Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Thursday, May 22, 2025

Tag: how to hack window 10

Multiple Ways to Exploit Windows 10 using Macros

Shubham Goyal30 December 202030 December 2020
Exploiting Tools / Window Hacking

Hey Folks, as we promised you in our previous article, we will bring you an article, in which we will discuss various methods or tools for exploiting windows machine by creating macro payload. The time has come and this tutorial can also be helpful for corporate employees because we know […]

Continue Reading

Exploit Windows 10 with Excel File ( Macros )

Shubham Goyal26 December 202026 December 2020
Window Hacking

Hey Folks, in this tutorial we will show you the way through which we can easily exploit any windows machine using malicious macros. We know that many people will be familiar with macros because it is a part of Microsoft Excel software and sometimes we use Excel in our routine, […]

Continue Reading

FTP Log Poisoning Through LFI

Shubham Goyal11 May 202022 October 2020
Web Penetration Testing

In this article, you will learn how to take access in any web server through ftp log poisoning if it is suffering from local file inclusion vulnerability. What is PHP File Inclusion ? With the help of include function you can include the content of php into another php file […]

Continue Reading

Multiple Ways to Create a Payload for Window Exploit

Shubham Goyal7 May 20207 May 2020
Ethical Hacking / Window Hacking

There are several method to take the access on window machine but in this article, we are going to talk about ways to create a payload for windows Exploit. With the help of this article you will learn how to create payload both manually and automatically. Metasploit Framework Metasploit Framework […]

Continue Reading

Multiple Ways to Create Permanent Backdoor in Remote PC

Shubham Goyal29 April 20208 October 2020
Persistence / Window Hacking

In this article, we will learn how to create a persistent backdoor with the help of metasploit framework on the host machine. What is Persistent Backdoor As we know that persistence also known as permanent. Persistent backdoors help us to take permanent access of system. There are so many types […]

Continue Reading

For Business and Promo Inquiries

Stylish Email Button

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy