Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Sunday, May 11, 2025

Category: Ethical Hacking

Kali Linux For Beginner’s – Part 1

Shubham Goyal23 May 202021 October 2020
Ethical Hacking / OS installation

Kali Linux is a operating system which is specially designed for Penetration Testers, Hackers and for Security Specialist with the collection of 600 preinstalled penetration-testing programs. To install Operating systems like kali linux we have two methods. Table Of Content : Introduction Of Virtualbox. Installation Of Kali-­Linux In VirtualBox Introduction […]

Continue Reading

Nmap and Zenmap Tutorial : Network Scanning

Shubham Goyal22 May 202022 May 2020
Ethical Hacking

Nmap is a network mapper that has emerged as one of the most popular and free network discovery tool. Most of the hackers and the pentesters are using this tool for scanning the networks. Nmap is a open source tool which you can download it from here. In Kali linux […]

Continue Reading

Hack any Wi-Fi using Fluxion

Shubham Goyal21 May 202022 October 2020
Ethical Hacking / Wireless Hacking

Fluxion is a future of wi-fi hacking which is use for security auditing and to steal the WPA/WPA2 password key using social engineering. Fluxion is a alternate of Linset by vk439 with additional features. It is automate tool which you can easily use with help of numbers. Fluxion tool is […]

Continue Reading

Spy on Any Android Phone – XploitSPY

Shubham Goyal18 May 202018 May 2020
Andorid Hacking / Ethical Hacking / Exploiting Tools

In this article, you will learn about the sapying on adnroid phone. As you know that various tools or software are available to spy on android phone but they will charge form you. Why should we use XploitSPY ? If you want to spy on someone such as : friends, […]

Continue Reading

Complete Installation of Parrot os in vmware

Shubham Goyal13 May 202021 October 2020
Ethical Hacking / OS installation

In this article, you will learn how to install parrot operating system in vmware. Parrot operating system can be use in order for cloud pentest. It is a Debian-based Linux distribution built by Frozenbox Network. Let’s Begin !! Installation We should have the vmware application, you can download it from […]

Continue Reading

Hack Wallpaper and Passwords Using Post Exploitation

Shubham Goyal8 May 20208 May 2020
Ethical Hacking / Window Hacking

In this article you will learn, after compromised the victim machine what we can do by using post exploitation. There are 478 post exploitation modules which are available in metasploit framework but in this article we will use only five modules which is working on window 10 machine. What is […]

Continue Reading

Multiple Ways to Create a Payload for Window Exploit

Shubham Goyal7 May 20207 May 2020
Ethical Hacking / Window Hacking

There are several method to take the access on window machine but in this article, we are going to talk about ways to create a payload for windows Exploit. With the help of this article you will learn how to create payload both manually and automatically. Metasploit Framework Metasploit Framework […]

Continue Reading

How to Hack Android Phone over the WAN

Shubham Goyal2 May 20206 May 2020
Andorid Hacking / Ethical Hacking

As you know we already discussed about android hacking over LAN ( Local Area Network ). Click here to see. Now in this article we will talk about how to access any android phone over WAN ( Wide Area Network ) without port forwarding. What is LAN ? Local area […]

Continue Reading

Hack SMS, Call Logs, Whatsapp of any Android Phone

Shubham Goyal30 April 202030 April 2020
Andorid Hacking / Ethical Hacking

In the india total number of android mobile users has reached 114 million. Cause of increasing the total number of andorid mobile users the cybercrime has also be incressed. Hence In this article we will discuss how to hack any android phone using metasploit framework and how to protect himself. […]

Continue Reading

Posts pagination

Previous 1 … 5 6 7 Next

For Business and Promo Inquiries

Stylish Email Button

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy