Skip to content
Home
About Us
Services
Application Security
Web Application Penetration Testing
API Penetration Testing
Mobile Application Penetration Testing​
Source Code Reviews
Threat Modeling
Architecture Reviews
Infrastructure Security
Internal Network Penetration Testing
External Network Penetration Testing
Active Directory Security Assessments
Wireless Network Penetration Testing
Host Reviews
Firewall Configuration Reviews
Cloud Security
Cloud Configuration Reviews
Cloud Penetration Testing
Adversary Simulations
Red Teaming
Purple teaming
OSINT
Phishing Simulations
DevSecOps
Container Security
Kubernetes configuration reviews
Other
Managed Vulnerability Scanning
PCI DSS Security Assessments
Hardware Security Assessments
Smart Contracts Security Assessments
Academy
Advisory
Blog
Media
Podcasts
Videos
Contact Us
Home
About Us
Services
Application Security
Web Application Penetration Testing
API Penetration Testing
Mobile Application Penetration Testing​
Source Code Reviews
Threat Modeling
Architecture Reviews
Infrastructure Security
Internal Network Penetration Testing
External Network Penetration Testing
Active Directory Security Assessments
Wireless Network Penetration Testing
Host Reviews
Firewall Configuration Reviews
Cloud Security
Cloud Configuration Reviews
Cloud Penetration Testing
Adversary Simulations
Red Teaming
Purple teaming
OSINT
Phishing Simulations
DevSecOps
Container Security
Kubernetes configuration reviews
Other
Managed Vulnerability Scanning
PCI DSS Security Assessments
Hardware Security Assessments
Smart Contracts Security Assessments
Academy
Advisory
Blog
Media
Podcasts
Videos
Contact Us
Process Injection: Harnessing the Power of Shellcode

Process Injection: Harnessing the Power of Shellcode

February 22, 2024

Process Injection Process injection is an advanced penetration testing technique used by experienced penetration testers to introduce malicious code into non-malicious processes, infiltrating stealthily without

Read More »
Identifying Unlabelled UART Pins

Decoding the Mystery: Identifying Unlabelled UART Pins

February 19, 2024

Electronics can be a challenging world, especially when working with UARTs, which makes understanding its inner workings essential. Unlabeled UART pins can present both beginners

Read More »
Securing Web Uploads

Securing Web Uploads: Extension Denylisting

February 14, 2024

At the forefront of cybersecurity lies an ever-present battle between web defenders and attackers; one such battleground is file uploads – an integral component of

Read More »
Decoding I2C Mastering the Communication Protocol

Decoding I2C: Mastering the Communication Protocol

February 12, 2024

In the early 1980s, Philips Semiconductors (now NXP Semiconductors) introduced the I2C (Inter-Integrated Circuit) protocol, revolutionizing inter-device communication in electronic devices. With just two wires,

Read More »
Subdomain Enumeration 2

Subdomain Enumeration: Leveraging Web Architecture’s Power

February 8, 2024

Subdomain enumeration is a critical process for researchers, security professionals, and enthusiasts delving into web architecture. By uncovering and mapping subdomains, we can gain invaluable

Read More »
Exploring the Fundamentals of Rust Programming

Exploring the Fundamentals of Rust Programming

February 7, 2024

Rust is an efficient systems programming language designed by Mozilla that stands out for its exceptional efficiency, strong memory safety guarantees, high-performance capabilities, and strong

Read More »
Unveiling SWD Attack Surface

Unveiling Vulnerabilities: Exploring SWD Attack Surface in Hardware

February 2, 2024

SWD stands as one of the lesser-noticed vulnerabilities of hardware security. Used for debugging and programming embedded systems, SWD allows developers to communicate directly with

Read More »
JWT

JWT: A Deep Dive into Algorithm Confusion

February 1, 2024

Since the first time I studied JWT, I found it one of the most intriguing topics to discuss about web application security, and there are

Read More »

Follow Us

Youtube X-twitter Facebook Instagram Linkedin Github Medium

Delaware Office

Redfox Cyber Security Inc.
8 The Green, Ste. A, Dover,
Delaware 19901,
United States.

info@redfoxsec.com

Quick Menu

  • Home
  • About Us
  • Services
  • Blog
  • Media

Legal

  • Privacy Policy
  • Terms of Service
  • Contact Us

Newsletter

Required Login
Please Login for Submit Form.
Close
Success
Thank you! Form submitted successfully.
Close
This field is required

©️2024 Redfox Cyber Security Inc. All rights reserved.