#_shellntel Blog logo
#_shellntel Blog
Subscribe
  • #_shellntel Blog
  • Topics
  • Tools

Tools

Tools and Scripts

BackdoorsProgrammingdropboxValidationScrapingRaspberry PiCrackingPhysical PentestLSASSActive DirectoryPost-ExploitationScopeScanningAD CSTapEC2AWSToolsInitial AccessBrowser HackingLearnCybersecurityWeb AppProxy CannonOffensive SecurityRootkitAV BypassPwnagotchiDroneRustEscalationVPNReportingWireguardWi-FiCredit Card FraudSnifferPowershellCons
Post-ExploitationPost-Exploitation
+2+2
Into The Belly Of The Beast
Mar 31, 2025

Into The Belly Of The Beast

Browser Session and Cookie Extraction Over WebSocket With Chrome DevTools Protocol

Fabrizio S
Fabrizio S
ProgrammingProgramming
+1+1
Improving XOR Encryption in Zig
Mar 05, 2025

Improving XOR Encryption in Zig

Dylan Reuter
Dylan Reuter
CrackingCracking
+1+1
Hash Master 1000
Jan 22, 2025

Hash Master 1000

A Modern Password Analysis Tool

Brian Judd
Brian Judd
LSASSLSASS
+3+3
Spoofing Command Line Arguments to Dump LSASS in Rust
Dec 15, 2023

Spoofing Command Line Arguments to Dump LSASS in Rust

Dylan Reuter
Dylan Reuter
LSASSLSASS
+2+2
Using API Hooking to Dump LSASS with Task Manager Undetected
Apr 10, 2023

Using API Hooking to Dump LSASS with Task Manager Undetected

Dylan Reuter
Dylan Reuter
Research, tools, and tales

#_shellntel Blog

Research, tools, and tales

Home

Posts

Authors

SynerComm Website

Adversary Simulation (AdSim)

Application Assessments

Penetration Testing

Continuous Penetration Testing

SynerComm Website

© 2025 SynerComm, Inc..

Privacy policy

Terms of use