#_shellntel Cybersecurity Blog logo
#_shellntel Cybersecurity Blog
Subscribe
  • #_shellntel Cybersecurity Blog
  • Archive
  • Page 2

#_shellntel – Offensive Security Stories, Tools & Tactics

Subscription Bombing
Apr 28, 2025

Subscription Bombing

The Five Stages of Coping

Brian Judd
Brian Judd
Into The Belly Of The Beast
Mar 31, 2025

Into The Belly Of The Beast

Browser Session and Cookie Extraction Over WebSocket With Chrome DevTools Protocol

Fabrizio S
Fabrizio S
Improving XOR Encryption in Zig
Mar 05, 2025

Improving XOR Encryption in Zig

Dylan Reuter
Dylan Reuter
Using RPC Filters to Protect Against Coercion Attacks
Feb 25, 2025

Using RPC Filters to Protect Against Coercion Attacks

Isaac Trzebiatowski
Isaac Trzebiatowski
Building a Raspberry Pi Dropbox
Feb 21, 2025

Building a Raspberry Pi Dropbox

Chad Finkenbiner
Chad Finkenbiner
Building a Bjorn
Feb 11, 2025

Building a Bjorn

Learn How to Build, Configure, and Connect to a Raspberry Pi Zero 2 Based Network Scanning and Offensive Security Tool

Ryan Zagrodnik
Ryan Zagrodnik
Breaking Into Penetration Testing
Feb 04, 2025

Breaking Into Penetration Testing

Hunter Petty
Hunter Petty
Substring Analysis
Jan 30, 2025

Substring Analysis

Uncovering Systematic Password Weaknesses

Brian Judd
Brian Judd
Hash Master 1000
Jan 22, 2025

Hash Master 1000

A Modern Password Analysis Tool

Brian Judd
Brian Judd
Executing Shellcode via Bluetooth Device Authentication
Jan 13, 2025

Executing Shellcode via Bluetooth Device Authentication

Dylan Reuter
Dylan Reuter
Evading Microsoft Defender
Jul 30, 2024

Evading Microsoft Defender

by Embedding Lua into Rust

Dylan Reuter
Dylan Reuter
Attacks on Active Directory Certificate Services (AD CS) Explained – CypherCon 2024 Follow-up
Mar 17, 2024

Attacks on Active Directory Certificate Services (AD CS) Explained – CypherCon 2024 Follow-up

Ryan Zagrodnik
Ryan Zagrodnik
FirstBack
123456
Next Last
Shellntel shares expert penetration testing insights, tools, and strategies to help you strengthen your cybersecurity defenses.

#_shellntel Cybersecurity Blog

Shellntel shares expert penetration testing insights, tools, and strategies to help you strengthen your cybersecurity defenses.

Home

Posts

Authors

SynerComm Website

Adversary Simulation (AdSim)

Application Assessments

Penetration Testing

Continuous Penetration Testing

SynerComm Website

© 2026 SynerComm, Inc..

Privacy policy

Terms of use