Real world offensive techniques
- Discovery and exploitation of new vulnerabilities
- Complex network and application attack chains
- Detection evasion and control bypass techniques
- Defensive takeaways that help blue teams respond
Offensive security research, exploit development, adversary simulation and real-world operations experience from the penetration testers and red teamers on SynerComm’s AssureIT team.
We break things, learn from the results, and share what matters with the offensive security community.
Expect hands-on research, real attack paths, working code samples and practical lessons from live penetration tests, red team operations, adversary simulations and security assessments.
Long before “adversary simulation” became a service offering, a small group of hackers inside SynerComm started publishing their research under a simple tag, #_shellntel.
"In 2014 an elite hacking unit was sent to prison by a military court for a crime they didn't commit. These men promptly escaped from the Cube Farm to a mid-western underground. Today, still wanted by the government, they survive as Security Professionals. If you have a problem, if no one else can help, and if you can find them, maybe you can hire the A-Team."
Over more than a decade, the AssureIT team has evolved from breaking classic 32 bit operating systems and buffer overflows into a group that regularly emulates modern ransomware actors, cloud aware adversaries and AI assisted attackers.
Technology stacks changed, clients changed, the scale of our work changed. One thing did not.
We use real offensive techniques to improve real defenses, then we share what we learn with the community.
Today we deliver advanced red team operations, full scope adversary simulations, deep technical penetration tests and strategic security assessments for organizations that want a realistic view of their risk. The blog captures that work in a form the community can reuse.
Interested in who writes our research? Meet the current contributors on our Authors page.
View #_shellntel AuthorsBrowse years of research, tools and writeups, then follow along as we continue to track new platforms, new adversaries and new ways that attackers abuse technology.