Yaksas Security
We talk about cyber safety, cyber security research and cyber security education.

Beware of these search results | Smart & Safe | Cyber Safety Champions | English | Yaksas Security

Don't fall for these messages | Smart & Safe | Cyber Safety Champions | English | Yaksas Security

Talk: Protection From Modern Cyber Frauds by Uday Mittal (2024) | Hinglish | Yaksas Security

How to keep your passwords safe | Smart & Safe | Cyber Safety Champions | English | Yaksas Security

How to stay safe from OTP Frauds | Smart & Safe | Cyber Safety Champions | English | Yaksas Security

How to stay safe from AI Scams | Smart & Safe | Cyber Safety Champions | English | Yaksas Security

Are you safe from FinSpy? | English | Yaksas Security

क्या आप FinSpy से सुरक्षित हैं? | Hinglish | Yaksas Security

Webinar: Protection From Cyber Crime by Uday Mittal (2023) | Hinglish | Yaksas Security

Creating AWS IAM Account for hosting Red Team Adversary Emulation Lab | Yaksas CSC

Fetching AWS Account ID for hosting Red Team Adversary Emulation Lab | Yaksas CSC

Red Team Adversary Emulation Lab Access (Tax First Labz) | Yaksas CSC

Module 3.3 (PoC Creation): Multi-staged Windows exploit | Hands-on Fuzzing and Exploit Development

Module 3.6.1 (Cracking the shell): Multi-staged Windows exploit

Module 3.6.2 (Cracking the shell): Multi-staged Windows exploit

Module 3.2 (Fuzzing): Multi-staged Windows exploit | Hands-on Fuzzing and Exploit Development

Module 3.5 (Bad character analysis): Multi-staged Windows exploit

Module 3.4 (Controlling the execution): Multi-staged Windows exploit

Using redirectors with PoshC2

Lateral Movement using PoshC2 (Daisy Chains)

Dumping Windows credentials using PoshC2

Reverse shell via Vim editor

Establishing persistence using SSH

Analyzing a simple binary using Radare2

Red Team Adversary Emulation: Mimicking a real-world cyber attack

PoshC2 - How to use?

SPN Scanning using ADSI - Active Directory Exploitation using ADSI (Part 3)

ADSISearcher - Active Directory Exploitation using ADSI (Part 2)

Let's Learn: Web application penetration testing using BodgeIt Store (Part 1)

Active Directory Exploitation using ADSI - Part 1 (ADSI Introduction)