<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Pentesting on samanl33t/blog</title><link>https://blog.samanl33t.com/tags/pentesting/</link><description>Recent content in Pentesting on samanl33t/blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Thu, 14 May 2026 09:00:00 +0300</lastBuildDate><atom:link href="https://blog.samanl33t.com/tags/pentesting/index.xml" rel="self" type="application/rss+xml"/><item><title>Introducing HackPass - Deliberately Vulnerable Password Manager (Windows/macOS)</title><link>https://blog.samanl33t.com/writings/0x0002-introducing-hackpass/</link><pubDate>Thu, 14 May 2026 09:00:00 +0300</pubDate><guid>https://blog.samanl33t.com/writings/0x0002-introducing-hackpass/</guid><description>&lt;p&gt;HackPass v1.0.0 is out: &lt;a href="https://github.com/samanL33T/HackPass"&gt;github.com/samanL33T/HackPass&lt;/a&gt;. I&amp;rsquo;ve been building this on and off for a few weeks, and it&amp;rsquo;s reached the point where it&amp;rsquo;s worth handing to other people and LLMs to break. It&amp;rsquo;s a deliberately vulnerable password manager specifically to practice analysing Qt6-based desktop applications. It&amp;rsquo;s not a real password manager. It&amp;rsquo;s a target for runtime instrumentation and reverse engineering. Don&amp;rsquo;t put real credentials in it.&lt;/p&gt;</description></item></channel></rss>