JayHillSliver 2/4🐍By reading this you accept that I do not accept responsibility for how you use of this guide / tool and it should only be used for…·4 min read·Nov 6, 2022----
JayHillHow to build a NextJS app Built & Deployed Using Google SSO, & AWS AmplifyThis is a customized authentication flow using, tailwinds CSS AWS amplify, Next.js and Amazon Cognito for our authentication·4 min read·Oct 3, 2022----
JayHillKringle Con 4 SANS Holiday HackAfter registering you are brought to the staging area where you are introduced to your character. Click the elf he will get you oriented…·2 min read·Jan 11, 2022----
JayHillEvilginx2 x GoPhish to hunt for 2fa / mfa passwords & Cookies using AWS & GodaddyThis is a walk through on how to setup Evilginx2 on an AWS server in order to use it with gophish to steal cookies during phishing attacks.·5 min read·Jan 6, 2022----
JayHillHow to setup GoPhish Phishing server on AWSFirst I will show you how to setup an AWS instance in order to setup and configure Gophish phishing open source software.·4 min read·Dec 30, 2021----
JayHillUsing Ganache x Remix IdeGanache allows you to fire up a personal Ethereum blockchain which you can use to run tests, execute commands, and inspect state while…·2 min read·Nov 26, 2021----
JayHillAdversarial Tradecraft Cyber SecurityI had the opportunity to read Adversarial Tradecraft in cyber security who is written by Dan Borges. The author of the book is a friend and…4 min read·Nov 19, 2021----
JayHillHow to install a Cardano staking pool in an AWS EC2 InstanceWe will be setting up a cardano staking pool utilizing amazon web services.·3 min read·May 21, 2021--1--1
JayHillSecuring website hosted on AWS tutorial from HTTP to HTTPSSecuring website hosted on AWS tutorial from HTTP to HTTPS·2 min read·Oct 19, 2020----