<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Html on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/tags/html/</link><description>Recent content in Html on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/tags/html/feed.xml" rel="self" type="application/rss+xml"/><item><title>Android-Exploits</title><link>https://rainmana.github.io/hackyfeed/tools/sundaysec-android-exploits/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sundaysec-android-exploits/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Android-Exploits is a repository that consolidates various Android exploits and provides a comprehensive guide for conducting Android exploitation. Its primary use case is to facilitate the testing and assessment of Android application security vulnerabilities through categorized exploits such as Denial of Service, local, remote, and web application exploits. Notable features include detailed instructions for utilizing the exploits alongside third-party tools like ExploitPack, along with references to common mobile hacking tools and resources related to Android security risks.&lt;/p&gt;</description></item><item><title>BabySploit</title><link>https://rainmana.github.io/hackyfeed/tools/m4cs-babysploit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m4cs-babysploit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BabySploit is a user-friendly penetration testing toolkit designed to assist users in learning more complex frameworks like Metasploit. It features an intuitive interface and a suite of tools for exploiting vulnerabilities, making it accessible for users of all experience levels, while being optimized for Kali Linux and also tested for macOS compatibility. Notable functionality includes an integrated configuration management system and support for various essential exploitation tools.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;a href="https://pepy.tech/project/babysploit"&gt;&lt;img src="https://pepy.tech/badge/babysploit/week"&gt;&lt;/a&gt;
 &lt;a href="https://pepy.tech/project/babysploit"&gt;&lt;img src="https://pepy.tech/badge/babysploit/month"&gt;&lt;/a&gt;
 &lt;a href="https://pepy.tech/project/babysploit"&gt;&lt;img src="https://pepy.tech/badge/babysploit"&gt;&lt;/a&gt;&lt;/br&gt;
 &lt;a href="https://github.com/M4cs/BabySploit/network"&gt;&lt;img src="https://img.shields.io/github/forks/M4cs/BabySploit.svg" alt="Forks"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/M4cs/BabySploit/stargazers"&gt;&lt;img src="https://img.shields.io/github/stars/M4cs/BabySploit.svg" atl="Stars"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/M4cs/BabySploit/issues"&gt;&lt;img src="https://img.shields.io/github/issues/M4cs/BabySploit.svg" alt="Issues"&gt;&lt;/a&gt;
 &lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/version-1.5-green.svg?syle=popout"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/M4cs/BabySploit/blob/master/LICENSE.md"&gt;&lt;img src="https://img.shields.io/github/license/M4cs/BabySploit.svg" alt="License"&gt;&lt;/a&gt;
 &lt;a href="http://www.python.org/download/"&gt;&lt;img alt="Python 3.6+" src="https://img.shields.io/badge/Python-3.6+-yellow.svg"&gt;&lt;/a&gt;
 &lt;a href="https://twitter.com/intent/tweet?text=Wow:&amp;url=https%3A%2F%2Fgithub.com%2FM4cs%2FBabySploit"&gt;&lt;img src="https://img.shields.io/twitter/url/https/github.com/M4cs/BabySploit.svg?style=popout" alt="Twitter"&gt;&lt;/a&gt;
 &lt;a href="https://discord.gg/C7jgQeN"&gt;&lt;img src="https://img.shields.io/badge/discord-join-blue.svg?syle=popout"&gt;&lt;/a&gt;
&lt;p align="center"&gt;
 &lt;b&gt;Made For Kali Linux. No Support For Other Distros If There Are Problems. Tested and Working on MacOS for most Tools.&lt;/b&gt;
 &lt;/br&gt;&lt;a href="https://twitter.com/maxbridgland" alt="Twitter Link"&gt;&lt;b&gt;Developed by @maxbridgland&lt;/b&gt;&lt;/a&gt;&lt;/br&gt;
 &lt;a href="https://bit.ly/2Ke9uVi"&gt;Donate&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>Bug-Bounty-Methodology</title><link>https://rainmana.github.io/hackyfeed/tools/tuhin1729-bug-bounty-methodology/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tuhin1729-bug-bounty-methodology/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Bug-Bounty-Methodology is a collection of checklists designed for systematic bug bounty hunting. It covers various security testing scenarios, including 2FA testing, CAPTCHA bypass, CSRF protection, and OAuth misconfiguration, providing comprehensive guidelines for identifying vulnerabilities in web applications. Notable features include a structured compilation of methodologies tailored for different attack vectors and documentation that serves as a practical resource for penetration testers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="bug-bounty-methodology"&gt;Bug-Bounty-Methodology&lt;/h1&gt;
&lt;p&gt;These are my checklists which I use during my bug bounty hunting.&lt;/p&gt;</description></item><item><title>BurpSuite-collections</title><link>https://rainmana.github.io/hackyfeed/tools/mr-xn-burpsuite-collections/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mr-xn-burpsuite-collections/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BurpSuite-collections is a repository containing various non-BApp Store plugins for Burp Suite, aimed at enhancing penetration testing capabilities. Notable features include SQL injection detection, automated SSRF vulnerability scanning, and the ability to manage variables within Burp, allowing security professionals to effectively discover and exploit vulnerabilities. The project serves primarily as a resource for learning and research related to Burp Suite plugins.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="burp-suite-collections"&gt;Burp-Suite-collections&lt;/h1&gt;
&lt;h4 id="burpsuite-相关收集项目插件主要是非bapp-store商店"&gt;BurpSuite 相关收集项目，插件主要是非BApp Store（商店）&lt;/h4&gt;
&lt;blockquote&gt;
&lt;p&gt;所有的汉化或者使用burpsuite都是在你配置好了Java环境的前提下！！！&lt;a href="./books/%E5%A6%82%E4%BD%95%E5%9C%A864%E4%BD%8DWindows%2010%E4%B8%8B%E5%AE%89%E8%A3%85java%E5%BC%80%E5%8F%91%E7%8E%AF%E5%A2%83.pdf"&gt;相关教程&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;最新版（202212之后）&lt;del&gt;激活参考这个&lt;a href="https://github.com/h3110w0r1d-y/BurpLoaderKeygen"&gt;项目&lt;/a&gt; 自己解决，本项目不提供&lt;/del&gt;&lt;/p&gt;</description></item><item><title>CS7038-Malware-Analysis</title><link>https://rainmana.github.io/hackyfeed/tools/ckane-cs7038-malware-analysis/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ckane-cs7038-malware-analysis/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CS7038-Malware-Analysis is a repository designed for educational purposes in the field of malware analysis, specifically for the University of Cincinnati&amp;rsquo;s course. It serves as a comprehensive resource for students, providing access to course materials and related multimedia content, including instructional videos on malware analysis techniques and methodologies.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="cs7038-malware-analysis"&gt;CS7038-Malware-Analysis&lt;/h1&gt;
&lt;p&gt;Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)&lt;/p&gt;
&lt;p&gt;Public URL: &lt;a href="https://class.malware.re/"&gt;https://class.malware.re/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;YouTube Videos: &lt;a href="https://www.youtube.com/channel/UC0qfXmyAbSsmnisGQn1fAJA"&gt;https://www.youtube.com/channel/UC0qfXmyAbSsmnisGQn1fAJA&lt;/a&gt;&lt;/p&gt;</description></item><item><title>CTF-notes</title><link>https://rainmana.github.io/hackyfeed/tools/shiva108-ctf-notes/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/shiva108-ctf-notes/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The CTF-notes repository provides a comprehensive collection of resources and structured notes aimed at aiding individuals in preparing for Capture The Flag (CTF) competitions and penetration testing exams, such as the OSCP. It includes detailed checklists, exploitation techniques for various platforms, vulnerability payloads, and methodologies for offensive security. Noteworthy features include organized sections for post-exploitation tactics, memory forensics, and specific vulnerabilities, alongside a dedicated cheat sheet repository for quick reference during assessments.&lt;/p&gt;</description></item><item><title>cve</title><link>https://rainmana.github.io/hackyfeed/tools/trickest-cve/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/trickest-cve/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The CVE PoC tool aggregates nearly every publicly available Proof-of-Concept (PoC) for Common Vulnerabilities and Exposures (CVEs), providing a comprehensive database of exploits for security professionals. It employs automated workflows to scrape and validate CVE details from various sources, including GitHub and HackerOne reports, while also allowing users to browse, search, and monitor PoCs for specific vulnerabilities. Noteworthy features include real-time updates, easy-to-read markdown documentation, and the ability to generate GitHub badges for affected software versions.&lt;/p&gt;</description></item><item><title>destroylist</title><link>https://rainmana.github.io/hackyfeed/tools/phishdestroy-destroylist/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/phishdestroy-destroylist/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Destroylist is a comprehensive phishing and scam domain blacklist that provides real-time threat intelligence to protect users globally. This tool maintains an extensive database of over 100,000 phishing domains and features active statistics on domain additions and removals, ensuring up-to-date protection against online threats. The repository supports community contributions, fostering collaborative efforts in enhancing online security.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="destroylist-phishing--scam-domain-blacklist"&gt;&lt;img src="https://raw.githubusercontent.com/Tarikul-Islam-Anik/Animated-Fluent-Emojis/master/Emojis/Activities/Performing%20Arts.png" alt="Performing Arts" width="28" height="28" /&gt; Destroylist: Phishing &amp;amp; Scam Domain Blacklist&lt;/h1&gt;
&lt;p&gt;&lt;img src="scripts/destroyolist_image.png" alt="Destroyolist Illustration"&gt;&lt;/p&gt;</description></item><item><title>exploitnotes</title><link>https://rainmana.github.io/hackyfeed/tools/hdks-bug-exploitnotes/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hdks-bug-exploitnotes/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Exploit Notes is a comprehensive resource platform designed for security research, focusing on hacking techniques and tools applicable to penetration testing, bug bounty programs, and Capture The Flag (CTF) challenges. It encompasses a wide array of topics including reconnaissance, various operating systems, web applications, databases, networks, and emerging technologies such as AI and blockchain. Users can leverage this repository for educational purposes, with the option to run it locally via a straightforward setup process.&lt;/p&gt;</description></item><item><title>GeoIntel</title><link>https://rainmana.github.io/hackyfeed/tools/atiilla-geointel/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/atiilla-geointel/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GeoIntel is a Python tool leveraging Google&amp;rsquo;s Gemini API for AI-powered geolocation analysis of images, allowing users to identify the likely location where photos were taken. It features both a command-line interface and an interactive web interface with drag-and-drop functionality, real-time analysis, and support for additional context and location guesses. Notable capabilities include generating Google Maps links, providing confidence levels for predictions, and exporting results in JSON format.&lt;/p&gt;</description></item><item><title>jok3r</title><link>https://rainmana.github.io/hackyfeed/tools/koutto-jok3r/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/koutto-jok3r/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Jok3r is a Python CLI application designed to assist penetration testers in executing automated network infrastructure and web security assessments. With over 50 integrated open-source tools, it streamlines vulnerability identification through context-aware checks, CVE lookups, and brute force attacks, all packaged within a Docker image for ease of use and customization. Notable features include automatic service fingerprinting, a comprehensive library of security checks for various network services, and automated post-authentication testing.&lt;/p&gt;</description></item><item><title>kubernetes-goat</title><link>https://rainmana.github.io/hackyfeed/tools/madhuakula-kubernetes-goat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/madhuakula-kubernetes-goat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Kubernetes Goat is an intentionally vulnerable Kubernetes cluster environment designed for the purpose of learning and practicing Kubernetes security. It provides various scenarios for security testing, including exploitation of sensitive keys, SSRF vulnerabilities, and container escapes, thereby enabling users to gain hands-on experience with real-world security challenges in Kubernetes. The tool requires administrative access to a Kubernetes cluster and facilitates setup using &lt;code&gt;kubectl&lt;/code&gt; and &lt;code&gt;helm&lt;/code&gt;, offering a structured learning path for security professionals.&lt;/p&gt;</description></item><item><title>MetaOSINT.github.io</title><link>https://rainmana.github.io/hackyfeed/tools/metaosint-metaosint.github.io/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/metaosint-metaosint.github.io/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; MetaOSINT is an open-source intelligence aggregation tool designed to assist OSINT practitioners in efficiently identifying and accessing relevant publicly available tools and resources. Its primary purpose is to streamline investigations by providing a curated list of top tools, significantly enhancing the speed and effectiveness of research and analysis. Notable features include an intuitive interface for surfacing resources and the ongoing community contribution model that allows users to submit additional tools.&lt;/p&gt;</description></item><item><title>ohshint.gitbook.io</title><link>https://rainmana.github.io/hackyfeed/tools/ohshint-ohshint.gitbook.io/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ohshint-ohshint.gitbook.io/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OH SHINT is an informational blog focused on open-source intelligence (OSINT) and related topics, including operational security, surveillance, and counter-surveillance techniques. The blog aims to document various resources, tools, and methods for conducting OSINT investigations while sharing insights from the author&amp;rsquo;s expertise as a licensed private investigator. Notable features include comprehensive write-ups, guides, and resources that cover a wide array of intelligence-related subjects, catering to both amateurs and professionals in the field.&lt;/p&gt;</description></item><item><title>OSINT-Cheat-sheet</title><link>https://rainmana.github.io/hackyfeed/tools/jieyab89-osint-cheat-sheet/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jieyab89-osint-cheat-sheet/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The OSINT Cheat Sheet is a comprehensive resource that aggregates various open-source intelligence (OSINT) tools, datasets, and tips for effective information gathering. It serves as an educational guide, emphasizing safe usage practices and the importance of risk management when utilizing both free and paid tools. Notably, it includes advice on using virtual environments, enhancing privacy measures, and strategies for engaging with OSINT resources responsibly.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="osint-cheat-sheet---list-osint-tools-github-badge"&gt;OSINT CHEAT SHEET - List OSINT Tools &lt;a href="https://github.com/Jieyab89"&gt;&lt;img src="https://img.shields.io/badge/-Jieyab89-black?style=flat&amp;amp;logo=github&amp;amp;logoColor=white&amp;amp;link=https://github.com/Jieyab89/" alt="Github Badge"&gt;&lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://github.com/user-attachments/assets/6f1fbfe1-11a4-4c1b-b5fd-669107197ca2" alt="image"&gt;&lt;/p&gt;</description></item><item><title>Penetration_Testing_POC</title><link>https://rainmana.github.io/hackyfeed/tools/mr-xn-penetration_testing_poc/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mr-xn-penetration_testing_poc/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Penetration_Testing_POC is a comprehensive collection of proof of concepts (POCs), scripts, tools, and articles related to penetration testing, intended to serve as a reference resource. It systematically categorizes vulnerabilities across various domains such as IoT, mobile devices, web applications, and privilege escalation methods, providing users with essential insights and practical exploitation techniques. Notable features include organized documentation and links to external resources, ensuring that users can easily navigate and leverage the provided information for security assessments.&lt;/p&gt;</description></item><item><title>rengine</title><link>https://rainmana.github.io/hackyfeed/tools/yogeshojha-rengine/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/yogeshojha-rengine/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; reNgine is a comprehensive web reconnaissance and vulnerability scanning tool aimed at security professionals, penetration testers, and bug bounty hunters. It features a highly configurable engine, data correlation capabilities, continuous monitoring, and a database-backed reconnaissance system, with the latest update including enhancements like a bounty hub integration, subdomain enumeration tools, and customizable reporting templates. This tool streamlines the reconnaissance process, enhancing efficiency and effectiveness in identifying vulnerabilities across web applications.&lt;/p&gt;</description></item><item><title>RootMyTV.github.io</title><link>https://rainmana.github.io/hackyfeed/tools/rootmytv-rootmytv.github.io/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rootmytv-rootmytv.github.io/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RootMyTV is an exploit tool designed for rooting or jailbreaking LG webOS smart TVs, primarily facilitating the installation of the webOS Homebrew Channel with elevated privileges. Notable features include its user-friendly interface and detailed instructions for exploiting unpatched webOS versions, enabling users to run third-party applications on their TVs. However, due to LG&amp;rsquo;s security updates, the tool is unlikely to work on models with firmware released after mid-2022.&lt;/p&gt;</description></item><item><title>SchemaCrawler</title><link>https://rainmana.github.io/hackyfeed/tools/schemacrawler-schemacrawler/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/schemacrawler-schemacrawler/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Free database schema discovery and comprehension tool&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Free database schema discovery and comprehension tool&lt;/p&gt;</description></item><item><title>schemaspy</title><link>https://rainmana.github.io/hackyfeed/tools/schemaspy-schemaspy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/schemaspy-schemaspy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SchemaSpy is a database metadata analysis tool designed for visualizing and understanding data models through HTML-based reports and entity-relationship diagrams. It supports over a dozen database types via JDBC drivers and can be executed as a standalone application or through Maven, making it versatile for database administrators and developers. Notable features include easy navigation of data schemas and the ability to generate comprehensive documentation of database structures.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://schemaspy.org/"&gt;&lt;img src="https://github.com/schemaspy/schemaspy/blob/master/docs/source/_static/schemaspy_logo.png" alt="Logotype"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Storm-Breaker</title><link>https://rainmana.github.io/hackyfeed/tools/ultrasecurity-storm-breaker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ultrasecurity-storm-breaker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Storm-Breaker is a versatile cybersecurity tool that enables unauthorized access to device information, including location, webcam, and microphone on smartphones, without requiring user permissions. Notable features include a revamped web user interface, the ability to operate on personal hosting environments, auto-download functionality for Ngrok, and comprehensive logging capabilities. This tool is primarily designed for penetration testing and social engineering exercises within controlled environments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;br&gt;
 &lt;a href="https://github.com/ultrasecurity/Storm-Breaker"&gt;&lt;img src=".imgs/1demo.png" alt="StormBreaker"&gt;&lt;/a&gt;
&lt;/h1&gt;
&lt;h4 align="center"&gt;A Tool With Attractive Capabilities. &lt;/h4&gt;
&lt;p align="center"&gt;
 &lt;a href="http://python.org"&gt;
 &lt;img src="https://img.shields.io/badge/python-v3-blue"&gt;
 &lt;/a&gt;
 &lt;a href="https://php.net"&gt;
 &lt;img src="https://img.shields.io/badge/php-7.4.4-green"
 alt="php"&gt;
 &lt;/a&gt;
 &lt;a href="https://en.wikipedia.org/wiki/Linux"&gt;
 &lt;img src="https://img.shields.io/badge/Platform-Linux-red"&gt;
 &lt;/a&gt;
&lt;/p&gt;</description></item><item><title>THC-Archive</title><link>https://rainmana.github.io/hackyfeed/tools/hackerschoice-thc-archive/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hackerschoice-thc-archive/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; THC-Archive is a repository that consolidates all releases from The Hacker&amp;rsquo;s Choice, a prominent security research group. This collection serves as a backup for their work, ensuring that projects are preserved despite the lack of a full web server. Notable active projects include THC-Hydra, THC-IPv6, and utilities aimed at various hacking and security tasks.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="thc-archive"&gt;THC-Archive&lt;/h1&gt;
&lt;p&gt;All releases of the security research group (a.k.a. hackers) The Hacker&amp;rsquo;s Choice&lt;/p&gt;</description></item><item><title>tlosint-live</title><link>https://rainmana.github.io/hackyfeed/tools/tracelabs-tlosint-live/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tracelabs-tlosint-live/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The tlosint-live repository provides a custom build configuration for a Kali Linux-based OSINT distribution tailored for Trace Labs. Its primary use case is to streamline the creation of a live OSINT environment, featuring a set of pre-configured tools and applications for data analysis, domain reconnaissance, and social media investigations. Notable features include an easily modifiable package list, integration of various OSINT tools, and the capability to generate a bootable ISO or OVA file for virtual environments.&lt;/p&gt;</description></item><item><title>WADComs.github.io</title><link>https://rainmana.github.io/hackyfeed/tools/wadcoms-wadcoms.github.io/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wadcoms-wadcoms.github.io/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WADComs is an interactive cheat sheet designed for offensive security professionals, offering a curated list of tools and their commands specifically for targeting Windows and Active Directory environments. Its primary use case is to aid security experts in executing effective penetration testing by providing quick access to essential commands. Notable features include its comprehensive tool listings and command syntaxes, all consolidated in a web-based format for ease of use.&lt;/p&gt;</description></item><item><title>Web-Fuzzing-Box</title><link>https://rainmana.github.io/hackyfeed/tools/gh0stkey-web-fuzzing-box/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gh0stkey-web-fuzzing-box/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Web-Fuzzing-Box is a tool designed for web application security testing, offering a diverse collection of dictionaries and payloads for conducting fuzzing attacks, including brute force, directory and file enumeration, and exploitation of web vulnerabilities. Notable features include a comprehensive suite of dictionaries tailored for specific vulnerabilities such as SQL injection, XSS, and authentication bypass, as well as case studies demonstrating the practical application of these resources in real-world scenarios. This tool is particularly valuable for penetration testers and security researchers seeking to enhance their web application assessments.&lt;/p&gt;</description></item></channel></rss>