<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Java on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/tags/java/</link><description>Recent content in Java on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/tags/java/feed.xml" rel="self" type="application/rss+xml"/><item><title>AndroRAT</title><link>https://rainmana.github.io/hackyfeed/tools/karma9874-androrat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/karma9874-androrat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AndroRAT is a remote access tool for Android devices that allows users to control and retrieve information from the device. Its primary use case includes monitoring and managing Android systems covertly, featuring capabilities such as persistent backdoor access, audio and video recording, and obtaining device location and SIM details. Notably, AndroRAT consists of a client/server architecture implemented in Java for Android and Python for the server side, enabling it to run on a wide range of Android versions from 4.1 to 9.0, with additional functionalities on Android 10.&lt;/p&gt;</description></item><item><title>AndroRAT</title><link>https://rainmana.github.io/hackyfeed/tools/the404hacking-androrat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/the404hacking-androrat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AndroRAT is a Remote Administration Tool designed for Android devices, enabling the remote control and data retrieval from the Android system. Key functionalities include accessing contacts, call logs, messages, GPS location, and multimedia capabilities like capturing photos and streaming audio and video. The tool operates as a background service triggered by SMS or calls, providing a comprehensive suite for remote monitoring and management.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="androrat"&gt;&lt;a href="https://github.com/The404Hacking/AndroRAT"&gt;AndroRAT&lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;Remote Administration Tool for Android&lt;/p&gt;</description></item><item><title>anti-emulator</title><link>https://rainmana.github.io/hackyfeed/tools/strazzere-anti-emulator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/strazzere-anti-emulator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The anti-emulator tool is designed to detect emulated Android environments, leveraging various detection techniques inspired by both malware behavior and innovative methodologies. It serves primarily for educational and research purposes in the context of malware analysis and reversing, offering a collection of detection mechanisms while promoting responsible use. The project includes both source code and supportive materials, such as presentation slides from its initial unveiling.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="anti-emulator"&gt;anti-emulator&lt;/h1&gt;
&lt;p&gt;Android Anti-Emulator, originally presented at HitCon 2013: &amp;ldquo;Dex Education 201: Anti-Emulation&amp;rdquo;&lt;/p&gt;</description></item><item><title>BinAbsInspector</title><link>https://rainmana.github.io/hackyfeed/tools/keensecuritylab-binabsinspector/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/keensecuritylab-binabsinspector/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BinAbsInspector is a static analysis tool designed for automated reverse engineering and vulnerability scanning of binary files, utilizing abstract interpretation and integrating with Ghidra. It supports multiple architectures including x86, x64, armv7, and aarch64, and can operate in headless mode, GUI mode, or within a Docker environment. Notable features include customizable analysis parameters, Z3 integration for constraint solving, and the ability to output results in JSON format.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="what-is--binabsinspector"&gt;What is BinAbsInspector?&lt;/h1&gt;
&lt;p&gt;BinAbsInspector (Binary Abstract Inspector) is a static analyzer for automated reverse engineering and scanning vulnerabilities in binaries, which is a long-term research project incubated at &lt;a href="https://keenlab.tencent.com/"&gt;Keenlab&lt;/a&gt;. It is based on abstract interpretation with the support from Ghidra. It works on Ghidra&amp;rsquo;s Pcode instead of assembly. Currently it supports binaries on x86,x64, armv7 and aarch64.&lt;/p&gt;</description></item><item><title>BurpBounty</title><link>https://rainmana.github.io/hackyfeed/tools/wagiro-burpbounty/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wagiro-burpbounty/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Burp Bounty is a Burp Suite extension designed to enhance both active and passive scanning capabilities by allowing users to create personalized scanning rules through an intuitive graphical interface. The tool offers advanced pattern search and payload improvement features to build custom issue profiles, catering to automated and manual penetration testing workflows. A notable aspect is the availability of profiles shared by the community, which further augments its functionality.&lt;/p&gt;</description></item><item><title>BurpCrypto</title><link>https://rainmana.github.io/hackyfeed/tools/whwlsfb-burpcrypto/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/whwlsfb-burpcrypto/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BurpCrypto is a collection of encryption plugins for Burp Suite, supporting multiple encryption algorithms including AES, RSA, and DES, as well as the execution of JavaScript code for encryption tasks. Its primary use case is to enhance the capabilities of security professionals by allowing them to integrate cryptographic functions directly into their testing workflows. Notable features include a user-friendly interface for key management and seamless integration with Burp Suite&amp;rsquo;s payload processing system.&lt;/p&gt;</description></item><item><title>burpgpt</title><link>https://rainmana.github.io/hackyfeed/tools/aress31-burpgpt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/aress31-burpgpt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BurpGPT is an advanced security extension that integrates with Burp Suite to analyze web traffic using AI-driven techniques, specifically utilizing OpenAI&amp;rsquo;s models to uncover security vulnerabilities that conventional scanners may overlook. Its notable features include customizable prompts for tailored analysis, automated report generation summarizing potential security issues, and granular control over the analysis parameters. This tool streamlines the vulnerability assessment process, improving the efficiency and accuracy of security professionals while handling the complexities of web application security.&lt;/p&gt;</description></item><item><title>CVE-2021-44228-PoC-log4j-bypass-words</title><link>https://rainmana.github.io/hackyfeed/tools/puliczek-cve-2021-44228-poc-log4j-bypass-words/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/puliczek-cve-2021-44228-poc-log4j-bypass-words/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The CVE-2021-44228-PoC-log4j-bypass-words tool demonstrates various methods to exploit the Apache Log4j vulnerability, specifically focusing on bypassing WAF protections and patched versions. It provides multiple techniques, including the use of system environment variables, case manipulation, and invalid Unicode to obfuscate the exploit strings. Notable features include dynamic manipulation of Java naming lookups and the ability to use non-existent lookups for stealthy exploitation attempts.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center" &gt;🤝 Show your support - give a ⭐️ if you liked the content | &lt;a target="_blank" href='https://twitter.com/intent/tweet?url=https%3A%2F%2Fgithub.com%2FPuliczek%2FCVE-2021-44228-PoC-log4j-bypass-words&amp;via=pulik_io&amp;text=%20LOG4J%20Java%20exploit%20-%20WAF%20and%20patches%20bypass%20tricks'&gt;SHARE on Twitter&lt;/a&gt;
| Follow me on
 &lt;a target="_blank" href='https://twitter.com/pulik_io'&gt;&lt;img src='https://img.shields.io/badge/Twitter-%231DA1F2.svg?&amp;style=flat&amp;logo=twitter&amp;logoColor=white'/&gt;&lt;/a&gt;
 &lt;a target="_blank" href='https://www.youtube.com/channel/UCaAdOBH2hnqLvEri1M7eg5Q'&gt;&lt;img src='https://img.shields.io/badge/YouTube-%23FF0000.svg?&amp;style=flat&amp;logo=youtube&amp;logoColor=white'/&gt;&lt;/a&gt;
&lt;/div&gt;
&lt;hr&gt;
&lt;h1 id="---log4j-java-exploit---waf-and-patches-bypass-tricks"&gt;&lt;strong&gt;🐱‍💻 ✂️ 🤬 LOG4J Java exploit - WAF and patches bypass tricks&lt;/strong&gt;&lt;/h1&gt;
&lt;h1 id="-description"&gt;📝 Description&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;CVE-2021-44228&lt;/strong&gt; works on:&lt;/p&gt;</description></item><item><title>Damn-Vulnerable-Bank</title><link>https://rainmana.github.io/hackyfeed/tools/rewanthtammana-damn-vulnerable-bank/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rewanthtammana-damn-vulnerable-bank/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Damn Vulnerable Bank is an intentionally vulnerable Android application designed to educate users on security flaws in banking apps. Its primary use case is for security professionals and developers to explore various vulnerabilities, such as root detection and insecure storage, by interacting with features like user registration, fund transfers, and transaction history. Notable features include fingerprint and PIN verification for transactions, as well as a gamified approach to discovering hidden vulnerabilities within the app.&lt;/p&gt;</description></item><item><title>dpt-shell</title><link>https://rainmana.github.io/hackyfeed/tools/luoyesiqiu-dpt-shell/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/luoyesiqiu-dpt-shell/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; dpt-shell is an Android Dex protection tool designed to hollow out method implementations within DEX files, facilitating runtime reconstruction for enhanced protection of Android applications. Primary use cases include securing APKs and AABs against reverse engineering, with notable features such as customizable protection configurations, exclusion of specific ABIs, and the ability to dump DEX code items for analysis.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="dpt-shell"&gt;dpt-shell&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/luoyesiqiu/dpt-shell/blob/main/LICENSE"&gt;&lt;img src="https://img.shields.io/github/license/luoyesiqiu/dpt-shell" alt=""&gt;&lt;/a&gt; &lt;a href="https://github.com/luoyesiqiu/dpt-shell/releases/latest"&gt;&lt;img src="https://img.shields.io/github/downloads/luoyesiqiu/dpt-shell/total?color=blue" alt=""&gt;&lt;/a&gt; &lt;a href="https://github.com/luoyesiqiu/dpt-shell/issues"&gt;&lt;img src="https://img.shields.io/github/issues-raw/luoyesiqiu/dpt-shell?color=red" alt=""&gt;&lt;/a&gt; &lt;img src="https://img.shields.io/badge/Android-5.0%2B-brightgreen" alt=""&gt;&lt;/p&gt;
&lt;p&gt;English | &lt;a href="./README.zh-CN.md"&gt;简体中文&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;dpt-shell is an Android Dex protection shell that hollows out Dex method implementations and reconstructs them at runtime.&lt;/p&gt;</description></item><item><title>fernflower</title><link>https://rainmana.github.io/hackyfeed/tools/jetbrains-fernflower/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jetbrains-fernflower/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Fernflower is an analytical decompiler for Java, capable of converting compiled Java class files back into human-readable source code. It is integrated within IntelliJ IDEA for debugging and navigation, and can also be executed from the command line to decompile class files, ZIPs, and JARs, offering numerous customizable command-line options to fine-tune the decompilation process. Notable features include support for decompiling inner classes, handling generic signatures, and options for renaming identifiers based on debugging information.&lt;/p&gt;</description></item><item><title>fofa_viewer</title><link>https://rainmana.github.io/hackyfeed/tools/wgpsec-fofa_viewer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wgpsec-fofa_viewer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Fofa Viewer is a user-friendly FOFA client developed in JavaFX, designed for cybersecurity professionals to efficiently search for vulnerabilities on target websites using the FOFA search engine. Key features include multi-tab query result display, Excel export capabilities, intelligent input suggestions, and advanced functionalities such as certificate conversion and exclusion of honeypots for premium members. This tool streamlines the information gathering process for penetration testers with its robust API integration and customizable configurations.&lt;/p&gt;</description></item><item><title>GDA-android-reversing-Tool</title><link>https://rainmana.github.io/hackyfeed/tools/charles2gan-gda-android-reversing-tool/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/charles2gan-gda-android-reversing-tool/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GDA (GJoy Dex Analyzer) is a powerful Dalvik bytecode decompiler designed for fast analysis of APK, DEX, ODEX, OAT, JAR, CLASS, and AAR files, with minimal memory and disk consumption. It features advanced capabilities including malicious behavior detection, vulnerability scanning, path solving, and deobfuscation, as well as various utilities for interactive operation and assisted analysis. GDA operates natively without requiring a Java VM, making it suitable for use on various Windows systems and virtual machines.&lt;/p&gt;</description></item><item><title>jadx-ai-mcp</title><link>https://rainmana.github.io/hackyfeed/tools/zinja-coder-jadx-ai-mcp/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zinja-coder-jadx-ai-mcp/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; JADX-AI-MCP is a fully automated server and plugin designed for analyzing Android APK files via large language models (LLMs) such as Claude, enabling efficient vulnerability discovery, APK analysis, and reverse engineering. Key features include seamless MCC communication and integration with powerful LLMs to enhance static analysis and security assessments within the Android development ecosystem.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
&lt;h1 id="jadx-ai-mcp-part-of-zin-mcp-suite"&gt;JADX-AI-MCP (Part of Zin MCP Suite)&lt;/h1&gt;
&lt;p&gt;⚡ Fully automated MCP server + JADX plugin built to communicate with LLM through MCP to analyze Android APKs using LLMs like Claude — uncover vulnerabilities, analyze APK, and reverse engineer effortlessly.&lt;/p&gt;</description></item><item><title>JByteMod-Beta</title><link>https://rainmana.github.io/hackyfeed/tools/loerting-jbytemod-beta/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/loerting-jbytemod-beta/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; JByteMod-Beta is a multifunctional bytecode editor designed for manipulating Java bytecode with features such as syntax highlighting, live decompiling, and method graphing. Its primary use case is for developers seeking to analyze and edit Java .jar or .class files efficiently. Notable features include a plugin architecture for extending functionality, integration with popular decompilers like Procyon and Fernflower, and a user-friendly command-line interface.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="jbytemod-beta"&gt;JByteMod-Beta&lt;/h1&gt;
&lt;p&gt;JByteMod is a multifunctional bytecode editor with syntax highlighting and live decompiling and method graphing.
The successor of JByteMod: &lt;a href="https://github.com/GraxCode/Cafebabe"&gt;https://github.com/GraxCode/Cafebabe&lt;/a&gt;&lt;/p&gt;</description></item><item><title>JNDI-Injection-Exploit-Plus</title><link>https://rainmana.github.io/hackyfeed/tools/cckuailong-jndi-injection-exploit-plus/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cckuailong-jndi-injection-exploit-plus/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; JNDI-Injection-Exploit-Plus is a comprehensive tool designed for generating operational JNDI links, facilitating background services with RMI, LDAP, and HTTP servers to test vulnerabilities effectively. It enhances the functionality of standard JNDI exploit tools by offering additional remote and local reference gadgets, support for multiple JDK versions, and the capability to create base64 and hex payloads, making it a robust resource for security testing. With over 75 deserialization gadgets included, it provides a diverse set of options for vulnerability assessments.&lt;/p&gt;</description></item><item><title>jsql-injection</title><link>https://rainmana.github.io/hackyfeed/tools/ron190-jsql-injection/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ron190-jsql-injection/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; jSQL Injection is a lightweight, open-source tool designed for identifying database information from servers, optimized for penetration testing. It is cross-platform, supporting Windows, Linux, and Mac with Java compatibility from versions 21 to 25, and is integrated into various security-focused distributions such as Kali Linux. Notable features include a user-friendly interface, support for multiple database engines, and comprehensive testing functionalities, making it suitable for both novice and experienced security analysts.&lt;/p&gt;</description></item><item><title>Nope-Proxy</title><link>https://rainmana.github.io/hackyfeed/tools/summitt-nope-proxy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/summitt-nope-proxy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; NoPE Proxy is a Burp Suite extension that facilitates the interception and analysis of TCP and UDP traffic, including non-HTTP protocols. Its notable features include a configurable DNS server that routes traffic to Burp, support for multiple listening ports for man-in-the-middle (MiTM) connections, and the ability to define match and replace rules for traffic manipulation. This tool is especially useful for security testing of mobile applications and thick clients, allowing seamless traffic analysis and modification.&lt;/p&gt;</description></item><item><title>OpenPods</title><link>https://rainmana.github.io/hackyfeed/tools/adolfintel-openpods/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/adolfintel-openpods/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OpenPods is a free and open-source Android application designed for monitoring Apple AirPods connectivity and status. It features real-time notifications for connected AirPods, privacy-respecting functionality, and support for a dark theme, while being compatible with multiple generations of AirPods and Beats headphones. The tool explicitly violates Google Play policies, hence it is not intended for distribution on that platform.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;&lt;img src="fastlane/metadata/android/en-US/images/icon.png" width="150"&gt;&lt;/p&gt; 
&lt;h1 align="center"&gt;&lt;b&gt;OpenPods&lt;/b&gt;&lt;/h1&gt;
&lt;h4 align="center"&gt;The Free and Open Source app for monitoring your AirPods on Android&lt;/h4&gt;
&lt;p align="center"&gt;
	&lt;a href="https://github.com/adolfintel/OpenPods/releases"&gt;
		&lt;img src="https://img.shields.io/github/release/adolfintel/OpenPods.svg?color=blueviolet" alt="GitHub release"&gt;
	&lt;/a&gt;
	&lt;a href="https://www.gnu.org/licenses/gpl-3.0"&gt;
		&lt;img src="https://img.shields.io/badge/License-GPL%20v3-blue.svg" alt="License: GPLv3"&gt;
	&lt;/a&gt;
	&lt;img alt="Minimum SDK" src="https://img.shields.io/badge/API-26%2B-green"&gt;
&lt;/p&gt;</description></item><item><title>Recaf</title><link>https://rainmana.github.io/hackyfeed/tools/col-e-recaf/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/col-e-recaf/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Recaf is a modern Java bytecode editor designed to simplify the editing and manipulation of Java and Android bytecode by abstracting complex details. Key features include a user-friendly interface, support for multiple decompilers, built-in bytecode compiling and assembling, advanced search capabilities, and tools for code deobfuscation. Additionally, it allows users to script and extend functionality through plugins, and can operate as a command line application for automated processes.&lt;/p&gt;</description></item><item><title>remote-method-guesser</title><link>https://rainmana.github.io/hackyfeed/tools/qtc-de-remote-method-guesser/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/qtc-de-remote-method-guesser/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &lt;em&gt;remote-method-guesser&lt;/em&gt; (rmg) is a Java RMI vulnerability scanner designed to identify and verify common security vulnerabilities on Java RMI endpoints. It features practical examples, including servers that facilitate testing for standard RMI services, SSRF attacks, and Spring Remoting integration, making it a valuable tool for penetration testers and security researchers. The tool&amp;rsquo;s compatibility with Docker allows for efficient setup and execution of security assessments in isolated environments.&lt;/p&gt;</description></item><item><title>simplify</title><link>https://rainmana.github.io/hackyfeed/tools/calebfenton-simplify/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/calebfenton-simplify/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Simplify is a generic Android deobfuscator that virtually executes obfuscated apps to enhance code readability while preserving their functional behavior. It operates through a combination of smalivm, which simulates Dalvik method execution, and simplify, which optimizes execution graphs by applying techniques such as constant propagation and dead code removal. Notable features include the ability to handle various obfuscation patterns without renaming methods or classes, and a customizable execution environment to manage optimization parameters.&lt;/p&gt;</description></item><item><title>skidfuscator-java-obfuscator</title><link>https://rainmana.github.io/hackyfeed/tools/skidfuscatordev-skidfuscator-java-obfuscator/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/skidfuscatordev-skidfuscator-java-obfuscator/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Skidfuscator is a production-grade Java obfuscation tool that employs SSA form to enhance and obscure Java bytecode flow while maintaining execution efficiency. Its primary use case is to protect applications from reverse engineering by providing advanced obfuscation techniques, automatic dependency downloading, and an easy-to-configure command-line interface. Notable features include smart recovery, flow obfuscation, and out-of-the-box optimization.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://github.com/user-attachments/assets/65046709-27c3-417f-8053-3a6f8d5ea29d" alt="header"&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p align="center"&gt;
 &lt;h3 align="center"&gt;
 🗣️ Discord: https://discord.gg/QJC9g8fBU9 📚 Wiki: https://skidfuscator.dev/docs/
 &lt;/h3&gt;
 &lt;h3 align="center"&gt;
 🏢 Enterprise/Custom Version: https://skidfuscator.dev/pricing
 &lt;/h3&gt;
&lt;/p&gt;</description></item><item><title>tabby</title><link>https://rainmana.github.io/hackyfeed/tools/tabby-sec-tabby/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/tabby-sec-tabby/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; TABBY is a static code analysis tool designed for Java that rapidly identifies various types of vulnerabilities within Java applications. It utilizes the Soot framework to transform Java bytecode (JAR/WAR/CLASS files) into a code property graph (CPG), which is then stored in a Neo4j graph database, allowing for complex taint analysis and vulnerability chain detection through simple Cypher queries. Notable features include the ability to discover deserialization attack chains and common web vulnerabilities, significantly enhancing the efficiency of code audits by reducing manual search efforts.&lt;/p&gt;</description></item><item><title>xhunter</title><link>https://rainmana.github.io/hackyfeed/tools/anirudhmalik-xhunter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/anirudhmalik-xhunter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; XHUNTER is an advanced Android Remote Access Tool (RAT) designed for penetration testing and ethical hacking purposes. It simplifies the connection process between the attacker and victim by eliminating the need for complex port forwarding, offering a user-friendly interface for controlling a victim&amp;rsquo;s Android device. Notable features include the capability to build and bind payloads to legitimate applications and an intuitive setup process for immediate usability.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div id="top"&gt;&lt;/div&gt;
&lt;!-- PROJECT SHIELDS --&gt;
&lt;p&gt;&lt;a href="https://github.com/anirudhmalik/xhunter/graphs/contributors"&gt;&lt;img src="https://img.shields.io/github/contributors/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Contributors"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/network/members"&gt;&lt;img src="https://img.shields.io/github/forks/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Forks"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/stargazers"&gt;&lt;img src="https://img.shields.io/github/stars/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Stargazers"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/issues"&gt;&lt;img src="https://img.shields.io/github/issues/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Issues"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/blob/master/LICENSE.md"&gt;&lt;img src="https://img.shields.io/github/license/anirudhmalik/xhunter.svg?style=for-the-badge" alt="MIT License"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/commits/master"&gt;&lt;img src="https://img.shields.io/github/last-commit/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Last Commit"&gt;&lt;/a&gt;
&lt;a href="https://github.com/anirudhmalik/xhunter/releases"&gt;&lt;img src="https://img.shields.io/github/repo-size/anirudhmalik/xhunter.svg?style=for-the-badge" alt="Repo Size"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>ysoserial</title><link>https://rainmana.github.io/hackyfeed/tools/frohoff-ysoserial/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/frohoff-ysoserial/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ysoserial is a proof-of-concept tool designed to generate payloads for exploiting vulnerabilities related to unsafe Java object deserialization. It includes a collection of property-oriented programming &amp;ldquo;gadget chains&amp;rdquo; for various Java libraries, allowing users to execute arbitrary commands on an application host when deserialization occurs under vulnerable conditions. Notable features include support for multiple payload types and compatibility with various Java libraries, making it a versatile tool for security researchers focusing on Java application vulnerabilities.&lt;/p&gt;</description></item></channel></rss>