Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Sunday, May 25, 2025

Category: Soical Engineering

Takeover Instagram Accounts Like A Pro

Shubham Goyal20 July 202120 July 2021
Soical Engineering

Hey Folks, in this tutorial we are going to demonstrate a method using which you can easily take over the user’s Instagram account. Actually this is a minor weakness in Instagram’s website that allows us to embed any external URL with the official URL of Instagram and redirect users to […]

Continue Reading

Bypass Google Two Factor Authentication

Shubham Goyal29 June 202118 July 2021
Ethical Hacking / Soical Engineering

Hey Folks, today’s article is going to be very interesting because we are going to talk about a method using which we can easily bypass “Google Two Factor Authentication” by tricking the victim. Let’s move on to the main topic 😛 !! Get Credentials First To bypass two factor authentication […]

Continue Reading

DarkSide – Information Gathering & Social Engineering Tool

Shubham Goyal3 March 20213 March 2021
Information Gathering / Soical Engineering

Hey Folks, in this tutorial we are going to introduce an information gathering based tool called “DarkSide“. The Darkside tool is coded in python language which comes with an awesome user interface. The tool comes with many interesting features which you can read from below. Key Features Let’s take a […]

Continue Reading

How to Hide Phishing Link Behind Real Domain

Shubham Goyal23 November 202023 November 2020
Exploiting Tools / Soical Engineering

Hey Folks, in this tutorial we’re gonna use a tool that can convert a phishing link to a normal web link like Google or YouTube called “maskphish“. MaskPhish is a small and simple tool written in the bash language, which is used to hide phishing URLs under normal looking URLs […]

Continue Reading

PhishMailer – Generate Professional Phishing Alert Templates

Shubham Goyal1 November 20201 November 2020
Soical Engineering

Hey folks, in this tutorial we are going to talk about a different type of phishing tool that can get some better results by coordinating with social engineering. This is an open source tool that is coded in python language named “PhishMailer“. Usually we get some error on multiple attempts […]

Continue Reading

Zphisher – A Automated Phishing Tool

Shubham Goyal1 November 20206 November 2020
Soical Engineering

Hey Folks, in this tutorial we are going to talk about another new phishing tool named “Zphisher“. Zphisher is an open source tool, originally designed to carry out phishing attacks through social engineering, with 30 different-2 types of phishing pages through which you can obtain the credentials of a social […]

Continue Reading

Nexphisher – A Advance Phishing Tool

Shubham Goyal1 November 20201 November 2020
Soical Engineering

Hey Folks, in this tutorial we are going to talk about another new phishing tool named “Nexphisher“. Nexphisher is an open source tool, originally designed to carry out phishing attacks through social engineering, with 30 different-2 types of phishing pages through which you can obtain the credentials of a social […]

Continue Reading

Evil SSDP – Spoof SSDP Replies and UPnP Devices

Shubham Goyal3 July 202021 October 2020
Ethical Hacking / Soical Engineering

Hey folks, in this tutorial you will learn how we can perform phishing attack by create a fake UPnP device to get credentials. But before start this you should have some knowledge about the SSDP and UPnP services. What is SSDP? SSDP is a Simple Service Discovery Protocol that is […]

Continue Reading

AdvPhishing : OTP Bypass Phishing Tool

Shubham Goyal24 April 202021 October 2020
Andorid Hacking / Ethical Hacking / Soical Engineering

AdvPhishing tool is the latest phishing technique in which you can easily access social media accounts of users . there are many type of tools like this but in this tool you can access social media accounts of user even if if two-factor authentication is activated. with the help of […]

Continue Reading

For Business and Promo Inquiries

Stylish Email Button

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy