Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Monday, May 12, 2025

Author: Shubham Goyal

A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.

Responder : Capture Window 10 NTLM Hashes

Shubham Goyal22 May 202022 October 2020
Exploiting Tools / Window Hacking

Introduction to Responder Tool Responder is basically a windows Ntlm Hashes Capturing tool which is also be use for purloin credentials and important information. It is use for quickly gaining credentials and remote access from a client system. It uses LLMNR (Link Local Multicast Name Resolution), NBT-NS (NetBIOS Name Service) […]

Continue Reading

Nmap and Zenmap Tutorial : Network Scanning

Shubham Goyal22 May 202022 May 2020
Ethical Hacking

Nmap is a network mapper that has emerged as one of the most popular and free network discovery tool. Most of the hackers and the pentesters are using this tool for scanning the networks. Nmap is a open source tool which you can download it from here. In Kali linux […]

Continue Reading

Hack any Wi-Fi using Fluxion

Shubham Goyal21 May 202022 October 2020
Ethical Hacking / Wireless Hacking

Fluxion is a future of wi-fi hacking which is use for security auditing and to steal the WPA/WPA2 password key using social engineering. Fluxion is a alternate of Linset by vk439 with additional features. It is automate tool which you can easily use with help of numbers. Fluxion tool is […]

Continue Reading

Hack The Invite Code Of HTB Lab Using Python Script

Shubham Goyal19 May 202022 October 2020
Exploiting Tools

Python is an an interpreted, interactive, object-oriented programming language , which is using by almost every Big Organizations like : Google, Facebook, and etc. And specially in the field of Artificial Intelligence, Data Science every computer programmer is using python to conduct their daily tasks But python is an language […]

Continue Reading

Joomla : Reverse Shell, Installation and Testing

Shubham Goyal19 May 202018 February 2021
CMS Installation / Web Penetration Testing

Today we are going to talk about open source CMS ( Content Management System ) platform which helps you to create a powerful website. In this article we will discussing on the installation, usage and reverse shell of joomla. Joomla Platform There have been lot of platform are available for […]

Continue Reading

Spy on Any Android Phone – XploitSPY

Shubham Goyal18 May 202018 May 2020
Andorid Hacking / Ethical Hacking / Exploiting Tools

In this article, you will learn about the sapying on adnroid phone. As you know that various tools or software are available to spy on android phone but they will charge form you. Why should we use XploitSPY ? If you want to spy on someone such as : friends, […]

Continue Reading

Complete Installation of Parrot os in vmware

Shubham Goyal13 May 202021 October 2020
Ethical Hacking / OS installation

In this article, you will learn how to install parrot operating system in vmware. Parrot operating system can be use in order for cloud pentest. It is a Debian-based Linux distribution built by Frozenbox Network. Let’s Begin !! Installation We should have the vmware application, you can download it from […]

Continue Reading

How to Bypass Windows 10 Defender

Shubham Goyal12 May 202012 May 2020
Exploiting Tools / Window Hacking

Dear Learners, Here is our new article “ how to bypass windows 10 defender “. You know that there are various tool to bypass the window defender of which a popular tool named shellter. Shellter is a first truly dynamic PE infector ever created. It is used for inject shellcode […]

Continue Reading

Ashok : Osint Recon Tool For Hackers

Shubham Goyal12 May 202022 October 2020
Exploiting Tools / Information Gathering

Reconnaissance also known as Recon is the first step in any penetration testing , Bug hunting phase which means gathering information before any real attacks are planned. The Basic idea is to collect as much interesting information as possible about the target. Most of the time Recon phase can helps […]

Continue Reading

Posts pagination

Previous 1 … 29 30 31 32 Next

For Business and Promo Inquiries

Stylish Email Button

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy