Blog

Home / Blog

A redfox Cybersecurity blog on using iOS pentesting with Objection.

iOS Pen Testing with Objection

In the realm of mobile app security, iOS penetration testing plays a pivotal role in identifying and mitigating vulnerabilities. This comprehensive guide combines iOS vulnerabilities

Read More »
A redfox Cybersecurity blog on different methods and techniques to exploit Android activities

How to Exploit Android Activities?

This blog will explore different methods and techniques to exploit Android activities with the “exported=true” attribute set. By understanding the vulnerabilities associated with this attribute,

Read More »
A Redfox Cybersecurity blog explaining Havoc C2.

Havoc C2 Framework

Havoc C2 has quickly become one of many peoples’ favorite open-source C2s. Its features offer everything you need to complete a pen test or red

Read More »