Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Saturday, May 24, 2025

Category: Exploiting Tools

PwnLnX – An Advanced Multi-Threaded Python Reverse Shell

Shubham Goyal26 May 202126 May 2021
Exploiting Tools

Hey Folks, in this tutorial we are going to talk about a powerful reverse shell framework for exploiting linux operating system called “PwnLnX“. PwnLnX is an advanced multi-threaded, multi-client python reverse shell for hacking linux operating systems. As we know that reverse shell is always used to obtain an interactive […]

Continue Reading

Profil3 – Find Potential Profiles of a Person

Shubham Goyal18 May 202118 May 2021
Exploiting Tools / Information Gathering

Hey Folks, in this tool tutorial we are going to present a profile based osint tool named “Profil3r“. Profil3r is an OSINT tool that allows you to find potential profiles of a person on social networks, as well as their email addresses. This program also alerts you to the presence […]

Continue Reading

Crosslinked – A LinkedIn Enumeration Tool

Shubham Goyal17 May 202117 May 2021
Exploiting Tools / Information Gathering

Hey Folks, we think we all know of a social media platform that is more used to business offers and jobs prospects named “Linkedin” and today we are going to tell you about the tool which is connected to it. CrossLinked is a LinkedIn enumeration tool that uses search engine […]

Continue Reading

Spraygen – Password List Generator for Password Spraying Attacks

Shubham Goyal15 May 202115 May 2021
Dictionary and Bruteforce / Exploiting Tools

Hey Folks, in this tutorial we are going to talk with you about a password spraying tool, called a “spraygen“. Spraygen is an password list generator that generates permutations of months, seasons, years, aports tams (NFL, NBA, MLB, NHL), sports scores, “password”, and even Iterable Keyspaces of a specified size. […]

Continue Reading

Cook – A Customizable wordlist Generator For Hackers

Shubham Goyal11 May 202111 May 2021
Dictionary and Bruteforce / Exploiting Tools

Hey Folks, after a long break we have come up with a superior tool for you. The tool we are going to present with you is specially designed to create customizable wordlists and passwords called “Cook“. We can easily create permutations and combinations of words with predefined sets of extensions, […]

Continue Reading

Gitrecon – Perfect OSINT Tool For Github

Shubham Goyal18 April 202118 April 2021
Exploiting Tools / Information Gathering

Hey Folks, in this tutorial we are going to introduce a new information gathering tool specifically designed for OSINT on Gitub accounts. Gitrecon tool has been made to get information from a Github or Gitlab profile and find user’s email addresses leaked on commits. You can go here for more […]

Continue Reading

Darkdump – Search The Deep Web (Dark Web )

Shubham Goyal19 March 202119 March 2021
Exploiting Tools

Hey Folks, today in this tutorial we are going to introduce an deep web search engine tool called “darkdump“. Darkdump is a simple script written in Python3.9 in which it allows users to enter a search term (query) in the command line and darkdump will pull all the deep web […]

Continue Reading

L3MON – Create FUD Payload and Hack Android Phone

Shubham Goyal17 March 202117 March 2021
Andorid Hacking / Exploiting Tools

Hey Folks, today in this tutorial we are going to share with you a cloud based remote android management suite called “L3MON”. L3MON is an cloud based remote android management suite but for now we’ll configure it on localhost in our kali linux operating system. L3MON android management suite is […]

Continue Reading

Hide Secrets and Crack JPEG File Password via Steganography Tools

Shubham Goyal17 March 202117 March 2021
Ethical Hacking / Exploiting Tools

Hey Folks, as we know that sometimes in a CTF challenge, we need some steganography skills to secret a key or a hint and for that we discover a variety of tools on Github, but today we has brought two steganography tools for you that you can use in your […]

Continue Reading

Posts pagination

1 2 … 11 Next

For Business and Promo Inquiries

Stylish Email Button

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy