- General
- Collection of Multiple
- Communication
- Active Directory
- ARM
- ASM
- Android
- iOS
- Credential Attacks
- Exploitation Development
- Forensics/IR
- Linux
- Malware
- Metasploit
- Network Monitoring
- Network Scanning
- Penetration Testing Related
- PowerShell
- RE
- Security Design and Engineering
- Tmux
- Web
- Windows
- Wireless
- DB
- General
- How to Suck at Information Security
- cheat.sh
- the only cheat sheet you need https://cheat.sh/
- exp
- a command line client for explainshell.com
- Malware Archaeology Cheatsheets
- Out of Band Exploitation (OOB) CheatSheet - NotSoSecure(2018)
- Tools
- cheat
- cheat allows you to create and view interactive cheatsheets on the command-line. It was designed to help remind nix system administrators of options for commands that they use frequently, but not frequently enough to remember.
- cheat
- Collection of Multiple
- Aman Hardikar's Mindmaps
- Hack3rScroll Mindmaps
- Mindmaps for Bugbounties, SSRF, OAUTH 2.0, and iOS Vuln assessment.
- Mobile Application Penetration Testing Cheat Sheet
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
- Templates and Checklists - Strategic Environmental Research and Development Program/US DoD
- The Templates and Checklists are the various forms needed to create an RMF package and artifacts that support the completion of the eMASS registration. In addition to the Templates and Checklists, refer to the Cyber Commissioning and the Resources and Tools pages to review and download the Unified Facility Criteria and the Unified Facility Guide Specifications. While the templates and checklists are labeled DoD, ESTCP or Navy, they are fairly organization agnostic and any organization can modify them to suit their own use.
- Communication
- Active Directory
- Active Directory Cheat Sheet
- Domain Demolition with Frank Castle and Powershell.
- Active Directory Exploitation Cheat Sheet - buftas
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
- Active Directory Cheat Sheet
- ARM
- ARM Assembly Basics Cheatsheet - AzeriaLabs
- ARMwiki - hehyrick.co.uk
- ARM processor wiki
- ASM
- Android
- iOS
- Credential Attacks
- Windows
- Credential Dumping Cheatsheet - Ignitetechnologies
- This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential Access) with examples.
- Credential Dumping Cheatsheet - Ignitetechnologies
- Windows
- Exploitation Development
- Forensics/IR
- File Signature Table
- Mem forenics cheat sheet
- Security Incident Survey Cheat Sheet
- Initial Security Incident Questionnaire for responders Cheat Sheet
- Critical Log Review Checklist for Security Incidents
- Network DDOS Incident Response Cheat Sheet
- Windows Registry Auditing Cheatsheet - Malware Archaeology
- Linux
- Linux Syscall Table
- Complete listing of all Linux Syscalls
- Linux Syscall Table
- Malware
- Metasploit
- Network Monitoring
- Network Scanning
- Penetration Testing Related
- General Tricks
- Penetration Testing Tools Cheat Sheet
- AIX For Pentesters
- Good paper on exploiting/pentesting AIX based machines. From the paper itself “ The paper proposes some basic methods to do comprehensive local security checks and how to exploit the vulnerabilities.”
- Linux - Breaking out of shells
- RootVG - Website Dedicated to AIX
- Windows Privilege Escalation Cheat Sheet/Tricks
- Attack Surface Analysis Cheat Sheet
- Web Application Penetration Testing Cheat Sheet - jdow.io
- Pentesting CheatSheets - @spotheplanet
- Active Directory Cheat Sheet
- This repository contains a general methodology in the Active Directory environment. It is offered with a selection of quick commands from the most efficient tools based on Powershell, C, .Net 3.5 and .Net 4.5.
- PowerShell
- RE
- Radare2 Cheat-Sheet
- WinDbg Cheat Sheet/mindmap
- Pdf of all WinDbg commands
- Arm instruction set
- IdaRef
- IDA Pro Full Instruction Reference Plugin - It's like auto-comments but useful.
- Security Design and Engineering
- Tmux
- Web
- API Security Checklist
- Checklist of the most important security countermeasures when designing, testing, and releasing your API.
- Drupal Security Checklist
- OWASP Authentication Cheat Sheet
- OWASP Testing Checklist
- Securing Web Application Technologies Checklist
- SSRF Bible Cheatsheet
- WebAppSec Testing Checklist
- HTML5 Security Cheatsheet
- XML DTD Cheat Sheet
- OWASP XSS (Cross Site Scripting) Prevention Cheat Sheet
- OWASP Input Validation Cheat Sheet
- OWASP Authentication Cheat Sheet
- OWASP Forgot Password Cheat Sheet
- OWASP Choosing and Using Security Questions Cheat Sheet
- OWASP Session Management Cheat Sheet
- OWASP Transport Layer Protection Cheat Sheet
- OWASP Pinning Cheat Sheet
- OWASP Cryptographic Storage Cheat Sheet
- Web Application Cheatsheet (Vulnhub)
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.
- Windows
- Windows Startup Application Database
- Windows CMD Reference - ms
- Windows Command Line cheatsheet (part 2): WMIC - andreafortuna
- Windows CLI gems. Tweets of @wincmdfu
- Windows one line commands that make life easier, shortcuts and command line fu.
- MS "reg" commandreference
- Wireless
- DB