#_shellntel Blog logo
#_shellntel Blog
Subscribe
  • #_shellntel Blog
  • Archive
  • Page 3
Executing Shellcode with Rust, AES-256, and a Gnome Photo
Apr 05, 2023

Executing Shellcode with Rust, AES-256, and a Gnome Photo

Alex Philiotis
Alex Philiotis
Scheduled Tasks With Lucee: Abusing Built In Functionality For Command Execution
Mar 06, 2023

Scheduled Tasks With Lucee: Abusing Built In Functionality For Command Execution

Alex Philiotis
Alex Philiotis
Password Hash Cracking with the NVIDIA RTX 4090
Nov 01, 2022

Password Hash Cracking with the NVIDIA RTX 4090

Brian Judd
Brian Judd
Build a Cheap Gigabit Network Tap
May 23, 2022

Build a Cheap Gigabit Network Tap

Netgear GS308E

Brian Judd
Brian Judd
In Scope or Out of Scope?
Dec 23, 2020

In Scope or Out of Scope?

Brian Judd
Brian Judd
Building a Pwnagotchi
May 15, 2020

Building a Pwnagotchi

Ryan Zagrodnik
Ryan Zagrodnik
Stop Sharing Your Password with Everyone
Jan 05, 2020

Stop Sharing Your Password with Everyone

Risks of Palo Alto’s User-ID Client Probing

Brian Judd
Lisa Niles
Brian Judd, +1
AWS Metadata Endpoint
Aug 27, 2019

AWS Metadata Endpoint

How to Not Get Pwned like Capital One

Justin Gardner
Justin Gardner
Why 14 Characters?
May 16, 2019

Why 14 Characters?

Brian Judd
Chad Finkenbiner
Brian Judd, +1
How to Build a (2nd) 8 GPU Password Cracker
Feb 20, 2019

How to Build a (2nd) 8 GPU Password Cracker

Brian Judd
Brian Judd
DA 101
Oct 22, 2018

DA 101

Protecting your Domain Admin Account

Justin Gardner
Justin Gardner
OpenSSH < 7.7 - Username Enumeration Exploit
Oct 21, 2018

OpenSSH < 7.7 - Username Enumeration Exploit

Justin Gardner
Justin Gardner
FirstBack
123456
Next Last
Research, tools, and tales from the shellntel team...

#_shellntel Blog

Research, tools, and tales from the shellntel team...

Home

Posts

Authors

SynerComm Website

Adversary Simulation (AdSim)

Application Assessments

Penetration Testing

Continuous Penetration Testing

SynerComm Website

© 2025 SynerComm, Inc..

Privacy policy

Terms of use