• Reverse Engineering: Python Coding at MIT

    As many reverse engineers, malware analysts and security researchers know, the Python language is among one of the best languages to develop exploits under. While some researchers prefer C and in some cases Perl, Python is my personal favorite.

    As I got into reverse engineering and security research, one of…

    Read more →
  • Tiger Team Hacking

    Tiger Team is a term often used to describe a specialized group tasked with testing the effectiveness of an organization's ability to protect its assets, by attempting to circumvent, defeat, or otherwise thwart that organization's internal and external security.

    The term Tiger Team or Tiger Team Hacking became popular in…

    Read more →
  • Nmap 5.21 Released

    For those that may not know, Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available…

    Read more →
  • Contact Us

    Please contact RedTeam Security regarding your next information security project!

    Contact us
  • Ethical Hacking

    We save your business reputation and money by simulating real-world hacker attempts in order to identify security vulnerabilities before they are exploited.

    Contact us
  • Experienced Consultants

    RedTeam consultants are highly-skilled, experienced and certified experts. Our certifications include: CISSP, CEH, CHFI, CCISO, CASS, CEPT and others.

    Contact us