A Redfox Cybersecurity blog on GPO Abuse

GPO Abuse

Group Policy Objects (GPOs) are a powerful tool administrators use to manage and enforce security policies across a domain. However, in the wrong hands, GPOs

Read More »
A Redfox Cybersecurity blog on C2 Framework.

Introduction to C2 Frameworks

Command and Control (C2) frameworks have emerged as a sophisticated and consequential dimension in the ever-evolving cybersecurity landscape. These frameworks are commonly employed by threat

Read More »
A Redfox Cybersecurity blog on DOM-based XSS

DOM-Based Cross-Site Scripting

As the digital landscape continues to evolve, so do the threats that target web applications. Cross-site scripting (XSS) remains a persistent and dangerous vulnerability among

Read More »
A redfox Cybersecurity on BloodHound tool

BloodHound Cheat Sheet

BloodHound is a powerful security tool that uses graph theory to reveal the relationships between users, groups, and computers in a domain. In this comprehensive

Read More »
A Redfox Cybersecurity blog on AS-REP Roasting attack, and the tools required to perform it.

AS-REP Roasting

‍Kerberos is a network authentication protocol used to provide secure authentication over a non-secure network. While it is an essential component of network security, it

Read More »