<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://www.hackpie.com/</id><title>Hackpie</title><subtitle>CTF Writeups, Red &amp; Blue Teaming Tools, Cyber security News and Exploit Development </subtitle> <updated>2025-07-27T07:30:17+00:00</updated> <author> <name>0xtmax</name> <uri>https://www.hackpie.com/</uri> </author><link rel="self" type="application/atom+xml" href="https://www.hackpie.com/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://www.hackpie.com/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2025 0xtmax </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>How to Build a CI/CD Pipeline with AWS CodePipeline , S3 and GitHub for React Apps</title><link href="https://www.hackpie.com/posts/How-to-Build-a-CICD-Pipeline-with-AWS-CodePipeline-S3-and-GitHub-for-React-Apps/" rel="alternate" type="text/html" title="How to Build a CI/CD Pipeline with AWS CodePipeline , S3 and GitHub for React Apps" /><published>2025-07-24T16:00:00+00:00</published> <updated>2025-07-27T07:29:52+00:00</updated> <id>https://www.hackpie.com/posts/How-to-Build-a-CICD-Pipeline-with-AWS-CodePipeline-S3-and-GitHub-for-React-Apps/</id> <content type="text/html" src="https://www.hackpie.com/posts/How-to-Build-a-CICD-Pipeline-with-AWS-CodePipeline-S3-and-GitHub-for-React-Apps/" /> <author> <name>0xtmax</name> </author> <category term="Cloud" /> <category term="AWS" /> <summary>Deploying applications manually can be time-consuming and prone to errors. As developers, we need a system that ensures our applications are built, tested, and deployed quickly and reliably—that’s where CI/CD comes in. In this blog, we will talk through the process of creating a fully automated CI/CD pipeline using GitHub, AWS CodePipeline, AWS Code Build and Amazon S3. By the end, you will ha...</summary> </entry> <entry><title>Building a Realistic Enterprise Level SOC LAB for Blue &amp; Red Teamers - Part 2</title><link href="https://www.hackpie.com/posts/Building_SOC_LAB_PART2/" rel="alternate" type="text/html" title="Building a Realistic Enterprise Level SOC LAB for Blue &amp;amp; Red Teamers - Part 2" /><published>2025-07-17T16:00:00+00:00</published> <updated>2025-07-18T04:47:49+00:00</updated> <id>https://www.hackpie.com/posts/Building_SOC_LAB_PART2/</id> <content type="text/html" src="https://www.hackpie.com/posts/Building_SOC_LAB_PART2/" /> <author> <name>0xtmax</name> </author> <category term="Projects" /> <category term="SOC" /> <summary>Network Segmentation, Security Configurations &amp;amp; pfSense Firewall Rules Hey again, folks! If you’ve followed along in part1, you’ve already seen how i kicked off my journey to build a real world inspired soc lab right from home — with a strong focus on Blue &amp;amp; Red team perspectives, Active Directory, Segmented Networks, VPN Tunneling and SIEM Integration. In this part, we step into the ...</summary> </entry> <entry><title>How I Took Over a Microsoft Entra ID Account Using Phishing &amp; 2FA Bypass</title><link href="https://www.hackpie.com/posts/How-i-Took-over-Microsoft-Entra-ID/" rel="alternate" type="text/html" title="How I Took Over a Microsoft Entra ID Account Using Phishing &amp;amp; 2FA Bypass" /><published>2025-07-03T16:00:00+00:00</published> <updated>2025-07-04T11:18:48+00:00</updated> <id>https://www.hackpie.com/posts/How-i-Took-over-Microsoft-Entra-ID/</id> <content type="text/html" src="https://www.hackpie.com/posts/How-i-Took-over-Microsoft-Entra-ID/" /> <author> <name>0xtmax</name> </author> <category term="Red Team" /> <category term="Phishing" /> <summary>Disclaimer This guide is strictly for educational purposes and red team simulation within authorized environments. Unauthorized phishing or impersonation of login portals is illegal. This guide walks you through configuring a Microsoft 365 phishing campaign using Evilginx2, a VPS, and a subdomain (login.hackpie.com). It includes DNS setup, phishlets customization, TLS fixes, and redirect...</summary> </entry> <entry><title>Building a Realistic Enterprise Level SOC LAB for Blue &amp; Red Teamers - Part 1</title><link href="https://www.hackpie.com/posts/Building_SOC_LAB_PART1/" rel="alternate" type="text/html" title="Building a Realistic Enterprise Level SOC LAB for Blue &amp;amp; Red Teamers - Part 1" /><published>2025-04-23T16:00:00+00:00</published> <updated>2025-07-18T04:41:46+00:00</updated> <id>https://www.hackpie.com/posts/Building_SOC_LAB_PART1/</id> <content type="text/html" src="https://www.hackpie.com/posts/Building_SOC_LAB_PART1/" /> <author> <name>0xtmax</name> </author> <category term="Projects" /> <category term="SOC" /> <summary>Hey folks, I’ve always been fascinated by the idea of building my own Security Operations Center (SOC) lab at home — not just any lab, but one that brings together realistic enterprise segmentation, SIEM monitoring, VPN connectivity between two isolated hosts, high level network segmentation, and an external attacker simulation. After countless trials, configurations, and creative tweaks using...</summary> </entry> <entry><title>Setting Up an Elasticsearch Cluster with Kibana, Filebeat, and Metricbeat on AWS (CentOS 7)</title><link href="https://www.hackpie.com/posts/Building_ELK_Cluster/" rel="alternate" type="text/html" title="Setting Up an Elasticsearch Cluster with Kibana, Filebeat, and Metricbeat on AWS (CentOS 7)" /><published>2025-03-24T16:00:00+00:00</published> <updated>2025-03-24T16:00:00+00:00</updated> <id>https://www.hackpie.com/posts/Building_ELK_Cluster/</id> <content type="text/html" src="https://www.hackpie.com/posts/Building_ELK_Cluster/" /> <author> <name>0xtmax</name> </author> <category term="Projects" /> <category term="SIEM" /> <summary>Introduction Hey folks, Welcome back :) In this blog post, I will walk you through the detailed process of setting up an Elasticsearch Cluster along with Kibana, Filebeat and Metricbeat on AWS EC2 instances running CentOS 7. We will cover everything from server deployment, VPC Setup, Firewall rules, cluster Configuration and dashboard access. In the next phase of this blog, i will automate all...</summary> </entry> </feed>
