A Redfox Cybersecurity blog explaining Havoc C2.

Havoc C2 Framework

Havoc C2 has quickly become one of many peoples’ favorite open-source C2s. Its features offer everything you need to complete a pen test or red

Read More »
A Redfox Cybersecurity blog on C2 Framework.

Introduction to C2 Frameworks

Command and Control (C2) frameworks have emerged as a sophisticated and consequential dimension in the ever-evolving cybersecurity landscape. These frameworks are commonly employed by threat

Read More »
A Redfox Cybersecurity blog on IPV6 DNS takeover

IPV6 DNS Takeover

Even though the usage of IPv6 is gaining traction, it is rare to find an organization using it in its network. Most people do not

Read More »