#_shellntel Cybersecurity Blog logo
#_shellntel Cybersecurity Blog
Subscribe
  • #_shellntel Cybersecurity Blog
  • Archive
  • Page 5

#_shellntel – Offensive Security Stories, Tools & Tactics

Weaponizing Nessus
Jun 08, 2016

Weaponizing Nessus

Jason Lang
Jason Lang
Update to ProxyCannon
May 25, 2016

Update to ProxyCannon

Hans Laken
Hans Laken
VPN over DNS
May 12, 2016

VPN over DNS

Hans Laken
Hans Laken
Websocket Based Egress Buster
Feb 22, 2016

Websocket Based Egress Buster

Scot Berner
Scot Berner
Abusing Exchange Web Service
Feb 19, 2016

Abusing Exchange Web Service

Part 1

Scot Berner
Scot Berner
Why Security Awareness Training Fails
Feb 08, 2016

Why Security Awareness Training Fails

Jason Lang
Jason Lang
Assisted directory brute forcing
Oct 06, 2015

Assisted directory brute forcing

Scot Berner
Scot Berner
crEAP
Oct 01, 2015

crEAP

Harvesting Users on Enterprise Wireless Networks

Travis Kaun
Travis Kaun
Creating your own private botnet for scanning
Sep 26, 2015

Creating your own private botnet for scanning

[UPDATE]

Hans Laken
Hans Laken
Drone Code Execution
Sep 25, 2015

Drone Code Execution

(Part 1)

Casey Cammilleri
Casey Cammilleri
PowerShell Memory Scraping for Credit Cards
Sep 18, 2015

PowerShell Memory Scraping for Credit Cards

Casey Cammilleri
Casey Cammilleri
Intro To Active Directory Delegation
Sep 09, 2015

Intro To Active Directory Delegation

Jason Lang
Jason Lang
FirstBack
123456
Next Last
Shellntel shares expert penetration testing insights, tools, and strategies to help you strengthen your cybersecurity defenses.

#_shellntel Cybersecurity Blog

Shellntel shares expert penetration testing insights, tools, and strategies to help you strengthen your cybersecurity defenses.

Home

Posts

Authors

SynerComm Website

Adversary Simulation (AdSim)

Application Assessments

Penetration Testing

Continuous Penetration Testing

SynerComm Website

© 2026 SynerComm, Inc..

Privacy policy

Terms of use