NBNS still works!
Learn how to create a metasploit module
Introductory methods for DNS reconnaissance.
Notes from BSides DC 2013
Techniques for performing subdomain enumeration information gathering.
Customize your working environment to your liking
Methods for obtaining reverse shells
An exploration of the ps command
Tips picked up from a red/blue infosec conference
How to determine Powershell environment variables