Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Sunday, May 11, 2025

Category: Ethical Hacking

Best Laptop for Cyber Security

Shubham Goyal29 November 20202 December 2020
Ethical Hacking

A laptop is very essential in this digital era. When we are talking about cybersecurity, laptops are a must have thing. In this detailed article we discuss which kind of laptops will be best for penetration testing and cybersecurity jobs. Not every laptop we can use in the cybersecurity field. […]

Continue Reading

Fsociety : A Penetration Testing Framework

Shubham Goyal11 November 202011 November 2020
Ethical Hacking / Exploiting Tools / Information Gathering

Hey Folks, in this tutorial we are going to talk about an interesting and well-known information-gathering tool called “fsociety“. It is a penetration testing framework that contains almost everything that hackers want. The tool is built in python language, so we can control ourselves on this tool using the python […]

Continue Reading

Crack ZIP Files Password Using John the Ripper

Shubham Goyal3 November 20203 November 2020
Ethical Hacking / Password Cracking

Hey Folks, in this tutorial we are going to talk about a tool to recover the password of a compressed zip file called “John the Ripper“. John the Ripper is a free password cracking software tool. Originally developed for the Unix operating system, it can run on fifteen different platforms. […]

Continue Reading

How To Bypass Google TFO (OTP)

Shubham Goyal9 October 202019 October 2020
Andorid Hacking / Ethical Hacking

Hey Folks, in this tutorial we’ll show you how we can bypass Google two-factor authentication via a phishing attack. As we know that we have the credentials of the victim account but we are sometimes stuck due to two factor authentication, hence we are not able to acquire the victim’s […]

Continue Reading

Garuda Linux Installation

Shubham Goyal28 September 202021 October 2020
Ethical Hacking / OS installation

Hey folks, this is going to be amazing article because we will going to install an new linux Garuda Linux that is an free and open-source arch Linux operating system. Now let us give you a little introduction about that Garuda Linux Arch is a rolling distribution based on Linux […]

Continue Reading

Perform Phishing Attack Through Google Cloud Shell

Shubham Goyal23 September 202023 September 2020
Andorid Hacking / Ethical Hacking

Hey Folks, as we know that whenever we need to do a phishing attack, we use github tools and to execution them we need an operating system such as : kali linux, parrot os etc. But sometimes due to various reasons we are not able to reach the localhost machine, […]

Continue Reading

Multiple Ways to Embed a Payload in an Original APK File

Shubham Goyal21 September 202021 September 2020
Andorid Hacking / Ethical Hacking / Exploiting Tools

Hey Folks, as we know beginners try to find the best ways that they can embed the payload into the original APK, But it takes their long time to do research on it. So in this article we will give you all the working methods, with the help of which […]

Continue Reading

Perfectly Inject a Payload in an Original Facebook APK

Shubham Goyal21 September 202021 September 2020
Andorid Hacking / Ethical Hacking

Hey Folks, I think we are all familiar with the Metasploit framework and whenever a beginner makes their move in the h@cking field their first objective is to h@ck android smartphones but they are not satisfied with creating a simple backdoor so they try to inject malicious payloads into the […]

Continue Reading

Multiple Ways to Send Email Anonymously

Shubham Goyal21 September 202021 September 2020
Andorid Hacking / Ethical Hacking / Exploiting Tools

Hey Folks, In this tutorial we will talk about several ways through which we can send or receive emails to bypass verification and send documents anonymously to someone else. At times we require an anonymous email address for many reasons and we take the help of paid service, but in […]

Continue Reading

Posts pagination

Previous 1 2 3 4 … 7 Next

For Business and Promo Inquiries

Stylish Email Button

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy