<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Javascript on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/tags/javascript/</link><description>Recent content in Javascript on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/tags/javascript/feed.xml" rel="self" type="application/rss+xml"/><item><title>adbwebkit</title><link>https://rainmana.github.io/hackyfeed/tools/jxroot-adbwebkit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/jxroot-adbwebkit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ADB WebKit is a browser-based tool designed for managing Android devices via ADB (Android Debug Bridge) with an intuitive user interface. Its primary use case includes functionalities like application management (installing, uninstalling, granting permissions), shell access, screen capture, and device control commands, making it a comprehensive solution for developers and testers. Notable features include support for live application management, real-time screen interactions, and various device control options, all accessible through a USB connection or IP address.&lt;/p&gt;</description></item><item><title>aleph</title><link>https://rainmana.github.io/hackyfeed/tools/alephdata-aleph/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/alephdata-aleph/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Aleph is an open-source tool designed for indexing and searching large volumes of documents and structured data, primarily aimed at facilitating investigative reporting. Its notable features include the ability to cross-reference entities against various watchlists, enhancing the efficiency of data analysis for reporters and organizations engaged in investigative work. As of December 2025, the project is transitioning to a new platform, Aleph Pro, while transitioning support for the current version will continue until that date.&lt;/p&gt;</description></item><item><title>appmon</title><link>https://rainmana.github.io/hackyfeed/tools/dpnishant-appmon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dpnishant-appmon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AppMon is an automated framework designed for monitoring and tampering system API calls in native macOS, iOS, and Android applications, leveraging the capabilities of Frida. Its primary use case includes intercepting API calls to analyze app behavior and manipulating these calls to alter the original application functionalities. Notable features encompass an API sniffer, an intruder for data manipulation, an Android tracer for analyzing APKs, and tools for creating inspectable IPAs and APKs on non-jailbroken and non-rooted devices respectively.&lt;/p&gt;</description></item><item><title>archerysec</title><link>https://rainmana.github.io/hackyfeed/tools/archerysec-archerysec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/archerysec-archerysec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ArcherySec is an open-source vulnerability assessment and management tool designed to integrate with CI/CD pipelines, allowing for automated security testing based on scan results. It utilizes popular open-source scanning tools to perform comprehensive web and network vulnerability assessments, while also providing features for vulnerability prioritization, management, and collaboration of scan data. Key functionalities include integration with REST APIs for developers, authenticated web scanning, and support for various third-party tools like OpenVAS and OWASP ZAP.&lt;/p&gt;</description></item><item><title>Baileys</title><link>https://rainmana.github.io/hackyfeed/tools/whiskeysockets-baileys/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/whiskeysockets-baileys/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Baileys is a WebSockets-based TypeScript library designed for direct interaction with the WhatsApp Web API, eliminating the need for Selenium or any browser, thus optimizing memory usage. It supports both the multi-device and web versions of WhatsApp, allowing developers to efficiently implement messaging functionalities. Notable features include a simplified interface for interaction and removal of browser dependencies, reducing resource overhead.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align='center'&gt;&lt;img alt="Baileys logo" src="https://raw.githubusercontent.com/WhiskeySockets/Baileys/refs/heads/master/Media/logo.png" height="75"/&gt;&lt;/h1&gt;
&lt;div align='center'&gt;Baileys is a WebSockets-based TypeScript library for interacting with the WhatsApp Web API.&lt;/div&gt;
&lt;blockquote&gt;
&lt;p&gt;[!CAUTION]
NOTICE OF BREAKING CHANGE.&lt;/p&gt;</description></item><item><title>CaptfEncoder</title><link>https://rainmana.github.io/hackyfeed/tools/guyoung-captfencoder/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/guyoung-captfencoder/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CaptfEncoder is an open-source, cross-platform network security tool suite designed for code conversion, cryptography, and a variety of online query tools. It features a wide range of encoding methods, classical ciphers, and modern cryptographic algorithms, enabling users to perform tasks such as data encoding, encryption, and security analysis efficiently. The tool is built in Rust, ensuring enhanced performance and supports a variety of operating systems including Windows, Linux, and macOS.&lt;/p&gt;</description></item><item><title>Crucix</title><link>https://rainmana.github.io/hackyfeed/tools/calesthio-crucix/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/calesthio-crucix/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Crucix is an open-source intelligence tool that aggregates real-time data from 27 diverse sources—including satellite fire detection, flight tracking, and economic indicators—into a single, self-hosted dashboard updated every 15 minutes. Its primary use case is to provide researchers, journalists, and analysts with accessible, cross-correlated insights without relying on cloud services or subscriptions. Notable features include integration with LLMs for two-way interaction, customizable alerts via Telegram and Discord, and a user-friendly interface that simplifies monitoring complex global events.&lt;/p&gt;</description></item><item><title>debundle</title><link>https://rainmana.github.io/hackyfeed/tools/1egoman-debundle/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/1egoman-debundle/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Debundle is a tool designed to unpack JavaScript bundles generated by Webpack and Browserify, facilitating reverse engineering and analysis by converting minified code back into a more readable file structure. Notably, it allows users to specify configuration options for various bundling types and outputs organized directories containing the original modules, though it does not guarantee a lossless recovery of the original source code. The project is no longer maintained, and users are advised to exercise caution as it may not perform reliably on all real-world bundles.&lt;/p&gt;</description></item><item><title>dembrandt</title><link>https://rainmana.github.io/hackyfeed/tools/dembrandt-dembrandt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dembrandt-dembrandt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dembrandt is a command-line tool designed to extract design systems from any website into structured design tokens, including elements such as colors, typography, and components. Its notable features include the ability to generate a brand guide PDF, output data in W3C Design Tokens format, and support for various browser configurations to bypass bot protection on target sites. The tool is easily installed via npm and offers a range of options for customization and output format.&lt;/p&gt;</description></item><item><title>dexcalibur</title><link>https://rainmana.github.io/hackyfeed/tools/frenchyeti-dexcalibur/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/frenchyeti-dexcalibur/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dexcalibur is an advanced Android reverse engineering platform that focuses on automating dynamic instrumentation for improved analysis. Its notable features include the ability to decompile and disassemble intercepted bytecode at runtime, manage multiple hooks, and perform static analysis with its built-in engine capable of executing smali code. This tool is designed to streamline the tedious tasks associated with dynamic analysis, making it essential for security researchers and developers.&lt;/p&gt;</description></item><item><title>domloggerpp</title><link>https://rainmana.github.io/hackyfeed/tools/kevin-mizu-domloggerpp/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/kevin-mizu-domloggerpp/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DOMLoggerpp is a browser extension designed for monitoring, intercepting, and debugging JavaScript sinks through customizable configurations. It features regex-based domain management, flexible hooking options, on-demand debugging breakpoints, a dynamic notification system, and an integrated Devtools log panel for enhanced log management and filtering. This tool is especially useful for developers and security professionals looking to analyze and debug JavaScript execution flows within web applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="./.github/banner.png" width="80%"&gt;&lt;br&gt;
 A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.
 &lt;br&gt;
 &lt;img alt="GitHub release (latest by date)" src="https://img.shields.io/github/v/release/kevin-mizu/DOMLoggerpp"&gt;
 &lt;a href="https://twitter.com/intent/follow?screen_name=kevin_mizu" title="Follow"&gt;&lt;img src="https://img.shields.io/twitter/follow/podalirius_?label=kevin_mizu&amp;style=social"&gt;&lt;/a&gt;
 &lt;br&gt;
&lt;/p&gt;</description></item><item><title>dotenv</title><link>https://rainmana.github.io/hackyfeed/tools/motdotla-dotenv/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/motdotla-dotenv/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dotenv is a lightweight Node.js module that simplifies the management of environment variables by loading them from a &lt;code&gt;.env&lt;/code&gt; file into &lt;code&gt;process.env&lt;/code&gt;. Its primary use case is to separate application configuration from code, following best practices as outlined in The Twelve-Factor App methodology. Notable features include support for multiline values, custom path configuration, and the ability to preload the module without explicit imports in application code.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="dotenv-npm-version-downloads"&gt;dotenv &lt;a href="https://www.npmjs.com/package/dotenv"&gt;&lt;img src="https://img.shields.io/npm/v/dotenv.svg?style=flat-square" alt="NPM version"&gt;&lt;/a&gt; &lt;a href="https://www.npmjs.com/package/dotenv"&gt;&lt;img src="https://img.shields.io/npm/dw/dotenv" alt="downloads"&gt;&lt;/a&gt;&lt;/h1&gt;
&lt;img src="https://raw.githubusercontent.com/motdotla/dotenv/master/dotenv.svg" alt="dotenv" align="right" width="200" /&gt;
&lt;p&gt;Dotenv is a zero-dependency module that loads environment variables from a &lt;code&gt;.env&lt;/code&gt; file into &lt;a href="https://nodejs.org/docs/latest/api/process.html#process_process_env"&gt;&lt;code&gt;process.env&lt;/code&gt;&lt;/a&gt;. Storing configuration in the environment separate from code is based on &lt;a href="https://12factor.net/config"&gt;The Twelve-Factor App&lt;/a&gt; methodology.&lt;/p&gt;</description></item><item><title>dotenvx</title><link>https://rainmana.github.io/hackyfeed/tools/dotenvx-dotenvx/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dotenvx-dotenvx/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dotenvx is a secure dotenv tool that allows developers to manage environment variables across multiple platforms and programming languages. Its primary use case is to enhance the safety and flexibility of environment variable handling by providing support for encrypted environment files and easy integration into existing applications. Notable features include cross-platform compatibility, multi-environment management, and straightforward installation options via various package managers and direct execution methods.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://dotenvx.com"&gt;&lt;img src="https://dotenvx.com/banner.png" alt="dotenvx"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>ethereum-lists</title><link>https://rainmana.github.io/hackyfeed/tools/myetherwallet-ethereum-lists/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/myetherwallet-ethereum-lists/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ethereum-lists is a collaborative repository that maintains and updates lists of malicious URLs, fake token addresses, Ethereum addresses, and contract details, facilitating community contributions through pull requests. Its primary use case is to serve as a resource for users to identify and avoid phishing attempts and fraudulent tokens within the Ethereum ecosystem. Notable features include an easily accessible structure for submitting changes and clear guidelines for contributions, promoting community involvement in enhancing security awareness.&lt;/p&gt;</description></item><item><title>frida-ios-dump</title><link>https://rainmana.github.io/hackyfeed/tools/alonemonkey-frida-ios-dump/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/alonemonkey-frida-ios-dump/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; frida-ios-dump is a tool designed for extracting decrypted IPA files from jailbroken iOS devices. The primary use case involves leveraging Frida to automate the process of dumping application binaries, making it particularly useful for security researchers and developers analyzing iOS applications. Notable features include support for both Python 2.x and 3.x, as well as a straightforward command-line interface for initiating the dump process with either the display name or bundle identifier of the target app.&lt;/p&gt;</description></item><item><title>frida-ios-hook</title><link>https://rainmana.github.io/hackyfeed/tools/noobpk-frida-ios-hook/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/noobpk-frida-ios-hook/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Frida iOS Hook is a Python-based tool designed for dynamic analysis and function hooking of iOS applications through Frida. Its primary use case involves tracing classes and functions, modifying method return values, and providing a suite of commands for process manipulation, memory dumping, and API interception. Notable features include support for both spawn and attach modes, an interactive CLI, and extensive options for script execution and device management.&lt;/p&gt;</description></item><item><title>frida-scripts</title><link>https://rainmana.github.io/hackyfeed/tools/0xdea-frida-scripts/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xdea-frida-scripts/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The frida-scripts repository provides a collection of instrumentation scripts designed for reverse engineering applications on iOS, Android, and Linux platforms using the Frida tool. Key features include full-featured tracers and enumerators for Objective-C, Java, and Linux binaries, enabling deep analysis and manipulation of app behaviors. The scripts may require customization and are suitable for advanced users involved in mobile and software security research.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="frida-scripts"&gt;frida-scripts&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/0xdea/frida-scripts"&gt;&lt;img src="https://img.shields.io/github/stars/0xdea/frida-scripts.svg?style=flat&amp;amp;color=yellow" alt=""&gt;&lt;/a&gt;
&lt;a href="https://github.com/0xdea/frida-scripts"&gt;&lt;img src="https://img.shields.io/github/forks/0xdea/frida-scripts.svg?style=flat&amp;amp;color=green" alt=""&gt;&lt;/a&gt;
&lt;a href="https://github.com/0xdea/frida-scripts"&gt;&lt;img src="https://img.shields.io/github/watchers/0xdea/frida-scripts.svg?style=flat&amp;amp;color=red" alt=""&gt;&lt;/a&gt;
&lt;a href="https://www.frida.re/"&gt;&lt;img src="https://img.shields.io/badge/frida-17.3.2-violet" alt=""&gt;&lt;/a&gt;
&lt;a href="https://twitter.com/0xdea"&gt;&lt;img src="https://img.shields.io/badge/twitter-%400xdea-blue.svg" alt=""&gt;&lt;/a&gt;
&lt;a href="https://infosec.exchange/@raptor"&gt;&lt;img src="https://img.shields.io/badge/mastodon-%40raptor-purple.svg" alt=""&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps and more.&lt;/p&gt;</description></item><item><title>HackVault</title><link>https://rainmana.github.io/hackyfeed/tools/0xsobky-hackvault/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0xsobky-hackvault/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HackVault is a container repository designed for both defensive and offensive hacking tools. Its primary use case is to centralize and share various hacking utilities, which are intended to be continuously updated with new content over time. Notable features include a structured Wiki section for detailed information and ongoing additions to its arsenal of tools.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="hackvault"&gt;HackVault&lt;/h1&gt;
&lt;p&gt;This is a container repository for my defensive/offensive hacks. Go check the &lt;a href="https://github.com/0xsobky/HackVault/wiki"&gt;Wiki section&lt;/a&gt; for more information!
Ideally, it&amp;rsquo;d be continually updated with new interesting stuff over time!&lt;/p&gt;</description></item><item><title>infoooze</title><link>https://rainmana.github.io/hackyfeed/tools/devxprite-infoooze/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/devxprite-infoooze/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Infoooze is an OSINT tool designed for efficient information gathering on targets such as websites, IP addresses, and usernames through a command-line interface. Notable features include various reconnaissance capabilities like subdomain scanning, Whois lookups, and automatic results saving to text files, facilitating streamlined data collection. Additionally, it supports multiple operating systems, including Linux, Windows, and Termux.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div id="top"&gt;&lt;/div&gt;
&lt;!-- PROJECT LOGO --&gt;
&lt;br /&gt;
&lt;div align="center"&gt;
 &lt;a href="https://github.com/devXprite/infoooze"&gt;
 &lt;img src="./images/logo-main.png" alt="Logo" height="135px"&gt;
 &lt;/a&gt;
&lt;h2 align="center"&gt;Infoooze&lt;/h2&gt;
 &lt;p align="center"&gt;
 &lt;a href="https://github.com/devXprite/infoooze/issues/new?assignees=&amp;labels=bug&amp;template=bug_report.md&amp;title="&gt;Report Bug&lt;/a&gt;
 ·
 &lt;a href="https://github.com/devXprite/infoooze/issues"&gt;Request Feature&lt;/a&gt;
 &lt;/p&gt;
 &lt;img alt="GitHub Repo stars" src="https://img.shields.io/github/stars/devXprite/infoooze?style=flat"&gt;
 &lt;img alt="npms.io (final)" src="https://img.shields.io/npms-io/quality-score/infoooze"&gt;
 &lt;img alt="npm version" src="https://img.shields.io/npm/v/infoooze?color=green&amp;label=version&amp;style=flat"&gt; &lt;br&gt;
 &lt;img alt="npm" src="https://img.shields.io/npm/dm/infoooze?style=flat"&gt;
 &lt;img alt="Libraries.io SourceRank" src="https://img.shields.io/librariesio/sourcerank/npm/infoooze"&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;!-- TABLE OF CONTENTS --&gt;
&lt;h2 id="table-of-content"&gt;Table of Content&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="#about-infoooze"&gt;About Infoooze&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#features"&gt;Features&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#support"&gt;Support&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="#getting-started"&gt;Getting Started&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#prerequisites"&gt;Prerequisites&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#getting-started"&gt;Installation on Linux&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#getting-started"&gt;Installation on Android&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#uninstall"&gt;Uninstall&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="#usage"&gt;Usage&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#options"&gt;Options&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#examples"&gt;Examples&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="#run-with-gitpod"&gt;Run in Gitpod&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#contributing"&gt;Contributing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#license"&gt;License&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#contact"&gt;Contact&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;!-- ABOUT THE PROJECT --&gt;
&lt;h2 id="about-infoooze"&gt;About Infoooze&lt;/h2&gt;
&lt;p&gt;Infoooze is a powerful and user-friendly OSINT (Open-Source Intelligence) tool that allows you to quickly and easily gather information about a specific target. With Infoooze, you can easily search for information about websites, IP addresses, usernames, and more, all from the convenience of a simple command-line interface.&lt;/p&gt;</description></item><item><title>npq</title><link>https://rainmana.github.io/hackyfeed/tools/lirantal-npq/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lirantal-npq/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; npq is a tool designed to audit npm packages prior to installation, enhancing security during the package management process. It performs multiple checks, including vulnerability assessments using the Snyk database, package age, popularity metrics, and the presence of essential documentation files. Notable features include an auto-continue mode after warnings and customizable settings for strict security reviews.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;npq allows you to audit npm packages &lt;em&gt;before&lt;/em&gt; you install them&lt;/p&gt;</description></item><item><title>OSINT-Framework</title><link>https://rainmana.github.io/hackyfeed/tools/lockfale-osint-framework/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lockfale-osint-framework/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The OSINT Framework is a comprehensive resource designed to assist users in gathering information from free online sources for open-source intelligence (OSINT) applications. Its primary use case is to facilitate the discovery of various tools and resources that aid in information security and beyond, while notable features include a structured categorization of tools, some requiring local installation, and links to Google Dorking resources. The framework encourages community contributions for expanding its database of OSINT resources.&lt;/p&gt;</description></item><item><title>pikachu-volleyball</title><link>https://rainmana.github.io/hackyfeed/tools/gorisanson-pikachu-volleyball/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gorisanson-pikachu-volleyball/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pikachu Volleyball is a reimplementation of a classic 1997 Windows game, now developed in JavaScript for web play. Its primary use case is to provide a nostalgic gaming experience by enabling users to play volleyball with Pikachu characters while utilizing a physics engine and AI derived from reverse-engineered original machine code. Notable features include a customizable local server setup for gameplay and an extended AI vs. AI match time, allowing for continuous observation of the computer-controlled players.&lt;/p&gt;</description></item><item><title>reconmap</title><link>https://rainmana.github.io/hackyfeed/tools/reconmap-reconmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/reconmap-reconmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Reconmap is an open-source penetration testing management and automation platform that aids security professionals throughout the engagement lifecycle by efficiently planning, executing, and reporting on security assessments. Its notable features include real-time execution and scheduling of security commands, automated output capture, vulnerability tracking, and the generation of professional reports in multiple formats, all aimed at streamlining workflows and enhancing collaboration among InfoSec teams.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div style="text-align: center;"&gt;
&lt;h1&gt;Reconmap&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://bsky.app/profile/netfoe.com"&gt;&lt;img src="https://img.shields.io/badge/dynamic/json?url=https%3A%2F%2Fpublic.api.bsky.app%2Fxrpc%2Fapp.bsky.actor.getProfile%2F%3Factor%3Dnetfoe.com&amp;amp;query=%24.followersCount&amp;amp;style=social&amp;amp;logo=bluesky&amp;amp;label=Follow%20us%20on%20BlueSky&amp;amp;style=flat" alt="Bluesky"&gt;&lt;/a&gt;
&lt;a href="https://www.youtube.com/reconmap"&gt;&lt;img src="https://img.shields.io/youtube/channel/subscribers/UCKJM12YKHqvvATHkdIKopeQ?style=flat&amp;amp;logo=youtube&amp;amp;label=Subscribe%20to%20our%20YouTube%20channel&amp;amp;link=https%3A%2F%2Fwww.youtube.com%2Freconmap" alt="YouTube Channel Subscribers"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>reverse-linear-sync-engine</title><link>https://rainmana.github.io/hackyfeed/tools/wzhudev-reverse-linear-sync-engine/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wzhudev-reverse-linear-sync-engine/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Reverse Engineering Linear&amp;rsquo;s Sync Engine&amp;rdquo; project provides an in-depth analysis of Linear&amp;rsquo;s Sync Engine (LSE), aimed at enhancing collaborative software applications through an intuitive and efficient synchronization solution. Its primary use case is to support real-time collaboration by managing edits while offering critical features like partial syncing, permission controls, and offline availability, all wrapped in a developer-friendly API. The project emphasizes the balance of complexity and usability, highlighting LSE&amp;rsquo;s adaptability for various data models without requiring extensive expertise in sync technologies.&lt;/p&gt;</description></item><item><title>RMS-Runtime-Mobile-Security</title><link>https://rainmana.github.io/hackyfeed/tools/m0bilesecurity-rms-runtime-mobile-security/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m0bilesecurity-rms-runtime-mobile-security/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Runtime Mobile Security (RMS) is a web-based interface that leverages FRIDA to facilitate real-time manipulation of Android and iOS applications. Its primary use case includes dumping loaded classes and methods, hooking functionality on-the-fly, and tracing method arguments and return values. Notable features encompass the ability to load custom scripts and comprehensive support for both Android and iOS platforms, making it a versatile tool for mobile security analysis and testing.&lt;/p&gt;</description></item><item><title>shhgit</title><link>https://rainmana.github.io/hackyfeed/tools/eth0izzle-shhgit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/eth0izzle-shhgit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; shhgit is a tool designed to enhance the security of development teams by identifying leaked secrets in code repositories, such as API tokens and private keys, before they can be exploited by malicious actors. It operates either by scanning public repositories via APIs of GitHub, GitLab, and BitBucket or processing local directories, and features a customizable search capability along with options for CSV reporting and entropy-based analysis. Notably, the tool is flexible for both cloud and local deployments, making it suitable for integration into CI/CD pipelines.&lt;/p&gt;</description></item><item><title>social-analyzer</title><link>https://rainmana.github.io/hackyfeed/tools/qeeqbox-social-analyzer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/qeeqbox-social-analyzer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Social Analyzer is an OSINT tool designed to analyze and locate a person&amp;rsquo;s profiles across over 1000 social media platforms via an API, CLI, or web application. Its primary use case includes investigating potential malicious activities like cyberbullying and misinformation dissemination through sophisticated detection modules that yield a confidence rating. Notable features include multi-profile searches, various detection techniques (such as OCR and advanced algorithms), and customizable queries for enhanced data extraction and analysis.&lt;/p&gt;</description></item><item><title>SteamTracking</title><link>https://rainmana.github.io/hackyfeed/tools/steamtracking-steamtracking/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/steamtracking-steamtracking/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SteamTracking is a tool designed to automate the monitoring of various metrics associated with Steam accounts and game performance. Its primary use case is to streamline the process of tracking gameplay statistics and trends, reducing the manual effort required for users. Notable features include automated data collection and user-friendly insights into gaming habits.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="steam-tracking"&gt;Steam Tracking&lt;/h2&gt;
&lt;p&gt;Tracking things, so you don&amp;rsquo;t have to.&lt;/p&gt;</description></item><item><title>stegcloak</title><link>https://rainmana.github.io/hackyfeed/tools/kurolabs-stegcloak/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/kurolabs-stegcloak/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; StegCloak is a JavaScript steganography module that conceals secrets within text by using invisible Unicode characters after compressing and encrypting the data. It is designed for covert communication, allowing users to safely embed strings in various platforms while ensuring cryptographic security through AES-256-CTR encryption and HMAC integrity checks. Key features include high-speed processing, support for hiding file links, and a flexible interface available via API, command-line, and web interface.&lt;/p&gt;</description></item><item><title>SwiftnessX</title><link>https://rainmana.github.io/hackyfeed/tools/ehrishirajsharma-swiftnessx/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ehrishirajsharma-swiftnessx/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SwiftnessX is a cross-platform note-taking and target-tracking application designed specifically for penetration testers, built on the ElectronJS framework. It features customizable checklists, including the OWASP Testing Checklist, and allows users to import/export their checklists, enhancing organized documentation throughout the penetration testing process. The tool aims to streamline the workflow for security professionals by providing a unified interface for managing testing notes and methodologies.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;br&gt;
 &lt;img src="https://s15.postimg.cc/omhc6tcrv/256px_2x.png" alt="Swiftness" width="100"&gt;&lt;/a&gt;
 &lt;br&gt;
 SwiftnessX v0.2
 &lt;br&gt;
&lt;/h1&gt;
&lt;div align="center"&gt;
&lt;p&gt;&lt;a href="https://forthebadge.com"&gt;&lt;img src="https://forthebadge.com/images/badges/made-with-javascript.svg" alt="forthebadge"&gt;&lt;/a&gt; &lt;a href="https://forthebadge.com"&gt;&lt;img src="https://forthebadge.com/images/badges/winter-is-coming.svg" alt="forthebadge"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Watcher</title><link>https://rainmana.github.io/hackyfeed/tools/thalesgroup-cert-watcher/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/thalesgroup-cert-watcher/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Watcher is an AI-powered automated cybersecurity threat detection platform built on Django and React JS, enabling organizations to proactively identify and monitor emerging cybersecurity threats. Its primary use case includes automated intelligence analysis, real-time alerts for trending cybersecurity topics, and comprehensive domain management to combat potential cyber threats. Notable features encompass information leak monitoring, malicious domain surveillance, and integration with external threat intelligence sources for enhanced situational awareness.&lt;/p&gt;</description></item><item><title>WebPlotDigitizer</title><link>https://rainmana.github.io/hackyfeed/tools/automeris-io-webplotdigitizer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/automeris-io-webplotdigitizer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WebPlotDigitizer is a computer vision-assisted tool designed to extract numerical data from images of data visualizations, facilitating data retrieval for researchers and professionals across various fields. Its primary use case is converting graphical data representations, such as plots and charts, into usable datasets. Notable features include a user-friendly interface and cloud-based AI support for enhanced data extraction capabilities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="webplotdigitizer"&gt;WebPlotDigitizer&lt;/h1&gt;
&lt;p&gt;A large quantity of useful data is locked away in images of data visualizations. WebPlotDigitizer is a computer vision assisted software that helps extract numerical data from images of a variety of data visualizations.&lt;/p&gt;</description></item><item><title>xssor2</title><link>https://rainmana.github.io/hackyfeed/tools/evilcos-xssor2/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/evilcos-xssor2/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; XSS&amp;rsquo;OR is a versatile tool designed for exploiting cross-site scripting (XSS) vulnerabilities through JavaScript-based payloads. Its primary use case involves encoding, decoding, and probing potential attack vectors, making it applicable for security testing and penetration testing scenarios. Notable features include a web interface for payload manipulation, compatibility with both Python 2 and 3, and robust support for Docker deployment.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="xssor"&gt;XSS&amp;rsquo;OR&lt;/h1&gt;
&lt;p&gt;XSS&amp;rsquo;OR - Hack with JavaScript.&lt;/p&gt;
&lt;h2 id="online"&gt;ONLINE&lt;/h2&gt;
&lt;p&gt;You can have a try:&lt;/p&gt;</description></item></channel></rss>