Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Saturday, May 10, 2025

Latest Blog

Source Code Audit with GREP Command

Shubham Goyal16 May 202216 May 2022
Web Penetration Testing

Hey Folks, today in this tutorial we are going to discuss about (SAST) static application security testing along with its methodologies, types, methods, tools etc. Through this article we will give you a brief overview about SAST and then show you how we can find vulnerabilities in the source code […]

Continue Reading

ShotDroid – Pentesting Tool for Android

Shubham Goyal1 December 20211 December 2021
Andorid Hacking

Hey guys, unknowingly we have come up with a tool for those people who want to spy on people and get sensitive information of those people. Basically this tool will do the job of double shooting with one arrow in your case as you can use it on both android […]

Continue Reading

pwnSpoof – Create Realistic Spoofed Log

Shubham Goyal26 November 202126 November 2021
Bugbounty Tools

Hey Folks, today in this tutorial we have an amazing tool for all of you which can give you fake spoof log by generating. pwnSpoof (from Punk Security) generates realistic spoofed log files for common web servers with customisable attack scenarios. Every log bundle is unique and completely customisable, making […]

Continue Reading

Gotanda – The OSINT Extension for Browsers

Shubham Goyal22 November 202122 November 2021
Bugbounty Tools

Hey Folks, after taking a big break we are back with an exciting tool that can help you easily find the details of any person without any operating system. Let’s take a small example of this tool and see how well it works. Let’s take a look 🙂 !! Installation […]

Continue Reading

Broken Link Checker Tool – Hijacking

Shubham Goyal8 October 20218 October 2021
Bugbounty Tools

Hey Folks, today in this tutorial we are going to talk about a web application penetration testing tool called “broken-link-checker”. The code of this tool is written in Node JS language which comes with the below mentioned features. Features Let’s test it 😛 !! Required Dependencies So first we have […]

Continue Reading

403bypasser – Bypass 403 Restrictions

Shubham Goyal30 September 202130 September 2021
Bugbounty Tools

Hey Folks, we have an amazing tool for all of you that can reward you if you are a bug bounty hunter and looking for a bug in any web application. 403bypasser automates the techniques used to circumvent access control restrictions on target page. Throughout this tutorial, we’ll show you […]

Continue Reading

How to Exploit Windows 11

Shubham Goyal28 September 202128 September 2021
Window Hacking

Hey Folks, today we are excited because we are going to tell you the method using which you can use easily make control on the new Windows 11 operating system. Basically there is no other way to hack any new windows operating system other than kali linux so we will […]

Continue Reading

Knock – Insane Subdomain Enumeration Tool

Shubham Goyal23 September 202123 September 2021
Bugbounty Tools

Hey Folks, in this tutorial we are going to configure another subdomain fuzzer in our Kali Linux operating system to make our penetration testing more vigorous. Knockpy is a python3 tool designed to enumerate subdomains on a target domain through dictionary attack. We are constantly writing articles on subdomain takeover […]

Continue Reading

Subfinder – Easy Subdomain Discovery Tool

Shubham Goyal20 September 202120 September 2021
Bugbounty Tools

Hey Folks, we hope you all will be fine and advance your career in the field of cyber security. Today in this tutorial we will help you a little in getting another cool tool for bug hunting. The name of the tool that we are going to reveal with you […]

Continue Reading

Posts pagination

Previous 1 2 3 … 32 Next

For Business and Promo Inquiries

Stylish Email Button

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy