Skip to content
Raxis
  • Home
  • Services
      Core Services
    • Raxis Red Team
    • AI Augmented Penetration Testing
    • Penetration Testing as a Service (PTaaS)
    • Elite Cybersecurity Services
    • Raxis listed as a Sample Vendor for Penetration Testing as a Service in two Gartner® Hype Cycle™, 2024 reports
    • Penetration Testing
    • Penetration Testing Services
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • CyberSecurity Services
    • Compliance: PCI, HIPAA, GLBA, and more
    • Attack Surface Management
    • Breach and Attack Simulation
    • Cybersecurity Code Review
    • Cybersecurity Red Team
    • Phishing and Spear Phishing
    • Social Engineering
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Healthcare (HIPAA)
    • Manufacturing
    • SOC 2
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Careers
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Become a Raxis Partner
    • Certifications
    • Raxis One
    • Transporter Remote Pentesting
    • About Ethical Hacking
    • An Inside Look at a Raxis Red Team
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • What is a Penetration Test?
    • What is Web Application Penetration Testing?
  • The Exploit Blog
  • About Us
Contact Raxis Login
Raxis
Contact RaxisIcon Link to Contact Raxis
  • Home
  • Services
      Core Services
    • Raxis Red Team
    • AI Augmented Penetration Testing
    • Penetration Testing as a Service (PTaaS)
    • Elite Cybersecurity Services
    • Raxis listed as a Sample Vendor for Penetration Testing as a Service in two Gartner® Hype Cycle™, 2024 reports
    • Penetration Testing
    • Penetration Testing Services
    • Web Application Penetration Testing
    • API Security
    • Salesforce Applications
    • Internal Networks, Cloud, and VPC
    • External Networks and Internet
    • Wireless Networks
    • Mobile Applications
    • CyberSecurity Services
    • Compliance: PCI, HIPAA, GLBA, and more
    • Attack Surface Management
    • Breach and Attack Simulation
    • Cybersecurity Code Review
    • Cybersecurity Red Team
    • Phishing and Spear Phishing
    • Social Engineering
  • Industries
      Critical Infrastructure
    • Energy
    • Communications
    • Transportation
    • Water
    • Compliance Driven
    • Credit Card Industry (PCI)
    • Education
    • Finance and Banking
    • GLBA Safeguards Rule
    • Government Agencies
    • Healthcare (HIPAA)
    • Manufacturing
    • SOC 2
    • Technology
    • Technology and Software Development
    • Blockchain and Cryptocurrency
    • Media and Entertainment
    • Social Media
  • Resources
      Company Information
    • About Raxis
    • Careers
    • Meet Our Team
    • Signup for Raxis News
    • Resources
    • The Exploit Blog
    • Become a Raxis Partner
    • Certifications
    • Raxis One
    • Transporter Remote Pentesting
    • About Ethical Hacking
    • An Inside Look at a Raxis Red Team
    • Red, Blue, and Purple Teams
    • Penetration Test Glossary
    • What is a Penetration Test?
    • What is Web Application Penetration Testing?
  • The Exploit Blog
  • About Us

The Exploit

Raxis Cybersecurity Insights From The Frontlines

  • Cool Tools Series: Masscan
    How To | Penetration Testing

    Cool Tools Series: Masscan for Penetration Testing

    ByAndrew Trexler December 3, 2024June 16, 2025

    Continuing our Cool Tools Series, Lead Penetration Tester Andrew Trexler shows how to use masscan for discovery scanning on large networks in penetration tests.

    Read More Cool Tools Series: Masscan for Penetration TestingContinue

  • Password Series: Defeating Emerging Password Security Trends with Psudohash
    How To | Password Cracking | Penetration Testing

    Password Series: Defeating Emerging Password Security Trends with Psudohash for Penetration Testing

    ByRyan Chaplin November 5, 2024June 16, 2025

    Lead Pentester Ryan Chaplin discusses emerging improvements in password security and how Psudohash can help bypass them on penetration tests.

    Read More Password Series: Defeating Emerging Password Security Trends with Psudohash for Penetration TestingContinue

  • Cool Tools Series: MSFvenom
    Exploits | How To | Penetration Testing

    Cool Tools Series: How MSFvenom Powers Penetration Testing

    ByNathan Anderson October 8, 2024July 28, 2025

    Nathan Anderson intros MSFvenom, a Metasploit tool that generates & encodes payloads to obtain reverse shells & gain network access for penetration testing.

    Read More Cool Tools Series: How MSFvenom Powers Penetration TestingContinue

  • Cool Tools Series: Nuclei
    Exploits | How To | Networks | Penetration Testing

    Cool Tools Series: Nuclei for Penetration Tests

    ByAndrew Trexler September 10, 2024August 19, 2025

    Raxis’ Andrew Trexler shows how useful Nuclei is for network and application penetration tests, discovering vulnerabilities such as default passwords and more.

    Read More Cool Tools Series: Nuclei for Penetration TestsContinue

  • Cool Tools Series: NMAP for Penetration Tests
    How To | Networks | Penetration Testing

    Cool Tools Series: NMAP for Penetration Tests

    ByAdam Fernandez July 30, 2024

    Raxis’ lead developer, Adam Fernandez, adds to our Cool Tools Series with a focus on Nmap: discovering live hosts that appear to be down and useful NSE scripts.

    Read More Cool Tools Series: NMAP for Penetration TestsContinue

  • Cool Tools Series: Host Discovery
    How To | Networks | Penetration Testing

    Cool Tools Series: Host Discovery in Penetration Testing

    ByScottie Cole July 2, 2024June 16, 2025

    Raxis’ pentester, Scottie Cole, leads off our new Cool Tools Series with tips on tools for host discovery and vulnerability discovery for penetration tests.

    Read More Cool Tools Series: Host Discovery in Penetration TestingContinue

  • SQL Injection Attack
    Exploits | How To | Injection Attacks

    SQLi Series: SQL Timing Attacks for Penetration Testing

    ByAndrew Trexler May 7, 2024June 16, 2025

    Andrew Trexler’s SQLi Series is back, demonstrating SQL Timing Attacks using MySQL’s sleep function in Blind SQL Injection attacks for penetration testing.

    Read More SQLi Series: SQL Timing Attacks for Penetration TestingContinue

  • SQL Injection
    Exploits | How To | Injection Attacks

    SQLi Series: An Introduction to SQL Injection for Penetration Testing

    ByAndrew Trexler April 9, 2024June 16, 2025

    Raxis’ Andrew Trexler explains what SQL Injection (SQLi) is and how to perform a simple exploit against a web app login page in penetration tests.

    Read More SQLi Series: An Introduction to SQL Injection for Penetration TestingContinue

  • AD Series: Resource Based Constrained Delegation (RBCD) Exploits
    Exploits | How To

    AD Series: Resource Based Constrained Delegation (RBCD) for Penetration Testing

    ByAndrew Trexler March 12, 2024June 16, 2025

    Exploit msDS-AllowedToActOnBehalfOfOtherIdentitity to gain administrative access in a Resource Based Constrained Delegation (RBCD) attack on penetration tests.

    Read More AD Series: Resource Based Constrained Delegation (RBCD) for Penetration TestingContinue

  • AD Series: Active Directory Certificate Services (ADCS) Exploits Using NTLMRelayx.py
    Exploits | How To

    AD Series: Active Directory Certificate Services (ADCS) Exploits Using NTLMRelayx.py for Penetration Tests

    ByAndrew Trexler January 23, 2024June 16, 2025

    Andrew Trexler ran into issues with certipy when testing on port 443 and found that NTLMRelayx.py worked better in for those ADCS Exploits on penetration tests.

    Read More AD Series: Active Directory Certificate Services (ADCS) Exploits Using NTLMRelayx.py for Penetration TestsContinue

  • Active Directory Certificate Services (ADCS) Misconfiguration Exploits
    Exploits | How To

    AD Series: Active Directory Certificate Services (ADCS) Misconfiguration Exploits for Penetration Tests

    ByAndrew Trexler August 10, 2023July 28, 2025

    Andrew Trexler adds to his AD series with a tutorial of Active Directory Certificate Services (ADCS) misconfiguration exploits for penetration tests.

    Read More AD Series: Active Directory Certificate Services (ADCS) Misconfiguration Exploits for Penetration TestsContinue

  • Broadcast Attacks - Responder
    Exploits | How To | Password Cracking

    AD Series: How to Perform Broadcast Attacks Using NTLMRelayx, MiTM6 and Responder for Penetration Tests

    ByAndrew Trexler June 19, 2023June 16, 2025

    Andrew Trexler continues his AD Series with an in-depth tutorial on broadcast Attacks using NTLMRelayx, MiTM6 and Responder for penetration tests.

    Read More AD Series: How to Perform Broadcast Attacks Using NTLMRelayx, MiTM6 and Responder for Penetration TestsContinue

Page navigation

Previous PagePrevious 1 2 3 4 Next PageNext

2870 Peachtree Road
Suite #915-8924
Atlanta, GA 30305 USA

Contact us online

About Raxis

  • About Raxis
  • Careers
  • Terms and Conditions
  • Privacy Policy
  • Partners, Apply Here

Resources

  • The Exploit
  • Transporter Remote Penetration Testing
  • Penetration Test Glossary
  • What is a Penetration Test?
Facebook X Instagram Linkedin YouTube