Skip to content
Raxis
  • Home
  • Services
      Red Team Penetration Testing
    • Red Team
    • Breach and Attack Simulation
    • Phishing and Spear Phishing
    • Physical Penetration Testing
    • Penetration Testing
    • Penetration Testing Services
    • Raxis Attack: Penetration Testing as a Service
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • Cybersecurity Services
    • Elite Cybersecurity Services
    • Attack Surface Management
    • Cybersecurity Code Review
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Healthcare (HIPAA, FDA)
    • SOC 2
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Manufacturing
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Become a Raxis Partner
    • Careers
    • Certifications
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Raxis One
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • Transporter Remote Pentesting
    • What is a Penetration Test?
  • The Exploit Blog
  • About Us
Contact Raxis Login
Raxis
Contact RaxisIcon Link to Contact Raxis
  • Home
  • Services
      Red Team Penetration Testing
    • Red Team
    • Breach and Attack Simulation
    • Phishing and Spear Phishing
    • Physical Penetration Testing
    • Penetration Testing
    • Penetration Testing Services
    • Raxis Attack: Penetration Testing as a Service
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • Cybersecurity Services
    • Elite Cybersecurity Services
    • Attack Surface Management
    • Cybersecurity Code Review
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Healthcare (HIPAA, FDA)
    • SOC 2
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Manufacturing
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Become a Raxis Partner
    • Careers
    • Certifications
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Raxis One
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • Transporter Remote Pentesting
    • What is a Penetration Test?
  • The Exploit Blog
  • About Us

Cybersecurity Insights From The Frontlines

  • PSE & Red Team Series: Physical Entry Bypass
    How To | Red Team | Social Engineering

    PSE & Red Team Series: Physical Entry Bypass

    ByNathan Anderson April 8, 2025September 4, 2025

    Raxis lead penetration tester, Nathan Anderson, continues our PSE & Red Team series with a discussion on the tools and techniques to bypass entry controls.

    Read More PSE & Red Team Series: Physical Entry BypassContinue

  • Cool Tools Series: CeWL
    How To | Password Cracking

    Cool Tools Series: CeWL for Penetration Testing

    ByJason Taylor March 25, 2025August 19, 2025

    Lead Penetration Tester Jason Taylor discusses how the CeWL Custom Word List generator can improve hashcat results for penetration testing.

    Read More Cool Tools Series: CeWL for Penetration TestingContinue

  • AD Series: Using Evil-WinRM to Get NTDS Manually
    Exploits | How To

    AD Series: Using Evil-WinRM to Get NTDS Manually in Penetration Tests

    ByAndrew Trexler March 11, 2025August 19, 2025

    Principal Penetration Tester Andrew Trexler’s Active Directory series is back, showing how to use Evil-WinRM to copy NTDS.dit manually in penetration tests.

    Read More AD Series: Using Evil-WinRM to Get NTDS Manually in Penetration TestsContinue

  • Password Series: 8 Practical First Steps to Crack Difficult Passwords
    How To | Password Cracking | Penetration Testing

    Password Series: 8 Practical First Steps to Crack Difficult Passwords in Penetration Tests

    ByRyan Chaplin February 25, 2025August 19, 2025

    From rulesets & hardware to wordlists and mask attacks, Lead Penetration Tester Ryan Chaplin shows how to crack difficult password hashes in penetration tests.

    Read More Password Series: 8 Practical First Steps to Crack Difficult Passwords in Penetration TestsContinue

  • PSE & Red Team Series: OSINT & Reconnaissance
    How To | Red Team | Social Engineering

    PSE & Red Team Series: OSINT & Reconnaissance

    ByNathan Anderson February 11, 2025August 19, 2025

    Raxis lead penetration tester, Nathan Anderson, begins our PSE & Red Team series discussing the importance of OSINT and reconnaissance to begin the assessment.

    Read More PSE & Red Team Series: OSINT & ReconnaissanceContinue

  • Cool Tools Series: Vim
    How To | Penetration Testing

    Cool Tools Series: How Vim Powers Penetration Testing

    ByAndrew Trexler January 14, 2025August 17, 2025

    Principal Penetration Tester, Andrew Trexler, dives into Vim, a powerful command line tool for text files, and shows useful commands for penetration testing.

    Read More Cool Tools Series: How Vim Powers Penetration TestingContinue

  • Cool Tools Series: Masscan
    How To | Penetration Testing

    Cool Tools Series: Masscan for Penetration Testing

    ByAndrew Trexler December 3, 2024June 16, 2025

    Continuing our Cool Tools Series, Lead Penetration Tester Andrew Trexler shows how to use masscan for discovery scanning on large networks in penetration tests.

    Read More Cool Tools Series: Masscan for Penetration TestingContinue

  • Password Series: Defeating Emerging Password Security Trends with Psudohash
    How To | Password Cracking | Penetration Testing

    Password Series: Defeating Emerging Password Security Trends with Psudohash for Penetration Testing

    ByRyan Chaplin November 5, 2024June 16, 2025

    Lead Pentester Ryan Chaplin discusses emerging improvements in password security and how Psudohash can help bypass them on penetration tests.

    Read More Password Series: Defeating Emerging Password Security Trends with Psudohash for Penetration TestingContinue

  • Cool Tools Series: MSFvenom
    Exploits | How To | Penetration Testing

    Cool Tools Series: How MSFvenom Powers Penetration Testing

    ByNathan Anderson October 8, 2024July 28, 2025

    Nathan Anderson intros MSFvenom, a Metasploit tool that generates & encodes payloads to obtain reverse shells & gain network access for penetration testing.

    Read More Cool Tools Series: How MSFvenom Powers Penetration TestingContinue

  • Cool Tools Series: Nuclei
    Exploits | How To | Networks | Penetration Testing

    Cool Tools Series: Nuclei for Penetration Tests

    ByAndrew Trexler September 10, 2024August 19, 2025

    Raxis’ Andrew Trexler shows how useful Nuclei is for network and application penetration tests, discovering vulnerabilities such as default passwords and more.

    Read More Cool Tools Series: Nuclei for Penetration TestsContinue

Page navigation

Previous PagePrevious 1 2 3 4 … 6 Next PageNext

2870 Peachtree Road
Suite #915-8924
Atlanta, GA 30305 USA

+1 678.421.4544

Contact us online for faster response

About Raxis

  • About Raxis
  • Careers
  • Terms and Conditions
  • Privacy Policy
  • Penetration Testing Partner Program

Resources

  • The Exploit Blog
  • Transporter Remote Penetration Testing
  • Penetration Test Glossary
  • What is a Penetration Test?
Facebook X Instagram Linkedin YouTube