.github.io/hackyfeed/tools/ang13t-satintel/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ang13t-satintel/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SatIntel is an OSINT tool designed for satellite reconnaissance, built with Golang. It enables users to extract satellite telemetry, receive orbital predictions, and parse Two Line Elements (TLE) using a command-line interface that integrates with APIs from Space Track and N2YO. Notable features include satellite catalog retrieval, telemetry display, visual and radio orbital predictions, and user-friendly authentication through environmental variables.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="satintel"&gt;SatIntel&lt;/h1&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt; . . . . . . . . .
 . . . ________
 . ///////// . . . . . .
 . ________ . . ///////// . .
 |.____. /\ ///////// . . . .
 . // \/ |\ /////////
 // \ | \ ///////// _______ _______ _______ _____ __ _ _______ _______ .
 || | | ///////// . . |______ |_____| | | | \ | | |______ |
 . || | |// ///// ______| | | | __|__ | \_| | |______ |_____ .
 \\ / // \/ .
 \\.___./ //\ ,_\ . . .
 . . \ //////\ / \ . . Satellite OSINT CLI Tool . .
 . ///////// \| | .
 . ///////// . \ __ / . Made by Angelina Tsuboi (G4LXY) .
 . ///////// . . .
 . . ///////// . . . . . .
 -------- . .. . . .
 . . . . . .
&lt;/code&gt;&lt;/pre&gt;&lt;h4 id="satintel-is-a-osint-tool-for-satellite-reconnaissance-made-with-golang-the-tool-can-extract-satellite-telemetry-receive-orbital-predictions-and-parse-tles"&gt;SatIntel is a OSINT tool for satellite reconnaissance made with Golang. The tool can extract satellite telemetry, receive orbital predictions, and parse TLEs.&lt;/h4&gt;
&lt;h3 id="features"&gt;Features&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Satellite Catalog Retrieval from NORAD ID or Selection Menu&lt;/li&gt;
&lt;li&gt;Display Satellite Telemetry&lt;/li&gt;
&lt;li&gt;Visual and Radio Orbital Predictions&lt;/li&gt;
&lt;li&gt;Parse Two Line Elements (TLE)&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="preview"&gt;Preview&lt;/h3&gt;
&lt;img src="https://github.com/ANG13T/SatIntel/blob/main/assets/image.png" alt="SatIntel Image" width="600"/&gt;
&lt;h3 id="usage"&gt;Usage&lt;/h3&gt;
&lt;p&gt;Make an account at &lt;a href="https://space-track.org"&gt;&lt;strong&gt;Space Track&lt;/strong&gt;&lt;/a&gt; save username and password.&lt;/p&gt;</description></item><item><title>scan4all</title><link>https://rainmana.github.io/hackyfeed/tools/ghosttroops-scan4all/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ghosttroops-scan4all/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; scan4all is a versatile cybersecurity tool designed for automated web scanning and vulnerability detection, integrating various tools such as vscan, nuclei, and subfinder. It supports a wide range of protocols for password blasting and includes built-in detection capabilities for over 15,000 proof-of-concept (PoC) exploits. Built on Golang, it is cross-platform, lightweight, customizable, and features intelligent scanning mechanisms that optimize performance while ensuring comprehensive coverage of vulnerabilities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://twitter.com/intent/follow?screen_name=Hktalent3135773"&gt;&lt;img src="https://img.shields.io/twitter/url/http/Hktalent3135773.svg?style=social" alt="Twitter"&gt;&lt;/a&gt; &lt;a href="https://twitter.com/intent/follow?screen_name=Hktalent3135773"&gt;&lt;img src="https://img.shields.io/twitter/follow/Hktalent3135773.svg?style=social&amp;amp;label=Follow" alt="Follow on Twitter"&gt;&lt;/a&gt; &lt;a href="https://github.com/hktalent/"&gt;&lt;img src="https://img.shields.io/github/followers/hktalent.svg?style=social&amp;amp;label=Follow" alt="GitHub Followers"&gt;&lt;/a&gt; &lt;a target=_blank href="https://chat.51pwn.com:2083/?cnId=51pwn&amp;atRd=true&amp;stChat=1"&gt;💬&lt;/a&gt;&lt;/p&gt;</description></item><item><title>scilla</title><link>https://rainmana.github.io/hackyfeed/tools/edoardottt-scilla/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/edoardottt-scilla/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Scilla is an information gathering tool designed for DNS, subdomains, ports, and directories enumeration. Its primary use case is for penetration testing, providing capabilities for extensive reconnaissance on target domains. Notable features include customizable wordlists for subdomain and directory enumeration, multiple output formats, and ease of installation through various methods such as Homebrew, Snap, and Docker.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://github.com/edoardottt/images/blob/main/scilla/logo.png"&gt;&lt;br&gt;
 &lt;b&gt;🏴‍☠️ Information Gathering tool 🏴‍☠️ - DNS / Subdomains / Ports / Directories enumeration&lt;/b&gt;&lt;br&gt;
 &lt;br&gt;
 &lt;!-- go-report-card --&gt;
 &lt;a href="https://goreportcard.com/report/github.com/edoardottt/scilla"&gt;
 &lt;img src="https://goreportcard.com/badge/github.com/edoardottt/scilla" alt="go-report-card" /&gt;
 &lt;/a&gt;
 &lt;!-- workflows --&gt;
 &lt;a href="https://github.com/edoardottt/scilla/actions"&gt;
 &lt;img src="https://github.com/edoardottt/scilla/actions/workflows/go.yml/badge.svg" alt="workflows" /&gt;
 &lt;/a&gt;
 &lt;br&gt;
 &lt;sub&gt;
 Coded with 💙 by edoardottt
 &lt;/sub&gt;
 &lt;br&gt;
 &lt;!--Tweet button--&gt;
 &lt;a href="https://twitter.com/intent/tweet?url=https%3A%2F%2Fgithub.com%2Fedoardottt%2Fscilla%20&amp;text=Information%20Gathering%20tool%21&amp;hashtags=pentesting%2Clinux%2Cgolang%2Cnetwork" target="_blank"&gt;Share on Twitter!
 &lt;/a&gt;
&lt;/p&gt;</description></item><item><title>ScopeSentry</title><link>https://rainmana.github.io/hackyfeed/tools/autumn-27-scopesentry/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/autumn-27-scopesentry/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Scope Sentry is a versatile cybersecurity tool that provides functionalities such as asset mapping, subdomain enumeration, vulnerability scanning, and information leakage detection. Its primary use case is to facilitate comprehensive security assessments of web assets through a distributed scanning approach, allowing users to configure multiple scanning nodes. Notably, it features a plugin system for extensibility, supports multi-node scanning, and includes components for web monitoring and sensitive data leakage detection.&lt;/p&gt;</description></item><item><title>SecretScanner</title><link>https://rainmana.github.io/hackyfeed/tools/deepfence-secretscanner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/deepfence-secretscanner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Deepfence SecretScanner is a standalone tool designed to identify unprotected secrets, such as API keys and passwords, within container images and file systems. It matches content against a comprehensive database of approximately 140 secret types, outputting detailed findings in JSON format. Furthermore, SecretScanner can be integrated into the ThreatMapper platform, allowing for holistic vulnerability scanning and risk assessment in cloud-native applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="secretscanner"&gt;SecretScanner&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://threatmapper.org/docs/secretscanner/"&gt;&lt;img src="https://img.shields.io/badge/documentation-read-green" alt="Documentation"&gt;&lt;/a&gt;
&lt;a href="https://github.com/deepfence/SecretScanner/blob/master/LICENSE"&gt;&lt;img src="https://img.shields.io/github/license/deepfence/SecretScanner" alt="GitHub license"&gt;&lt;/a&gt;
&lt;a href="https://github.com/deepfence/SecretScanner/stargazers"&gt;&lt;img src="https://img.shields.io/github/stars/deepfence/SecretScanner" alt="GitHub stars"&gt;&lt;/a&gt;
&lt;a href="https://github.com/deepfence/SecretScanner/issues"&gt;&lt;img src="https://img.shields.io/github/issues/deepfence/SecretScanner" alt="GitHub issues"&gt;&lt;/a&gt;
&lt;a href="https://join.slack.com/t/deepfence-community/shared_invite/zt-podmzle9-5X~qYx8wMaLt9bGWwkSdgQ"&gt;&lt;img src="https://img.shields.io/badge/slack-@deepfence-blue.svg?logo=slack" alt="Slack"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1 id="secretscanner-1"&gt;SecretScanner&lt;/h1&gt;
&lt;p&gt;Deepfence SecretScanner can find unprotected secrets in container images or file systems.&lt;/p&gt;</description></item><item><title>seekr</title><link>https://rainmana.github.io/hackyfeed/tools/seekr-osint-seekr/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/seekr-osint-seekr/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Seekr is a multi-purpose toolkit designed for gathering and managing Open Source Intelligence (OSINT) data, featuring a streamlined web interface for data collection, organization, and analysis. Key functionalities include integration with popular OSINT tools, account discovery, customizable themes, and the absence of API keys for any features, making it suitable for researchers and investigators seeking to enhance their OSINT workflows. It is currently in beta development and allows for easy setup on various platforms including Windows, Linux, and Docker.&lt;/p&gt;</description></item><item><title>shortscan</title><link>https://rainmana.github.io/hackyfeed/tools/bitquark-shortscan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bitquark-shortscan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Shortscan is an IIS short filename enumeration tool that rapidly identifies files with short filenames on an IIS web server and attempts to discover their corresponding full filenames using a unique checksum matching method. Its notable features include support for custom headers, concurrency settings, and vulnerability checks without full file enumeration, as well as the ability to utilize custom wordlists and generate rainbow tables through an accompanying utility named &lt;code&gt;shortutil&lt;/code&gt;.&lt;/p&gt;</description></item><item><title>spicedb</title><link>https://rainmana.github.io/hackyfeed/tools/authzed-spicedb/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/authzed-spicedb/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SpiceDB is an open-source authorization database inspired by Google&amp;rsquo;s Zanzibar system, designed to provide scalable and secure permission checks for applications. It allows developers to define schemas, manage relationships, and conduct queries to assess user permissions on resources, addressing critical access control threats. Notable features include its relational-like structure for defining authorization models and its capability to handle complex permission queries for enhanced security management.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;a href="https://authzed.com#gh-dark-mode-only" target="_blank"&gt;
 &lt;img width="300" src="https://github.com/user-attachments/assets/0ebf4718-283b-4c40-b567-1d577c0a2e03" alt="spicedb logo"&gt;
 &lt;/a&gt;
 &lt;a href="https://authzed.com#gh-light-mode-only" target="_blank"&gt;
 &lt;img width="300" src="https://github.com/user-attachments/assets/577a72f9-4fdd-49f8-b1d6-e53025d219b8" alt="spicedb Logo"&gt;
 &lt;/a&gt;
&lt;/h1&gt;
&lt;h3 align="center"&gt;
 SpiceDB sets the standard for authorization that &lt;i&gt;scales&lt;/i&gt;.
 &lt;br/&gt;&lt;br/&gt;Scale with&lt;br/&gt;
 Traffic • Dev Velocity • Functionality • Geography
&lt;/h3&gt;
&lt;p align="center"&gt;
 &lt;a href="https://github.com/authzed/spicedb/releases"&gt;&lt;img alt="release badge" src="https://img.shields.io/github/v/release/authzed/spicedb?color=%236EC93F&amp;label=latest%20release&amp;sort=semver&amp;style=flat-square"&gt;&lt;/a&gt;
 &amp;nbsp;
 &lt;a href="https://hub.docker.com/repository/docker/authzed/spicedb" target="_blank"&gt;&lt;img alt="docker pulls badge" src="https://img.shields.io/docker/pulls/authzed/spicedb?color=%23448CE6&amp;style=flat-square"&gt;&lt;/a&gt;
 &amp;nbsp;
 &lt;a href="https://authzed.com/blog/go-ecosystem"&gt;&lt;img alt="built with Go badge" src="https://img.shields.io/badge/built_with-Go-367B99.svg?style=flat-square"&gt;&lt;/a&gt;
 &amp;nbsp;
 &lt;a href="https://app.codecov.io/gh/authzed/spicedb"&gt;&lt;img alt="coverage" src="https://img.shields.io/codecov/c/github/authzed/spicedb"&gt;&lt;/a&gt;
 &amp;nbsp;
 &lt;a href="https://www.bestpractices.dev/en/projects/6348" target="_blank"&gt;&lt;img alt="cii badge" src="https://img.shields.io/cii/percentage/6348?style=flat-square&amp;label=cii%20best%20practices&amp;color=F8D44B"&gt;&lt;/a&gt;
 &amp;nbsp;
 &lt;a href="https://securityscorecards.dev/viewer/?uri=github.com/authzed/spicedb" target="_blank"&gt;&lt;img alt="ssf badge" src="https://api.securityscorecards.dev/projects/github.com/authzed/spicedb/badge"&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>spray</title><link>https://rainmana.github.io/hackyfeed/tools/chainreactors-spray/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/chainreactors-spray/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SPRAY is a high-performance directory fuzzing tool designed for testing and exploiting web applications, boasting over 50% greater performance compared to similar tools like ffuf and feroxbuster. It features customizable dictionary generation based on masks or rules, dynamic filtering, extensive fingerprint recognition capabilities, and the ability to handle multiple targets efficiently with resume options for interrupted sessions. The tool seamlessly integrates with *nix command line environments, facilitating inter-operation with other cybersecurity tools.&lt;/p&gt;</description></item><item><title>Stowaway</title><link>https://rainmana.github.io/hackyfeed/tools/ph4ntonn-stowaway/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ph4ntonn-stowaway/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Stowaway is a multi-tier proxy tool written in Go, designed specifically for penetration testers to route external traffic through multiple nodes into an internal network, thereby overcoming access restrictions. Notable features include user-friendly command-line interface, tree structure node management, support for various connection types (socks5, HTTP, SSH), traffic encryption using TLS/AES-256-GCM, and capabilities for remote shell, file transfer, and port mapping, all while maintaining compatibility across multiple platforms such as Linux, Mac, and Windows.&lt;/p&gt;</description></item><item><title>stunner</title><link>https://rainmana.github.io/hackyfeed/tools/firefart-stunner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/firefart-stunner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Stunner is a specialized tool designed for testing and exploiting STUN and TURN servers, particularly in the context of videoconferencing and audio chat applications utilizing the TURN protocol. Its primary use case involves identifying misconfigurations in TURN servers, enabling users to establish a SOCKS proxy that routes traffic through these servers into internal networks. Notable features include the ability to enumerate accessible IP addresses, perform detailed server information queries, and set up a local SOCKS server for traffic relaying.&lt;/p&gt;</description></item><item><title>subjack</title><link>https://rainmana.github.io/hackyfeed/tools/haccer-subjack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/haccer-subjack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Subjack is a DNS takeover scanner written in Go, designed for the concurrent scanning of domain lists to identify registrable domains vulnerable to hijacking. It features detection capabilities for various vulnerability types including CNAME takeovers, NS delegation issues, stale A records, and more, allowing security professionals to assess the risk of domain takeovers effectively. With an emphasis on speed and efficiency, Subjack provides functionalities such as customizable concurrency and thorough output options to facilitate large-scale testing.&lt;/p&gt;</description></item><item><title>SubOver</title><link>https://rainmana.github.io/hackyfeed/tools/ice3man543-subover/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ice3man543-subover/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SubOver is a Golang-based tool designed for detecting potential subdomain takeovers across more than 30 services, leveraging Go&amp;rsquo;s concurrency for enhanced speed and efficiency. Its primary use case is for security professionals conducting assessments of web applications to identify vulnerable subdomains that can be hijacked. Notable features include a comprehensive service list, customizable concurrent threads, and a straightforward command-line interface for easy operation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="subover"&gt;SubOver&lt;/h1&gt;
&lt;h2 id="note---this-project-is-discontinued-no-more-updates-will-be-provided-sorry"&gt;Note - This project is discontinued. No more updates will be provided! Sorry!&lt;/h2&gt;
&lt;blockquote&gt;
&lt;p&gt;But something more awesome will come soon!&lt;/p&gt;</description></item><item><title>SydneyQt</title><link>https://rainmana.github.io/hackyfeed/tools/juzeon-sydneyqt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/juzeon-sydneyqt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SydneyQt is a cross-platform desktop client designed for the jailbroken New Bing AI Copilot, enabling advanced interactions with the AI through capabilities such as prompt injection, CAPTCHA resolution via Selenium, and context editing. Key features include support for various file types and multimedia interactions, customizable quick responses, and integration with OpenAI&amp;rsquo;s API, all presented within a modern and user-friendly interface. The tool is built with Go and Wails, offering robust functionality while allowing users to bypass regional restrictions and enhance their AI interactions.&lt;/p&gt;</description></item><item><title>terracognita</title><link>https://rainmana.github.io/hackyfeed/tools/cycloidio-terracognita/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cycloidio-terracognita/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Terracognita is a tool that automates the import of existing cloud infrastructure into Terraform configurations (HCL) or Terraform state, particularly supporting AWS, GCP, Azure, and VMware. It streamlines the adoption of Infrastructure as Code (IaC) best practices by generating Terraform code from current cloud setups, enabling easier lifecycle management and integration with Cycloid&amp;rsquo;s DevOps pipelines. Notable features include support for multiple major cloud providers and an open-source nature that encourages community contributions.&lt;/p&gt;</description></item><item><title>Terrapin-Scanner</title><link>https://rainmana.github.io/hackyfeed/tools/rub-nds-terrapin-scanner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rub-nds-terrapin-scanner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Terrapin Vulnerability Scanner is a Go-based utility designed to assess the vulnerability of SSH clients and servers against the Terrapin Attack. It utilizes a single connection to retrieve supported algorithms without initiating a full SSH key exchange, allowing it to identify potential vulnerabilities and support for known countermeasures like strict key exchange. Notable features include JSON output for results, support for various operating systems via pre-compiled binaries and Docker, and ease of building from source.&lt;/p&gt;</description></item><item><title>traitor</title><link>https://rainmana.github.io/hackyfeed/tools/liamg-traitor/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/liamg-traitor/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Traitor is a privilege escalation tool designed to automatically exploit local vulnerabilities and misconfigurations in Unix-like systems to achieve a root shell. It incorporates various methods from GTFOBins and specific CVEs, allowing users to discover potential exploits with options to directly attempt them if necessary. Notable features include the ability to analyze sudo permissions, the option to exploit specific vulnerabilities, and support for various privilege escalation vectors.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="traitor"&gt;Traitor&lt;/h1&gt;
&lt;p&gt;Automatically exploit low-hanging fruit to pop a root shell. Linux privilege escalation made easy!&lt;/p&gt;</description></item><item><title>trivy-operator</title><link>https://rainmana.github.io/hackyfeed/tools/aquasecurity-trivy-operator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/aquasecurity-trivy-operator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Trivy Operator is a Kubernetes-native security toolkit that utilizes Trivy to perform continuous security scans of Kubernetes clusters. It automatically generates and updates comprehensive security reports, including vulnerability assessments, configuration audits, and compliance checks, which are accessible through the Kubernetes API. Notable features include automated scans for workloads, RBAC assessments, secret exposure detection, and generation of Software Bill of Materials (SBOM) for workloads, aiding in the identification and mitigation of potential security risks in real-time.&lt;/p&gt;</description></item><item><title>urlfinder</title><link>https://rainmana.github.io/hackyfeed/tools/projectdiscovery-urlfinder/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/projectdiscovery-urlfinder/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; URLFinder is a high-speed, passive URL discovery tool optimized for efficient web asset discovery without active scanning, making it particularly useful for penetration testers and security researchers. It features curated passive sources for comprehensive URL gathering, supports multiple output formats, and provides integration capabilities through STDIN/OUT support.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;URLFinder&lt;/h1&gt;
&lt;p align="center"&gt;
A high-speed tool for passively gathering URLs, optimized for efficient web asset discovery without active scanning.
&lt;/p&gt;
&lt;p align="center"&gt;
&lt;a href="https://opensource.org/licenses/MIT"&gt;&lt;img src="https://img.shields.io/badge/license-MIT-red.svg"&gt;&lt;/a&gt;
&lt;a href="https://goreportcard.com/badge/github.com/projectdiscovery/urlfinder"&gt;&lt;img src="https://goreportcard.com/badge/github.com/projectdiscovery/urlfinder"&gt;&lt;/a&gt;
&lt;a href="https://pkg.go.dev/github.com/projectdiscovery/urlfinder/pkg/urlfinder"&gt;&lt;img src="https://img.shields.io/badge/go-reference-blue"&gt;&lt;/a&gt;
&lt;a href="https://github.com/projectdiscovery/urlfinder/releases"&gt;&lt;img src="https://img.shields.io/github/release/projectdiscovery/urlfinder"&gt;&lt;/a&gt;
&lt;a href="https://twitter.com/pdiscoveryio"&gt;&lt;img src="https://img.shields.io/twitter/follow/pdiscoveryio.svg?logo=twitter"&gt;&lt;/a&gt;
&lt;a href="https://discord.gg/projectdiscovery"&gt;&lt;img src="https://img.shields.io/discord/695645237418131507.svg?logo=discord"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
 &lt;a href="#features"&gt;Features&lt;/a&gt; •
 &lt;a href="#installation"&gt;Installation&lt;/a&gt; •
 &lt;a href="#usage"&gt;Usage&lt;/a&gt; •
 &lt;a href="#examples"&gt;Examples&lt;/a&gt; •
 &lt;a href="https://discord.gg/projectdiscovery"&gt;Join Discord&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>urlhunter</title><link>https://rainmana.github.io/hackyfeed/tools/utkusen-urlhunter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/utkusen-urlhunter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; urlhunter is a reconnaissance tool designed for searching URLs exposed via URL shortener services like bit.ly and goo.gl. It utilizes collections published by the URLTeam, enabling users to perform keyword and regex searches on historical data with customizable date ranges and output options. Notable features include the ability to specify single or multiple keywords, regex searches, and support for bulk archive downloading, making it ideal for cyber intelligence and bug bounty applications.&lt;/p&gt;</description></item><item><title>Venom</title><link>https://rainmana.github.io/hackyfeed/tools/dliv3-venom/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dliv3-venom/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Venom is a multi-hop proxy tool designed for penetration testers, built using Go, which allows the connection of multiple nodes to facilitate multi-layer traffic routing. Key features include a visual network topology, multi-level SOCKS5 proxying, interactive shell access, and secure communication between nodes, making it ideal for managing complex internal networks during security assessments. The tool supports various platforms and architectures, enhancing its versatility for engagements in diverse environments.&lt;/p&gt;</description></item><item><title>Web-Cache-Vulnerability-Scanner</title><link>https://rainmana.github.io/hackyfeed/tools/hackmanit-web-cache-vulnerability-scanner/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hackmanit-web-cache-vulnerability-scanner/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Web Cache Vulnerability Scanner (WCVS) is a command-line interface tool designed to identify and exploit web cache poisoning and deception vulnerabilities across various web applications. It supports multiple techniques for both attack types, features a crawler for discovering additional URLs, and can be integrated into CI/CD processes to streamline security practices. Notable functionalities include customizable request handling, JSON report generation, and the ability to route traffic through a proxy for enhanced testing versatility.&lt;/p&gt;</description></item><item><title>webanalyze</title><link>https://rainmana.github.io/hackyfeed/tools/rverton-webanalyze/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rverton-webanalyze/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Webanalyze is a performance-oriented tool written in Go that identifies technologies used by web applications by analyzing HTTP responses from specified hosts. Its primary use case is for security assessments and technology profiling, supporting bulk analysis of multiple hosts via input files and offering output in various formats such as CSV and JSON. Notable features include the ability to crawl links from a root page, search for subdomains, and download updated app definitions from the Wappalyzer repository.&lt;/p&gt;</description></item><item><title>Whaler</title><link>https://rainmana.github.io/hackyfeed/tools/p3gleg-whaler/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/p3gleg-whaler/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Whaler is a Go-based tool that facilitates the reverse engineering of Docker images by reconstructing the Dockerfile that generated them. Its primary use case involves extracting valuable information from Docker images, such as identifying added files, detecting potential secret files, and displaying metadata including open ports and environment variables. Notable features include the ability to automatically pull Docker images, filter out irrelevant filenames, and save image layers for further analysis.&lt;/p&gt;</description></item><item><title>wholeaked</title><link>https://rainmana.github.io/hackyfeed/tools/utkusen-wholeaked/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/utkusen-wholeaked/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; wholeaked is a Go-based file-sharing tool designed to identify the responsible individual in the event of a document leakage. It accomplishes this by creating a unique hidden signature for each recipient, which is embedded in the shared file, and offers integrations with services such as Sendgrid and AWS SES for automated file distribution. Key features include compatibility with various file types and enhanced functionality for common formats like PDF and DOCX, enabling both automated and manual sharing.&lt;/p&gt;</description></item><item><title>wpprobe</title><link>https://rainmana.github.io/hackyfeed/tools/chocapikk-wpprobe/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/chocapikk-wpprobe/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WPProbe is a rapid scanning tool designed to detect installed WordPress plugins and themes through REST API enumeration and HTML discovery, mapping them to known vulnerabilities. It supports multiple scanning modes, including stealthy, brute-force, and hybrid methods, allowing detection of over 5,000 plugins without brute-force and many more with it. The tool fetches an updated vulnerability database automatically, eliminating the need for an API key by default, while still allowing for custom configurations and output formats.&lt;/p&gt;</description></item></channel></rss>