Tags¶
Browse our extensive collection of 680+ cheat sheets by tags to find exactly what you're looking for. Our comprehensive tagging system helps categorize tools by function, platform, and skill level.
🔍 How to Use Tags¶
- Click any tag to see all related cheat sheets
- Combine searches with the search bar above
- Filter by category using the sections below
- Bookmark frequently used tags for quick access
🛡️ Security Tools¶
Penetration Testing¶
Find tools for ethical hacking, vulnerability assessment, and security testing.
Popular Tags: penetration-testing • vulnerability-scanning • red-team • exploitation
Network Security¶
Discover network analysis, monitoring, and protection tools.
Popular Tags: network-security • packet-analysis • port-scanning • wireless-security
Web Security¶
Explore web application security testing and analysis tools.
Popular Tags: web-security • sql-injection • directory-enumeration • web-server
Digital Forensics¶
Access forensics and incident response tools.
Popular Tags: forensics • memory-analysis • disk-analysis • incident-response
Cryptography & Password Security¶
Browse encryption and password-related security tools.
Popular Tags: cryptography • password-cracking • encryption • certificates
💻 Development Tools¶
Programming & Languages¶
Find tools for various programming languages and development workflows.
Popular Tags: programming-languages • javascript • python • java-development
Web Development¶
Discover frontend and backend web development tools.
Popular Tags: web-development • frontend • backend • api-development
Mobile Development¶
Explore iOS, Android, and cross-platform development tools.
Popular Tags: mobile-development • android-development • ios-development • mobile-security
Development Environment¶
Access IDEs, editors, and development environment tools.
Popular Tags: ide-editors • text-editor • debugging • version-control
☁️ Cloud & DevOps¶
Cloud Platforms¶
Browse tools for major cloud service providers.
Popular Tags: aws • azure • gcp • cloud • serverless
Container & Orchestration¶
Find containerization and orchestration tools.
Popular Tags: containerization • docker • kubernetes • orchestration
Infrastructure & Automation¶
Discover infrastructure management and automation tools.
Popular Tags: infrastructure • iac • automation • configuration-management
CI/CD & Monitoring¶
Access continuous integration, deployment, and monitoring tools.
Popular Tags: ci-cd • monitoring • logging • metrics • alerting
🖥️ System Administration¶
Operating Systems¶
Find tools specific to different operating systems.
Popular Tags: linux • windows • macos • cross-platform
Networking & Services¶
Discover networking, web servers, and system services.
Popular Tags: networking • web-server • database • service-management
Performance & Monitoring¶
Access system monitoring and performance tools.
Popular Tags: monitoring • performance • process-management • system-calls
Backup & Security¶
Browse backup, recovery, and system security tools.
Popular Tags: backup-recovery • firewall • remote-access • file-transfer
📱 Tool Types¶
Interface Types¶
Browse tools by their interface and interaction method.
Popular Tags: cli-tool • gui-application • web-application • web-service
Skill Levels¶
Find tools appropriate for your experience level.
Popular Tags: beginner • intermediate • advanced • expert
Platform Compatibility¶
Discover tools by platform support.
Popular Tags: cross-platform • linux-only • windows-only • macos-only
🎯 Specialized Categories¶
OSINT & Reconnaissance¶
Open source intelligence and reconnaissance tools.
Popular Tags: osint • reconnaissance • subdomain-enumeration • investigation
Reverse Engineering¶
Tools for reverse engineering and malware analysis.
Popular Tags: reverse-engineering • malware-analysis • dynamic-analysis • static-analysis
Package Management¶
Package managers and dependency management tools.
Popular Tags: package-management • dependency-management • build-tools
📊 Tag Statistics¶
- Total Cheat Sheets: 680+
- Security Tools: 200+
- Development Tools: 150+
- Cloud/DevOps Tools: 100+
- System Admin Tools: 100+
- Specialized Tools: 130+
🔗 Quick Navigation¶
Most Popular Security Tags: penetration-testing • network-security • web-security • vulnerability-scanning
Most Popular Development Tags: web-development • programming-languages • version-control • ide-editors
Most Popular Cloud Tags: aws • docker • kubernetes • ci-cd
Most Popular System Tags: linux • networking • monitoring • automation
Use the search functionality above to find specific tools or combine tag searches for more precise results. All content is regularly updated and maintained.
3d-modeling¶
3d-printing¶
AI Research¶
Agile¶
Apache Flink¶
Apache Kafka¶
Apache Spark¶
App Deployment¶
Apple Business Manager¶
ChatGPT¶
Communication Skills¶
Compliance¶
Compliance Frameworks¶
- SOC 2 Compliance for IT Teams: Your Complete Guide to Security Excellence
- SOC 2 Compliance per Team IT: La Tua Guida Completa all'Eccellenza nella Sicurezza
Cosa?¶
Cryptographic Agility¶
- Post-Quantum Cryptography Preparation: Securing Your Infrastructure Against the Quantum Threat
- Preparazione della Crittografia Post-Quantum: Proteggere la Vostra Infrastruttura contro la Minaccia Quantistica
Cryptographic Migration¶
- Post-Quantum Cryptography Preparation: Securing Your Infrastructure Against the Quantum Threat
- Preparazione della Crittografia Post-Quantum: Proteggere la Vostra Infrastruttura contro la Minaccia Quantistica
Cybersecurity¶
- A Comprehensive Guide to Enterprise WiFi Security Hardening
- Database Encryption Best Practices
- Mobile Network Security: A Comprehensive Guide
- Mobile Threat Landscape: A Deep Dive into the Evolving Risks
Data Engineering¶
- A Practical Guide to GDPR Compliance for Data Teams
- Database Encryption Best Practices
- Enterprise Data Governance Frameworks: A Comprehensive Guide
- Stream Processing Security: A Comprehensive Guide for Data Engineers
Data Governance¶
Data Privacy¶
Data Protection¶
- Database Encryption Best Practices
- Mobile Network Security: A Comprehensive Guide
- SOC 2 Compliance for IT Teams: Your Complete Guide to Security Excellence
- SOC 2 Compliance per Team IT: La Tua Guida Completa all'Eccellenza nella Sicurezza
Data Quality¶
Data Security¶
Engineering¶
Enterprise¶
Enterprise Data¶
Enterprise IT¶
- A Comprehensive Guide to Enterprise WiFi Security Hardening
- A Deep Dive into iOS App Management & Deployment
- A Deep Dive into iOS Network & VPN Configuration
- Mobile Network Security: A Comprehensive Guide
- Uno sguardo approfondito sulla configurazione di rete e VPN di iOS
Enterprise Security¶
Future-Proofing¶
- Post-Quantum Cryptography Preparation: Securing Your Infrastructure Against the Quantum Threat
- Preparazione della Crittografia Post-Quantum: Proteggere la Vostra Infrastruttura contro la Minaccia Quantistica
GDPR¶
IT Governance¶
- SOC 2 Compliance for IT Teams: Your Complete Guide to Security Excellence
- SOC 2 Compliance per Team IT: La Tua Guida Completa all'Eccellenza nella Sicurezza
Kanban¶
Knowledge Management¶
Learning Systems¶
MDM¶
- A Deep Dive into iOS Enterprise Configuration
- A Deep Dive into iOS Network & VPN Configuration
- Mobile Threat Landscape: A Deep Dive into the Evolving Risks
- Uno sguardo approfondito sulla configurazione di rete e VPN di iOS
Mobile Device Management¶
- A Deep Dive into iOS App Management & Deployment
- A Deep Dive into iOS Enterprise Configuration
- A Deep Dive into iOS Network & VPN Configuration
- Uno sguardo approfondito sulla configurazione di rete e VPN di iOS
Mobile Security¶
- Mobile Network Security: A Comprehensive Guide
- Mobile Threat Landscape: A Deep Dive into the Evolving Risks
Monitoring¶
NIST Standards¶
- Post-Quantum Cryptography Preparation: Securing Your Infrastructure Against the Quantum Threat
- Preparazione della Crittografia Post-Quantum: Proteggere la Vostra Infrastruttura contro la Minaccia Quantistica
Network¶
Network Configuration¶
- A Deep Dive into iOS Network & VPN Configuration
- Uno sguardo approfondito sulla configurazione di rete e VPN di iOS
Network Infrastructure¶
- A Practical Guide to Software-Defined Perimeter (SDP) Implementation
- Modern VPN Architecture Design for Network Engineers
Network Security¶
- A Comprehensive Guide to Enterprise WiFi Security Hardening
- A Practical Guide to Software-Defined Perimeter (SDP) Implementation
- Mobile Network Security: A Comprehensive Guide
- Modern VPN Architecture Design for Network Engineers
OpenTelemetry¶
- Distributed Tracing Implementation: A Comprehensive Guide for SRE Professionals
- Implementazione del Distributed Tracing: Una Guida Completa per Professionisti SRE
Optimization¶
Performance¶
Perplexity Pro¶
Post-Quantum Cryptography¶
- Post-Quantum Cryptography Preparation: Securing Your Infrastructure Against the Quantum Threat
- Preparazione della Crittografia Post-Quantum: Proteggere la Vostra Infrastruttura contro la Minaccia Quantistica
Productivity¶
- AI-Powered Research Mastery: Transform Your Research Workflow with Perplexity Pro and ChatGPT
- Professional Reference Tools Mastery: Build Your Ultimate Knowledge Management System
Professional Development¶
- Mastering Technical Writing: A Guide for Engineers
- Professional Reference Tools Mastery: Build Your Ultimate Knowledge Management System
Project Management¶
Quantum Computing¶
- Post-Quantum Cryptography Preparation: Securing Your Infrastructure Against the Quantum Threat
- Preparazione della Crittografia Post-Quantum: Proteggere la Vostra Infrastruttura contro la Minaccia Quantistica
Quantum Resistance¶
- Post-Quantum Cryptography Preparation: Securing Your Infrastructure Against the Quantum Threat
- Preparazione della Crittografia Post-Quantum: Proteggere la Vostra Infrastruttura contro la Minaccia Quantistica
Real-time Analytics¶
Reference Tools¶
Research Workflows¶
Risk Management¶
- SOC 2 Compliance for IT Teams: Your Complete Guide to Security Excellence
- SOC 2 Compliance per Team IT: La Tua Guida Completa all'Eccellenza nella Sicurezza
SDP¶
SOC 2¶
- SOC 2 Compliance for IT Teams: Your Complete Guide to Security Excellence
- SOC 2 Compliance per Team IT: La Tua Guida Completa all'Eccellenza nella Sicurezza
SRE¶
- Distributed Tracing Implementation: A Comprehensive Guide for SRE Professionals
- Implementazione del Distributed Tracing: Una Guida Completa per Professionisti SRE
Scrum¶
Sdr¶
Security¶
Security Audit¶
- SOC 2 Compliance for IT Teams: Your Complete Guide to Security Excellence
- SOC 2 Compliance per Team IT: La Tua Guida Completa all'Eccellenza nella Sicurezza
Security Controls¶
- SOC 2 Compliance for IT Teams: Your Complete Guide to Security Excellence
- SOC 2 Compliance per Team IT: La Tua Guida Completa all'Eccellenza nella Sicurezza
Security Protocols¶
- Post-Quantum Cryptography Preparation: Securing Your Infrastructure Against the Quantum Threat
- Preparazione della Crittografia Post-Quantum: Proteggere la Vostra Infrastruttura contro la Minaccia Quantistica
Software Development¶
Stream Processing¶
Tech Teams¶
Technical Writing¶
Threat Landscape¶
Troubleshooting¶
Trust Service Criteria¶
- SOC 2 Compliance for IT Teams: Your Complete Guide to Security Excellence
- SOC 2 Compliance per Team IT: La Tua Guida Completa all'Eccellenza nella Sicurezza
VPN¶
- A Deep Dive into iOS Network & VPN Configuration
- Modern VPN Architecture Design for Network Engineers
- Uno sguardo approfondito sulla configurazione di rete e VPN di iOS
VPN Architecture¶
WiFi Security¶
Wireless Security¶
Zero Trust¶
active-directory-security¶
additive-manufacturing¶
advanced¶
- Boofuzz Cheat Sheet
- Cheat Sheet degli Strumenti WebAssembly (WASM)
- Cheat Sheet di WhatWeb
- CloudSploit Cheat Sheet
- Costruire Applicazioni Auto-Referenziali con Claude Code: Tecniche Avanzate di Prompting per la Meta-Programmazione
- Costruire applicazioni auto-referenziali con Claude Code: Prompting avanzato per Meta-Programming
- Dalfox Cheat Sheet
- Elk
- Foglio Informativo dei Plugin di Ghidra
- Foglio Informativo sulla Sicurezza di Forseti
- Foglio di Riferimento XSStrike
- Foglio di Trucco
- GDB - GNU Debugger
- Ghidra - Framework di Reverse Engineering dell'NSA
- Guida di Riferimento 1TRACE
- Guida di Riferimento Frida
- Radare2 - Reverse Engineering Framework
- Scheda di Riferimento ARACNE
- Scheda di Riferimento AutoPentest
- Scheda di Riferimento FluxCD
- Scheda di guastatura
- Vectra AI Commands
- Volatility Cheat Sheet
- Wappalyzer Cheat Sheet
- angr Cheat Sheet
- gf (Schemi Gf) Foglio di Riferimento
- x64dbg - Windows Debugger
agent-programming¶
- AI-Assisted Coding: Da Assistenti IDE alla Programmazione Agent
- AI-Assisted Coding: From IDE Assistants to Agent Programming
agentic-ai¶
agentic-programming¶
- The Evolution of AI Coding: From Code Completion to Autonomous Agents
- Titolo: L'evoluzione dell'AI Coding: Da Code Completion a Autonomous Agents
ai¶
- AI-Assisted Coding: From IDE Assistants to Agent Programming
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- Anthropic Claude Cheatsheet
ai-assistant¶
ai-coding¶
- AI-Assisted Coding: Da Assistenti IDE alla Programmazione Agent
- AI-Assisted Coding: From IDE Assistants to Agent Programming
- Claude Code CLI Cheatsheet
- The Evolution of AI Coding: From Code Completion to Autonomous Agents
- Titolo: L'evoluzione dell'AI Coding: Da Code Completion a Autonomous Agents
ai-development¶
- Comandi Base44
- Costruire Applicazioni Auto-Referenziali con Claude Code: Tecniche Avanzate di Prompting per la Meta-Programmazione
- Costruire applicazioni auto-referenziali con Claude Code: Prompting avanzato per Meta-Programming
- GPT-5 Cheatsheet
ai-guardian¶
ai-orchestration¶
ai-pentesting¶
ai-presentation¶
ai-programming¶
- Claude Code per Principianti: Padroneggia lo Sviluppo Guidato dall'IA Attraverso Prompt Intelligenti
- Claude Code per principianti: Master AI-Powered Development attraverso Smart Prompting
ai-search¶
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
ai-security¶
- AI Guardian Cheatsheet
- AI SBOM Generator Cheatsheet
- AirMDR AI SOC Platform Cheatsheet
- AutoFix AI Agent Cheatsheet
- Autonomous PowerShell Agent Cheatsheet
- Buttercup CRS Cheatsheet
- Comandi Wiz MCP
- Commercial Intelligence Blend Tools Cheatsheet
- Cribl Guard Cheatsheet
- Cyera AI Guardian Cheatsheet
- Legit Security Commands
- Scheda di Riferimento AutoPentest
- Vectra AI Commands
ai-spm¶
ai-voice¶
akheron-proxy¶
alert-triage¶
altium-designer¶
android¶
ansible¶
anthropic¶
anthropic-claude¶
api¶
api-docs¶
api-testing¶
app security¶
app-builder¶
application-security¶
architecture¶
- Architettura di Data Pipeline Sicura: Una Guida Completa
- Secure Data Pipeline Architecture: A Comprehensive Guide
arp-monitoring¶
arpwatch¶
articles¶
asana¶
aspm¶
at-protocol¶
attack-path-management¶
attack-surface-management¶
audio-generation¶
augment code¶
autodesk¶
automated-vulnerability-repair¶
automation¶
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- Advanced Threat Hunting Techniques: Master Proactive Cybersecurity Defense in 2025
- AirMDR AI SOC Platform Cheatsheet
- Ansible
- Boofuzz Cheat Sheet
- Cheat Sheet di WhatWeb
- Chef
- Claude Code per l'Amministrazione di Sistema: AI-Powered Infrastructure Automation
- Comandi Base44
- Comandi Wiz MCP
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
- Crontab
- Cybersecurity Workflow Automation: Transform Your Security Operations with Advanced Automation Frameworks
- Dalfox Cheat Sheet
- DevSecOps Excellence: Integrate Security into Every Stage of Software Development
- Enterprise Cloud Security Mastery: Build Bulletproof Multi-Cloud Security Architectures
- Foglio di Trucco
- Guida di Riferimento env0
- Integrazione Avanzata di Sicurezza Pipeline: Eccellenza DevSecOps
- Integrazione Avanzata di Sicurezza Pipeline: Padroneggiare DevSecOps in Ambienti CI/CD
- Kubernetes Security Hardening: Bulletproof Container Orchestration Security
- MLOps Pipeline Implementation: A Complete Guide for Data Engineers
- MLOps Pipeline Implementation: A Comprehensive Guide for Data Engineers
- Modelli aziendali terapeutici: Mastering Infrastructure as Code at Scale
- Network Security Architecture: Design Bulletproof Enterprise Network Defenses
- SOC 2 Compliance for IT Teams: Master Security Framework Implementation
- Scraper API Commands
- Terraform Enterprise Patterns: Padroneggiare Infrastructure as Code su Scala
- Wappalyzer Cheat Sheet
- Zero Trust Network Implementation: A Comprehensive Guide to Modern Security Architecture
- angr Cheat Sheet
- gf (Schemi Gf) Foglio di Riferimento
automation excellence¶
autonomous-agents¶
- AI-Assisted Coding: Da Assistenti IDE alla Programmazione Agent
- AI-Assisted Coding: From IDE Assistants to Agent Programming
autonomous-hacking¶
autonomous-pentesting¶
aws¶
- AWS CLI
- CloudSploit Cheat Sheet
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
- Eccellenza Networking Cloud Ibrido: Padroneggiare l'Integrazione Infrastrutturale Moderna
- Padronanza della Riga di Comando per Professionisti
- Scheda di Riferimento Amazon CodeWhisperer
- Scheda di Riferimento Amazon Q
- Titolo: Eccellenza di Hybrid Cloud Networking: Padroneggiare l'Integrazione dell'Infrastruttura Moderna
aws-governance¶
aws-lambda¶
aws-security¶
azure¶
- Azure CLI
- CloudSploit Cheat Sheet
- Eccellenza Networking Cloud Ibrido: Padroneggiare l'Integrazione Infrastrutturale Moderna
- Titolo: Eccellenza di Hybrid Cloud Networking: Padroneggiare l'Integrazione dell'Infrastruttura Moderna
backend¶
bandwidth-testing¶
bash¶
beginner¶
- Atom
- Bash - Bourne Again Shell
- Claude Code per Principianti: Padroneggia lo Sviluppo Guidato dall'IA Attraverso Prompt Intelligenti
- Claude Code per principianti: Master AI-Powered Development attraverso Smart Prompting
- Comandi Base44
- Comandi Gamma
- Crontab
- Dirb
- Dirbuster
- Express
- Fish - Shell Interattivo Amichevole
- Git Commands
- Gobuster Directory/File Brute Forcer Cheat Sheet
- Guida di Riferimento Rapido di Excalidraw
- MLOps Pipeline Implementation: A Complete Guide for Data Engineers
- MLOps Pipeline Implementation: A Comprehensive Guide for Data Engineers
- Presentify Commands
- Python - Programming Language Reference
- Scheda di Riferimento CodeSandbox
- Scheda di Riferimento DevDocs
- Scorciatoie di VS Code
- Zsh - Z Shell
- il Harvester Email and Subdomain Enumeration Tool Cheat Sheet
- ssh - Secure Shell Accesso remoto
best practices¶
best-practices¶
binary-analysis¶
- Cheat Sheet degli Strumenti WebAssembly (WASM)
- Foglio Informativo dei Plugin di Ghidra
- angr Cheat Sheet
bitlocker¶
bladerf¶
blockchain-security¶
- Enterprise Blockchain Security: A Strategic Implementation Guide
- Sicurezza blockchain enterprise: Guida strategica all'implementazione
blog¶
bloodhound¶
bluesky¶
bluetooth-hacking¶
boofuzz¶
bro¶
browser-ide¶
bug-bounty¶
build-tools¶
business¶
buttercup-crs¶
caching¶
cad¶
cam¶
ccpa¶
chat¶
cheat-sheets¶
cheatsheets¶
ci-cd¶
ci-cd-security¶
- Integrazione Avanzata di Sicurezza Pipeline: Eccellenza DevSecOps
- Integrazione Avanzata di Sicurezza Pipeline: Padroneggiare DevSecOps in Ambienti CI/CD
claude code¶
claude-code¶
- Claude Code CLI Cheatsheet
- Claude Code per Principianti: Padroneggia lo Sviluppo Guidato dall'IA Attraverso Prompt Intelligenti
- Claude Code per l'Amministrazione di Sistema: AI-Powered Infrastructure Automation
- Claude Code per principianti: Master AI-Powered Development attraverso Smart Prompting
- Costruire App e Giochi con Claude Code: Padroneggiare i Prompt per Ogni Piattaforma
- Costruire Applicazioni Auto-Referenziali con Claude Code: Tecniche Avanzate di Prompting per la Meta-Programmazione
- Costruire app e giochi con Claude Code: Master Prompting per ogni piattaforma
- Costruire applicazioni auto-referenziali con Claude Code: Prompting avanzato per Meta-Programming
- The Evolution of AI Coding: From Code Completion to Autonomous Agents
- Titolo: L'evoluzione dell'AI Coding: Da Code Completion a Autonomous Agents
claude-flow¶
cli¶
- Claude Code CLI Cheatsheet
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
- Padronanza della Riga di Comando per Professionisti
- Padronanza della Riga di Comando per Professionisti
- Padronanza della Riga di Comando per Professionisti
cli tools¶
cli-tool¶
- AADInternals Azure AD Exploitation Toolkit Cheat Sheet
- ADConnectDump Foglio Informativo per l'Estrazione delle Credenziali di Azure AD Connect
- ASNmap Guida di Riferimento per il Mapping degli ASN
- AWS CLI
- AWS Kiro
- Aircrack-ng Cheat Sheet
- Alacritty - Terminal Accelerato da GPU
- Anchore
- AndroGuard Cheat Sheet
- Ansible
- Ant Cheat Sheet
- Apimonitor
- Apt-Get
- Aqua
- Aquatone
- Arachni Cheat Sheet
- Ares RAT Cheat Sheet
- Arjun
- Arp-Scan
- Asreproast
- Assetfinder
- Awesome-Go
- Awesome-Java
- Awesome-Nodejs
- Awesome-Python
- Azucar Azure Security Auditing Tool Cheat Sheet
- Azure CLI
- Backdoors & Breaches Comandi
- Bash - Bourne Again Shell
- Bash bunny
- Batch
- Bazaar
- BeEF Browser Exploitation Framework Cheat Sheet
- Beacon
- Binwalk - Strumento di Analisi Firmware
- Bitbucket
- Bozza
- Brackets
- Brakeman Ruby on Rails Foglio di Riferimento per la Sicurezza
- Brute Ratel C4 Framework Foglio di Riferimento
- Brutespray
- Bully
- Bundler
- Burp
- Bwapp
- Bzr
- CLI di DigitalOcean (doctl)
- CLion
- Censys
- Censys-Python
- Chai
- ChatGPT e GPT-4 - Guida al Prompting con IA
- Cheat Sheet YARA
- Cheat Sheet dello Strumento di Phishing Blackeye
- Cheat Sheet di ExploitDB
- Cheat Sheet per Generatore di Wordlist di Sottodomini AlterX
- Cheatsheet-God
- Checkmarx
- Chef
- Chisel Cheat Sheet (remains the same, as it's a technical term)
- Chocolatey
- Cisco ASA Cheat Sheet
- Clair
- Clang/LLVM - Infrastruttura Moderna per Compilatori
- Class-Dump
- Claude - Guida al Prompting con IA
- Claude Code Router
- Claude Code UI
- Claude Code Undo
- Claudia
- Cloud Scout Cheat Sheet
- CloudMapper Cheat Sheet
- Cloudflare
- Cloudfox
- Cloudgoat
- Cloudlist Cloud Assets Listing Cheat Sheet
- Codeql
- Comandi Bugsy
- Comandi Cortex
- Comandi Docker
- Comandi ELSA
- Comandi Skipfish
- Comandi Vercel CLI
- Comandi Xplico
- Comandi di immersione
- Composer
- Comsvcs
- Conda
- Coniglio bianco Neo AI Promping Cheat Sheet
- Consul
- Continue.dev Foglio di formaggio
- Covenant C2 Framework Cheat Sheet
- Coverage
- Cowpatty
- Cron
- Crontab
- Cti-Python-Stix2
- Cupp
- Cursor
- DVWA (Damn Vulnerable Web Application) Cheat Sheet
- Dc3Dd
- Dcfldd
- Dd
- Decryptautologon
- Deviazioni
- Dex2Jar
- Diagon
- Dig - Ricerca DNS e Risoluzione dei Problemi
- Dirb
- Dirsearch
- Docker Bench Cheat Sheet
- Dradis Cheat Sheet
- Drone
- Drozer Cheat Sheet
- Duckduckgo
- Dumpit
- Eaphammer
- Editor Windsurf
- Editor Zed
- Elastic SIEM Cheat Sheet
- Elemento
- Emerge
- Enum4Linux
- Età
- Excel - Formule, Funzioni & Produttività
- Exegol
- Exiftool
- Fakelogonscreen
- Faker
- Fast-Google-Dorks-Scan
- Fenicottero
- Feroxbuster
- Findomain
- Firebase - Piattaforma Backend-as-a-Service di Google
- Fish - Shell Interattivo Amichevole
- Flare-Vm
- Flink
- Fluxion
- Foglio Comandi di CrackMapExec
- Foglio Informativo del Framework Multi-Agente AutoGen
- Foglio Informativo del Sonnellino dei Bambini
- Foglio Informativo dello Strumento di Valutazione della Sicurezza di Azure
- Foglio Informativo di AzureHound per la Raccolta Dati di BloodHound
- Foglio Informativo di Cobalt Strike
- Foglio Informativo di Cutter
- Foglio Informativo di EvilGinx2 per Framework di Phishing
- Foglio Informativo di VSagent
- Foglio Informativo di W3af Web Application Attack Framework
- Foglio Informativo di Wifiphisher Wireless Phishing Framework
- Foglio di Riferimento Wapiti
- Foglio di Riferimento di Empire Framework
- Foglio di Riferimento per la Gestione DNS
- Foglio di guanto per oggetti
- Framework di Comando e Controllo Villain C2 Cheat Sheet
- Ftkimager
- GCC - GNU Compiler Collection
- GDB - GNU Debugger
- Garak
- Gau
- Gedit
- Gem
- Gemini CLI
- Gestore di Pacchetti APT
- Gestore di Pacchetti YUM/DNF
- Ghostty - Terminal Emulator
- Git Commands
- GoLand
- Gobuster Directory/File Brute Forcer Cheat Sheet
- Google Cloud CLI (gcloud)
- Google Gemini - Guida al Prompting con IA
- Guida Rapida a CyberChef
- Guida Rapida di Bazel
- Guida Rapida di CMake
- Guida di Riferimento Frida
- Guida di Riferimento Wazuh
- Guida di Riferimento per Dia Browser
- Guida di Riferimento per il Prompting di DeepSeek AI
- Host - Simple DNS Lookup Tool
- IDA Pro - Interactive Disassembler Professional
- Interactsh OOB Interaction Gathering Cheat Sheet
- JavaScript - Modern Web Development
- Jupyter Notebook
- Linguaggio Assembly AArch64 (ARM64)
- Linguaggio Assembly ARM (32-bit)
- Linguaggio Assembly x86 (32-bit)
- Linguaggio Assembly x86-64 (64-bit)
- Linux File Management Cheat Sheet
- Linux Network Commands Cheat Sheet
- Linux Process Management Cheat Sheet
- Llama - Meta's Open Source AI Prompting Guide
- Lynis Security Audiing Tool Cheat Sheet
- MIPS Assembly Language
- Mac Terminal (Terminal.app) - MacOS Terminale nativo
- Manuale di Riferimento Velociraptor
- Masscan - Scanner ad alta velocità
- Microsoft Sentinel Cheatsheet
- Mimikatz Cheat Sheet
- Modello Context Protocol (MCP) Server Cheat Sheet
- Notifica la scheda del sistema di notifica
- Nslookup - DNS Lookup and Troubleshooting
- OWASP API Sicurezza Top 10 Comandi
- Oh My Zsh - Zsh Framework and Configuration Manager
- Outline VPN Cheatsheet
- Packer
- Pegasus-Pentest-Arsenal Cheat Sheet
- Perplexity AI - Search-Powered Prompting Guide
- PhpStorm
- Postman API Testing
- PowerShell Cheatsheet
- Powerlevel10k - Alta conformità Tema Zsh
- Principale
- Productivity Tools Cheatsheet
- PuTTY - Client SSH e Telnet per Windows
- Pure - Minimal Zsh Prompt
- PyCharm
- Python - Programming Language Reference
- Python-Pentest-Tools
- QualitÃ
- Qwen AI Promping Cheat Sheet
- RISC-V Assembly Language
- Radare2 - Reverse Engineering Framework
- Regular Expressions (RegEx) - Pattern Matching
- Rider
- Rubeus Kerberos Interaction Tool Cheat Sheet
- RubyMine
- SIFT Workstation Cheatsheet
- Scheda Tecnica del Server Context7 MCP
- Scheda di Riferimento WebGoat
- Scheda di Riferimento di CrewAI Multi-Agent Framework
- Scheda di Riferimento per Claude Code AI Assistant
- Scheda di Riferimento per la Generazione di Codice con OpenAI Codex
- SecurityOnion Cheatsheet
- Social Engineer Toolkit (SET) Cheatsheet
- Social Engineering Toolkit (SET) Cheat Sheet
- Starship - Customizer cross-Shell Prompt
- Stenographer - Full Packet Capture System
- Sublime Text
- Sumo Logic Cheatsheet
- Supabase - Open Source Firebase Alternative
- Suricata Network IDS/IPS Foglio di formaggio
- Tailscale Cheatsheet
- Testimone oculare
- TheHive Cheat Sheet
- Utilizzo di Claude Code
- Veil Cheat Sheet (Foglio di Riferimento Veil)
- Veracode
- Veracrypt
- Visual Studio
- Volatility Cheat Sheet
- Warp - Terminal Potenziato con IA
- Watson
- Waybackurls
- Waypoint
- WebStorm
- Webscreenshot
- Weirdaal
- Wfuzz Cheat Sheet
- WifiForge Cheat Sheet
- Wifite Cheat Sheet
- Windbg
- Windows Terminal
- Windows-Exploit-Suggester
- Winlogon
- Winpeas
- Winpmem
- Xxd
- Yum
- Zap-Api-Nodejs
- Zerologon-Bof
- Zipkin
- Zmap Cheat Sheet
- Zoomeye
- Zsh - Z Shell
- Zsteg
- Zuul
- btop - Monitor delle Risorse Moderno
- csh - Shell C
- curl - HTTP Client and Data Transfer
- dnSpy - .NET Debugger e Editor di Assembly
- iTerm2 Terminal
- il Harvester Email and Subdomain Enumeration Tool Cheat Sheet
- iptables Cheatsheet
- ksh - Korn Shell
- ping - Network Connectivity Testing
- sh - POSIX Shell
- ssh - Secure Shell Accesso remoto
- xterm - Emulatore di Terminale del Sistema X Window
cli-tools¶
cloning¶
cloud¶
- AWS CLI
- AWS Kiro
- Advanced Penetration Testing Methodologies: Master Professional Red Team Operations
- Advanced Threat Hunting Techniques: Master Proactive Cybersecurity Defense in 2025
- Azure CLI
- Cloud Scout Cheat Sheet
- CloudMapper Cheat Sheet
- Cloudflare
- Cloudfox
- Cloudgoat
- Cloudlist Cloud Assets Listing Cheat Sheet
- Command Line Mastery for Professionals
- DevSecOps Excellence: Integrate Security into Every Stage of Software Development
- Digital Forensics and Incident Response: Master Professional DFIR Operations
- Enterprise Cloud Security Mastery: Build Bulletproof Multi-Cloud Security Architectures
- Foglio Informativo di AzureHound per la Raccolta Dati di BloodHound
- Google Cloud CLI (gcloud)
- Network Security Architecture: Design Bulletproof Enterprise Network Defenses
- Padronanza della Riga di Comando per Professionisti
- SOC 2 Compliance for IT Teams: Master Security Framework Implementation
- Zero Trust Network Implementation: A Comprehensive Guide to Modern Security Architecture
cloud architecture¶
cloud governance¶
cloud technologies¶
cloud-architecture¶
- Eccellenza Networking Cloud Ibrido: Padroneggiare l'Integrazione Infrastrutturale Moderna
- Titolo: Eccellenza di Hybrid Cloud Networking: Padroneggiare l'Integrazione dell'Infrastruttura Moderna
cloud-computing¶
cloud-infrastructure¶
- Modelli aziendali terapeutici: Mastering Infrastructure as Code at Scale
- Terraform Enterprise Patterns: Padroneggiare Infrastructure as Code su Scala
cloud-management¶
cloud-migration¶
- Eccellenza Networking Cloud Ibrido: Padroneggiare l'Integrazione Infrastrutturale Moderna
- Titolo: Eccellenza di Hybrid Cloud Networking: Padroneggiare l'Integrazione dell'Infrastruttura Moderna
cloud-security¶
- CloudSploit Cheat Sheet
- Comandi ALTR
- Comandi Wiz MCP
- Foglio Informativo sulla Sicurezza di Forseti
- Foglio di Trucco
- Migliori pratiche di sicurezza Serverless
- Multi-Cloud Security Architecture
- Multi-Cloud Security Architecture
- Serverless Security Best Practices
cloud-technologies¶
cloudsploit¶
cnapp¶
code-completion¶
code-generator¶
code-scanning¶
code-to-cloud-security¶
coding¶
collaboration¶
- Asana Cheatsheet
- Comandi Gamma
- Google Meet Cheatsheet
- Guida di Riferimento Rapido di Excalidraw
- Mattermost Cheatsheet
- Microsoft Teams Cheatsheet
- Monday.com Cheatsheet
- Slack Cheatsheet
- Trello Cheatsheet
- Zoom Cheatsheet
command line¶
command-line¶
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
- Essential Linux Commands for IT Professionals: Master the Foundation of Modern Infrastructure
- Padronanza della Riga di Comando per Professionisti
- Padronanza della Riga di Comando per Professionisti
- Padronanza della Riga di Comando per Professionisti
commands¶
communication¶
- Discord Cheatsheet
- Google Meet Cheatsheet
- IRC Cheatsheet
- Mattermost Cheatsheet
- Microsoft Teams Cheatsheet
- Slack Cheatsheet
- Telegram Cheatsheet
- WhatsApp Business Cheatsheet
- Zoom Cheatsheet
community¶
compliance¶
- AI Guardian Cheatsheet
- AI SBOM Generator Cheatsheet
- Advanced Threat Hunting Techniques: Master Proactive Cybersecurity Defense in 2025
- Ansible Security Automation: Master DevOps Security Excellence
- CloudSploit Cheat Sheet
- Comandi ALTR
- Cribl Guard Cheatsheet
- Digital Forensics and Incident Response: Master Professional DFIR Operations
- Foglio Informativo sulla Sicurezza di Forseti
- Foglio di Trucco
- Gatekeeper Cheat Sheet
- Multi-Cloud Security Architecture
- Multi-Cloud Security Architecture
- Privacy Policy
- SOC 2 Compliance for IT Teams: Master Security Framework Implementation
- Zero Trust Network Implementation: A Comprehensive Guide to Modern Security Architecture
configuration management¶
configuration-management¶
container-security¶
containerization¶
containers¶
content-creation¶
context7¶
continuous-deployment¶
continuous-security¶
conversational-ai¶
copilot¶
- The Evolution of AI Coding: From Code Completion to Autonomous Agents
- Titolo: L'evoluzione dell'AI Coding: Da Code Completion a Autonomous Agents
cost optimization¶
covert-access¶
cross-platform¶
- AWS CLI
- Angular
- Ansible
- Apache
- Atom
- Azure CLI
- Burp Suite Cheat Sheet
- Chef
- Comandi Docker
- Comandi Vercel CLI
- Dirbuster
- Elasticsearch
- Elk
- Express
- Foglio di Riferimento Wireshark
- Foglio di guanto per oggetti
- Ghidra - Framework di Reverse Engineering dell'NSA
- Git Commands
- Gobuster Directory/File Brute Forcer Cheat Sheet
- Google Cloud CLI (gcloud)
- Guida di Riferimento Autopsy
- Guida di Riferimento Frida
- IntelliJ IDEA
- Python - Programming Language Reference
- Radare2 - Reverse Engineering Framework
- Scheda di Riferimento Emacs
- Scorciatoie di VS Code
- Volatility Cheat Sheet
- il Harvester Email and Subdomain Enumeration Tool Cheat Sheet
- ssh - Secure Shell Accesso remoto
cryptography¶
cursor¶
customer-service¶
cybersecurity¶
- A Comprehensive Guide to Mobile Incident Response
- Advanced Penetration Testing Methodologies: Master Professional Red Team Operations
- Advanced Threat Hunting Techniques: Master Proactive Cybersecurity Defense in 2025
- Ansible Security Automation: Master DevOps Security Excellence
- Blog
- Cybersecurity Workflow Automation: Transform Your Security Operations with Advanced Automation Frameworks
- DevSecOps Excellence: Integrate Security into Every Stage of Software Development
- Digital Forensics and Evidence Collection: Master Professional Investigation Excellence
- Digital Forensics and Incident Response: Master Professional DFIR Operations
- Enterprise Blockchain Security: A Strategic Implementation Guide
- Enterprise Cloud Security Mastery: Build Bulletproof Multi-Cloud Security Architectures
- Ethical Hacking Methodologies
- Guided Threat Hunts Cheatsheet
- Kubernetes Security Hardening: Bulletproof Container Orchestration Security
- Metodologie di Ethical Hacking
- Modern API Security: OAuth 2.1 and Beyond
- Network Security Architecture: Design Bulletproof Enterprise Network Defenses
- Risorse
- SOC 2 Compliance for IT Teams: Master Security Framework Implementation
- Sicurezza API moderna: OAuth 2.1 e oltre
- Sicurezza blockchain enterprise: Guida strategica all'implementazione
- Zeek Cheatsheet
- Zero Trust Network Implementation: A Comprehensive Guide to Modern Security Architecture
cyera¶
cynthion¶
dalfox¶
darpa-aixcc¶
dast-scanner¶
data engineering¶
- Architettura di Data Pipeline Sicura: Una Guida Completa
- Secure Data Pipeline Architecture: A Comprehensive Guide
data pipeline¶
- Architettura di Data Pipeline Sicura: Una Guida Completa
- Secure Data Pipeline Architecture: A Comprehensive Guide
data protection¶
data-collection¶
data-engineering¶
- MLOps Pipeline Implementation: A Complete Guide for Data Engineers
- MLOps Pipeline Implementation: A Comprehensive Guide for Data Engineers
data-governance¶
data-protection¶
data-security¶
database¶
debugging¶
decentralized¶
decompilation¶
decompiler¶
defi¶
- Enterprise Blockchain Security: A Strategic Implementation Guide
- Sicurezza blockchain enterprise: Guida strategica all'implementazione
deployment¶
- Comandi Vercel CLI
- MLOps Pipeline Implementation: A Complete Guide for Data Engineers
- MLOps Pipeline Implementation: A Comprehensive Guide for Data Engineers
design¶
desktop-apps¶
- Costruire App e Giochi con Claude Code: Padroneggiare i Prompt per Ogni Piattaforma
- Costruire app e giochi con Claude Code: Master Prompting per ogni piattaforma
developer-tools¶
developer-workflows¶
development¶
- AI-Assisted Coding: From IDE Assistants to Agent Programming
- Blog
- Claude Code Router
- Claude Code UI
- Claude Code Undo
- Codeql
- Comandi Docker
- Continue.dev Foglio di formaggio
- Git Commands
- Python - Programming Language Reference
- Risorse
- Scheda di Riferimento per Claude Code AI Assistant
- Scheda di Riferimento per la Generazione di Codice con OpenAI Codex
- Scorciatoie di VS Code
- Strumenti
- Utilizzo di Claude Code
- Veracode
development-environment¶
development-tools¶
- AI-Assisted Coding: Da Assistenti IDE alla Programmazione Agent
- AI-Assisted Coding: From IDE Assistants to Agent Programming
- The Evolution of AI Coding: From Code Completion to Autonomous Agents
- Titolo: L'evoluzione dell'AI Coding: Da Code Completion a Autonomous Agents
devops¶
- AWS Kiro
- Ansible Security Automation: Master DevOps Security Excellence
- Claude Code per l'Amministrazione di Sistema: AI-Powered Infrastructure Automation
- Cloud Scout Cheat Sheet
- CloudMapper Cheat Sheet
- Cloudflare
- Cloudfox
- Cloudgoat
- Cloudlist Cloud Assets Listing Cheat Sheet
- Comandi Docker
- Cybersecurity Workflow Automation: Transform Your Security Operations with Advanced Automation Frameworks
- Eccellenza Networking Cloud Ibrido: Padroneggiare l'Integrazione Infrastrutturale Moderna
- Essential Linux Commands for IT Professionals: Master the Foundation of Modern Infrastructure
- Foglio Informativo di AzureHound per la Raccolta Dati di BloodHound
- Foglio Informativo sulla Sicurezza di Forseti
- Foglio di Trucco
- Kubernetes Security Hardening: Bulletproof Container Orchestration Security
- Modelli aziendali terapeutici: Mastering Infrastructure as Code at Scale
- SRE Incident Management: Master Professional Site Reliability Engineering Excellence
- Terraform Enterprise Patterns: Padroneggiare Infrastructure as Code su Scala
- Titolo: Eccellenza di Hybrid Cloud Networking: Padroneggiare l'Integrazione dell'Infrastruttura Moderna
devsecops¶
- Architettura di Data Pipeline Sicura: Una Guida Completa
- AutoFix AI Agent Cheatsheet
- Foglio Informativo sulla Sicurezza di Aikido
- Foglio di Riferimento Checkov
- Integrazione Avanzata di Sicurezza Pipeline: Eccellenza DevSecOps
- Integrazione Avanzata di Sicurezza Pipeline: Padroneggiare DevSecOps in Ambienti CI/CD
- Legit Security Commands
- Secure Data Pipeline Architecture: A Comprehensive Guide
dfir¶
diagramming¶
digital forensics¶
digital-forensics¶
digital-logic¶
directory¶
directory-enumeration¶
discord¶
disk-analysis¶
disk-imaging¶
distributed systems¶
distributed tracing¶
- Distributed Tracing Implementation: A Comprehensive Guide for SRE Professionals
- Implementazione del Distributed Tracing: Una Guida Completa per Professionisti SRE
dns¶
- Advanced Penetration Testing Methodologies: Master Professional Red Team Operations
- DNS Best Practices & Standards: Master Enterprise Infrastructure Excellence
- DNS Fundamentals & Architecture: Master Internet Infrastructure Excellence
- DNS Management & Administration: Enterprise-Grade Infrastructure Excellence
- DNS Performance Optimization: Master Speed & Efficiency Excellence
- DNS Troubleshooting & Monitoring: Master Network Reliability Excellence
dns security¶
- DNS Management & Administration: Enterprise-Grade Infrastructure Excellence
- DNS Security & DNSSEC: Advanced Protection for Internet Infrastructure
dnssec¶
docker¶
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
- Padronanza della Riga di Comando per Professionisti
document-forensics¶
documentation¶
dom-analysis¶
dynamic-analysis¶
eda¶
edge computing¶
edr¶
electronics¶
email¶
embedded-security¶
embedded-systems¶
emerging technologies¶
encryption¶
- A Deep Dive into Mobile Device Encryption
- Migliori pratiche di sicurezza Serverless
- ProtonMail Cheatsheet
- Serverless Security Best Practices
engineering management¶
enterprise infrastructure¶
enterprise it¶
enterprise-ai¶
enterprise-architecture¶
- Modelli aziendali terapeutici: Mastering Infrastructure as Code at Scale
- Terraform Enterprise Patterns: Padroneggiare Infrastructure as Code su Scala
enterprise-security¶
- Enterprise Blockchain Security: A Strategic Implementation Guide
- Scheda di guastatura
- Sicurezza blockchain enterprise: Guida strategica all'implementazione
esp32¶
ethernet-monitoring¶
ethical-hacking¶
evidence collection¶
external-links¶
fiddler¶
file explorer¶
file management¶
financial management¶
fingerprinting¶
finops¶
fintech¶
- Enterprise Blockchain Security: A Strategic Implementation Guide
- Sicurezza blockchain enterprise: Guida strategica all'implementazione
firewall¶
firmware¶
flipper-zero¶
flux¶
forensic investigation¶
forensics¶
- Advanced Penetration Testing Methodologies: Master Professional Red Team Operations
- Advanced Threat Hunting Techniques: Master Proactive Cybersecurity Defense in 2025
- Binwalk - Strumento di Analisi Firmware
- BitUnlocker Cheatsheet
- Dd
- DevSecOps Excellence: Integrate Security into Every Stage of Software Development
- Digital Forensics and Incident Response: Master Professional DFIR Operations
- Enterprise Cloud Security Mastery: Build Bulletproof Multi-Cloud Security Architectures
- Foglio di Riferimento Wireshark
- Guida di Riferimento Autopsy
- Network Security Architecture: Design Bulletproof Enterprise Network Defenses
- SOC 2 Compliance for IT Teams: Master Security Framework Implementation
- Volatility Cheat Sheet
- Zero Trust Network Implementation: A Comprehensive Guide to Modern Security Architecture
forseti-security¶
frameworks¶
frontend¶
fusion-360¶
future-of-coding¶
- The Evolution of AI Coding: From Code Completion to Autonomous Agents
- Titolo: L'evoluzione dell'AI Coding: Da Code Completion a Autonomous Agents
fuzzing¶
game-development¶
- Costruire App e Giochi con Claude Code: Padroneggiare i Prompt per Ogni Piattaforma
- Costruire app e giochi con Claude Code: Master Prompting per ogni piattaforma
gatekeeper¶
gcp¶
- CloudSploit Cheat Sheet
- Eccellenza Networking Cloud Ibrido: Padroneggiare l'Integrazione Infrastrutturale Moderna
- Google Cloud CLI (gcloud)
- Titolo: Eccellenza di Hybrid Cloud Networking: Padroneggiare l'Integrazione dell'Infrastruttura Moderna
gcp-security¶
gdpr¶
generative-ai¶
getting-started¶
gf¶
ghidra¶
git¶
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
- Padronanza della Riga di Comando per Professionisti
github copilot¶
github-copilot¶
- AI-Assisted Coding: Da Assistenti IDE alla Programmazione Agent
- AI-Assisted Coding: From IDE Assistants to Agent Programming
gitops¶
google-cloud¶
google-meet¶
governance¶
- AI Guardian Cheatsheet
- Enterprise Blockchain Security: A Strategic Implementation Guide
- Multi-Cloud Security Architecture
- Multi-Cloud Security Architecture
- Sicurezza blockchain enterprise: Guida strategica all'implementazione
gpt-4¶
gpt-5¶
great-scott-gadgets¶
grep¶
gui-application¶
- Atom
- Burp Suite Cheat Sheet
- Dirbuster
- Foglio di Riferimento Wireshark
- Ghidra - Framework di Reverse Engineering dell'NSA
- Guida di Riferimento Autopsy
- IntelliJ IDEA
- Scheda di Riferimento Emacs
- Scorciatoie di VS Code
- x64dbg - Windows Debugger
guides¶
hackrf¶
hak5¶
- Hak5 Key Croc Cheatsheet
- Hak5 LAN Turtle Cheatsheet
- Hak5 Packet Squirrel Cheatsheet
- Hak5 Shark Jack Cheatsheet
- WiFi Pineapple Cheatsheet
hardware¶
- 3D Printable PCB Cheatsheet
- Bjorn Cheatsheet
- BladeRF Cheatsheet
- ESP32 Marauder Cheatsheet
- Flipper Zero Cheatsheet
- Flipper Zero Firmware Cheatsheet
- HackRF One Cheatsheet
- KiCad Cheatsheet
- Momentum Firmware Cheatsheet
- PandwaRF Cheatsheet
- PortaPack Cheatsheet
- Rtl sdr
- WiFi Pineapple Cheatsheet
hardware-design¶
hardware-hacking¶
hardware-security¶
hashicorp¶
- Modelli aziendali terapeutici: Mastering Infrastructure as Code at Scale
- Terraform Enterprise Patterns: Padroneggiare Infrastructure as Code su Scala
hayabusa¶
high availability¶
- Advanced Load Balancing Strategies for Modern Infrastructure
- Strategie Avanzate di Load Balancing per Infrastrutture Moderne
homepage¶
http-proxy¶
humint¶
hybrid-cloud¶
- Eccellenza Networking Cloud Ibrido: Padroneggiare l'Integrazione Infrastrutturale Moderna
- Multi-Cloud Security Architecture
- Multi-Cloud Security Architecture
- Titolo: Eccellenza di Hybrid Cloud Networking: Padroneggiare l'Integrazione dell'Infrastruttura Moderna
iOS¶
- A Deep Dive into iOS App Management & Deployment
- A Deep Dive into iOS Enterprise Configuration
- A Deep Dive into iOS Network & VPN Configuration
- Uno sguardo approfondito sulla configurazione di rete e VPN di iOS
iac¶
- Modelli aziendali terapeutici: Mastering Infrastructure as Code at Scale
- Terraform Enterprise Patterns: Padroneggiare Infrastructure as Code su Scala
iam¶
iast-security¶
icopy-x¶
ide-assistants¶
- AI-Assisted Coding: Da Assistenti IDE alla Programmazione Agent
- AI-Assisted Coding: From IDE Assistants to Agent Programming
ide-editors¶
identity-security¶
implementation¶
incident management¶
incident response¶
- A Comprehensive Guide to Mobile Incident Response
- Digital Forensics and Evidence Collection: Master Professional Investigation Excellence
- SRE Incident Management: Master Professional Site Reliability Engineering Excellence
incident-response¶
- Autonomous PowerShell Agent Cheatsheet
- BitUnlocker Cheatsheet
- Hayabusa & Suzaku Cheatsheet
- Vectra AI Commands
index¶
information-gathering¶
infrastructure¶
- Claude Code per l'Amministrazione di Sistema: AI-Powered Infrastructure Automation
- Eccellenza Networking Cloud Ibrido: Padroneggiare l'Integrazione Infrastrutturale Moderna
- Essential Linux Commands for IT Professionals: Master the Foundation of Modern Infrastructure
- Network Performance Optimization: A Comprehensive Guide
- Ottimizzazione delle prestazioni di rete: una guida completa
- Titolo: Eccellenza di Hybrid Cloud Networking: Padroneggiare l'Integrazione dell'Infrastruttura Moderna
infrastructure protection¶
infrastructure security¶
- Ansible Security Automation: Master DevOps Security Excellence
- Edge Security Architecture: Comprehensive Guide to Securing Distributed Computing Infrastructure
infrastructure-as-code¶
- Foglio di Riferimento Checkov
- Guida di Riferimento env0
- Modelli aziendali terapeutici: Mastering Infrastructure as Code at Scale
- Terraform Enterprise Patterns: Padroneggiare Infrastructure as Code su Scala
infrastructure-engineering¶
- Modelli aziendali terapeutici: Mastering Infrastructure as Code at Scale
- Terraform Enterprise Patterns: Padroneggiare Infrastructure as Code su Scala
infrastructure-security¶
instagram¶
intelligence-gathering¶
intermediate¶
- AADInternals Azure AD Exploitation Toolkit Cheat Sheet
- ADConnectDump Foglio Informativo per l'Estrazione delle Credenziali di Azure AD Connect
- ASNmap Guida di Riferimento per il Mapping degli ASN
- AWS CLI
- AWS Kiro
- Aircrack-ng Cheat Sheet
- Alacritty - Terminal Accelerato da GPU
- Anchore
- AndroGuard Cheat Sheet
- Angular
- Ansible
- Ant Cheat Sheet
- Apache
- Apimonitor
- Apt-Get
- Aqua
- Aquatone
- Arachni Cheat Sheet
- Ares RAT Cheat Sheet
- Arjun
- Arp-Scan
- Asreproast
- Assetfinder
- Awesome-Go
- Awesome-Java
- Awesome-Nodejs
- Awesome-Python
- Azucar Azure Security Auditing Tool Cheat Sheet
- Azure CLI
- Backdoors & Breaches Comandi
- Bash bunny
- Batch
- Bazaar
- BeEF Browser Exploitation Framework Cheat Sheet
- Beacon
- Binwalk - Strumento di Analisi Firmware
- Bitbucket
- Bozza
- Brackets
- Brakeman Ruby on Rails Foglio di Riferimento per la Sicurezza
- Brute Ratel C4 Framework Foglio di Riferimento
- Brutespray
- Bully
- Bundler
- Burp
- Burp Suite Cheat Sheet
- Bwapp
- Bzr
- CLI di DigitalOcean (doctl)
- CLion
- Censys
- Censys-Python
- Chai
- ChatGPT e GPT-4 - Guida al Prompting con IA
- Cheat Sheet YARA
- Cheat Sheet dello Strumento di Phishing Blackeye
- Cheat Sheet di ExploitDB
- Cheat Sheet per Generatore di Wordlist di Sottodomini AlterX
- Cheatsheet-God
- Checkmarx
- Chef
- Chisel Cheat Sheet (remains the same, as it's a technical term)
- Chocolatey
- Cisco ASA Cheat Sheet
- Clair
- Clang/LLVM - Infrastruttura Moderna per Compilatori
- Class-Dump
- Claude - Guida al Prompting con IA
- Claude Code Router
- Claude Code UI
- Claude Code Undo
- Claudia
- Cloud Scout Cheat Sheet
- CloudMapper Cheat Sheet
- Cloudflare
- Cloudfox
- Cloudgoat
- Cloudlist Cloud Assets Listing Cheat Sheet
- Codeql
- Comandi ALTR
- Comandi Bugsy
- Comandi Cortex
- Comandi Divjoy
- Comandi Docker
- Comandi ELSA
- Comandi ElevenLabs
- Comandi Skipfish
- Comandi Vercel CLI
- Comandi Wiz MCP
- Comandi Xplico
- Comandi di immersione
- Composer
- Comsvcs
- Conda
- Coniglio bianco Neo AI Promping Cheat Sheet
- Consul
- Continue.dev Foglio di formaggio
- Covenant C2 Framework Cheat Sheet
- Coverage
- Cowpatty
- Cron
- Cti-Python-Stix2
- Cupp
- Cursor
- Cybersecurity Workflow Automation: Transform Your Security Operations with Advanced Automation Frameworks
- DVWA (Damn Vulnerable Web Application) Cheat Sheet
- Dc3Dd
- Dcfldd
- Dd
- Decryptautologon
- Deviazioni
- Dex2Jar
- Diagon
- Dig - Ricerca DNS e Risoluzione dei Problemi
- Dirsearch
- Docker Bench Cheat Sheet
- Dradis Cheat Sheet
- Drone
- Drozer Cheat Sheet
- Duckduckgo
- Dumpit
- Eaphammer
- Editor Windsurf
- Editor Zed
- Elastic SIEM Cheat Sheet
- Elasticsearch
- Elemento
- Emerge
- Enum4Linux
- Età
- Excel - Formule, Funzioni & Produttività
- Exegol
- Exiftool
- Fakelogonscreen
- Faker
- Fast-Google-Dorks-Scan
- Fenicottero
- Feroxbuster
- Findomain
- Firebase - Piattaforma Backend-as-a-Service di Google
- Flare-Vm
- Flink
- Fluxion
- Foglio Comandi di CrackMapExec
- Foglio Informativo del Framework Multi-Agente AutoGen
- Foglio Informativo del Sonnellino dei Bambini
- Foglio Informativo dello Strumento di Valutazione della Sicurezza di Azure
- Foglio Informativo di AzureHound per la Raccolta Dati di BloodHound
- Foglio Informativo di Cobalt Strike
- Foglio Informativo di Cutter
- Foglio Informativo di EvilGinx2 per Framework di Phishing
- Foglio Informativo di VSagent
- Foglio Informativo di W3af Web Application Attack Framework
- Foglio Informativo di Wifiphisher Wireless Phishing Framework
- Foglio Informativo sulla Sicurezza di Aikido
- Foglio di Riferimento Checkov
- Foglio di Riferimento Wapiti
- Foglio di Riferimento Wireshark
- Foglio di Riferimento di Empire Framework
- Foglio di Riferimento per la Gestione DNS
- Foglio di guanto per oggetti
- Framework di Comando e Controllo Villain C2 Cheat Sheet
- Ftkimager
- GCC - GNU Compiler Collection
- Garak
- Gau
- Gedit
- Gem
- Gemini CLI
- Gestore di Pacchetti APT
- Gestore di Pacchetti YUM/DNF
- Ghostty - Terminal Emulator
- GoLand
- Google Cloud CLI (gcloud)
- Google Gemini - Guida al Prompting con IA
- Guida Rapida a CyberChef
- Guida Rapida di Bazel
- Guida Rapida di CMake
- Guida Rapida di ClickUp
- Guida di Riferimento Autopsy
- Guida di Riferimento Wazuh
- Guida di Riferimento env0
- Guida di Riferimento per Dia Browser
- Guida di Riferimento per il Prompting di DeepSeek AI
- Host - Simple DNS Lookup Tool
- IDA Pro - Interactive Disassembler Professional
- IntelliJ IDEA
- Interactsh OOB Interaction Gathering Cheat Sheet
- JavaScript - Modern Web Development
- Jupyter Notebook
- Legit Security Commands
- Linguaggio Assembly AArch64 (ARM64)
- Linguaggio Assembly ARM (32-bit)
- Linguaggio Assembly x86 (32-bit)
- Linguaggio Assembly x86-64 (64-bit)
- Linux File Management Cheat Sheet
- Linux Network Commands Cheat Sheet
- Linux Process Management Cheat Sheet
- Llama - Meta's Open Source AI Prompting Guide
- Lynis Security Audiing Tool Cheat Sheet
- MIPS Assembly Language
- Mac Terminal (Terminal.app) - MacOS Terminale nativo
- Manuale di Riferimento Velociraptor
- Masscan - Scanner ad alta velocità
- Microsoft Sentinel Cheatsheet
- Mimikatz Cheat Sheet
- Modello Context Protocol (MCP) Server Cheat Sheet
- Notifica la scheda del sistema di notifica
- Nslookup - DNS Lookup and Troubleshooting
- OWASP API Sicurezza Top 10 Comandi
- Oh My Zsh - Zsh Framework and Configuration Manager
- Outline VPN Cheatsheet
- Packer
- Pegasus-Pentest-Arsenal Cheat Sheet
- Perplexity AI - Search-Powered Prompting Guide
- PhpStorm
- Postman API Testing
- PowerShell Cheatsheet
- Powerlevel10k - Alta conformità Tema Zsh
- Principale
- Productivity Tools Cheatsheet
- PuTTY - Client SSH e Telnet per Windows
- Pure - Minimal Zsh Prompt
- PyCharm
- Python-Pentest-Tools
- QualitÃ
- Qwen AI Promping Cheat Sheet
- RISC-V Assembly Language
- Regular Expressions (RegEx) - Pattern Matching
- Rider
- Rubeus Kerberos Interaction Tool Cheat Sheet
- RubyMine
- SIFT Workstation Cheatsheet
- Scheda Tecnica del Server Context7 MCP
- Scheda di Riferimento Amazon CodeWhisperer
- Scheda di Riferimento Amazon Q
- Scheda di Riferimento Emacs
- Scheda di Riferimento FOCA
- Scheda di Riferimento WebGoat
- Scheda di Riferimento di CrewAI Multi-Agent Framework
- Scheda di Riferimento per Claude Code AI Assistant
- Scheda di Riferimento per la Generazione di Codice con OpenAI Codex
- Scraper API Commands
- SecurityOnion Cheatsheet
- Social Engineer Toolkit (SET) Cheatsheet
- Social Engineering Toolkit (SET) Cheat Sheet
- Starship - Customizer cross-Shell Prompt
- Stenographer - Full Packet Capture System
- Sublime Text
- Sumo Logic Cheatsheet
- Supabase - Open Source Firebase Alternative
- Suricata Network IDS/IPS Foglio di formaggio
- Tailscale Cheatsheet
- Testimone oculare
- TheHive Cheat Sheet
- Utilizzo di Claude Code
- Veil Cheat Sheet (Foglio di Riferimento Veil)
- Veracode
- Veracrypt
- Visual Studio
- Warp - Terminal Potenziato con IA
- Watson
- Waybackurls
- Waypoint
- WebStorm
- Webscreenshot
- Weirdaal
- Wfuzz Cheat Sheet
- WifiForge Cheat Sheet
- Wifite Cheat Sheet
- Windbg
- Windows Terminal
- Windows-Exploit-Suggester
- Winlogon
- Winpeas
- Winpmem
- Xxd
- Yum
- Zap-Api-Nodejs
- Zerologon-Bof
- Zipkin
- Zmap Cheat Sheet
- Zoomeye
- Zsteg
- Zuul
- btop - Monitor delle Risorse Moderno
- csh - Shell C
- curl - HTTP Client and Data Transfer
- dnSpy - .NET Debugger e Editor di Assembly
- iTerm2 Terminal
- iptables Cheatsheet
- ksh - Korn Shell
- ping - Network Connectivity Testing
- sh - POSIX Shell
- xterm - Emulatore di Terminale del Sistema X Window
internet¶
internet protocols¶
intrusion-detection¶
ios¶
iot security¶
iot-security¶
iperf¶
iperf3¶
irc¶
it-professionals¶
java-development¶
javascript¶
jitter-measurement¶
kanban¶
key-croc¶
keylogging¶
keystroke-injection¶
kicad¶
kubernetes¶
- Calico
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
- Gatekeeper Cheat Sheet
- Kubernetes Security Hardening: Bulletproof Container Orchestration Security
- Scheda di Riferimento FluxCD
lab401¶
lan-turtle¶
langchain¶
large-language-models¶
latency-analysis¶
latency-testing¶
learning¶
legal¶
library¶
linux¶
- Advanced Penetration Testing Methodologies: Master Professional Red Team Operations
- Aircrack-ng Cheat Sheet
- Bash - Bourne Again Shell
- Binwalk - Strumento di Analisi Firmware
- Crontab
- Dd
- DevSecOps Excellence: Integrate Security into Every Stage of Software Development
- Dirb
- Enterprise Cloud Security Mastery: Build Bulletproof Multi-Cloud Security Architectures
- Essential Linux Commands for IT Professionals: Master the Foundation of Modern Infrastructure
- Fish - Shell Interattivo Amichevole
- GDB - GNU Debugger
- Masscan - Scanner ad alta velocità
- Network Security Architecture: Design Bulletproof Enterprise Network Defenses
- Zsh - Z Shell
- iptables Cheatsheet
linux-security¶
llm-agent¶
load balancing¶
- Advanced Load Balancing Strategies for Modern Infrastructure
- Strategie Avanzate di Load Balancing per Infrastrutture Moderne
logging¶
logic-analyzer¶
mac-address-tracking¶
machine-learning¶
- MLOps Pipeline Implementation: A Complete Guide for Data Engineers
- MLOps Pipeline Implementation: A Comprehensive Guide for Data Engineers
macos¶
malware¶
malware-analysis¶
man-in-the-middle¶
mattermost¶
mcp¶
mdr¶
memory-analysis¶
messaging¶
- Discord Cheatsheet
- Slack Cheatsheet
- Snapchat Cheatsheet
- Telegram Cheatsheet
- WhatsApp Business Cheatsheet
meta-programming¶
- Costruire Applicazioni Auto-Referenziali con Claude Code: Tecniche Avanzate di Prompting per la Meta-Programmazione
- Costruire applicazioni auto-referenziali con Claude Code: Prompting avanzato per Meta-Programming
metadata-analysis¶
microblogging¶
microservices¶
- Distributed Tracing Implementation: A Comprehensive Guide for SRE Professionals
- Implementazione del Distributed Tracing: Una Guida Completa per Professionisti SRE
microsoft-teams¶
mlops¶
- MLOps Pipeline Implementation: A Complete Guide for Data Engineers
- MLOps Pipeline Implementation: A Comprehensive Guide for Data Engineers
mobile device management¶
mobile security¶
- A Comprehensive Guide to Mobile App Security Assessment
- A Comprehensive Guide to Mobile Incident Response
- A Deep Dive into Mobile Device Encryption
mobile-development¶
- Costruire App e Giochi con Claude Code: Padroneggiare i Prompt per Ogni Piattaforma
- Costruire app e giochi con Claude Code: Master Prompting per ogni piattaforma
mobile-security¶
monday.com¶
monitoring¶
- DNS Performance Optimization: Master Speed & Efficiency Excellence
- DNS Troubleshooting & Monitoring: Master Network Reliability Excellence
- Distributed Tracing Implementation: A Comprehensive Guide for SRE Professionals
- Elk
- Implementazione del Distributed Tracing: Una Guida Completa per Professionisti SRE
- MLOps Pipeline Implementation: A Complete Guide for Data Engineers
- MLOps Pipeline Implementation: A Comprehensive Guide for Data Engineers
- Performance Optimization Commands: Master Professional Command-Line Excellence
mtr¶
multi-cloud¶
my-traceroute¶
natural-language-processing¶
ndr¶
network¶
- Advanced Penetration Testing Methodologies: Master Professional Red Team Operations
- Advanced Threat Hunting Techniques: Master Proactive Cybersecurity Defense in 2025
- DevSecOps Excellence: Integrate Security into Every Stage of Software Development
- Digital Forensics and Incident Response: Master Professional DFIR Operations
- Enterprise Cloud Security Mastery: Build Bulletproof Multi-Cloud Security Architectures
- Network Performance Optimization: A Comprehensive Guide
- Network Security Architecture: Design Bulletproof Enterprise Network Defenses
- Ottimizzazione delle prestazioni di rete: una guida completa
- SOC 2 Compliance for IT Teams: Master Security Framework Implementation
- Zero Trust Network Implementation: A Comprehensive Guide to Modern Security Architecture
network administration¶
network diagnostics¶
network infrastructure¶
- Advanced Load Balancing Strategies for Modern Infrastructure
- DNS Best Practices & Standards: Master Enterprise Infrastructure Excellence
- DNS Fundamentals & Architecture: Master Internet Infrastructure Excellence
- DNS Performance Optimization: Master Speed & Efficiency Excellence
- Strategie Avanzate di Load Balancing per Infrastrutture Moderne
network security¶
- DNS Security & DNSSEC: Advanced Protection for Internet Infrastructure
- Edge Security Architecture: Comprehensive Guide to Securing Distributed Computing Infrastructure
network-benchmarking¶
network-diagnostics¶
network-forensics¶
network-monitoring¶
network-performance¶
network-security¶
- Arpwatch Cheatsheet
- Bjorn Cheatsheet
- Boofuzz Cheat Sheet
- Eccellenza Networking Cloud Ibrido: Padroneggiare l'Integrazione Infrastrutturale Moderna
- Foglio di Riferimento Wireshark
- Hak5 LAN Turtle Cheatsheet
- Hak5 Packet Squirrel Cheatsheet
- Hak5 Shark Jack Cheatsheet
- Linux Network Commands Cheat Sheet
- Masscan - Scanner ad alta velocità
- SSHamble Cheatsheet
- Titolo: Eccellenza di Hybrid Cloud Networking: Padroneggiare l'Integrazione dell'Infrastruttura Moderna
- Vectra AI Commands
- WiFi Pineapple Cheatsheet
- Zeek Cheatsheet
- ping - Network Connectivity Testing
network-surveillance¶
networking¶
- A Practical Guide to Implementing a Software-Defined Perimeter (SDP)
- Apache
- Eccellenza Networking Cloud Ibrido: Padroneggiare l'Integrazione Infrastrutturale Moderna
- Envoy Proxy
- Linux Network Commands Cheat Sheet
- Titolo: Eccellenza di Hybrid Cloud Networking: Padroneggiare l'Integrazione dell'Infrastruttura Moderna
- iptables Cheatsheet
- ping - Network Connectivity Testing
- ssh - Secure Shell Accesso remoto
newsletter¶
nfc¶
nist¶
no-code¶
non-human-identities¶
nsa-tools¶
ntt-data¶
observability¶
- Distributed Tracing Implementation: A Comprehensive Guide for SRE Professionals
- Implementazione del Distributed Tracing: Una Guida Completa per Professionisti SRE
office-365¶
omg-cable¶
online-meetings¶
opa¶
open-source¶
- Akheron Proxy Cheatsheet
- Buttercup CRS Cheatsheet
- Hayabusa & Suzaku Cheatsheet
- Mattermost Cheatsheet
- PrusaSlicer Cheatsheet
openai¶
opengraph¶
operating systems¶
operating-systems¶
- Comandi Linux essenziali per professionisti IT
- Essential Linux Commands for IT Professionals
- Windows 11 Network Management
- Windows 11 Network Management
optimization¶
- Network Performance Optimization: A Comprehensive Guide
- Ottimizzazione delle prestazioni di rete: una guida completa
osint¶
- Commercial Intelligence Blend Tools Cheatsheet
- il Harvester Email and Subdomain Enumeration Tool Cheat Sheet
osint-investigation¶
overview¶
owasp¶
pacbot¶
packet-analysis¶
packet-loss¶
packet-squirrel¶
pandwarf¶
pattern-matching¶
pcb¶
pcb-design¶
penetration-testing¶
- Aircrack-ng Cheat Sheet
- Arp-Scan
- Burp Suite Cheat Sheet
- Cheat Sheet di ExploitDB
- Cheat Sheet di WhatWeb
- Dalfox Cheat Sheet
- Dirsearch
- Enum4Linux
- Ethical Hacking Methodologies
- Fast-Google-Dorks-Scan
- Foglio Comandi di CrackMapExec
- Foglio Informativo dello Strumento di Valutazione della Sicurezza di Azure
- Foglio di Riferimento XSStrike
- Hak5 Key Croc Cheatsheet
- Hak5 LAN Turtle Cheatsheet
- Hak5 Packet Squirrel Cheatsheet
- Hak5 Shark Jack Cheatsheet
- Metodologie di Ethical Hacking
- O.MG Cable Cheatsheet
- OWASP API Sicurezza Top 10 Comandi
- PandwaRF Cheatsheet
- Pegasus-Pentest-Arsenal Cheat Sheet
- Proxmark 3 RDV4 Cheatsheet
- Python-Pentest-Tools
- Scheda di Riferimento WebGoat
- SecurityOnion Cheatsheet
- USBNinja Cheatsheet
- Waybackurls
- WebStorm
- Webscreenshot
- Windows-Exploit-Suggester
- curl - HTTP Client and Data Transfer
- gf (Schemi Gf) Foglio di Riferimento
- iCopy-X Cheatsheet
pentesting¶
- Bjorn Cheatsheet
- ESP32 Marauder Cheatsheet
- Flipper Zero Cheatsheet
- Flipper Zero Firmware Cheatsheet
- HackRF One Cheatsheet
- Momentum Firmware Cheatsheet
performance¶
- Advanced Load Balancing Strategies for Modern Infrastructure
- Network Performance Optimization: A Comprehensive Guide
- Ottimizzazione delle prestazioni di rete: una guida completa
- Strategie Avanzate di Load Balancing per Infrastrutture Moderne
performance optimization¶
- DNS Performance Optimization: Master Speed & Efficiency Excellence
- Performance Optimization Commands: Master Professional Command-Line Excellence
performance-testing¶
perplexity¶
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
photo-sharing¶
ping¶
pipeline¶
- MLOps Pipeline Implementation: A Complete Guide for Data Engineers
- MLOps Pipeline Implementation: A Comprehensive Guide for Data Engineers
pipeline-security¶
- Integrazione Avanzata di Sicurezza Pipeline: Eccellenza DevSecOps
- Integrazione Avanzata di Sicurezza Pipeline: Padroneggiare DevSecOps in Ambienti CI/CD
plugins¶
policy¶
policy-as-code¶
policy-enforcement¶
port-scanning¶
portapack¶
powershell¶
presentation¶
presentation-design¶
privacy¶
- A Deep Dive into iOS Security & Privacy Settings
- Privacy Policy
- ProtonMail Cheatsheet
- Telegram Cheatsheet
productivity¶
- Asana Cheatsheet
- Comandi Gamma
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
- Essential Linux Commands for IT Professionals: Master the Foundation of Modern Infrastructure
- Guida Rapida di ClickUp
- Microsoft Teams Cheatsheet
- Monday.com Cheatsheet
- Presentify Commands
- Scheda di Riferimento DevDocs
- Slack Cheatsheet
- Trello Cheatsheet
- Windows 11 Advanced File Management: Master Professional Organization Excellence
professional development¶
professional reference¶
- Performance Optimization Commands: Master Professional Command-Line Excellence
- SRE Incident Management: Master Professional Site Reliability Engineering Excellence
professional-development¶
programming¶
- Claude Code Router
- Claude Code UI
- Claude Code Undo
- Codeql
- Continue.dev Foglio di formaggio
- Scheda di Riferimento per Claude Code AI Assistant
- Scheda di Riferimento per la Generazione di Codice con OpenAI Codex
- Utilizzo di Claude Code
- Veracode
programming-language¶
programming-languages¶
project-management¶
prompting¶
- Claude Code per Principianti: Padroneggia lo Sviluppo Guidato dall'IA Attraverso Prompt Intelligenti
- Claude Code per principianti: Master AI-Powered Development attraverso Smart Prompting
protocol¶
protocol-testing¶
protonmail¶
prototyping¶
proxmark3¶
proxy¶
prusa-slicer¶
publishing¶
python¶
radio-frequency¶
radio-hacking¶
rapid7¶
raspberry-pi¶
react¶
reconnaissance¶
- Cheat Sheet di WhatWeb
- Wappalyzer Cheat Sheet
- il Harvester Email and Subdomain Enumeration Tool Cheat Sheet
red-teaming¶
- Hak5 Shark Jack Cheatsheet
- O.MG Cable Cheatsheet
- SSHamble Cheatsheet
- USBNinja Cheatsheet
- WiFi Pineapple Cheatsheet
reference¶
- Cheat Sheet
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- Home
- Padronanza della Riga di Comando per Professionisti
- Padronanza della Riga di Comando per Professionisti
- Padronanza della Riga di Comando per Professionisti
- Scheda di Riferimento DevDocs
references¶
relationship-analysis¶
remote-access¶
research¶
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
resources¶
reverse-engineering¶
- Binwalk - Strumento di Analisi Firmware
- Cheat Sheet degli Strumenti WebAssembly (WASM)
- Foglio Informativo dei Plugin di Ghidra
- GDB - GNU Debugger
- Ghidra - Framework di Reverse Engineering dell'NSA
- Radare2 - Reverse Engineering Framework
- angr Cheat Sheet
- x64dbg - Windows Debugger
rf-analysis¶
rfid¶
risk-management¶
- Enterprise Blockchain Security: A Strategic Implementation Guide
- Sicurezza blockchain enterprise: Guida strategica all'implementazione
runtime-analysis¶
runtime-protection¶
sbom¶
scalability¶
- Advanced Load Balancing Strategies for Modern Infrastructure
- Strategie Avanzate di Load Balancing per Infrastrutture Moderne
scheduling¶
screen-annotation¶
scripting¶
sdp¶
sdr¶
search¶
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- Elasticsearch
secrets-management¶
- Integrazione Avanzata di Sicurezza Pipeline: Eccellenza DevSecOps
- Integrazione Avanzata di Sicurezza Pipeline: Padroneggiare DevSecOps in Ambienti CI/CD
- Secrets Insights Cheatsheet
security¶
- A Deep Dive into iOS Security & Privacy Settings
- A Practical Guide to Implementing a Software-Defined Perimeter (SDP)
- Architettura di Data Pipeline Sicura: Una Guida Completa
- Arp-Scan
- Cheat Sheet di ExploitDB
- DNS Best Practices & Standards: Master Enterprise Infrastructure Excellence
- Enum4Linux
- Fast-Google-Dorks-Scan
- Foglio Comandi di CrackMapExec
- Foglio Informativo dello Strumento di Valutazione della Sicurezza di Azure
- Gatekeeper Cheat Sheet
- Migliori pratiche di sicurezza Serverless
- OWASP API Sicurezza Top 10 Comandi
- PandwaRF Cheatsheet
- Pegasus-Pentest-Arsenal Cheat Sheet
- ProtonMail Cheatsheet
- Python-Pentest-Tools
- Secure Data Pipeline Architecture: A Comprehensive Guide
- SecurityOnion Cheatsheet
- Serverless Security Best Practices
- Windows-Exploit-Suggester
security architecture¶
security assessment¶
security automation¶
security-analytics¶
security-architecture¶
security-assessment¶
security-monitoring¶
security-operations¶
security-professionals¶
security-research¶
security-scanning¶
security-testing¶
security-tools¶
- Integrazione Avanzata di Sicurezza Pipeline: Eccellenza DevSecOps
- Integrazione Avanzata di Sicurezza Pipeline: Padroneggiare DevSecOps in Ambienti CI/CD
self-hosted¶
self-referential¶
- Costruire Applicazioni Auto-Referenziali con Claude Code: Tecniche Avanzate di Prompting per la Meta-Programmazione
- Costruire applicazioni auto-referenziali con Claude Code: Prompting avanzato per Meta-Programming
serverless¶
service¶
shark-jack¶
shell¶
siem¶
site reliability engineering¶
slack¶
slicer¶
smart-contracts¶
- Enterprise Blockchain Security: A Strategic Implementation Guide
- Sicurezza blockchain enterprise: Guida strategica all'implementazione
snapchat¶
soc¶
social-engineering¶
social-mapping¶
social-media¶
- Bluesky Cheatsheet
- Instagram Cheatsheet
- Snapchat Cheatsheet
- Telegram Cheatsheet
- TikTok Cheatsheet
- X (Twitter) Cheatsheet
software¶
software-defined-radio¶
specterops¶
sre practices¶
ssh¶
ssh-exploitation¶
standards¶
sub-ghz¶
substack¶
supply-chain-security¶
- AI SBOM Generator Cheatsheet
- Integrazione Avanzata di Sicurezza Pipeline: Eccellenza DevSecOps
- Integrazione Avanzata di Sicurezza Pipeline: Padroneggiare DevSecOps in Ambienti CI/CD
surveillance¶
suzaku¶
symbolic-execution¶
sysadmin¶
system administration¶
- DNS Fundamentals & Architecture: Master Internet Infrastructure Excellence
- DNS Management & Administration: Enterprise-Grade Infrastructure Excellence
- DNS Troubleshooting & Monitoring: Master Network Reliability Excellence
- Performance Optimization Commands: Master Professional Command-Line Excellence
- Windows 11 Advanced File Management: Master Professional Organization Excellence
system reliability¶
system-administration¶
task-management¶
team building¶
technical leadership¶
technology-detection¶
telegram¶
telerik¶
terminal¶
terraform¶
- Guida di Riferimento env0
- Modelli aziendali terapeutici: Mastering Infrastructure as Code at Scale
- Terraform Enterprise Patterns: Padroneggiare Infrastructure as Code su Scala
testing¶
text-editor¶
text-to-speech¶
threat hunting¶
threat modeling¶
- Architettura di Data Pipeline Sicura: Una Guida Completa
- Secure Data Pipeline Architecture: A Comprehensive Guide
threat-detection¶
threat-hunting¶
threat-intelligence¶
throughput-testing¶
tiktok¶
tools¶
- Cheat Sheet
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- Home
- Padronanza della Riga di Comando per Professionisti
- Padronanza della Riga di Comando per Professionisti
- Padronanza della Riga di Comando per Professionisti
- Strumenti
traceroute¶
traffic-analysis¶
trail-of-bits¶
training¶
trello¶
troubleshooting¶
tutorial¶
- Claude Code per Principianti: Padroneggia lo Sviluppo Guidato dall'IA Attraverso Prompt Intelligenti
- Claude Code per principianti: Master AI-Powered Development attraverso Smart Prompting
tutorials¶
twitter¶
typescript¶
ui-framework¶
usb-hacking¶
usb-security¶
usbninja¶
utility¶
- AADInternals Azure AD Exploitation Toolkit Cheat Sheet
- ADConnectDump Foglio Informativo per l'Estrazione delle Credenziali di Azure AD Connect
- ASNmap Guida di Riferimento per il Mapping degli ASN
- Alacritty - Terminal Accelerato da GPU
- Anchore
- AndroGuard Cheat Sheet
- Ant Cheat Sheet
- Apimonitor
- Apt-Get
- Aqua
- Aquatone
- Arachni Cheat Sheet
- Ares RAT Cheat Sheet
- Arjun
- Asreproast
- Assetfinder
- Awesome-Go
- Awesome-Java
- Awesome-Nodejs
- Awesome-Python
- Azucar Azure Security Auditing Tool Cheat Sheet
- Backdoors & Breaches Comandi
- Bash bunny
- Batch
- Bazaar
- BeEF Browser Exploitation Framework Cheat Sheet
- Beacon
- Bitbucket
- Bozza
- Brackets
- Brakeman Ruby on Rails Foglio di Riferimento per la Sicurezza
- Brute Ratel C4 Framework Foglio di Riferimento
- Brutespray
- Bully
- Bundler
- Burp
- Bwapp
- Bzr
- CLI di DigitalOcean (doctl)
- CLion
- Censys
- Censys-Python
- Chai
- ChatGPT e GPT-4 - Guida al Prompting con IA
- Cheat Sheet YARA
- Cheat Sheet dello Strumento di Phishing Blackeye
- Cheat Sheet per Generatore di Wordlist di Sottodomini AlterX
- Cheatsheet-God
- Checkmarx
- Chisel Cheat Sheet (remains the same, as it's a technical term)
- Chocolatey
- Cisco ASA Cheat Sheet
- Clair
- Clang/LLVM - Infrastruttura Moderna per Compilatori
- Class-Dump
- Claude - Guida al Prompting con IA
- Claudia
- Comandi Bugsy
- Comandi Cortex
- Comandi ELSA
- Comandi Skipfish
- Comandi Xplico
- Comandi di immersione
- Composer
- Comsvcs
- Conda
- Coniglio bianco Neo AI Promping Cheat Sheet
- Consul
- Covenant C2 Framework Cheat Sheet
- Coverage
- Cowpatty
- Cron
- Cti-Python-Stix2
- Cupp
- Cursor
- DVWA (Damn Vulnerable Web Application) Cheat Sheet
- Dc3Dd
- Dcfldd
- Decryptautologon
- Deviazioni
- Dex2Jar
- Diagon
- Dig - Ricerca DNS e Risoluzione dei Problemi
- Docker Bench Cheat Sheet
- Dradis Cheat Sheet
- Drone
- Drozer Cheat Sheet
- Duckduckgo
- Dumpit
- Eaphammer
- Editor Windsurf
- Editor Zed
- Elastic SIEM Cheat Sheet
- Elemento
- Emerge
- Età
- Excel - Formule, Funzioni & Produttività
- Exegol
- Exiftool
- Fakelogonscreen
- Faker
- Fenicottero
- Feroxbuster
- Findomain
- Firebase - Piattaforma Backend-as-a-Service di Google
- Flare-Vm
- Flink
- Fluxion
- Foglio Informativo del Framework Multi-Agente AutoGen
- Foglio Informativo del Sonnellino dei Bambini
- Foglio Informativo di Cobalt Strike
- Foglio Informativo di Cutter
- Foglio Informativo di EvilGinx2 per Framework di Phishing
- Foglio Informativo di VSagent
- Foglio Informativo di W3af Web Application Attack Framework
- Foglio Informativo di Wifiphisher Wireless Phishing Framework
- Foglio di Riferimento Wapiti
- Foglio di Riferimento di Empire Framework
- Foglio di Riferimento per la Gestione DNS
- Framework di Comando e Controllo Villain C2 Cheat Sheet
- Ftkimager
- GCC - GNU Compiler Collection
- Garak
- Gau
- Gedit
- Gem
- Gemini CLI
- Gestore di Pacchetti APT
- Gestore di Pacchetti YUM/DNF
- Ghostty - Terminal Emulator
- GoLand
- Google Gemini - Guida al Prompting con IA
- Guida Rapida a CyberChef
- Guida Rapida di Bazel
- Guida Rapida di CMake
- Guida di Riferimento Wazuh
- Guida di Riferimento per Dia Browser
- Guida di Riferimento per il Prompting di DeepSeek AI
- Host - Simple DNS Lookup Tool
- IDA Pro - Interactive Disassembler Professional
- Interactsh OOB Interaction Gathering Cheat Sheet
- JavaScript - Modern Web Development
- Jupyter Notebook
- Linguaggio Assembly AArch64 (ARM64)
- Linguaggio Assembly ARM (32-bit)
- Linguaggio Assembly x86 (32-bit)
- Linguaggio Assembly x86-64 (64-bit)
- Linux File Management Cheat Sheet
- Linux Process Management Cheat Sheet
- Llama - Meta's Open Source AI Prompting Guide
- Lynis Security Audiing Tool Cheat Sheet
- MIPS Assembly Language
- Mac Terminal (Terminal.app) - MacOS Terminale nativo
- Manuale di Riferimento Velociraptor
- Microsoft Sentinel Cheatsheet
- Mimikatz Cheat Sheet
- Modello Context Protocol (MCP) Server Cheat Sheet
- Notifica la scheda del sistema di notifica
- Nslookup - DNS Lookup and Troubleshooting
- Oh My Zsh - Zsh Framework and Configuration Manager
- Outline VPN Cheatsheet
- Packer
- Perplexity AI - Search-Powered Prompting Guide
- PhpStorm
- Postman API Testing
- Powerlevel10k - Alta conformità Tema Zsh
- Principale
- Productivity Tools Cheatsheet
- PuTTY - Client SSH e Telnet per Windows
- Pure - Minimal Zsh Prompt
- PyCharm
- QualitÃ
- Qwen AI Promping Cheat Sheet
- RISC-V Assembly Language
- Regular Expressions (RegEx) - Pattern Matching
- Rider
- Rubeus Kerberos Interaction Tool Cheat Sheet
- RubyMine
- SIFT Workstation Cheatsheet
- Scheda Tecnica del Server Context7 MCP
- Scheda di Riferimento di CrewAI Multi-Agent Framework
- Social Engineer Toolkit (SET) Cheatsheet
- Social Engineering Toolkit (SET) Cheat Sheet
- Starship - Customizer cross-Shell Prompt
- Stenographer - Full Packet Capture System
- Sublime Text
- Sumo Logic Cheatsheet
- Supabase - Open Source Firebase Alternative
- Suricata Network IDS/IPS Foglio di formaggio
- Tailscale Cheatsheet
- Testimone oculare
- TheHive Cheat Sheet
- Veil Cheat Sheet (Foglio di Riferimento Veil)
- Veracrypt
- Visual Studio
- Warp - Terminal Potenziato con IA
- Watson
- Waypoint
- Weirdaal
- Wfuzz Cheat Sheet
- WifiForge Cheat Sheet
- Wifite Cheat Sheet
- Windbg
- Windows Terminal
- Winlogon
- Winpeas
- Winpmem
- Xxd
- Yum
- Zap-Api-Nodejs
- Zerologon-Bof
- Zipkin
- Zmap Cheat Sheet
- Zoomeye
- Zsteg
- Zuul
- btop - Monitor delle Risorse Moderno
- csh - Shell C
- dnSpy - .NET Debugger e Editor di Assembly
- iTerm2 Terminal
- ksh - Korn Shell
- sh - POSIX Shell
- xterm - Emulatore di Terminale del Sistema X Window
version-control¶
- Command Line Mastery for Professionals
- Git Commands
- Padronanza della Riga di Comando per Professionisti
vibe-coding¶
- The Evolution of AI Coding: From Code Completion to Autonomous Agents
- Titolo: L'evoluzione dell'AI Coding: Da Code Completion a Autonomous Agents
video¶
video-conferencing¶
video-recording¶
video-sharing¶
voice-synthesis¶
voip¶
vulnerability-assessment¶
vulnerability-discovery¶
vulnerability-hunting¶
vulnerability-management¶
- AutoFix AI Agent Cheatsheet
- Integrazione Avanzata di Sicurezza Pipeline: Eccellenza DevSecOps
- Integrazione Avanzata di Sicurezza Pipeline: Padroneggiare DevSecOps in Ambienti CI/CD
- Legit Security Commands
vulnerability-research¶
vulnerability-scanner¶
vulnerability-scanning¶
vulnerability-testing¶
waf-bypass¶
wappalyzer¶
wasm¶
web-application-security¶
web-debugging¶
web-development¶
- Angular
- Comandi Base44
- Comandi Divjoy
- Comandi Vercel CLI
- Costruire App e Giochi con Claude Code: Padroneggiare i Prompt per Ogni Piattaforma
- Costruire app e giochi con Claude Code: Master Prompting per ogni piattaforma
- Express
- Fiddler Cheatsheet
- TypeScript Cheatsheet
web-fingerprinting¶
web-scraping¶
web-security¶
- Burp Suite Cheat Sheet
- Cheat Sheet degli Strumenti WebAssembly (WASM)
- Cheat Sheet di WhatWeb
- Dalfox Cheat Sheet
- Dirb
- Dirbuster
- Dirsearch
- Foglio di Riferimento XSStrike
- Gobuster Directory/File Brute Forcer Cheat Sheet
- Scheda di Riferimento WebGoat
- Wappalyzer Cheat Sheet
- Waybackurls
- WebStorm
- Webscreenshot
- curl - HTTP Client and Data Transfer
- gf (Schemi Gf) Foglio di Riferimento
web-server¶
web-technology¶
webassembly¶
whatsapp-business¶
whatweb¶
whiteboard¶
wifi-hacking¶
windows¶
windows 11¶
windows-only¶
windows-security¶
windsurf¶
wireless-security¶
workflow¶
workflow-automation¶
- Claude Flow Cheatsheet
- Cybersecurity Workflow Automation: Transform Your Security Operations with Advanced Automation Frameworks