Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Ctf Challenges
  • CVE (POC)
Sunday, May 28, 2023

Latest Blog

Spy on Any Android Phone – XploitSPY

Shubham Goyal18 May 202018 May 2020
Andorid Hacking / Ethical Hacking / Exploiting Tools

In this article, you will learn about the sapying on adnroid phone. As you know that various tools or software are available to spy on android phone but they will charge form you. Why should we use XploitSPY ? If you want to spy on someone such as : friends, […]

Continue Reading

Complete Installation of Parrot os in vmware

Shubham Goyal13 May 202021 October 2020
Ethical Hacking / OS installation

In this article, you will learn how to install parrot operating system in vmware. Parrot operating system can be use in order for cloud pentest. It is a Debian-based Linux distribution built by Frozenbox Network. Let’s Begin !! Installation We should have the vmware application, you can download it from […]

Continue Reading

How to Bypass Windows 10 Defender

Shubham Goyal12 May 202012 May 2020
Exploiting Tools / Window Hacking

Dear Learners, Here is our new article “ how to bypass windows 10 defender “. You know that there are various tool to bypass the window defender of which a popular tool named shellter. Shellter is a first truly dynamic PE infector ever created. It is used for inject shellcode […]

Continue Reading

Ashok : Osint Recon Tool For Hackers

Shubham Goyal12 May 202022 October 2020
Exploiting Tools / Information Gathering

Reconnaissance also known as Recon is the first step in any penetration testing , Bug hunting phase which means gathering information before any real attacks are planned. The Basic idea is to collect as much interesting information as possible about the target. Most of the time Recon phase can helps […]

Continue Reading

FTP Log Poisoning Through LFI

Shubham Goyal11 May 202022 October 2020
Web Penetration Testing

In this article, you will learn how to take access in any web server through ftp log poisoning if it is suffering from local file inclusion vulnerability. What is PHP File Inclusion ? With the help of include function you can include the content of php into another php file […]

Continue Reading

Hack Wallpaper and Passwords Using Post Exploitation

Shubham Goyal8 May 20208 May 2020
Ethical Hacking / Window Hacking

In this article you will learn, after compromised the victim machine what we can do by using post exploitation. There are 478 post exploitation modules which are available in metasploit framework but in this article we will use only five modules which is working on window 10 machine. What is […]

Continue Reading

Multiple Ways to Create a Payload for Window Exploit

Shubham Goyal7 May 20207 May 2020
Ethical Hacking / Window Hacking

There are several method to take the access on window machine but in this article, we are going to talk about ways to create a payload for windows Exploit. With the help of this article you will learn how to create payload both manually and automatically. Metasploit Framework Metasploit Framework […]

Continue Reading

Access Any Android Phone Without Touching – Ghost Framework

Shubham Goyal5 May 202022 October 2020
Andorid Hacking / Exploiting Tools

In this article, we will going to talk about how to access any android device. There will be many ways to access the android phone but in this method you can access android device without touching the phone. Lets take a look ! What is Android Debug Bridge (ADB) ? […]

Continue Reading

How to Hack Android Phone over the WAN

Shubham Goyal2 May 20206 May 2020
Andorid Hacking / Ethical Hacking

As you know we already discussed about android hacking over LAN ( Local Area Network ). Click here to see. Now in this article we will talk about how to access any android phone over WAN ( Wide Area Network ) without port forwarding. What is LAN ? Local area […]

Continue Reading

Posts navigation

Previous 1 … 29 30 31 Next

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Ctf Challenges
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy