Yaksas CSC

Your Guardian in the Cyber World

  • Yaksas CSC Home
  • Home
  • About Us
    • Overview
    • Why Yakṣas?
  • Got a Question?
    • Cyber Security Basics
    • Cyber Security Education & Career
    • How to stay safe?
  • Get Invloved
    • Write for Us
    • YCSC QnA Dialogue
    • Translate Articles
  • Contact Yakṣas
  • Press Release
    • NCSAM 2015 Champion
    • STOP. THINK. CONNECT. Partner

Contact Yakṣas

    Name:*

    Email:*

    Phone:*

    Subject:*

    How can we help you?:*

    What does it say below?*
    captcha

    Optin Form

    Search

    Follow us on Twitter

    My Tweets

    Categories

    Tags

    Active directory Active directory lab adsecurity adsi adsisearcher Android attack active directory awareness blue whale challenge Certification CISSP command and control crte crtp cyber-warfare Cyber Security Cybersecurity books Cybersecurity Cannon domain enumeration Edward Snowden ellitedevs forest enumeration hacker Information Security ISACA Kali Linux Mass Surveillance Mobile Security Narendra Modi NSA offensive security Online Safety Password Penetration Testing pentest poshc2 powersploit Powerview privacy red team Risk Management Social Media user enumeration Wifi Windows

    Top Posts

    • Mona.py for exploit devs: 6 must know commands
      Mona.py for exploit devs: 6 must know commands
    • Web App Pentesting using BodgeIt Store (Part 1)
      Web App Pentesting using BodgeIt Store (Part 1)
    • Are you sharing sensitive information over WhatsApp?
      Are you sharing sensitive information over WhatsApp?
    • Active Directory User Enumeration using PowerView
      Active Directory User Enumeration using PowerView
    • Social-Engineer Toolkit: An Introduction
      Social-Engineer Toolkit: An Introduction
    • PoshC2: A Red Teamer's Notes
      PoshC2: A Red Teamer's Notes

    © Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress