Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Wednesday, May 14, 2025

Author: Shubham Goyal

A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.

Mobile Platform Hacking (WAN) Through Google Cloud Shell

Shubham Goyal23 September 202012 January 2021
Andorid Hacking

Hey Folks, in this tutorial we are going to discuss about another topic related to google cloud shell. Let’s talk straight away 🙂 !! As you know that to access any android device, we need to take meterpreter session through the kali Linux operating system or any other. But suppose […]

Continue Reading

Perform Phishing Attack Through Google Cloud Shell

Shubham Goyal23 September 202023 September 2020
Andorid Hacking / Ethical Hacking

Hey Folks, as we know that whenever we need to do a phishing attack, we use github tools and to execution them we need an operating system such as : kali linux, parrot os etc. But sometimes due to various reasons we are not able to reach the localhost machine, […]

Continue Reading

Hunt Down Social Media Accounts by Username and Mobile Number

Shubham Goyal23 September 202022 October 2020
Andorid Hacking / Exploiting Tools / Information Gathering

Hey Folks, In this article we are going to talk about an very interesting tools by which we can hunt social media accounts through username and mobile numbers. Both tools are open sources and available on github that you can opt by given links below. As you know that nowadays […]

Continue Reading

Multiple Ways to Embed a Payload in an Original APK File

Shubham Goyal21 September 202021 September 2020
Andorid Hacking / Ethical Hacking / Exploiting Tools

Hey Folks, as we know beginners try to find the best ways that they can embed the payload into the original APK, But it takes their long time to do research on it. So in this article we will give you all the working methods, with the help of which […]

Continue Reading

Perfectly Inject a Payload in an Original Facebook APK

Shubham Goyal21 September 202021 September 2020
Andorid Hacking / Ethical Hacking

Hey Folks, I think we are all familiar with the Metasploit framework and whenever a beginner makes their move in the h@cking field their first objective is to h@ck android smartphones but they are not satisfied with creating a simple backdoor so they try to inject malicious payloads into the […]

Continue Reading

Multiple Ways to Send Email Anonymously

Shubham Goyal21 September 202021 September 2020
Andorid Hacking / Ethical Hacking / Exploiting Tools

Hey Folks, In this tutorial we will talk about several ways through which we can send or receive emails to bypass verification and send documents anonymously to someone else. At times we require an anonymous email address for many reasons and we take the help of paid service, but in […]

Continue Reading

Unrestricted File Uploading Vulnerability

Shubham Goyal17 September 202017 September 2020
Web Penetration Testing

Hey Folks, in this tutorial we are going to talk about another vulnerability that is often found in a web application called “Unrestricted File Uploading Vulnerability“. We know that file uploading facility is found in many web applications in which user can upload important documents such as: reduce file size, […]

Continue Reading

Monsoon – A Fastest HTTP Enumerator For CTF

Shubham Goyal15 September 202022 October 2020
Bugbounty Tools / Exploiting Tools

Hey Folks, in this tutorial we are going to talk about another FUZZING tool called “Monsoon“. The tool is designed in bash scripting that allows us to execute a large number of HTTP requests within a few seconds. But the question is, what is special about it that makes it […]

Continue Reading

OpenRedireX – A Open Redirection Vulnerability Finder

Shubham Goyal15 September 202022 October 2020
Bugbounty Tools / Exploiting Tools

Hey Folks, in this tutorial we are going to talk about an open source “Open Redirection” vulnerability finder tool called “OpenRedireX“. Simply tool takes the URL from the user and then it constantly tries to find open redirect issues using its own wordlist that called as “FUZZING“. If you want […]

Continue Reading

Posts pagination

Previous 1 … 19 20 21 … 32 Next

For Business and Promo Inquiries

Stylish Email Button

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy