Pinned Repositories
1212
2FA-Bypass-Techniques
A comprehensive collection of various techniques and methods for bypassing Two-Factor Authentication (2FA) security mechanisms.
Active_Directory_Advanced_Threat_Hunting
This repo is about Active Directory Advanced Threat Hunting
Anti-Forensic-Techniques
APT-Attack-Simulation
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and many other tools that attackers might have used in actual attacks. These tools and TTPs are simulated here.
APT28-Adversary-Simulation
This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe
ato-toolkit
On this page you'll find everything you need to get started with the Azure blueprint for Zero Trust. This blueprint is currently in preview.
attacking-cloudgoat2
A step-by-step walkthrough of CloudGoat 2.0 scenarios.
AutomatedEmulation
An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.
kevehid12's Repositories
kevehid12/2FA-Bypass-Techniques
A comprehensive collection of various techniques and methods for bypassing Two-Factor Authentication (2FA) security mechanisms.
kevehid12/Anti-Forensic-Techniques
kevehid12/APT-Attack-Simulation
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and many other tools that attackers might have used in actual attacks. These tools and TTPs are simulated here.
kevehid12/APT28-Adversary-Simulation
This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe
kevehid12/awesome-annual-security-reports
A curated list of annual cyber security reports
kevehid12/Awesome-CloudOps-Automation
Cloud-ops automation runbooks that are ready to use. Build your own automations using the hundreds of drag and drop actions included in the repository. Built on Jupyter Notebooks, our automation platform jumpstarts your SRE RunBook creation. 😎 published by the unSkript community.
kevehid12/awesome-incident-response
A curated list of tools for incident response
kevehid12/aws-customer-playbook-framework
This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.
kevehid12/aws-guardduty-runbook-generator
Generates runbooks for GuardDuty findings
kevehid12/aws-security-survival-kit
Bare minimum AWS Security Alerting and Configuration
kevehid12/Backup-and-Restore-Automation-Scripts
upload database to oracle bucket using "~/.oci/config" file which we can get from oracle user
kevehid12/cloud-security-remediation-guides
Security Remediation Guides
kevehid12/CloudCommotion
Cloud Commotion intends to cause chaos to simulate security incidents
kevehid12/cloudgoat
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
kevehid12/CyberCloud
CyberCloud is a Flask-based security dashboard designed to detect, alert, and provide remediation for security misconfigurations in AWS cloud environments. With real-time alerts and comprehensive IAM, S3, and security group checks, CyberCloud enhances AWS security visibility and compliance.
kevehid12/definitive-guide-kql
Sample queries and data as part of the Microsoft Press book, The Definitive Guide to KQL
kevehid12/DeTTECT
Detect Tactics, Techniques & Combat Threats
kevehid12/digital-forensics-lab
Free hands-on digital forensics labs for students and faculty
kevehid12/exposed-aws-keys-remediation
kevehid12/guardduty-runbooks
Runs aquia-inc/aws-guardduty-runbook-generator to find new GuardDuty finding types and saves the runbook to this repo.
kevehid12/Hacking-Tools
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
kevehid12/nifo
Nuke It From Orbit - remove AV/EDR with physical access
kevehid12/oscp_cheet
kevehid12/OSCPnotes
kevehid12/Payload-Generator
reverse shell, Bypass windows defender firewall
kevehid12/Ransomware-Vulnerability-Matrix
A collection of CVEs weaponized by ransomware operators
kevehid12/Red-Team-Exercises
kevehid12/risky-records
Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?
kevehid12/slack_jack
Hijack a slack bot to phish your way in
kevehid12/thief_raccoon
Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating systems. This tool is intended to raise awareness about cybersecurity threats and help users understand the importance of security measures like 2FA and password