Git Product home page Git Product logo

cyber-security-cheatsheets's Introduction

Cyber Security Cheatsheets

This is a series of cheatsheets covering common tools, techniques, and nuggets of information which I find useful as a penetration tester. The aim is to start publishing one document a week until there is a solid library of tools and techniques listed which you can download to have an offline copy on your pen testing build.

These cheatsheets are listed in the table below:

Document Name Last Modified Version
Common Hashes Cheatsheet 2021-03-08 v1.0
Compiling C# Using CSC Cheatsheet 2021-05-06 v1.0
Default Database Credentials Cheatsheet 2021-05-06 v1.0
Hashing & Encoding Cheatsheet 2021-05-06 v1.0
IPv4 Settings Cheatsheet 2021-05-06 v1.0
John the Ripper Cheatsheet 2021-05-06 v1.0
MS SQL Data Extraction Cheatsheet 2021-05-06 v1.0
Netcat Cheatsheet 2021-05-06 v1.0
OS Command Execution (Linux) Cheatsheet 2021-05-06 v1.0
OS Command Execution (Windows) Cheatsheet 2021-05-06 v1.0
Python Servers Cheatsheet 2021-05-06 v1.0
Shellshock Cheatsheet 2021-05-06 v1.0
SQL Injection Filter Evasion Cheatsheet 2021-05-06 v1.0
SQLMAP Cheatsheet 2021-05-06 v1.0
XXE Injection Cheatsheet 2021-05-06 v1.0

Usage

You are free download these files onto your pen testing build and use them in the course of training or working in the cyber security industry. You are also free to distribute these files to others who may find them useful. Please ensure you only use the techniques for legal and ethical purposes, however.

Suggestions

If you think that any crucial snippets are missing from any of the cheatsheets, raise an issue on Github, or contact me. Note that I aim to keep all cheatsheets at a maximum of two pages.

Contact

Feel free to contact me if you have any specific requests for tools, techniques, or information which you would like to be placed in cheatsheet format, or raise issues on Github.

Legal Disclaimer

TLDR: Only practice the techniques in these documents against systems you have permission to attack.

All information and techniques contained in the cheatsheets are for educational and professional purposes only. It is illegal to use the techniques outlined in many of these documents against computer systems that you do not expressly own, operate, and have full authorisation to target. It is your responsibility to obey all applicable laws when using the techniques in these documents.

cyber-security-cheatsheets's People

Contributors

tevers200 avatar

Watchers

James Cloos avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.