#_shellntel Cybersecurity Blog logo
#_shellntel Cybersecurity Blog
Subscribe
  • #_shellntel Cybersecurity Blog
  • Archive
  • Page 3

#_shellntel – Offensive Security Stories, Tools & Tactics

Exploring Initial Access Methods #01
Feb 12, 2024

Exploring Initial Access Methods #01

Shortcuts and Tunnels to the Kingdom

Fabrizio S
Fabrizio S
Spoofing Command Line Arguments to Dump LSASS in Rust
Dec 15, 2023

Spoofing Command Line Arguments to Dump LSASS in Rust

Dylan Reuter
Dylan Reuter
Creating a Rootkit to Inject into a Protected Process and Dump LSASS
Sep 11, 2023

Creating a Rootkit to Inject into a Protected Process and Dump LSASS

Dylan Reuter
Dylan Reuter
DEF CON 31 and Building A Wi-Fi Deauthentication Detector
Sep 05, 2023

DEF CON 31 and Building A Wi-Fi Deauthentication Detector

Ryan Zagrodnik
Ryan Zagrodnik
Fun with AD CS from Windows Command Line
Apr 17, 2023

Fun with AD CS from Windows Command Line

Dylan W.
Dylan W.
Using API Hooking to Dump LSASS with Task Manager Undetected
Apr 10, 2023

Using API Hooking to Dump LSASS with Task Manager Undetected

Dylan Reuter
Dylan Reuter
Executing Shellcode with Rust, AES-256, and a Gnome Photo
Apr 05, 2023

Executing Shellcode with Rust, AES-256, and a Gnome Photo

Alex Philiotis
Alex Philiotis
Scheduled Tasks With Lucee: Abusing Built In Functionality For Command Execution
Mar 06, 2023

Scheduled Tasks With Lucee: Abusing Built In Functionality For Command Execution

Alex Philiotis
Alex Philiotis
Password Hash Cracking with the NVIDIA RTX 4090
Nov 01, 2022

Password Hash Cracking with the NVIDIA RTX 4090

Brian Judd
Brian Judd
Build a Cheap Gigabit Network Tap
May 23, 2022

Build a Cheap Gigabit Network Tap

Netgear GS308E

Brian Judd
Brian Judd
In Scope or Out of Scope?
Dec 23, 2020

In Scope or Out of Scope?

Brian Judd
Brian Judd
Building a Pwnagotchi
May 15, 2020

Building a Pwnagotchi

Ryan Zagrodnik
Ryan Zagrodnik
FirstBack
123456
Next Last
Shellntel shares expert penetration testing insights, tools, and strategies to help you strengthen your cybersecurity defenses.

#_shellntel Cybersecurity Blog

Shellntel shares expert penetration testing insights, tools, and strategies to help you strengthen your cybersecurity defenses.

Home

Posts

Authors

SynerComm Website

Adversary Simulation (AdSim)

Application Assessments

Penetration Testing

Continuous Penetration Testing

SynerComm Website

© 2026 SynerComm, Inc..

Privacy policy

Terms of use