Skip to navigation Skip to content Network IntelligenceNetwork Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Webinars
    • Whitepapers
    • Case Studies
    • Newsletters
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » pentesting

  1. Home
  2. Posts tagged “pentesting”

Tag: pentesting

Anti-Forensics Hacks Incident Response Malware Analysis Penetration Testing Research Security Testing

Malware on Steroids Part 3: Machine Learning & Sandbox Evasion

Hey, It’s been a busy month for me and I was not able to save time to write the final […]

17 May, 2025
2
Anti-Forensics Hacks Incident Response Malware Analysis Penetration Testing Security Testing

Malware on Steroids – Part 2: Evading Antivirus in a Simulated Organizational Environment

Recap In the previous post, we wrote a simple CMD Reverse Shell over TCP. However, in a real-life scenario, things […]

17 May, 2025
Malware on Steroids 1
Anti-Forensics Hacks Incident Response Malware Analysis Penetration Testing Security Testing

Malware on Steroids – Part 1: Simple CMD Reverse Shell

The Prologue This is my reposting of the blog series I wrote here at ScriptDotSh If you haven’t watched the […]

17 May, 2025
Fundamentals Hacks Research Tools Uncategorized

Malware development – Welcome to the Dark Side: Part 4

Welcome to the part 4 of malware development .In the previous parts 1, 2-1, 2-2 and 3, we created a […]

17 May, 2025
2
Fundamentals Hacks Malware Analysis Research Tools Uncategorized

Malware development – Welcome to the Dark Side: Part 2-2

  In the previous parts of this blog series, I introduced the concept of writing a full-undetectable malware and about […]

17 May, 2025
5
Fundamentals Hacks Malware Analysis Research Tools Uncategorized

Malware Development – Welcome to the Dark Side: Part 2-1

Welcome to the second part of the malware development blog series. Here’s the link to Part 1. Given the length […]

17 May, 2025
3
Fundamentals Hacks Malware Analysis Penetration Testing Research Security Testing Social Engineering Tools

Malware Development – Welcome to the Dark Side: Part 1

If you are in cybersecurity, especially Red Teaming, writing a full-undetectable (FUD) malware is a great skill to have. Folks […]

17 May, 2025
5
OSCP
Fundamentals Penetration Testing Uncategorized

A Detailed Guide on OSCP Preparation – From Newbie to OSCP

If you are a newbie in Penetration Testing and afraid of OSCP preparation, do not worry. Even I was once […]

17 May, 2025
67
Security Testing

The Mobile Pentesting Device: Birth of Anarchy

Part II: The Technicalities – Linux Kernels and chroots This is part 2 of building your own mobile pen-testing device. […]

17 May, 2025

Sidebar

Recent Posts

  • Best Security Audit Software to Ensure Compliance & Mitigate RiskJune 5, 2025
  • Red Team Tactics: How To Boost Your Cybersecurity SkillsJune 3, 2025
  • 90% Faster Security: How AI is Killing Alert Fatigue for GoodJune 2, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

AI-Driven Defense Cloud Computing Cloud Infrastructure Cloud Security cybersecurity Cyber Security hacking Penetration Testing

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube

Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework.  visualize, implement, sustain, and evolve your organization’s security posture.

Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Policies
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Policies
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@networkintelligence.ai

Subscribe To Our Newsletter

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top