<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Perl on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/tags/perl/</link><description>Recent content in Perl on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/tags/perl/feed.xml" rel="self" type="application/rss+xml"/><item><title>pixload</title><link>https://rainmana.github.io/hackyfeed/tools/sighook-pixload/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/sighook-pixload/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; pixload is a set of tools designed for creating and injecting payloads into image files, supporting formats like BMP, GIF, JPG, PNG, and WebP. Its primary use case is for stealthy payload delivery, enabling users to embed malicious code within legitimate image files while maintaining their validity. Notable features include straightforward command-line usage for various image types and integration with Metasploit for payload generation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="pixload--image-payload-creating-tools"&gt;pixload &amp;ndash; Image Payload Creating tools&lt;/h1&gt;
&lt;h2 id="description"&gt;DESCRIPTION&lt;/h2&gt;
&lt;p&gt;Set of tools for &lt;del&gt;hiding backdoors&lt;/del&gt; creating/injecting payload into images.&lt;/p&gt;</description></item><item><title>XAttacker</title><link>https://rainmana.github.io/hackyfeed/tools/moham3driahi-xattacker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/moham3driahi-xattacker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; XAttacker is a comprehensive exploitation tool designed for scanning and auto-exploiting vulnerabilities in web applications, particularly those using popular Content Management Systems (CMS). It identifies the target website&amp;rsquo;s architecture, detects vulnerabilities, generates exploits, and provides the user with the relevant exploit link. Notable features include a vulnerability scanner, auto-exploiting capabilities, and support for multiple CMS platforms, along with dork search functionality across various search engines.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1&gt;XAttacker V2.5 Tool FREE&lt;/h1&gt;
&lt;img align="left" width="120" height="120" src="https://i.ibb.co/hWRd9g5/hacker-icon-on-white-background-vector-27223273-1.jpg"&gt;
&lt;p&gt;&lt;strong&gt;XATTACKER&lt;/strong&gt; A Massive Exploiting Tool capable of scanning and auto-exploiting vulnerabilities in web applications, By providing a target website to the tool, it auto detects its’ architecture if using a Content Management Service (CMS) and tries to find vulnerabilities based on the detected CMS, After finding the vulnerabilities the tool will generate an exploit for the website and send the user the link of the exploit.&lt;/p&gt;</description></item></channel></rss>