<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Rust on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/tags/rust/</link><description>Recent content in Rust on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/tags/rust/feed.xml" rel="self" type="application/rss+xml"/><item><title>AngryOxide</title><link>https://rainmana.github.io/hackyfeed/tools/ragnt-angryoxide/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ragnt-angryoxide/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AngryOxide is a Rust-based 802.11 attack tool designed for penetration testing and WiFi exploitation research. It provides an active state-based attack engine that retrieves EAPOL messages from access points and clients, with features such as target filtering, auto-hunting capability, and GPS integration for geo-fencing. The tool is equipped with a terminal UI, headless operation mode, and a variety of automated attacks aimed at retrieving cryptographic data for later cracking with tools like Hashcat.&lt;/p&gt;</description></item><item><title>binsider</title><link>https://rainmana.github.io/hackyfeed/tools/orhun-binsider/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/orhun-binsider/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Binsider is a versatile tool designed for reverse engineers, enabling both static and dynamic analysis of binary files through an intuitive terminal interface. Key functionalities include inspection of binary metadata, string analysis, examination of linked libraries, and detailed ELF layout analysis, all aimed at enhancing understanding of executable files.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
 &lt;img src="https://raw.githubusercontent.com/orhun/binsider/main/website/src/assets/binsider-logo-dark.png#gh-dark-mode-only" width="300"&gt;&lt;/a&gt;
 &lt;img src="https://raw.githubusercontent.com/orhun/binsider/main/website/src/assets/binsider-logo-light.png#gh-light-mode-only" width="300"&gt;&lt;/a&gt;
 &lt;br&gt;
 &lt;img src="https://raw.githubusercontent.com/orhun/binsider/main/website/src/assets/binsider-text-dark.png#gh-dark-mode-only" width="170"&gt;&lt;/a&gt;
 &lt;img src="https://raw.githubusercontent.com/orhun/binsider/main/website/src/assets/binsider-text-light.png#gh-light-mode-only" width="170"&gt;&lt;/a&gt;
 &lt;br&gt;
 &lt;br&gt;
 &lt;em&gt;"Swiss army knife for reverse engineers."&lt;/em&gt;
 &lt;br&gt;
 &lt;br&gt;
 &lt;a href="https://github.com/orhun/binsider/releases"&gt;
 &lt;img src="https://img.shields.io/github/v/release/orhun/binsider?style=flat&amp;labelColor=1d1d1d&amp;color=f8be75&amp;logo=GitHub&amp;logoColor=white"&gt;&lt;/a&gt;
 &lt;a href="https://crates.io/crates/binsider/"&gt;
 &lt;img src="https://img.shields.io/crates/v/binsider?style=flat&amp;labelColor=1d1d1d&amp;color=f8be75&amp;logo=Rust&amp;logoColor=white"&gt;&lt;/a&gt;
 &lt;br&gt;
 &lt;a href="https://github.com/orhun/binsider/actions?query=workflow%3A%22CI%22"&gt;
 &lt;img src="https://img.shields.io/github/actions/workflow/status/orhun/binsider/ci.yml?style=flat&amp;labelColor=1d1d1d&amp;color=white&amp;logo=GitHub%20Actions&amp;logoColor=white"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/orhun/binsider/actions?query=workflow%3A%22CD%22"&gt;
 &lt;img src="https://img.shields.io/github/actions/workflow/status/orhun/binsider/cd.yml?style=flat&amp;labelColor=1d1d1d&amp;color=white&amp;logo=GitHub%20Actions&amp;logoColor=white&amp;label=deploy"&gt;&lt;/a&gt;
 &lt;a href="https://hub.docker.com/r/orhunp/binsider"&gt;
 &lt;img src="https://img.shields.io/github/actions/workflow/status/orhun/binsider/docker.yml?style=flat&amp;labelColor=1d1d1d&amp;color=white&amp;label=docker&amp;logo=Docker&amp;logoColor=white"&gt;&lt;/a&gt;
 &lt;a href="https://docs.rs/binsider/"&gt;
 &lt;img src="https://img.shields.io/docsrs/binsider?style=flat&amp;labelColor=1d1d1d&amp;color=white&amp;logo=Rust&amp;logoColor=white"&gt;&lt;/a&gt;
 &lt;br&gt;
 &lt;a href="https://discord.gg/zphNxEcEK7"&gt;
 &lt;img src="https://img.shields.io/discord/1289166752311148554?color=f8be75&amp;label=discord&amp;labelColor=1d1d1d&amp;logo=discord&amp;logoColor=white"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;h4 align="center"&gt;
 &lt;a href="https://binsider.dev/getting-started/"&gt;Documentation&lt;/a&gt; |
 &lt;a href="https://binsider.dev/"&gt;Website&lt;/a&gt;
&lt;/h4&gt;
&lt;p&gt;😼🕵️‍♂️ &lt;strong&gt;Binsider&lt;/strong&gt; can perform static and dynamic analysis, inspect strings, examine linked libraries, and perform hexdumps, all within a user-friendly terminal user interface!&lt;/p&gt;</description></item><item><title>biodiff</title><link>https://rainmana.github.io/hackyfeed/tools/8051enthusiast-biodiff/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/8051enthusiast-biodiff/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; biodiff is a binary file comparison tool that employs bioinformatics algorithms to align and display two binary files side by side, allowing users to identify similarities and differences in byte sequences. Its notable features include customizable byte representations, multiple viewing modes (aligned and unaligned), and advanced search capabilities using text and regex, which facilitate detailed analysis of binary data. Additionally, users can perform both block-level and global alignments, making it suitable for examining varying sizes of binary files efficiently.&lt;/p&gt;</description></item><item><title>black-hat-rust</title><link>https://rainmana.github.io/hackyfeed/tools/skerkour-black-hat-rust/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/skerkour-black-hat-rust/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Black Hat Rust is a specialized resource for understanding and implementing offensive security techniques using the Rust programming language. It covers a broad spectrum of offensive security concepts, including building custom tools for cyber attacks, phishing, and exploitation, while emphasizing practical application and real-world Rust programming practices. Notable features include multi-threaded attack surface discovery and async operations, making it suitable for both developers looking to enhance their security skills and security engineers aiming to leverage Rust for offensive purposes.&lt;/p&gt;</description></item><item><title>cargo-auditable</title><link>https://rainmana.github.io/hackyfeed/tools/rust-secure-code-cargo-auditable/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rust-secure-code-cargo-auditable/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; cargo-auditable is a Rust tool that embeds the dependency tree of a Rust executable in JSON format within the compiled binary, allowing for precise auditing of crate versions against known vulnerabilities. It facilitates vulnerability scanning in production without additional bookkeeping, supporting major operating systems and WebAssembly. Notably, it integrates seamlessly with existing Cargo commands and works in conjunction with tools like cargo-audit to enhance security practices in Rust development.&lt;/p&gt;</description></item><item><title>chromepass</title><link>https://rainmana.github.io/hackyfeed/tools/darkarp-chromepass/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/darkarp-chromepass/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Chromepass is a Python-based console application designed to decrypt saved passwords and cookies from various web browsers, including Google Chrome, Chromium, and others. Its primary use case is for extracting sensitive credentials with minimal detection by antivirus software through custom build methodologies. Notable features include the ability to remotely send the recovered data, customizable error messages, and a tailored user interface.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align='center'&gt;Chromepass - Hacking Chrome Saved Passwords and Cookies&lt;/h1&gt;
&lt;p align="center"&gt;	
 &lt;img src="https://img.shields.io/badge/Platform-Windows-green" /&gt;
	&lt;a href="https://github.com/darkarp/chromepass/releases/latest"&gt;
	&lt;img src="https://img.shields.io/github/v/release/darkarp/chromepass" alt="Release" /&gt;
	&lt;/a&gt;
 &lt;a href="https://travis-ci.org/darkarp/chrome-password-hacking"&gt;
 &lt;img src="https://img.shields.io/badge/build-passing-green" alt="Build Status on CircleCI" /&gt;
	&lt;/a&gt;
 &lt;img src="https://img.shields.io/maintenance/yes/2021" /&gt;
	&lt;/br&gt;
 &lt;a href="https://github.com/darkarp/chromepass/commits/master"&gt;
 &lt;img src="https://img.shields.io/github/last-commit/darkarp/chromepass" /&gt;
 &lt;/a&gt;
 &lt;img alt="Scrutinizer code quality (GitHub/Bitbucket)" src="https://img.shields.io/scrutinizer/quality/g/darkarp/chromepass?style=flat"&gt;
 &lt;a href="https://github.com/darkarp/chromepass/blob/master/LICENSE"&gt;
 &lt;img src="http://img.shields.io/github/license/darkarp/chromepass" /&gt;
 &lt;/a&gt;
 &lt;/br&gt;
 &lt;a href="https://github.com/darkarp/chromepass/issues?q=is%3Aopen+is%3Aissue"&gt;
	&lt;img alt="GitHub issues" src="https://img.shields.io/github/issues/darkarp/chromepass"&gt;
&lt;/a
&lt;a href="https://github.com/darkarp/chromepass/issues?q=is%3Aissue+is%3Aclosed"&gt;
	&lt;img alt="GitHub closed issues" src="https://img.shields.io/github/issues-closed/darkarp/chromepass"&gt;
&lt;/a&gt;
&lt;/br&gt;
 &lt;a href="https://discord.gg/beczNYP"&gt;
 &lt;img src="https://img.shields.io/badge/discord-join-7289DA.svg?logo=discord&amp;longCache=true&amp;style=flat" /&gt;
 &lt;/a&gt;
 &lt;/br&gt;
 &lt;a href="https://github.com/darkarp/chromepass/blob/master/templates/resources/demo.gif" target="_blank"&gt;View Demo&lt;/a&gt;
 ·
 &lt;a href="https://github.com/darkarp/chromepass/issues/new?assignees=&amp;labels=&amp;template=bug_report.md&amp;title="&gt;Report Bug&lt;/a&gt;
 ·
 &lt;a href="https://github.com/darkarp/chromepass/issues/new?assignees=&amp;labels=&amp;template=feature_request.md&amp;title="&gt;Request Feature&lt;/a&gt;
 &lt;/p&gt;</description></item><item><title>CTFCrackTools</title><link>https://rainmana.github.io/hackyfeed/tools/0chencc-ctfcracktools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/0chencc-ctfcracktools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CTFCrackTools X is a next-generation, node-based toolkit designed for CTF (Capture The Flag) competitions, offering an extensive set of over 43 built-in algorithms for encoding, cryptography, and hashing. Key features include a visual workflow that allows users to construct custom encoding and decoding processes intuitively, and native support across Windows, macOS, and Linux platforms without the need for additional runtime installations. The tool emphasizes performance and extensibility, streamlining the process of handling various CTF challenges.&lt;/p&gt;</description></item><item><title>DataSurgeon</title><link>https://rainmana.github.io/hackyfeed/tools/drew-alleman-datasurgeon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/drew-alleman-datasurgeon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DataSurgeon is a comprehensive tool for extracting sensitive information pertinent to incident response, DLP, penetration testing, and CTF challenges. It supports extraction of a wide range of data types—including emails, credit cards, URLs, and various hashes—across multiple operating systems, and features a plugin management system that allows users to extend its functionality. Notable features include recursive file analysis, CSV output capabilities, and multi-platform support enabling usage on Windows, Linux, and macOS.&lt;/p&gt;</description></item><item><title>Findomain</title><link>https://rainmana.github.io/hackyfeed/tools/findomain-findomain/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/findomain-findomain/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Findomain is a comprehensive domain recognition tool designed for efficient subdomain enumeration and monitoring. It utilizes Certificate Transparency Logs and various APIs to discover subdomains without brute-force methods, supports multi-threading for quick searches, and offers integration with notification services such as Discord and Slack. Notable features include DNS over TLS support, parallel resolution capabilities, and extensive configuration options across multiple formats.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://twitter.com/edu4rdshl"&gt;&lt;img src="https://img.shields.io/twitter/follow/edu4rdshl.svg?logo=twitter" alt="Follow on Twitter"&gt;&lt;/a&gt;
&lt;a href="https://twitter.com/FindomainApp"&gt;&lt;img src="https://img.shields.io/twitter/follow/FindomainApp.svg?logo=twitter" alt="Follow on Twitter"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://travis-ci.org/edu4rdshl/findomain"&gt;&lt;img src="https://travis-ci.org/edu4rdshl/findomain.svg?branch=master" alt="Travis CI Status"&gt;&lt;/a&gt;
&lt;a href="https://ci.appveyor.com/project/edu4rdshl/findomain"&gt;&lt;img src="https://ci.appveyor.com/api/projects/status/github/edu4rdshl/findomain?branch=master&amp;amp;svg=true" alt="Appveyor CI Status"&gt;&lt;/a&gt;
&lt;a href="https://github.com/Edu4rdSHL/findomain/actions"&gt;&lt;img src="https://github.com/Edu4rdSHL/findomain/workflows/Github%20Actions/badge.svg" alt="Build status"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>goblin</title><link>https://rainmana.github.io/hackyfeed/tools/m4b-goblin/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m4b-goblin/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; libgoblin is a versatile Rust library for binary parsing, loading, and analysis, supporting multiple formats including ELF, Mach-O, and PE across both 32-bit and 64-bit architectures. Its notable features include zero-copy parsing, cross-platform capabilities, endian-awareness, and extensive configurability, allowing users to adapt it to various binary analysis tasks while maintaining a lightweight and efficient footprint. The library is designed for use cases ranging from compiler development to binary analysis tools, making it a comprehensive solution for developers working with binary data.&lt;/p&gt;</description></item><item><title>Heroinn</title><link>https://rainmana.github.io/hackyfeed/tools/b23r0-heroinn/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/b23r0-heroinn/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Heroinn is a cross-platform command-and-control (C2) and post-exploitation framework developed in Rust, designed primarily for research and educational purposes. Notable features include a graphical user interface (GUI), an interactive PTY shell, system information collection, file management with support for large files and resuming broken transfers, and compatibility with multiple operating systems including Windows, Linux, BSD, and macOS, leveraging various communication protocols such as TCP, HTTP, and reliable UDP.&lt;/p&gt;</description></item><item><title>imessage-exporter</title><link>https://rainmana.github.io/hackyfeed/tools/reagentx-imessage-exporter/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/reagentx-imessage-exporter/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The imessage-exporter is a versatile tool for exporting, managing, and diagnosing iMessage data, providing both library and binary functionalities. It facilitates the saving and archiving of message history, including multimedia content, into open formats, while also supporting migration and compliance with data retention policies. Notable features include cross-platform support, extensive compatibility with iMessage functionalities, and diagnostic tools to ensure the integrity of the iMessage database.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="imessage-exporter"&gt;imessage-exporter&lt;/h1&gt;
&lt;p&gt;This crate provides both a library to interact with iMessage data as well as a binary that can perform some useful read-only operations using that data. The aim of this project is to provide the most comprehensive and accurate representation of iMessage data available.&lt;/p&gt;</description></item><item><title>IPA</title><link>https://rainmana.github.io/hackyfeed/tools/seekbytes-ipa/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/seekbytes-ipa/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Interactive PDF Analysis (IPA) is a graphical tool designed for researchers to deeply explore and analyze the contents of PDF files, particularly focusing on suspicious or potentially malicious documents. Key features include metadata extraction, structural examination of PDF objects, visualization of object references, and the ability to salvage information from corrupted files, all without requiring external dependencies. The tool aims to enhance user experience compared to traditional command-line analysis methods, facilitating a clearer understanding of the relationships among various document elements.&lt;/p&gt;</description></item><item><title>lonkero</title><link>https://rainmana.github.io/hackyfeed/tools/bountyyfi-lonkero/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bountyyfi-lonkero/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Lonkero is a professional-grade web security scanner engineered for advanced penetration testing, boasting over 125 sophisticated scanning modules written in Rust. Its notable features include an intelligent mode for context-aware scanning, machine learning capabilities to minimize false positives to 5%, and unique proof-based XSS detection that eliminates reliance on browsers, significantly increasing scan speed and accuracy. By leveraging a robust architecture that focuses on real vulnerabilities, Lonkero delivers efficient and precise security assessments for modern web technologies.&lt;/p&gt;</description></item><item><title>lumen</title><link>https://rainmana.github.io/hackyfeed/tools/naim94a-lumen/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/naim94a-lumen/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Lumen is a private server designed to integrate with IDA Pro 7.2 and later versions, enabling users to efficiently manage and retrieve function signatures via its database-backed infrastructure utilizing PostgreSQL. It features an experimental HTTP API for querying by function hash or file, facilitating collaborative reverse engineering workflows. The tool is provisioned with a straightforward setup through Docker and can be used with custom TLS configurations for secure communications.&lt;/p&gt;</description></item><item><title>matano</title><link>https://rainmana.github.io/hackyfeed/tools/matanolabs-matano/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/matanolabs-matano/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Matano is an open-source cloud-native security data lake specifically designed for AWS, enabling security teams to normalize and manage security logs effectively. Its notable features include the ability to integrate with over 50 log sources, support for Detection-as-Code using Python, serverless architecture for scalability, and vendor-neutral ownership through open standards. The tool aims to enhance SIEM capabilities by providing a cost-effective and versatile solution for security data management and analysis.&lt;/p&gt;</description></item><item><title>moonwalk</title><link>https://rainmana.github.io/hackyfeed/tools/mufeedvh-moonwalk/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mufeedvh-moonwalk/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Moonwalk is a lightweight tool designed for penetration testing on Unix systems, enabling users to erase their traces during exploitation by restoring system logs and filesystem timestamps to their previous state. Key features include a fast execution time of under 5 milliseconds, the ability to save and revert user shell history, and a world-writable path for session logging, ensuring that no evidence of the testing remains.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
 &lt;h1&gt;&lt;code&gt;moonwalk&lt;/code&gt;&lt;/h1&gt; 
 &lt;p&gt;&lt;strong&gt;&lt;em&gt;Cover your tracks during Linux Exploitation / Penetration Testing by leaving zero traces on system logs and filesystem timestamps.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>noseyparker</title><link>https://rainmana.github.io/hackyfeed/tools/praetorian-inc-noseyparker/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/praetorian-inc-noseyparker/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Nosey Parker is a command-line interface (CLI) tool designed for scanning textual data to identify secrets and sensitive information, essentially functioning as a specialized &lt;code&gt;grep&lt;/code&gt; for secret detection. Targeted primarily at offensive security operations, it offers features such as flexible scanning of various data sources, usage of 188 precision-focused regex rules, deduplication of matches to streamline review processes, and high-speed scanning capabilities, making it suitable for large-scale security engagements. Note that Nosey Parker has been officially retired and replaced by the tool Titus.&lt;/p&gt;</description></item><item><title>obliteration</title><link>https://rainmana.github.io/hackyfeed/tools/obhq-obliteration/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/obhq-obliteration/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Obliteration is an open-source PlayStation 4 kernel reimplementation in Rust, designed to enable the execution of dumped PlayStation 4 system software on various operating systems, including Windows, Linux, and macOS. Notable features include cross-platform support with native binaries, near-native performance leveraging hypervisor technologies, and a kernel architecture aimed to closely resemble the original PlayStation 4 kernel for enhanced compatibility. Currently, the project is in early development and does not yet support game execution.&lt;/p&gt;</description></item><item><title>operative-framework</title><link>https://rainmana.github.io/hackyfeed/tools/graniet-operative-framework/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/graniet-operative-framework/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Operative Framework is a digital investigation tool designed for interacting with multiple targets, executing a variety of modules, and managing links with these targets. Its notable features include the ability to export reports in PDF format, support for crafting custom modules, and a RESTful API for integration, all underpinned by a redesigned architecture in Rust for enhanced performance and functionality.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;img src="https://i.ibb.co/ZBf2T77/PNG.png" width="200"&gt;
&lt;p&gt;&lt;strong&gt;operative framework&lt;/strong&gt; is a digital investigation framework, you can interact with multiple targets, execute multiple modules, create links with target, export rapport to PDF file, add note to target or results, interact with RESTFul API, write your own modules.&lt;/p&gt;</description></item><item><title>panopticon</title><link>https://rainmana.github.io/hackyfeed/tools/das-labor-panopticon/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/das-labor-panopticon/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Panopticon is a cross-platform disassembler designed for reverse engineering, capable of disassembling multiple instruction sets including AMD64, x86, AVR, and MOS 6502, as well as opening ELF files. Notable features include a Qt-based GUI for visualizing and annotating control flow graphs, though it has been deprecated with a migration to GitLab and restructuring into multiple crates. Users are encouraged to transition to the new version, Verso, for continued development and support.&lt;/p&gt;</description></item><item><title>pdfrip</title><link>https://rainmana.github.io/hackyfeed/tools/mufeedvh-pdfrip/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mufeedvh-pdfrip/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; PDFRip is a multithreaded PDF password cracking tool written in Rust, featuring advanced capabilities such as wordlist attacks, custom query builders, and structured password brute-forcing techniques. Notable features include prepared verifier hot paths for efficient password attempts, exact progress tracking, checkpointing for session resumption, and output in JSON format for automation. It supports various brute-force methods, including bounded masks, date, and number generators, making it a versatile utility for recovering PDF passwords.&lt;/p&gt;</description></item><item><title>pwninit</title><link>https://rainmana.github.io/hackyfeed/tools/io12-pwninit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/io12-pwninit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; pwninit is a tool designed to automate the setup for binary exploitation challenges by preparing the necessary executables and library files. Key features include the ability to set the challenge binary as executable, download an appropriate linker and debug symbols, patch the binary using patchelf, and generate a customizable pwntools solve script. This streamlines the initial configuration process for security professionals and students engaging in binary exploitation tasks.&lt;/p&gt;</description></item><item><title>rustcat</title><link>https://rainmana.github.io/hackyfeed/tools/robiot-rustcat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/robiot-rustcat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Rustcat is a versatile port listener and reverse shell utility compatible with Linux, MacOS, and Windows, designed to simplify remote command execution. Notable features include an interactive mode with command history, tab completion, and CTRL-C blocking, which enhance user experience during shell operations. It provides two primary modes of operation: listening for incoming connections and establishing reverse shells for remote system access.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
 &lt;h1&gt;rustcat - The modern port listener and reverse shell &lt;/h1&gt;
&lt;/div&gt;
&lt;p align="center"&gt;
	&lt;img alt="GitHub All Releases" src="https://img.shields.io/github/downloads/robiot/rustcat/total?label=GitHub%20Downloads" /&gt;
 	&lt;a href="https://aur.archlinux.org/packages/rustcat"&gt;&lt;img alt="AUR version" src="https://img.shields.io/aur/version/rustcat" /&gt;&lt;/a&gt;
 	&lt;img alt="GitHub Issues" src="https://img.shields.io/github/issues/robiot/rustcat.svg" /&gt;
 	&lt;img alt="GitHub Contributors" src="https://img.shields.io/github/contributors/robiot/rustcat" /&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>RustHound</title><link>https://rainmana.github.io/hackyfeed/tools/nh-red-team-rusthound/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nh-red-team-rusthound/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RustHound is a cross-platform BloodHound collector tool developed in Rust, designed to generate data about users, groups, computers, OUs, GPOs, and containers for analysis within BloodHound. It operates silently without detection by antivirus software and is suitable for environments where SharpHound is blocked or incompatible. Notable features include its ability to run on Linux, Windows, and macOS, along with a range of compile options, including Docker support and static binary generation.&lt;/p&gt;</description></item><item><title>RustRedOps</title><link>https://rainmana.github.io/hackyfeed/tools/joaoviictorti-rustredops/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/joaoviictorti-rustredops/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RustRedOps is a collection of Red Team operation tools developed in Rust, aimed at enhancing the capabilities of security professionals and penetration testers in conducting security assessments and intrusion tests. Notable features include a diverse set of projects focused on techniques such as API hooking, anti-analysis, process enumeration, and various forms of code injection, which collectively facilitate advanced exploitation tactics and malware development. The repository emphasizes efficiency and effectiveness, making it a valuable resource for practitioners in cybersecurity.&lt;/p&gt;</description></item><item><title>RustScan</title><link>https://rainmana.github.io/hackyfeed/tools/bee-san-rustscan/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/bee-san-rustscan/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RustScan is an advanced port scanner designed for high-speed operation, capable of scanning all 65,000 ports in just 3 seconds. Its notable features include a flexible scripting engine that supports Python, Lua, and Shell for automated processing, as well as adaptive learning capabilities that enhance its performance over time, making it a highly effective tool for network security assessments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center" markdown="1"&gt;
&lt;p&gt;➡️ &lt;a href="http://discord.skerritt.blog" title="Discord blog"&gt;Discord&lt;/a&gt; | &lt;a href="https://github.com/RustScan/RustScan/wiki/Installation-Guide" title="Installation Guide Wiki"&gt;Installation Guide&lt;/a&gt; | &lt;a href="https://github.com/RustScan/RustScan#-usage"&gt;Usage Guide&lt;/a&gt; ⬅️&lt;/p&gt;</description></item><item><title>skanuvaty</title><link>https://rainmana.github.io/hackyfeed/tools/esc4icescesc-skanuvaty/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/esc4icescesc-skanuvaty/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Skanuvaty is a high-performance DNS/network/port scanning tool that allows users to quickly analyze a domain by discovering its subdomains and resolving their corresponding IPs. Notable features include support for concurrent scans, with the ability to test thousands of subdomains within seconds, and the generation of a comprehensive output file in JSON format for further analysis.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="skanuvaty"&gt;Skanuvaty&lt;/h1&gt;
&lt;p&gt;Dangerously fast dns/network/port scanner, all-in-one.&lt;/p&gt;
&lt;p&gt;&lt;img src="./demo.gif" alt="Demonstration"&gt;&lt;/p&gt;
&lt;p&gt;Start with a domain, and we&amp;rsquo;ll find everything about it.&lt;/p&gt;</description></item><item><title>sn0int</title><link>https://rainmana.github.io/hackyfeed/tools/kpcyrd-sn0int/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/kpcyrd-sn0int/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; sn0int is a semi-automatic OSINT framework and package manager designed for IT security professionals and researchers to gather intelligence on targets or themselves. It facilitates the enumeration of attack surfaces by processing public information through flexible, modular analysis tools and provides features such as subdomain harvesting, IP address enrichment, login breach discovery, and social media profile analysis. Its extensible architecture allows users to create and share custom modules, enhancing its versatility in investigations.&lt;/p&gt;</description></item><item><title>thorium</title><link>https://rainmana.github.io/hackyfeed/tools/cisagov-thorium/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cisagov-thorium/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Thorium is a scalable file analysis and data generation platform designed to orchestrate various docker, VM, or shell tools at scale. Its primary use case is to facilitate the analysis of arbitrary files and repositories, while featuring easy tool import capabilities, static and dynamic analysis sandboxes, a RESTful API, and multi-tenant support for permission management. Additionally, Thorium supports comprehensive search functionalities and includes a wide array of pre-integrated analysis tools, making it suitable for both individual developers and collaborative analytics environments.&lt;/p&gt;</description></item><item><title>VMkatz</title><link>https://rainmana.github.io/hackyfeed/tools/nikaiw-vmkatz/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nikaiw-vmkatz/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VMkatz is a cybersecurity tool designed to extract Windows credentials and secrets directly from virtual machine memory snapshots and disk images without the need for full exfiltration. It supports various input formats, including VMware snapshots and VirtualBox saved states, allowing efficient retrieval of sensitive data such as NTLM hashes, DPAPI master keys, and Kerberos tickets directly from the hypervisor or NAS. Notably, VMkatz operates as a single static binary, requiring minimal setup and enabling rapid credential access in red team engagements.&lt;/p&gt;</description></item><item><title>zizmor</title><link>https://rainmana.github.io/hackyfeed/tools/zizmorcore-zizmor/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/zizmorcore-zizmor/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; &lt;code&gt;zizmor&lt;/code&gt; is a static analysis tool designed specifically for GitHub Actions, aimed at identifying common security vulnerabilities within CI/CD workflows. It detects issues such as template injection vulnerabilities, accidental credential leakage, excessive permission grants, and misleading &lt;code&gt;git&lt;/code&gt; references, among others. The tool&amp;rsquo;s primary use case is to enhance the security posture of automated workflows by providing insights and recommendations for remediation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="-zizmor"&gt;🌈 zizmor&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://zizmor.sh/"&gt;&lt;img src="https://img.shields.io/badge/%F0%9F%8C%88-zizmor-white?labelColor=white" alt="zizmor"&gt;&lt;/a&gt;
&lt;a href="https://github.com/zizmorcore/zizmor/actions/workflows/ci.yml"&gt;&lt;img src="https://github.com/zizmorcore/zizmor/actions/workflows/ci.yml/badge.svg" alt="CI"&gt;&lt;/a&gt;
&lt;a href="https://crates.io/crates/zizmor"&gt;&lt;img src="https://img.shields.io/crates/v/zizmor" alt="Crates.io"&gt;&lt;/a&gt;
&lt;a href="https://repology.org/project/zizmor/versions"&gt;&lt;img src="https://repology.org/badge/tiny-repos/zizmor.svg" alt="Packaging status"&gt;&lt;/a&gt;
&lt;a href="https://github.com/sponsors/woodruffw"&gt;&lt;img src="https://img.shields.io/github/sponsors/woodruffw?style=flat&amp;amp;logo=githubsponsors&amp;amp;labelColor=white&amp;amp;color=white" alt="GitHub Sponsors"&gt;&lt;/a&gt;
&lt;a href="https://discord.com/invite/PGU3zGZuGG"&gt;&lt;img src="https://img.shields.io/badge/Discord-%235865F2.svg?logo=discord&amp;amp;logoColor=white" alt="Discord"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;code&gt;zizmor&lt;/code&gt; is a static analysis tool for GitHub Actions.&lt;/p&gt;</description></item></channel></rss>