<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 14 Apr 2026 03:42:39 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/freehackingtools/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Facebook Launches Pysa – Instagram Security Tool – As Open Source]]></title><description><![CDATA[Facebook has recently released Pysa as open source after its success with Instagram security. The tool specifically aims at security teams facilitating bug fixes. Facebook Open Source Pysa Tool Facebook]]></description><link>http://direct.ecency.com/cybersecurity/@twr/facebooklaunchespysainstagramsecuritytoolasopensource-ud3sk3pfq8</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@twr/facebooklaunchespysainstagramsecuritytoolasopensource-ud3sk3pfq8</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 11 Aug 2020 22:30:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/8SzwQc8j2KJaNXywTd35FmuBgqmH1XbTzf75TEmRcrEVSAAd2g5nM5HKhxRpZ9j17hJcLL2vEnbwdY71S7cx7LJrXRyKGNXB89p5CEXwqxf5wrcSmux?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Nmap Automator - a tool I used during OSCP for simple recon]]></title><description><![CDATA[Nmap Automator is a great tool for initial port scans of a given ip address. It automates the scan techniques which I use on each host, I selected it over any other similar tool since it avoids unnecessary]]></description><link>http://direct.ecency.com/bestethicalhackertools/@twr/nmapautomator-atooliusedduringoscpforsimplerecon-6ibjmwukgk</link><guid isPermaLink="true">http://direct.ecency.com/bestethicalhackertools/@twr/nmapautomator-atooliusedduringoscpforsimplerecon-6ibjmwukgk</guid><category><![CDATA[bestethicalhackertools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Thu, 05 Dec 2019 15:05:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/MG5aEqKFcQi8KqD2wHMZMi2fpbjkaL86Q4MBEhpiajpZfymNq2i5rAYcVK7tbzsmV8SfsBhRceSAxpbqvrggTE8YShcULVpWA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Turbolist3r - An Automated Subdomain Scanning Tool]]></title><description><![CDATA[Turbolist3r is a subdomain enumeration tool which can identify subdomain takeovers. It is heavily based on sublist3r: Installation and usage git clone cd Turbolist3r/ pip3 install -r requirements.txt There]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/turbolist3r-anautomatedsubdomainscanningtool-mfpxzrt3y8</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/turbolist3r-anautomatedsubdomainscanningtool-mfpxzrt3y8</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 04 Dec 2019 14:40:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/5bEGgqZEHBMeTUEbspCueKMmbM74XfKNcaqXQx1qqswH1g9F1Tfm9RND7sKnDuzGWwFRfZL8PaQNk1NX98LarLGjzjiB6ddg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[DSXS | An open source, simple and effective XSS scanner that can be easily customized]]></title><description><![CDATA[Damn Small XSS Scanner (DSXS) is a great tool for finding cross site scripting vulnerabilities, the tool has been developed in Python 3. It is really simple and the code can be analysed and used for learning.]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/dsxsanopensourcesimpleandeffectivexssscannerthatcanbeeasilycustomized-w4gdyxrmrb</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/dsxsanopensourcesimpleandeffectivexssscannerthatcanbeeasilycustomized-w4gdyxrmrb</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sat, 23 Nov 2019 18:05:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrUcsNv7tRtPzCvhDgVX1MFsfrds3HPqqSviGAFfDEyJcXaEEA3yuJA6Bx4cS3wqmmrnxJXiTRkhcib9Wjr1iPdLDLr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Salsa-tools | A Collaboration of Tools For a Reverse Shell on Steroids]]></title><description><![CDATA[Salsa-tools is a collection of three tools programmed with C# used to take over a windows machine and bypass AV and get a reverse shell without the need for PowerShell on the victim machine. Salsa-Tools]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/salsa-toolsacollaborationoftoolsforareverseshellonsteroids-wwo9k8saya</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/salsa-toolsacollaborationoftoolsforareverseshellonsteroids-wwo9k8saya</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 06 Sep 2019 23:00:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrUcsNv7tRtPzCvhDgVX1MFsfrds3HPqqSviGAFfDEyJcXaEEA3yuJA6Bx4cS3wqmmgWMC49mF4YehxaStLUinM8JyU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[WhatWeb – A Very Handy Open Source Web Scanner]]></title><description><![CDATA[Definition Whatweb is web scanner written in Ruby to identify and recognise technologies used by a website including CMS, blogging platforms, statistic/analytics packages, Javascript libraries and much]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/whatwebaveryhandyopensourcewebscanner-zv6cgw1rqb</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/whatwebaveryhandyopensourcewebscanner-zv6cgw1rqb</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sat, 10 Aug 2019 20:05:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/mXkfdToSwHy4h1jQhTWHtNrVigXbdMMCxtK1oTsVhcdZX1o1dQLpb1AMJgKv3KWADiYkMudDVjUru4ZCDjGXYFjD1zXa5JDzEmn1fi2nA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Wifi Pumpkin – WiFi MITM Attack and Audit Framework]]></title><description><![CDATA[Wifi Pumpkin is a security audit framework used to test the security of wifi against threats like man in the middle attacks. The tool also can create rogue Wi-Fi access points to hack WiFi via deauth attacks]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/wifipumpkinwifimitmattackandauditframework-6cvbad42a2</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/wifipumpkinwifimitmattackandauditframework-6cvbad42a2</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 09 Aug 2019 13:15:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/2r8F9rTBenJQstst1uynghrX8KfVsMRABQCve2x2UaAUpxsPn7jyc4XP8J9QBASmBnx1T7skRfJUpzN3GttkEKUaAcTR9fbRnAj6n1Fud65Zbkz4VR3LmVTBkvN8KKwfc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[TheFatRat - A Convenient Exploitation Tool]]></title><description><![CDATA[TheFatRat is an easy to use tool which helps in generating backdoors, system exploitation, post exploitation attacks, browser attacks, DLL files, FUD payloads against Linux, Mac OS X, Windows, and Android.]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/thefatrat-aconvenientexploitationtool-xmfhbo7xum</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/thefatrat-aconvenientexploitationtool-xmfhbo7xum</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 07 Aug 2019 17:45:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBr4rFUo5GyYyWxdnuHExLUZnEzuw3AFi4sN7w4sjNh22FwQmu65pgo7xFYDAPNaQpDTX2GcnPYyYzmh8cW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Reconnoitre - A Multithreaded Enumeration Tool]]></title><description><![CDATA[Reconnoitre is a tool that was created to automate routine actions within the OSCP lab environment. It is a simple script, which can automate information gathering and service enumeration. It searches]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/reconnoitre-amultithreadedenumerationtool-mfp885iy1w</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/reconnoitre-amultithreadedenumerationtool-mfp885iy1w</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 23 Jul 2019 12:14:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/2r8F9rTBenJQstst1uynghrX8KfVsMRABQCve2x2UaAUpxsPn7jyc4XP8J9QBASmBnx1T7skSdSoJMDLbERTR8Wa8i5QWRt5zAgCJeJ4cjqKY3EybB4jSWFFNYzVgv6yC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[MassBleed – An Open Source SSL Vulnerability Scanner]]></title><description><![CDATA[MassBleed is an open source tool used for scanning SSL vulnerabilities in web applications. The tool can scan Heartbleed, CCS, Poodle, Winshock, and DROWN attack vulnerabilities in target web applications.]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/massbleedanopensourcesslvulnerabilityscanner-6pqij14mn0</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/massbleedanopensourcesslvulnerabilityscanner-6pqij14mn0</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Thu, 28 Feb 2019 09:35:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/5bEGgqZEHBMeTUEbspCueKMmbM74XfKNcaqXQx1qqswH1g9F1Tfm9RND7sKnDuzGWwFRfZL8PaQFac47hJfx2aXQxT4BqiRt?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Sherlock - A Tool To Find Usernames Across Social Networks]]></title><description><![CDATA[With Sherlock you can search across a vast number of social platforms for a username. This is useful for information gathering purposes, if you want to perform a sophisticated social engineering attack]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/sherlock-atooltofindusernamesacrosssocialnetworks-0poboe93s7</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/sherlock-atooltofindusernamesacrosssocialnetworks-0poboe93s7</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 30 Jan 2019 23:33:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/3DLAmCsuTe3bjxbzQGYZGCM4WGoiA2zmiXYvqipWxFF56E4vR7j1xhxPUNDobyw4STrfkbLY58Xgfzo16z95592EJLPHZ2FEEYCorDuB1AfP5svS1VXEuubzs5D5wLpUE8qEn16PVfPaFw16sakCHRoDviVg5mg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Webvulnscan – An Automated Web Application Vulnerability Scanner]]></title><description><![CDATA[Webvulnscan is a web application scanner that automates vulnerability assessment tasks. The tool can automatically detect different web application vulnerabilities including Cross Site Scripting (XSS),]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/webvulnscananautomatedwebapplicationvulnerabilityscanner-jk9yitvnqm</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/webvulnscananautomatedwebapplicationvulnerabilityscanner-jk9yitvnqm</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 29 Jan 2019 12:01:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/2YRZBi4FZVHeXL7n7YbBjpQ6NM6KhL7QJpmn4BVBcXuzwD3YsLzYLQ18XdxyQmUT5M9rJYWDReLBgu7JnWMZX8xo5dxWc9aq4hU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Modlishka - An Open Source Phishing Tool With 2FA Authentication]]></title><description><![CDATA[Modlishka is a go based phishing proxy that takes your phishing campaigns to the next level. The main feature that makes it different from the other phishing tools, is that it supports 2FA authentication.]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/modlishka-anopensourcephishingtoolwith2faauthentication-9sih92nugv</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/modlishka-anopensourcephishingtoolwith2faauthentication-9sih92nugv</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 13 Jan 2019 13:00:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/2r8F9rTBenJQstst1uynghrX8KfVsMRABQCve2x2UaAUpxsPn7jyc4XP8J9QBASmBnx1T7skSdSoERzi52XygEPLwyF4cyVpHMLtCNpdT1p34j915EYDNoAqoEVQpe1Se?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Sitadel - An Open Source Tool for Finding Web Application Vulnerabilities]]></title><description><![CDATA[Sitadel is a python based web application scanner. It's flexible and has many different scanning options. It can get a full fingerprint of a server and bruteforce directories, admin pages, files etc. Also,]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/sitadel-anopensourcetoolforfindingwebapplicationvulnerabilities-3iywyfmkwu</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/sitadel-anopensourcetoolforfindingwebapplicationvulnerabilities-3iywyfmkwu</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 30 Dec 2018 11:14:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLy6zvChRH7j9QCxXa7kn1JGAzPjCpQux5DQVYAwJRDprBEfycXTwQJG6DTXyq9FYTXrZKTA1jxVnBoGDgjWmqaNNUigpiKuSBLA9uGy7DrPXgj1C9PX8eL7Fo4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Winpayloads - An Open Source Tool for Generating Windows Payloads]]></title><description><![CDATA[Winpayloads is a python based tool which combines some of the Powershell Empire features along with the metasploit framework to create windows payloads. It is simple to use and has some interesting options]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/winpayloads-anopensourcetoolforgeneratingwindowspayloads-bb42wvnbsy</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/winpayloads-anopensourcetoolforgeneratingwindowspayloads-bb42wvnbsy</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Thu, 27 Dec 2018 15:30:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLy6zvChRH7j9QCxXa7kn1JGAzPjCpQux5DQVYAwJRDprBEfycXTwQJG6DTXyq9FYTXrZKTA1jxVnBoGDgjWmqaNNUigpiKuSBLA9uGy5PEnVxb8BYKJLgGRJy4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Joomscan - Open Source Joomla Vulnerability Scanner]]></title><description><![CDATA[Joomscan is a scanner by OWASP, which aims to automate the task for vulnerability assessments for Joomla based sites. Based in perl, this tool can enumerate the version, vulnerabilities, components, firewalls]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/joomscan-opensourcejoomlavulnerabilityscanner-shj4l87rki</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/joomscan-opensourcejoomlavulnerabilityscanner-shj4l87rki</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Thu, 13 Dec 2018 14:30:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVSSvckhitKsyJtcCwLTjqSmBhyMBbAdbB7op6coF8vWwE3rqYDE2FS6Nic4ig8o3UqtPumh9wgxQzoDZVptMXGp8AwBqpa5sd4pFtLQQFs2g78gnaJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[massExploitConsole - An Open Source Tool For Exploiting Known Vulnerabilities]]></title><description><![CDATA[MassExploitConsole is a python based easy-to-use cli tool for executing exploits. It has a collection of exploits to execute, built-in scanner for enumeration, built-in crawler and proxychains to hide]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/massexploitconsole-anopensourcetoolforexploitingknownvulnerabilities-c9arfax8s6</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/massexploitconsole-anopensourcetoolforexploitingknownvulnerabilities-c9arfax8s6</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 09 Dec 2018 11:21:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVSSvckhitKsyJtcCwLTjqSmBhyMBbAdbB7op6coF8vWwE3rqYDE2FS6Nic4ig8o3UqtPumh9wgxQzoDZVptMXGp8AwBqpa4GyjBbKFeb6hkhNHHknA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Galileo – Open Source Web Application Auditing Framework]]></title><description><![CDATA[Galileo is a free web application auditing framework that can perform various penetration testing tasks, such as information gathering, fingerprinting, bruteforcing, injection test, and exploiting]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/galileoopensourcewebapplicationauditingframework-rfy0atcf43</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/galileoopensourcewebapplicationauditingframework-rfy0atcf43</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 26 Nov 2018 16:00:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/5bEGgqZEHBMeTUEbspCueKMmbM74XfKNcaqXQx1qqswH1g9F1Tfm9RND7sKnDuzGWwFRfZL8MAsiAR8ZzdY2SjCaqHi3ppte?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Xerosploit - Open Source Toolkit For Man In The Middle Attacks]]></title><description><![CDATA[Xerosploit is a python-based toolkit for creating efficient Man In The Middle attacks which combines the power of bettercap and nmap. The interface is pretty easy to use. It allows you to scan your network]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/xerosploit-opensourcetoolkitformaninthemiddleattacks-xi7g7j4lmi</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/xerosploit-opensourcetoolkitformaninthemiddleattacks-xi7g7j4lmi</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 23 Nov 2018 20:48:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrUcsNv7tRtPzCvhDgVX1MFsfrds3HPqqSviGAFfDEyJcXaEEA3yuJA6Bx4cS3wnCv7qeV5hPTZQ3xJoWcRHBWsqrKp?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Pythem  - Web and Network  Security Audit Framework]]></title><description><![CDATA[Pythem is a python framework used for performing various security tests on networks and web applications. These include scanning, web crawling, web application bruteforcing, ARP spoofing, DNS spoofing,]]></description><link>http://direct.ecency.com/bestgithubhackingtools/@twr/pythem-webandnetworksecurityauditframework-p8csehy7co</link><guid isPermaLink="true">http://direct.ecency.com/bestgithubhackingtools/@twr/pythem-webandnetworksecurityauditframework-p8csehy7co</guid><category><![CDATA[bestgithubhackingtools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 12 Oct 2018 05:30:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBr4rFUo5GyYyWxdnuHExLUZnEzuw3AFi4sN7w4sjNh22FwQmu65pgo7xFYDAPNYnhaxj5cLNQXFHgArtWJ?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>