<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Sat, 11 Apr 2026 23:12:54 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/hackingtools/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[执法部门正在大力投资骇客技术，用于攻击他们想要的一切人]]></title><description><![CDATA[网络战，你已经没有退出的选项 十年前，一名联邦调查局官员冒充美联社记者，引诱和追踪一名涉嫌向其学校发送恶作剧炸弹的少年。为了找到这个孩子，联邦调查局特工冒充记者，使用社交工程学发送钓鱼邮件，链接上充斥着恶意软件，一旦点击就会迅速曝光少年所在的位置。 最近，联邦调查局对钓鱼网站进行了大规模升级，以便向所有访问者发送恶意软件，不分青红皂白地针对访问这些网站的个人进行识别和跟踪。]]></description><link>http://direct.ecency.com/tech/@iyouport/6bix1x</link><guid isPermaLink="true">http://direct.ecency.com/tech/@iyouport/6bix1x</guid><category><![CDATA[tech]]></category><dc:creator><![CDATA[iyouport]]></dc:creator><pubDate>Sun, 28 Oct 2018 17:30:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/4BAcMbXZnLLL24n5JRAXRBspvYEt1e5BQ3V3baoRQg2gsahPmBZyJXbziTV2RKsF9PE8q4VkbmzyfSHrssetSm3ZEtKQ5hMsSj9XJvp5gWvsvsmKwY63eKTQQAztMqVNULWTs4n7s8PDd6ELWgf9rvXE1rzfYs2N9fdLVhGFtyEf9wuMWtx3cq5iHHG4yTwweayaGmYHPR8u5EVuHqjD9EFh9PC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Useful Tools for Ethical Hacking/Penetration Testing]]></title><description><![CDATA[A great proportion of hackers prefer the Linux operating system. Linux is loved by the hacking community, mostly because of the amount of control it puts into the user's hands and it's open source nature,]]></description><link>http://direct.ecency.com/bestethicalhackertools/@twr/usefultoolsforethicalhackingpenetrationtesting-2bvl0h5s7j</link><guid isPermaLink="true">http://direct.ecency.com/bestethicalhackertools/@twr/usefultoolsforethicalhackingpenetrationtesting-2bvl0h5s7j</guid><category><![CDATA[bestethicalhackertools]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 07 Aug 2018 15:59:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/PB8ro82ZpZP3vrQovkik6e66T8hnLhLPdqV7nVJzeRr5Sdvch7efXk337Lsrya9rEqtmuZp4LLW7oSNsVCYuUZzVAYEja7rRJwjD1LzktVin1e2A?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Top 3 Android Hacking Tools]]></title><description><![CDATA[I found some very interesting android remote administration tools that let me hack into my target’s smartphone remotely. Here I am gonna share these top 3 android RATs that you can download free of cost.]]></description><link>http://direct.ecency.com/hacking/@acemubi/top-3-android-hacking-tools</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@acemubi/top-3-android-hacking-tools</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[acemubi]]></dc:creator><pubDate>Sat, 28 Jul 2018 12:17:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/Zskj9C56UonWToSX8tGXNY8jeXKSedJ2aRhGRj6HDecqrfk7VVRhXn9xG27BuVJTxszZ13Qp7tzvQs9FuJCm6YRtCDCD5PSazbCwY7zjynAX4CAWqUeA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Tool-X package for Android Termux CLI]]></title><description><![CDATA[Tool-X? It is the complete 130 best linux hacking tools set for android terminal TERMUX. Tool-X is a kali linux hacking Tool installer.Tool-X is Developed By Rajkumar Dusad. with the help of Tool-X you]]></description><link>http://direct.ecency.com/termuxtools/@luckeyjain99/tool-x-package-for-android-termux-cli</link><guid isPermaLink="true">http://direct.ecency.com/termuxtools/@luckeyjain99/tool-x-package-for-android-termux-cli</guid><category><![CDATA[termuxtools]]></category><dc:creator><![CDATA[luckeyjain99]]></dc:creator><pubDate>Sat, 21 Jul 2018 06:51:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/W5LtFUPm6g7111bbdcuxu3bfUg5qaCq8seb5paCtrrT7zRZDu1LJ2WwwCBytB8m3PuDk9p3Ly9Lu1moqpFpVA9ozeMg3j6Tpc8rNKZ8J5cFwSPK9Zh5fSszRXsbiNbojArUZDzbmKqjYSNBdULkNuSfoV86YN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[look who trying to sell  Hacking Tool On Dark Web For $50 Million]]></title><description><![CDATA[NSO is a an Israeli firm that specializes in helping governments to monitor enemies using spyware technology. now few weeks ago , a former employee whose name is currently being not disclosed by the]]></description><link>http://direct.ecency.com/thirdblog/@razaakhtar/look-who-trying-to-sell-hacking-tool-on-dark-web-for-usd50-million</link><guid isPermaLink="true">http://direct.ecency.com/thirdblog/@razaakhtar/look-who-trying-to-sell-hacking-tool-on-dark-web-for-usd50-million</guid><category><![CDATA[thirdblog]]></category><dc:creator><![CDATA[razaakhtar]]></dc:creator><pubDate>Sun, 08 Jul 2018 19:37:48 GMT</pubDate></item><item><title><![CDATA[Airgeddon - A Swiss Army WiFi Hacking Tool]]></title><description><![CDATA[Today LHN have been looking at Airgeddon, on initial inspection it seems to be a multi purpose all-in-one Swiss army knife tool for hacking WiFi, the tool is pretty extensive, with over 11 thousands lines]]></description><link>http://direct.ecency.com/airgeddon/@twr/airgeddon-aswissarmywifihackingtool-u5bypjdkw7</link><guid isPermaLink="true">http://direct.ecency.com/airgeddon/@twr/airgeddon-aswissarmywifihackingtool-u5bypjdkw7</guid><category><![CDATA[airgeddon]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 19 Jun 2018 12:50:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/99pyU5Ga1kwrPdyaB2qeeFKZyKNvRF7dWuRdkTbsWhNqphbRY8kgqkZ6fCg5Hrgi2donzHLzfr49gAjzSVonb7S2ib6mDFYpJZrHzi9JfKnC9HNPM9wL6tVTANwZfYEVk2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Ethical Hacking Training Course 2017 ! Here is How]]></title><description><![CDATA[The Complete Ethical Hacking Training Course - Become An Ethical Hacker Today Would you like to learn how to become an ethical hacker from the beginner to advanced level? This video tutorial which is more]]></description><link>http://direct.ecency.com/hackingtools/@besnik/ethical-hacking-training-course-2017-here-is-how</link><guid isPermaLink="true">http://direct.ecency.com/hackingtools/@besnik/ethical-hacking-training-course-2017-here-is-how</guid><category><![CDATA[hackingtools]]></category><dc:creator><![CDATA[besnik]]></dc:creator><pubDate>Tue, 15 Aug 2017 21:27:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eR8kFCBvd4VHbUibExn8RdANtTNP7UAn2FY?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>