Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Thursday, May 15, 2025

Author: Shubham Goyal

A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.

CMS Made Simple 2.2.14 Exploit – Arbitrary File Upload

Shubham Goyal17 August 202017 August 2020
CVE (POC)

Hey Folks, In this tutorial we will show you the (POC) of cms made simple 2.2.14 which is vulnerable to arbitrary file upload vulnerability. This vulnerability allow an authenticated user to upload arbitrary file on the file manager. About the Vulnerability Vulnerability Setup Full Proof of Concept

Continue Reading

Evine – A Interactive Web Crawler

Shubham Goyal17 August 202022 October 2020
Bugbounty Tools / Exploiting Tools

Hey Folks, in this tutorial we will discuss the “web crawler” tool that will help to find important and hidden files or directories from web application. Let’s talk about the interacting and features of this tool. There is no such special feature in this tool but when we use it […]

Continue Reading

Chalumeau – A GUI Based Credential Dumping

Shubham Goyal17 August 202022 October 2020
Ethical Hacking / Exploiting Tools / Window Hacking

Hey Folks, in this tutorial we are going to talk about an interesting tool called “Chalumeau“. This may be necessary for those who are not familiar with the command line as it provides us (GUI) interface to dump credentials from the victim machine. From the owner we found out it […]

Continue Reading

CAPTCHAs Bypassing

Shubham Goyal14 August 202014 August 2020
Web Penetration Testing

Hey Folks, I think we are familiar with captcha because some people get irritated by it and for some it becomes a game 🙂 🙂 ! Come back to work and talk about CAPTCHA bypassing. As we know that the CAPTCHA is used to identify whether the user is human […]

Continue Reading

XPATH Injection – Attacks and Mitigation

Shubham Goyal12 August 202012 August 2020
Web Penetration Testing

Hey Folks, In this tutorial we are going to discuss about XPATH Injection. As we know that that injection vulnerability is one of the top 10 most prominent vulnerabilities of the 2020 OWASP. This vulnerability can be dangerous for web applications, because this vulnerability allows an attackers to obtain details […]

Continue Reading

PhoneInfoga – OSINT Tool for Phone Numbers

Shubham Goyal11 August 20204 December 2020
Ethical Hacking / Exploiting Tools / Information Gathering

Hey Folks, In the tutorial we are going to talk about an OSINT tool that will help us gather information on phone numbers. Sometimes we get some fake numbers or calls asking about our account details or personal details even most people give details of them, as a result of […]

Continue Reading

Kage – Control Android and Window Device with GUI Interface

Shubham Goyal11 August 202021 October 2020
Andorid Hacking / Exploiting Tools / Window Hacking

Hey Folks, In this tutorial we are going to discuss about an interesting tool called “Kage“. It is specifically designed to create payloads for different platforms and interact with the meterpreter session via the (GUI) interface. But through this program we cannot execute the command because it gives us limited […]

Continue Reading

Monitor Persistence

Shubham Goyal10 August 202022 October 2020
Persistence

Hey Folks, In this tutorial we are going to point out another important topic in which we will maintain consistency on the target system by injecting a malicious DLL file on the “monitor” registry. If you want to know about how we can create persistence on window 10 machine through […]

Continue Reading

DLL Hijacking – Persistence

Shubham Goyal10 August 202022 October 2020
Persistence

Hey Folks, in this tutorial we are going to perform DLL hijacking and the idea is very simple that through this technique we will inject our bad DLL file and as soon as the system reboots it will give us complete control of the target system. Requirements Lets do it […]

Continue Reading

Posts pagination

Previous 1 … 22 23 24 … 32 Next

For Business and Promo Inquiries

Stylish Email Button

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy