Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Saturday, May 24, 2025

Category: Andorid Hacking

Termux Cheat Sheet for Hackers

Shubham Goyal22 March 202422 March 2024
Andorid Hacking

Hey Folks 🙂 !! In this article, we present the “Termux Cheat Sheet for Hackers” – a comprehensive guide designed to equip users with the essential commands, techniques, and tips to leverage Termux to its fullest potential. Whether you’re a novice seeking to dip your toes into the realm of […]

Continue Reading

ShotDroid – Pentesting Tool for Android

Shubham Goyal1 December 20211 December 2021
Andorid Hacking

Hey guys, unknowingly we have come up with a tool for those people who want to spy on people and get sensitive information of those people. Basically this tool will do the job of double shooting with one arrow in your case as you can use it on both android […]

Continue Reading

L3MON – Create FUD Payload and Hack Android Phone

Shubham Goyal17 March 202117 March 2021
Andorid Hacking / Exploiting Tools

Hey Folks, today in this tutorial we are going to share with you a cloud based remote android management suite called “L3MON”. L3MON is an cloud based remote android management suite but for now we’ll configure it on localhost in our kali linux operating system. L3MON android management suite is […]

Continue Reading

Termux Commands list

Shubham Goyal17 January 202117 January 2021
Andorid Hacking

Hey Folks, in this tutorial we are going to share with you some useful commands of Termux emulator. Almost all the termux commands are classified from the beginning to the advance level. About Termux Emulator Termux is an Android terminal emulator and Linux environment app that works directly with no […]

Continue Reading

Hack Android Phone using QR Code

Shubham Goyal2 January 20212 January 2021
Andorid Hacking / Ethical Hacking

Hey Folks, in this article we will show you the whole scenario that how attackers hack android smartphone by using QR code and HTA attack techniques. To accomplish this task we must have a Kali Linux operating system. We think most people are familiar with QR code, so we only […]

Continue Reading

How Hackers Increase Their Instagram Followers

Shubham Goyal1 November 20201 November 2020
Andorid Hacking / Exploiting Tools

Hey Folks, in this tutorial we’ll show you how attackers increase and decrease their Instagram followers using “instagram-tools“. The tool is coded in node js and specifically designed to do some interesting activity with Instagram accounts. We are giving all the features of this tool which you can read from […]

Continue Reading

How To Bypass Google TFO (OTP)

Shubham Goyal9 October 202019 October 2020
Andorid Hacking / Ethical Hacking

Hey Folks, in this tutorial we’ll show you how we can bypass Google two-factor authentication via a phishing attack. As we know that we have the credentials of the victim account but we are sometimes stuck due to two factor authentication, hence we are not able to acquire the victim’s […]

Continue Reading

Lockphish – Phishing Tool For Android PIN and iPhone Passcode

Shubham Goyal9 October 20209 October 2020
Andorid Hacking / Exploiting Tools

Hey Folks, In this tutorial we are going to talk about an credential dumping tool but it is quite different from the others tool because it is designed to grab the lock screen pins of the smartphone by phishing attack. Through this tool we can get lock screen passwords of […]

Continue Reading

Full Undetectable Android Payload (RAT) Tool

Shubham Goyal9 October 20209 October 2020
Andorid Hacking / Exploiting Tools

Hey guys, the article is going to be interesting because in this tutorial we will present you such a (RAT) remote administration tool with the help of which you can easily control someone else’s android smartphone. We think it does not require any other tools that’s why you can control […]

Continue Reading

Posts pagination

1 2 3 Next

For Business and Promo Inquiries

Stylish Email Button

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy