#_shellntel Blog logo
#_shellntel Blog
Subscribe
  • #_shellntel Blog
  • Archive
  • Page -37
Building a Meshtastic Node
May 07, 2025

Building a Meshtastic Node

Encrypted Messaging for the Apocalypse (or Your Next Camping Trip)

Ryan Zagrodnik
Ryan Zagrodnik
Credit Card FraudCredit Card Fraud
Subscription Bombing
Apr 28, 2025

Subscription Bombing

The Five Stages of Coping

Brian Judd
Brian Judd
Post-ExploitationPost-Exploitation
+2+2
Into The Belly Of The Beast
Mar 31, 2025

Into The Belly Of The Beast

Browser Session and Cookie Extraction Over WebSocket With Chrome DevTools Protocol

Fabrizio S
Fabrizio S
ProgrammingProgramming
+1+1
Improving XOR Encryption in Zig
Mar 05, 2025

Improving XOR Encryption in Zig

Dylan Reuter
Dylan Reuter
Using RPC Filters to Protect Against Coercion Attacks
Feb 25, 2025

Using RPC Filters to Protect Against Coercion Attacks

Isaac Trzebiatowski
Isaac Trzebiatowski
dropboxdropbox
+5+5
Building a Raspberry Pi Dropbox
Feb 21, 2025

Building a Raspberry Pi Dropbox

Chad Finkenbiner
Chad Finkenbiner
Building a Bjorn
Feb 11, 2025

Building a Bjorn

Learn How to Build, Configure, and Connect to a Raspberry Pi Zero 2 Based Network Scanning and Offensive Security Tool

Ryan Zagrodnik
Ryan Zagrodnik
LearnCybersecurityLearnCybersecurity
Breaking Into Penetration Testing
Feb 04, 2025

Breaking Into Penetration Testing

Hunter Petty
Hunter Petty
CrackingCracking
Substring Analysis
Jan 30, 2025

Substring Analysis

Uncovering Systematic Password Weaknesses

Brian Judd
Brian Judd
CrackingCracking
+1+1
Hash Master 1000
Jan 22, 2025

Hash Master 1000

A Modern Password Analysis Tool

Brian Judd
Brian Judd
Executing Shellcode via Bluetooth Device Authentication
Jan 13, 2025

Executing Shellcode via Bluetooth Device Authentication

Dylan Reuter
Dylan Reuter
Evading Microsoft Defender
Jul 30, 2024

Evading Microsoft Defender

by Embedding Lua into Rust

Dylan Reuter
Dylan Reuter
FirstBack
12345
Next Last
Research, tools, and tales

#_shellntel Blog

Research, tools, and tales

Home

Posts

Authors

SynerComm Website

Adversary Simulation (AdSim)

Application Assessments

Penetration Testing

Continuous Penetration Testing

SynerComm Website

© 2025 SynerComm, Inc..

Privacy Policy

Terms of Use