
Cyber Security Training
Cyber Security Training April 25, 2024 Informational Shashi Prasad In today’s rapidly evolving digital landscape, cybersecurity has become more important than ever. As cyber threats
Cyber Security Training April 25, 2024 Informational Shashi Prasad In today’s rapidly evolving digital landscape, cybersecurity has become more important than ever. As cyber threats
Leveraging Win32 APIs in C# using Platform Invokation(P/Invoke) March 13, 2024 Red Team Shashi Kant Prasad Win32 APIs, also referred to as Windows API or
Introduction to EDR Evasion: API Hooking Januany 24, 2024 Red Team Shashi Kant Prasad Endpoint Detection and Response (EDR) solutions are essential for monitoring and
Securing AWS: Importance of Penetration Testing & Best Practices January 1, 2024 AWS Shashi Prasad Unlock the full potential of AWS cloud computing while ensuring
DNS Data Exfiltration: Protecting Your Organization from Stealthy Threats December 20, 2023 Informational Atharva Nanche In today’s digital landscape, organizations face a constant barrage of
7 Essential Steps for an Effective Yearly Penetration Testing Plan June 19, 2024 Informational Shashi Kant Prasad Embarking on a journey to fortify your digital
PrintNightmare: The Vulnerability That Shook Windows Systems October 23, 2023 Active Directory Shashikant Prasad In recent years, the cybersecurity landscape has been constantly evolving, with
An In-depth Exploration into WebClient Abuse October 09, 2023 Active Directory Shashi Kant Prasad In red teaming, understanding the potential for lateral movement within a
Havoc C2 Framework August 30, 2023 Red Team Shashikant Prasad Havoc C2 has quickly become one of many peoples’ favorite open-source C2s. Its features offer
Introduction to C2 Frameworks July 27, 2023 Red Team Shashikant Prasad Command and Control (C2) frameworks have emerged as a sophisticated and consequential dimension in
Exploiting MS SQL Servers July 18, 2023 Active Directory Shashi Kant Prasad As companies continue to rely on databases to store sensitive information, securing the
Resource-Based Constrained Delegation (RBCD) Attack July 15, 2023 Active Directory Shashikant Prasad Resource-Based Constrained Delegation (RBCD) is a feature introduced in Windows Server 2012 that
Redfox Cyber Security Inc.
8 The Green, Ste. A, Dover,
Delaware 19901,
United States.
info@redfoxsec.com
©️2024 Redfox Cyber Security Inc. All rights reserved.