Saltar a contenido

Tags

Browse our extensive collection of 680+ cheat sheets by tags to find exactly what you're looking for. Our comprehensive tagging system helps categorize tools by function, platform, and skill level.

🔍 How to Use Tags

  • Click any tag to see all related cheat sheets
  • Combine searches with the search bar above
  • Filter by category using the sections below
  • Bookmark frequently used tags for quick access

🛡️ Security Tools

Penetration Testing

Find tools for ethical hacking, vulnerability assessment, and security testing.

Popular Tags: penetration-testingvulnerability-scanningred-teamexploitation

Network Security

Discover network analysis, monitoring, and protection tools.

Popular Tags: network-securitypacket-analysisport-scanningwireless-security

Web Security

Explore web application security testing and analysis tools.

Popular Tags: web-securitysql-injectiondirectory-enumerationweb-server

Digital Forensics

Access forensics and incident response tools.

Popular Tags: forensicsmemory-analysisdisk-analysisincident-response

Cryptography & Password Security

Browse encryption and password-related security tools.

Popular Tags: cryptographypassword-crackingencryptioncertificates

💻 Development Tools

Programming & Languages

Find tools for various programming languages and development workflows.

Popular Tags: programming-languagesjavascriptpythonjava-development

Web Development

Discover frontend and backend web development tools.

Popular Tags: web-developmentfrontendbackendapi-development

Mobile Development

Explore iOS, Android, and cross-platform development tools.

Popular Tags: mobile-developmentandroid-developmentios-developmentmobile-security

Development Environment

Access IDEs, editors, and development environment tools.

Popular Tags: ide-editorstext-editordebuggingversion-control

☁️ Cloud & DevOps

Cloud Platforms

Browse tools for major cloud service providers.

Popular Tags: awsazuregcpcloudserverless

Container & Orchestration

Find containerization and orchestration tools.

Popular Tags: containerizationdockerkubernetesorchestration

Infrastructure & Automation

Discover infrastructure management and automation tools.

Popular Tags: infrastructureiacautomationconfiguration-management

CI/CD & Monitoring

Access continuous integration, deployment, and monitoring tools.

Popular Tags: ci-cdmonitoringloggingmetricsalerting

🖥️ System Administration

Operating Systems

Find tools specific to different operating systems.

Popular Tags: linuxwindowsmacoscross-platform

Networking & Services

Discover networking, web servers, and system services.

Popular Tags: networkingweb-serverdatabaseservice-management

Performance & Monitoring

Access system monitoring and performance tools.

Popular Tags: monitoringperformanceprocess-managementsystem-calls

Backup & Security

Browse backup, recovery, and system security tools.

Popular Tags: backup-recoveryfirewallremote-accessfile-transfer

📱 Tool Types

Interface Types

Browse tools by their interface and interaction method.

Popular Tags: cli-toolgui-applicationweb-applicationweb-service

Skill Levels

Find tools appropriate for your experience level.

Popular Tags: beginnerintermediateadvancedexpert

Platform Compatibility

Discover tools by platform support.

Popular Tags: cross-platformlinux-onlywindows-onlymacos-only

🎯 Specialized Categories

OSINT & Reconnaissance

Open source intelligence and reconnaissance tools.

Popular Tags: osintreconnaissancesubdomain-enumerationinvestigation

Reverse Engineering

Tools for reverse engineering and malware analysis.

Popular Tags: reverse-engineeringmalware-analysisdynamic-analysisstatic-analysis

Package Management

Package managers and dependency management tools.

Popular Tags: package-managementdependency-managementbuild-tools


📊 Tag Statistics

  • Total Cheat Sheets: 680+
  • Security Tools: 200+
  • Development Tools: 150+
  • Cloud/DevOps Tools: 100+
  • System Admin Tools: 100+
  • Specialized Tools: 130+

🔗 Quick Navigation

Most Popular Security Tags: penetration-testingnetwork-securityweb-securityvulnerability-scanning

Most Popular Development Tags: web-developmentprogramming-languagesversion-controlide-editors

Most Popular Cloud Tags: awsdockerkubernetesci-cd

Most Popular System Tags: linuxnetworkingmonitoringautomation


Use the search functionality above to find specific tools or combine tag searches for more precise results. All content is regularly updated and maintained.

3d-modeling

3d-printing

AI Research

Agile

Apache Kafka

Apache Spark

App Deployment

Apple Business Manager

ChatGPT

Communication Skills

Compliance

Compliance Frameworks

Cryptographic Agility

Cryptographic Migration

Cybersecurity

Data Engineering

Data Governance

Data Privacy

Data Protection

Data Quality

Data Security

Engineering

Enterprise

Enterprise Data

Enterprise IT

Enterprise Security

Future-Proofing

GDPR

IT Governance

Kanban

Knowledge Management

Learning Systems

MDM

Mobile Device Management

Mobile Security

Monitoring

NIST Standards

Network

Network Configuration

Network Infrastructure

Network Security

OpenTelemetry

Optimization

Performance

Perplexity Pro

Post-Quantum Cryptography

Productivity

Professional Development

Project Management

Quantum Computing

Quantum Resistance

Real-time Analytics

Reference Tools

Research Workflows

Risk Management

SDP

SOC 2

SRE

Scrum

Security

Security Audit

Security Controls

Security Protocols

Software Development

Stream Processing

Tech Teams

Technical Writing

Threat Landscape

Troubleshooting

Trust Service Criteria

VPN

VPN Architecture

WiFi Security

Wireless Security

Zero Trust

active-directory-security

additive-manufacturing

advanced

agent-programming

agentic-ai

agentic-programming

agile

ai

ai-assistant

ai-automation

ai-coding

ai-development

ai-guardian

ai-orchestration

ai-pentesting

ai-presentation

ai-programming

ai-security

ai-spm

ai-video

ai-voice

akheron-proxy

alert-triage

altium-designer

analysis

android

android-analysis

android-security

ansible

anthropic

anthropic-claude

api

api-discovery

api-docs

api-testing

app security

app-builder

app-development

application-security

architecture

arp-monitoring

arpwatch

articles

asana

aspm

at-protocol

attack-path-management

attack-surface-management

audio-generation

augment code

autodesk

automated-security

automated-vulnerability-repair

automation

automation excellence

autonomous-agents

autonomous-hacking

autonomous-pentesting

aws

aws-lambda

aws-security

azure

azure-security

backend

bandwidth-testing

bash

beginner

best practices

best-practices

binary-analysis

bitlocker

bladerf

blockchain-security

blog

bloodhound

bluesky

bluetooth-hacking

boofuzz

bro

browser-ide

brute-force

bug-bounty

build-tools

business

buttercup-crs

caching

cad

cam

ccna

ccpa

certificates

chat

cheat-sheets

cheatsheets

ci-cd

ci-cd-security

cis-benchmark

cis-benchmarks

cisco

cisco-certification

claude code

claude-code

claude-flow

cli

cli tools

cli-tool

cli-tools

cloning

cloud

cloud architecture

cloud governance

cloud technologies

cloud-architecture

cloud-auditing

cloud-computing

cloud-infrastructure

cloud-management

cloud-migration

cloud-security

cloud-technologies

cloudformation

cloudsploit

cnapp

code-completion

code-coverage

code-generator

code-quality

code-scanning

code-to-cloud-security

coding

collaboration

command line

command-line

commands

communication

community

compliance

compliance-reporting

compliance-scanning

configuration management

configuration-management

container-security

containerization

containers

content-creation

context7

continuous-deployment

continuous-monitoring

continuous-security

conversational-ai

copilot

cost optimization

covert-access

cpu-emulation

creative-ai

cross-platform

cryptography

cursor

customer-service

cybersecurity

cyera

cynthion

dalfox

darpa-aixcc

data engineering

data pipeline

data protection

data-collection

data-engineering

data-governance

data-protection

data-science

data-security

data-visualization

database

debugging

decentralized

decompilation

decompiler

defi

deployment

design

desktop-apps

developer-portal

developer-tools

developer-workflows

development

development-environment

development-tools

devops

devsecops

dfir

diagramming

digital forensics

digital-forensics

digital-logic

directory

directory-enumeration

disassembler

discord

disk-analysis

disk-imaging

distributed systems

distributed tracing

dns

dns security

dns-security

dnssec

docker

dockerfile

document-forensics

documentation

dom-analysis

dynamic-analysis

eda

edge computing

edr

electronics

email

embedded-security

embedded-systems

emerging technologies

emulation

encryption

endpoint-discovery

engineering management

enterprise

enterprise infrastructure

enterprise it

enterprise-ai

enterprise-architecture

enterprise-security

esp32

ethernet-monitoring

ethical-hacking

evidence collection

expert

exploitation

falco

fiddler

file explorer

file management

financial management

fingerprinting

finops

fintech

firmware

flipper-zero

flux

forensic investigation

forensics

forseti-security

frameworks

frontend

fusion-360

future-of-coding

fuzzing

game-development

gatekeeper

gcp

gcp-security

gdpr

generative-ai

getting-started

ghidra

git

github copilot

github-copilot

gitops

gns3

google-cloud

google-meet

governance

gpt-4

gpt-5

great-scott-gadgets

greenbone

gui-application

guides

gvm

hackrf

hak5

hardware

hardware-design

hardware-hacking

hardware-security

hashicorp

hayabusa

high availability

homepage

hop-analysis

http-proxy

humint

hybrid-cloud

iOS

iac

iac-security

iam

icopy-x

ida-pro

ide-assistants

ide-editors

ide-integration

identity-security

implementation

incident management

incident response

incident-response

index

information-gathering

infrastructure

infrastructure protection

infrastructure security

infrastructure-as-code

infrastructure-engineering

infrastructure-monitoring

infrastructure-security

instagram

integration-testing

intelligence-gathering

intermediate

internal-developer-platform

internal-tools

internet

internet protocols

intrusion-detection

investigation

ios

iot security

iot-security

iperf

iperf3

irc

issue-tracking

it-professionals

java-analysis

java-development

javascript

javascript-analysis

jetbrains

jitter-measurement

jsparser

k8s

kanban

key-croc

keylogging

keystroke-injection

kicad

kics

kiterunner

kubernetes

lab401

lan-turtle

langchain

large-language-models

latency-analysis

latency-testing

learning

legal

library

library-calls

lighthouse

linux

linux-security

llm

llm-agent

load balancing

logging

logic-analyzer

low-code

mac-address-tracking

machine-learning

macos

malware

malware-analysis

man-in-the-middle

mattermost

mcp

mdr

memory-analysis

messaging

meta-programming

metadata-analysis

metrics

microblogging

microservices

microsoft-teams

mitmproxy

mlops

mobile device management

mobile security

mobile-development

mobile-security

monday.com

monitoring

mtr

multi-cloud

multi-cloud-security

multimedia

my-traceroute

natural-language-processing

ndr

nessus

network

network administration

network diagnostics

network infrastructure

network security

network-analysis

network-benchmarking

network-design

network-diagnostics

network-forensics

network-learning

network-monitoring

network-performance

network-security

network-simulation

network-surveillance

network-testing

network-tracing

network-training

network-troubleshooting

networking

newsletter

nfc

nist

no-code

non-human-identities

nsa-tools

ntt-data

observability

office-365

omg-cable

online-meetings

opa

open-source

openai

opengraph

openvas

operating systems

operating-systems

optimization

orchestration

osint

osint-automation

osint-investigation

overview

owasp

package-management

package-managers

packet-analysis

packet-capture

packet-loss

packet-squirrel

packet-tracer

pandwarf

password-cracking

path-discovery

pcap

pcb

pcb-design

penetration-testing

pentest-reporting

pentesting

performance

performance optimization

performance-testing

perplexity

photo-sharing

ping

pingplotter

pipeline

pipeline-security

platform-engineering

plugins

policy

policy-as-code

policy-enforcement

port-scanning

portapack

powershell

presentation

presentation-design

privacy

productivity

professional development

professional reference

professional-development

programming

programming-language

programming-languages

project-management

prompting

protocol

protocol-testing

protonmail

prototyping

prowler

proxmark3

proxy

prusa-slicer

publishing

python

qemu

radio-frequency

radio-hacking

rapid7

raspberry-pi

react

reconnaissance

red-team

red-teaming

reference

references

rego

relationship-analysis

remediation-tracking

remote-access

research

resources

reverse-engineering

rf-analysis

rfid

risk-management

route-analysis

rtl-sdr

runtime-protection

runtime-security

sbom

scalability

scheduling

scoutsuite

screen-annotation

scripting

sdp

sdr

search

secrets-management

security

security architecture

security assessment

security automation

security-analytics

security-architecture

security-assessment

security-auditing

security-monitoring

security-operations

security-professionals

security-research

security-scanning

security-testing

security-tools

self-hosted

self-referential

serverless

service

service-catalog

service-management

shark-jack

shell

siem

sigma-optimizer

sigma-rules

simulation

site reliability engineering

slack

slicer

smart-contracts

snapchat

soc

social-engineering

social-mapping

social-media

software

software-defined-radio

specterops

sql-injection

sql-queries

sre practices

ssh

ssh-exploitation

standards

static-analysis

steampipe

sub-ghz

subdomain-takeover

substack

subzy

supply-chain-security

surveillance

suzaku

symbolic-execution

sysadmin

system administration

system reliability

system-administration

system-calls

system-tools

task-management

team building

technical leadership

technology-detection

telegram

telerik

tenable

terminal

terraform

terrascan

testing

text-editor

text-to-speech

threat hunting

threat modeling

threat-detection

threat-hunting

threat-intelligence

throughput-testing

tiktok

time-travel-debugging

tools

topology-design

traceroute

tracert

traffic-analysis

trail-of-bits

training

trello

troubleshooting

tshark

tutorial

tutorials

twitter

typescript

ui-framework

usb-hacking

usb-security

usbninja

utility

version-control

vibe-coding

video

video-conferencing

video-editing

video-generation

video-recording

video-sharing

virtualbox

virtualization

visualization

vmware

voice-synthesis

voip

vscode

vulnerability-assessment

vulnerability-discovery

vulnerability-management

vulnerability-research

vulnerability-scanner

vulnerability-scanning

vulnerability-testing

waf-bypass

wappalyzer

wasm

web-application

web-application-security

web-debugging

web-development

web-fingerprinting

web-scraping

web-security

web-server

web-service

web-technology

webassembly

whatsapp-business

whatweb

whiteboard

wifi-hacking

windows

windows 11

windows-only

windows-security

windsurf

wireless-security

wireshark

workflow

workflow-automation

writing

x

xss

xsstrike

zeek

zero trust

zero-trust

zoom