Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Saturday, May 17, 2025

Latest Blog

Exploit Gila CMS 1.11.8 – ‘query’ SQL Injection (PoC)

Shubham Goyal17 June 202017 June 2020
CVE (POC)

Hey folks, today we will show you (PoC) of “Gila CMS 1.11.8 – ‘query’ SQL Injection” vulnerability. The get parameter “query” is vulnerable, hence we will use the SQL injection tool 💉 to retrieve the database. About the Vulnerability Vulnerability Setup Full Proof of Concept Step -1 Step -2 Usage […]

Continue Reading

Embed Malicious URL in Popular Websites

Shubham Goyal15 June 202021 October 2020
Ethical Hacking / Exploiting Tools

Hey Folks, in this tutorial we will show you that how you can embed your malicious URL in popular websites such as : Youtube, Facebook and Google etc. These kind of techniques are useful during the social engineering attacks because we can embed our malicious URLs in well known domains […]

Continue Reading

Exploit WordPress Plugin Multi-Scheduler 1.0.0 – CSRF (Delete User) (PoC)

Shubham Goyal13 June 202013 June 2020
CVE (POC)

Vulnerability Details : The Multi-Scheduler plugin 1.0.0 for WordPress has a Cross-Site Request Forgery (CSRF) vulnerability in the forms it presents, allowing the possibility of deleting records (users) when an ID is known. Full Proof of Concept (PoC) Step -1 Step -2 Step -3 Step -4 Step -5 Step -6 […]

Continue Reading

Exploit Frigate Professional 3.36.0.9 – Local Buffer Overflow (SEH) (PoC)

Shubham Goyal13 June 202013 June 2020
CVE (POC)

Key Points : ✔ In this vulnerabilities frigate professional software will be crashed due to malicious code. You can Follow these steps : Run python code: FrigateLCE.py Copy content to clipboard Open “Frigate3.exe” Go to “Disk” > Find Computer Paste ClipBoard into the “Computer Name:” field Click on OK Calc.exe […]

Continue Reading

Exploit Joomla J2 Store 3.3.11 – SQL Injection (Authenticated) (PoC)

Shubham Goyal13 June 202013 June 2020
CVE (POC)

Full Proof of Concept (PoC) Step -1 Step -2 Step -3 Step -4 Step -5 Done 🙂 !!

Continue Reading

Exploit HFS Http File Server 2.3m Build 300 – Buffer Overflow (PoC)

Shubham Goyal13 June 202013 June 2020
CVE (POC)

CVE-2020-13432 Security Issue This vulnerability allows an remote attackers to trigger an invalid-pointer write access violation via concurrent HTTP requests with a long URI or long HTTP headers like Cookie, User-Agent etc. Remote unauthenticated attackers can send concurrent HTTP requests using an incrementing or specific payload range of junk characters […]

Continue Reading

Top 20 Information Gathering Tool for Bug Bounty Hunters

Shubham Goyal11 June 202021 October 2020
Bugbounty Tools / Ethical Hacking / Web Penetration Testing

Hey folks, in this article we will going to talk about “ Top 20 Recon, Passive Enumeration and Information Gathering Tool “ for bug bounty hunters. We have selected these tools after extensive research. Basically this article based on “Information Gathering” which is the part of bug bounty. What is […]

Continue Reading

How to Extract Email Address Using Google Dork

Shubham Goyal7 June 202021 October 2020
Ethical Hacking / Information Gathering

Hey folks, in this article we are going to talk about “How can we get multiple email addresses using Email Extractor ” We will also take help of Google dork. There are many tools available that will help you to get the email address but in this tutorial we will […]

Continue Reading

Google Advance Hacking – Google Dorks

Shubham Goyal5 June 202021 October 2020
Ethical Hacking / Information Gathering / Web Penetration Testing

Hey folks, in this tutorials we will discussing about the Google Advance Search Engine known as Google Dorks. What is Google Advance Search ( Google Dorks ) ? Google Dorks useful for passive information gathering purposes. This is the best way to reconnaissance about the target website even the target […]

Continue Reading

Posts pagination

Previous 1 … 27 28 29 … 32 Next

For Business and Promo Inquiries

Stylish Email Button

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy