#_shellntel Blog logo
#_shellntel Blog
Subscribe
  • #_shellntel Blog
  • Topics
  • Powershell

Powershell

Powershell

BackdoorsProgrammingdropboxValidationScrapingRaspberry PiCrackingPhysical PentestLSASSActive DirectoryPost-ExploitationScopeScanningAD CSTapEC2AWSToolsInitial AccessBrowser HackingLearnCybersecurityWeb AppProxy CannonOffensive SecurityRootkitAV BypassPwnagotchiDroneRustEscalationVPNReportingWireguardWi-FiCredit Card FraudSnifferPowershellCons
Initial AccessInitial Access
+1+1
Exploring Initial Access Methods #01
Feb 12, 2024

Exploring Initial Access Methods #01

Shortcuts and Tunnels to the Kingdom

Fabrizio S
Fabrizio S
PowershellPowershell
Thoughts on Blocking PowerShell.exe
Mar 17, 2017

Thoughts on Blocking PowerShell.exe

Jason Lang
Jason Lang
PowershellPowershell
Luckystrike
Sep 23, 2016

Luckystrike

An Evil Office Document Generator

Jason Lang
Jason Lang
ScrapingScraping
+1+1
PowerShell Memory Scraping for Credit Cards
Sep 18, 2015

PowerShell Memory Scraping for Credit Cards

Casey Cammilleri
Casey Cammilleri
PowershellPowershell
Using PowerShell & Unicorn to Get Persistence
Jul 27, 2015

Using PowerShell & Unicorn to Get Persistence

Jason Lang
Jason Lang
PowershellPowershell
Qualys Scanner API In Powershell
Jun 12, 2015

Qualys Scanner API In Powershell

Including External Ticket Creation

Scot Berner
Scot Berner
Research, tools, and tales

#_shellntel Blog

Research, tools, and tales

Home

Posts

Authors

SynerComm Website

Adversary Simulation (AdSim)

Application Assessments

Penetration Testing

Continuous Penetration Testing

SynerComm Website

© 2025 SynerComm, Inc..

Privacy policy

Terms of use