How to Create an Active Directory Test Environment
How to Create an AD Test Environment

Andrew Trexler walks us through creating a simple AD test environment to test new hacks[…]

Exploiting GraphQL
Exploiting GraphQL

Exploiting GraphQL, a query language inspired by the structure & functionality of online data storage[…]

Log4 Exploit Walkthrough
Log4j: How to Exploit and Test this Critical Vulnerability

Raxis demonstrates how to obtain a remote shell on a target system using a Log4j[…]

Exploiting Dirty Pipe (CVE-2022-0847)
Exploiting Dirty Pipe (CVE-2022-0847)

The Dirty Pipe vulnerability (CVE-2022-0847) allows any user to write to read-only files, including files[…]

Submit Button
Hackers See Opportunity Where You See Only a Button

In this post, Raxis VP Brad Herring explains how web proxy tools can turn even[…]

How to Hire a Penetration Testing Firm Part Two
How to Hire a Penetration Testing Firm Part Two

Raxis’ COO Bonnie Smyre continues her two-part series on how to hire a penetration testing

Penetration Testing Types
How to Hire a Penetration Testing Firm – Part 1

Raxis’ COO Bonnie Smyre offers some helpful hints about how to start the process of[…]

Matt Dunn Mathur
Reporting Tools for Large Penetration Tests

Raxis lead penetration tester Matt Dunn has developed three new tools to make it easier[…]

Offensive Security OSCP
So, You Want to Earn Your OSCP?

What’s it like to earn your OSCP? Raxis senior penetration tester Andrew Trexler talks about[…]

Metasploit Module: Azure AD Login Scanner
New Metasploit Module: Azure AD Login Scanner

Raxis’ Matt Dunn has published another Metasploit module, this one describing a vulnerability in Azure’s[…]

Cross-Site Scripting: Filter Evasion & Sideloading Payloads
Cross-Site Scripting (XSS): Filter Evasion and Sideloading

In this second in a series, learn how to perform Cross-Site Scripting (XSS) attacks such[…]

Introduction to Cross-Site Scripting
Introduction to Cross-Site Scripting

This video covers the basics of cross-site scripting, including reflected, stored, and DOM-based XSS as[…]