Skip to content
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Exploiting Tools
  • CVE (POC)
  • CTF Challenges
  • Infosec Training’s
Friday, Feb 26, 2021

Category: Exploiting Tools

SSB – A Fastest Secure Shell Brute Forcer

Shubham Goyal Shubham Goyal26 February 202126 February 2021
Dictionary and Bruteforce / Exploiting Tools

Hey Folks, in this tutorial we are going to talk about a secure shell brute forcing tool called “ssb“. It’s an fastest and simplest way to brute force on SSH server by using ssb tool. Although there are many tools to crack the password of SSH server, but it gives […]

Continue Reading

Web-Brutator – Website Login Cracker

Shubham Goyal Shubham Goyal9 February 20219 February 2021
Dictionary and Bruteforce / Exploiting Tools

Hey Folks, in this tutorial we are going to talk about an interesting web application brute forcing tool called “Web-Brutator“. Web-brutator tool can automatically detect standard web authentication forms and perform bruteforce automatically. This feature is available via the module standardform, it is still experimental and can lead to false […]

Continue Reading

MOSINT – An Email OSINT Tool

Shubham Goyal Shubham Goyal17 January 202117 January 2021
Exploiting Tools / Information Gathering

Hey Folks, the article is based on email footprinting for which we will present a tool called “MOSINT“. MOSINT is an OSINT Tool for emails. It helps you gather information about the target email. The tool is designed in python language from which we can gather the following information about […]

Continue Reading

ProtOSINT – Investigate Protonmail Accounts

Shubham Goyal Shubham Goyal17 January 202117 January 2021
Exploiting Tools / Information Gathering

Hey Folks, in this tutorial we are going to tell you about an tool called “ProtOSINT“. ProtOSINT is a Python script that helps you investigate ProtonMail accounts and ProtonVPN IP addresses. This tool can help you to do investigation on proton service and it comes with 3 sub-modules. Let’s take […]

Continue Reading

Create FUD (Fully Undetectable) Payload for Windows 10

Shubham Goyal Shubham Goyal4 January 20214 January 2021
Ethical Hacking / Exploiting Tools / Window Hacking

Hey Folks, in this tutorial we are going to talk about an open source tool called “Defeat-Defender“, which is coded in batch language and designed to defeat the security defender of windows operating system and to get access to the system. Keep in mind that it is capable of bypassing […]

Continue Reading

Phantom Evasion – Create Windows 10 FUD Payload

Shubham Goyal Shubham Goyal4 January 20216 January 2021
Ethical Hacking / Exploiting Tools / Window Hacking

Hey Folks, today we are going to discuss over the same topic over which we had discuss in our previous article called “how to bypass windows 10 defender” but in this tutorial, we will use different tool called “Phantom-Evasion”. Phantom-Evasion is an antivirus evasion tool written in python (both compatible […]

Continue Reading

Posts navigation

1 2 … 14 Next

Join our Live Training Courses

Follow us

  • E-mail
  • Facebook
  • GitHub
  • LinkedIn
  • Twitter
  • YouTube

Subscribe to Blog via Email

Enter your email address to subscribe to this blog

Join 75 other subscribers.

Search Form

Categories

  • Andorid Hacking
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Exploiting Tool
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking
Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Exploiting Tools
  • CVE (POC)
  • CTF Challenges
  • Infosec Training’s
Close

Categories

  • Andorid Hacking
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Exploiting Tool
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking
Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy
× How can I help you?