Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Wednesday, Jun 11, 2025

Author: Shubham Goyal

A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.

Web Application Vulnerability Finder – Scant3R

Shubham Goyal9 July 202021 October 2020
Bugbounty Tools / Exploiting Tools

Hey folks, in this tutorial we are going to talk about an automation tool that will help you to detect vulnerabilities in web applications. If you are a beginner then you can go with this tool as it will provide you with exploits so that you can easily find vulnerabilities […]

Continue Reading

Multiple Ways to Directory Bruteforcing on Web Server

Shubham Goyal7 July 202022 October 2020
Web Penetration Testing

Hey Folks, this article can be valuable for bug bounty hunters and CTF players because in this tutorial we will talk about the best hidden directory finder tools that will help you do enumeration. What do you get ? Lets take a look 🙂 !! Gobuster Gobuster is an open […]

Continue Reading

MSFPC – Create Payload For Android, Windows and More

Shubham Goyal5 July 202021 October 2020
Ethical Hacking / Exploiting Tools / Window Hacking

Hey Folks, in this tutorial we will talk about the MSFPC tool which is already installed in Kali Linux. If you know about the Msf-venom then you can easily understanding because it is alternative. In msf-venom you have to create the payload yourself and with the msfpc tool you can […]

Continue Reading

Evil SSDP – Spoof SSDP Replies and UPnP Devices

Shubham Goyal3 July 202021 October 2020
Ethical Hacking / Soical Engineering

Hey folks, in this tutorial you will learn how we can perform phishing attack by create a fake UPnP device to get credentials. But before start this you should have some knowledge about the SSDP and UPnP services. What is SSDP? SSDP is a Simple Service Discovery Protocol that is […]

Continue Reading

5 Ways to Crack WordPress Login

Shubham Goyal1 July 202021 October 2020
Ethical Hacking / Exploiting Tools / Password Cracking / Web Penetration Testing

Hey Folks, in this tutorial we are going to talk about five ways that will helps you to crack the WordpPress login. About the WordPress ? WordPress is becoming a most popular CMS (content management system) because of his user friendly interface. WordPress is a open source platform which written […]

Continue Reading

Multiple Ways to Crack ZIP File Passwords

Shubham Goyal26 June 202021 October 2020
Ethical Hacking / Exploiting Tools / Password Cracking

Hey Folks, in this tutorial we will show you how we can crack passwords of any zip file in few second. In this tutorial we will uses more than one software or tools to recover forgotten ZIP password. As we know that removal of a password from an encrypted zip […]

Continue Reading

Hack Audio Recording of Android Phone

Shubham Goyal24 June 202021 October 2020
Andorid Hacking / Ethical Hacking

Hey Folks, in this tutorial we will tell you interesting tricks that you can use for listen to the communication of your enemies and friends anonymously. Sayhello – thelinuxchoice Sayhello is an open source tool, hosted on the github page. This tool becomes a link and when victim clicks on […]

Continue Reading

Multiple Ways to Dump Windows Credentials

Shubham Goyal21 June 202022 October 2020
Ethical Hacking / Window Hacking

Hey folks, in this tutorial we are going to talk about a very interesting topic, which is called “Credential Dumping“. When the attacker dumps the username and password from the target machine that is called credential dumping. There are several types of credentials but in this tutorial, we will try […]

Continue Reading

Embed Payload (Exe) into a PDF Documents – EvilPDF

Shubham Goyal17 June 202021 October 2020
Ethical Hacking / Exploiting Tools

Hey folks, today we are going to talk about the tool that can easily add malicious payloads within the .PDF extension files and after which you can easily access any system. As we know it is prohibited to execute malicious payloads inside the window defender system, hence we will send […]

Continue Reading

Posts pagination

Previous 1 … 26 27 28 … 32 Next

For Business and Promo Inquiries

Stylish Email Button

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy