#_shellntel Cybersecurity Blog logo
#_shellntel Cybersecurity Blog
Subscribe
  • #_shellntel Cybersecurity Blog
  • Archive
  • Page 2

#_shellntel – Offensive Security Stories, Tools & Tactics

Luai - An AI Malware Agent
Jun 06, 2025

Luai - An AI Malware Agent

On the fly code generation and execution

Dylan Reuter
Dylan Reuter
Building a Meshtastic Node
May 07, 2025

Building a Meshtastic Node

Encrypted Messaging for the Apocalypse (or Your Next Camping Trip)

Ryan Zagrodnik
Ryan Zagrodnik
Subscription Bombing
Apr 28, 2025

Subscription Bombing

The Five Stages of Coping

Brian Judd
Brian Judd
Into The Belly Of The Beast
Mar 31, 2025

Into The Belly Of The Beast

Browser Session and Cookie Extraction Over WebSocket With Chrome DevTools Protocol

Fabrizio S
Fabrizio S
Improving XOR Encryption in Zig
Mar 05, 2025

Improving XOR Encryption in Zig

Dylan Reuter
Dylan Reuter
Using RPC Filters to Protect Against Coercion Attacks
Feb 25, 2025

Using RPC Filters to Protect Against Coercion Attacks

Building a Raspberry Pi Dropbox
Feb 21, 2025

Building a Raspberry Pi Dropbox

Chad Finkenbiner
Chad Finkenbiner
Building a Bjorn
Feb 11, 2025

Building a Bjorn

Learn How to Build, Configure, and Connect to a Raspberry Pi Zero 2 Based Network Scanning and Offensive Security Tool

Ryan Zagrodnik
Ryan Zagrodnik
Breaking Into Penetration Testing
Feb 04, 2025

Breaking Into Penetration Testing

Hunter Petty
Hunter Petty
Substring Analysis
Jan 30, 2025

Substring Analysis

Uncovering Systematic Password Weaknesses

Brian Judd
Brian Judd
Hash Master 1000
Jan 22, 2025

Hash Master 1000

A Modern Password Analysis Tool

Brian Judd
Brian Judd
Executing Shellcode via Bluetooth Device Authentication
Jan 13, 2025

Executing Shellcode via Bluetooth Device Authentication

Dylan Reuter
Dylan Reuter
FirstBack
123456
Next Last
Shellntel shares expert penetration testing insights, tools, and strategies to help you strengthen your cybersecurity defenses.

#_shellntel Cybersecurity Blog

Shellntel shares expert penetration testing insights, tools, and strategies to help you strengthen your cybersecurity defenses.

Home

Posts

Authors

SynerComm Website

Purple Team Exercises

Application Assessments

Penetration Testing

Continuous Penetration Testing

SynerComm Website

© 2026 SynerComm, Inc..

Privacy policy

Terms of use