Yaksas Security

Yaksas Security

Home
Red Team Training
Cyber Safety Initiatives
GitHub
Archive
About
Red Team Adversary Emulation Course
In this course, you will look at an organization’s security from a real-world adversary perspective
Sep 20, 2024 • Yaksas Security
Immunity Debugger for Exploit Devs
Learn Immunity Debugger in and out. You will learn both, well-known and lesser-known, features.
Sep 22, 2024 • Yaksas Security
Red Team Operations Attack Lifecycle
The nine-step process of conducting red team and adversary emulation exercises.
Sep 29, 2024 • Yaksas Security
PoshC2: A Red Teamer's Notes
A quick reference guide for using PoshC2, a post-exploitation framework, during penetration testing and red teaming engagements.
Sep 29, 2024 • Yaksas Security
Active Directory Exploitation using ADSISearcher (Part 2)
This post gives an overview of ADSISearcher class and explains how to use it via PowerShell to enumerate Active Directory objects.
Jul 8, 2024 • Yaksas Security
Mona.py for exploit devs: 6 must know commands
Six mona.py commands I regularly use during exploit development. They help me speed up the entire process. Watch the video for demonstration.
Oct 19, 2024 • Yaksas Security
Active Directory User Enumeration using PowerView
As a pentester, you can leverage PowerView to find out information about domain users. These six commands will help you in user enumeration.
Jul 8, 2024 • Yaksas Security
6 Ways to Cover Your Device's Camera
Have you ever wondered that somebody might be watching you though your device's camera? Stay safe with these 6 device camera cover hacks.
Sep 30, 2024 • Yaksas Security
Red Team Adversary Emulation Lab - Tax First Labz
Red team lab to go along with the course Red Team Adversary Emulation (https://yks.red/RTAE)
Sep 21, 2024 • Yaksas Security
Buy Courses
Buy courses at https://courses.yaksas.in
Sep 20, 2024 • Yaksas Security
Keep This in Mind While Searching for a CISO
Essential factors to ensure your next Chief Information Security Officer (CISO) aligns with business growth and cybersecurity needs.
Sep 15, 2024 • Yaksas Security
Seven Common Cryptography Attacks
Discover the seven most common cryptography attacks, including brute force, ciphertext-only, and differential cryptanalysis, and how they impact…
Oct 18, 2024 • Yaksas Security
© 2026 Yaksas Security · Privacy ∙ Terms ∙ Collection notice
Start your SubstackGet the app
Substack is the home for great culture