<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Yara on HackyFeed</title><link>https://rainmana.github.io/hackyfeed/tags/yara/</link><description>Recent content in Yara on HackyFeed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rainmana.github.io/hackyfeed/tags/yara/feed.xml" rel="self" type="application/rss+xml"/><item><title>APKiD</title><link>https://rainmana.github.io/hackyfeed/tools/rednaga-apkid/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/rednaga-apkid/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; APKiD is a tool designed to analyze Android APK files by identifying various compilers, packers, and obfuscators used in their creation, functioning similarly to PEiD for Windows applications. It supports configurable scanning options, outputs results in JSON format, and facilitates contributions for recognizing additional packaging methods. The tool is primarily used for Android security analysis, aiding in the detection of pirated or malicious applications.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id="readme"&gt;README&lt;/h2&gt;
&lt;h1 id="apkid"&gt;APKiD&lt;/h1&gt;
&lt;p&gt;&lt;a href="https://app.travis-ci.com/rednaga/APKiD"&gt;&lt;img src="https://app.travis-ci.com/rednaga/APKiD.svg?branch=master" alt="Build Status"&gt;&lt;/a&gt;
&lt;a href="https://pypi.org/project/apkid/"&gt;&lt;img src="https://img.shields.io/pypi/v/apkid.svg" alt="PyPI"&gt;&lt;/a&gt;
&lt;a href="https://pypi.org/project/apkid/"&gt;&lt;img src="https://img.shields.io/pypi/pyversions/apkid.svg" alt="PyPI - Python Version"&gt;&lt;/a&gt;
&lt;a href="https://pypi.org/project/apkid/"&gt;&lt;img src="https://img.shields.io/pypi/format/apkid.svg" alt="PyPI - Format"&gt;&lt;/a&gt;
&lt;a href="https://pypi.org/project/apkid/"&gt;&lt;img src="https://img.shields.io/pypi/l/apkid.svg" alt="PyPI - License"&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>LitterBox</title><link>https://rainmana.github.io/hackyfeed/tools/blacksnufkin-litterbox/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/blacksnufkin-litterbox/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; LitterBox is a security analysis tool that provides a controlled sandbox environment for red teams to develop, test, and validate exploitation payloads and evasion techniques against modern detection systems. It features advanced analysis capabilities, including file identification, executable and document analysis, and LLM-assisted insights for improved malware behavior examination. Additionally, LitterBox supports various platforms, including Windows and Linux, and integrates easily with Docker, enhancing its usability in diverse security scenarios.&lt;/p&gt;</description></item><item><title>Qu1cksc0pe</title><link>https://rainmana.github.io/hackyfeed/tools/cyb3rmx-qu1cksc0pe/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/cyb3rmx-qu1cksc0pe/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; Qu1cksc0pe is a comprehensive malware analysis tool designed to analyze various file types, including Windows executables, Linux binaries, Android APKs, and email files, utilizing both static and dynamic analysis methods. It provides detailed insights such as DLL usage, API functions, embedded executables, and MITRE ATT&amp;amp;CK mappings, facilitating in-depth evaluation of potentially malicious files. The tool also features a user-friendly web interface and robust error handling to enhance usability, especially within different operating system environments.&lt;/p&gt;</description></item><item><title>reversinglabs-yara-rules</title><link>https://rainmana.github.io/hackyfeed/tools/reversinglabs-reversinglabs-yara-rules/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/reversinglabs-reversinglabs-yara-rules/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The ReversingLabs YARA Rules repository provides a collection of high-quality YARA detection rules designed for threat hunters and incident responders to enhance threat detection capabilities within their environments. These rules emphasize precision and minimal false positives, utilizing clearly defined byte patterns and conditions to target unique malware functionalities. Continuous testing against a vast array of binaries ensures the rules maintain their effectiveness across various security solutions, particularly when integrated with the ReversingLabs Titanium Platform.&lt;/p&gt;</description></item><item><title>Ukraine-Cyber-Operations</title><link>https://rainmana.github.io/hackyfeed/tools/curated-intel-ukraine-cyber-operations/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://rainmana.github.io/hackyfeed/tools/curated-intel-ukraine-cyber-operations/</guid><description>&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;AI Summary:&lt;/strong&gt; The Ukraine Cyber Operations repository provides curated threat intelligence resources specifically tailored for organizations in Ukraine, focusing on the ongoing cyber operations related to the Russia-Ukraine conflict. Notable features include a comprehensive timeline of monthly threat reports from 2022 and 2023, contextualized indicators of compromise (IOCs) contributed by the Equinix Threat Analysis Center, and vetted open-source intelligence (OSINT) sources, enhancing the situational awareness and response capabilities of users.&lt;/p&gt;</description></item></channel></rss>