Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Ctf Challenges
  • CVE (POC)
Wednesday, Mar 29, 2023

Category: Exploiting Tools

Top Working RAT for Windows 10

Shubham Goyal7 March 20217 March 2021
Ethical Hacking / Exploiting Tools / Window Hacking

Hey Folks, In our previous article we revealed a “Remote Access Trojan” application named “WH-RAT” but in this tutorial we are going to add some more new and working trojans to our list of hacking tools. So the “RAT” tools that we’re going to reveal today are listed below. List […]

Continue Reading

WH-RAT – Remote Access Trojan Application

Shubham Goyal6 March 20216 March 2021
Ethical Hacking / Exploiting Tools / Window Hacking

Hey Folks, today we have come up with an excited application that helps to build (RAT) for both windows and android operating systems. As we know that remote access trojan (RAT, sometimes called creepware) is a type of malware that controls a system through a remote network connection. Similarly, the […]

Continue Reading

RAT-el – Create RAT For Windows and Android

Shubham Goyal5 March 20215 March 2021
Ethical Hacking / Exploiting Tools / Window Hacking

Hey Folks, today in this tutorial we are going to tell you about another penetration testing tool called “RAT-el “. RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the […]

Continue Reading

RedRabbit – Pentesting & Post-Exploitation For Red Team

Shubham Goyal1 March 20211 March 2021
Ethical Hacking / Exploiting Tools

Hey Folks, today we have brought a tool that will help in gathering and extracting information, encoding / decoding and cracking. RedRabbit is a PowerShell script aimed at helping pentesters conduct ethical hacking and at the same time it can be used for red team operation. The aim is to […]

Continue Reading

SSB – A Fastest Secure Shell Brute Forcer

Shubham Goyal26 February 202126 February 2021
Dictionary and Bruteforce / Exploiting Tools

Hey Folks, in this tutorial we are going to talk about a secure shell brute forcing tool called “ssb“. It’s an fastest and simplest way to brute force on SSH server by using ssb tool. Although there are many tools to crack the password of SSH server, but it gives […]

Continue Reading

Web-Brutator – Website Login Cracker

Shubham Goyal9 February 20219 February 2021
Dictionary and Bruteforce / Exploiting Tools

Hey Folks, in this tutorial we are going to talk about an interesting web application brute forcing tool called “Web-Brutator“. Web-brutator tool can automatically detect standard web authentication forms and perform bruteforce automatically. This feature is available via the module standardform, it is still experimental and can lead to false […]

Continue Reading

MOSINT – An Email OSINT Tool

Shubham Goyal17 January 202117 January 2021
Exploiting Tools / Information Gathering

Hey Folks, the article is based on email footprinting for which we will present a tool called “MOSINT“. MOSINT is an OSINT Tool for emails. It helps you gather information about the target email. The tool is designed in python language from which we can gather the following information about […]

Continue Reading

ProtOSINT – Investigate Protonmail Accounts

Shubham Goyal17 January 202117 January 2021
Exploiting Tools / Information Gathering

Hey Folks, in this tutorial we are going to tell you about an tool called “ProtOSINT“. ProtOSINT is a Python script that helps you investigate ProtonMail accounts and ProtonVPN IP addresses. This tool can help you to do investigation on proton service and it comes with 3 sub-modules. Let’s take […]

Continue Reading

Create FUD (Fully Undetectable) Payload for Windows 10

Shubham Goyal4 January 20214 January 2021
Ethical Hacking / Exploiting Tools / Window Hacking

Hey Folks, in this tutorial we are going to talk about an open source tool called “Defeat-Defender“, which is coded in batch language and designed to defeat the security defender of windows operating system and to get access to the system. Keep in mind that it is capable of bypassing […]

Continue Reading

Posts navigation

Previous 1 2 3 … 11 Next

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Ctf Challenges
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy