Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Monday, May 12, 2025

Category: Ethical Hacking

Hack Audio Recording of Android Phone

Shubham Goyal24 June 202021 October 2020
Andorid Hacking / Ethical Hacking

Hey Folks, in this tutorial we will tell you interesting tricks that you can use for listen to the communication of your enemies and friends anonymously. Sayhello – thelinuxchoice Sayhello is an open source tool, hosted on the github page. This tool becomes a link and when victim clicks on […]

Continue Reading

Multiple Ways to Dump Windows Credentials

Shubham Goyal21 June 202022 October 2020
Ethical Hacking / Window Hacking

Hey folks, in this tutorial we are going to talk about a very interesting topic, which is called “Credential Dumping“. When the attacker dumps the username and password from the target machine that is called credential dumping. There are several types of credentials but in this tutorial, we will try […]

Continue Reading

Embed Payload (Exe) into a PDF Documents – EvilPDF

Shubham Goyal17 June 202021 October 2020
Ethical Hacking / Exploiting Tools

Hey folks, today we are going to talk about the tool that can easily add malicious payloads within the .PDF extension files and after which you can easily access any system. As we know it is prohibited to execute malicious payloads inside the window defender system, hence we will send […]

Continue Reading

Embed Malicious URL in Popular Websites

Shubham Goyal15 June 202021 October 2020
Ethical Hacking / Exploiting Tools

Hey Folks, in this tutorial we will show you that how you can embed your malicious URL in popular websites such as : Youtube, Facebook and Google etc. These kind of techniques are useful during the social engineering attacks because we can embed our malicious URLs in well known domains […]

Continue Reading

Top 20 Information Gathering Tool for Bug Bounty Hunters

Shubham Goyal11 June 202021 October 2020
Bugbounty Tools / Ethical Hacking / Web Penetration Testing

Hey folks, in this article we will going to talk about “ Top 20 Recon, Passive Enumeration and Information Gathering Tool “ for bug bounty hunters. We have selected these tools after extensive research. Basically this article based on “Information Gathering” which is the part of bug bounty. What is […]

Continue Reading

How to Extract Email Address Using Google Dork

Shubham Goyal7 June 202021 October 2020
Ethical Hacking / Information Gathering

Hey folks, in this article we are going to talk about “How can we get multiple email addresses using Email Extractor ” We will also take help of Google dork. There are many tools available that will help you to get the email address but in this tutorial we will […]

Continue Reading

Google Advance Hacking – Google Dorks

Shubham Goyal5 June 202021 October 2020
Ethical Hacking / Information Gathering / Web Penetration Testing

Hey folks, in this tutorials we will discussing about the Google Advance Search Engine known as Google Dorks. What is Google Advance Search ( Google Dorks ) ? Google Dorks useful for passive information gathering purposes. This is the best way to reconnaissance about the target website even the target […]

Continue Reading

Multiple Ways to Crack Wifi Password

Shubham Goyal29 May 202029 May 2020
Ethical Hacking / Wireless Hacking

Dear learners, today you will learn the multiple ways to crack WPA/WPA2 password. It is third article on wireless hacking and click to read the previous articles on wireless hacking. About 3-Way-Handshake Handshake is the process which used to communicate between two devices. In this process both the client and […]

Continue Reading

WifiPhisher – A WPA Exploiting Tool

Shubham Goyal28 May 202029 May 2020
Ethical Hacking / Wireless Hacking

Hey folks, in this video we are going to talk about on wireless phishing attack using the Github tool. There is multiple method to crack the password of WPA/WPA2 but if the brute force method fails so there is one method left called phishing. WifiPhisher – A WPA/WPA2 Exploiting Tool […]

Continue Reading

Posts pagination

Previous 1 … 4 5 6 7 Next

For Business and Promo Inquiries

Stylish Email Button

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy