Attacks on Active Directory Certificate Services (AD CS) Explained – CypherCon 2024 Follow-up by admin | Oct 8, 2024 | #_shelIntel, Blogread more
Creating a Rootkit to Inject into a Protected Process and Dump LSASS by admin | Sep 11, 2023 | #_shelIntel, Blogread more
DEF CON 31 and Building A Wi-Fi Deauthentication Detector by admin | Sep 5, 2023 | #_shelIntel, Blog, Password Cracking, Penetration Testingread more
Rotating Your Pentesting Vendor Is A Mistake! by Brian Judd | Aug 30, 2023 | #_shelIntel, Blog, Penetration Testingread more
Executing Shellcode with Rust, AES-256, and a Gnome Photo by Alex Philiotis | Apr 5, 2023 | #_shelIntel, Blogread more
Scheduled Tasks With Lucee: Abusing Built In Functionality For Command Execution by Alex Philiotis | Mar 6, 2023 | #_shelIntel, Blogread more
What Does Chat GPT Think About Password Hash Assessments? by Brian Judd | Dec 27, 2022 | #_shelIntel, Blogread more
Password Hash Cracking with the NVIDIA RTX 4090 by Brian Judd | Nov 1, 2022 | #_shelIntel, Blogread more
Time to Upgrade from Outdated Managed Vulnerability Scanning to Continuous Attack Surface Management by Brian Judd | Jan 22, 2021 | #_shelIntel, Blog, Cloud Security, Security Operations, Vulnerability Managementread more
In Scope or Out of Scope? by SynerComm | Dec 24, 2020 | #_shelIntel, Blog, Cloud Security, Penetration Testingread more