#_shellntel Cybersecurity Blog logo
#_shellntel Cybersecurity Blog
Subscribe
  • #_shellntel Cybersecurity Blog
  • Archive
  • Page 2

#_shellntel – Offensive Security Stories, Tools & Tactics

Building a Bjorn
Feb 11, 2025

Building a Bjorn

Learn How to Build, Configure, and Connect to a Raspberry Pi Zero 2 Based Network Scanning and Offensive Security Tool

Ryan Zagrodnik
Ryan Zagrodnik
Breaking Into Penetration Testing
Feb 04, 2025

Breaking Into Penetration Testing

Hunter Petty
Hunter Petty
Substring Analysis
Jan 30, 2025

Substring Analysis

Uncovering Systematic Password Weaknesses

Brian Judd
Brian Judd
Hash Master 1000
Jan 22, 2025

Hash Master 1000

A Modern Password Analysis Tool

Brian Judd
Brian Judd
Executing Shellcode via Bluetooth Device Authentication
Jan 13, 2025

Executing Shellcode via Bluetooth Device Authentication

Dylan Reuter
Dylan Reuter
Evading Microsoft Defender
Jul 30, 2024

Evading Microsoft Defender

by Embedding Lua into Rust

Dylan Reuter
Dylan Reuter
Attacks on Active Directory Certificate Services (AD CS) Explained – CypherCon 2024 Follow-up
Mar 17, 2024

Attacks on Active Directory Certificate Services (AD CS) Explained – CypherCon 2024 Follow-up

Ryan Zagrodnik
Ryan Zagrodnik
Exploring Initial Access Methods #01
Feb 12, 2024

Exploring Initial Access Methods #01

Shortcuts and Tunnels to the Kingdom

Fabrizio S
Fabrizio S
Spoofing Command Line Arguments to Dump LSASS in Rust
Dec 15, 2023

Spoofing Command Line Arguments to Dump LSASS in Rust

Dylan Reuter
Dylan Reuter
Creating a Rootkit to Inject into a Protected Process and Dump LSASS
Sep 11, 2023

Creating a Rootkit to Inject into a Protected Process and Dump LSASS

Dylan Reuter
Dylan Reuter
DEF CON 31 and Building A Wi-Fi Deauthentication Detector
Sep 05, 2023

DEF CON 31 and Building A Wi-Fi Deauthentication Detector

Ryan Zagrodnik
Ryan Zagrodnik
Fun with AD CS from Windows Command Line
Apr 17, 2023

Fun with AD CS from Windows Command Line

Dylan W.
Dylan W.
FirstBack
123456
Next Last
Shellntel shares expert penetration testing insights, tools, and strategies to help you strengthen your cybersecurity defenses.

#_shellntel Cybersecurity Blog

Shellntel shares expert penetration testing insights, tools, and strategies to help you strengthen your cybersecurity defenses.

Home

Posts

Authors

SynerComm Website

Adversary Simulation (AdSim)

Application Assessments

Penetration Testing

Continuous Penetration Testing

SynerComm Website

© 2025 SynerComm, Inc..

Privacy policy

Terms of use