Published inJa1ir4m @ RedxXxploitzBrowser in the middle attack(BITM )— The Perfect Storm for Browser HijackingHi Friends! Its always great to meet you all with this blog. Hope everyone is doing great!1d ago1d ago
Published inJa1ir4m @ RedxXxploitzAre You a Security Tester or Penetration Tester?Hi All! Welcome to another blog with me, @ja1ir4m from RedxXxploitz. In today’s blog, let’s clear up a common confusion in the infosec…Mar 2Mar 2
Nessus Network Scan (Authenticated/Credentialed Scan) — Part 5Hi everyone! Hope your doing great. It’s always a pleasure to connect with you through this blog. As you know, we’re currently diving into…Feb 25Feb 25
Published inJa1ir4m @ RedxXxploitzNessus Network Scan (Un-Authenticated)— Part 4Hi All! Welcome to Part 4 of our Scanner Series, where we continue our exploration of Nessus Essentials by Tenable.Feb 22Feb 22
Published inJa1ir4m @ RedxXxploitzNessus Discovery Scan — Part 3Hi Friends! Welcome back to our blog series. This is Part 3 in our Scanner Series. In our previous posts, we explored the solutions…Feb 20Feb 20
Published inJa1ir4m @ RedxXxploitzSetting up Nessus Essentials for Capability analysis— Part 2Hi All! welcome to our part 2 of our scanner series, where in part 1 we have discussed the available products with tenable and started…Feb 19Feb 19
Published inJa1ir4m @ RedxXxploitzTenable Nessus — Dominating the Vulnerability Scanning Space— Part 1Hi All, It’s a great pleasure to connect with you all again through this blog! I sincerely appreciate you taking the time to read this…Feb 16Feb 16
JWT Assertions: Abuse — Explained.Hello my buddies!, its been a long time since we met. As always, i feel blessed in meeting you all with this blog post after a long long…Nov 29, 2024Nov 29, 2024
Certified Hybrid Multi cloud Red Team Certification(CHMRTS) — Review — Cyberwarfare LabsHi Friends! Hope Everyone is doing great. Happy to meet you all in an another blog in summer, where I share my feedback and experiences…Jul 1, 2024Jul 1, 2024