Skip to content

Bleekseeks

A Cyber Security Blog.

  • LinkedIn
  • Twitter / X
Best Trending Topics
Evilginx – Bypassing MFA, phishing is back on the menu
How to protect against modern phishing attacks like Evilginx
How malicious actors can easily impersonate your voice
NoVNC and Browser In The Browser Phishing attack POC/Explained
Posted inBlog

NoVNC and Browser In The Browser Phishing attack POC/Explained

Combining two advanced phishing techniques

Read More
December 19, 2022
Browser In The Browser (BITB) Attack – POC
Posted inBlog

Browser In The Browser (BITB) Attack – POC

Browser In The Browser (BITB) phishing attacks are less common but very effective when used. They’re hard to identify and easy to setup!

Read More
October 13, 2022
Project – Tor Middle Relay
Posted inBlog

Project – Tor Middle Relay

Tor is used for browsing the internet anonymously, I setup a middle relay to assist with this!

Read More
July 7, 2022
Project – Honey Pot
Posted inBlog

Project – Honey Pot

Honeypot project to gain an insight on how many attacks happen, which countries and what services.

Read More
July 7, 2022
Project – OVH Lab Environment
Posted inBlog

Project – OVH Lab Environment

Where it all begins - a test environment

Read More
July 7, 2022
Follina – Proof Of Concept – CVE-2022-30190
Posted inmicrosoft rce vuln

Follina – Proof Of Concept – CVE-2022-30190

The new RCE Microsoft Office exploit in action!

Read More
June 7, 2022
How to connect to your Office 365 Tenant via Powershell
Posted inHow-to Powershell

How to connect to your Office 365 Tenant via Powershell

A guide for users/admins to connect to their Office 365 environment with Powershell.

Read More
January 13, 2022
How to deploy AutoElevate via Azure/Intune
Posted inBlog

How to deploy AutoElevate via Azure/Intune

How to deploy AutoElevate via Intune using Endpoint manager

Read More
November 18, 2021
My first BurpSuite Vulnerability using Intercept
Posted inBlog

My first BurpSuite Vulnerability using Intercept

My first time using BurpSuite Intercept and I found a vulnerability which allows me to change the price of items and checkout.

Read More
November 12, 2021
O365 – How to create Data Subject Request for GDPR
Posted inBlog

O365 – How to create Data Subject Request for GDPR

How to create a DSR Case within Office 365

Read More
June 11, 2021

Posts pagination

Previous page 1 2 3 Next page
Scroll to Top