<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Ruby on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/tags/ruby/</link><description>Recent content in Ruby on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/tags/ruby/feed.xml" rel="self" type="application/rss+xml"/><item><title>apple-knowledge</title><link>https://rainmana.github.io/hackyfeed/tools/hack-different-apple-knowledge/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hack-different-apple-knowledge/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;hack-different/apple-knowledge&amp;rdquo; repository hosts a compilation of reverse-engineered Apple data formats and protocols, primarily serving as a resource for jailbreak developers and hobbyists. Notable features include the availability of YAML files for machine-readable data, a collection of binary analysis and modification tools, and a Homebrew tap for easy installation of jailbreak-related utilities. The project emphasizes adherence to copyright laws while encouraging community contributions.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="apple-data-formats-and-knowledge"&gt;Apple Data Formats and Knowledge&lt;/h1&gt;
&lt;p&gt;A collection of reverse engineered Apple formats, protocols, or other interesting bits.&lt;/p&gt;</description></item><item><title>brakeman</title><link>https://rainmana.github.io/hackyfeed/tools/presidentbeef-brakeman/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/presidentbeef-brakeman/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Brakeman is a static analysis tool designed to identify security vulnerabilities in Ruby on Rails applications. It supports a wide range of output formats, includes features for ignoring specific checks, and allows for comparing current scans with previous results. Built to be compatible with various Rails versions, it can be run locally or via Docker, providing extensive configuration options for detailed security assessments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="http://brakemanscanner.org/"&gt;&lt;img src="http://brakemanscanner.org/images/logo_medium.png" alt="Brakeman Logo"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://circleci.com/gh/presidentbeef/brakeman"&gt;&lt;img src="https://circleci.com/gh/presidentbeef/brakeman.svg?style=svg" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://qlty.sh/gh/presidentbeef/projects/brakeman"&gt;&lt;img src="https://qlty.sh/gh/presidentbeef/projects/brakeman/coverage.svg" alt="Code Coverage"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>bundler-audit</title><link>https://rainmana.github.io/hackyfeed/tools/rubysec-bundler-audit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rubysec-bundler-audit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Bundler-audit is a vulnerability checker for Ruby applications that audits a project&amp;rsquo;s Gemfile.lock for insecure gem versions and insecure sources. It features the ability to ignore certain advisories, provides detailed advisory information, and does not require an active network connection to perform audits. Ideal for integrating into CI workflows, it enables developers to ensure their applications are secure by identifying and suggesting updates for vulnerable gems.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="bundler-audit"&gt;bundler-audit&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/rubysec/bundler-audit/actions/workflows/ruby.yml"&gt;&lt;img src="https://github.com/rubysec/bundler-audit/actions/workflows/ruby.yml/badge.svg" alt="CI"&gt;&lt;/a&gt;
&lt;a href="https://codeclimate.com/github/rubysec/bundler-audit"&gt;&lt;img src="https://codeclimate.com/github/rubysec/bundler-audit.svg" alt="Code Climate"&gt;&lt;/a&gt;
&lt;a href="https://badge.fury.io/rb/bundler-audit"&gt;&lt;img src="https://badge.fury.io/rb/bundler-audit.svg" alt="Gem Version"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>capsulecorp-pentest</title><link>https://rainmana.github.io/hackyfeed/tools/r3dy-capsulecorp-pentest/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/r3dy-capsulecorp-pentest/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Capsulecorp Pentest is a pre-configured virtual network environment designed for learning network penetration testing, utilizing Vagrant and Ansible to deploy five virtual machines, including a Linux attacker and four Windows 2019 servers with vulnerable services. This tool streamlines the setup process, allowing users to quickly launch a fully functional Active Directory domain for educational purposes, with included features like a vulnerable Jenkins server, Apache Tomcat, and Metasploit. Its primary use case is to facilitate hands-on pentesting practice in a controlled environment, enhancing learning efficiency.&lt;/p&gt;</description></item><item><title>dradis-ce</title><link>https://rainmana.github.io/hackyfeed/tools/dradis-dradis-ce/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dradis-dradis-ce/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Dradis is an open-source collaboration framework designed for automated penetration testing report generation, enabling InfoSec teams to streamline reporting processes by importing data from various security tools like Burp Suite and Nessus. Its notable features include platform independence, markup support for notes, and a powerful extensions interface that enhances flexibility and usability. Dradis aims to generate consistent and professional pentest reports while minimizing manual efforts, thereby allowing teams to focus on analysis and recommendations.&lt;/p&gt;</description></item><item><title>evil-winrm</title><link>https://rainmana.github.io/hackyfeed/tools/hackplayers-evil-winrm/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hackplayers-evil-winrm/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Evil-WinRM is a versatile Ruby-based tool designed for penetration testing that facilitates remote command execution via Windows Remote Management (WinRM) protocol. It supports advanced features such as in-memory script and DLL execution, pass-the-hash and Kerberos authentication, SSL, and customizable logging, making it particularly effective for post-exploitation scenarios. The tool is compatible with both Linux and Windows clients, providing a robust interface for querying and managing remote Windows systems while bypassing some antivirus defenses.&lt;/p&gt;</description></item><item><title>killshot</title><link>https://rainmana.github.io/hackyfeed/tools/bahaabdelwahed-killshot/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bahaabdelwahed-killshot/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; KillShot is a comprehensive penetration testing framework designed for information gathering and website vulnerability scanning. Its primary use case involves automating data collection through integrated tools such as WhatWeb and Nmap, while offering features like a CMS Exploit Scanner and web application vulnerability assessments, including XSS and SQL injection detection. The framework also facilitates backdoor generation and includes a fuzzer, making it a versatile tool for security professionals.&lt;/p&gt;</description></item><item><title>krane</title><link>https://rainmana.github.io/hackyfeed/tools/appvia-krane/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/appvia-krane/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Krane is a Kubernetes RBAC static analysis tool designed to identify security risks within K8s RBAC configurations and provide mitigation suggestions. Key features include a customizable set of built-in and user-defined risk rules, a user-friendly dashboard for visualizing RBAC posture, continuous analysis capabilities within clusters, and integration with Slack for alerting on significant risks. Additionally, Krane offers reporting in machine-readable formats and can be deployed locally, within CI/CD pipelines, or as a standalone service.&lt;/p&gt;</description></item><item><title>mihari</title><link>https://rainmana.github.io/hackyfeed/tools/ninoseki-mihari/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ninoseki-mihari/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Mihari is an OSINT query aggregator designed for threat hunting, enabling users to perform multiple searches across various data services using a single rule and store the findings in a database. It supports numerous services, including Censys, VirusTotal, and Shodan, facilitating comprehensive data collection and analysis for enhanced cybersecurity investigations. Notable features include support for diverse OSINT sources, integrated persistence for findings, and robust documentation for user guidance.&lt;/p&gt;</description></item><item><title>one_gadget</title><link>https://rainmana.github.io/hackyfeed/tools/david942j-one_gadget/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/david942j-one_gadget/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; OneGadget is a Ruby gem designed for locating one-gadget RCE exploits within libc binaries, simplifying the process for participants in Capture The Flag (CTF) challenges. It leverages symbolic execution to efficiently identify gadgets that result in the execution of &lt;code&gt;/bin/sh&lt;/code&gt;, supports multiple architectures (i386, amd64, aarch64), and offers a command-line interface for user-friendly interaction with customizable output options.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://rubygems.org/gems/one_gadget"&gt;&lt;img src="https://img.shields.io/endpoint?url=https://gem-badge-h3lg.onrender.com/downloads/one_gadget" alt="Downloads"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://badge.fury.io/rb/one_gadget"&gt;&lt;img src="https://badge.fury.io/rb/one_gadget.svg" alt="Gem Version"&gt;&lt;/a&gt;
&lt;a href="https://github.com/david942j/one_gadget/actions"&gt;&lt;img src="https://github.com/david942j/one_gadget/workflows/build/badge.svg" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://qlty.sh/gh/david942j/projects/one_gadget"&gt;&lt;img src="https://qlty.sh/gh/david942j/projects/one_gadget/maintainability.svg" alt="Maintainability"&gt;&lt;/a&gt;
&lt;a href="https://qlty.sh/gh/david942j/projects/one_gadget"&gt;&lt;img src="https://qlty.sh/gh/david942j/projects/one_gadget/coverage.svg" alt="Code Coverage"&gt;&lt;/a&gt;
&lt;a href="https://inch-ci.org/github/david942j/one_gadget"&gt;&lt;img src="https://inch-ci.org/github/david942j/one_gadget.svg?branch=master" alt="Inline docs"&gt;&lt;/a&gt;
&lt;a href="https://www.rubydoc.info/github/david942j/one_gadget/"&gt;&lt;img src="http://img.shields.io/badge/yard-docs-blue.svg" alt="Yard Docs"&gt;&lt;/a&gt;
&lt;a href="http://choosealicense.com/licenses/mit/"&gt;&lt;img src="https://img.shields.io/badge/license-MIT-blue.svg" alt="MIT License"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 id="onegadget"&gt;OneGadget&lt;/h2&gt;
&lt;p&gt;When playing ctf pwn challenges we usually need the one-gadget RCE (remote code execution),
which leads to call &lt;code&gt;execve('/bin/sh', NULL, NULL)&lt;/code&gt;.&lt;/p&gt;</description></item><item><title>OSCP-Exam-Report-Template-Markdown</title><link>https://rainmana.github.io/hackyfeed/tools/noraj-oscp-exam-report-template-markdown/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/noraj-oscp-exam-report-template-markdown/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The OSCP Exam Report Template in Markdown is designed to streamline the report writing process for Offensive Security exams, eliminating the need for traditional word processors like LaTeX and Microsoft Word. It allows users to write reports in Markdown, which enhances efficiency, reduces formatting issues, and integrates version control capabilities. Notable features include a script for automatic report generation, support for various text editors, and a clean, professional layout for certification documentation.&lt;/p&gt;</description></item><item><title>PasswordPusher</title><link>https://rainmana.github.io/hackyfeed/tools/pglombardo-passwordpusher/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/pglombardo-passwordpusher/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Password Pusher is an open-source web application designed for securely sharing sensitive information such as passwords, notes, files, and URLs via self-destructing links. Its notable features include encrypted storage, customizable expiry controls, comprehensive audit logging, and the ability to self-host or utilize a hosted service, making it suitable for individual users and teams. The tool supports multiple languages and offers integrations through a JSON API and command-line interface, enhancing its versatility in secure information sharing.&lt;/p&gt;</description></item><item><title>ronin</title><link>https://rainmana.github.io/hackyfeed/tools/ronin-rb-ronin/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ronin-rb-ronin/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ronin is an open-source Ruby toolkit designed for security research and development, featuring a comprehensive suite of CLI commands and libraries tailored for various security tasks such as data encoding/decoding, vulnerability scanning, fuzzing, and reconnaissance. Notable features include a fully-loaded Ruby REPL, a lightweight web UI for database interaction, and the ability to install and run third-party exploits or payloads. This tool is primarily used by security researchers, bug bounty hunters, and developers for efficient data processing and rapid script prototyping.&lt;/p&gt;</description></item><item><title>username-anarchy</title><link>https://rainmana.github.io/hackyfeed/tools/urbanadventurer-username-anarchy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/urbanadventurer-username-anarchy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Username Anarchy is a command-line tool designed for generating potential usernames during penetration testing, crucial for user account/password brute force attacks and username enumeration. It features a flexible plugin architecture for various username formats, utilizes common first and last names databases from external sources, and allows for name substitutions to maximize coverage when only partial user information is known. This tool supports input from multiple formats and automates name generation based on country datasets or popular social media aliases.&lt;/p&gt;</description></item><item><title>wpscan</title><link>https://rainmana.github.io/hackyfeed/tools/wpscanteam-wpscan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wpscanteam-wpscan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WPScan is a specialized security scanner for WordPress sites, primarily used to identify vulnerabilities in themes and plugins as well as misconfigurations. Its notable features include support for user enumeration, integration with the WordPress Vulnerability Database for real-time risk assessment, and customizable scanning options for stealth or aggressive detection modes. The tool can be easily installed via RubyGems or Docker and offers extensive usage documentation for diverse scanning approaches.&lt;/p&gt;</description></item></channel></rss>