NoVNC and Browser In The Browser Phishing attack POC/Explained
Combining two advanced phishing techniques
A Cyber Security Blog.
Combining two advanced phishing techniques
Browser In The Browser (BITB) phishing attacks are less common but very effective when used. They’re hard to identify and easy to setup!
Tor is used for browsing the internet anonymously, I setup a middle relay to assist with this!
Honeypot project to gain an insight on how many attacks happen, which countries and what services.
The new RCE Microsoft Office exploit in action!
A guide for users/admins to connect to their Office 365 environment with Powershell.
How to deploy AutoElevate via Intune using Endpoint manager
My first time using BurpSuite Intercept and I found a vulnerability which allows me to change the price of items and checkout.
How to create a DSR Case within Office 365