<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Shell on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/tags/shell/</link><description>Recent content in Shell on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/tags/shell/feed.xml" rel="self" type="application/rss+xml"/><item><title>ADB-Toolkit</title><link>https://rainmana.github.io/hackyfeed/tools/ashwin990-adb-toolkit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ashwin990-adb-toolkit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ADB-Toolkit is a comprehensive toolkit designed for testing and auditing Android Debug Bridge (ADB) configurations and vulnerabilities. Its primary use case lies in enhancing the security of Android devices by providing features such as device enumeration, file management, and installation of applications via ADB commands. Notable features include a user-friendly interface and extensive enhancements for common tasks associated with ADB, making it suitable for both developers and security researchers.&lt;/p&gt;</description></item><item><title>AdminHack</title><link>https://rainmana.github.io/hackyfeed/tools/mishakorzik-adminhack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mishakorzik-adminhack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AdminHack is a script designed to identify admin login pages and assess potential EAR vulnerabilities across web applications by utilizing multi-threading and an extensive wordlist. It supports various web technologies, including PHP, ASP, and HTML, and includes features such as web crawling, custom path support, and results exportation to files. This tool is particularly useful for penetration testing and security assessments of web environments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;img width="99.9%" src="https://raw.githubusercontent.com/mishakorzik/mishakorzik.menu.io/master/img/AdminHackImg/IMG-adc29ed25806177260186a4fbdbe70c9-V.jpg"/&gt;
&lt;p align="center"&gt;
&lt;a href="mailto:developer.mishakorzhik@gmail.com"&gt;&lt;img title="Report bug" src="https://img.shields.io/badge/email-developer.mishakorzhik%40gmail.com-darkred?style=for-the-badge&amp;logo=gmail"&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik/AdminHack"&gt;&lt;img title="Version" src="https://img.shields.io/badge/Version-1.7.6-red?style=for-the-badge&amp;logo="&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik/AdminHack/blob/main/LICENSE"&gt;&lt;img title="License" src="https://img.shields.io/badge/License-GNU-red?style=for-the-badge&amp;logo=gnu"&gt;&lt;/a&gt;
&lt;a href=""&gt;&lt;img title="Python" src="https://img.shields.io/badge/Python-3.x-orange?style=for-the-badge&amp;logo=python"&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik"&gt;&lt;img title="Report" src="https://img.shields.io/badge/Copyring-2021-yellow?style=for-the-badge&amp;logo=github"&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik"&gt;&lt;img title="Autor" src="https://img.shields.io/badge/Author-mishakorzik-yellow?style=for-the-badge&amp;logo=github"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
• &lt;a href="https://github.com/mishakorzik/AdminHack/blob/main/LICENSE"&gt;License&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik/AdminHack/issues"&gt;Issues&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik"&gt;Developer&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik/AdminHack/wiki"&gt;Wikipedia&lt;/a&gt; •
&lt;/p&gt;</description></item><item><title>ALHacking</title><link>https://rainmana.github.io/hackyfeed/tools/4lbh4cker-alhacking/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/4lbh4cker-alhacking/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ALHacking is a versatile ethical hacking toolkit designed for conducting various cybersecurity activities, including social media and phone attacks, user discovery, and webcam hacks. Notably, it features a powerful DDoS attack tool and is compatible with Android (via Termux), Linux, and Unix operating systems. Users can easily install the toolkit by cloning the repository and running the installation script from the terminal.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;Author: 4lbH4cker&lt;/p&gt;
&lt;h3 id="version-4"&gt;Version 4&lt;/h3&gt;
&lt;p&gt;(&lt;img src="https://raw.githubusercontent.com/4lbH4cker/ALHacking/main/alhacking.png" alt="image"&gt;&lt;/p&gt;</description></item><item><title>AllHackingTools</title><link>https://rainmana.github.io/hackyfeed/tools/mishakorzik-allhackingtools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mishakorzik-allhackingtools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; AllHackingTools is a penetration testing toolkit designed for Termux that automates the installation and management of various hacking tools. Its primary use case is to facilitate the setup and customization of a hacking environment on Termux, allowing users to quickly download and run tools directly from the interface. Notable features include an updated installer with enhanced design elements, streamlined updating capabilities, and improved system stability.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;img width="99.9%" src="https://raw.githubusercontent.com/mishakorzik/mishakorzik.menu.io/master/img/Logo/IMG-cd518796cb4b0527368a1b9dd67a8889-V.jpg"/&gt;
&lt;p align="center"&gt;
&lt;a href="https://github.com/mishakorzik/AllHackingTools"&gt;&lt;img title="Version" src="https://img.shields.io/badge/Version-2.7.4-yellow?style=for-the-badge&amp;logo="&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik/AllHackingTools/blob/main/LICENSE"&gt;&lt;img title="License" src="https://img.shields.io/badge/License-GNU-brightgreen?style=for-the-badge&amp;logo=gnu"&gt;&lt;/a&gt;
&lt;a href=""&gt;&lt;img title="Python" src="https://img.shields.io/badge/Python-3.8-red?style=for-the-badge&amp;logo=python"&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik"&gt;&lt;img title="Report" src="https://img.shields.io/badge/Copyring-2021-red?style=for-the-badge&amp;logo=github"&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik"&gt;&lt;img title="Autor" src="https://img.shields.io/badge/Author-mishakorzik-blue?style=for-the-badge&amp;logo=github"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
• &lt;a href="https://github.com/mishakorzik/AllHackingTools/blob/main/LICENSE"&gt;License&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik/AllHackingTools/issues"&gt;Issues&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik/AllHackingTools/projects"&gt;Project&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik/AllHackingTools/wiki"&gt;Wikipedia&lt;/a&gt; •
&lt;/p&gt;</description></item><item><title>Android-PIN-Bruteforce</title><link>https://rainmana.github.io/hackyfeed/tools/urbanadventurer-android-pin-bruteforce/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/urbanadventurer-android-pin-bruteforce/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Android-PIN-Bruteforce is a tool that allows users to unlock Android devices by executing a brute-force attack on the lockscreen PIN. Utilizing a rooted Kali Nethunter phone connected via USB OTG, it emulates keyboard input to automatically input and retry PIN combinations, supporting lengths from 1 to 10 digits and providing features such as configurable delays, optimized PIN lists, and the ability to bypass phone pop-ups. The tool does not require the locked device to be rooted and works across various Android versions.&lt;/p&gt;</description></item><item><title>apk.sh</title><link>https://rainmana.github.io/hackyfeed/tools/ax-apk.sh/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ax-apk.sh/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; apk.sh is a Bash script designed to streamline the reverse engineering of Android applications by automating tasks such as pulling, decoding, rebuilding, and patching APK files. It incorporates apktool for disassembling and reassembling resources, supports direct bytecode manipulation to prevent decompilation errors, and facilitates the integration of the frida-gadget for dynamic analysis without requiring a rooted device. Notable features include support for app bundles, multi-architecture compatibility, and code signing.&lt;/p&gt;</description></item><item><title>asn</title><link>https://rainmana.github.io/hackyfeed/tools/nitefood-asn/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/nitefood-asn/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The ASN Lookup Tool and Traceroute Server is a command line utility designed for network analysis, facilitating OSINT investigations through various capabilities including ASN lookup, RPKI validity checks, and geolocation of IP addresses. Key features include JSON output for API integration, support for querying multiple simultaneous targets, and integration with Shodan for reconnaissance without direct interaction with the target systems. This tool is particularly useful in incident response scenarios, providing comprehensive network data insights while maintaining stealth.&lt;/p&gt;</description></item><item><title>awesome-hacker-search-engines</title><link>https://rainmana.github.io/hackyfeed/tools/edoardottt-awesome-hacker-search-engines/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/edoardottt-awesome-hacker-search-engines/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome Hacker Search Engines is a curated repository of search engines specifically designed for penetration testing, vulnerability assessments, and red/blue team operations. It categorizes various resources including general search engines, servers, vulnerabilities, exploits, and more, providing tools for effective reconnaissance and threat intelligence gathering. Notable features include links to specialized engines like Shodan and the NIST NVD, enabling streamlined access to critical information for security professionals.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;
 &lt;b&gt;Awesome Hacker Search Engines&lt;/b&gt; &lt;img src="https://raw.githubusercontent.com/edoardottt/images/main/awesome-hacker-search-engines/awesome.svg"/&gt;
&lt;/h1&gt;
&lt;p align="center"&gt;
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
&lt;/p&gt;</description></item><item><title>Awesome-OSINT-For-Everything</title><link>https://rainmana.github.io/hackyfeed/tools/astrosp-awesome-osint-for-everything/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/astrosp-awesome-osint-for-everything/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Awesome OSINT For Everything is a comprehensive repository of OSINT tools and websites aimed at penetration testing, red teaming, information gathering, and bug bounty initiatives. It organizes a wide array of resources categorized by specific use cases such as recon, threat intelligence, social media analysis, and more, making it a valuable tool for cybersecurity professionals seeking to enhance their investigative capabilities. Notable features include a detailed index of tools across various domains, including geo-location, cryptocurrency, and privacy/security resources, providing users with extensive options for OSINT-related tasks.&lt;/p&gt;</description></item><item><title>Bashark</title><link>https://rainmana.github.io/hackyfeed/tools/redcode-labs-bashark/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/redcode-labs-bashark/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Bashark 2.0 is a post-exploitation toolkit designed for penetration testers and security researchers to facilitate operations during the post-exploitation phase of security audits. It offers a simple command-line interface, where users can source the &lt;code&gt;bashark.sh&lt;/code&gt; script to access various functions and commands, streamlining the process of managing compromised hosts. Key features include ease of use through a help menu and support for Bash scripting, making it a practical tool for enhancing post-exploitation activities.&lt;/p&gt;</description></item><item><title>blackarch</title><link>https://rainmana.github.io/hackyfeed/tools/blackarch-blackarch/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/blackarch-blackarch/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; BlackArch Linux is a penetration testing distribution based on Arch Linux, providing a repository of over 2,800 security tools organized by category. It offers flexible installation options, compatibility with existing Arch setups, and features a Live ISO for immediate testing. The toolset is aimed at penetration testers and security researchers for tasks such as forensics, reverse engineering, and network analysis.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="table-of-contents"&gt;Table of Contents&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#description"&gt;Description&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#overview"&gt;Overview&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#download-and-installation"&gt;Download and Installation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#key-features"&gt;Key Features&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#installation-instruction"&gt;Installation Instruction&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#usage"&gt;Usage&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#get-involved"&gt;Get Involved&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#contributing"&gt;Contributing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#contact"&gt;Contact&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#license"&gt;License&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#disclaimer"&gt;Disclaimer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#conclusion"&gt;Conclusion&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h1 id="description"&gt;Description&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;BlackArch Linux&lt;/strong&gt; is an Arch Linux–based penetration testing distribution for
penetration testers and security researchers. The repository contains &lt;a href="https://www.blackarch.org/tools.html"&gt;2850
tools&lt;/a&gt;. You can install tools individually
or in groups. BlackArch Linux is compatible with existing Arch installations.
For more information, see the installation instructions.&lt;/p&gt;</description></item><item><title>bypass-firewalls-by-DNS-history</title><link>https://rainmana.github.io/hackyfeed/tools/vincentcox-bypass-firewalls-by-dns-history/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vincentcox-bypass-firewalls-by-dns-history/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The &amp;ldquo;Bypass firewalls by abusing DNS history&amp;rdquo; tool automates the process of discovering direct IP addresses of servers behind web application firewalls (WAFs) by leveraging historical DNS records. Its primary use case is for security professionals, including bug bounty hunters, aiming to uncover misconfigured servers or outdated versions of websites that may be vulnerable to exploits. Notable features include the ability to output confidence levels based on HTML response similarities and support for fetching IPs of subdomains to enhance bypass attempts.&lt;/p&gt;</description></item><item><title>caido</title><link>https://rainmana.github.io/hackyfeed/tools/caido-caido/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/caido-caido/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Caido is a web application auditing tool designed for security professionals and enthusiasts, facilitating efficient and user-friendly assessments of web application security. It features regular software updates, a comprehensive dashboard for managing audits, and a community platform for user support and engagement.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;div align="center"&gt;
 &lt;img width="1000" alt="image" src="https://user-images.githubusercontent.com/6225588/211916659-567751d1-0225-402b-9141-4145c18b0834.png"&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;a href="https://caido.io/"&gt;Website&lt;/a&gt;
 &lt;span&gt;&amp;nbsp;&amp;nbsp;•&amp;nbsp;&amp;nbsp;&lt;/span&gt;
 &lt;a href="https://dashboard.caido.io/"&gt;Dashboard&lt;/a&gt;
 &lt;span&gt;&amp;nbsp;&amp;nbsp;•&amp;nbsp;&amp;nbsp;&lt;/span&gt;
 &lt;a href="https://docs.caido.io/" target="_blank"&gt;Docs&lt;/a&gt;
 &lt;span&gt;&amp;nbsp;&amp;nbsp;•&amp;nbsp;&amp;nbsp;&lt;/span&gt;
 &lt;a href="https://links.caido.io/roadmap"&gt;Roadmap&lt;/a&gt;
 &lt;span&gt;&amp;nbsp;&amp;nbsp;•&amp;nbsp;&amp;nbsp;&lt;/span&gt;
 &lt;a href="https://github.com/caido/caido/tree/main/brand"&gt;Branding&lt;/a&gt;
 &lt;span&gt;&amp;nbsp;&amp;nbsp;•&amp;nbsp;&amp;nbsp;&lt;/span&gt;
 &lt;a href="https://links.caido.io/www-discord" target="_blank"&gt;Discord&lt;/a&gt;
 &lt;br /&gt;
 &lt;hr /&gt;
&lt;/div&gt;
&lt;h2 id="-welcome"&gt;👋 Welcome&lt;/h2&gt;
&lt;p&gt;Welcome to Caido!&lt;/p&gt;
&lt;p&gt;Caido aims to help security professionals and enthusiasts audit web applications with efficiency and ease.&lt;/p&gt;</description></item><item><title>content</title><link>https://rainmana.github.io/hackyfeed/tools/complianceascode-content/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/complianceascode-content/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ComplianceAsCode/content is a framework designed to facilitate the creation and maintenance of security policy content for various platforms, including Linux distributions and applications like Firefox. It generates SCAP content, Ansible playbooks, and Bash scripts from easily editable YAML rule files, allowing organizations to automate compliance checks and remediations. Notable features include a powerful build system that reduces redundancy, multi-format outputs tailored to different organizational needs, and comprehensive documentation resources for users.&lt;/p&gt;</description></item><item><title>cs-suite</title><link>https://rainmana.github.io/hackyfeed/tools/securityftw-cs-suite/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/securityftw-cs-suite/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Cloud Security Suite (cs-suite) is a command-line tool designed for conducting security audits on various cloud environments, including AWS, GCP, Azure, and DigitalOcean. Its primary use case revolves around gathering data for Lynis audits, allowing users to specify environments, IP addresses, and user credentials while generating audit logs in JSON format for integration with SIEM tools. Notable features include the ability to handle user authentication, option to wipe previous audit reports, and flexible configurations for different cloud platforms.&lt;/p&gt;</description></item><item><title>DDexec</title><link>https://rainmana.github.io/hackyfeed/tools/arget13-ddexec/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/arget13-ddexec/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DDexec is a sophisticated tool designed for executing binaries by manipulating existing processes on Linux systems, utilizing memory hijacking techniques. Its notable features include the ability to run machine code directly, support for various shells, and the option to replace traditional file access methods with alternative seeking tools, which can obfuscate executable detection. The utility&amp;rsquo;s architecture minimizes dependencies, enhancing performance and potentially expanding compatibility to platforms like Android.&lt;/p&gt;</description></item><item><title>deepce</title><link>https://rainmana.github.io/hackyfeed/tools/stealthcopter-deepce/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/stealthcopter-deepce/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; DeepCE is a lightweight tool designed for Docker container enumeration, privilege escalation, and container escapes, written in pure shell script to maximize compatibility. It performs a variety of enumerations, including container-specific data collection and host system scanning, and offers multiple exploits such as Docker group privilege escalation and command execution in privileged mode. Notably, DeepCE minimizes disk writes during enumeration, making it suitable for stealthy assessments in containerized environments.&lt;/p&gt;</description></item><item><title>Dictionary-Of-Pentesting</title><link>https://rainmana.github.io/hackyfeed/tools/insightglacier-dictionary-of-pentesting/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/insightglacier-dictionary-of-pentesting/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Dictionary-Of-Pentesting is a comprehensive collection of dictionaries designed for penetration testing, vulnerability discovery, brute force attacks, and fuzzing. It categorizes resources such as authentication, file paths, ports, domains, and various default credentials, and continuously expands its listings to include regex patterns, user credentials, and application-specific payloads. Notable features include a broad range of default password lists, HTTP parameter enumeration, and the inclusion of specific patterns for cloud services and common vulnerabilities.&lt;/p&gt;</description></item><item><title>discover</title><link>https://rainmana.github.io/hackyfeed/tools/leebaird-discover/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/leebaird-discover/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Discover is a customizable suite of bash scripts designed to automate various tasks in penetration testing, including recon, scanning, enumeration, and malicious payload creation with Metasploit, ideal for use on Kali Linux or Ubuntu systems. Notable features include multiple reconnaissance options for domains and persons, automated scanning tools that utilize Nmap and other utilities, and web application testing facilities incorporating tools like Nikto and SSL analysers. The tool simplifies complex penetration testing workflows through an organized menu structure, enabling swift task execution.&lt;/p&gt;</description></item><item><title>droidReverse</title><link>https://rainmana.github.io/hackyfeed/tools/juude-droidreverse/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/juude-droidreverse/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; droidReverse is a comprehensive toolkit for Android reverse engineering, integrating multiple tools for decompiling APK files and analyzing bytecode. Its primary use case is facilitating the examination and modification of Android applications by converting APKs to readable formats and supporting various analysis capabilities, including malware detection. Notable features include support for multiple decompilation techniques, a graphical user interface for various tools, and capabilities for dynamic editing and package management.&lt;/p&gt;</description></item><item><title>f8x</title><link>https://rainmana.github.io/hackyfeed/tools/ffffffff0x-f8x/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ffffffff0x-f8x/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; f8x is an automated deployment tool focused on Infrastructure as Code (IaC) that leverages Terraform and Wails to facilitate multi-cloud deployment and project orchestration. Its primary use case includes setting up various environments for Red/Blue team operations, providing options for batch installations of essential tools, and deploying specific environments such as CTFs and middleware with minimal dependencies. Notable features include a variety of installation options for development and pentesting environments, and full compatibility with multiple Linux distributions.&lt;/p&gt;</description></item><item><title>Garud</title><link>https://rainmana.github.io/hackyfeed/tools/r0x4r-garud/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/r0x4r-garud/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Garud is an automation tool designed for reconnaissance, specifically targeting sub-domain enumeration and vulnerability scanning for injection points such as XSS, SSRF, and SSTI. It integrates multiple popular bug bounty tools, including Assetfinder, Subfinder, and Nuclei, to streamline the scanning process, outputting results systematically while notifying the user upon completion. Notable features include the ability to filter and identify low-hanging vulnerabilities, along with systematic data collection and reporting functionalities.&lt;/p&gt;</description></item><item><title>GH05T-INSTA</title><link>https://rainmana.github.io/hackyfeed/tools/gh05t-hunter5-gh05t-insta/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/gh05t-hunter5-gh05t-insta/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GH05T-INSTA is a cybersecurity tool designed for brute-force password recovery on Instagram accounts, suitable for both rooted and non-rooted Android devices. It features automatic IP address anonymization, error detection and resolution, and allows users to create custom password lists for enhanced effectiveness. While marketed as a hacking tool, the developers emphasize the legal implications and responsibility of ethical usage.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;The best way to hack Instagram&lt;/b&gt;&lt;/p&gt;
&lt;img src="https://media.tenor.com/qMER41oNWx8AAAAC/youve-been-hacked-gregory-brown.gif"&gt;
&lt;h1&gt;New Working Tool Link : &lt;a href="https://github.com/GH05T-HUNTER5/insta-breaker"&gt;Click&lt;/a&gt;&lt;/h1&gt;
&lt;h2 id="installation-kali"&gt;Installation {Kali}&lt;/h2&gt;
&lt;h3 id="bruteforce-gh05t-insta"&gt;BruteForce (GH05T-INSTA)&lt;/h3&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;apt install git
&lt;/code&gt;&lt;/pre&gt;&lt;pre tabindex="0"&gt;&lt;code&gt;git clone https://github.com/GH05T-HUNTER5/GH05T-INSTA
&lt;/code&gt;&lt;/pre&gt;&lt;pre tabindex="0"&gt;&lt;code&gt;cd GH05T-INSTA
&lt;/code&gt;&lt;/pre&gt;&lt;pre tabindex="0"&gt;&lt;code&gt;sudo bash setup.sh
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;code&gt;Configuring Tor server to open control port&lt;/code&gt;&lt;/p&gt;</description></item><item><title>Goohak</title><link>https://rainmana.github.io/hackyfeed/tools/1n3-goohak/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/1n3-goohak/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; GooHak is an automated tool designed for launching Google hacking queries against specified target domains to uncover vulnerabilities and facilitate enumeration. Its primary use case is to streamline the process of gathering information through tailored search queries, leveraging Google’s search capabilities. Notable features include straightforward command-line usage and dependencies tailored for Linux environments.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="goohak"&gt;GooHak&lt;/h1&gt;
&lt;h2 id="about"&gt;ABOUT:&lt;/h2&gt;
&lt;p&gt;Automatically launch google hacking queries against a target domain to find vulnerabilities and enumerate a target.&lt;/p&gt;</description></item><item><title>hardening</title><link>https://rainmana.github.io/hackyfeed/tools/konstruktoid-hardening/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/konstruktoid-hardening/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Hardening Ubuntu. Systemd edition.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Hardening Ubuntu. Systemd edition.&lt;/p&gt;</description></item><item><title>htrace.sh</title><link>https://rainmana.github.io/hackyfeed/tools/trimstray-htrace.sh/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/trimstray-htrace.sh/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; &lt;code&gt;htrace.sh&lt;/code&gt; is a shell script designed for troubleshooting and profiling HTTP/HTTPS communications, serving as a wrapper for various open-source security tools. Its primary use case includes diagnosing web application vulnerabilities, analyzing SSL configurations, and extracting response headers and body content through an array of customizable parameters and options. Notable features include the ability to integrate with tools such as testssl, Mozilla&amp;rsquo;s Observatory, and Nmap&amp;rsquo;s NSE for comprehensive security assessments.&lt;/p&gt;</description></item><item><title>htshells</title><link>https://rainmana.github.io/hackyfeed/tools/wireghoul-htshells/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/wireghoul-htshells/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; HTSHELLS is a toolkit that facilitates the deployment of self-contained web shells and various web-based attack vectors by utilizing .htaccess files. Its primary use case is for penetration testing and exploitation, allowing users to execute commands remotely and conduct denial-of-service, information disclosure, directory traversal, and other attacks through a structured directory of attack modules. Notable features include the ability to generate custom .htaccess files for specific attack types and execute commands via query parameters, enhancing flexibility for security assessments.&lt;/p&gt;</description></item><item><title>I-See-You</title><link>https://rainmana.github.io/hackyfeed/tools/viralmaniar-i-see-you/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/viralmaniar-i-see-you/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; I-See-You is a Bash and JavaScript tool designed for identifying the precise geographical location of users during social engineering or phishing attempts by utilizing their location coordinates. The tool allows attackers to gather crucial reconnaissance data, facilitating targeted attacks, and functions without requiring any additional software for phishing operations. Users can easily execute the tool by running a script and can modify the appearance of the phishing page to enhance deception.&lt;/p&gt;</description></item><item><title>ighack</title><link>https://rainmana.github.io/hackyfeed/tools/noob-hackers-ighack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/noob-hackers-ighack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Ighack is a Bash-based tool designed for testing the password strength of Instagram accounts through brute-force attacks, compatible with both rooted and non-rooted Android devices using Termux. It offers features such as a stable Instagram API, support for Tor to enhance anonymity during attacks, and both auto and manual attack options for user flexibility. The tool is maintained and provides a beginner-friendly interface, allowing easy installation and usage.&lt;/p&gt;</description></item><item><title>insta-hack</title><link>https://rainmana.github.io/hackyfeed/tools/incrediblehacker-insta-hack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/incrediblehacker-insta-hack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Insta-hack is a comprehensive tool designed for Instagram account compromise, featuring capabilities for information gathering, brute force attacks, and automated reporting. It operates on both Termux and Kali Linux without the need for root access and includes essential functionalities such as script updates and removals. The tool is intended strictly for educational use, with a clear emphasis on responsible usage.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="about-tool"&gt;About tool&lt;/h2&gt;
&lt;p&gt;All in one Instagram hacking tool available (Insta information gathering, Insta brute force, Insta account auto repoter)&lt;/p&gt;</description></item><item><title>instahack</title><link>https://rainmana.github.io/hackyfeed/tools/evildevill-instahack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/evildevill-instahack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Instahack is a robust brute-force framework designed for testing Instagram accounts, utilizing Bash and Python for efficient password testing. It features multi-threading, Tor integration for anonymity, and customizable attack options, enabling users to conduct ethical penetration testing and OSINT gathering. The tool supports auto-resume capabilities and is optimized for high-volume password attempts.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;🚀 Instahack - Advanced Instagram Brute Force Framework&lt;/h1&gt;
&lt;p align="center"&gt;
 &lt;a href="https://instagram.com/blckspidr"&gt;&lt;img src="https://img.shields.io/badge/MADE%20IN-Pakistan-success?style=for-the-badge"&gt;&lt;/a&gt;
 &lt;a href="https://youtube.com/Hackerwasii"&gt;&lt;img src="https://img.shields.io/badge/Tool-Instahack-green?style=for-the-badge"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/evildevill/instahack"&gt;&lt;img src="https://img.shields.io/github/v/release/evildevill/instahack?style=for-the-badge"&gt;&lt;/a&gt;
 &lt;a href="https://github.com/evildevill"&gt;&lt;img src="https://img.shields.io/badge/Maintained%3F-Yes-brightgreen?style=for-the-badge"&gt;&lt;/a&gt;
 &lt;img src="https://visitor-badge.laobi.icu/badge?page_id=HackerWaSi" alt="visitor badge"/&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
 &lt;img width="60%" src="https://github.com/evildevill/instahack/blob/master/assets/20210219_144319.jpg" alt="Instahack Screenshot"/&gt;
&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id="-about-instahack"&gt;🔍 About Instahack&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Instahack&lt;/strong&gt; is a high-performance Instagram brute-force tool crafted in Bash and Python, capable of testing millions of passwords efficiently. It uses &lt;strong&gt;Tor routing&lt;/strong&gt;, &lt;strong&gt;Instagram Android app signatures&lt;/strong&gt;, and &lt;strong&gt;customizable attack logic&lt;/strong&gt; for stealthy, anonymous operations.&lt;/p&gt;</description></item><item><title>inventory</title><link>https://rainmana.github.io/hackyfeed/tools/trickest-inventory/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/trickest-inventory/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Inventory is a tool designed for attack surface management of public bug bounty programs, aggregating DNS and web server data from over 800 organizations. Its primary use case is to assist bug bounty hunters in efficiently identifying and monitoring new assets while providing security teams with enhanced visibility into their assets. Notable features include automated data collection and transformation from multiple sources, duplicate program merging, and both passive and active enumeration workflows for comprehensive reconnaissance.&lt;/p&gt;</description></item><item><title>IpHack</title><link>https://rainmana.github.io/hackyfeed/tools/mishakorzik-iphack/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mishakorzik-iphack/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; IpHack is a Python-based tool designed for tracking IP locations and performing network testing. Its primary use case includes determining the geographical location of IP addresses, checking proxy status, and gathering detailed device information based on IP, with notable features such as an enhanced design, the ability to search for IPs behind Cloudflare, and various inquiry methods for making requests. The tool can be easily installed via pip and offers functionalities to track both direct IP addresses and domains, as well as to verify proxies.&lt;/p&gt;</description></item><item><title>ipranges</title><link>https://rainmana.github.io/hackyfeed/tools/lord-alfred-ipranges/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lord-alfred-ipranges/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; IPRanges is a tool that compiles and lists the IP address ranges for various cloud services and platforms, including Google, Amazon, Microsoft, and others. It provides separate text files for IPv4 and IPv6 addresses, categorized into unmerged and merged formats for efficiency. The dataset is updated daily and sourced from publicly available information, making it useful for network management and security configurations.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="ipranges"&gt;IPRanges&lt;/h1&gt;
&lt;p&gt;&lt;img src="logo.png" alt="IP Ranges"&gt;&lt;/p&gt;
&lt;p&gt;List all IP ranges from: Google (Cloud &amp;amp; GoogleBot), Bing (Bingbot), Amazon (AWS), Microsoft, Oracle (Cloud), DigitalOcean, GitHub, Facebook (Meta), Twitter, Linode, Telegram, OpenAI (GPTBot), CloudFlare, Vultr, Apple (Private Relay) and ProtonVPN with daily updates.&lt;/p&gt;</description></item><item><title>karma_v2</title><link>https://rainmana.github.io/hackyfeed/tools/dheerajmadhukar-karma_v2/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dheerajmadhukar-karma_v2/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Karma v2 is a passive open-source intelligence (OSINT) automated reconnaissance framework designed for information security researchers, penetration testers, and bug hunters to gather extensive details about target systems. It integrates with the Shodan Premium API to perform a variety of scans including SSL certificate verification, vulnerability detection, and asset discovery, and it features capabilities like fetching IP banners and interesting leaks across numerous protocols and services. The tool&amp;rsquo;s output can be displayed in the terminal and saved to files for further analysis.&lt;/p&gt;</description></item><item><title>keychain</title><link>https://rainmana.github.io/hackyfeed/tools/danielrobbins-keychain/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/danielrobbins-keychain/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Keychain is a tool designed to manage SSH and GPG keys efficiently by serving as a persistent frontend to &lt;code&gt;ssh-agent&lt;/code&gt; and &lt;code&gt;gpg-agent&lt;/code&gt;, allowing a single long-running instance per system. Its primary use case is to minimize the frequency of passphrase entries to once per reboot, enhancing security and convenience, especially for remote cron jobs. Notable features include seamless integration with key management, bash completion support for various command-line options, and user-friendly installation procedures.&lt;/p&gt;</description></item><item><title>libc-database</title><link>https://rainmana.github.io/hackyfeed/tools/niklasb-libc-database/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/niklasb-libc-database/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; libc-database is a tool for building and querying a database of libc offsets, primarily used for security research and exploitation analysis. It offers features such as identifying libraries via hashes, downloading and extracting libc libraries, and a web interface for user interaction. Users can also add custom libc versions and retrieve relevant offsets for specific symbols, enhancing their ability to work with different environments in cybersecurity applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="web-interface"&gt;Web interface&lt;/h2&gt;
&lt;p&gt;libc-database now has a web service and frontend. Visit &lt;a href="https://libc.rip/"&gt;https://libc.rip/&lt;/a&gt; to
try it out! Read &lt;a href="https://github.com/niklasb/libc-database/tree/master/searchengine"&gt;https://github.com/niklasb/libc-database/tree/master/searchengine&lt;/a&gt;
if you are interested in the API.&lt;/p&gt;</description></item><item><title>linux-exploit-suggester</title><link>https://rainmana.github.io/hackyfeed/tools/the-z-labs-linux-exploit-suggester/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/the-z-labs-linux-exploit-suggester/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Linux Exploit Suggester (LES) is a tool for auditing Linux systems to identify potential privilege escalation vulnerabilities, assessing the system&amp;rsquo;s exposure to known exploits by utilizing heuristic methods. It calculates the likelihood of exploitation for each vulnerability and verifies kernel hardening configurations, offering a comprehensive analysis of both compile-time and run-time security settings. Notable features include detailed exploit documentation, exposure assessment ratings, and integration with kernel hardening verification, making it a valuable resource for security assessments on Linux-based environments.&lt;/p&gt;</description></item><item><title>linux-smart-enumeration</title><link>https://rainmana.github.io/hackyfeed/tools/diego-treitos-linux-smart-enumeration/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/diego-treitos-linux-smart-enumeration/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Linux Smart Enumeration (LSE) is a shell script designed for penetration testing and Capture The Flag (CTF) challenges, aimed at gathering security-relevant information to assist in privilege escalation on Linux systems. Notable features include customizable verbosity levels, targeted section execution, process monitoring, and the ability to serve the script over the network for remote retrieval. The tool is intended to expose vulnerabilities gradually, prioritizing information based on its significance for privilege escalation.&lt;/p&gt;</description></item><item><title>linWinPwn</title><link>https://rainmana.github.io/hackyfeed/tools/lefayjey-linwinpwn/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/lefayjey-linwinpwn/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; linWinPwn is a comprehensive bash script designed for Active Directory penetration testing on Linux, integrating various tools for enumeration, vulnerability checks, modifications, and password dumping. It features both an interactive mode for manual checks and an automated mode for streamlined enumeration, allowing users to perform a wide array of security assessments including LDAP, Kerberos, and MSSQL interactions. Notably, it supports a range of authentication methods and can execute critical checks for known vulnerabilities such as NoPac and ZeroLogon, making it an essential tool for security professionals.&lt;/p&gt;</description></item><item><title>LME</title><link>https://rainmana.github.io/hackyfeed/tools/cisagov-lme/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cisagov-lme/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; CISA&amp;rsquo;s Logging Made Easy (LME) is an open-source log management platform designed for small to medium-sized organizations to centralize log collection, enhance threat detection, and enable real-time alerting for improved security. Key features include integration with open-source tools for enhanced detection, automated deployment via Ansible scripts, and customizable dashboards with Kibana, making it a scalable solution for securing infrastructure without the need for an existing Security Operations Center (SOC) or extensive resources.&lt;/p&gt;</description></item><item><title>lynis</title><link>https://rainmana.github.io/hackyfeed/tools/cisofy-lynis/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cisofy-lynis/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Lynis is a security auditing and hardening tool designed for UNIX-based systems, including Linux, macOS, and BSD. It conducts comprehensive security scans to evaluate system defenses, identify vulnerabilities, and suggest improvements for hardening systems against potential threats. Notable features include automated compliance testing, vulnerability detection, configuration management assistance, and adaptability for use by system administrators, auditors, and penetration testers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://linuxsecurity.expert/tools/lynis/"&gt;&lt;img src="https://badges.linuxsecurity.expert/tools/ranking/lynis.svg" alt="Linux Security Expert badge"&gt;&lt;/a&gt;
&lt;a href="https://travis-ci.org/CISOfy/lynis"&gt;&lt;img src="https://travis-ci.org/CISOfy/lynis.svg?branch=master" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://bestpractices.coreinfrastructure.org/projects/96"&gt;&lt;img src="https://bestpractices.coreinfrastructure.org/projects/96/badge" alt="CII Best Practices"&gt;&lt;/a&gt;
&lt;a href="https://cisofy.com/documentation/lynis/"&gt;Documentation&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Do you like this software? &lt;strong&gt;Star the project&lt;/strong&gt; and become a &lt;a href="https://github.com/CISOfy/lynis/stargazers"&gt;stargazer&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>my-arsenal-of-aws-security-tools</title><link>https://rainmana.github.io/hackyfeed/tools/toniblyx-my-arsenal-of-aws-security-tools/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/toniblyx-my-arsenal-of-aws-security-tools/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; My Arsenal of AWS Security Tools is a curated collection of open-source tools designed to enhance security in AWS environments through various functionalities, including defensive hardening, offensive testing, and security auditing. Notable features include comprehensive coverage of cloud security best practices and continuous monitoring capabilities, facilitating improved incident response and compliance with standards such as CIS and GDPR. This repository serves as a resource for security practitioners aiming to bolster their AWS security posture.&lt;/p&gt;</description></item><item><title>open-semantic-search</title><link>https://rainmana.github.io/hackyfeed/tools/opensemanticsearch-open-semantic-search/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/opensemanticsearch-open-semantic-search/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Open Semantic Search is an integrated search server and ETL framework designed for comprehensive document processing, including crawling, text extraction, text analysis, and named entity recognition—fully supporting various search functionalities such as fulltext, faceted, exploratory, and knowledge graph searches. Notable features include Docker container support, the ability to generate search user interfaces, and extensive automated testing capabilities, enabling seamless integration and deployment. This tool is particularly valuable for organizations needing robust, customizable search solutions across diverse data types and sources.&lt;/p&gt;</description></item><item><title>pi-pwnbox-rogueap</title><link>https://rainmana.github.io/hackyfeed/tools/koutto-pi-pwnbox-rogueap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/koutto-pi-pwnbox-rogueap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pi-PwnBox is a headless Raspberry Pi-based Rogue Access Point (RogueAP) designed for conducting Red Team engagements and WiFi security assessments. It leverages Alfa WiFi USB adapters for a variety of WiFi attacks and includes features such as remote access, a comprehensive setup process, and associated WiFi hacking resources. This tool is particularly suited for on-site testing and learning environments focused on WiFi security.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="pi-pwnbox-rocket--rogueap-satellite"&gt;Pi-PwnBox :rocket: -RogueAP :satellite:&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;Homemade (headless) PwnBox / RogueAP based on Raspberry Pi &amp;amp; Alfa WiFi USB Adapters.&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>pwncat</title><link>https://rainmana.github.io/hackyfeed/tools/cytopia-pwncat/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cytopia-pwncat/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Pwncat is a powerful networking tool that enhances the capabilities of traditional netcat by incorporating advanced features such as evasion techniques for firewalls and intrusion detection/prevention systems, along with support for both bind and reverse shells. Its self-injecting shell functionality and extensive scripting support using Python make it particularly effective for penetration testing and exploitation scenarios. Notably, it facilitates seamless port forwarding and maintains a user-friendly interface for enhanced usability in complex network environments.&lt;/p&gt;</description></item><item><title>RamiGPT</title><link>https://rainmana.github.io/hackyfeed/tools/m507-ramigpt/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m507-ramigpt/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; RamiGPT is an AI-driven offensive security tool that facilitates privilege escalation to root accounts using OpenAI&amp;rsquo;s technology and PwnTools. Its primary use case involves quickly exploiting vulnerabilities across various systems, achieving root access in under a minute, as demonstrated by its performance on multiple VulnHub scenarios. The tool features a user-friendly GUI and seamless integration with Docker for easy deployment and configuration, leveraging tools like BeRoot and LinPEAS for effective enumeration.&lt;/p&gt;</description></item><item><title>randar-explanation</title><link>https://rainmana.github.io/hackyfeed/tools/spawnmason-randar-explanation/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/spawnmason-randar-explanation/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Randar is a Minecraft exploit targeting versions Beta 1.8 to 1.12.2 that uses LLL lattice reduction to manipulate the game&amp;rsquo;s random number generator, &lt;code&gt;java.util.Random&lt;/code&gt;, allowing attackers to derive the precise coordinates of other players&amp;rsquo; locations based on item drop positions from mined blocks. The exploit hinges on a vulnerability in the game&amp;rsquo;s code, where improper reuse of RNG instances can be exploited to track players across vast distances, making it particularly significant on anarchic servers like 2b2t, where player anonymity and location security are critical. Notable features include the ability to reverse-engineer the RNG state to pinpoint player coordinates efficiently and the reliance on advanced mathematical techniques to achieve this.&lt;/p&gt;</description></item><item><title>Ransomware</title><link>https://rainmana.github.io/hackyfeed/tools/err0r-ica-ransomware/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/err0r-ica-ransomware/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Ransomware collection repository provides a suite of ransomware scripts designed for educational and testing purposes. Users are cautioned against executing these scripts on their devices due to their malicious nature. Key features include compatibility with multiple operating systems such as Termux, Kali Linux, Ubuntu, and others, thereby making it a versatile tool for research and development in cybersecurity contexts.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://i.postimg.cc/qJwVsmT0/OIG3-3.jpg" alt="logo"&gt;&lt;/p&gt;
&lt;h1 id="-ransomwares-collection-"&gt;☣️ Ransomwares Collection ☣️&lt;/h1&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;"&gt;&lt;code class="language-diff" data-lang="diff"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#f92672"&gt;- Don&amp;#39;t Run Them on Your Device.
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#f92672"&gt;- Handle with caution 
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h2 id="-installation-"&gt;💿 Installation 💿&lt;/h2&gt;
&lt;p&gt;git clone &lt;a href="https://github.com/Err0r-ICA/Ransomware"&gt;https://github.com/Err0r-ICA/Ransomware&lt;/a&gt; &lt;br&gt;
cd Ransomware &lt;br&gt;
python3 Ransomware &lt;br&gt;&lt;/p&gt;</description></item><item><title>ReconPi</title><link>https://rainmana.github.io/hackyfeed/tools/x1mdev-reconpi/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/x1mdev-reconpi/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ReconPi is a lightweight reconnaissance tool designed for extensive domain analysis and asset discovery using a Raspberry Pi or a VPS. Its primary functionality includes resolving domain names, subdomain enumeration, vulnerability scanning using Nmap, and integrating tools like Nuclei for template-based security assessments. Notable features include automated reporting, Slack notifications, and easy installation through a straightforward script, making it accessible for cyber reconnaissance tasks.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="recon-pi"&gt;Recon Pi&lt;/h1&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;__________ __________.__ 
\______ \ ____ ____ ____ ____\______ \__|
 | _// __ \_/ ___\/ _ \ / \| ___/ |
 | | \ ___/\ \__( &amp;lt;_&amp;gt; ) | \ | | |
 |____|_ /\___ &amp;gt;\___ &amp;gt;____/|___| /____| |__|
 \/ \/ \/ \/ 
 
			v2.2 - @x1m_martijn 
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;ReconPi - A lightweight recon tool that performs extensive reconnaissance with the latest tools using a Raspberry Pi.&lt;/p&gt;</description></item><item><title>ReverseAPK</title><link>https://rainmana.github.io/hackyfeed/tools/1n3-reverseapk/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/1n3-reverseapk/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; ReverseAPK is a tool designed for the analysis and reverse engineering of Android applications, enabling users to quickly decompile APK files into Java and Smali formats. Its notable features include static source code analysis to identify common vulnerabilities, automatic extraction of files, and comprehensive evaluation of the AndroidManifest.xml for security risks associated with application behavior.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://github.com/1N3/ReverseAPK/blob/master/logo.png" alt="alt tag"&gt;&lt;/p&gt;
&lt;h1 id="reverseapk"&gt;ReverseAPK&lt;/h1&gt;
&lt;p&gt;Credits: @xer0dayz&lt;/p&gt;
&lt;p&gt;Website: &lt;a href="https://sn1persecurity.com"&gt;https://sn1persecurity.com&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Version: 1.2&lt;/p&gt;
&lt;h2 id="about"&gt;ABOUT:&lt;/h2&gt;
&lt;p&gt;Quickly analyze and reverse engineer Android applications.&lt;/p&gt;</description></item><item><title>sandmap</title><link>https://rainmana.github.io/hackyfeed/tools/trimstray-sandmap/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/trimstray-sandmap/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; sandmap is a reconnaissance tool that enhances the capabilities of the Nmap engine, providing a simplified command line interface for automating and expediting network and system scanning processes. It offers 31 modules with 459 predefined scan profiles, support for the Nmap Scripting Engine (NSE), and integration with TOR for enhanced privacy during scans, allowing users to execute multiple scans simultaneously.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;sandmap&lt;/h1&gt;
&lt;p align="center"&gt;
 &lt;a href="https://travis-ci.org/trimstray/sandmap"&gt;
 &lt;img src="https://travis-ci.org/trimstray/sandmap.svg?branch=master" alt="Travis-CI"&gt;
 &lt;/a&gt;
 &lt;a href="https://img.shields.io/badge/Version-v1.2.0-lightgrey.svg"&gt;
 &lt;img src="https://img.shields.io/badge/Version-v1.2.0-lightgrey.svg" alt="Version"&gt;
 &lt;/a&gt;
 &lt;a href="https://inventory.rawsec.ml/tools.html#Sandmap"&gt;
 &lt;img src="https://inventory.rawsec.ml/img/badges/Rawsec-inventoried-FF5050_flat.svg" alt="Rawsec's CyberSecurity Inventory"&gt;
 &lt;/a&gt;
 &lt;a href="https://blackarch.org/tools.html"&gt;
 &lt;img src="https://img.shields.io/badge/BlackArch-available-red.svg" alt="BlackArch Repository"&gt;
 &lt;/a&gt;
 &lt;a href="http://www.gnu.org/licenses/"&gt;
 &lt;img src="https://img.shields.io/badge/license-GNU-blue.svg" alt="License"&gt;
 &lt;/a&gt;
&lt;/p&gt;
&lt;h5 align="center"&gt;
 &lt;a href="#description"&gt;Description&lt;/a&gt;
 • &lt;a href="#how-to-use"&gt;How To Use&lt;/a&gt;
 • &lt;a href="#command-line"&gt;Command Line&lt;/a&gt;
 • &lt;a href="#configuration"&gt;Configuration&lt;/a&gt;
 • &lt;a href="#requirements"&gt;Requirements&lt;/a&gt;
 • &lt;a href="#other"&gt;Other&lt;/a&gt;
 • &lt;a href="#contributing"&gt;Contributing&lt;/a&gt;
 • &lt;a href="#license"&gt;License&lt;/a&gt;
 • &lt;a href="https://github.com/trimstray/sandmap/wiki"&gt;Wiki&lt;/a&gt;
&lt;/h5&gt;
&lt;br&gt;
&lt;p align="center"&gt;
 &lt;img src="https://i.imgur.com/9a97M2S.gif" alt="Master"&gt;
&lt;/p&gt;</description></item><item><title>securityonion</title><link>https://rainmana.github.io/hackyfeed/tools/security-onion-solutions-securityonion/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/security-onion-solutions-securityonion/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Security Onion 2.4 is an open-source Linux distribution for intrusion detection, network monitoring, and log management. Its primary use case is to provide security operations teams with tools to detect and respond to threats through features such as alert management, detailed dashboards, and packet capture (PCAP) capabilities. Notable functionalities include a hunting interface, customizable detection rules, and comprehensive configuration options, facilitating a proactive approach to cybersecurity.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h2 id="security-onion-24"&gt;Security Onion 2.4&lt;/h2&gt;
&lt;p&gt;Security Onion 2.4 is here!&lt;/p&gt;</description></item><item><title>sharkjack-payloads</title><link>https://rainmana.github.io/hackyfeed/tools/hak5-sharkjack-payloads/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/hak5-sharkjack-payloads/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Shark Jack Payload Library provides a collection of community-driven payloads and extensions specifically designed for the Hak5 Shark Jack device, utilizing DuckyScript™ and Bash. Its primary use case is to enrich the functionality of the Shark Jack with customizable scripts for cybersecurity tasks, while also encouraging developer contributions for new payloads. Notable features include a platform for community collaboration and integration with Payload Studio for seamless payload creation.&lt;/p&gt;</description></item><item><title>Sn1per</title><link>https://rainmana.github.io/hackyfeed/tools/1n3-sn1per/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/1n3-sn1per/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Sn1per is an automated penetration testing and attack surface management tool that enhances vulnerability scanning by integrating both commercial and open-source scanners to identify hidden assets and vulnerabilities within an organization&amp;rsquo;s environment. It streamlines the security assessment process through automation, providing deep and continuous security insights suitable for organizations of all sizes. Notable features include its capability to discover and prioritize risks, saving time and resources in the vulnerability management lifecycle.&lt;/p&gt;</description></item><item><title>SocialBox-Termux</title><link>https://rainmana.github.io/hackyfeed/tools/samsesh-socialbox-termux/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/samsesh-socialbox-termux/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SocialBox-Termux is a brute-force attack framework designed for social media platforms such as Facebook, Gmail, Instagram, and Twitter. It facilitates penetration testing by automating the login attempts using various credentials, making it useful for security professionals. Notable features include compatibility with Termux on Android, easy installation via a shell script, and the ability to run under a VPN for enhanced privacy.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="socialbox-termux"&gt;SocialBox-Termux&lt;/h1&gt;
&lt;p&gt;SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By samsesh&lt;/p&gt;</description></item><item><title>stego-toolkit</title><link>https://rainmana.github.io/hackyfeed/tools/dominicbreuker-stego-toolkit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/dominicbreuker-stego-toolkit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Stego-Toolkit is a Docker image designed for tackling steganography challenges frequently encountered in CTF platforms. It comes pre-loaded with a variety of popular tools and screening scripts that facilitate the analysis of images and audio files for hidden data, allowing users to effortlessly run command-line and GUI applications within a containerized environment. Notable features include automation scripts for file screening and support for both Linux and Windows tools via Wine, ensuring a comprehensive toolkit for steganography analysis.&lt;/p&gt;</description></item><item><title>SUDO_KILLER</title><link>https://rainmana.github.io/hackyfeed/tools/th3xace-sudo_killer/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/th3xace-sudo_killer/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; SUDO_KILLER is a cybersecurity tool designed for professionals such as pentesters and security auditors, focusing on privilege escalation vulnerabilities in Linux systems related to SUDO configuration and usage. It manually identifies issues such as misconfigurations, risky binaries, and version-based vulnerabilities (CVEs), enabling users to exploit these weaknesses for gaining root-level privileges. The tool provides a detailed checklist of potential local exploits and requires users to perform the exploitation process manually, ensuring a controlled approach to privilege escalation testing.&lt;/p&gt;</description></item><item><title>Sudomy</title><link>https://rainmana.github.io/hackyfeed/tools/screetsec-sudomy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/screetsec-sudomy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Sudomy is a subdomain enumeration and analysis tool designed for advanced automated reconnaissance and OSINT activities. It features both active and passive enumeration methods, utilizing efficient techniques such as DNS brute-forcing via Gobuster and data collection from 22 curated third-party sources. Additional capabilities include subdomain testing, virtual host classification, port scanning, and technology identification, making it a comprehensive solution for penetration testing and bug bounty applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="sudomy"&gt;Sudomy&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://github.com/Screetsec/Sudomy/blob/master/LICENSE.md"&gt;&lt;img src="https://img.shields.io/badge/license-MIT-red.svg" alt="License"&gt;&lt;/a&gt; &lt;a href="https://github.com/Screetsec/Sudomy/actions"&gt;&lt;img src="https://action-badges.now.sh/screetsec/sudomy" alt="Build Status"&gt;&lt;/a&gt; &lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/Release-1.2.1-red.svg?maxAge=259200" alt="Version"&gt;&lt;/a&gt; &lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/Supported_OS-Linux-yellow.svg" alt="Build"&gt;&lt;/a&gt; &lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/Supported_WSL-Windows-blue.svg" alt="Build"&gt;&lt;/a&gt; &lt;a href="https://github.com/screetsec/sudomy/issues"&gt;&lt;img src="https://img.shields.io/badge/contributions-welcome-brightgreen.svg?style=flat" alt="Contributions Welcome"&gt;&lt;/a&gt; &lt;a href="https://www.paypal.me/screetsec"&gt;&lt;img src="https://img.shields.io/badge/Donate-PayPal-green.svg" alt="Donate"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>T-LOAD</title><link>https://rainmana.github.io/hackyfeed/tools/noob-hackers-t-load/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/noob-hackers-t-load/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; T-load is a bash-based script designed for customizing the Termux terminal interface on both rooted and non-rooted Android devices. Its primary use case is to enhance the user experience by providing an attractive and engaging terminal environment, complete with sound effects and an updated layout. Notable features include an easy installation process, new interface options, and the ability to revert to the default terminal settings.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p align="center"&gt;
&lt;a href="https://bit.ly/3jPqXEB"&gt;&lt;img title="Made in INDIA" src="https://img.shields.io/badge/MADE%20IN-INDIA-SCRIPT?colorA=%23ff8100&amp;colorB=%23017e40&amp;colorC=%23ff0000&amp;style=for-the-badge"&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>TermuxCyberArmy</title><link>https://rainmana.github.io/hackyfeed/tools/err0r-ica-termuxcyberarmy/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/err0r-ica-termuxcyberarmy/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; TermuxCyberArmy is a cybersecurity toolkit designed for Termux, primarily facilitating various hacking and scripting tasks. Notable features include compatibility with multiple Linux distributions such as Kali Linux and Parrot OS, as well as ease of installation using basic command-line operations. The tool is particularly suited for security practitioners seeking to enhance their skills in penetration testing and ethical hacking.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://i.postimg.cc/xCkjVwLD/OIG3-t8bf-O0ft.jpg" alt="logo"&gt;&lt;/p&gt;
&lt;h2 id="update-19062024"&gt;Update 19/06/2024&lt;/h2&gt;
&lt;p&gt;Login form has been removed&lt;/p&gt;</description></item><item><title>TOP</title><link>https://rainmana.github.io/hackyfeed/tools/ghosttroops-top/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ghosttroops-top/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; TOP is a vulnerability cataloging tool designed for bug bounty hunters and penetration testers, focusing on proof-of-concept (PoC) exploits for various Common Vulnerabilities and Exposures (CVEs) from recent years. It compiles a list of notable CVEs along with their respective exploits and corresponding GitHub repositories, thereby facilitating ease of access and research for security professionals. Key features include organized yearly summaries of significant vulnerabilities, making it an essential resource for monitoring and exploiting security weaknesses.&lt;/p&gt;</description></item><item><title>uDork</title><link>https://rainmana.github.io/hackyfeed/tools/m3n0sd0n4ld-udork/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/m3n0sd0n4ld-udork/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; uDork is a Bash script designed for Google hacking, leveraging advanced search techniques to uncover sensitive information and detect web application versions without conducting direct attacks. The tool utilizes predefined dorks sourced from the Google Hacking Database, allowing users to find sensitive files, IoT devices, and security vulnerabilities efficiently. Notable features include speed improvements between requests and Docker support for easy deployment.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="udork---google-hacking-tool"&gt;uDork - Google Hacking Tool&lt;/h1&gt;
&lt;h6 id="author-m3n0sd0n4ld"&gt;Author: M3n0sD0n4ld&lt;/h6&gt;
&lt;h6 id="twitter-david_"&gt;Twitter: &lt;a href="https://twitter.com/David_Uton"&gt;@David_Uton&lt;/a&gt;&lt;/h6&gt;
&lt;h2 id="news"&gt;News&lt;/h2&gt;
&lt;h3 id="11062022"&gt;11/06/2022&lt;/h3&gt;
&lt;p&gt;I have some bad news to give, last week Facebook withdrew the service by which the tool made the requests, unfortunately the tool no longer works.&lt;/p&gt;</description></item><item><title>UserFinder</title><link>https://rainmana.github.io/hackyfeed/tools/mishakorzik-userfinder/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/mishakorzik-userfinder/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; UserFinder is a shell-based tool designed for identifying users across various social media platforms and gathering additional information. It enables users to perform queries and compile data efficiently, featuring an easy installation process and a straightforward command-line interface. Notable features include a user-friendly script execution with minimal setup requirements and a focus on social profiling capabilities.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;img width="99.9%" src="https://raw.githubusercontent.com/mishakorzik/UserFinder/main/IMG_20210816_222842.jpg"/&gt;
&lt;p align="center"&gt;
&lt;a href="mailto:developer.mishakorzhik@gmail.com"&gt;&lt;img title="Report bug" src="https://img.shields.io/badge/email-developer.mishakorzhik%40gmail.com-green?style=for-the-badge&amp;logo=gmail"&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik/UserFinder"&gt;&lt;img title="Version" src="https://img.shields.io/badge/Version-1.0.0-green?style=for-the-badge&amp;logo="&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik/UserFinder/blob/main/LICENSE"&gt;&lt;img title="License" src="https://img.shields.io/badge/License-GNU-yellow?style=for-the-badge&amp;logo=gnu"&gt;&lt;/a&gt;
&lt;a href=""&gt;&lt;img title="Python" src="https://img.shields.io/badge/Used-Shell-yellow?style=for-the-badge&amp;logo=shell"&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik"&gt;&lt;img title="Report" src="https://img.shields.io/badge/Copyring-2021-orange?style=for-the-badge&amp;logo=github"&gt;&lt;/a&gt;
&lt;a href="https://github.com/mishakorzik"&gt;&lt;img title="Autor" src="https://img.shields.io/badge/Author-mishakorzik-orange?style=for-the-badge&amp;logo=github"&gt;&lt;/a&gt;
&lt;/p&gt;
&lt;p align="center"&gt;
• &lt;a href="https://github.com/mishakorzik/UserFinder/blob/main/LICENSE"&gt;License&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik/UserFinder/issues"&gt;Issues&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik"&gt;Developer&lt;/a&gt; 
• &lt;a href="https://github.com/mishakorzik/UserFinder/wiki"&gt;Wikipedia&lt;/a&gt; •
&lt;p&gt;&lt;strong&gt;Find user in social and more informations!&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>Vegile</title><link>https://rainmana.github.io/hackyfeed/tools/screetsec-vegile/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/screetsec-vegile/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Vegile is a post-exploitation tool designed for maintaining stealthy backdoor/rootkit access on Linux systems. Its primary use case involves establishing persistent access to compromised hosts while enabling features such as process hiding and session unlimited capabilities in Metasploit. Notable functionalities include the ability to automatically restart hidden processes, ensuring persistent access even after termination, and support for various backdoor implementations, including those created with msfvenom.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="vegile---ghost-in-the-shell"&gt;Vegile - Ghost In The Shell&lt;/h1&gt;
&lt;p&gt;&lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/Vegile-Beta-brightgreen.svg?maxAge=259200" alt="Version"&gt;&lt;/a&gt;
&lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/Release-Stable-brightgreen.svg" alt="Stage"&gt;&lt;/a&gt;
&lt;a href=""&gt;&lt;img src="https://img.shields.io/badge/Supported_OS-Linux-orange.svg" alt="Build"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>venom</title><link>https://rainmana.github.io/hackyfeed/tools/r00t-3xp10it-venom/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/r00t-3xp10it-venom/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; VENOM is a metasploit shellcode generator and compiler that enables users to create and inject shellcode payloads in various formats such as C#, Python, Ruby, and executable formats like ELF and APK. Its primary use case lies in Red Team operations, where it assists in payload delivery through a web server and leverages automation to handle dependencies and remote connections seamlessly. Notable features include support for multiple scripting languages, integration with compilers for building executables, and functionalities similar to other popular evasion tools.&lt;/p&gt;</description></item><item><title>vps-audit</title><link>https://rainmana.github.io/hackyfeed/tools/vernu-vps-audit/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/vernu-vps-audit/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The VPS Security Audit Script is a comprehensive Bash tool designed for auditing the security and performance of Debian/Ubuntu-based virtual private servers. It performs extensive security checks, including SSH configuration, firewall status, and system update status, while also monitoring resource usage such as disk space and CPU. The script not only provides real-time color-coded feedback during execution but also generates a detailed report with improvement recommendations based on the audit findings.&lt;/p&gt;</description></item><item><title>webcopilot</title><link>https://rainmana.github.io/hackyfeed/tools/h4r5h1t-webcopilot/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/h4r5h1t-webcopilot/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; WebCopilot is an automation tool for security assessments that enumerates subdomains of a target domain and scans for vulnerabilities such as XSS, SQLi, and RCE. It employs various open-source tools for subdomain enumeration, active scanning, endpoint crawling, and filtering of vulnerability parameters, ultimately presenting the results in a structured manner. Notable features include comprehensive subdomain enumeration, endpoint crawling, and integration with multiple vulnerability scanning tools.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 align="center"&gt;&lt;a href="https://github.com/h4r5h1t/webcopilot/"&gt;WebCopilot&lt;/a&gt;&lt;/h1&gt;
&lt;h4 align="center"&gt;An automation tool that enumerate subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities.&lt;/h4&gt;
&lt;p align="center"&gt;
&lt;a href="https://twitter.com/h4r5h1t_hrs"&gt;&lt;img src="https://img.shields.io/twitter/follow/h4r5h1t_hrs?style=social"&gt;&lt;/a&gt;
&lt;a href="https://github.com/h4r5h1t?tab=followers"&gt;&lt;img src="https://img.shields.io/github/followers/h4r5h1t?style=social"&gt;&lt;/a&gt;
&lt;a href="https://github.com/h4r5h1t/webcopilot/issues"&gt;&lt;img src="https://img.shields.io/badge/contributions-welcome-brightgreen.svg?style=flat"&gt;&lt;/a&gt;
&lt;a href="https://github.com/h4r5h1t/webcopilot/blob/master/LICENSE"&gt;&lt;img src="https://img.shields.io/badge/License-MIT-yellow.svg"&gt;&lt;/a&gt;
&lt;a href="#"&gt;&lt;img src="https://img.shields.io/badge/Made%20with-Bash-1f425f.svg"&gt;&lt;/a&gt;
&lt;a href="#"&gt;&lt;img src="https://madewithlove.org.in/badge.svg"&gt;&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>wireless-carplay-dongle-reverse-engineering</title><link>https://rainmana.github.io/hackyfeed/tools/ludwig-v-wireless-carplay-dongle-reverse-engineering/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/ludwig-v-wireless-carplay-dongle-reverse-engineering/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Wireless Carplay Dongle Reverse Engineering tool provides a framework for gaining root access and modifying firmware on various Carlinkit wireless Carplay dongles, primarily aimed at enthusiasts looking to customize their devices. Key features include the ability to switch between firmware versions using both software and hardware methods, alongside insights into hardware components and their specifications. Additionally, the repository documents the challenges faced due to recent updates from Carlinkit that have hardened the firmware against reverse engineering.&lt;/p&gt;</description></item></channel></rss>