Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Monday, May 12, 2025

Author: Shubham Goyal

A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.

Zphisher – A Automated Phishing Tool

Shubham Goyal1 November 20206 November 2020
Soical Engineering

Hey Folks, in this tutorial we are going to talk about another new phishing tool named “Zphisher“. Zphisher is an open source tool, originally designed to carry out phishing attacks through social engineering, with 30 different-2 types of phishing pages through which you can obtain the credentials of a social […]

Continue Reading

Nexphisher – A Advance Phishing Tool

Shubham Goyal1 November 20201 November 2020
Soical Engineering

Hey Folks, in this tutorial we are going to talk about another new phishing tool named “Nexphisher“. Nexphisher is an open source tool, originally designed to carry out phishing attacks through social engineering, with 30 different-2 types of phishing pages through which you can obtain the credentials of a social […]

Continue Reading

How Hackers Increase Their Instagram Followers

Shubham Goyal1 November 20201 November 2020
Andorid Hacking / Exploiting Tools

Hey Folks, in this tutorial we’ll show you how attackers increase and decrease their Instagram followers using “instagram-tools“. The tool is coded in node js and specifically designed to do some interesting activity with Instagram accounts. We are giving all the features of this tool which you can read from […]

Continue Reading

Facebook Account Hacking Using Bruteforce

Shubham Goyal1 November 20201 November 2020
Dictionary and Bruteforce

Hey Folks, in this tutorial we are going to talk about an another facebook brute forcing tool called “FaceBoom“. As we know that brute force attack is a well known cracking method in which involves ‘guessing’ username and passwords to gain unauthorized access to a system. Likewise, we will perform […]

Continue Reading

Crack Facebook Account Login via Facebook-Bruter

Shubham Goyal1 November 20201 November 2020
Dictionary and Bruteforce / Exploiting Tools

Hey Folks, in this tutorial we are going to talk about an another facebook brute forcing tool called “Facebook-Bruter“. Basically facebook bruter is a facebook cracking tool from which you can crack login of facebook accounts using dictionary or wordlist. You have to provide the victim account username, email or […]

Continue Reading

Crack Instagram Account Using BruteForce

Shubham Goyal1 November 20201 November 2020
Dictionary and Bruteforce / Exploiting Tools

Hey Folks, in this article we have interesting tools for you that can help you handle someone else’s Instagram account. This program will brute force any Instagram account you send it its way. Just give it a target, a password list and a mode then you need to press enter […]

Continue Reading

Crack Instagram Account Password via Instagram-py Tool

Shubham Goyal1 November 20201 November 2020
Dictionary and Bruteforce / Exploiting Tools

Hey Folks, in this tutorial we are going to talk about an Instagram brute forcing tool called “Instagram-py”. Instagram-Py is a slick python script to perform brute force attack against Instagram accounts. This script can bypass login limiting on wrong passwords , so basically it can test infinite number of […]

Continue Reading

Patator – A Brute Forcing Tool

Shubham Goyal28 October 202028 October 2020
Dictionary and Bruteforce

Hey Folks, in this tutorial we are going to talk about another new brute forcing tool named “Patator“. Patator was written out of frustration from using Hydra, Medusa, Ncrack, Metasploit modules and Nmap NSE scripts for password guessing attacks. I opted for a different approach in order to not create […]

Continue Reading

X-Hydra – A GUI Based Brute Forcing Tool

Shubham Goyal28 October 202028 October 2020
Dictionary and Bruteforce

Hey Folks, in this tutorial we are going to discuss about another tool called “X-Hydra“. Basically it is a GUI version of the Hydra bruteforcing tool and if you want to know about its command line tool you can go here. Apart from this you can read the complete introduction […]

Continue Reading

Posts pagination

Previous 1 … 15 16 17 … 32 Next

For Business and Promo Inquiries

Stylish Email Button

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy