<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Ella Harding</title>
    <description>The latest articles on DEV Community by Ella Harding (@ella_harding_4bd7bc0e03b9).</description>
    <link>https://dev.to/ella_harding_4bd7bc0e03b9</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3897100%2F1edc9944-582e-4719-a790-ffead9b135a9.png</url>
      <title>DEV Community: Ella Harding</title>
      <link>https://dev.to/ella_harding_4bd7bc0e03b9</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/ella_harding_4bd7bc0e03b9"/>
    <language>en</language>
    <item>
      <title>VanillaRat 1.7</title>
      <dc:creator>Ella Harding</dc:creator>
      <pubDate>Fri, 15 May 2026 06:42:46 +0000</pubDate>
      <link>https://dev.to/ella_harding_4bd7bc0e03b9/vanillarat-17-mf3</link>
      <guid>https://dev.to/ella_harding_4bd7bc0e03b9/vanillarat-17-mf3</guid>
      <description>&lt;p&gt;VanillaRAT 1.7 has emerged as a sophisticated Remote Access Trojan (RAT) with enhanced capabilities for stealthy system infiltration and persistent control.&lt;br&gt;
&lt;a href="https://blackhatus.com/vanillarat-1-7/%5B%5D(url)" rel="noopener noreferrer"&gt;https://blackhatus.com/vanillarat-1-7/[](url)&lt;/a&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>webdev</category>
      <category>programming</category>
      <category>productivity</category>
    </item>
    <item>
      <title>Vidar Stealer 2025</title>
      <dc:creator>Ella Harding</dc:creator>
      <pubDate>Fri, 15 May 2026 05:42:37 +0000</pubDate>
      <link>https://dev.to/ella_harding_4bd7bc0e03b9/vidar-stealer-2025-82n</link>
      <guid>https://dev.to/ella_harding_4bd7bc0e03b9/vidar-stealer-2025-82n</guid>
      <description>&lt;p&gt;In the evolving landscape of cybersecurity, tools designed to test network vulnerabilities play a crucial role, both for defenders and attackers.&lt;br&gt;
&lt;/p&gt;
&lt;div class="crayons-card c-embed text-styles text-styles--secondary"&gt;
    &lt;div class="c-embed__content"&gt;
        &lt;div class="c-embed__cover"&gt;
          &lt;a href="https://blackhatus.com/vyprvpn-checker-2025/" class="c-link align-middle" rel="noopener noreferrer"&gt;
            &lt;img alt="" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fblackhatus.com%2Fwp-content%2Fuploads%2F2025%2F04%2FVyprVPN-Checker-2025-.png" height="406" class="m-0" width="800"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="c-embed__body"&gt;
        &lt;h2 class="fs-xl lh-tight"&gt;
          &lt;a href="https://blackhatus.com/vyprvpn-checker-2025/" rel="noopener noreferrer" class="c-link"&gt;
            VyprVPN Checker 2025 | BlackHatUs.Com
          &lt;/a&gt;
        &lt;/h2&gt;
          &lt;p class="truncate-at-3"&gt;
            VyprVPN Checker 2025 detects VPN leaks, DNS flaws, and weak encryption, aiding both security testing and malicious network exploitation.
          &lt;/p&gt;
        &lt;div class="color-secondary fs-s flex items-center"&gt;
          blackhatus.com
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;


</description>
      <category>ai</category>
      <category>webdev</category>
      <category>programming</category>
      <category>productivity</category>
    </item>
  </channel>
</rss>
