0:42FOXXCON May 2026 Highlights AI & Cloud Security Ft. Ayush & ShashiRedfox Security13 views·11 hours ago
6:16Serialization and Deserialization Practical Step-by-Step Exploitation ExplainedRedfox Security26 views·15 hours ago
19:44How Hackers Exploit Azure Environments Explained ft. Shashi & TarakRedfox Security64 views·3 days ago
1:58Black Hat USA 2026 Trainings by Shashi Prasad & Bharath Kumar Offensive AWS + Adversary TacticsRedfox Security217 views·6 days ago
3:07Authorization & Authentication Practical Real Demo of OAuth, JWT & Access ControlRedfox Security40 views·1 week ago
8:28Modern Authentication and Authorization Explained OAuth, JWT, SSO Made SimpleRedfox Security63 views·1 week ago
6:45This One Web Bug Can Force Actions Without a Password CSRF ExplainedRedfox Security81 views·3 weeks ago
8:26SQL Injection Practical - Real SQLi Exploitation for Real Ethical HackersRedfox Security102 views·3 weeks ago
10:21SQL Injection Explained in 10 Minutes! Hack Any Database (Beginner to Advanced)Redfox Security159 views·3 weeks ago
6:063 Types of XSS That Hackers STILL Use to Own Websites (You’re Not Ready)Redfox Security75 views·4 weeks ago
1:37Break Azure Like a Hacker Azure Pentesting Bootcamp by Shashi & TarakRedfox Security53 views·4 weeks ago
1:02FOXXCON April 2026 Highlights Utpal & Sanket AI Agents & Offensive WorkflowRedfox Security18 views·1 month ago