Homepage
Open in app
Sign in
Get started
Axon Technologies
• Your Cybersecurity Partner • Protecting organizations in a digitally connected 🌍 • 📍 UAE | UK | Lebanon
Who We Are
Website
Follow
How to Implement Pivoting and Relaying Techniques Using Meterpreter
How to Implement Pivoting and Relaying Techniques Using Meterpreter
Introduction
Abed Samhuri
Jan 5, 2021
Hosting Anonymous Website on Tor Network
Hosting Anonymous Website on Tor Network
Introduction: Clearnet vs. Darknet
Abed Samhuri
Aug 24, 2020
Installing a Windows Virtual Machine in a Linux Docker Container
Installing a Windows Virtual Machine in a Linux Docker Container
A Step-by-Step Guide to Containerizing a Windows Virtual Machine — with RDP Access — on a Linux Docker Platform with KVM Hypervisor
Abed Samhuri
Jul 19, 2020
Secure the Code, Prevent the Breach
Secure the Code, Prevent the Breach
Why secure development is important, and how to adopt it.
Antoun Beyrouthy
Jun 12, 2020
Finding Cyber Security Opportunities in Crisis. How Business Leaders Can Prepare Right Now
Finding Cyber Security Opportunities in Crisis. How Business Leaders Can Prepare Right Now
During this time of unprecedented uncertainty, everyone at Axon Technologies is thinking about those who have been affected personally and…
Hadi Hosn
Jun 8, 2020
AMSI Evasion And LSASS Patch Bypassing To Extract Clear-Text Credentials With Mimikatz
AMSI Evasion And LSASS Patch Bypassing To Extract Clear-Text Credentials With Mimikatz
Utilizing Mimikatz for Advanced Post-Exploitation Lateral Movement and Persistence Attacks
Ali Salah
May 21, 2020
The Basics of Cyber Threat Hunting
The Basics of Cyber Threat Hunting
The ever-increasing cyber threat landscape is constantly on the offensive, incessantly looking for new victims to terrorize. Whether it is…
Wafic Daya
May 11, 2020
5 Things to Look for When Buying a SOC as a Service
5 Things to Look for When Buying a SOC as a Service
It is evident now that the approach to cybersecurity is shifting from preventive to proactive.
Abed Samhuri
Apr 28, 2020
Securing the Work-from-Home Arrangement
Securing the Work-from-Home Arrangement
While working remotely might seem like a practical arrangement, it brings with it major security challenges to your organization.
Antoun Beyrouthy
Apr 14, 2020
Collaboration of the arch rivals
Collaboration of the arch rivals
I recently spent some time reviewing the detail behind Apple and Google docs on the new contact tracing protocol and APIs they are both…
Hadi Hosn
Apr 13, 2020
About Axon Technologies
Latest Stories
Archive
About Medium
Terms
Privacy
Teams