Skip to content
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Exploiting Tools
  • CVE (POC)
  • CTF Challenges
  • Infosec Training’s
Friday, Feb 26, 2021

Category: Andorid Hacking

Termux Commands list

Shubham Goyal Shubham Goyal17 January 202117 January 2021
Andorid Hacking

Hey Folks, in this tutorial we are going to share with you some useful commands of Termux emulator. Almost all the termux commands are classified from the beginning to the advance level. About Termux Emulator Termux is an Android terminal emulator and Linux environment app that works directly with no […]

Continue Reading

Hack Android Phone using QR Code

Shubham Goyal Shubham Goyal2 January 20212 January 2021
Andorid Hacking / Ethical Hacking

Hey Folks, in this article we will show you the whole scenario that how attackers hack android smartphone by using QR code and HTA attack techniques. To accomplish this task we must have a Kali Linux operating system. We think most people are familiar with QR code, so we only […]

Continue Reading

How Hackers Increase Their Instagram Followers

Shubham Goyal Shubham Goyal1 November 20201 November 2020
Andorid Hacking / Exploiting Tools

Hey Folks, in this tutorial we’ll show you how attackers increase and decrease their Instagram followers using “instagram-tools“. The tool is coded in node js and specifically designed to do some interesting activity with Instagram accounts. We are giving all the features of this tool which you can read from […]

Continue Reading

How To Bypass Google TFO (OTP)

Shubham Goyal Shubham Goyal9 October 202019 October 2020
Andorid Hacking / Ethical Hacking

Hey Folks, in this tutorial we’ll show you how we can bypass Google two-factor authentication via a phishing attack. As we know that we have the credentials of the victim account but we are sometimes stuck due to two factor authentication, hence we are not able to acquire the victim’s […]

Continue Reading

Lockphish – Phishing Tool For Android PIN and iPhone Passcode

Shubham Goyal Shubham Goyal9 October 20209 October 2020
Andorid Hacking / Exploiting Tools

Hey Folks, In this tutorial we are going to talk about an credential dumping tool but it is quite different from the others tool because it is designed to grab the lock screen pins of the smartphone by phishing attack. Through this tool we can get lock screen passwords of […]

Continue Reading

Full Undetectable Android Payload (RAT) Tool

Shubham Goyal Shubham Goyal9 October 20209 October 2020
Andorid Hacking / Exploiting Tools

Hey guys, the article is going to be interesting because in this tutorial we will present you such a (RAT) remote administration tool with the help of which you can easily control someone else’s android smartphone. We think it does not require any other tools that’s why you can control […]

Continue Reading

Posts navigation

1 2 … 4 Next

Join our Live Training Courses

Follow us

  • E-mail
  • Facebook
  • GitHub
  • LinkedIn
  • Twitter
  • YouTube

Subscribe to Blog via Email

Enter your email address to subscribe to this blog

Join 75 other subscribers.

Search Form

Categories

  • Andorid Hacking
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Exploiting Tool
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking
Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Exploiting Tools
  • CVE (POC)
  • CTF Challenges
  • Infosec Training’s
Close

Categories

  • Andorid Hacking
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Exploiting Tool
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking
Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy
× How can I help you?