Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Ctf Challenges
  • CVE (POC)
Sunday, May 8, 2022

Category: Bugbounty Tools

pwnSpoof – Create Realistic Spoofed Log

Shubham Goyal26 November 202126 November 2021
Bugbounty Tools

Hey Folks, today in this tutorial we have an amazing tool for all of you which can give you fake spoof log by generating. pwnSpoof (from Punk Security) generates realistic spoofed log files for common web servers with customisable attack scenarios. Every log bundle is unique and completely customisable, making […]

Continue Reading

Gotanda – The OSINT Extension for Browsers

Shubham Goyal22 November 202122 November 2021
Bugbounty Tools

Hey Folks, after taking a big break we are back with an exciting tool that can help you easily find the details of any person without any operating system. Let’s take a small example of this tool and see how well it works. Let’s take a look 🙂 !! Installation […]

Continue Reading

Broken Link Checker Tool – Hijacking

Shubham Goyal8 October 20218 October 2021
Bugbounty Tools

Hey Folks, today in this tutorial we are going to talk about a web application penetration testing tool called “broken-link-checker”. The code of this tool is written in Node JS language which comes with the below mentioned features. Features Let’s test it 😛 !! Required Dependencies So first we have […]

Continue Reading

403bypasser – Bypass 403 Restrictions

Shubham Goyal30 September 202130 September 2021
Bugbounty Tools

Hey Folks, we have an amazing tool for all of you that can reward you if you are a bug bounty hunter and looking for a bug in any web application. 403bypasser automates the techniques used to circumvent access control restrictions on target page. Throughout this tutorial, we’ll show you […]

Continue Reading

Knock – Insane Subdomain Enumeration Tool

Shubham Goyal23 September 202123 September 2021
Bugbounty Tools

Hey Folks, in this tutorial we are going to configure another subdomain fuzzer in our Kali Linux operating system to make our penetration testing more vigorous. Knockpy is a python3 tool designed to enumerate subdomains on a target domain through dictionary attack. We are constantly writing articles on subdomain takeover […]

Continue Reading

Subfinder – Easy Subdomain Discovery Tool

Shubham Goyal20 September 202120 September 2021
Bugbounty Tools

Hey Folks, we hope you all will be fine and advance your career in the field of cyber security. Today in this tutorial we will help you a little in getting another cool tool for bug hunting. The name of the tool that we are going to reveal with you […]

Continue Reading

SubScraper – Subdomain Enum Tool For Takeover Subdomain

Shubham Goyal11 September 202111 September 2021
Bugbounty Tools

Hey Folks, today we are back with interesting tools for bug bounty hunters and usually every bug bounty hunters are looking for a tool that can helps to find bugs and give reward them in few seconds and the tool we’re going to talk about, he is completely right according […]

Continue Reading

FFUF – A Fastest Web Content Discovery Tool

Shubham Goyal1 September 20211 September 2021
Bugbounty Tools

Hey Folks, today we are going to discuss the best and top leading tool for web penetration testing and it is also promoted by “Offensive Security”. FFUF has a channel at Porchetta Industries Discord server alongside of channels for many other tools. It is the fastest content discovery tool with […]

Continue Reading

Skipfish – A Perfect Bug Hunting Tool for Beginners

Shubham Goyal24 August 202124 August 2021
Bugbounty Tools

Hey Folks, this tutorial will be for beginners who want to hunt for bugs in web application but don’t have much skill yet. Actually before you don’t have good knowledge of bug hunting, you cannot opt for manual method so you have to take help of such automated tools which […]

Continue Reading

Posts navigation

1 2 … 7 Next

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Ctf Challenges
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy