JayHillSliver 2/4🐍By reading this you accept that I do not accept responsibility for how you use of this guide / tool and it should only be used for…Nov 6, 2022Nov 6, 2022
JayHillHow to build a NextJS app Built & Deployed Using Google SSO, & AWS AmplifyThis is a customized authentication flow using, tailwinds CSS AWS amplify, Next.js and Amazon Cognito for our authenticationOct 3, 2022Oct 3, 2022
JayHillKringle Con 4 SANS Holiday HackAfter registering you are brought to the staging area where you are introduced to your character. Click the elf he will get you oriented…Jan 11, 2022Jan 11, 2022
JayHillEvilginx2 x GoPhish to hunt for 2fa / mfa passwords & Cookies using AWS & GodaddyThis is a walk through on how to setup Evilginx2 on an AWS server in order to use it with gophish to steal cookies during phishing attacks.Jan 6, 2022Jan 6, 2022
JayHillHow to setup GoPhish Phishing server on AWSFirst I will show you how to setup an AWS instance in order to setup and configure Gophish phishing open source software.Dec 30, 2021Dec 30, 2021
JayHillUsing Ganache x Remix IdeGanache allows you to fire up a personal Ethereum blockchain which you can use to run tests, execute commands, and inspect state while…Nov 26, 2021Nov 26, 2021
JayHillAdversarial Tradecraft Cyber SecurityI had the opportunity to read Adversarial Tradecraft in cyber security who is written by Dan Borges. The author of the book is a friend and…Nov 19, 2021Nov 19, 2021
JayHillHow to install a Cardano staking pool in an AWS EC2 InstanceWe will be setting up a cardano staking pool utilizing amazon web services.May 21, 20211May 21, 20211
JayHillSecuring website hosted on AWS tutorial from HTTP to HTTPSSecuring website hosted on AWS tutorial from HTTP to HTTPSOct 19, 2020Oct 19, 2020