Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Friday, May 30, 2025

Category: Exploiting Tools

ParamSpider : Vulnerable XSS, IDOR, SSRF Parameter Finder

Shubham Goyal13 July 202022 October 2020
Bugbounty Tools / Exploiting Tools

Hey folks, today we are going to talk about an interesting tool called “ParamSpider“. It is extremely designed for scrap the vulnerable parameter from the web application that can be helpful during the penetration testing. Key Features Lets do it 🙂 !! Installation First we need to download this tool […]

Continue Reading

Cr3dOv3r: A Credential Reuse Attack Tool

Shubham Goyal13 July 202022 October 2020
Exploiting Tools / Information Gathering

Hey Folks, In this tutorial we will present an interesting tool, which is used only for credential reuse attacks. Cr3dOv3r is a python-based tool, which simply uses email address for credential reuse attack. In short, if you have a user’s email and password, you can easily find out which social […]

Continue Reading

Dork Scanner – A Vulnerable URLs Finder

Shubham Goyal10 July 202022 October 2020
Bugbounty Tools / Exploiting Tools

Hey Folks, in this tutorial we will show you how we can find vulnerable URLs through the dork scanner command line tool. Dork Scanner – Github Tools If you know about the google dork then you will easily understands. Dork scanning tool built in python and It scrapes web search […]

Continue Reading

Web Application Vulnerability Finder – Scant3R

Shubham Goyal9 July 202021 October 2020
Bugbounty Tools / Exploiting Tools

Hey folks, in this tutorial we are going to talk about an automation tool that will help you to detect vulnerabilities in web applications. If you are a beginner then you can go with this tool as it will provide you with exploits so that you can easily find vulnerabilities […]

Continue Reading

MSFPC – Create Payload For Android, Windows and More

Shubham Goyal5 July 202021 October 2020
Ethical Hacking / Exploiting Tools / Window Hacking

Hey Folks, in this tutorial we will talk about the MSFPC tool which is already installed in Kali Linux. If you know about the Msf-venom then you can easily understanding because it is alternative. In msf-venom you have to create the payload yourself and with the msfpc tool you can […]

Continue Reading

5 Ways to Crack WordPress Login

Shubham Goyal1 July 202021 October 2020
Ethical Hacking / Exploiting Tools / Password Cracking / Web Penetration Testing

Hey Folks, in this tutorial we are going to talk about five ways that will helps you to crack the WordpPress login. About the WordPress ? WordPress is becoming a most popular CMS (content management system) because of his user friendly interface. WordPress is a open source platform which written […]

Continue Reading

Multiple Ways to Crack ZIP File Passwords

Shubham Goyal26 June 202021 October 2020
Ethical Hacking / Exploiting Tools / Password Cracking

Hey Folks, in this tutorial we will show you how we can crack passwords of any zip file in few second. In this tutorial we will uses more than one software or tools to recover forgotten ZIP password. As we know that removal of a password from an encrypted zip […]

Continue Reading

Embed Payload (Exe) into a PDF Documents – EvilPDF

Shubham Goyal17 June 202021 October 2020
Ethical Hacking / Exploiting Tools

Hey folks, today we are going to talk about the tool that can easily add malicious payloads within the .PDF extension files and after which you can easily access any system. As we know it is prohibited to execute malicious payloads inside the window defender system, hence we will send […]

Continue Reading

Embed Malicious URL in Popular Websites

Shubham Goyal15 June 202021 October 2020
Ethical Hacking / Exploiting Tools

Hey Folks, in this tutorial we will show you that how you can embed your malicious URL in popular websites such as : Youtube, Facebook and Google etc. These kind of techniques are useful during the social engineering attacks because we can embed our malicious URLs in well known domains […]

Continue Reading

Posts pagination

Previous 1 … 9 10 11 Next

For Business and Promo Inquiries

Stylish Email Button

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy