Skip to content
  • Home
  • Origins
  • Services
    • Application Security
      • Web Application Penetration Testing
      • API Penetration Testing
      • Mobile Application Penetration Testing​
      • Source Code Reviews
      • Threat Modeling
      • Architecture Reviews
    • Infrastructure Security
      • Internal Network Penetration Testing
      • External Network Penetration Testing
      • Active Directory Security Assessments
      • Wireless Network Penetration Testing
      • Host Reviews
      • Firewall Configuration Reviews
    • Cloud Security
      • Cloud Configuration Reviews
      • Cloud Penetration Testing
    • Adversary Simulations
      • Red Teaming
      • Purple teaming
      • OSINT
      • Phishing Simulations
    • DevSecOps
      • Container Security
      • Kubernetes configuration reviews
    • Other
      • Managed Vulnerability Scanning
      • PCI DSS Security Assessments
      • Hardware Security Assessments
      • Smart Contracts Security Assessments
  • MSOC
  • Academy
  • Advisory
  • Blog
  • Contact

Blog

Home / Blog

A blog on how to downgrade Frida Version On iOS Devices

Downgrade Frida Version On iOS Devices

Read More »
August 11, 2025
A blog on installing Burp Suite’s CA as a System Certificate on Android

Installing Burp Suite’s CA as a System Certificate on Android

Read More »
April 23, 2025
A blog on Task Hijacking StrandHogg (Pt. 2)

Task Hijacking StrandHogg (Pt. 2)

Read More »
January 2, 2025
A blog on Task Hijacking StrandHogg (Pt. 1)

Task Hijacking StrandHogg (Pt. 1)

Read More »
December 31, 2024
A blog on using penetration testing in ChatGPT(Pt-1)

ChatGPT for Pen Testing (Pt. 2)

Read More »
August 9, 2024
A blog on Security Advisory: Multiple Vulnerabilities in Syrotech Router

Security Advisory: Multiple Vulnerabilities in Syrotech Router 

Read More »
August 1, 2024
A blog on how to enhance your cybersecurity

Hackers Love Untrained Users — Don’t Be One

Read More »
July 23, 2024
A blog on Assembly Language programming

Introduction To Assembly Language

Read More »
July 23, 2024
A blog from Redfox Cybersecurity on Asus RT N12 + B1’s Privilege Escalation CVE-2024-28326​

Asus RT N12 + B1’s Privilege Escalation CVE-2024-28326​

Read More »
July 23, 2024
A blog from Redfox Cybersecurity on A Guide to Server-Side Template Injection (SSTI)

A Guide to Server-Side Template Injection (SSTI)

Read More »
July 19, 2024
A blog from Redfox Cybersecurity on Hardware Hacking

Getting Started with Hardware Hacking

Read More »
June 15, 2024
A blog from Redfox Cybersecurity on Unlocking Firmware Customization with the CH341A Programmer and ESP-01 Module

Unlocking Firmware Customization with the CH341A Programmer and ESP-01 Module

Read More »
June 15, 2024

Follow Us

Youtube X-twitter Facebook Instagram Linkedin Github Medium

Delaware Office

Redfox Cyber Security Inc.
8 The Green, Ste. A, Dover,
Delaware 19901,
United States.

info@redfoxsec.com

Quick Menu

  • Home
  • Origins
  • Services
  • Blog

Legal

  • Privacy Policy
  • Terms of Service
  • Contact

Newsletter

Required Login
Please Login for Submit Form.
Close
Success

Thank you! Form submitted successfully.

This field is required

© 2026 Redfox Cyber Security Inc. All rights reserved.