<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Thu, 09 Apr 2026 15:21:52 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/bestgithubhackingtools/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Ffuf (Fuzz Faster U Fool) - An Open Source Fast Web Fuzzing Tool]]></title><description><![CDATA[Ffuf - Fuzz Faster U Fool is a great tool used for fuzzing. It has become really popular lately with bug bounty hunters. Ffuf is used for fuzzing Get and Post data but can also be used for finding hidden]]></description><link>http://direct.ecency.com/bestethicalhackertools/@twr/ffuffuzzfasterufool-anopensourcefastwebfuzzingtool-fuhtradkqe</link><guid isPermaLink="true">http://direct.ecency.com/bestethicalhackertools/@twr/ffuffuzzfasterufool-anopensourcefastwebfuzzingtool-fuhtradkqe</guid><category><![CDATA[bestethicalhackertools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 08 Dec 2019 19:50:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrUcsNv7tRtPzCvhDgVX1MFsfrds3HPqqSviGAFfDEyJcXaEEA3yuJA6Bx4cS3wqmmrqMqZRC6QMtAcaPMqb1F1Zh18?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Nmap Automator - a tool I used during OSCP for simple recon]]></title><description><![CDATA[Nmap Automator is a great tool for initial port scans of a given ip address. It automates the scan techniques which I use on each host, I selected it over any other similar tool since it avoids unnecessary]]></description><link>http://direct.ecency.com/bestethicalhackertools/@twr/nmapautomator-atooliusedduringoscpforsimplerecon-6ibjmwukgk</link><guid isPermaLink="true">http://direct.ecency.com/bestethicalhackertools/@twr/nmapautomator-atooliusedduringoscpforsimplerecon-6ibjmwukgk</guid><category><![CDATA[bestethicalhackertools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Thu, 05 Dec 2019 15:05:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/MG5aEqKFcQi8KqD2wHMZMi2fpbjkaL86Q4MBEhpiajpZfymNq2i5rAYcVK7tbzsmV8SfsBhRceSAxpbqvrggTE8YShcULVpWA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Turbolist3r - An Automated Subdomain Scanning Tool]]></title><description><![CDATA[Turbolist3r is a subdomain enumeration tool which can identify subdomain takeovers. It is heavily based on sublist3r: Installation and usage git clone cd Turbolist3r/ pip3 install -r requirements.txt There]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/turbolist3r-anautomatedsubdomainscanningtool-mfpxzrt3y8</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/turbolist3r-anautomatedsubdomainscanningtool-mfpxzrt3y8</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 04 Dec 2019 14:40:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/5bEGgqZEHBMeTUEbspCueKMmbM74XfKNcaqXQx1qqswH1g9F1Tfm9RND7sKnDuzGWwFRfZL8PaQNk1NX98LarLGjzjiB6ddg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[webscreenshot.py | A Simple script that aids in testing large websites]]></title><description><![CDATA[Web Screenshot - webscreenshot.py is a great tool which comes in handy when a penetration tester needs to quickly identify potential vulnerabilities on a massive website. Installation and usage The]]></description><link>http://direct.ecency.com/bestethicalhackertools/@twr/webscreenshotpyasimplescriptthataidsintestinglargewebsites-d5hphszans</link><guid isPermaLink="true">http://direct.ecency.com/bestethicalhackertools/@twr/webscreenshotpyasimplescriptthataidsintestinglargewebsites-d5hphszans</guid><category><![CDATA[bestethicalhackertools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 03 Dec 2019 20:35:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/MG5aEqKFcQi8KqD2wHMZMi2fpbjkaL86Q4MBEhpiajpZfymNq2i5rAYcVK7tbzsmV8SfsBhRceSAxpfBLJRbymEF5eC5maZdQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[FinalRecon - An All In One OSINT Tool for Web Reconnaissance]]></title><description><![CDATA[Final Recon is a useful tool for gathering data about a target from open source resources, the tool is written in Python3. Installation steps It is really easy to install the tool from the official github]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/finalrecon-anallinoneosinttoolforwebreconnaissance-xwsme4hvmx</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/finalrecon-anallinoneosinttoolforwebreconnaissance-xwsme4hvmx</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 03 Dec 2019 15:20:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/FxX5caie56yp72JVBmabqxoDo76EPWpwGgxpRNBJvgJNr1WPN4BFYkBo9x1xo4XKpc7afbLpwww3f735XHAxtCbMQ6YzrPjXw6Wf5QeW5CM4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[DSXS | An open source, simple and effective XSS scanner that can be easily customized]]></title><description><![CDATA[Damn Small XSS Scanner (DSXS) is a great tool for finding cross site scripting vulnerabilities, the tool has been developed in Python 3. It is really simple and the code can be analysed and used for learning.]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/dsxsanopensourcesimpleandeffectivexssscannerthatcanbeeasilycustomized-w4gdyxrmrb</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/dsxsanopensourcesimpleandeffectivexssscannerthatcanbeeasilycustomized-w4gdyxrmrb</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sat, 23 Nov 2019 18:05:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrUcsNv7tRtPzCvhDgVX1MFsfrds3HPqqSviGAFfDEyJcXaEEA3yuJA6Bx4cS3wqmmrnxJXiTRkhcib9Wjr1iPdLDLr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[BoomER | An Open Source Post-Exploitation Tool To Exploit Local Vulnerabilities]]></title><description><![CDATA[BoomER is a Command-line interface python open-source framework fully developed in Python 3.X for post-exploitation of targets with the objective to exploit local vulnerabilities on the big three OS's]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/boomeranopensourcepost-exploitationtooltoexploitlocalvulnerabilities-v99jhhxy94</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/boomeranopensourcepost-exploitationtooltoexploitlocalvulnerabilities-v99jhhxy94</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 18 Sep 2019 14:05:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/EEEoA8oLaAxu1BBLYLQ7bShQysMvAGXhLbZ756KSqp1Vta8tbJ95ZU5ccDc6uodS6rNaQNo7547cbjNkTwM27gaD49wzh2sf6rA7kAd7uS3wUA5TAU1ieAf9jodhkSt8Z9odStkGJQqW6W5K75wJv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[4CAN V2 | A Raspberry Pi Project To Help Find Vulnerabilities in Modern Cars]]></title><description><![CDATA[4CAN V2 is a Raspberry Pi project created by the Cisco team in order to test the security of cars via the 4CAN bus, it can also send random payloads to automate this process. Background In the last decade,]]></description><link>http://direct.ecency.com/4canv2demonstration/@twr/4canv2araspberrypiprojecttohelpfindvulnerabilitiesinmoderncars-lwd2wbujzq</link><guid isPermaLink="true">http://direct.ecency.com/4canv2demonstration/@twr/4canv2araspberrypiprojecttohelpfindvulnerabilitiesinmoderncars-lwd2wbujzq</guid><category><![CDATA[4canv2demonstration]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Thu, 12 Sep 2019 19:20:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/2YRZBi4FZVHeXL7n7YbBjpQ6NM6KhL7QJpmn4BVBcXuzwD3YsLzYLQ18XdxyQmUT5M9rJYWDReLBmFzhgTmYVMpkrZ9kMosSYN2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Salsa-tools | A Collaboration of Tools For a Reverse Shell on Steroids]]></title><description><![CDATA[Salsa-tools is a collection of three tools programmed with C# used to take over a windows machine and bypass AV and get a reverse shell without the need for PowerShell on the victim machine. Salsa-Tools]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/salsa-toolsacollaborationoftoolsforareverseshellonsteroids-wwo9k8saya</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/salsa-toolsacollaborationoftoolsforareverseshellonsteroids-wwo9k8saya</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 06 Sep 2019 23:00:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrUcsNv7tRtPzCvhDgVX1MFsfrds3HPqqSviGAFfDEyJcXaEEA3yuJA6Bx4cS3wqmmgWMC49mF4YehxaStLUinM8JyU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Aquatone | An Open Source Domain Flyover Tool]]></title><description><![CDATA[Aquatone is a tool programmed by go-lang to inspect domains/check their status and also provide screenshots of the hosts it supports with numerous hosts at the same time. Installation 1 - Cloning the]]></description><link>http://direct.ecency.com/aquatonedemonstration/@twr/aquatoneanopensourcedomainflyovertool-bc789pf594</link><guid isPermaLink="true">http://direct.ecency.com/aquatonedemonstration/@twr/aquatoneanopensourcedomainflyovertool-bc789pf594</guid><category><![CDATA[aquatonedemonstration]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 04 Sep 2019 03:55:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/23KQwnti57stzCcFhWj7wg3tnqxkPok8chkAcLG9M8v5Xxzbtm74fA9Rx2S6iSbj2oGxS3o2DpSfESn5g9XhNZmsKRqxfXk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[A Malware Showcase | Understanding Malware With Python]]></title><description><![CDATA[Malware showcase is a Github repository that contains examples of malware usage and behavior, this repo should be used only for educational purposes or for experts who wish to expand on the usage for red]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/amalwareshowcaseunderstandingmalwarewithpython-kamat1831b</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/amalwareshowcaseunderstandingmalwarewithpython-kamat1831b</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 23 Aug 2019 12:50:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/mXkfdToSwHy4h1jQhTWHtNrVigXbdMMCxtK1oTsVhcdZX1o1dQLpb1AMJgKv3KWADiYkMudDVjUru5FocPzeyvkuvxXbBZ47RYh2rvefY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[A Malware Showcase | Understanding Malware With Python]]></title><description><![CDATA[Malware showcase is a Github repository that contains examples of malware usage and behavior, this repo should be used only for educational purposes or for experts who wish to expand on the usage for red]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/amalwareshowcaseunderstandingmalwarewithpython-k639day082</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/amalwareshowcaseunderstandingmalwarewithpython-k639day082</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 23 Aug 2019 04:05:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/3jpR3paJ37V8dUdpdQA8h25Rn5wApDeKBy6KKHAGYi5bkgxarfsucC4BM2soTu7qBc1z7jqVSd5g7aVxfYeiMFt3ehLRCmTEvBWNjdr4pKaZFs6Nv799XwRChpy84jHKncHtJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[DumpsterFire - A Tool That Generates Network Shenanigans to Facilitate Blue Team Training]]></title><description><![CDATA[DumpsterFire is an open-source tool made by blue team member to edit create and control dumpster payloads in order to create surface attacks and also facilitate the blue team process, its main purpose]]></description><link>http://direct.ecency.com/automation/@twr/dumpsterfire-atoolthatgeneratesnetworkshenaniganstofacilitateblueteamtraining-pyvbd0h0mk</link><guid isPermaLink="true">http://direct.ecency.com/automation/@twr/dumpsterfire-atoolthatgeneratesnetworkshenaniganstofacilitateblueteamtraining-pyvbd0h0mk</guid><category><![CDATA[automation]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 20 Aug 2019 15:05:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLy6zvChRH7j9QCxXa7kn1JGAzPjCpQux5DQVYAwJRDprBEfycXTwQJG6DTXyq9FsKH7UXaTQV2fB4TYuJoAPJ9KwAqEyGAfWs2FYRiCJ1U6SKSvDqnX1GUk7SW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[CMSeeK | An Open Source Content Management System Detection and Exploitation Tool]]></title><description><![CDATA[CMSeek is an open-source tool that analyzes the regex of websites in order to detect flaws and content management system used like Joomla, Wordpress, Magento, etc ... Installation git clone cd CMSeek/]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/cmseekanopensourcecontentmanagementsystemdetectionandexploitationtool-r7zsxly9qj</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/cmseekanopensourcecontentmanagementsystemdetectionandexploitationtool-r7zsxly9qj</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 19 Aug 2019 14:20:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBr4rFUo5GyYyWxdnuHExLUZnEzuw3AFi4sN7w4sjNh22FwQmu65pgo7xFYDAPNaQpDTX26zeoj3hxkpQpW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[SniffAir - An Open Source Wireless Security Framework]]></title><description><![CDATA[SniffAir is an open source tool made for sophisticated wireless attacks and data capture, it handle all types of pcap files and analyze traffic through the network interface whilst looking for potential]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/sniffair-anopensourcewirelesssecurityframework-fmfmt3gzus</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/sniffair-anopensourcewirelesssecurityframework-fmfmt3gzus</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 13 Aug 2019 13:50:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrUcsNv7tRtPzCvhDgVX1MFsfrds3HPqqSviGAFfDEyJcXaEEA3yuJA6Bx4cS3wqmmgTwfPboBUSBK2JvNnZUbtRwbk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[WhatWeb – A Very Handy Open Source Web Scanner]]></title><description><![CDATA[Definition Whatweb is web scanner written in Ruby to identify and recognise technologies used by a website including CMS, blogging platforms, statistic/analytics packages, Javascript libraries and much]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/whatwebaveryhandyopensourcewebscanner-zv6cgw1rqb</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/whatwebaveryhandyopensourcewebscanner-zv6cgw1rqb</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sat, 10 Aug 2019 20:05:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/mXkfdToSwHy4h1jQhTWHtNrVigXbdMMCxtK1oTsVhcdZX1o1dQLpb1AMJgKv3KWADiYkMudDVjUru4ZCDjGXYFjD1zXa5JDzEmn1fi2nA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Wifi Pumpkin – WiFi MITM Attack and Audit Framework]]></title><description><![CDATA[Wifi Pumpkin is a security audit framework used to test the security of wifi against threats like man in the middle attacks. The tool also can create rogue Wi-Fi access points to hack WiFi via deauth attacks]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/wifipumpkinwifimitmattackandauditframework-6cvbad42a2</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/wifipumpkinwifimitmattackandauditframework-6cvbad42a2</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 09 Aug 2019 13:15:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/2r8F9rTBenJQstst1uynghrX8KfVsMRABQCve2x2UaAUpxsPn7jyc4XP8J9QBASmBnx1T7skRfJUpzN3GttkEKUaAcTR9fbRnAj6n1Fud65Zbkz4VR3LmVTBkvN8KKwfc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[TheFatRat - A Convenient Exploitation Tool]]></title><description><![CDATA[TheFatRat is an easy to use tool which helps in generating backdoors, system exploitation, post exploitation attacks, browser attacks, DLL files, FUD payloads against Linux, Mac OS X, Windows, and Android.]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/thefatrat-aconvenientexploitationtool-xmfhbo7xum</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/thefatrat-aconvenientexploitationtool-xmfhbo7xum</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 07 Aug 2019 17:45:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBr4rFUo5GyYyWxdnuHExLUZnEzuw3AFi4sN7w4sjNh22FwQmu65pgo7xFYDAPNaQpDTX2GcnPYyYzmh8cW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[BeRoot - A Post Exploitation Privilege Escalation Tool]]></title><description><![CDATA[BeRoot is a post-exploitation tool to check for common misconfigurations which can allow an attacker to escalate their privileges. The main goal of BeRoot is to print only the information that has been]]></description><link>http://direct.ecency.com/berootdemonstration/@twr/beroot-apostexploitationprivilegeescalationtool-a40ifzy3tx</link><guid isPermaLink="true">http://direct.ecency.com/berootdemonstration/@twr/beroot-apostexploitationprivilegeescalationtool-a40ifzy3tx</guid><category><![CDATA[berootdemonstration]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sat, 03 Aug 2019 08:45:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/hgjbks2vRxviCcTEcQZJDMP7ycru6jvpknK76u9SY49Er9dDrUa5mEomMbTXYeZepry1VQeWmpQD71kukQ6GTRUXXk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cloakify - A Tool to Mask Your Data in Plain Sight]]></title><description><![CDATA[Cloakify Factory is a tool to transforms any file type into a list of harmless and even useless looking strings. This ability allows for you to hide a data file in plain sight and also transfer it over]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/cloakify-atooltomaskyourdatainplainsight-ck7vuyt5sj</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/cloakify-atooltomaskyourdatainplainsight-ck7vuyt5sj</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 30 Jul 2019 18:44:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/23KQwnti57stzCcFhWj7wg3tnqxkPok8chkAcLG9M8v5Xxzbtm74fA9Rx2S6iSbj2oGxS3o2DpSfE5TMsW4Ccg5so6YzWDc?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>