Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Thursday, May 29, 2025

Category: Window Hacking

Multiple Ways to Dump Windows Credentials

Shubham Goyal21 June 202022 October 2020
Ethical Hacking / Window Hacking

Hey folks, in this tutorial we are going to talk about a very interesting topic, which is called “Credential Dumping“. When the attacker dumps the username and password from the target machine that is called credential dumping. There are several types of credentials but in this tutorial, we will try […]

Continue Reading

Responder : Capture Window 10 NTLM Hashes

Shubham Goyal22 May 202022 October 2020
Exploiting Tools / Window Hacking

Introduction to Responder Tool Responder is basically a windows Ntlm Hashes Capturing tool which is also be use for purloin credentials and important information. It is use for quickly gaining credentials and remote access from a client system. It uses LLMNR (Link Local Multicast Name Resolution), NBT-NS (NetBIOS Name Service) […]

Continue Reading

How to Bypass Windows 10 Defender

Shubham Goyal12 May 202012 May 2020
Exploiting Tools / Window Hacking

Dear Learners, Here is our new article “ how to bypass windows 10 defender “. You know that there are various tool to bypass the window defender of which a popular tool named shellter. Shellter is a first truly dynamic PE infector ever created. It is used for inject shellcode […]

Continue Reading

Hack Wallpaper and Passwords Using Post Exploitation

Shubham Goyal8 May 20208 May 2020
Ethical Hacking / Window Hacking

In this article you will learn, after compromised the victim machine what we can do by using post exploitation. There are 478 post exploitation modules which are available in metasploit framework but in this article we will use only five modules which is working on window 10 machine. What is […]

Continue Reading

Multiple Ways to Create a Payload for Window Exploit

Shubham Goyal7 May 20207 May 2020
Ethical Hacking / Window Hacking

There are several method to take the access on window machine but in this article, we are going to talk about ways to create a payload for windows Exploit. With the help of this article you will learn how to create payload both manually and automatically. Metasploit Framework Metasploit Framework […]

Continue Reading

Multiple Ways to Create Permanent Backdoor in Remote PC

Shubham Goyal29 April 20208 October 2020
Persistence / Window Hacking

In this article, we will learn how to create a persistent backdoor with the help of metasploit framework on the host machine. What is Persistent Backdoor As we know that persistence also known as permanent. Persistent backdoors help us to take permanent access of system. There are so many types […]

Continue Reading

Posts pagination

Previous 1 2 3

For Business and Promo Inquiries

Stylish Email Button

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy