Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Sunday, May 11, 2025

Day: 13 July 2020

ParamSpider : Vulnerable XSS, IDOR, SSRF Parameter Finder

Shubham Goyal13 July 202022 October 2020
Bugbounty Tools / Exploiting Tools

Hey folks, today we are going to talk about an interesting tool called “ParamSpider“. It is extremely designed for scrap the vulnerable parameter from the web application that can be helpful during the penetration testing. Key Features Lets do it 🙂 !! Installation First we need to download this tool […]

Continue Reading

Cr3dOv3r: A Credential Reuse Attack Tool

Shubham Goyal13 July 202022 October 2020
Exploiting Tools / Information Gathering

Hey Folks, In this tutorial we will present an interesting tool, which is used only for credential reuse attacks. Cr3dOv3r is a python-based tool, which simply uses email address for credential reuse attack. In short, if you have a user’s email and password, you can easily find out which social […]

Continue Reading

For Business and Promo Inquiries

Stylish Email Button

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy