Tags¶
Browse our extensive collection of 680+ cheat sheets by tags to find exactly what you're looking for. Our comprehensive tagging system helps categorize tools by function, platform, and skill level.
🔍 How to Use Tags¶
- Click any tag to see all related cheat sheets
- Combine searches with the search bar above
- Filter by category using the sections below
- Bookmark frequently used tags for quick access
🛡️ Security Tools¶
Penetration Testing¶
Find tools for ethical hacking, vulnerability assessment, and security testing.
Popular Tags: penetration-testing • vulnerability-scanning • red-team • exploitation
Network Security¶
Discover network analysis, monitoring, and protection tools.
Popular Tags: network-security • packet-analysis • port-scanning • wireless-security
Web Security¶
Explore web application security testing and analysis tools.
Popular Tags: web-security • sql-injection • directory-enumeration • web-server
Digital Forensics¶
Access forensics and incident response tools.
Popular Tags: forensics • memory-analysis • disk-analysis • incident-response
Cryptography & Password Security¶
Browse encryption and password-related security tools.
Popular Tags: cryptography • password-cracking • encryption • certificates
💻 Development Tools¶
Programming & Languages¶
Find tools for various programming languages and development workflows.
Popular Tags: programming-languages • javascript • python • java-development
Web Development¶
Discover frontend and backend web development tools.
Popular Tags: web-development • frontend • backend • api-development
Mobile Development¶
Explore iOS, Android, and cross-platform development tools.
Popular Tags: mobile-development • android-development • ios-development • mobile-security
Development Environment¶
Access IDEs, editors, and development environment tools.
Popular Tags: ide-editors • text-editor • debugging • version-control
☁️ Cloud & DevOps¶
Cloud Platforms¶
Browse tools for major cloud service providers.
Popular Tags: aws • azure • gcp • cloud • serverless
Container & Orchestration¶
Find containerization and orchestration tools.
Popular Tags: containerization • docker • kubernetes • orchestration
Infrastructure & Automation¶
Discover infrastructure management and automation tools.
Popular Tags: infrastructure • iac • automation • configuration-management
CI/CD & Monitoring¶
Access continuous integration, deployment, and monitoring tools.
Popular Tags: ci-cd • monitoring • logging • metrics • alerting
🖥️ System Administration¶
Operating Systems¶
Find tools specific to different operating systems.
Popular Tags: linux • windows • macos • cross-platform
Networking & Services¶
Discover networking, web servers, and system services.
Popular Tags: networking • web-server • database • service-management
Performance & Monitoring¶
Access system monitoring and performance tools.
Popular Tags: monitoring • performance • process-management • system-calls
Backup & Security¶
Browse backup, recovery, and system security tools.
Popular Tags: backup-recovery • firewall • remote-access • file-transfer
📱 Tool Types¶
Interface Types¶
Browse tools by their interface and interaction method.
Popular Tags: cli-tool • gui-application • web-application • web-service
Skill Levels¶
Find tools appropriate for your experience level.
Popular Tags: beginner • intermediate • advanced • expert
Platform Compatibility¶
Discover tools by platform support.
Popular Tags: cross-platform • linux-only • windows-only • macos-only
🎯 Specialized Categories¶
OSINT & Reconnaissance¶
Open source intelligence and reconnaissance tools.
Popular Tags: osint • reconnaissance • subdomain-enumeration • investigation
Reverse Engineering¶
Tools for reverse engineering and malware analysis.
Popular Tags: reverse-engineering • malware-analysis • dynamic-analysis • static-analysis
Package Management¶
Package managers and dependency management tools.
Popular Tags: package-management • dependency-management • build-tools
📊 Tag Statistics¶
- Total Cheat Sheets: 680+
- Security Tools: 200+
- Development Tools: 150+
- Cloud/DevOps Tools: 100+
- System Admin Tools: 100+
- Specialized Tools: 130+
🔗 Quick Navigation¶
Most Popular Security Tags: penetration-testing • network-security • web-security • vulnerability-scanning
Most Popular Development Tags: web-development • programming-languages • version-control • ide-editors
Most Popular Cloud Tags: aws • docker • kubernetes • ci-cd
Most Popular System Tags: linux • networking • monitoring • automation
Use the search functionality above to find specific tools or combine tag searches for more precise results. All content is regularly updated and maintained.
3d-modeling¶
3d-printing¶
AI Research¶
Agile¶
Apache Flink¶
Apache Kafka¶
Apache Spark¶
App Deployment¶
Apple Business Manager¶
ChatGPT¶
Communication Skills¶
Compliance¶
Compliance Frameworks¶
- SOC 2 Compliance for IT Teams: Your Complete Guide to Security Excellence
- SOC 2 Compliance para Equipos de TI: Su Guía Completa hacia la Excelencia en Seguridad
Cryptographic Agility¶
- Post-Quantum Cryptography Preparation: Securing Your Infrastructure Against the Quantum Threat
- Preparación de criptografía post-cuántica: Asegurando su infraestructura contra la amenaza cuántica
Cryptographic Migration¶
- Post-Quantum Cryptography Preparation: Securing Your Infrastructure Against the Quantum Threat
- Preparación de criptografía post-cuántica: Asegurando su infraestructura contra la amenaza cuántica
Cybersecurity¶
- A Comprehensive Guide to Enterprise WiFi Security Hardening
- Database Encryption Best Practices
- Mobile Network Security: A Comprehensive Guide
- Mobile Threat Landscape: A Deep Dive into the Evolving Risks
Data Engineering¶
- A Practical Guide to GDPR Compliance for Data Teams
- Database Encryption Best Practices
- Enterprise Data Governance Frameworks: A Comprehensive Guide
- Stream Processing Security: A Comprehensive Guide for Data Engineers
Data Governance¶
Data Privacy¶
Data Protection¶
- Database Encryption Best Practices
- Mobile Network Security: A Comprehensive Guide
- SOC 2 Compliance for IT Teams: Your Complete Guide to Security Excellence
- SOC 2 Compliance para Equipos de TI: Su Guía Completa hacia la Excelencia en Seguridad
Data Quality¶
Data Security¶
Engineering¶
Enterprise¶
Enterprise Data¶
Enterprise IT¶
- A Comprehensive Guide to Enterprise WiFi Security Hardening
- A Deep Dive into iOS App Management & Deployment
- A Deep Dive into iOS Network & VPN Configuration
- A Deep Dive into iOS Network & VPN Configuration
- Mobile Network Security: A Comprehensive Guide
Enterprise Security¶
Future-Proofing¶
- Post-Quantum Cryptography Preparation: Securing Your Infrastructure Against the Quantum Threat
- Preparación de criptografía post-cuántica: Asegurando su infraestructura contra la amenaza cuántica
GDPR¶
IT Governance¶
- SOC 2 Compliance for IT Teams: Your Complete Guide to Security Excellence
- SOC 2 Compliance para Equipos de TI: Su Guía Completa hacia la Excelencia en Seguridad
Kanban¶
Knowledge Management¶
Learning Systems¶
MDM¶
- A Deep Dive into iOS Enterprise Configuration
- A Deep Dive into iOS Network & VPN Configuration
- A Deep Dive into iOS Network & VPN Configuration
- Mobile Threat Landscape: A Deep Dive into the Evolving Risks
Mobile Device Management¶
- A Deep Dive into iOS App Management & Deployment
- A Deep Dive into iOS Enterprise Configuration
- A Deep Dive into iOS Network & VPN Configuration
- A Deep Dive into iOS Network & VPN Configuration
Mobile Security¶
- Mobile Network Security: A Comprehensive Guide
- Mobile Threat Landscape: A Deep Dive into the Evolving Risks
Monitoring¶
NIST Standards¶
- Post-Quantum Cryptography Preparation: Securing Your Infrastructure Against the Quantum Threat
- Preparación de criptografía post-cuántica: Asegurando su infraestructura contra la amenaza cuántica
Network¶
Network Configuration¶
Network Infrastructure¶
- A Practical Guide to Software-Defined Perimeter (SDP) Implementation
- Modern VPN Architecture Design for Network Engineers
Network Security¶
- A Comprehensive Guide to Enterprise WiFi Security Hardening
- A Practical Guide to Software-Defined Perimeter (SDP) Implementation
- Mobile Network Security: A Comprehensive Guide
- Modern VPN Architecture Design for Network Engineers
OpenTelemetry¶
- Distributed Tracing Implementation: A Comprehensive Guide for SRE Professionals
- Implementación de Distributed Tracing: Una Guía Completa para Profesionales SRE
Optimization¶
Performance¶
Perplexity Pro¶
Post-Quantum Cryptography¶
- Post-Quantum Cryptography Preparation: Securing Your Infrastructure Against the Quantum Threat
- Preparación de criptografía post-cuántica: Asegurando su infraestructura contra la amenaza cuántica
Productivity¶
- AI-Powered Research Mastery: Transform Your Research Workflow with Perplexity Pro and ChatGPT
- Professional Reference Tools Mastery: Build Your Ultimate Knowledge Management System
Professional Development¶
- Mastering Technical Writing: A Guide for Engineers
- Professional Reference Tools Mastery: Build Your Ultimate Knowledge Management System
Project Management¶
Quantum Computing¶
- Post-Quantum Cryptography Preparation: Securing Your Infrastructure Against the Quantum Threat
- Preparación de criptografía post-cuántica: Asegurando su infraestructura contra la amenaza cuántica
Quantum Resistance¶
- Post-Quantum Cryptography Preparation: Securing Your Infrastructure Against the Quantum Threat
- Preparación de criptografía post-cuántica: Asegurando su infraestructura contra la amenaza cuántica
Real-time Analytics¶
Reference Tools¶
Research Workflows¶
Risk Management¶
- SOC 2 Compliance for IT Teams: Your Complete Guide to Security Excellence
- SOC 2 Compliance para Equipos de TI: Su Guía Completa hacia la Excelencia en Seguridad
SDP¶
SOC 2¶
- SOC 2 Compliance for IT Teams: Your Complete Guide to Security Excellence
- SOC 2 Compliance para Equipos de TI: Su Guía Completa hacia la Excelencia en Seguridad
SRE¶
- Distributed Tracing Implementation: A Comprehensive Guide for SRE Professionals
- Implementación de Distributed Tracing: Una Guía Completa para Profesionales SRE
Scrum¶
Security¶
Security Audit¶
- SOC 2 Compliance for IT Teams: Your Complete Guide to Security Excellence
- SOC 2 Compliance para Equipos de TI: Su Guía Completa hacia la Excelencia en Seguridad
Security Controls¶
- SOC 2 Compliance for IT Teams: Your Complete Guide to Security Excellence
- SOC 2 Compliance para Equipos de TI: Su Guía Completa hacia la Excelencia en Seguridad
Security Protocols¶
- Post-Quantum Cryptography Preparation: Securing Your Infrastructure Against the Quantum Threat
- Preparación de criptografía post-cuántica: Asegurando su infraestructura contra la amenaza cuántica
Software Development¶
Stream Processing¶
Tech Teams¶
Technical Writing¶
Threat Landscape¶
Troubleshooting¶
Trust Service Criteria¶
- SOC 2 Compliance for IT Teams: Your Complete Guide to Security Excellence
- SOC 2 Compliance para Equipos de TI: Su Guía Completa hacia la Excelencia en Seguridad
VPN¶
- A Deep Dive into iOS Network & VPN Configuration
- A Deep Dive into iOS Network & VPN Configuration
- Modern VPN Architecture Design for Network Engineers
VPN Architecture¶
WiFi Security¶
Wireless Security¶
Zero Trust¶
active-directory-security¶
additive-manufacturing¶
advanced¶
- Binary ninja
- Building Self-Referential Applications with Claude Code: Advanced Prompting for Meta-Programming
- CloudSploit Hoja de Referencia
- Comandos de Vectra AI
- Construcción de Aplicaciones Auto-Referenciales con Claude Code: Prompting Avanzado para Meta-Programación
- Elk
- GDB - GNU Debugger
- Ghidra - NSA Reverse Engineering Framework
- Ghidra Plugins Cheat Sheet
- Hoja de Referencia de 1TRACE
- Hoja de Referencia de ARACNE
- Hoja de Referencia de ArgoCD
- Hoja de Referencia de AutoPentest
- Hoja de Referencia de Boofuzz
- Hoja de Referencia de Dalfox
- Hoja de Referencia de FluxCD
- Hoja de Referencia de Forseti Security
- Hoja de Referencia de Frida
- Hoja de Referencia de Herramientas WebAssembly (WASM)
- Hoja de Referencia de Unicorn Engine
- Hoja de Referencia de Volatility
- Hoja de Referencia de Wappalyzer
- Hoja de Referencia de WhatWeb
- Hoja de Referencia de XSStrike
- Hoja de Referencia de angr
- JSParser Cheat Sheet
- Jeb decompiler
- KICS (Keeping Infrastructure as Code Secure) Cheat Sheet
- Kiterunner
- Kubernetes
- Lighthouse plugin
- Metasploit
- Metasploit framework
- Ollydbg
- PTHelper Cheat Sheet
- Prowler
- REVEN Cheat Sheet
- Radare2 - Reverse Engineering Framework
- Retool
- Scoutsuite
- Splunk Cheatsheet
- Steampipe
- Subzy
- Terrascan
- x64dbg - Depurador de Windows
agent-programming¶
- AI-Assisted Coding: From IDE Assistants to Agent Programming
- Asisted Coding: From IDE Assistant to Agent Programming
agentic-ai¶
agentic-programming¶
agile¶
ai¶
- AI-Assisted Coding: From IDE Assistants to Agent Programming
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- Anthropic Claude Cheatsheet
ai-assistant¶
ai-automation¶
ai-coding¶
- AI-Assisted Coding: From IDE Assistants to Agent Programming
- Asisted Coding: From IDE Assistant to Agent Programming
- Claude Code CLI Cheatsheet
- Supermaven
- Tabnine
- Título: La Evolución del Código AI: De Code Completion a Autonomous Agents
ai-development¶
- Building Self-Referential Applications with Claude Code: Advanced Prompting for Meta-Programming
- Comandos de Base44
- Construcción de Aplicaciones Auto-Referenciales con Claude Code: Prompting Avanzado para Meta-Programación
- GPT-5 Cheatsheet
ai-guardian¶
ai-orchestration¶
ai-pentesting¶
ai-presentation¶
ai-programming¶
- Claude Code for Beginners: Master AI-Powered Development Through Smart Prompting
- Claude Code para Principiantes: Domina el Desarrollo Impulsado por IA a Través de Prompts Inteligentes
ai-search¶
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
ai-security¶
- AI Guardian Cheatsheet
- AI SBOM Generator Cheatsheet
- AirMDR AI SOC Platform Cheatsheet
- AutoFix AI Agent Cheatsheet
- Autonomous PowerShell Agent Cheatsheet
- Buttercup CRS Cheatsheet
- Comandos de Vectra AI
- Comandos de Wiz MCP
- Commercial Intelligence Blend Tools Cheatsheet
- Cribl Guard Cheatsheet
- Cyera AI Guardian Cheatsheet
- Hoja de Referencia de AutoPentest
- Legit Security Commands
ai-spm¶
ai-video¶
ai-voice¶
akheron-proxy¶
alert-triage¶
altium-designer¶
analysis¶
android¶
android-analysis¶
android-security¶
ansible¶
anthropic¶
anthropic-claude¶
api¶
api-discovery¶
api-docs¶
api-testing¶
app security¶
app-builder¶
app-development¶
application-security¶
architecture¶
- Arquitectura de Data Pipeline Segura: Una Guía Completa
- Secure Data Pipeline Architecture: A Comprehensive Guide
arp-monitoring¶
arpwatch¶
articles¶
asana¶
aspm¶
at-protocol¶
attack-path-management¶
attack-surface-management¶
audio-generation¶
augment code¶
autodesk¶
automated-security¶
automated-vulnerability-repair¶
automation¶
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- Advanced Pipeline Security Integration: Mastering DevSecOps in CI/CD Environments
- Advanced Threat Hunting Techniques: Master Proactive Cybersecurity Defense in 2025
- AirMDR AI SOC Platform Cheatsheet
- Ansible
- Chef
- Comandos de Base44
- Comandos de Wiz MCP
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
- Crontab
- Cybersecurity Workflow Automation: Transform Your Security Operations with Advanced Automation Frameworks
- Código Claude para la administración del sistema: Automatización de la infraestructura impulsada por AI
- DevSecOps Excellence: Integrate Security into Every Stage of Software Development
- Enterprise Cloud Security Mastery: Build Bulletproof Multi-Cloud Security Architectures
- Hoja de Referencia de Boofuzz
- Hoja de Referencia de Dalfox
- Hoja de Referencia de Wappalyzer
- Hoja de Referencia de WhatWeb
- Hoja de Referencia de angr
- Hoja de Referencia de env0
- Integración Avanzada de Seguridad en Pipelines: Dominando DevSecOps en Entornos CI/CD
- JSParser Cheat Sheet
- Jenkins
- Kiterunner
- Kubernetes Security Hardening: Bulletproof Container Orchestration Security
- MLOps Pipeline Implementation: A Comprehensive Guide for Data Engineers
- Network Security Architecture: Design Bulletproof Enterprise Network Defenses
- Puppet
- SOC 2 Compliance for IT Teams: Master Security Framework Implementation
- Scraper API Commands
- Subzy
- Terraform Enterprise Patterns: Mastering Infrastructure as Code at Scale
- Terraform Enterprise Patterns: Mastering Infrastructure as Code at Scale
- Zero Trust Network Implementation: A Comprehensive Guide to Modern Security Architecture
automation excellence¶
autonomous-agents¶
- AI-Assisted Coding: From IDE Assistants to Agent Programming
- Asisted Coding: From IDE Assistant to Agent Programming
autonomous-hacking¶
autonomous-pentesting¶
aws¶
- AWS CLI
- Amazon CodeWhisperer Cheat Sheet
- CloudSploit Hoja de Referencia
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
- Dominio de la Línea de Comandos para Profesionales
- Hoja de Referencia de Amazon Q
- Hybrid Cloud Networking Excellence: Mastering Modern Infrastructure Integration
- Steampipe
- Título: Excelencia en Networking de Hybrid Cloud: Dominando la Integración de Infraestructura Moderna
aws-lambda¶
aws-security¶
azure¶
- Azure CLI
- CloudSploit Hoja de Referencia
- Hybrid Cloud Networking Excellence: Mastering Modern Infrastructure Integration
- Steampipe
- Título: Excelencia en Networking de Hybrid Cloud: Dominando la Integración de Infraestructura Moderna
azure-security¶
backend¶
bandwidth-testing¶
bash¶
beginner¶
- Atajos de VS Code
- Atom
- Bash - Bourne Again Shell
- Claude Code for Beginners: Master AI-Powered Development Through Smart Prompting
- Claude Code para Principiantes: Domina el Desarrollo Impulsado por IA a Través de Prompts Inteligentes
- CodeSandbox Cheat Sheet
- Comandos de Base44
- Comandos de Gamma
- Crontab
- Dirb
- Dirbuster
- El correo electrónico de altavoz y la herramienta de enumeración de subdominio
- Express
- Fish - Shell Interactivo Amigable
- Git Commands
- Gobuster Directory/File Brute Forcer Cheat Sheet
- Hexdump
- Hoja de Referencia de DevDocs
- Hoja de Referencia de Excalidraw
- MLOps Pipeline Implementation: A Comprehensive Guide for Data Engineers
- Nikto
- Pip
- Presentify Commands
- Python - Programming Language Reference
- Shodan
- Ssh
- Strings
- Supermaven
- Systemctl
- Tabnine
- Zsh - Shell Z
- npm Package Manager
best practices¶
best-practices¶
binary-analysis¶
- Binary ninja
- Ghidra Plugins Cheat Sheet
- Hoja de Referencia de Herramientas WebAssembly (WASM)
- Hoja de Referencia de Unicorn Engine
- Hoja de Referencia de angr
- Lighthouse plugin
bitlocker¶
bladerf¶
blockchain-security¶
- Enterprise Blockchain Security: A Strategic Implementation Guide
- Seguridad de Blockchain Empresarial: Una Guía Estratégica de Implementación
blog¶
bloodhound¶
bluesky¶
bluetooth-hacking¶
boofuzz¶
bro¶
browser-ide¶
brute-force¶
bug-bounty¶
build-tools¶
business¶
buttercup-crs¶
caching¶
cad¶
cam¶
ccna¶
ccpa¶
certificates¶
chat¶
cheat-sheets¶
cheatsheets¶
ci-cd¶
ci-cd-security¶
- Advanced Pipeline Security Integration: Mastering DevSecOps in CI/CD Environments
- Integración Avanzada de Seguridad en Pipelines: Dominando DevSecOps en Entornos CI/CD
cis-benchmark¶
cis-benchmarks¶
cisco¶
cisco-certification¶
claude code¶
claude-code¶
- Building Self-Referential Applications with Claude Code: Advanced Prompting for Meta-Programming
- Claude Code CLI Cheatsheet
- Claude Code for Beginners: Master AI-Powered Development Through Smart Prompting
- Claude Code para Principiantes: Domina el Desarrollo Impulsado por IA a Través de Prompts Inteligentes
- Construcción de Aplicaciones Auto-Referenciales con Claude Code: Prompting Avanzado para Meta-Programación
- Creación de Aplicaciones y Juegos con Claude Code: Domina el Uso de Prompts para Todas las Plataformas
- Creación de aplicaciones y juegos con Claude Code: Master Prompting para cada plataforma
- Código Claude para la administración del sistema: Automatización de la infraestructura impulsada por AI
- Título: La Evolución del Código AI: De Code Completion a Autonomous Agents
claude-flow¶
cli¶
- Claude Code CLI Cheatsheet
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
- Dominio de la Línea de Comandos para Profesionales
- Dominio de la Línea de Comandos para Profesionales
- Dominio de la Línea de Comandos para Profesionales
cli tools¶
cli-tool¶
- ADConnectDump Hoja de Referencia de Herramienta de Extracción de Credenciales de Azure AD Connect
- ASNmap Hoja de Referencia de Mapeo de ASN
- AWS CLI
- AWS Kiro
- Aadinternals
- Acunetix
- Age
- Alacritty - Terminal Acelerado por GPU
- Anchore
- Ansible
- Apimonitor
- Apktool
- Apt-Get
- Aqua
- Aquatone
- Arjun
- Arp-Scan
- Asreproast
- Assetfinder
- Atomic red team
- Augment Code Hoja de Referencia
- Awesome nodejs
- Awesome-Go
- Awesome-Java
- Awesome-Javascript
- Awesome-Python
- Azure CLI
- Backdoors & Breaches Comandos
- Bandit
- Bash - Bourne Again Shell
- Bash bunny
- Batch
- Bazaar
- Bazel
- Beacon
- Bettercap
- Bingoo
- Binwalk - Herramienta de Análisis de Firmware
- Bitbucket
- Bitlocker
- Borrador
- Brakeman
- Brutespray
- Bully
- Bundler
- Burp
- Bwapp
- Bzr
- CLI de DigitalOcean (doctl)
- CLion
- Caine
- Censys
- Censys-Python
- Cewl
- Chai
- ChatGPT y GPT-4 - Guía de Prompting de IA
- Cheatsheet-Dios
- Checkmarx
- Chef
- Chocolatey
- Clair
- Clang/LLVM - Infraestructura de Compilador Moderno
- Class-Dump
- Claude - Guía de Prompting de IA
- Claude Code Deshacer
- Claude code ui
- Claudia
- Cloudflare
- Cloudfox
- Cloudgoat
- Cobertura
- Codeql
- Comandos ELSA
- Comandos de Bugsy
- Comandos de Cortex
- Comandos de Docker
- Comandos de Vercel CLI
- Comandos de Xplico
- Composer
- Comsvcs
- Conda
- Confiable
- Consul
- Context7 Hoja de Referencia del Servidor MCP
- Corchetes
- Cowpatty
- CrackMapExec Hoja de Referencia
- Cron
- Crontab
- Crowbar
- Crunch
- Cti-Python-Stix2
- Cupp
- Cursor
- Datadog
- Dc3Dd
- Dcfldd
- Dd
- Decryptautologon
- Descubre la herramienta del motor de búsqueda
- Desvíos
- Dex2Jar
- Diagon
- Dig - Búsqueda y Resolución de DNS
- Dirb
- Dirsearch
- Docker Bench Hoja de Referencia
- Dostackbufferoverflowgood
- Dradis
- Drone
- Duckduckgo
- Dumpit
- Eaphammer
- Editor Zed
- Editor de Windsurf
- El correo electrónico de altavoz y la herramienta de enumeración de subdominio
- Elastic SIEM Cheatsheet
- Elemento
- Emerge
- Enrutador de Código Claude
- Enum4Linux
- Evilgophish
- Excel - Fórmulas, Funciones y Productividad
- Exegol
- Exiftool
- Fakelogonscreen
- Faker
- Fast-Google-Dorks-Scan
- Fastapi
- Feroxbuster
- Findomain
- Firebase - Plataforma Backend-as-a-Service de Google
- Fish - Shell Interactivo Amigable
- Flamingo
- Flare-Vm
- Flink
- Fluxion
- Ftkimager
- GCC - Colección de Compiladores GNU
- GDB - GNU Debugger
- Garak
- Gau
- Gedit
- Gem
- Gemini cli
- Gemini prompting
- Gestor de Paquetes APT
- Gestor de Paquetes YUM/DNF
- Ghostpack
- Ghostty - Terminal Emulator
- Git Commands
- GitHub Copilot Cheat Sheet
- Gnome terminal
- Go for javascript developers
- Go-Audit
- GoLand
- Goad
- Goatrider
- Gobuster Directory/File Brute Forcer Cheat Sheet
- Goby
- Godoh
- Godpotato
- Goexec
- Gofetch
- Golang
- Golden-Guide-For-Pentesting
- Goldencopy
- Goodfaith
- Goodhound
- Goodork
- Googd0rker
- Google Cloud CLI (gcloud)
- Google domain fronting
- Goohak
- Gopher
- Gopherus
- Goversioninfo
- Gpg
- Gradle
- Gruyere
- Guymager
- HTTPX Toolkit Cheat Sheet
- Harness
- Hashcat
- Helm
- Herramienta de auditoría de seguridad de Lynis
- Hexdump
- Hg
- Hoja de Referencia Rápida del Generador de Listas de Palabras de Subdominio AlterX
- Hoja de Referencia de AndroGuard
- Hoja de Referencia de Ant
- Hoja de Referencia de Arachni
- Hoja de Referencia de Ares RAT
- Hoja de Referencia de Asistente de Código AI Claude
- Hoja de Referencia de BeEF Browser Exploitation Framework
- Hoja de Referencia de BloodHound
- Hoja de Referencia de Brute Ratel C4 Framework
- Hoja de Referencia de Chisel
- Hoja de Referencia de Cisco ASA
- Hoja de Referencia de Cloud Scout
- Hoja de Referencia de CloudMapper
- Hoja de Referencia de Cobalt Strike
- Hoja de Referencia de CrewAI Multi-Agent Framework
- Hoja de Referencia de Cutter
- Hoja de Referencia de CyberChef
- Hoja de Referencia de DVWA (Damn Vulnerable Web Application)
- Hoja de Referencia de Dia Browser
- Hoja de Referencia de Drozer
- Hoja de Referencia de Empire Framework
- Hoja de Referencia de ExploitDB
- Hoja de Referencia de Frida
- Hoja de Referencia de Generación de Código OpenAI Codex
- Hoja de Referencia de Gestión de DNS
- Hoja de Referencia de Herramienta de Auditoría de Seguridad Azure Azucar
- Hoja de Referencia de Herramienta de Evaluación de Seguridad de Azure
- Hoja de Referencia de Herramienta de Inyección de Pulsaciones USB Rubber Ducky
- Hoja de Referencia de Herramienta de Phishing Blackeye
- Hoja de Referencia de Twint Herramienta OSINT de Twitter
- Hoja de Referencia de VSagent
- Hoja de Referencia de Veil
- Hoja de Referencia de Velociraptor
- Hoja de Referencia de Vim
- Hoja de Referencia de Volatility
- Hoja de Referencia de W3af (Web Application Attack Framework)
- Hoja de Referencia de Wapiti
- Hoja de Referencia de Wfuzz
- Hoja de Referencia de WifiForge
- Hoja de Referencia de Wifiphisher Wireless Phishing Framework
- Hoja de Referencia de YARA
- Hoja de Referencia del Framework C2 Villain
- Hoja de Referencia del Framework Covenant C2
- Hoja de Referencia del Framework Multi-Agente AutoGen
- Hoja de Referencia del Framework de Phishing EvilGinx2
- Hoja de Referencia del Recolector de Datos AzureHound BloodHound
- Hoja de Trucos de Aircrack-ng
- Hoja de Trucos de Prompting de DeepSeek AI
- Hoja de Trucos de WebGoat
- Hoja de Trucos de Wifite
- Hoja de Trucos de Zmap
- Hoja de Trucos para Siesta de Bebé
- Hoja de referencia de CMake
- Homebrew
- Host - Simple DNS Lookup Tool
- Hping3
- Hydra
- Hyper
- IDA Pro - Interactive Disassembler Professional
- Immunity
- Impacket
- Init
- Insomnia
- Invoke-Obfuscation Cheat Sheet
- Istio
- Jaeger
- Java deserialization scanner
- Java idx parser
- JavaScript - Modern Web Development
- Javascript malware collection
- Joe
- John
- John the ripper
- Judas
- Juice-Shop
- Jupyter Notebook
- K8s
- Kafka
- Kali linux
- Karma
- Katana
- Kerberoast
- Keybase
- Kibana
- Kind
- King phisher
- Kingofbugbountytips
- Kismet
- Kiwi
- Knockpy
- Koadic
- Kong
- Kubernetes
- LangChain Framework Cheat Sheet
- Langgraph
- Lanzamiento C2 Marco de la hoja de Cheat
- Lazagne
- Ldd
- Lenguaje de Ensamblador AArch64 (ARM64)
- Lenguaje de Ensamblador ARM (32 bits)
- Lenguaje de Ensamblador x86 (32 bits)
- Lenguaje de Ensamblador x86-64 (64 bits)
- Lighttpd
- Ligolo
- Ligolo-Ng
- Linenum
- Linkerd
- Linpeas
- Linpmem
- Linux File Management Cheat Sheet
- Linux Network Commands Cheat Sheet
- Linux Process Management Cheat Sheet
- Linux exploit suggester
- Linux text processing
- Linuxprivchecker
- Llama - Meta's Open Source AI Prompting Guide
- Llamaindex
- Lldb
- Lo Primordial
- Lovable.dev Cheat Sheet
- Lsassy
- Ltrace
- Luks
- MIPS Assembly Language
- Mac Terminal (Terminal.app) - macOS Native Terminal
- Make
- Malwoverview Cheat Sheet
- Masscan - Escáner de puerto de alta velocidad
- Maven
- Medusa
- Meg
- Megatron java
- Memcached
- Mercurial
- Merlin C2 Framework Cheat Sheet
- Metabigor
- Metagoofil
- Metasploit
- Metasploit framework
- Metasploitable
- Meterpreter
- Microburst
- Microsoft Sentinel Cheatsheet
- Mimikatz Cheat Sheet
- Misp
- Mix
- MobSF (Mobile Security Framework) Cheat Sheet
- Model Context Protocol (MCP) Servers Cheat Sheet
- Modlishka
- Msfconsole
- Msfvenom
- Mutillidae
- Naabu
- Nagios
- Nano
- Nanodump
- Nats
- Nbtscan
- Ncat
- Ncrack
- Needle
- Neovim
- NetExec
- Netcat
- Netdiscover
- Networkminer
- Nexpose
- Ngrok
- Nikto
- Ninja
- Nix
- Nmap
- Nodegoat
- Notify Notification System Cheat Sheet
- Nslookup - DNS Lookup and Troubleshooting
- Nuclei
- Nuget
- OSSEC Sistema de detección de intrusiones con sede en el anfitrión
- OWASP API Security Top 10 Commands
- OWASP Amass Network Mapping Tool Cheat Sheet
- Objdump
- Objeción Hoja de Cheat
- Obsidian Cheatsheet
- Oh My Posh - Cross-Platform Prompt Engine
- Oh My Zsh - Zsh Framework and Configuration Manager
- Ollama
- Onesixtyone
- OpenCanary Cheatsheet
- OpenVPN Cheatsheet
- Openshift
- Openssl
- Opentelemetry
- Opentracing
- Outguess
- Outline VPN Cheatsheet
- Owasp threat dragon desktop
- P4
- PTF (Marco de donantes) Cheat Sheet
- PTF Comandos
- Packer
- Pacman Package Manager
- Pacu
- Pagodo
- Paramspider
- Pegasus-Pentest-Arsenal Cheat Sheet
- Perplexity AI - Search-Powered Prompting Guide
- Pgp
- PhpStorm
- Pip
- Plink
- Polaris
- Poortego
- Posh virustotal
- PoshC2 Framework Cheat Sheet
- Poshc2 python
- Postman API Testing
- PowerShell Cheatsheet
- Powerlevel10k - High-Performance Zsh Tema
- Powershell empire
- Powersploit
- Powerup
- Powerview
- Powerzure
- Procdump
- Procmon
- Productivity Tools Cheatsheet
- Proxychains
- PuTTY - SSH y Telnet Client para Windows
- Pub
- Puppet
- Puppeteer
- Pupy
- Pure - Minimal Zsh Prompt
- PyCharm
- Pydantic AI Framework Cheat Sheet
- Pyrit
- Pythagora
- Python - Programming Language Reference
- Python dshield
- Python ntfs
- Python uncompyle6
- Python-Pentest-Tools
- Python3 venv
- Pythonidae
- Qark
- Qualys
- Qwen AI Prompting Cheat Sheet
- R2
- RISC-V Assembly Language
- ROADtools Azure AD Assessment Framework Cheat Sheet
- Radare2 - Reverse Engineering Framework
- Railsgoat
- Rancher
- Reaver
- Recon-ng Web Reconnaissance Hoja de Cheat Marco
- Regular Expressions (RegEx) - Pattern Matching
- Rekall
- Remnux
- Responder
- Rider
- Rizin
- Rogue
- Rpcclient
- Rsylog
- Rubeus Kerberos Interaction Tool Cheat Sheet
- RubyMine
- Rust
- SQLmap Cheat Sheet
- Safety
- Scalpel
- Scapy
- Scoop
- Screen
- Scylla
- Searchsploit
- Seatbelt
- SecurityOnion Cheatsheet
- Semgrep
- Serverless goat
- Sessiongopher
- Sguil
- Sharphound
- Sharpup
- Shellter
- Sherlock
- Shosubgo
- Showmount
- Sigma
- Signal
- Silver
- Sleuth kit
- Smbclient
- Smtp-User-Enum
- Snap
- Snmp check
- Snmpwalk
- Snorby
- Snyk
- Socat
- Social Engineer Toolkit (SET) Cheatsheet
- Social Engineering Toolkit (SET) Cheat Sheet
- Solr
- Sonarqube
- Sops
- Sourceforge
- Spark
- Spoofcard
- Spring-Boot
- Squert
- Ssh
- Sshuttle
- Stack
- Stegcracker
- Steghide
- Stego toolkit
- Stegsolve
- Stenographer - Full Packet Capture System
- Storm
- Stormspotter Cheat Sheet
- Strace
- Strelka
- Strings
- Sublime Text
- Sumo Logic Cheatsheet
- Supabase - Open Source Firebase Alternative
- Svn
- Sysdig
- Syslog-Ng
- Systemctl
- Systemd
- Tailscale Cheatsheet
- Taskmaster-AI Automation Framework Cheat Sheet
- Terminal de Windows
- Terraform
- Terragoat
- Testigo Ocular
- Thc hydra
- The little go book
- TheHive Cheat Sheet
- Traefik
- TrevorC2 Framework Cheat Sheet
- Truecrypt
- Trust
- Unicornscan
- Untitledgoosetool
- Uso de Código Claude
- Vagrant
- Vault
- VeraCrypt
- Veracode
- Visual Studio
- Warp - Terminal Potenciado por IA
- Watson
- Waybackurls
- Waypoint
- Wazuh Cheatsheet
- WebStorm
- Webscreenshot
- Weirdaal
- Windbg
- Windows-Exploit-Suggester
- Winlogon
- Winpeas
- Winpmem
- Wire
- Xxd
- Yum
- Zabbix
- Zap api nodejs
- Zerologon-Bof
- Zipkin
- Zoomeye
- Zsh - Shell Z
- Zsteg
- Zuul
- btop - Monitor de Recursos Moderno
- csh - Intérprete de Comandos C
- curl - Cliente HTTP y Transferencia de Datos
- dnSpy - Depurador y Editor de Ensamblados .NET
- ffuf Fast Web Fuzzer Cheat Sheet
- iTerm2 Terminal
- ksh - Korn Shell
- kubectl Cheatsheet
- n8n Workflow Automation Cheat Sheet
- npm Package Manager
- osquery - Instrumentación de sistema operativo basado en SQL
- pfSense Cheatsheet
- ping - Pruebas de conectividad de red
- sh - POSIX Shell
- tmux Cheatsheet
- xterm - Emulador de Terminal del Sistema de Ventanas X
cli-tools¶
cloning¶
cloud¶
- AWS CLI
- AWS Kiro
- Advanced Penetration Testing Methodologies: Master Professional Red Team Operations
- Advanced Threat Hunting Techniques: Master Proactive Cybersecurity Defense in 2025
- Azure CLI
- Cloudflare
- Cloudfox
- Cloudgoat
- Command Line Mastery for Professionals
- DevSecOps Excellence: Integrate Security into Every Stage of Software Development
- Digital Forensics and Incident Response: Master Professional DFIR Operations
- Dominio de la Línea de Comandos para Profesionales
- Enterprise Cloud Security Mastery: Build Bulletproof Multi-Cloud Security Architectures
- Google Cloud CLI (gcloud)
- Hoja de Referencia de Cloud Scout
- Hoja de Referencia de CloudMapper
- Hoja de Referencia del Recolector de Datos AzureHound BloodHound
- K8s
- Network Security Architecture: Design Bulletproof Enterprise Network Defenses
- SOC 2 Compliance for IT Teams: Master Security Framework Implementation
- Zero Trust Network Implementation: A Comprehensive Guide to Modern Security Architecture
cloud architecture¶
cloud governance¶
cloud technologies¶
cloud-architecture¶
- Hybrid Cloud Networking Excellence: Mastering Modern Infrastructure Integration
- Título: Excelencia en Networking de Hybrid Cloud: Dominando la Integración de Infraestructura Moderna
cloud-auditing¶
cloud-computing¶
cloud-infrastructure¶
- Terraform Enterprise Patterns: Mastering Infrastructure as Code at Scale
- Terraform Enterprise Patterns: Mastering Infrastructure as Code at Scale
cloud-management¶
cloud-migration¶
- Hybrid Cloud Networking Excellence: Mastering Modern Infrastructure Integration
- Título: Excelencia en Networking de Hybrid Cloud: Dominando la Integración de Infraestructura Moderna
cloud-security¶
- Arquitectura de Seguridad Multi-Cloud
- CloudSploit Hoja de Referencia
- Comandos de ALTR
- Comandos de Wiz MCP
- Hoja de Referencia de Forseti Security
- Intruder
- Mejores prácticas de seguridad serverless
- Multi-Cloud Security Architecture
- Prowler
- Scoutsuite
- Serverless Security Best Practices
cloud-technologies¶
cloudformation¶
cloudsploit¶
cnapp¶
code-completion¶
- Amazon CodeWhisperer Cheat Sheet
- Claude
- Hoja de Referencia de Amazon Q
- Hoja de Referencia de Claude
- Supermaven
- Tabnine
code-coverage¶
code-generator¶
code-quality¶
code-scanning¶
code-search¶
code-to-cloud-security¶
coding¶
collaboration¶
- Asana Cheatsheet
- Comandos de Gamma
- Google Meet Cheatsheet
- Hoja de Referencia de Excalidraw
- Mattermost Cheatsheet
- Microsoft Teams Cheatsheet
- Monday.com Cheatsheet
- Slack Cheatsheet
- Trello Cheatsheet
- Zoom Cheatsheet
command line¶
command-line¶
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
- Dominio de la Línea de Comandos para Profesionales
- Dominio de la Línea de Comandos para Profesionales
- Dominio de la Línea de Comandos para Profesionales
- Essential Linux Commands for IT Professionals: Master the Foundation of Modern Infrastructure
commands¶
communication¶
- Discord Cheatsheet
- Google Meet Cheatsheet
- IRC Cheatsheet
- Mattermost Cheatsheet
- Microsoft Teams Cheatsheet
- Slack Cheatsheet
- Telegram Cheatsheet
- WhatsApp Business Cheatsheet
- Zoom Cheatsheet
community¶
compliance¶
- AI Guardian Cheatsheet
- AI SBOM Generator Cheatsheet
- Advanced Threat Hunting Techniques: Master Proactive Cybersecurity Defense in 2025
- Ansible Security Automation: Master DevOps Security Excellence
- Arquitectura de Seguridad Multi-Cloud
- CloudSploit Hoja de Referencia
- Comandos de ALTR
- Cribl Guard Cheatsheet
- Digital Forensics and Incident Response: Master Professional DFIR Operations
- Gatekeeper Cheat Sheet
- Hoja de Referencia de Forseti Security
- KICS (Keeping Infrastructure as Code Secure) Cheat Sheet
- Kube-bench Cheatsheet
- Multi-Cloud Security Architecture
- Open Policy Agent (OPA) Cheatsheet
- Privacy Policy
- Prowler
- SOC 2 Compliance for IT Teams: Master Security Framework Implementation
- Scoutsuite
- Steampipe
- Terrascan
- Zero Trust Network Implementation: A Comprehensive Guide to Modern Security Architecture
compliance-reporting¶
compliance-scanning¶
configuration management¶
configuration-management¶
container-security¶
containerization¶
containers¶
- Command Line Mastery for Professionals
- Dominio de la Línea de Comandos para Profesionales
- Falco Cheatsheet
- Trivy Cheatsheet
content-creation¶
context7¶
continuous-deployment¶
continuous-monitoring¶
continuous-security¶
conversational-ai¶
copilot¶
cost optimization¶
covert-access¶
cpu-emulation¶
creative-ai¶
cross-platform¶
- AWS CLI
- Angular
- Ansible
- Apache
- Apktool
- Atajos de VS Code
- Atom
- Azure CLI
- Chef
- Comandos de Docker
- Comandos de Vercel CLI
- Dirbuster
- Django
- El correo electrónico de altavoz y la herramienta de enumeración de subdominio
- Elasticsearch
- Elk
- Express
- Ghidra - NSA Reverse Engineering Framework
- Git Commands
- Gobuster Directory/File Brute Forcer Cheat Sheet
- Google Cloud CLI (gcloud)
- Gpg
- Gradle
- Grafana
- Hashcat
- Helm
- Hexdump
- Hoja de Referencia de Autopsy
- Hoja de Referencia de Burp Suite
- Hoja de Referencia de Frida
- Hoja de Referencia de Vim
- Hoja de Referencia de Volatility
- Hoja de Referencia de Wireshark
- Hoja de referencia de Emacs
- Hydra
- Ida
- IntelliJ IDEA
- Jenkins
- John
- John the ripper
- Kubernetes
- Maltego
- Maven
- Metasploit
- Metasploit framework
- Nikto
- Nmap
- Objeción Hoja de Cheat
- Openssl
- Pip
- Prometheus
- Puppet
- Python - Programming Language Reference
- Radare2 - Reverse Engineering Framework
- React
- Recon-ng Web Reconnaissance Hoja de Cheat Marco
- SQLmap Cheat Sheet
- Shodan
- Sleuth kit
- Splunk Cheatsheet
- Ssh
- Strings
- Terraform
- Vue
- kubectl Cheatsheet
- npm Package Manager
cryptography¶
- DNS Security & DNSSEC: Advanced Protection for Internet Infrastructure
- Gpg
- Hashcat
- John
- John the ripper
- Openssl
cursor¶
customer-service¶
cybersecurity¶
- A Comprehensive Guide to Mobile Incident Response
- Advanced Penetration Testing Methodologies: Master Professional Red Team Operations
- Advanced Threat Hunting Techniques: Master Proactive Cybersecurity Defense in 2025
- Ansible Security Automation: Master DevOps Security Excellence
- Blog
- Cybersecurity Workflow Automation: Transform Your Security Operations with Advanced Automation Frameworks
- DevSecOps Excellence: Integrate Security into Every Stage of Software Development
- Digital Forensics and Evidence Collection: Master Professional Investigation Excellence
- Digital Forensics and Incident Response: Master Professional DFIR Operations
- Enterprise Blockchain Security: A Strategic Implementation Guide
- Enterprise Cloud Security Mastery: Build Bulletproof Multi-Cloud Security Architectures
- Ethical Hacking Methodologies
- Guided Threat Hunts Cheatsheet
- Kubernetes Security Hardening: Bulletproof Container Orchestration Security
- Metodologías de Ethical Hacking
- Network Security Architecture: Design Bulletproof Enterprise Network Defenses
- Recursos
- SOC 2 Compliance for IT Teams: Master Security Framework Implementation
- Seguridad de Blockchain Empresarial: Una Guía Estratégica de Implementación
- Seguridad moderna de API: OAuth 2.1 y más allá
- Zeek Cheatsheet
- Zero Trust Network Implementation: A Comprehensive Guide to Modern Security Architecture
cyera¶
cynthion¶
dalfox¶
darpa-aixcc¶
data engineering¶
- Arquitectura de Data Pipeline Segura: Una Guía Completa
- Secure Data Pipeline Architecture: A Comprehensive Guide
data pipeline¶
- Arquitectura de Data Pipeline Segura: Una Guía Completa
- Secure Data Pipeline Architecture: A Comprehensive Guide
data protection¶
data-collection¶
data-engineering¶
data-governance¶
data-protection¶
data-science¶
data-security¶
data-visualization¶
database¶
debugging¶
- GDB - GNU Debugger
- Logic Analyzer Cheatsheet
- Ltrace
- Ollydbg
- REVEN Cheat Sheet
- Strace
- x64dbg - Depurador de Windows
decentralized¶
decompilation¶
decompiler¶
defi¶
- Enterprise Blockchain Security: A Strategic Implementation Guide
- Seguridad de Blockchain Empresarial: Una Guía Estratégica de Implementación
deployment¶
design¶
desktop-apps¶
- Creación de Aplicaciones y Juegos con Claude Code: Domina el Uso de Prompts para Todas las Plataformas
- Creación de aplicaciones y juegos con Claude Code: Master Prompting para cada plataforma
developer-portal¶
developer-tools¶
developer-workflows¶
development¶
- AI-Assisted Coding: From IDE Assistants to Agent Programming
- Atajos de VS Code
- Augment Code Hoja de Referencia
- Blog
- Claude Code Deshacer
- Claude code ui
- Codeql
- Comandos de Docker
- Enrutador de Código Claude
- Git Commands
- Go for javascript developers
- Herramientas
- Hoja de Referencia de Asistente de Código AI Claude
- Hoja de Referencia de Generación de Código OpenAI Codex
- Lovable.dev Cheat Sheet
- Python - Programming Language Reference
- Recursos
- Supermaven
- Tabnine
- Uso de Código Claude
- Veracode
development-environment¶
development-tools¶
- AI-Assisted Coding: From IDE Assistants to Agent Programming
- Asisted Coding: From IDE Assistant to Agent Programming
- Título: La Evolución del Código AI: De Code Completion a Autonomous Agents
devops¶
- AWS Kiro
- Ansible Security Automation: Master DevOps Security Excellence
- Cloudflare
- Cloudfox
- Cloudgoat
- Comandos de Docker
- Cybersecurity Workflow Automation: Transform Your Security Operations with Advanced Automation Frameworks
- Código Claude para la administración del sistema: Automatización de la infraestructura impulsada por AI
- Essential Linux Commands for IT Professionals: Master the Foundation of Modern Infrastructure
- Falco Cheatsheet
- Hoja de Referencia de Cloud Scout
- Hoja de Referencia de CloudMapper
- Hoja de Referencia de Forseti Security
- Hoja de Referencia del Recolector de Datos AzureHound BloodHound
- Hybrid Cloud Networking Excellence: Mastering Modern Infrastructure Integration
- K8s
- Kube-bench Cheatsheet
- Kube-hunter Cheatsheet
- Kubernetes
- Kubernetes Security Hardening: Bulletproof Container Orchestration Security
- Open Policy Agent (OPA) Cheatsheet
- SRE Incident Management: Master Professional Site Reliability Engineering Excellence
- Terraform Enterprise Patterns: Mastering Infrastructure as Code at Scale
- Terraform Enterprise Patterns: Mastering Infrastructure as Code at Scale
- Trivy Cheatsheet
- Título: Excelencia en Networking de Hybrid Cloud: Dominando la Integración de Infraestructura Moderna
devsecops¶
- Advanced Pipeline Security Integration: Mastering DevSecOps in CI/CD Environments
- Arquitectura de Data Pipeline Segura: Una Guía Completa
- AutoFix AI Agent Cheatsheet
- Hoja de Referencia de Checkov
- Hoja de Referencia de Seguridad de Aikido
- Integración Avanzada de Seguridad en Pipelines: Dominando DevSecOps en Entornos CI/CD
- KICS (Keeping Infrastructure as Code Secure) Cheat Sheet
- Kube-bench Cheatsheet
- Kube-hunter Cheatsheet
- Legit Security Commands
- Secure Data Pipeline Architecture: A Comprehensive Guide
- TFSec Cheat Sheet
- Terrascan
- Trivy Cheatsheet
dfir¶
diagramming¶
digital forensics¶
digital-forensics¶
digital-logic¶
directory¶
directory-enumeration¶
disassembler¶
discord¶
disk-analysis¶
disk-imaging¶
distributed systems¶
distributed tracing¶
- Distributed Tracing Implementation: A Comprehensive Guide for SRE Professionals
- Implementación de Distributed Tracing: Una Guía Completa para Profesionales SRE
dns¶
- Advanced Penetration Testing Methodologies: Master Professional Red Team Operations
- DNS Best Practices & Standards: Master Enterprise Infrastructure Excellence
- DNS Fundamentals & Architecture: Master Internet Infrastructure Excellence
- DNS Management & Administration: Enterprise-Grade Infrastructure Excellence
- DNS Performance Optimization: Master Speed & Efficiency Excellence
- DNS Troubleshooting & Monitoring: Master Network Reliability Excellence
dns security¶
- DNS Management & Administration: Enterprise-Grade Infrastructure Excellence
- DNS Security & DNSSEC: Advanced Protection for Internet Infrastructure
dns-security¶
dnssec¶
docker¶
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
- Dominio de la Línea de Comandos para Profesionales
- GNS3 Cheatsheet
- Trivy Cheatsheet
dockerfile¶
document-forensics¶
documentation¶
dom-analysis¶
dynamic-analysis¶
eda¶
edge computing¶
edr¶
electronics¶
email¶
embedded-security¶
embedded-systems¶
emerging technologies¶
emulation¶
encryption¶
- A Deep Dive into Mobile Device Encryption
- Gpg
- Mejores prácticas de seguridad serverless
- ProtonMail Cheatsheet
- Serverless Security Best Practices
endpoint-discovery¶
engineering management¶
enterprise¶
enterprise infrastructure¶
enterprise it¶
enterprise-ai¶
enterprise-architecture¶
- Terraform Enterprise Patterns: Mastering Infrastructure as Code at Scale
- Terraform Enterprise Patterns: Mastering Infrastructure as Code at Scale
enterprise-security¶
- Enterprise Blockchain Security: A Strategic Implementation Guide
- Nessus Cheatsheet
- Seguridad de Blockchain Empresarial: Una Guía Estratégica de Implementación
esp32¶
ethernet-monitoring¶
ethical-hacking¶
evidence collection¶
expert¶
exploitation¶
external-links¶
falco¶
fiddler¶
file explorer¶
file management¶
financial management¶
fingerprinting¶
finops¶
fintech¶
- Enterprise Blockchain Security: A Strategic Implementation Guide
- Seguridad de Blockchain Empresarial: Una Guía Estratégica de Implementación
firmware¶
flipper-zero¶
flux¶
forensic investigation¶
forensics¶
- Advanced Penetration Testing Methodologies: Master Professional Red Team Operations
- Advanced Threat Hunting Techniques: Master Proactive Cybersecurity Defense in 2025
- Binwalk - Herramienta de Análisis de Firmware
- BitUnlocker Cheatsheet
- Dd
- DevSecOps Excellence: Integrate Security into Every Stage of Software Development
- Digital Forensics and Incident Response: Master Professional DFIR Operations
- Enterprise Cloud Security Mastery: Build Bulletproof Multi-Cloud Security Architectures
- Hexdump
- Hoja de Referencia de Autopsy
- Hoja de Referencia de Volatility
- Hoja de Referencia de Wireshark
- Network Security Architecture: Design Bulletproof Enterprise Network Defenses
- SOC 2 Compliance for IT Teams: Master Security Framework Implementation
- Sleuth kit
- Strings
- Zero Trust Network Implementation: A Comprehensive Guide to Modern Security Architecture
forseti-security¶
frameworks¶
frontend¶
fusion-360¶
future-of-coding¶
fuzzing¶
game-development¶
- Creación de Aplicaciones y Juegos con Claude Code: Domina el Uso de Prompts para Todas las Plataformas
- Creación de aplicaciones y juegos con Claude Code: Master Prompting para cada plataforma
gatekeeper¶
gcp¶
- CloudSploit Hoja de Referencia
- Google Cloud CLI (gcloud)
- Hybrid Cloud Networking Excellence: Mastering Modern Infrastructure Integration
- Steampipe
- Título: Excelencia en Networking de Hybrid Cloud: Dominando la Integración de Infraestructura Moderna
gcp-security¶
gdpr¶
generative-ai¶
getting-started¶
ghidra¶
git¶
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
- Dominio de la Línea de Comandos para Profesionales
github copilot¶
github-copilot¶
- AI-Assisted Coding: From IDE Assistants to Agent Programming
- Asisted Coding: From IDE Assistant to Agent Programming
gitops¶
gns3¶
google-cloud¶
google-meet¶
governance¶
- AI Guardian Cheatsheet
- Arquitectura de Seguridad Multi-Cloud
- Enterprise Blockchain Security: A Strategic Implementation Guide
- Multi-Cloud Security Architecture
- Open Policy Agent (OPA) Cheatsheet
- Seguridad de Blockchain Empresarial: Una Guía Estratégica de Implementación
gpt-4¶
gpt-5¶
great-scott-gadgets¶
greenbone¶
gui-application¶
- Atajos de VS Code
- Atom
- Dirbuster
- Ghidra - NSA Reverse Engineering Framework
- Hoja de Referencia de Autopsy
- Hoja de Referencia de Burp Suite
- Hoja de Referencia de Wireshark
- Hoja de referencia de Emacs
- Ida
- IntelliJ IDEA
- Maltego
- Ollydbg
- Splunk Cheatsheet
- x64dbg - Depurador de Windows
guides¶
gvm¶
hackrf¶
hak5¶
- Hak5 Key Croc Cheatsheet
- Hak5 LAN Turtle Cheatsheet
- Hak5 Packet Squirrel Cheatsheet
- Hak5 Shark Jack Cheatsheet
- WiFi Pineapple Cheatsheet
hardware¶
- 3D Printable PCB Cheatsheet
- Bjorn Cheatsheet
- BladeRF Cheatsheet
- ESP32 Marauder Cheatsheet
- Flipper Zero Cheatsheet
- Flipper Zero Firmware Cheatsheet
- HackRF One Cheatsheet
- KiCad Cheatsheet
- Momentum Firmware Cheatsheet
- PandwaRF Cheatsheet
- PortaPack Cheatsheet
- RTL-SDR Cheatsheet
- WiFi Pineapple Cheatsheet
hardware-design¶
hardware-hacking¶
hardware-security¶
hashicorp¶
- Terraform Enterprise Patterns: Mastering Infrastructure as Code at Scale
- Terraform Enterprise Patterns: Mastering Infrastructure as Code at Scale
hayabusa¶
high availability¶
- Advanced Load Balancing Strategies for Modern Infrastructure
- Advanced Load Balancing Strategies for Modern Infrastructure
homepage¶
hop-analysis¶
http-proxy¶
humint¶
hybrid-cloud¶
- Arquitectura de Seguridad Multi-Cloud
- Hybrid Cloud Networking Excellence: Mastering Modern Infrastructure Integration
- Multi-Cloud Security Architecture
- Título: Excelencia en Networking de Hybrid Cloud: Dominando la Integración de Infraestructura Moderna
iOS¶
- A Deep Dive into iOS App Management & Deployment
- A Deep Dive into iOS Enterprise Configuration
- A Deep Dive into iOS Network & VPN Configuration
- A Deep Dive into iOS Network & VPN Configuration
iac¶
- Terraform
- Terraform Enterprise Patterns: Mastering Infrastructure as Code at Scale
- Terraform Enterprise Patterns: Mastering Infrastructure as Code at Scale
- Trivy Cheatsheet
iac-security¶
iam¶
icopy-x¶
ida-pro¶
ide-assistants¶
- AI-Assisted Coding: From IDE Assistants to Agent Programming
- Asisted Coding: From IDE Assistant to Agent Programming
ide-editors¶
ide-integration¶
identity-security¶
implementation¶
incident management¶
incident response¶
- A Comprehensive Guide to Mobile Incident Response
- Digital Forensics and Evidence Collection: Master Professional Investigation Excellence
- SRE Incident Management: Master Professional Site Reliability Engineering Excellence
incident-response¶
- Autonomous PowerShell Agent Cheatsheet
- BitUnlocker Cheatsheet
- Comandos de Vectra AI
- Hayabusa & Suzaku Cheatsheet
- PagerDuty
index¶
information-gathering¶
infrastructure¶
- Código Claude para la administración del sistema: Automatización de la infraestructura impulsada por AI
- Essential Linux Commands for IT Professionals: Master the Foundation of Modern Infrastructure
- Hybrid Cloud Networking Excellence: Mastering Modern Infrastructure Integration
- Network Performance Optimization: A Comprehensive Guide
- Terraform
- Título: Excelencia en Networking de Hybrid Cloud: Dominando la Integración de Infraestructura Moderna
infrastructure protection¶
infrastructure security¶
- Ansible Security Automation: Master DevOps Security Excellence
- Edge Security Architecture: Comprehensive Guide to Securing Distributed Computing Infrastructure
infrastructure-as-code¶
- Hoja de Referencia de Checkov
- Hoja de Referencia de env0
- KICS (Keeping Infrastructure as Code Secure) Cheat Sheet
- Pulumi
- TFSec Cheat Sheet
- Terraform Enterprise Patterns: Mastering Infrastructure as Code at Scale
- Terraform Enterprise Patterns: Mastering Infrastructure as Code at Scale
- Terragrunt
- Terrascan
infrastructure-engineering¶
- Terraform Enterprise Patterns: Mastering Infrastructure as Code at Scale
- Terraform Enterprise Patterns: Mastering Infrastructure as Code at Scale
infrastructure-monitoring¶
infrastructure-security¶
instagram¶
integration-testing¶
intelligence-gathering¶
intermediate¶
- ADConnectDump Hoja de Referencia de Herramienta de Extracción de Credenciales de Azure AD Connect
- ASNmap Hoja de Referencia de Mapeo de ASN
- AWS CLI
- AWS Kiro
- Aadinternals
- Acunetix
- Age
- Alacritty - Terminal Acelerado por GPU
- Amazon CodeWhisperer Cheat Sheet
- Anchore
- Angular
- Ansible
- Apache
- Apimonitor
- Apktool
- Apt-Get
- Aqua
- Aquatone
- Arjun
- Arp-Scan
- Asreproast
- Assetfinder
- Atomic red team
- Augment Code Hoja de Referencia
- Awesome nodejs
- Awesome-Go
- Awesome-Java
- Awesome-Javascript
- Awesome-Python
- Azure CLI
- Backdoors & Breaches Comandos
- Bandit
- Bash bunny
- Batch
- Bazaar
- Bazel
- Beacon
- Bettercap
- Bingoo
- Binwalk - Herramienta de Análisis de Firmware
- Bitbucket
- Bitlocker
- Borrador
- Brakeman
- Brutespray
- Bully
- Bundler
- Burp
- Bwapp
- Bzr
- CLI de DigitalOcean (doctl)
- CLion
- Caine
- Censys
- Censys-Python
- Cewl
- Chai
- ChatGPT y GPT-4 - Guía de Prompting de IA
- Cheatsheet-Dios
- Checkmarx
- Chef
- Chocolatey
- Clair
- Clang/LLVM - Infraestructura de Compilador Moderno
- Class-Dump
- Claude
- Claude - Guía de Prompting de IA
- Claude Code Deshacer
- Claude code ui
- Claudia
- Cloudflare
- Cloudfox
- Cloudgoat
- Cobertura
- Codeql
- Comandos ELSA
- Comandos de ALTR
- Comandos de Bugsy
- Comandos de Cortex
- Comandos de Divjoy
- Comandos de Docker
- Comandos de ElevenLabs
- Comandos de Vercel CLI
- Comandos de Wiz MCP
- Comandos de Xplico
- Composer
- Comsvcs
- Conda
- Confiable
- Consul
- Context7 Hoja de Referencia del Servidor MCP
- Corchetes
- Cowpatty
- CrackMapExec Hoja de Referencia
- Cron
- Crowbar
- Crunch
- Cti-Python-Stix2
- Cupp
- Cursor
- Cybersecurity Workflow Automation: Transform Your Security Operations with Advanced Automation Frameworks
- Datadog
- Dc3Dd
- Dcfldd
- Dd
- Decryptautologon
- Descubre la herramienta del motor de búsqueda
- Desvíos
- Dex2Jar
- Diagon
- Dig - Búsqueda y Resolución de DNS
- Dirsearch
- Django
- Docker Bench Hoja de Referencia
- Dostackbufferoverflowgood
- Dradis
- Drone
- Duckduckgo
- Dumpit
- Eaphammer
- Editor Zed
- Editor de Windsurf
- Elastic SIEM Cheatsheet
- Elasticsearch
- Elemento
- Emerge
- Enrutador de Código Claude
- Enum4Linux
- Evilgophish
- Excel - Fórmulas, Funciones y Productividad
- Exegol
- Exiftool
- Fakelogonscreen
- Faker
- Fast-Google-Dorks-Scan
- Fastapi
- Feroxbuster
- Findomain
- Firebase - Plataforma Backend-as-a-Service de Google
- Flamingo
- Flare-Vm
- Flink
- Fluxion
- Ftkimager
- GCC - Colección de Compiladores GNU
- Garak
- Gau
- Gedit
- Gem
- Gemini cli
- Gemini prompting
- Gestor de Paquetes APT
- Gestor de Paquetes YUM/DNF
- Ghostpack
- Ghostty - Terminal Emulator
- GitHub Copilot Cheat Sheet
- Gnome terminal
- Go for javascript developers
- Go-Audit
- GoLand
- Goad
- Goatrider
- Goby
- Godoh
- Godpotato
- Goexec
- Gofetch
- Golang
- Golden-Guide-For-Pentesting
- Goldencopy
- Goodfaith
- Goodhound
- Goodork
- Googd0rker
- Google Cloud CLI (gcloud)
- Google domain fronting
- Goohak
- Gopher
- Gopherus
- Goversioninfo
- Gpg
- Gradle
- Grafana
- Gruyere
- Guymager
- HTTPX Toolkit Cheat Sheet
- Harness
- Hashcat
- Helm
- Herramienta de auditoría de seguridad de Lynis
- Hg
- Hoja de Referencia Rápida del Generador de Listas de Palabras de Subdominio AlterX
- Hoja de Referencia de Amazon Q
- Hoja de Referencia de AndroGuard
- Hoja de Referencia de Ant
- Hoja de Referencia de Arachni
- Hoja de Referencia de Ares RAT
- Hoja de Referencia de Asistente de Código AI Claude
- Hoja de Referencia de Autopsy
- Hoja de Referencia de BeEF Browser Exploitation Framework
- Hoja de Referencia de BloodHound
- Hoja de Referencia de Brute Ratel C4 Framework
- Hoja de Referencia de Burp Suite
- Hoja de Referencia de Checkov
- Hoja de Referencia de Chisel
- Hoja de Referencia de Cisco ASA
- Hoja de Referencia de Claude
- Hoja de Referencia de ClickUp
- Hoja de Referencia de Cloud Scout
- Hoja de Referencia de CloudMapper
- Hoja de Referencia de Cobalt Strike
- Hoja de Referencia de CrewAI Multi-Agent Framework
- Hoja de Referencia de Cutter
- Hoja de Referencia de CyberChef
- Hoja de Referencia de DVWA (Damn Vulnerable Web Application)
- Hoja de Referencia de Dia Browser
- Hoja de Referencia de Drozer
- Hoja de Referencia de Empire Framework
- Hoja de Referencia de ExploitDB
- Hoja de Referencia de FOCA
- Hoja de Referencia de Generación de Código OpenAI Codex
- Hoja de Referencia de Gestión de DNS
- Hoja de Referencia de Herramienta de Auditoría de Seguridad Azure Azucar
- Hoja de Referencia de Herramienta de Evaluación de Seguridad de Azure
- Hoja de Referencia de Herramienta de Inyección de Pulsaciones USB Rubber Ducky
- Hoja de Referencia de Herramienta de Phishing Blackeye
- Hoja de Referencia de Seguridad de Aikido
- Hoja de Referencia de Twint Herramienta OSINT de Twitter
- Hoja de Referencia de VSagent
- Hoja de Referencia de Veil
- Hoja de Referencia de Velociraptor
- Hoja de Referencia de Vim
- Hoja de Referencia de W3af (Web Application Attack Framework)
- Hoja de Referencia de Wapiti
- Hoja de Referencia de Wfuzz
- Hoja de Referencia de WifiForge
- Hoja de Referencia de Wifiphisher Wireless Phishing Framework
- Hoja de Referencia de Wireshark
- Hoja de Referencia de YARA
- Hoja de Referencia de env0
- Hoja de Referencia del Framework C2 Villain
- Hoja de Referencia del Framework Covenant C2
- Hoja de Referencia del Framework Multi-Agente AutoGen
- Hoja de Referencia del Framework de Phishing EvilGinx2
- Hoja de Referencia del Recolector de Datos AzureHound BloodHound
- Hoja de Trucos de Aircrack-ng
- Hoja de Trucos de Prompting de DeepSeek AI
- Hoja de Trucos de WebGoat
- Hoja de Trucos de Wifite
- Hoja de Trucos de Zmap
- Hoja de Trucos para Siesta de Bebé
- Hoja de referencia de CMake
- Hoja de referencia de Emacs
- Homebrew
- Host - Simple DNS Lookup Tool
- Hping3
- Hydra
- Hyper
- IDA Pro - Interactive Disassembler Professional
- Immunity
- Impacket
- Init
- Insomnia
- IntelliJ IDEA
- Intruder
- Invoke-Obfuscation Cheat Sheet
- Istio
- Jaeger
- Java deserialization scanner
- Java idx parser
- JavaScript - Modern Web Development
- Javascript malware collection
- Jenkins
- Joe
- John
- John the ripper
- Judas
- Juice-Shop
- Jupyter Notebook
- K8s
- Kafka
- Kali linux
- Karma
- Katana
- Kerberoast
- Keybase
- Kibana
- Kind
- King phisher
- Kingofbugbountytips
- Kismet
- Kiwi
- Knockpy
- Koadic
- Kong
- LangChain Framework Cheat Sheet
- Langgraph
- Lanzamiento C2 Marco de la hoja de Cheat
- Lazagne
- Ldd
- Legit Security Commands
- Lenguaje de Ensamblador AArch64 (ARM64)
- Lenguaje de Ensamblador ARM (32 bits)
- Lenguaje de Ensamblador x86 (32 bits)
- Lenguaje de Ensamblador x86-64 (64 bits)
- Lighttpd
- Ligolo
- Ligolo-Ng
- Linear
- Linenum
- Linkerd
- Linpeas
- Linpmem
- Linux File Management Cheat Sheet
- Linux Network Commands Cheat Sheet
- Linux Process Management Cheat Sheet
- Linux exploit suggester
- Linux text processing
- Linuxprivchecker
- Llama - Meta's Open Source AI Prompting Guide
- Llamaindex
- Lldb
- Lo Primordial
- Lovable.dev Cheat Sheet
- Lsassy
- Ltrace
- Luks
- MIPS Assembly Language
- Mac Terminal (Terminal.app) - macOS Native Terminal
- Make
- Maltego
- Malwoverview Cheat Sheet
- Masscan - Escáner de puerto de alta velocidad
- Maven
- Medusa
- Meg
- Megatron java
- Memcached
- Mercurial
- Merlin C2 Framework Cheat Sheet
- Metabigor
- Metagoofil
- Metasploitable
- Meterpreter
- Microburst
- Microsoft Sentinel Cheatsheet
- Mimikatz Cheat Sheet
- Misp
- Mix
- MobSF (Mobile Security Framework) Cheat Sheet
- Model Context Protocol (MCP) Servers Cheat Sheet
- Modlishka
- Msfconsole
- Msfvenom
- Mutillidae
- Naabu
- Nagios
- Nano
- Nanodump
- Nats
- Nbtscan
- Ncat
- Ncrack
- Needle
- Neovim
- NetExec
- Netcat
- Netdiscover
- Networkminer
- Nexpose
- Nginx
- Ngrok
- Ninja
- Nix
- Nmap
- Nodegoat
- Notify Notification System Cheat Sheet
- Nslookup - DNS Lookup and Troubleshooting
- Nuclei
- Nuget
- OSSEC Sistema de detección de intrusiones con sede en el anfitrión
- OWASP API Security Top 10 Commands
- OWASP Amass Network Mapping Tool Cheat Sheet
- Objdump
- Objeción Hoja de Cheat
- Obsidian Cheatsheet
- Oh My Posh - Cross-Platform Prompt Engine
- Oh My Zsh - Zsh Framework and Configuration Manager
- Ollama
- Onesixtyone
- OpenCanary Cheatsheet
- OpenVPN Cheatsheet
- Openshift
- Openssl
- Opentelemetry
- Opentracing
- Outguess
- Outline VPN Cheatsheet
- Owasp threat dragon desktop
- P4
- PTF (Marco de donantes) Cheat Sheet
- PTF Comandos
- Packer
- Pacman Package Manager
- Pacu
- Pagodo
- Paramspider
- Pegasus-Pentest-Arsenal Cheat Sheet
- Perplexity AI - Search-Powered Prompting Guide
- Pgp
- PhpStorm
- PlexTrac Cheat Sheet
- Plink
- Polaris
- Poortego
- Port
- Posh virustotal
- PoshC2 Framework Cheat Sheet
- Poshc2 python
- Postman API Testing
- PowerShell Cheatsheet
- Powerlevel10k - High-Performance Zsh Tema
- Powershell empire
- Powersploit
- Powerup
- Powerview
- Powerzure
- Procdump
- Procmon
- Productivity Tools Cheatsheet
- Prometheus
- Proxychains
- PuTTY - SSH y Telnet Client para Windows
- Pub
- Puppet
- Puppeteer
- Pupy
- Pure - Minimal Zsh Prompt
- PyCharm
- Pydantic AI Framework Cheat Sheet
- Pyrit
- Pythagora
- Python dshield
- Python ntfs
- Python uncompyle6
- Python-Pentest-Tools
- Python3 venv
- Pythonidae
- Qark
- Qodana
- Qualys
- Qwen AI Prompting Cheat Sheet
- R2
- RISC-V Assembly Language
- ROADtools Azure AD Assessment Framework Cheat Sheet
- Railsgoat
- Rancher
- React
- Reaver
- Recon-ng Web Reconnaissance Hoja de Cheat Marco
- Regular Expressions (RegEx) - Pattern Matching
- Rekall
- Remnux
- Responder
- Rider
- Rizin
- Rogue
- Rpcclient
- Rsylog
- Rubeus Kerberos Interaction Tool Cheat Sheet
- RubyMine
- Runway
- Rust
- SQLmap Cheat Sheet
- Safety
- Scalpel
- Scapy
- Scoop
- Scraper API Commands
- Screen
- Scylla
- Searchsploit
- Seatbelt
- SecurityOnion Cheatsheet
- Semgrep
- Serverless goat
- Sessiongopher
- Sguil
- Sharphound
- Sharpup
- Shellter
- Sherlock
- Shosubgo
- Showmount
- Sigma
- Signal
- Silver
- Sleuth kit
- Smbclient
- Smtp-User-Enum
- Snap
- Snmp check
- Snmpwalk
- Snorby
- Snyk
- Socat
- Social Engineer Toolkit (SET) Cheatsheet
- Social Engineering Toolkit (SET) Cheat Sheet
- Solr
- Sonarcloud
- Sonarqube
- Sops
- Sourceforge
- Sourcegraph
- Spark
- Spiderfoot
- Spoofcard
- Spring-Boot
- Squert
- Sshuttle
- Stack
- Stegcracker
- Steghide
- Stego toolkit
- Stegsolve
- Stenographer - Full Packet Capture System
- Storm
- Stormspotter Cheat Sheet
- Strace
- Strelka
- Sublime Text
- Sumo Logic Cheatsheet
- Supabase - Open Source Firebase Alternative
- Svn
- Sysdig
- Syslog-Ng
- Systemd
- TFSec Cheat Sheet
- Tailscale Cheatsheet
- Taskmaster-AI Automation Framework Cheat Sheet
- Terminal de Windows
- Terraform
- Terragoat
- Testigo Ocular
- Thc hydra
- The little go book
- TheHive Cheat Sheet
- Traefik
- TrevorC2 Framework Cheat Sheet
- Truecrypt
- Trust
- Unicornscan
- Untitledgoosetool
- Uso de Código Claude
- Vagrant
- Vault
- VeraCrypt
- Veracode
- Visual Studio
- Vue
- Warp - Terminal Potenciado por IA
- Watson
- Waybackurls
- Waypoint
- Wazuh Cheatsheet
- WebStorm
- Webscreenshot
- Weirdaal
- Windbg
- Windows-Exploit-Suggester
- Winlogon
- Winpeas
- Winpmem
- Wire
- Xxd
- Yum
- Zabbix
- Zap api nodejs
- Zerologon-Bof
- Zipkin
- Zoomeye
- Zsteg
- Zuul
- btop - Monitor de Recursos Moderno
- csh - Intérprete de Comandos C
- curl - Cliente HTTP y Transferencia de Datos
- dnSpy - Depurador y Editor de Ensamblados .NET
- ffuf Fast Web Fuzzer Cheat Sheet
- iTerm2 Terminal
- ksh - Korn Shell
- kubectl Cheatsheet
- n8n Workflow Automation Cheat Sheet
- osquery - Instrumentación de sistema operativo basado en SQL
- pfSense Cheatsheet
- ping - Pruebas de conectividad de red
- sh - POSIX Shell
- tmux Cheatsheet
- xterm - Emulador de Terminal del Sistema de Ventanas X
internal-developer-platform¶
internal-tools¶
internet¶
internet protocols¶
intrusion-detection¶
investigation¶
ios¶
iot security¶
iot-security¶
iperf¶
iperf3¶
irc¶
issue-tracking¶
it-professionals¶
java-analysis¶
java-development¶
javascript¶
javascript-analysis¶
jetbrains¶
jitter-measurement¶
jsparser¶
k8s¶
kanban¶
key-croc¶
keylogging¶
keystroke-injection¶
kicad¶
kics¶
kiterunner¶
kubernetes¶
- Calico
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
- Falco Cheatsheet
- Gatekeeper Cheat Sheet
- Helm
- Hoja de Referencia de ArgoCD
- Hoja de Referencia de FluxCD
- KEDA
- KICS (Keeping Infrastructure as Code Secure) Cheat Sheet
- Kube-bench Cheatsheet
- Kube-hunter Cheatsheet
- Kubernetes Security Hardening: Bulletproof Container Orchestration Security
- Kustomize
- Open Policy Agent (OPA) Cheatsheet
- Steampipe
- Terrascan
- Trivy Cheatsheet
- kubectl Cheatsheet
lab401¶
lan-turtle¶
langchain¶
large-language-models¶
latency-analysis¶
latency-testing¶
learning¶
legal¶
library¶
library-calls¶
lighthouse¶
linux¶
- Advanced Penetration Testing Methodologies: Master Professional Red Team Operations
- Bash - Bourne Again Shell
- Binwalk - Herramienta de Análisis de Firmware
- Crontab
- Dd
- DevSecOps Excellence: Integrate Security into Every Stage of Software Development
- Dirb
- Enterprise Cloud Security Mastery: Build Bulletproof Multi-Cloud Security Architectures
- Essential Linux Commands for IT Professionals: Master the Foundation of Modern Infrastructure
- Fish - Shell Interactivo Amigable
- GDB - GNU Debugger
- Hoja de Trucos de Aircrack-ng
- Ltrace
- Masscan - Escáner de puerto de alta velocidad
- Network Security Architecture: Design Bulletproof Enterprise Network Defenses
- Nginx
- Screen
- Strace
- Systemctl
- Zsh - Shell Z
- tmux Cheatsheet
linux-security¶
llm¶
llm-agent¶
load balancing¶
- Advanced Load Balancing Strategies for Modern Infrastructure
- Advanced Load Balancing Strategies for Modern Infrastructure
logging¶
logic-analyzer¶
low-code¶
mac-address-tracking¶
machine-learning¶
macos¶
malware¶
malware-analysis¶
man-in-the-middle¶
mattermost¶
mcp¶
mdr¶
memory-analysis¶
messaging¶
- Discord Cheatsheet
- Slack Cheatsheet
- Snapchat Cheatsheet
- Telegram Cheatsheet
- WhatsApp Business Cheatsheet
meta-programming¶
- Building Self-Referential Applications with Claude Code: Advanced Prompting for Meta-Programming
- Construcción de Aplicaciones Auto-Referenciales con Claude Code: Prompting Avanzado para Meta-Programación
metadata-analysis¶
metrics¶
microblogging¶
microservices¶
- Distributed Tracing Implementation: A Comprehensive Guide for SRE Professionals
- Implementación de Distributed Tracing: Una Guía Completa para Profesionales SRE
microsoft-teams¶
mitmproxy¶
mlops¶
mobile device management¶
mobile security¶
- A Comprehensive Guide to Mobile App Security Assessment
- A Comprehensive Guide to Mobile Incident Response
- A Deep Dive into Mobile Device Encryption
mobile-development¶
- Creación de Aplicaciones y Juegos con Claude Code: Domina el Uso de Prompts para Todas las Plataformas
- Creación de aplicaciones y juegos con Claude Code: Master Prompting para cada plataforma
mobile-security¶
monday.com¶
monitoring¶
- DNS Performance Optimization: Master Speed & Efficiency Excellence
- DNS Troubleshooting & Monitoring: Master Network Reliability Excellence
- Distributed Tracing Implementation: A Comprehensive Guide for SRE Professionals
- Elk
- Falco Cheatsheet
- Grafana
- Implementación de Distributed Tracing: Una Guía Completa para Profesionales SRE
- MLOps Pipeline Implementation: A Comprehensive Guide for Data Engineers
- New Relic
- Performance Optimization Commands: Master Professional Command-Line Excellence
- Prometheus
- Splunk Cheatsheet
mtr¶
multi-cloud¶
- Arquitectura de Seguridad Multi-Cloud
- CloudSploit Hoja de Referencia
- Multi-Cloud Security Architecture
multi-cloud-security¶
multimedia¶
my-traceroute¶
natural-language-processing¶
ndr¶
nessus¶
network¶
- Advanced Penetration Testing Methodologies: Master Professional Red Team Operations
- Advanced Threat Hunting Techniques: Master Proactive Cybersecurity Defense in 2025
- DevSecOps Excellence: Integrate Security into Every Stage of Software Development
- Digital Forensics and Incident Response: Master Professional DFIR Operations
- Enterprise Cloud Security Mastery: Build Bulletproof Multi-Cloud Security Architectures
- Network Performance Optimization: A Comprehensive Guide
- Network Security Architecture: Design Bulletproof Enterprise Network Defenses
- SOC 2 Compliance for IT Teams: Master Security Framework Implementation
- Zero Trust Network Implementation: A Comprehensive Guide to Modern Security Architecture
network administration¶
network diagnostics¶
network infrastructure¶
- Advanced Load Balancing Strategies for Modern Infrastructure
- Advanced Load Balancing Strategies for Modern Infrastructure
- DNS Best Practices & Standards: Master Enterprise Infrastructure Excellence
- DNS Fundamentals & Architecture: Master Internet Infrastructure Excellence
- DNS Performance Optimization: Master Speed & Efficiency Excellence
network security¶
- DNS Security & DNSSEC: Advanced Protection for Internet Infrastructure
- Edge Security Architecture: Comprehensive Guide to Securing Distributed Computing Infrastructure
network-analysis¶
network-benchmarking¶
network-design¶
network-diagnostics¶
network-forensics¶
network-learning¶
network-monitoring¶
network-performance¶
network-security¶
- Acunetix
- Arpwatch Cheatsheet
- Bjorn Cheatsheet
- Comandos de Vectra AI
- Hak5 LAN Turtle Cheatsheet
- Hak5 Packet Squirrel Cheatsheet
- Hak5 Shark Jack Cheatsheet
- Hoja de Referencia de Boofuzz
- Hoja de Referencia de Wireshark
- Hping3
- Hybrid Cloud Networking Excellence: Mastering Modern Infrastructure Integration
- Linux Network Commands Cheat Sheet
- Masscan - Escáner de puerto de alta velocidad
- Nessus Cheatsheet
- NetExec
- Netcat
- Netdiscover
- Networkminer
- Nmap
- OpenVAS Cheatsheet
- SSHamble Cheatsheet
- Título: Excelencia en Networking de Hybrid Cloud: Dominando la Integración de Infraestructura Moderna
- WiFi Pineapple Cheatsheet
- Zeek Cheatsheet
- ping - Pruebas de conectividad de red
- tshark Cheatsheet
network-simulation¶
network-surveillance¶
network-testing¶
network-tracing¶
network-training¶
network-troubleshooting¶
networking¶
- A Practical Guide to Implementing a Software-Defined Perimeter (SDP)
- Acunetix
- Apache
- Envoy Proxy
- GNS3 Cheatsheet
- Hping3
- Hybrid Cloud Networking Excellence: Mastering Modern Infrastructure Integration
- Linux Network Commands Cheat Sheet
- NetExec
- Netcat
- Netdiscover
- Networkminer
- Nginx
- Packet Tracer Cheatsheet
- Ssh
- Título: Excelencia en Networking de Hybrid Cloud: Dominando la Integración de Infraestructura Moderna
- ping - Pruebas de conectividad de red
- tshark Cheatsheet
newsletter¶
nfc¶
nist¶
no-code¶
non-human-identities¶
nsa-tools¶
ntt-data¶
observability¶
- Distributed Tracing Implementation: A Comprehensive Guide for SRE Professionals
- Implementación de Distributed Tracing: Una Guía Completa para Profesionales SRE
office-365¶
omg-cable¶
online-meetings¶
opa¶
open-source¶
- Akheron Proxy Cheatsheet
- Buttercup CRS Cheatsheet
- Hayabusa & Suzaku Cheatsheet
- Mattermost Cheatsheet
- PrusaSlicer Cheatsheet
- SigmaOptimizer Cheatsheet
openai¶
opengraph¶
openvas¶
operating systems¶
operating-systems¶
optimization¶
orchestration¶
osint¶
- Commercial Intelligence Blend Tools Cheatsheet
- El correo electrónico de altavoz y la herramienta de enumeración de subdominio
- Maltego
- Recon-ng Web Reconnaissance Hoja de Cheat Marco
- Shodan
osint-automation¶
osint-investigation¶
overview¶
owasp¶
package-management¶
package-managers¶
packet-analysis¶
packet-capture¶
packet-loss¶
packet-squirrel¶
packet-tracer¶
pandwarf¶
password-cracking¶
path-discovery¶
pcap¶
pcb¶
pcb-design¶
penetration-testing¶
- Arp-Scan
- CrackMapExec Hoja de Referencia
- Dirsearch
- Enum4Linux
- Ethical Hacking Methodologies
- Fast-Google-Dorks-Scan
- Golden-Guide-For-Pentesting
- HTTPX Toolkit Cheat Sheet
- Hak5 Key Croc Cheatsheet
- Hak5 LAN Turtle Cheatsheet
- Hak5 Packet Squirrel Cheatsheet
- Hak5 Shark Jack Cheatsheet
- Hoja de Referencia de Burp Suite
- Hoja de Referencia de Dalfox
- Hoja de Referencia de ExploitDB
- Hoja de Referencia de Herramienta de Evaluación de Seguridad de Azure
- Hoja de Referencia de WhatWeb
- Hoja de Referencia de XSStrike
- Hoja de Trucos de Aircrack-ng
- Hoja de Trucos de WebGoat
- Hydra
- JSParser Cheat Sheet
- Java deserialization scanner
- Kiterunner
- Kube-hunter Cheatsheet
- Lighttpd
- Linenum
- Linux exploit suggester
- Metasploit
- Metasploit framework
- Metodologías de Ethical Hacking
- Nbtscan
- Ncrack
- Nessus Cheatsheet
- Nmap
- O.MG Cable Cheatsheet
- OSSEC Sistema de detección de intrusiones con sede en el anfitrión
- OWASP API Security Top 10 Commands
- OpenCanary Cheatsheet
- OpenVAS Cheatsheet
- OpenVPN Cheatsheet
- Openshift
- Opentelemetry
- Opentracing
- PTF Comandos
- PandwaRF Cheatsheet
- Pegasus-Pentest-Arsenal Cheat Sheet
- Prowler
- Proxmark 3 RDV4 Cheatsheet
- Python-Pentest-Tools
- SQLmap Cheat Sheet
- Scoutsuite
- SecurityOnion Cheatsheet
- Smtp-User-Enum
- Stegcracker
- Subzy
- USBNinja Cheatsheet
- Unicornscan
- Waybackurls
- WebStorm
- Webscreenshot
- Windows-Exploit-Suggester
- curl - Cliente HTTP y Transferencia de Datos
- iCopy-X Cheatsheet
- mitmproxy Cheatsheet
pentest-reporting¶
pentesting¶
- Bjorn Cheatsheet
- ESP32 Marauder Cheatsheet
- Flipper Zero Cheatsheet
- Flipper Zero Firmware Cheatsheet
- HackRF One Cheatsheet
- Momentum Firmware Cheatsheet
- PTHelper Cheat Sheet
performance¶
- Advanced Load Balancing Strategies for Modern Infrastructure
- Advanced Load Balancing Strategies for Modern Infrastructure
- Network Performance Optimization: A Comprehensive Guide
performance optimization¶
- DNS Performance Optimization: Master Speed & Efficiency Excellence
- Performance Optimization Commands: Master Professional Command-Line Excellence
performance-testing¶
perplexity¶
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
photo-sharing¶
ping¶
pingplotter¶
pipeline¶
pipeline-security¶
- Advanced Pipeline Security Integration: Mastering DevSecOps in CI/CD Environments
- Integración Avanzada de Seguridad en Pipelines: Dominando DevSecOps en Entornos CI/CD
platform-engineering¶
plugins¶
policy¶
policy-as-code¶
- KICS (Keeping Infrastructure as Code Secure) Cheat Sheet
- Open Policy Agent (OPA) Cheatsheet
- Terrascan
policy-enforcement¶
port-scanning¶
portapack¶
powershell¶
presentation¶
presentation-design¶
privacy¶
- A Deep Dive into iOS Security & Privacy Settings
- Privacy Policy
- ProtonMail Cheatsheet
- Telegram Cheatsheet
productivity¶
- Asana Cheatsheet
- Comandos de Gamma
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
- Essential Linux Commands for IT Professionals: Master the Foundation of Modern Infrastructure
- Hoja de Referencia de ClickUp
- Hoja de Referencia de DevDocs
- Microsoft Teams Cheatsheet
- Monday.com Cheatsheet
- Presentify Commands
- Screen
- Slack Cheatsheet
- Supermaven
- Tabnine
- Trello Cheatsheet
- Windows 11 Advanced File Management: Master Professional Organization Excellence
- tmux Cheatsheet
professional development¶
professional reference¶
- Performance Optimization Commands: Master Professional Command-Line Excellence
- SRE Incident Management: Master Professional Site Reliability Engineering Excellence
professional-development¶
programming¶
- Augment Code Hoja de Referencia
- Claude Code Deshacer
- Claude code ui
- Codeql
- Enrutador de Código Claude
- Go for javascript developers
- Hoja de Referencia de Asistente de Código AI Claude
- Hoja de Referencia de Generación de Código OpenAI Codex
- Lovable.dev Cheat Sheet
- Uso de Código Claude
- Veracode
programming-language¶
programming-languages¶
project-management¶
prompting¶
- Claude Code for Beginners: Master AI-Powered Development Through Smart Prompting
- Claude Code para Principiantes: Domina el Desarrollo Impulsado por IA a Través de Prompts Inteligentes
protocol¶
protocol-testing¶
protonmail¶
prototyping¶
prowler¶
proxmark3¶
proxy¶
prusa-slicer¶
publishing¶
python¶
qemu¶
radio-frequency¶
radio-hacking¶
rapid7¶
raspberry-pi¶
react¶
reconnaissance¶
- El correo electrónico de altavoz y la herramienta de enumeración de subdominio
- Hoja de Referencia de Wappalyzer
- Hoja de Referencia de WhatWeb
- JSParser Cheat Sheet
- Kiterunner
- Recon-ng Web Reconnaissance Hoja de Cheat Marco
- Shodan
- Spiderfoot
red-team¶
red-teaming¶
- Hak5 Shark Jack Cheatsheet
- O.MG Cable Cheatsheet
- SSHamble Cheatsheet
- USBNinja Cheatsheet
- WiFi Pineapple Cheatsheet
reference¶
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- Dominio de la Línea de Comandos para Profesionales
- Dominio de la Línea de Comandos para Profesionales
- Dominio de la Línea de Comandos para Profesionales
- Hoja de Referencia de DevDocs
- Hojas de Trucos
- Inicio
references¶
rego¶
relationship-analysis¶
remediation-tracking¶
remote-access¶
research¶
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
resources¶
reverse-engineering¶
- Apktool
- Binary ninja
- Binwalk - Herramienta de Análisis de Firmware
- GDB - GNU Debugger
- Ghidra - NSA Reverse Engineering Framework
- Ghidra Plugins Cheat Sheet
- Hoja de Referencia de Herramientas WebAssembly (WASM)
- Hoja de Referencia de Unicorn Engine
- Hoja de Referencia de angr
- Ida
- Jeb decompiler
- Lighthouse plugin
- Ollydbg
- REVEN Cheat Sheet
- Radare2 - Reverse Engineering Framework
- x64dbg - Depurador de Windows
rf-analysis¶
rfid¶
risk-management¶
- Enterprise Blockchain Security: A Strategic Implementation Guide
- Seguridad de Blockchain Empresarial: Una Guía Estratégica de Implementación
route-analysis¶
rtl-sdr¶
runtime-protection¶
runtime-security¶
sbom¶
scalability¶
- Advanced Load Balancing Strategies for Modern Infrastructure
- Advanced Load Balancing Strategies for Modern Infrastructure
scheduling¶
scoutsuite¶
screen-annotation¶
scripting¶
- Bash - Bourne Again Shell
- Binary ninja
- Fish - Shell Interactivo Amigable
- PowerShell Cheatsheet
- Zsh - Shell Z
sdp¶
sdr¶
search¶
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- Elasticsearch
secrets-management¶
- Advanced Pipeline Security Integration: Mastering DevSecOps in CI/CD Environments
- Integración Avanzada de Seguridad en Pipelines: Dominando DevSecOps en Entornos CI/CD
- Secrets Insights Cheatsheet
security¶
- A Deep Dive into iOS Security & Privacy Settings
- A Practical Guide to Implementing a Software-Defined Perimeter (SDP)
- Arp-Scan
- Arquitectura de Data Pipeline Segura: Una Guía Completa
- CrackMapExec Hoja de Referencia
- DNS Best Practices & Standards: Master Enterprise Infrastructure Excellence
- Enum4Linux
- Falco Cheatsheet
- Fast-Google-Dorks-Scan
- Gatekeeper Cheat Sheet
- Gitleaks
- Golden-Guide-For-Pentesting
- Hoja de Referencia de ExploitDB
- Hoja de Referencia de Herramienta de Evaluación de Seguridad de Azure
- Java deserialization scanner
- Kube-bench Cheatsheet
- Kube-hunter Cheatsheet
- Linenum
- Linux exploit suggester
- Mejores prácticas de seguridad serverless
- Nbtscan
- Ncrack
- OSSEC Sistema de detección de intrusiones con sede en el anfitrión
- OWASP API Security Top 10 Commands
- Okta
- Open Policy Agent (OPA) Cheatsheet
- OpenCanary Cheatsheet
- OpenVPN Cheatsheet
- Openshift
- Opentelemetry
- Opentracing
- PTF Comandos
- PandwaRF Cheatsheet
- Pegasus-Pentest-Arsenal Cheat Sheet
- ProtonMail Cheatsheet
- Python-Pentest-Tools
- Secure Data Pipeline Architecture: A Comprehensive Guide
- SecurityOnion Cheatsheet
- Serverless Security Best Practices
- Smtp-User-Enum
- Stegcracker
- Trivy Cheatsheet
- TruffleHog
- Unicornscan
- Windows-Exploit-Suggester
security architecture¶
security assessment¶
security automation¶
security-analytics¶
security-architecture¶
security-assessment¶
security-auditing¶
security-monitoring¶
security-operations¶
- Cybersecurity Workflow Automation: Transform Your Security Operations with Advanced Automation Frameworks
- PlexTrac Cheat Sheet
- SigmaOptimizer Cheatsheet
security-professionals¶
security-research¶
security-scanning¶
- CloudSploit Hoja de Referencia
- Hoja de Referencia de Checkov
- KICS (Keeping Infrastructure as Code Secure) Cheat Sheet
- Sonarcloud
- Steampipe
- TFSec Cheat Sheet
- Terrascan
security-testing¶
- Fiddler Cheatsheet
- Hoja de Referencia de Boofuzz
- PTHelper Cheat Sheet
- Proxmark 3 RDV4 Cheatsheet
- mitmproxy Cheatsheet
security-tools¶
- Advanced Pipeline Security Integration: Mastering DevSecOps in CI/CD Environments
- Integración Avanzada de Seguridad en Pipelines: Dominando DevSecOps en Entornos CI/CD
self-hosted¶
self-referential¶
- Building Self-Referential Applications with Claude Code: Advanced Prompting for Meta-Programming
- Construcción de Aplicaciones Auto-Referenciales con Claude Code: Prompting Avanzado para Meta-Programación
serverless¶
service¶
service-catalog¶
service-management¶
shark-jack¶
shell¶
siem¶
sigma-optimizer¶
sigma-rules¶
simulation¶
site reliability engineering¶
slack¶
slicer¶
smart-contracts¶
- Enterprise Blockchain Security: A Strategic Implementation Guide
- Seguridad de Blockchain Empresarial: Una Guía Estratégica de Implementación
snapchat¶
soc¶
social-engineering¶
social-mapping¶
social-media¶
- Bluesky Cheatsheet
- Instagram Cheatsheet
- Snapchat Cheatsheet
- Telegram Cheatsheet
- TikTok Cheatsheet
- X (Twitter) Cheatsheet
software¶
software-defined-radio¶
specterops¶
sql-injection¶
sql-queries¶
sre practices¶
ssh¶
ssh-exploitation¶
standards¶
static-analysis¶
steampipe¶
sub-ghz¶
subdomain-takeover¶
substack¶
subzy¶
supply-chain-security¶
- AI SBOM Generator Cheatsheet
- Advanced Pipeline Security Integration: Mastering DevSecOps in CI/CD Environments
- Integración Avanzada de Seguridad en Pipelines: Dominando DevSecOps en Entornos CI/CD
surveillance¶
suzaku¶
symbolic-execution¶
sysadmin¶
system administration¶
- DNS Fundamentals & Architecture: Master Internet Infrastructure Excellence
- DNS Management & Administration: Enterprise-Grade Infrastructure Excellence
- DNS Troubleshooting & Monitoring: Master Network Reliability Excellence
- Performance Optimization Commands: Master Professional Command-Line Excellence
- Windows 11 Advanced File Management: Master Professional Organization Excellence
system reliability¶
system-administration¶
system-calls¶
system-tools¶
task-management¶
team building¶
technical leadership¶
technology-detection¶
telegram¶
telerik¶
tenable¶
terminal¶
- Essential Linux Commands for IT Professionals: Master the Foundation of Modern Infrastructure
- Screen
- tmux Cheatsheet
terraform¶
- Hoja de Referencia de env0
- KICS (Keeping Infrastructure as Code Secure) Cheat Sheet
- TFSec Cheat Sheet
- Terraform Enterprise Patterns: Mastering Infrastructure as Code at Scale
- Terraform Enterprise Patterns: Mastering Infrastructure as Code at Scale
- Terrascan
terrascan¶
testing¶
text-editor¶
text-to-speech¶
threat hunting¶
threat modeling¶
- Arquitectura de Data Pipeline Segura: Una Guía Completa
- Secure Data Pipeline Architecture: A Comprehensive Guide
threat-detection¶
threat-hunting¶
threat-intelligence¶
throughput-testing¶
tiktok¶
time-travel-debugging¶
tools¶
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- Dominio de la Línea de Comandos para Profesionales
- Dominio de la Línea de Comandos para Profesionales
- Dominio de la Línea de Comandos para Profesionales
- Herramientas
- Hojas de Trucos
- Inicio
topology-design¶
traceroute¶
tracert¶
traffic-analysis¶
trail-of-bits¶
training¶
trello¶
troubleshooting¶
tshark¶
tutorial¶
- Claude Code for Beginners: Master AI-Powered Development Through Smart Prompting
- Claude Code para Principiantes: Domina el Desarrollo Impulsado por IA a Través de Prompts Inteligentes
tutorials¶
twitter¶
typescript¶
ui-framework¶
usb-hacking¶
usb-security¶
usbninja¶
utility¶
- ADConnectDump Hoja de Referencia de Herramienta de Extracción de Credenciales de Azure AD Connect
- ASNmap Hoja de Referencia de Mapeo de ASN
- Aadinternals
- Age
- Alacritty - Terminal Acelerado por GPU
- Anchore
- Apimonitor
- Apt-Get
- Aqua
- Aquatone
- Arjun
- Asreproast
- Assetfinder
- Atomic red team
- Awesome nodejs
- Awesome-Go
- Awesome-Java
- Awesome-Javascript
- Awesome-Python
- Backdoors & Breaches Comandos
- Bandit
- Bash bunny
- Batch
- Bazaar
- Bazel
- Beacon
- Bettercap
- Bingoo
- Bitbucket
- Bitlocker
- Borrador
- Brakeman
- Brutespray
- Bully
- Bundler
- Burp
- Bwapp
- Bzr
- CLI de DigitalOcean (doctl)
- CLion
- Caine
- Censys
- Censys-Python
- Cewl
- Chai
- ChatGPT y GPT-4 - Guía de Prompting de IA
- Cheatsheet-Dios
- Checkmarx
- Chocolatey
- Clair
- Clang/LLVM - Infraestructura de Compilador Moderno
- Class-Dump
- Claude - Guía de Prompting de IA
- Claudia
- Cobertura
- Comandos ELSA
- Comandos de Bugsy
- Comandos de Cortex
- Comandos de Xplico
- Composer
- Comsvcs
- Conda
- Confiable
- Consul
- Context7 Hoja de Referencia del Servidor MCP
- Corchetes
- Cowpatty
- Cron
- Crowbar
- Crunch
- Cti-Python-Stix2
- Cupp
- Cursor
- Datadog
- Dc3Dd
- Dcfldd
- Decryptautologon
- Descubre la herramienta del motor de búsqueda
- Desvíos
- Dex2Jar
- Diagon
- Dig - Búsqueda y Resolución de DNS
- Docker Bench Hoja de Referencia
- Dostackbufferoverflowgood
- Dradis
- Drone
- Duckduckgo
- Dumpit
- Eaphammer
- Editor Zed
- Editor de Windsurf
- Elastic SIEM Cheatsheet
- Elemento
- Emerge
- Evilgophish
- Excel - Fórmulas, Funciones y Productividad
- Exegol
- Exiftool
- Fakelogonscreen
- Faker
- Fastapi
- Feroxbuster
- Findomain
- Firebase - Plataforma Backend-as-a-Service de Google
- Flamingo
- Flare-Vm
- Flink
- Fluxion
- Ftkimager
- GCC - Colección de Compiladores GNU
- Garak
- Gau
- Gedit
- Gem
- Gemini cli
- Gemini prompting
- Gestor de Paquetes APT
- Gestor de Paquetes YUM/DNF
- Ghostpack
- Ghostty - Terminal Emulator
- GitHub Copilot Cheat Sheet
- Gnome terminal
- Go-Audit
- GoLand
- Goad
- Goatrider
- Goby
- Godoh
- Godpotato
- Goexec
- Gofetch
- Golang
- Goldencopy
- Goodfaith
- Goodhound
- Goodork
- Googd0rker
- Google domain fronting
- Goohak
- Gopher
- Gopherus
- Goversioninfo
- Gruyere
- Guymager
- Harness
- Herramienta de auditoría de seguridad de Lynis
- Hg
- Hoja de Referencia Rápida del Generador de Listas de Palabras de Subdominio AlterX
- Hoja de Referencia de AndroGuard
- Hoja de Referencia de Ant
- Hoja de Referencia de Arachni
- Hoja de Referencia de Ares RAT
- Hoja de Referencia de BeEF Browser Exploitation Framework
- Hoja de Referencia de BloodHound
- Hoja de Referencia de Brute Ratel C4 Framework
- Hoja de Referencia de Chisel
- Hoja de Referencia de Cisco ASA
- Hoja de Referencia de Cobalt Strike
- Hoja de Referencia de CrewAI Multi-Agent Framework
- Hoja de Referencia de Cutter
- Hoja de Referencia de CyberChef
- Hoja de Referencia de DVWA (Damn Vulnerable Web Application)
- Hoja de Referencia de Dia Browser
- Hoja de Referencia de Drozer
- Hoja de Referencia de Empire Framework
- Hoja de Referencia de Gestión de DNS
- Hoja de Referencia de Herramienta de Auditoría de Seguridad Azure Azucar
- Hoja de Referencia de Herramienta de Inyección de Pulsaciones USB Rubber Ducky
- Hoja de Referencia de Herramienta de Phishing Blackeye
- Hoja de Referencia de Twint Herramienta OSINT de Twitter
- Hoja de Referencia de VSagent
- Hoja de Referencia de Veil
- Hoja de Referencia de Velociraptor
- Hoja de Referencia de W3af (Web Application Attack Framework)
- Hoja de Referencia de Wapiti
- Hoja de Referencia de Wfuzz
- Hoja de Referencia de WifiForge
- Hoja de Referencia de Wifiphisher Wireless Phishing Framework
- Hoja de Referencia de YARA
- Hoja de Referencia del Framework C2 Villain
- Hoja de Referencia del Framework Covenant C2
- Hoja de Referencia del Framework Multi-Agente AutoGen
- Hoja de Referencia del Framework de Phishing EvilGinx2
- Hoja de Trucos de Prompting de DeepSeek AI
- Hoja de Trucos de Wifite
- Hoja de Trucos de Zmap
- Hoja de Trucos para Siesta de Bebé
- Hoja de referencia de CMake
- Homebrew
- Host - Simple DNS Lookup Tool
- Hyper
- IDA Pro - Interactive Disassembler Professional
- Immunity
- Impacket
- Init
- Insomnia
- Invoke-Obfuscation Cheat Sheet
- Istio
- Jaeger
- Java idx parser
- JavaScript - Modern Web Development
- Javascript malware collection
- Joe
- Judas
- Juice-Shop
- Jupyter Notebook
- Kafka
- Kali linux
- Karma
- Katana
- Kerberoast
- Keybase
- Kibana
- Kind
- King phisher
- Kingofbugbountytips
- Kismet
- Kiwi
- Knockpy
- Koadic
- Kong
- LangChain Framework Cheat Sheet
- Langgraph
- Lanzamiento C2 Marco de la hoja de Cheat
- Lazagne
- Ldd
- Lenguaje de Ensamblador AArch64 (ARM64)
- Lenguaje de Ensamblador ARM (32 bits)
- Lenguaje de Ensamblador x86 (32 bits)
- Lenguaje de Ensamblador x86-64 (64 bits)
- Ligolo
- Ligolo-Ng
- Linkerd
- Linpeas
- Linpmem
- Linux File Management Cheat Sheet
- Linux Process Management Cheat Sheet
- Linux text processing
- Linuxprivchecker
- Llama - Meta's Open Source AI Prompting Guide
- Llamaindex
- Lldb
- Lo Primordial
- Lsassy
- Luks
- MIPS Assembly Language
- Mac Terminal (Terminal.app) - macOS Native Terminal
- Make
- Malwoverview Cheat Sheet
- Medusa
- Meg
- Megatron java
- Memcached
- Mercurial
- Merlin C2 Framework Cheat Sheet
- Metabigor
- Metagoofil
- Metasploitable
- Meterpreter
- Microburst
- Microsoft Sentinel Cheatsheet
- Mimikatz Cheat Sheet
- Misp
- Mix
- MobSF (Mobile Security Framework) Cheat Sheet
- Model Context Protocol (MCP) Servers Cheat Sheet
- Modlishka
- Msfconsole
- Msfvenom
- Mutillidae
- Naabu
- Nagios
- Nano
- Nanodump
- Nats
- Ncat
- Needle
- Neovim
- Nexpose
- Ngrok
- Ninja
- Nix
- Nodegoat
- Notify Notification System Cheat Sheet
- Nslookup - DNS Lookup and Troubleshooting
- Nuclei
- Nuget
- OWASP Amass Network Mapping Tool Cheat Sheet
- Objdump
- Obsidian Cheatsheet
- Oh My Posh - Cross-Platform Prompt Engine
- Oh My Zsh - Zsh Framework and Configuration Manager
- Ollama
- Onesixtyone
- Outguess
- Outline VPN Cheatsheet
- Owasp threat dragon desktop
- P4
- PTF (Marco de donantes) Cheat Sheet
- Packer
- Pacman Package Manager
- Pacu
- Pagodo
- Paramspider
- Perplexity AI - Search-Powered Prompting Guide
- Pgp
- PhpStorm
- Plink
- Polaris
- Poortego
- Posh virustotal
- PoshC2 Framework Cheat Sheet
- Poshc2 python
- Postman API Testing
- Powerlevel10k - High-Performance Zsh Tema
- Powershell empire
- Powersploit
- Powerup
- Powerview
- Powerzure
- Procdump
- Procmon
- Productivity Tools Cheatsheet
- Proxychains
- PuTTY - SSH y Telnet Client para Windows
- Pub
- Puppeteer
- Pupy
- Pure - Minimal Zsh Prompt
- PyCharm
- Pydantic AI Framework Cheat Sheet
- Pyrit
- Pythagora
- Python dshield
- Python ntfs
- Python uncompyle6
- Python3 venv
- Pythonidae
- Qark
- Qualys
- Qwen AI Prompting Cheat Sheet
- R2
- RISC-V Assembly Language
- ROADtools Azure AD Assessment Framework Cheat Sheet
- Railsgoat
- Rancher
- Reaver
- Regular Expressions (RegEx) - Pattern Matching
- Rekall
- Remnux
- Responder
- Rider
- Rizin
- Rogue
- Rpcclient
- Rsylog
- Rubeus Kerberos Interaction Tool Cheat Sheet
- RubyMine
- Rust
- Safety
- Scalpel
- Scapy
- Scoop
- Scylla
- Searchsploit
- Seatbelt
- Semgrep
- Serverless goat
- Sessiongopher
- Sguil
- Sharphound
- Sharpup
- Shellter
- Sherlock
- Shosubgo
- Showmount
- Sigma
- Signal
- Silver
- Smbclient
- Snap
- Snmp check
- Snmpwalk
- Snorby
- Snyk
- Socat
- Social Engineer Toolkit (SET) Cheatsheet
- Social Engineering Toolkit (SET) Cheat Sheet
- Solr
- Sonarqube
- Sops
- Sourceforge
- Spark
- Spoofcard
- Spring-Boot
- Squert
- Sshuttle
- Stack
- Steghide
- Stego toolkit
- Stegsolve
- Stenographer - Full Packet Capture System
- Storm
- Stormspotter Cheat Sheet
- Strelka
- Sublime Text
- Sumo Logic Cheatsheet
- Supabase - Open Source Firebase Alternative
- Svn
- Sysdig
- Syslog-Ng
- Systemd
- Tailscale Cheatsheet
- Taskmaster-AI Automation Framework Cheat Sheet
- Terminal de Windows
- Terragoat
- Testigo Ocular
- Thc hydra
- The little go book
- TheHive Cheat Sheet
- Traefik
- TrevorC2 Framework Cheat Sheet
- Truecrypt
- Trust
- Untitledgoosetool
- Vagrant
- Vault
- VeraCrypt
- Visual Studio
- Warp - Terminal Potenciado por IA
- Watson
- Waypoint
- Wazuh Cheatsheet
- Weirdaal
- Windbg
- Winlogon
- Winpeas
- Winpmem
- Wire
- Xxd
- Yum
- Zabbix
- Zap api nodejs
- Zerologon-Bof
- Zipkin
- Zoomeye
- Zsteg
- Zuul
- btop - Monitor de Recursos Moderno
- csh - Intérprete de Comandos C
- dnSpy - Depurador y Editor de Ensamblados .NET
- ffuf Fast Web Fuzzer Cheat Sheet
- iTerm2 Terminal
- ksh - Korn Shell
- n8n Workflow Automation Cheat Sheet
- osquery - Instrumentación de sistema operativo basado en SQL
- pfSense Cheatsheet
- sh - POSIX Shell
- xterm - Emulador de Terminal del Sistema de Ventanas X
version-control¶
- Command Line Mastery for Professionals
- Dominio de la Línea de Comandos para Profesionales
- Git Commands
vibe-coding¶
video¶
video-conferencing¶
video-editing¶
video-generation¶
video-recording¶
video-sharing¶
virtualbox¶
virtualization¶
visualization¶
vmware¶
voice-synthesis¶
voip¶
vscode¶
vulnerability-assessment¶
- CloudSploit Hoja de Referencia
- Hoja de Referencia de AutoPentest
- PTHelper Cheat Sheet
- Prowler
- Scoutsuite
vulnerability-discovery¶
vulnerability-management¶
- Advanced Pipeline Security Integration: Mastering DevSecOps in CI/CD Environments
- AutoFix AI Agent Cheatsheet
- Integración Avanzada de Seguridad en Pipelines: Dominando DevSecOps en Entornos CI/CD
- Legit Security Commands
- OpenVAS Cheatsheet
- PlexTrac Cheat Sheet
vulnerability-research¶
vulnerability-scanner¶
- Hoja de Referencia de Dalfox
- Hoja de Referencia de XSStrike
- Intruder
- Nessus Cheatsheet
- OpenVAS Cheatsheet
- Subzy
vulnerability-scanning¶
- Hoja de Referencia de Burp Suite
- Kube-hunter Cheatsheet
- Nikto
- Nmap
- SSHamble Cheatsheet
- Trivy Cheatsheet
vulnerability-testing¶
waf-bypass¶
wappalyzer¶
wasm¶
web-application¶
web-application-security¶
web-debugging¶
web-development¶
- Angular
- Comandos de Base44
- Comandos de Divjoy
- Comandos de Vercel CLI
- Creación de Aplicaciones y Juegos con Claude Code: Domina el Uso de Prompts para Todas las Plataformas
- Creación de aplicaciones y juegos con Claude Code: Master Prompting para cada plataforma
- Django
- Express
- Fiddler Cheatsheet
- React
- TypeScript Cheatsheet
- Vue
web-fingerprinting¶
web-scraping¶
web-security¶
- Dirb
- Dirbuster
- Dirsearch
- Gobuster Directory/File Brute Forcer Cheat Sheet
- HTTPX Toolkit Cheat Sheet
- Hoja de Referencia de Burp Suite
- Hoja de Referencia de Dalfox
- Hoja de Referencia de Herramientas WebAssembly (WASM)
- Hoja de Referencia de Wappalyzer
- Hoja de Referencia de WhatWeb
- Hoja de Referencia de XSStrike
- Hoja de Trucos de WebGoat
- JSParser Cheat Sheet
- Kiterunner
- Lighttpd
- Nikto
- SQLmap Cheat Sheet
- Subzy
- Waybackurls
- WebStorm
- Webscreenshot
- curl - Cliente HTTP y Transferencia de Datos
web-server¶
web-service¶
web-technology¶
webassembly¶
whatsapp-business¶
whatweb¶
whiteboard¶
wifi-hacking¶
windows¶
windows 11¶
windows-only¶
windows-security¶
windsurf¶
wireless-security¶
wireshark¶
workflow¶
workflow-automation¶
- Claude Flow Cheatsheet
- Cybersecurity Workflow Automation: Transform Your Security Operations with Advanced Automation Frameworks