<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Hack with GitHub - Medium]]></title>
        <description><![CDATA[Open source hacking tools for hackers and pentesters. GitHub tools review. - Medium]]></description>
        <link>https://medium.com/hack-with-github?source=rss----946c37ed5afe---4</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>Hack with GitHub - Medium</title>
            <link>https://medium.com/hack-with-github?source=rss----946c37ed5afe---4</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sun, 17 May 2026 02:59:23 GMT</lastBuildDate>
        <atom:link href="https://medium.com/feed/hack-with-github" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Black Hat Arsenal USA 2018 — The w0w lineup]]></title>
            <link>https://medium.com/hack-with-github/black-hat-arsenal-usa-2018-the-w0w-lineup-7de9b6d32796?source=rss----946c37ed5afe---4</link>
            <guid isPermaLink="false">https://medium.com/p/7de9b6d32796</guid>
            <category><![CDATA[security]]></category>
            <category><![CDATA[blackhatarsenal]]></category>
            <category><![CDATA[hacking-tools]]></category>
            <category><![CDATA[blackhat]]></category>
            <dc:creator><![CDATA[Chandrapal Badshah]]></dc:creator>
            <pubDate>Sun, 03 Jun 2018 10:02:44 GMT</pubDate>
            <atom:updated>2018-06-03T14:22:22.970Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*zfZzGK4i16KEx-FTUKlO6A.png" /></figure><p>After the <a href="https://medium.com/hack-with-github/black-hat-arsenal-usa-2017-3fb5bd9b5cf2">huge success of Black Hat Arsenal USA 2017</a>, <a href="https://twitter.com/ToolsWatch">@toolswatch</a> has now announced the list of tools selected for <strong>Black Hat Arsenal USA 2018.</strong></p><h3>ToolsWatch on Twitter</h3><p>Black Hat Arsenal USA 2018 The &quot;w0w&quot; Lineup !! https://t.co/h6afO5uRHD @BlackHatEvents @MadelineS_M @MaxiSoler @rachidharrando</p><p>This time there were a huge number of proposals than expected, so the Arsenal team had a tough time selecting the tools.</p><h3>ToolsWatch on Twitter</h3><p>Congratulations for everyone who got accepted for the #BHUSA18 Arsenal. The choice was very difficult. Promise we will give priority for those rejected in the next session in London.</p><blockquote><strong>NOTE:</strong> If you have submitted a proposal and didn’t get selected, don’t worry. Please do submit it again for Black Hat Arsenal EU 2018 / ASIA 2019. The rejected tools don’t necessarily mean that they aren’t good. Also the rejected tools are on the priority list for consideration in upcoming Black Hat Arsenal events.</blockquote><p>Some of the selected tools are already present on GitHub and some are yet to be uploaded. This article contains the links to their respective repositories. The tools are arranged according to their tracks. If you like the tool, go to its repository and <strong>click <em>Watch</em></strong> to keep updated on the latest commits and pushes.</p><p><strong>Some tools will be updated during/after the Arsenal event. Links to the GitHub repositories of those tools will be eventually updated in this article.</strong></p><p><strong>If you feel that this article is missing links to some Arsenal tools hosted on GitHub, please comment so that it will updated.</strong></p><blockquote><strong>NOTE:</strong> Arsenal Theater Demos are denoted using the Projector emoji — 📽️</blockquote><h3>Android, iOS and Mobile Hacking</h3><ul><li><strong>Damn Vulnerable iOS App: Swift Edition </strong><br><a href="https://github.com/prateek147/DVIA-v2">https://github.com/prateek147/DVIA-v2</a> <br><strong><em>Presenter:</em></strong> Prateek Gianchandani (<a href="http://twitter.com/prateekg147">@prateekg147</a>)</li></ul><h3>Code Assessment</h3><ul><li><strong>OWASP Dependency-Check </strong><br><a href="https://github.com/jeremylong/DependencyCheck">https://github.com/jeremylong/DependencyCheck</a> <br><strong><em>Presenter:</em></strong> Jeremy Long (<a href="http://twitter.com/ctxt">@ctxt</a>)</li><li><strong>Puma Scan </strong><br><a href="https://github.com/pumasecurity/puma-scan">https://github.com/pumasecurity/puma-scan</a> <br><strong><em>Twitter: </em></strong>(<a href="http://twitter.com/puma_scan">@puma_scan</a>) <br><strong><em>Presenter:</em></strong> Eric Johnson (<a href="http://twitter.com/emjohn20">@emjohn20</a>)</li></ul><h3>Cryptography</h3><ul><li><strong>DeepViolet: SSL/TLS Scanning API &amp; Tools </strong><br><a href="https://github.com/spoofzu/DeepViolet">https://github.com/spoofzu/DeepViolet</a> <br><strong><em>Presenter:</em></strong> Milton Smith (<a href="http://twitter.com/spoofzu">@spoofzu</a>)</li></ul><h3>Data Forensics and Incident Response</h3><ul><li><strong>Bro: Do You Bro? Beginner to Expert </strong><br><a href="https://github.com/bro/bro">https://github.com/bro/bro</a> <br><strong><em>Presenter:</em></strong> Seth Hall (<a href="http://twitter.com/remor">@remor</a>)</li><li><strong>CyBot: Open-Source Threat Intelligence Chat Bot (Full Circle)</strong> <br><a href="https://github.com/CylanceSPEAR/CyBot">https://github.com/CylanceSPEAR/CyBot</a> <br><strong><em>Presenter:</em></strong> Tony Lee</li><li><strong>LogonTracer </strong><br><a href="https://github.com/JPCERTCC/LogonTracer">https://github.com/JPCERTCC/LogonTracer</a> <br><strong><em>Presenters:</em></strong> Shusei Tomonaga (<a href="http://twitter.com/shu_tom">@shu_tom</a>), Tomoaki Tani</li><li><strong>rastrea2r (reloaded!): Collecting &amp; Hunting for IOCs with Gusto and Style </strong><br><a href="https://github.com/rastrea2r/rastrea2r">https://github.com/rastrea2r/rastrea2r</a> <br><strong><em>Presenters:</em></strong> Ismael Valenzuela (<a href="http://twitter.com/aboutsecurity">@aboutsecurity</a>), Sudheendra Bhat</li><li><strong>RedHunt OS (VM): A Virtual Machine for Adversary Emulation and Threat Hunting </strong><br><a href="https://github.com/redhuntlabs/RedHunt-OS">https://github.com/redhuntlabs/RedHunt-OS</a> <br><strong><em>Presenter:</em></strong> Sudhanshu Chauhan (<a href="http://twitter.com/Sudhanshu_C">@Sudhanshu_C</a>)</li></ul><h3>Exploitation and Ethical Hacking</h3><ul><li><strong>AVET: AntiVirus Evasion Tool </strong><br><a href="https://github.com/govolution/avet">https://github.com/govolution/avet</a> <br><strong><em>Presenter:</em></strong> Daniel Sauder (<a href="https://twitter.com/DanielX4v3r">@DanielX4v3r</a>)</li><li><strong>DSP: Docker Security Playground </strong><br><a href="https://github.com/giper45/DockerSecurityPlayground">https://github.com/giper45/DockerSecurityPlayground</a> <br><strong><em>Presenter:</em></strong> Simon Pietro Romano (<a href="http://twitter.com/spromano">@spromano</a>)</li><li><strong>hideNsneak: An Attack Obfuscation Framework </strong><br><a href="https://github.com/rmikehodges/hideNsneak">https://github.com/rmikehodges/hideNsneak</a> <br><strong><em>Presenters:</em></strong> Michelle Hodges, Mike Hodges (<a href="http://twitter.com/rmikehodges">@rmikehodges</a>)</li><li><strong>Merlin </strong><br><a href="https://github.com/Ne0nd0g/merlin">https://github.com/Ne0nd0g/merlin</a> <br><strong><em>Presenter: </em></strong>Russel Van Tuyl (<a href="http://twitter.com/Ne0nd0g">@Ne0nd0g</a>)</li><li><strong>RouterSploit </strong><br><a href="https://github.com/threat9/routersploit">https://github.com/threat9/routersploit</a> <br><strong><em>Twitter:</em></strong> <a href="http://twitter.com/routersploit">@routersploit</a><br><strong><em>Presenters: </em></strong>Blane Cordes, Marcin Bury</li></ul><h3>Hardware/Embedded</h3><ul><li><strong>ChipWhisperer </strong><br><a href="https://github.com/newaetech/chipwhisperer">https://github.com/newaetech/chipwhisperer</a> <br><strong><em>Presenter:</em></strong> Colin O’Flynn (<a href="http://twitter.com/colinoflynn">@colinoflynn</a>)</li><li>📽️ <strong>JTAGulator: Uncovering the Achilles Heel of Hardware Security</strong><br><a href="https://github.com/grandideastudio/jtagulator">https://github.com/grandideastudio/jtagulator</a> <br><strong><em>Presenter:</em></strong> Joe Grand (<a href="http://twitter.com/joegrand">@joegrand</a>)</li><li><strong>Micro-Renovator: Bringing Processor Firmware up to Code </strong><br><a href="https://github.com/syncsrc/MicroRenovator">https://github.com/syncsrc/MicroRenovator</a> <br><strong><em>Presenter:</em></strong> Matt King (<a href="http://twitter.com/syncsrc">@syncsrc</a>)</li><li><strong>TumbleRF: RF Fuzzing Made Easy </strong><br><a href="https://github.com/riverloopsec/tumblerf">https://github.com/riverloopsec/tumblerf</a> <br><strong><em>Presenters: </em></strong>Matt Knight (<a href="http://twitter.com/embeddedsec">@embeddedsec</a>)</li><li><strong>Walrus: Make the Most of Your Card Cloning Devices </strong><br><a href="https://github.com/TeamWalrus/Walrus">https://github.com/TeamWalrus/Walrus</a> <br><strong><em>Presenters: </em></strong>Daniel Underhay, Matthew Daley</li></ul><h3>Internet of Things</h3><ul><li><strong>An Extensible Dynamic Analysis Framework for IoT Devices </strong><br><a href="https://github.com/sycurelab/DECAF">https://github.com/sycurelab/DECAF</a> <br><strong><em>Presenters:</em></strong> Heng Yin, Xunchao Hu, Yaowen Zheng</li><li><strong>BLE CTF Project </strong><br><a href="https://github.com/hackgnar/ble_ctf">https://github.com/hackgnar/ble_ctf</a> <br><strong><em>Presenter:</em></strong> Ryan Holeman (<a href="http://twitter.com/hackgnar">@hackgnar</a>)</li><li><strong>WHID Injector and WHID Elite: A New Generation of HID Offensive Devices </strong><br><a href="https://github.com/whid-injector/WHID">https://github.com/whid-injector/WHID</a> <br><strong><em>Presenter: </em></strong>Luca Bongiorni (<a href="https://twitter.com/LucaBongiorni">@LucaBongiorni</a>)</li></ul><h3>Malware Defense</h3><ul><li><strong>Advanced Deep Learning Analytic Platform Made Easy for Every Security Researcher </strong><br><a href="https://github.com/intel/Resilient-ML-Research-Platform">https://github.com/intel/Resilient-ML-Research-Platform</a> <br><strong><em>Presenters:</em></strong> Evan Yang, Li Chen</li><li><strong>EKTotal </strong><br><a href="https://github.com/nao-sec/ektotal">https://github.com/nao-sec/ektotal</a> <br><strong><em>Presenters:</em></strong> Keita Nomura, Rintaro Koike</li><li><strong>Firmware Audit: Platform Firmware Security Automation for Blue Teams and DFIR </strong><br><a href="https://github.com/PreOS-Security/fwaudit">https://github.com/PreOS-Security/fwaudit</a> <br><strong><em>Presenters:</em></strong> Lee Fisher (<a href="http://twitter.com/LeeFisher_PreOS">@LeeFisher_PreOS</a>), Paul English</li><li><strong>MaliceIO </strong><br><a href="https://github.com/maliceio/malice">https://github.com/maliceio/malice</a> <br><strong><em>Twitter:</em></strong> <a href="http://twitter.com/maliceio">@maliceio</a><br><strong><em>Presenter:</em></strong> Josh Maine</li><li><strong>Objective-See’s MacOS Security Tools</strong> <br><a href="https://github.com/objective-see">https://github.com/objective-see</a> <br><strong><em>Twitter:</em></strong> <a href="http://twitter.com/objective_see">@objective_see</a> <br><strong><em>Presenter:</em></strong> Patrick Wardle (<a href="http://twitter.com/patrickwardle">@patrickwardle</a>)</li></ul><h3>Malware Offense</h3><ul><li><strong>BloodHound 1.5 </strong><br><a href="https://github.com/BloodHoundAD/BloodHound">https://github.com/BloodHoundAD/BloodHound</a> <br><strong><em>Presenters: </em></strong>Andy Robbins (<a href="http://twitter.com/_wald0">@_wald0</a>), Rohan Vazarkar (<a href="http://twitter.com/CptJesus">@CptJesus</a>)</li></ul><h3>Network Attacks</h3><ul><li><strong>Armory </strong><br><a href="https://github.com/depthsecurity/armory">https://github.com/depthsecurity/armory</a> <br><strong><em>Presenter:</em></strong> Daniel Lawson (<a href="http://twitter.com/fang0654">@fang0654</a>)</li><li><strong>Chiron: An Advanced IPv6 Security Assessment and Penetration Testing Framework </strong><br><a href="https://github.com/aatlasis/Chiron">https://github.com/aatlasis/Chiron</a> <br><strong><em>Presenter:</em></strong> Antonios Atlasis (<a href="http://twitter.com/AntoniosAtlasis">@AntoniosAtlasis</a>)</li><li><strong>DELTA: SDN Security Evaluation Framework </strong><br><a href="https://github.com/OpenNetworkingFoundation/DELTA">https://github.com/OpenNetworkingFoundation/DELTA</a> <br><strong><em>Presenters: </em></strong>Jinwoo Kim, Seungsoo Lee, Seungwon Shin, Seungwon Woo</li><li><strong>Mallet: An Intercepting Proxy for Arbitrary Protocols </strong><br><a href="https://github.com/sensepost/mallet">https://github.com/sensepost/mallet</a> <br><strong><em>Presenter: </em></strong>Rogan Dawes (<a href="http://twitter.com/RoganDawes">@RoganDawes</a>)</li><li><strong>PowerUpSQL: A PowerShell Toolkit for Attacking SQL Servers in Enterprise Environments </strong><br><a href="https://github.com/NetSPI/PowerUpSQL">https://github.com/NetSPI/PowerUpSQL</a> <br><strong><em>Presenters:</em></strong> Antti Rantasaari, Scott Sutherland (<a href="http://twitter.com/_nullbind">@_nullbind</a>)</li><li>📽️ <strong>WarBerryPi </strong><br><a href="https://github.com/secgroundzero/warberry">https://github.com/secgroundzero/warberry</a> <br><strong><em>Presenters:</em></strong> Stella Constantinou, Yiannis Ioannides</li></ul><h3>Network Defense</h3><ul><li><strong>ANWI (All New Wireless IDS): The $5 WIDS </strong><br><a href="https://github.com/SanketKarpe/anwi">https://github.com/SanketKarpe/anwi</a> <br><strong><em>Presenters: </em></strong>Rishikesh Bhide, Sanket Karpe</li><li><strong>CHIRON: Home-Based Network Analytics &amp; Machine Learning Threat Detection Framework </strong><br><a href="https://github.com/jzadeh/chiron-elk">https://github.com/jzadeh/chiron-elk</a> <br><strong><em>Presenters:</em></strong> Joseph Zadeh (<a href="http://twitter.com/JosephZadeh">@JosephZadeh</a>), Rod Soto (<a href="http://twitter.com/rodsoto">@rodsoto</a>)</li><li><strong>Cloud Security Suite: One Stop Tool for AWS/GCP/Azure Security Audit </strong><br><a href="https://github.com/SecurityFTW/cs-suite">https://github.com/SecurityFTW/cs-suite</a> <br><strong><em>Twitter:</em></strong> <a href="http://twitter.com/CS_Suite">@CS_Suite</a> <br><strong><em>Presenters:</em></strong> Divya John, Jayesh Chauhan (<a href="https://twitter.com/jayeshsch">@jayeshsch</a>), Shivankar Madaan (<a href="http://twitter.com/shivankarmadaan">@shivankarmadaan</a>)</li><li><strong>DejaVu: An Open Source Deception Framework </strong><br><a href="https://github.com/bhdresh/Dejavu">https://github.com/bhdresh/Dejavu</a> <br><strong><em>Presenters:</em></strong> Bhadreshkumar Patel (<a href="http://twitter.com/bhdresh">@bhdresh</a>), Harish Ramadoss (<a href="http://twitter.com/hramados">@hramados</a>)</li></ul><h3>OSINT — Open Source Intelligence</h3><ul><li><strong>DataSploit 2.0 </strong><br><a href="https://github.com/DataSploit/datasploit">https://github.com/DataSploit/datasploit</a> <br><strong><em>Twitter:</em></strong> <a href="http://twitter.com/datasploit">@datasploit</a> <br><strong><em>Presenter:</em></strong> Shubham Mittal (<a href="http://twitter.com/upgoingstar">@upgoingstar</a>)</li><li>📽️ <strong>Dradis Framework: Learn How to Cut Your Reporting Time in Half </strong><br><a href="https://github.com/dradis/dradis-ce">https://github.com/dradis/dradis-ce</a> <br><strong><em>Twitter:</em></strong> <a href="http://twitter.com/dradisfw">@dradisfw</a> <br><strong><em>Presenter:</em></strong> Daniel Martin (<a href="http://twitter.com/etdsoft">@etdsoft</a>)</li></ul><h3>Reverse Engineering</h3><ul><li><strong>Snake: The Malware Storage Zoo</strong> <br><a href="https://github.com/countercept/snake">https://github.com/countercept/snake</a> <br><strong><em>Presenter:</em></strong> Alex Kornitzer (<a href="http://twitter.com/AlexKornitzer">@AlexKornitzer</a>)</li></ul><h3>Smart Grid / Industrial Security</h3><ul><li>📽️ <strong>GRFICS: A Graphical Realism Framework for Industrial Control Simulations </strong><br><a href="https://github.com/djformby/GRFICS">https://github.com/djformby/GRFICS</a> <br><strong><em>Presenter:</em></strong> David Formby</li></ul><h3>Vulnerability Assessment</h3><ul><li>📽️ <strong>Adversarial Robustness Toolbox for Machine Learning Models</strong><br><a href="https://github.com/IBM/adversarial-robustness-toolbox">https://github.com/IBM/adversarial-robustness-toolbox</a> <br><strong><em>Presenter:</em></strong> Irina Nicolae</li><li><strong>Android Dynamic Analysis Tool (ADA) </strong><br><a href="https://github.com/ANELKAOS/ada">https://github.com/ANELKAOS/ada</a> <br><strong><em>Presenter:</em></strong> Anelkaos (<a href="http://twitter.com/ANELKAOS1">@ANELKAOS1</a>)</li><li>📽️ <strong>Archery: Open Source Vulnerability Assessment and Management </strong><br><a href="https://github.com/archerysec/archerysec">https://github.com/archerysec/archerysec</a> <br><strong><em>Twitter:</em></strong> <a href="http://twitter.com/ArcherySec">@ArcherySec</a> <br><strong><em>Presenter:</em></strong> Anand Tiwari (<a href="http://twitter.com/anandtiwarics">@anandtiwarics</a>)</li><li><strong>boofuzz </strong><br><a href="https://github.com/jtpereyda/boofuzz">https://github.com/jtpereyda/boofuzz</a> <br><strong><em>Presenter: </em></strong>Joshua Pereyda (<a href="http://twitter.com/jtpereyda">@jtpereyda</a>)</li><li><strong>BTA </strong><br><a href="https://github.com/airbus-seclab/bta">https://github.com/airbus-seclab/bta</a> <br><strong><em>Presenter: </em></strong>Joffrey Czarny (<a href="https://twitter.com/_Sn0rkY">@_Sn0rkY</a>)</li><li><strong>Deep Exploit </strong><br><a href="https://github.com/13o-bbr-bbq/machine_learning_security/tree/master/DeepExploit">https://github.com/13o-bbr-bbq/machine_learning_security/tree/master/DeepExploit</a> <br><strong><em>Presenter:</em></strong> Isao Takaesu (<a href="http://twitter.com/bbr_bbq">@bbr_bbq</a>)</li><li><strong>Halcyon IDE: For Nmap Script Developers </strong><br><a href="https://github.com/s4n7h0/Halcyon">https://github.com/s4n7h0/Halcyon</a> <br><strong><em>Presenter:</em></strong> Sanoop Thomas (<a href="http://twitter.com/s4n7h0">@s4n7h0</a>)</li><li>📽️ <strong>SimpleRisk </strong><br><a href="https://github.com/simplerisk">https://github.com/simplerisk</a> <br><strong><em>Twitter:</em></strong> <a href="http://twitter.com/simpleriskfree">@simpleriskfree</a> <br><strong><em>Presenter:</em></strong> Josh Sokol (<a href="http://twitter.com/joshsokol">@joshsokol</a>)</li><li>📽️ <strong>TROMMEL </strong><br><a href="https://github.com/CERTCC/trommel">https://github.com/CERTCC/trommel</a> <br><strong><em>Presenter:</em></strong> Kyle O’Meara</li></ul><h3>Web AppSec</h3><ul><li><strong>A Look at ModSec 3.0 for NGINX: A Software Web Application Firewall </strong><br><a href="https://github.com/SpiderLabs/ModSecurity">https://github.com/SpiderLabs/ModSecurity</a><br><strong><em>Presenter:</em></strong> Kevin Jones</li><li><strong>Astra: Automated Security Testing For REST APIs </strong><br><a href="https://github.com/flipkart-incubator/Astra">https://github.com/flipkart-incubator/Astra</a> <br><strong><em>Presenters:</em></strong> Ankur Bhargava (<a href="http://twitter.com/_AnkurB">@_AnkurB</a>), Sagar Popat (<a href="http://twitter.com/popat_sagar">@popat_sagar</a>)</li><li><strong>Burp Replicator: Automate Reproduction of Complex Vulnerabilities </strong><br><a href="https://github.com/PortSwigger/replicator">https://github.com/PortSwigger/replicator</a> <br><strong><em>Presenter:</em></strong> Paul Johnston (<a href="http://twitter.com/paulpaj">@paulpaj</a>)</li><li><strong>OWASP Offensive Web Testing Framework </strong><br><a href="https://github.com/owtf/owtf">https://github.com/owtf/owtf</a> <br><strong><em>Twitter:</em></strong> <a href="http://twitter.com/owtfp">@owtfp</a> <br><strong><em>Presenter:</em></strong> Viyat Bhalodia (<a href="http://twitter.com/viyat">@viyat</a>)</li><li><strong>OWASP JoomScan Project </strong><br><a href="https://github.com/rezasp/joomscan">https://github.com/rezasp/joomscan</a> <br><strong><em>Twitter:</em></strong> <a href="http://twitter.com/OWASP_JoomScan">@OWASP_JoomScan</a> ‏ <br><strong><em>Presenters:</em></strong> Babak Amin Azad, Mohammad Reza Espargham (<a href="http://twitter.com/rezesp">@rezesp</a>) , Vahid Behzadan (<a href="http://twitter.com/vbehzadan">@vbehzadan</a>)</li><li><strong>WSSAT </strong><br><a href="https://github.com/YalcinYolalan/WSSAT">https://github.com/YalcinYolalan/WSSAT</a> <br><strong><em>Presenters:</em></strong> Mehmet Yalcin YOLALAN (<a href="http://twitter.com/yyolalan">@yyolalan</a>), Salih TALAY</li></ul><p>If you haven’t looked at the selected tools, check the below embed to view the complete details of the tools and its presenters.</p><p><a href="http://www.toolswatch.org/2018/05/black-hat-arsenal-usa-2018-the-w0w-lineup/">Black Hat Arsenal USA 2018 The &quot;w0w&quot; Lineup !!</a></p><blockquote><strong><em>If you liked this article, click the </em></strong>👏<strong> button (even upto 50 times) <em>and share so that other people will see it here on Medium.</em></strong></blockquote><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=7de9b6d32796" width="1" height="1" alt=""><hr><p><a href="https://medium.com/hack-with-github/black-hat-arsenal-usa-2018-the-w0w-lineup-7de9b6d32796">Black Hat Arsenal USA 2018 — The w0w lineup</a> was originally published in <a href="https://medium.com/hack-with-github">Hack with GitHub</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Top 5 Security Tools — November 2017]]></title>
            <link>https://medium.com/hack-with-github/top-5-security-tools-november-2017-7e7f7cb763e?source=rss----946c37ed5afe---4</link>
            <guid isPermaLink="false">https://medium.com/p/7e7f7cb763e</guid>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[hack-with-github]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[github]]></category>
            <dc:creator><![CDATA[Chandrapal Badshah]]></dc:creator>
            <pubDate>Sun, 03 Dec 2017 04:07:13 GMT</pubDate>
            <atom:updated>2017-12-03T04:07:13.049Z</atom:updated>
            <content:encoded><![CDATA[<p>Here are the top 5 tools and repositories which got lots of likes and retweets for the month — November 2017.</p><h3>Hack with GitHub on Twitter</h3><p>Icewater - About 3,000 Free #YARA rules for the detection of #malware and malicious files Author: @wessorh https://t.co/zvtgmB5eQq</p><h3>Hack with GitHub on Twitter</h3><p>ThreatHunting - #Powershell collection designed to assist in #ThreatHunting Windows systems by @DLAMIL https://t.co/tnhx3KZlfP</p><h3>Hack with GitHub on Twitter</h3><p>DVNA - Damn Vulnerable #NodeJS Application by @appseccouk https://t.co/oRQ3yHgIoR</p><h3>Hack with GitHub on Twitter</h3><p>Exploits - A handy collection of public #exploits, all in one place Curator: @0xdea https://t.co/8gC76phjvp</p><h3>Hack with GitHub on Twitter</h3><p>Android-Reports-and-Resources - A big list of #Android #HackerOne disclosed reports and other resources Author: @B3nac #BugBounty https://t.co/DyJARu3uw9</p><h3>Other interesting tweets</h3><h3>Hack with GitHub on Twitter</h3><p>Introducing &quot;InfoSec Badges&quot; - repository which hosts badges for you tool presented at Security Conference. If you want other conferences to be added, please raise an issue. https://t.co/EHYDkX6WFk</p><h3>Mathy Vanhoef on Twitter</h3><p>Scripts to test if clients are affected by the WPA2 #KRACK attack are now available at https://t.co/u2cmmEQ4dh Do a new git clone!</p><h3>MalwareTech on Twitter</h3><p>Decided to publish my TrickBot Tools https://t.co/QV15wgQfUK</p><h3>Theori on Twitter</h3><p>As promised in @zoaedk&#39;s talk at #POC2017, we are releasing pwn.js that helps writing browser exploits easier and cleaner. Check it out and feel free to contribute! https://t.co/kkxqaImB54</p><h3>GitHub on Twitter</h3><p>Now GitHub can help you find and fix vulnerabilities in your dependencies. Just enable your dependency graph to start receiving security alerts-currently supported in Ruby and JavaScript: https://t.co/QPBJbkdSWC https://t.co/9NffMXWp4L</p><blockquote><strong><em>If you liked this article, click the </em></strong>👏<strong> button <em>and share so that other people will see it here on Medium.</em></strong></blockquote><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=7e7f7cb763e" width="1" height="1" alt=""><hr><p><a href="https://medium.com/hack-with-github/top-5-security-tools-november-2017-7e7f7cb763e">Top 5 Security Tools — November 2017</a> was originally published in <a href="https://medium.com/hack-with-github">Hack with GitHub</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Top 5 Security Tools — October 2017]]></title>
            <link>https://medium.com/hack-with-github/top-5-security-tools-october-2017-76ab31834efd?source=rss----946c37ed5afe---4</link>
            <guid isPermaLink="false">https://medium.com/p/76ab31834efd</guid>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[hack-with-github]]></category>
            <category><![CDATA[security]]></category>
            <dc:creator><![CDATA[Chandrapal Badshah]]></dc:creator>
            <pubDate>Wed, 01 Nov 2017 06:31:32 GMT</pubDate>
            <atom:updated>2017-11-01T06:31:32.529Z</atom:updated>
            <content:encoded><![CDATA[<iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fw.soundcloud.com%2Fplayer%2F%3Furl%3Dhttp%253A%252F%252Fapi.soundcloud.com%252Ftracks%252F349574402%26show_artwork%3Dtrue&amp;url=https%3A%2F%2Fsoundcloud.com%2Fhack-with-github%2Ftop-5-security-tools-oct-2017&amp;image=http%3A%2F%2Fa1.sndcdn.com%2Fimages%2Ffb_placeholder.png%3F1509357275&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=soundcloud" width="800" height="166" frameborder="0" scrolling="no"><a href="https://medium.com/media/eada89a2556bc3517762fbe74ff2daf0/href">https://medium.com/media/eada89a2556bc3517762fbe74ff2daf0/href</a></iframe><p>Here are the top 5 tools and repositories which got lots of likes and retweets for the month — October 2017.</p><h3>Hack with GitHub on Twitter</h3><p>Awesome-Red-Teaming : List of Awesome #RedTeaming Resources Curator: @yeyint_mth https://t.co/uMXp50tAXz</p><h3>Hack with GitHub on Twitter</h3><p>awesome-web-security - Curated list of #Web #Security materials and resources Curator: @qazbnm456 https://t.co/pDbvm3BGcI</p><h3>Hack with GitHub on Twitter</h3><p>Awesome YARA - Curated list of awesome #YARA rules, tools, and resources by @InQuest Curator: @rshipp42 https://t.co/yfRIFYoilD</p><h3>Hack with GitHub on Twitter</h3><p>Awesome Hacking Resources - Collection of #hacking/#pentesting resources to make you better Curator: @b07_bu573r https://t.co/T3HQKw2mAC</p><h3>Hack with GitHub on Twitter</h3><p>Deceptive IDN - Use computer vision to determine #Phishing sites Author: @withzombies https://t.co/5M9BjZ44LO</p><h3>Top 3 BlackHat Arsenal Tools :</h3><p>All the BlackHat arsenal tools hosted on GitHub were tweeted. These are the top 3 tools which got the most retweets and likes.</p><h3>Hack with GitHub on Twitter</h3><p>2FAssassin - Bypass Two-Factor-Authentication #2FA #BlackHatArsenal https://t.co/w07OOfwF6i</p><h3>Hack with GitHub on Twitter</h3><p>WHID - WiFi #HID Injector - An USB #Rubberducky / BadUSB On Steroids Author: @LucaBongiorni https://t.co/47DB5bo4Cz</p><h3>Hack with GitHub on Twitter</h3><p>CERTitude - An Open-Source and Agentless Compromise Assessment Tool #BlackHatArsenal https://t.co/wPsxNTNfp0</p><h3>Other Interesting Tweets :</h3><h3>Dmytro Oleksiuk on Twitter</h3><p>I released some part of my DMA attack tools based on Xilinx SP605 evaluation kit to public, enjoy :) https://t.co/M5ZnmsVbtB</p><h3>ron190 💉 on Twitter</h3><p>SQL injection using SOAP and JSON with jsql-injection. Get it on Github https://t.co/pacfG19RxN and contribute to the translation #infosec</p><h3>radare on Twitter</h3><p>radare2-2.0.0 is out! https://t.co/BHlWLIYMqn</p><h3>Mathy Vanhoef on Twitter</h3><p>Script to test APs for KRACK attack against FT handshake (802.11r - CVE-2017-13082) is online https://t.co/KpWafDHc8f</p><h3>Jobert Abma on Twitter</h3><p>New tool: extracting relative URLs from minified files. Very helpful during recon! https://t.co/dzIaoEwB8G #TogetherWeHitHarder</p><h3>Hack with GitHub on Twitter</h3><p>Hashcat v4.0.0 released ! This release is mostly password and salt length up to 256 support. https://t.co/tNjqhiqQx4</p><blockquote><strong><em>If you liked this article, click </em></strong>👏 👏 👏<strong> button <em>and share so that other people will see it here on Medium.</em></strong></blockquote><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=76ab31834efd" width="1" height="1" alt=""><hr><p><a href="https://medium.com/hack-with-github/top-5-security-tools-october-2017-76ab31834efd">Top 5 Security Tools — October 2017</a> was originally published in <a href="https://medium.com/hack-with-github">Hack with GitHub</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Black Hat Arsenal EU 2017]]></title>
            <link>https://medium.com/hack-with-github/black-hat-arsenal-eu-2017-9ba00f8740b0?source=rss----946c37ed5afe---4</link>
            <guid isPermaLink="false">https://medium.com/p/9ba00f8740b0</guid>
            <category><![CDATA[blackhat]]></category>
            <category><![CDATA[github]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[hack-with-github]]></category>
            <dc:creator><![CDATA[Chandrapal Badshah]]></dc:creator>
            <pubDate>Wed, 04 Oct 2017 20:01:54 GMT</pubDate>
            <atom:updated>2017-10-04T20:01:53.984Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*zfZzGK4i16KEx-FTUKlO6A.png" /></figure><p>On October 1, 2017 <a href="https://twitter.com/ToolsWatch">@toolswatch</a> announced the tools selected for <strong>Black Hat Arsenal Europe 2017</strong>.</p><h3>ToolsWatch on Twitter</h3><p>Black Hat Arsenal Europe 2017 Lineup: The Las Vegas Black Hat Arsenal during... https://t.co/Or5THT9HEq #ToolsWatch</p><p>Most of the selected tools are already present on GitHub and some are yet to be uploaded. This article contains the links to their respective repositories. The tools are arranged according to their tracks. If you like the tool, go to its repository and <strong>click <em>Watch</em></strong> to keep updated on the latest commits and pushes.</p><p><strong>Some tools will be updated during/after the Arsenal event. Links to the GitHub repositories of those tools will be eventually updated in this article.</strong></p><h3>Android, iOS and Mobile Hacking</h3><ul><li><strong>BadIntent — Integrating Android with Burp</strong><br><a href="https://github.com/mateuszk87/BadIntent">https://github.com/mateuszk87/BadIntent</a><br><strong><em>Presenter:</em></strong> Mateusz Khalil (<a href="https://twitter.com/mateuszk87">@mateuszk87</a>)</li><li><strong>DirtyTooth for Raspberry Pi (DirtyPi)</strong><br><a href="https://github.com/ElevenPaths/DirtyTooth-RaspberryPi">https://github.com/ElevenPaths/DirtyTooth-RaspberryPi</a><br><strong><em>Presenter:</em></strong> Álvaro Nuñez-Romero</li><li><strong>Objection</strong><br><a href="https://github.com/sensepost/objection">https://github.com/sensepost/objection</a><br><strong><em>Presenter:</em></strong> Leon Jacobs (<a href="https://twitter.com/leonjza">@leonjza</a>)</li></ul><h3>Cryptography</h3><ul><li><strong>Thalos — Simple and Secure Approach to Storage in Untrusted Environments</strong><br><a href="https://github.com/ecleipteon/Thalos">https://github.com/ecleipteon/Thalos</a><br><strong><em>Presenter:</em></strong> Luca Maria Castiglione (<a href="https://twitter.com/ecleipteon">@ecleipteon</a>)</li></ul><h3>Data Forensics and Incident Response</h3><ul><li><strong>CERTitude — An Open-Source and Agentless Compromise Assessment Tool</strong><br><a href="https://github.com/CERT-W/certitude">https://github.com/CERT-W/certitude</a><br><strong><em>Presenters:</em></strong> Jean Marsault (<a href="https://twitter.com/iansus">@iansus</a>), Vincent NGUYEN (<a href="https://twitter.com/nguvin">@nguvin</a>)</li><li><strong>CyBot — Open-Source Threat Intelligence Chat Bot (Revamped)</strong><br><a href="https://github.com/CylanceSPEAR/CyBot">https://github.com/CylanceSPEAR/CyBot</a><br><strong><em>Presenter:</em></strong> Tony Lee</li><li><strong>NG-NetMS &amp; OPTOSS Plus</strong><br><a href="https://github.com/opt-oss/NG-NetMS">https://github.com/opt-oss/NG-NetMS</a><br><strong><em>Presenter:</em></strong> Taras Matselyukh</li></ul><h3>Exploitation and Ethical Hacking</h3><ul><li><strong>2FAssassin</strong><br><a href="https://github.com/maxwellkoh/2FAssassin">https://github.com/maxwellkoh/2FAssassin</a><br><strong><em>Presenter:</em></strong> Maxwell Koh</li><li><strong>Exploit Pack</strong><br><a href="https://github.com/juansacco/exploitpack">https://github.com/juansacco/exploitpack</a><br><strong><em>Presenter:</em></strong> Juan Sacco (<a href="https://twitter.com/juansacco">@juansacco</a>)</li><li><strong>UAC-A-Mola</strong><br><a href="https://github.com/ElevenPaths/uac-a-mola">https://github.com/ElevenPaths/uac-a-mola</a><br><strong><em>Presenters:</em></strong> Pablo González Pérez (<a href="https://twitter.com/pablogonzalezpe">@pablogonzalezpe</a>), Santiago Hernández Ramos (<a href="https://twitter.com/santiagohramos">@santiagohramos</a>)</li></ul><h3>Hardware/Embedded</h3><ul><li><strong>DYODE, a DIY, Low-Cost Data Diode for ICS</strong><br><a href="https://github.com/arnaudsoullie/dyode">https://github.com/arnaudsoullie/dyode</a><br><strong><em>Presenter:</em></strong> Arnaud Soullié (<a href="http://twitter.com/arnaudsoullie">@arnaudsoullie</a>)</li></ul><h3>Human Factors</h3><ul><li><strong>PunyDomainCheck — Phishing Site Investigator</strong><br><a href="https://github.com/anilyuk/punydomaincheck">https://github.com/anilyuk/punydomaincheck</a><br><strong><em>Presenters:</em></strong> Anil Yuksel , Mert Karatas</li></ul><h3>Internet of Things</h3><ul><li><strong>WHID Injector — How to Bring HID Attacks to the Next Level</strong><br><a href="https://github.com/whid-injector/WHID">https://github.com/whid-injector/WHID</a><br><strong><em>Presenter:</em></strong> Luca Bongiorni (<a href="https://twitter.com/LucaBongiorni">@LucaBongiorni</a>)</li></ul><h3>Malware Defense</h3><ul><li><strong>Aktaion v2 — Open Source Machine Learning and Active Defense Tool</strong><br><a href="https://github.com/jzadeh/Aktaion">https://github.com/jzadeh/Aktaion</a><br><strong><em>Presenters:</em></strong> Joseph Zadeh (<a href="http://twitter.com/JosephZadeh">@JosephZadeh</a>), Rod Soto (<a href="http://twitter.com/rodsoto">@rodsoto</a>)</li></ul><h3>Network Attacks</h3><ul><li><strong>DET (Data Exfiltration Toolkit)</strong><br><a href="https://github.com/sensepost/DET">https://github.com/sensepost/DET</a><br><strong><em>Presenter:</em></strong> Paul Amar (<a href="https://twitter.com/PaulWebSec">@PaulWebSec</a>)</li><li><strong>FruityC2</strong><br><a href="https://github.com/xtr4nge/FruityC2">https://github.com/xtr4nge/FruityC2</a><br><strong><em>Twitter:</em></strong> <a href="https://twitter.com/FruityWifi">@FruityWifi</a><br><strong><em>Presenter: </em></strong>xtr4nge (<a href="https://twitter.com/xtr4nge">@xtr4nge</a>)</li></ul><h3>Network Defense</h3><ul><li><strong>ACE (Automated Collection and Enrichment Platform)</strong><br><a href="https://github.com/Invoke-IR/ACE">https://github.com/Invoke-IR/ACE</a><br><strong><em>Presenters: </em></strong>Jared Atkinson (<a href="https://twitter.com/jaredcatkinson">@jaredcatkinson</a>), Robby Winchester (<a href="https://twitter.com/robwinchester3">@robwinchester3</a>)</li><li><strong>Cloud Security Suite — One Stop Tool for AWS Security Audit</strong><br><a href="https://github.com/SecurityFTW/cs-suite">https://github.com/SecurityFTW/cs-suite</a><br><strong><em>Presenters:</em></strong> Jayesh Chauhan (<a href="https://twitter.com/jayeshsch">@jayeshsch</a>)</li><li><strong>WiPi-Hunter — WiFi-Pineapple Activities Detection</strong><br><a href="https://github.com/WiPi-Hunter">https://github.com/WiPi-Hunter</a><br><strong><em>Presenters:</em></strong> Besim Altinok (<a href="https://twitter.com/AltnokBesim">@AltnokBesim</a>), Mustafa Altinkaynak (<a href="https://twitter.com/m_altinkaynak">@m_altinkaynak</a>)</li></ul><h3>OSINT — Open Source Intelligence</h3><ul><li><strong>Datasploit — Automated Open Source Intelligence (OSINT) Tool</strong><br><a href="https://github.com/DataSploit/datasploit">https://github.com/DataSploit/datasploit</a><br><strong><em>Twitter:</em></strong> <a href="http://twitter.com/datasploit">@datasploit</a> <br><strong><em>Presenter:</em></strong> Shubham Mittal (<a href="http://twitter.com/upgoingstar">@upgoingstar</a>)</li><li><strong>Dradis: 10 Years Helping Security Teams Spend More Time Testing and Less Time Reporting</strong><br><a href="https://github.com/dradis/dradis-ce">https://github.com/dradis/dradis-ce</a><br><strong><em>Twitter:</em></strong> <a href="http://twitter.com/dradisfw">@dradisfw</a><br><strong><em>Presenter:</em></strong> Daniel Martin (<a href="http://twitter.com/etdsoft">@etdsoft</a>)</li><li><strong>OSINT-SPY</strong><br><a href="https://github.com/SharadKumar97/OSINT-SPY">https://github.com/SharadKumar97/OSINT-SPY</a><br><strong><em>Twitter: </em></strong><a href="https://twitter.com/osint_spy">@osint_spy</a><strong><em><br>Presenter:</em></strong> Sharad Kumar (<a href="https://twitter.com/sk_security">@sk_security</a>)</li></ul><h3>Vulnerability Assessment</h3><ul><li><strong>OpenSCAP and SCAP Security Guide</strong><br><a href="https://github.com/OpenSCAP/openscap">https://github.com/OpenSCAP/openscap</a><br><strong><em>Presenter:</em></strong> Martin Preisler (<a href="https://twitter.com/MartinPreisler">@MartinPreisler</a>)</li><li><strong>PowerSAP — Powershell Tool to Assess SAP Security</strong><br><a href="https://github.com/airbus-seclab/powersap">https://github.com/airbus-seclab/powersap</a><br><strong><em>Presenter: </em></strong>Joffrey Czarny</li></ul><h3>Web AppSec</h3><ul><li><strong>ModSecurity 3.0.0</strong><br><a href="https://github.com/SpiderLabs/ModSecurity">https://github.com/SpiderLabs/ModSecurity</a><br><strong><em>Presenters:</em></strong> Felipe Zimmerle (<a href="https://twitter.com/zimmerle">@zimmerle</a>), Victor Hora (<a href="https://twitter.com/victorhora">@victorhora</a>)</li><li><strong>OWASP ZAP</strong><br><a href="https://github.com/zaproxy/zaproxy">https://github.com/zaproxy/zaproxy</a><br><strong><em>Presenter:</em></strong> Simon Bennetts (<a href="https://twitter.com/psiinon">@psiinon</a>)</li><li><strong>PyMultiTor</strong><br><a href="https://github.com/realgam3/pymultitor">https://github.com/realgam3/pymultitor</a><br><strong><em>Presenter:</em></strong> Tomer Zait (<a href="http://twitter.com/realgam3">@realgam3</a>)</li><li><strong>Reflector — Burp Suite Extension</strong><br><a href="https://github.com/elkokc/reflector">https://github.com/elkokc/reflector</a><br><strong><em>Presenters:</em></strong> Alexander Shvetsov , Egor Dimitrenko (<a href="https://twitter.com/elk0kc">@elk0kc</a>)</li><li><strong>Seccubus</strong><br><a href="https://github.com/schubergphilis/Seccubus">https://github.com/schubergphilis/Seccubus</a><br><strong><em>Presenter:</em></strong> Frank Breedijk (<a href="https://twitter.com/seccubus">@seccubus</a>)</li><li><strong>XSSER — From XSS to RCE 2.75</strong><br><a href="https://github.com/Varbaek/xsser">https://github.com/Varbaek/xsser</a><br><strong><em>Presenter:</em></strong> Hans-Michael Varbaek</li></ul><p>If you haven’t looked at the selected tools, check the below embed to view the complete details of the tools and its presenters.</p><p><a href="http://www.toolswatch.org/2017/09/black-hat-arsenal-europe-2017-lineup/">Black Hat Arsenal Europe 2017 Lineup</a></p><blockquote><strong><em>If you liked this article, click </em></strong>👏 👏 👏<strong> button <em>and share so that other people will see it here on Medium.</em></strong></blockquote><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=9ba00f8740b0" width="1" height="1" alt=""><hr><p><a href="https://medium.com/hack-with-github/black-hat-arsenal-eu-2017-9ba00f8740b0">Black Hat Arsenal EU 2017</a> was originally published in <a href="https://medium.com/hack-with-github">Hack with GitHub</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Top 5 Security Tools — September 2017]]></title>
            <link>https://medium.com/hack-with-github/top-5-security-tools-september-2017-c0a86bb6379e?source=rss----946c37ed5afe---4</link>
            <guid isPermaLink="false">https://medium.com/p/c0a86bb6379e</guid>
            <category><![CDATA[security]]></category>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[hack-with-github]]></category>
            <category><![CDATA[github]]></category>
            <dc:creator><![CDATA[Chandrapal Badshah]]></dc:creator>
            <pubDate>Sat, 30 Sep 2017 09:19:56 GMT</pubDate>
            <atom:updated>2017-09-30T09:19:56.395Z</atom:updated>
            <content:encoded><![CDATA[<p>Here are the top 5 tools which got lots of likes and retweets for the month — September 2017.</p><h3>Hack with GitHub on Twitter</h3><p>HTTPLeaks - All possible ways, a website can leak HTTP requests by @cure53berlin https://t.co/6zj7kGFQQt</p><h3>Hack with GitHub on Twitter</h3><p>bugbounty-cheatsheet - List of interesting #payloads, tips and tricks for #BugBounty hunters Curator: @EdOverflow https://t.co/HqPCKUDiIM</p><h3>Hack with GitHub on Twitter</h3><p>CVE-2017-8759 - #Exploit #toolkit to test Microsoft .NET Framework #RCE #meterpreter #payload Author: @bhdresh https://t.co/Z3yfqbj6FO</p><h3>Hack with GitHub on Twitter</h3><p>Useful_Websites_For_Pentester : Collection of the #websites that can be used by #pentesters https://t.co/oXvm3uPtEe</p><h3>Hack with GitHub on Twitter</h3><p>linux-re-101 - A collection of resources for #linux #ReverseEngineering Author: @michalmalik https://t.co/g4zd0iAkNe</p><h3>Other Interesting Tweets :</h3><h3>Hack with GitHub on Twitter</h3><p>Tools on GitHub that have made it into @kalilinux 2017.2 https://t.co/lLveo0J2rC</p><blockquote><strong><em>If you liked this article, click </em></strong>👏 👏 👏<strong> button <em>and share so that other people will see it here on Medium.</em></strong></blockquote><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=c0a86bb6379e" width="1" height="1" alt=""><hr><p><a href="https://medium.com/hack-with-github/top-5-security-tools-september-2017-c0a86bb6379e">Top 5 Security Tools — September 2017</a> was originally published in <a href="https://medium.com/hack-with-github">Hack with GitHub</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[What’s new in Kali Linux 2017.2]]></title>
            <link>https://medium.com/hack-with-github/whats-new-in-kali-linux-2017-2-519ca23a8893?source=rss----946c37ed5afe---4</link>
            <guid isPermaLink="false">https://medium.com/p/519ca23a8893</guid>
            <dc:creator><![CDATA[Chandrapal Badshah]]></dc:creator>
            <pubDate>Sat, 23 Sep 2017 04:16:49 GMT</pubDate>
            <atom:updated>2017-09-23T04:16:48.444Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/proxy/0*sy0KkzQk5YnnaO83.png" /></figure><p>Hey,</p><p>Recently, the most awaited <strong>Kali Linux 2017.2</strong> was released. There are a lot of updates, tool additions and much more cool stuff shipped with the release. Get more details on the release at <a href="https://www.kali.org/news/kali-linux-2017-2-release/">https://www.kali.org/news/kali-linux-2017-2-release/</a>.</p><p>Before you go, do you want to know the latest tools that have been added to Kali Linux 2017.2 ?</p><p>Check out our article : <a href="https://goo.gl/x2uYFy">Tools on GitHub that have made it into Kali 2017.2</a>.</p><p>Have a great weekend !</p><p>Chandrapal</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=519ca23a8893" width="1" height="1" alt=""><hr><p><a href="https://medium.com/hack-with-github/whats-new-in-kali-linux-2017-2-519ca23a8893">What’s new in Kali Linux 2017.2</a> was originally published in <a href="https://medium.com/hack-with-github">Hack with GitHub</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Tools on GitHub that have made it into Kali 2017.2]]></title>
            <link>https://medium.com/hack-with-github/tools-on-github-that-have-made-it-into-kali-2017-2-fc2affc636e0?source=rss----946c37ed5afe---4</link>
            <guid isPermaLink="false">https://medium.com/p/fc2affc636e0</guid>
            <category><![CDATA[hack-with-github]]></category>
            <category><![CDATA[kali]]></category>
            <category><![CDATA[kali-linux]]></category>
            <category><![CDATA[hacking]]></category>
            <dc:creator><![CDATA[Chandrapal Badshah]]></dc:creator>
            <pubDate>Fri, 22 Sep 2017 19:10:56 GMT</pubDate>
            <atom:updated>2017-09-24T04:48:37.982Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/798/0*sy0KkzQk5YnnaO83.png" /></figure><p>Kali Linux 2017.2 was released on September 20, 2017. This release is a roll-up of all updates and fixes since our <a href="https://www.kali.org/news/kali-linux-20171-release/">2017.1 release</a> in April. More than a dozen Open Source tools present on GitHub have been added to this release.</p><p>This article showcases the tools that have been added to the latest release along with their descriptions. For more details on the release, have a look at the <a href="https://www.kali.org/news/kali-linux-2017-2-release/"><em>official release page</em></a><em> </em>.</p><h3>New Tools</h3><p>The newly added tools are:</p><h4><strong>apt2</strong></h4><p>[ <a href="https://github.com/MooseDojo/apt2">https://github.com/MooseDojo/apt2</a> ]</p><p>An Automated Penetration Testing Toolkit.</p><p>This tool will perform an NMap scan, or import the results of a scan from Nexpose, Nessus, or NMap. The processesd results will be used to launch exploit and enumeration modules according to the configurable Safe Level and enumerated service information.</p><h4><strong>b374k</strong></h4><p>[ <a href="https://github.com/b374k/b374k">https://github.com/b374k/b374k</a> ]</p><p>This PHP Shell is a useful tool for system or web administrator to do remote management without using cpanel, connecting using ssh, ftp etc. All actions take place within a web browser.</p><h4><strong>BloodHound</strong></h4><p>[ <a href="https://github.com/BloodHoundAD/BloodHound">https://github.com/BloodHoundAD/BloodHound</a> ]</p><p>BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. Defenders can use BloodHound to identify and eliminate those same attack paths.</p><h4><strong>BruteSpray</strong></h4><p>[ <a href="https://github.com/x90skysn3k/brutespray">https://github.com/x90skysn3k/brutespray</a> ]</p><p>BruteSpray takes nmap GNMAP/XML output and automatically brute-forces services with default credentials using Medusa. BruteSpray can even find non-standard ports by using the -sV inside Nmap.</p><h4><strong>changeme</strong></h4><p>[ <a href="https://github.com/ztgrace/changeme">https://github.com/ztgrace/changeme</a> ]</p><p>A default credential scanner. changeme is designed to be simple to add new credentials without having to write any code or modules.</p><h4><strong>CrackMapExec</strong></h4><p>[ <a href="https://github.com/byt3bl33d3r/CrackMapExec">https://github.com/byt3bl33d3r/CrackMapExec</a> ]</p><p>CrackMapExec is your one-stop-shop for pentesting Windows/Active Directory environments! <br>From enumerating logged on users and spidering SMB shares to executing psexec style attacks and auto-injecting Mimikatz into memory using Powershell!</p><h4><strong>CredDump7</strong></h4><p>[ <a href="https://github.com/moyix/creddump">https://github.com/moyix/creddump</a> ]</p><p>Python tool to extract various credentials and secrets from Windows registry hives. It essentially performs all the functions that bkhive/samdump2, cachedump, and lsadump2 do, but in a platform-independent way.</p><h4><strong>Crowbar</strong></h4><p>[ <a href="https://github.com/galkan/crowbar">https://github.com/galkan/crowbar</a> ]</p><p>Brute-forcing tool that can be used during penetration tests. It is developed to brute force some protocols in a different manner according to other popular brute forcing tools.</p><h4><strong>hURL</strong></h4><p>[ <a href="https://github.com/fnord0/hURL">https://github.com/fnord0/hURL</a> ]</p><p>A useful little hexadecimal and URL encoder/decoder</p><h4><strong>Hyperion</strong></h4><p>[ <a href="https://github.com/nullsecuritynet/tools/tree/master/binary/hyperion">https://github.com/nullsecuritynet/tools/tree/master/binary/hyperion</a> ]</p><p>Hyperion is a runtime encrypter for 32-bit portable executables.</p><h4><strong>InSpy</strong></h4><p>[ <a href="https://github.com/gojhonny/InSpy">https://github.com/gojhonny/InSpy</a> ]</p><p>A python based LinkedIn enumeration tool.</p><h4><strong>OSRFramework</strong></h4><p>[ <a href="https://github.com/i3visio/osrframework">https://github.com/i3visio/osrframework</a> ]</p><p>OSRFramework is a GNU AGPLv3+ set of libraries developed by i3visio to perform Open Source Intelligence tasks. They include references to a bunch of different applications related to username checking, DNS lookups, information leaks research, deep web search, regular expressions extraction and many others.</p><h4><strong>Phishery</strong></h4><p>[ <a href="https://github.com/ryhanson/phishery">https://github.com/ryhanson/phishery</a> ]</p><p>A simple SSL Enabled HTTP server with the primary purpose of phishing credentials via Basic Authentication. Phishery also provides the ability easily to inject the URL into a .docx Word document.</p><h4><strong>RedSnarf</strong></h4><p>[ <a href="https://github.com/nccgroup/redsnarf">https://github.com/nccgroup/redsnarf</a> ]</p><p>A pen-testing / red-teaming tool for retrieving hashes and credentials from Windows workstations, servers and domain controllers using OpSec Safe Techniques.</p><h4><strong>SSH-Audit</strong></h4><p>[ <a href="https://github.com/arthepsy/ssh-audit">https://github.com/arthepsy/ssh-audit</a> ]</p><p>A tool for SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)</p><h4><strong>wig</strong></h4><p>[ <a href="https://github.com/jekyc/wig">https://github.com/jekyc/wig</a> ]</p><p>WebApp Information Gatherer is a web application information gathering tool, which can identify numerous Content Management Systems and other administrative applications.</p><h3>Updated Tools</h3><p>On top of all the new packages, this release also includes numerous package updates.</p><p>The updated tools are :</p><ul><li><strong>bettercap <br></strong>[ <a href="https://github.com/evilsocket/bettercap">https://github.com/evilsocket/bettercap</a> ]</li><li><strong>Commix</strong> <br>[ <a href="https://github.com/commixproject/commix">https://github.com/commixproject/commix</a> ]</li><li><strong>DNSEnum</strong> <br>[ <a href="https://github.com/fwaeytens/dnsenum">https://github.com/fwaeytens/dnsenum</a> ]</li><li><strong>exe2hex</strong> <br>[ <a href="https://github.com/g0tmi1k/exe2hex">https://github.com/g0tmi1k/exe2hex</a> ]</li><li><strong>JD-GUI <br></strong>[ <a href="https://github.com/java-decompiler/jd-gui">https://github.com/java-decompiler/jd-gui</a> ]</li><li><strong>king-phisher</strong> <br>[ <a href="https://github.com/securestate/king-phisher">https://github.com/securestate/king-phisher</a> ]</li><li><strong>msfpc <br></strong>[ <a href="https://github.com/g0tmi1k/mpc">https://github.com/g0tmi1k/mpc</a> ]</li><li><strong>Nmap</strong> <br>[ <a href="https://github.com/nmap/nmap">https://github.com/nmap/nmap</a> ]</li><li><strong>routersploit <br></strong>[ <a href="https://github.com/reverse-shell/routersploit">https://github.com/reverse-shell/routersploit</a> ]</li><li><strong>SMBMap</strong> <br>[ <a href="https://github.com/ShawnDEvans/smbmap">https://github.com/ShawnDEvans/smbmap</a> ]</li><li><strong>WPScan <br></strong>[ <a href="https://github.com/wpscanteam/wpscan">https://github.com/wpscanteam/wpscan</a> ]</li></ul><h3>Other interesting packages:</h3><ul><li><strong>britney2</strong> <br>[ <a href="https://github.com/Debian/britney2">https://github.com/Debian/britney2</a> ]<br>Debian’s britney tool to build testing.</li><li><strong>DBeaver</strong> <br>[ <a href="https://github.com/serge-rider/dbeaver">https://github.com/serge-rider/dbeaver</a> ]<br>DBeaver is free and open source (GPL) universal database tool for developers and database administrators</li><li><strong>OpenSSL</strong> <br>[ <a href="https://github.com/openssl/openssl">https://github.com/openssl/openssl</a> ]<br>TLS/SSL and crypto library</li><li><strong>ruby-net-http-pipeline</strong> <br>[ <a href="https://github.com/pld-linux/ruby-net-http-pipeline">https://github.com/pld-linux/ruby-net-http-pipeline</a> ]<br>An HTTP/1.1 pipelining implementation atop Net::HTTP</li><li><strong>secure-socket-funneling</strong> <br>[ <a href="https://github.com/securesocketfunneling/ssf">https://github.com/securesocketfunneling/ssf</a> ]<br>A network tool and toolkit</li><li><strong>wgetpaste</strong> <br>[ <a href="https://github.com/zlin/wgetpaste">https://github.com/zlin/wgetpaste</a> ]<br>Simple command-line interface to various online pastebin services</li></ul><p>Lots of Python packages are also added.</p><ul><li><strong>pyexcel-ods</strong> <br>[ <a href="https://github.com/pyexcel/pyexcel-ods">https://github.com/pyexcel/pyexcel-ods</a> ]</li><li><strong>pysmb</strong> <br>[ <a href="https://github.com/miketeo/pysmb">https://github.com/miketeo/pysmb</a> ]</li><li><strong>python-advancedhttpserver</strong> [Updated] <br>[ <a href="https://github.com/zeroSteiner/AdvancedHTTPServer">https://github.com/zeroSteiner/AdvancedHTTPServer</a> ]</li><li><strong>python-cerberus</strong> <br>[ <a href="https://github.com/pyeve/cerberus">https://github.com/pyeve/cerberus</a> ]</li><li><strong>python-graphene-sqlalchemy <br></strong>[ <a href="https://github.com/graphql-python/graphene-sqlalchemy">https://github.com/graphql-python/graphene-sqlalchemy</a> ]</li><li><strong>python-graphql-core</strong> <br>[ <a href="https://github.com/graphql-python/graphql-core">https://github.com/graphql-python/graphql-core</a> ]</li><li><strong>python-ipwhois <br></strong>[ <a href="https://github.com/secynic/ipwhois">https://github.com/secynic/ipwhois</a> ]</li><li><strong>python-libnmap <br></strong>[ <a href="https://github.com/savon-noir/python-libnmap">https://github.com/savon-noir/python-libnmap</a> ]</li><li><strong>python-oauth2</strong> <br>[ <a href="https://github.com/wndhydrnt/python-oauth2">https://github.com/wndhydrnt/python-oauth2</a> ]</li><li><strong>PyUserInput <br></strong>[ <a href="https://github.com/SavinaRoja/PyUserInput">https://github.com/SavinaRoja/PyUserInput</a> ]</li></ul><p>For more details on the changes, have a look at the <a href="https://bugs.kali.org/changelog_page.php"><em>official change log page</em></a><em> </em>.</p><blockquote>It’s never too late to write code.<br>If you wish to create a security tool, do it now.<br>Who knows, it might be included in a future release of Kali.</blockquote><h4>Call to Action</h4><blockquote><strong><em>If you liked this article, click </em></strong>👏 👏 👏<strong> <em>and share so that other people will see it here on Medium.</em></strong></blockquote><p>Want to get daily updates on latest security tools developed on GitHub, then follow us on <a href="https://twitter.com/HackwithGithub"><strong><em>Twitter</em></strong></a>, <a href="https://facebook.com/HackwithGithub"><strong><em>Facebook</em></strong></a> and <a href="https://github.com/hackwith"><strong><em>GitHub</em></strong></a>.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=fc2affc636e0" width="1" height="1" alt=""><hr><p><a href="https://medium.com/hack-with-github/tools-on-github-that-have-made-it-into-kali-2017-2-fc2affc636e0">Tools on GitHub that have made it into Kali 2017.2</a> was originally published in <a href="https://medium.com/hack-with-github">Hack with GitHub</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Top 5 Security Tools — August 2017]]></title>
            <link>https://medium.com/hack-with-github/top-5-security-tools-august-2017-21e6dc088f8e?source=rss----946c37ed5afe---4</link>
            <guid isPermaLink="false">https://medium.com/p/21e6dc088f8e</guid>
            <category><![CDATA[security]]></category>
            <category><![CDATA[hack-with-github]]></category>
            <category><![CDATA[hacking-tools]]></category>
            <dc:creator><![CDATA[Chandrapal Badshah]]></dc:creator>
            <pubDate>Fri, 01 Sep 2017 11:46:21 GMT</pubDate>
            <atom:updated>2017-09-01T11:46:20.907Z</atom:updated>
            <content:encoded><![CDATA[<p>Hey,</p><p>Lots of tools were tweeted in August but most of the security folks found 5 tools really useful.</p><p>Wanna know which tools ? Have a look at it.</p><p><a href="https://medium.com/hack-with-github/top-5-security-tools-august-2017-bbae4e155c59">https://medium.com/hack-with-github/top-5-security-tools-august-2017-bbae4e155c59</a></p><p>Happy Hacking !</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=21e6dc088f8e" width="1" height="1" alt=""><hr><p><a href="https://medium.com/hack-with-github/top-5-security-tools-august-2017-21e6dc088f8e">Top 5 Security Tools — August 2017</a> was originally published in <a href="https://medium.com/hack-with-github">Hack with GitHub</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Top 5 Security Tools —August 2017]]></title>
            <link>https://medium.com/hack-with-github/top-5-security-tools-august-2017-bbae4e155c59?source=rss----946c37ed5afe---4</link>
            <guid isPermaLink="false">https://medium.com/p/bbae4e155c59</guid>
            <category><![CDATA[hack-with-github]]></category>
            <category><![CDATA[github]]></category>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[security]]></category>
            <dc:creator><![CDATA[Chandrapal Badshah]]></dc:creator>
            <pubDate>Thu, 31 Aug 2017 18:31:01 GMT</pubDate>
            <atom:updated>2017-08-31T18:31:01.080Z</atom:updated>
            <content:encoded><![CDATA[<p>Here are the top 5 tools which got lots of likes and retweets for the month — August 2017.</p><h3>Hack with GitHub on Twitter</h3><p>portia - Automated tool for internal #network #pentests Author: @keith55 https://t.co/gaJC4VqZAY</p><h3>Hack with GitHub on Twitter</h3><p>Awesome #Lockpicking : Curated list of awesome resources related to the #security and compromise of locks https://t.co/9by7A8KIrE</p><h3>Hack with GitHub on Twitter</h3><p>Sherlock - #PowerShell script to find missing software patches for #PrivEsc #vulnerabilities Author: @_RastaMouse https://t.co/scMry9JTVM</p><h3>Hack with GitHub on Twitter</h3><p>canisrufus - A stealthy #Python based #Windows #backdoor that uses Github as a C&amp;amp;C server Author: @maldevel https://t.co/jTo6zmoumn</p><h3>Hack with GitHub on Twitter</h3><p>Penetration Testing tools - Curated list of latest #pentest tools by @AptiveSec Curator: @HighOn_Coffee https://t.co/iat6yg53Us</p><h3>Cool Gists</h3><h3>Hack with GitHub on Twitter</h3><p>A collection of good #XXE #Payloads https://t.co/njYqSdJXso</p><h3>Other interesting tweets</h3><h3>rvrsh3ll on Twitter</h3><p>Empire 2.1 is out! Check the changelog https://t.co/x8HDDItEji Some great additions including Invoke-Obfuscation from @cobbr_io</p><h3>bettercap on Twitter</h3><p>Yo, bettercap v1.6.2 is out with a lot of new features! https://t.co/ZSQEEaa3lL</p><h3>ToolsWatch on Twitter</h3><p>We are trying to keep a track about all tools (and authors) presented in Black Hat Arsenal since 2011 https://t.co/UQPGsJ7Dbn</p><h3>Achievements</h3><p>Our repository <strong>Awesome-Hacking</strong> reached 17,000+ stars</p><p><a href="https://github.com/Hack-with-Github/Awesome-Hacking">GitHub - Hack-with-Github/Awesome-Hacking: A collection of various awesome lists for hackers, pentesters and security researchers</a></p><p>We also started a new repository — <strong>Awesome-Security-Gists</strong> — to curate GitHub gists related to security.</p><p><a href="https://github.com/Hack-with-Github/Awesome-Security-Gists">Hack-with-Github/Awesome-Security-Gists</a></p><blockquote><strong><em>If you liked this article, click the </em></strong>👏<strong> button <em>and share so that other people will see it here on Medium.</em></strong></blockquote><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fupscri.be%2Fb48e6b%3Fas_embed%3Dtrue&amp;url=https%3A%2F%2Fupscri.be%2Fb48e6b%2F&amp;image=https%3A%2F%2Fupscri.be%2Fmedia%2Fform.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=upscri" width="800" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/8934357c9545ea97a4153b150c06b48a/href">https://medium.com/media/8934357c9545ea97a4153b150c06b48a/href</a></iframe><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=bbae4e155c59" width="1" height="1" alt=""><hr><p><a href="https://medium.com/hack-with-github/top-5-security-tools-august-2017-bbae4e155c59">Top 5 Security Tools —August 2017</a> was originally published in <a href="https://medium.com/hack-with-github">Hack with GitHub</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Thanks for your support !]]></title>
            <link>https://medium.com/hack-with-github/thanks-for-your-support-7573f0ee7d51?source=rss----946c37ed5afe---4</link>
            <guid isPermaLink="false">https://medium.com/p/7573f0ee7d51</guid>
            <category><![CDATA[github]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[hack-with-github]]></category>
            <dc:creator><![CDATA[Chandrapal Badshah]]></dc:creator>
            <pubDate>Tue, 08 Aug 2017 04:58:36 GMT</pubDate>
            <atom:updated>2017-08-28T06:27:08.869Z</atom:updated>
            <content:encoded><![CDATA[<p>On August 07, 2017 we woke up to the news that our baby project <a href="https://github.com/Hack-with-Github/Awesome-Hacking"><strong>Awesome-Hacking</strong></a> turned out to be the top trending repository on GitHub.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/763/1*uFZN3WpXOI2OXI3GPSPA4g.png" /></figure><p>It successfully <strong><em>crossed 10,000 stars</em></strong> which indeed is a great achievement. It was overwhelmingly joyful to see that our repository overtook other GitHub repositories of large organizations like Google, Facebook and Microsoft, in terms of the number of stargazers on that particular day.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*n6ucZXWNtWriPdgud5478g.png" /></figure><p>There was a huge increase on the traffic to the repository — 10,000+ views and 6,000+ unique views — in a single day.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*yF84P7HqjGLgIZwHeE3qZg.png" /></figure><p>So many cool people shared this repository on Twitter:</p><h3>Azeria on Twitter</h3><p>For those of you looking for resources, here&#39;s a great collection of repositories covering various security topics: https://t.co/klXt3umCqF</p><h3>Binni Shah on Twitter</h3><p>Hack with Github : Hacking Lists Index : https://t.co/bbp640cdHW</p><h3>Catalin Cimpanu on Twitter</h3><p>The mother of all infosec lists https://t.co/Wd5IhWr15Z</p><h3>PenTest Magazine on Twitter</h3><p>Awesome Hacking-collection of awesome lists for hackers, pentesters &amp;amp; security researchers #hacking #pentesting https://t.co/B1zhgVgxqL</p><blockquote><strong>This wouldn’t have been possible without your support through stargazing and sharing the repository on Twitter and Facebook.</strong></blockquote><p>Thank you.</p><p>If you haven’t shared this repository, heres a chance to do that on Twitter:</p><blockquote>Awesome-Hacking :<br>Collection of awesome lists for hackers, pentesters and security researchers by @HackwithGithub <br><a href="https://github.com/Hack-with-Github/Awesome-Hacking">https://github.com/Hack-with-Github/Awesome-Hacking</a></blockquote><blockquote><strong><em>If you liked this article, click the </em></strong>👏<strong> button <em>and share so that other people will see it here on Medium.</em></strong></blockquote><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=7573f0ee7d51" width="1" height="1" alt=""><hr><p><a href="https://medium.com/hack-with-github/thanks-for-your-support-7573f0ee7d51">Thanks for your support !</a> was originally published in <a href="https://medium.com/hack-with-github">Hack with GitHub</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
    </channel>
</rss>