#_shellntel Blog logo
#_shellntel Blog
Subscribe
  • #_shellntel Blog
  • Topics

BackdoorsProgrammingdropboxValidationScrapingRaspberry PiCrackingPhysical PentestLSASSActive DirectoryPost-ExploitationScopeScanningAD CSTapEC2AWSToolsInitial AccessBrowser HackingLearnCybersecurityWeb AppProxy CannonOffensive SecurityRootkitAV BypassPwnagotchiDroneRustEscalationVPNReportingWireguardWi-FiCredit Card FraudSnifferPowershellCons
dropboxdropbox
+5+5
Building a Raspberry Pi Dropbox
Feb 21, 2025

Building a Raspberry Pi Dropbox

Chad Finkenbiner
Chad Finkenbiner
Wi-FiWi-Fi
+1+1
DEF CON 31 and Building A Wi-Fi Deauthentication Detector
Sep 05, 2023

DEF CON 31 and Building A Wi-Fi Deauthentication Detector

Ryan Zagrodnik
Ryan Zagrodnik
Initial AccessInitial Access
+2+2
Building a Pwnagotchi
May 15, 2020

Building a Pwnagotchi

Ryan Zagrodnik
Ryan Zagrodnik
Wi-FiWi-Fi
crEAP
Oct 01, 2015

crEAP

Harvesting Users on Enterprise Wireless Networks

Travis Kaun
Travis Kaun
Research, tools, and tales

#_shellntel Blog

Research, tools, and tales

Home

Posts

Authors

SynerComm Website

Adversary Simulation (AdSim)

Application Assessments

Penetration Testing

Continuous Penetration Testing

SynerComm Website

© 2025 SynerComm, Inc..

Privacy policy

Terms of use