Vai al contenuto

Tags

Browse our extensive collection of 680+ cheat sheets by tags to find exactly what you're looking for. Our comprehensive tagging system helps categorize tools by function, platform, and skill level.

🔍 How to Use Tags

  • Click any tag to see all related cheat sheets
  • Combine searches with the search bar above
  • Filter by category using the sections below
  • Bookmark frequently used tags for quick access

🛡️ Security Tools

Penetration Testing

Find tools for ethical hacking, vulnerability assessment, and security testing.

Popular Tags: penetration-testingvulnerability-scanningred-teamexploitation

Network Security

Discover network analysis, monitoring, and protection tools.

Popular Tags: network-securitypacket-analysisport-scanningwireless-security

Web Security

Explore web application security testing and analysis tools.

Popular Tags: web-securitysql-injectiondirectory-enumerationweb-server

Digital Forensics

Access forensics and incident response tools.

Popular Tags: forensicsmemory-analysisdisk-analysisincident-response

Cryptography & Password Security

Browse encryption and password-related security tools.

Popular Tags: cryptographypassword-crackingencryptioncertificates

💻 Development Tools

Programming & Languages

Find tools for various programming languages and development workflows.

Popular Tags: programming-languagesjavascriptpythonjava-development

Web Development

Discover frontend and backend web development tools.

Popular Tags: web-developmentfrontendbackendapi-development

Mobile Development

Explore iOS, Android, and cross-platform development tools.

Popular Tags: mobile-developmentandroid-developmentios-developmentmobile-security

Development Environment

Access IDEs, editors, and development environment tools.

Popular Tags: ide-editorstext-editordebuggingversion-control

☁️ Cloud & DevOps

Cloud Platforms

Browse tools for major cloud service providers.

Popular Tags: awsazuregcpcloudserverless

Container & Orchestration

Find containerization and orchestration tools.

Popular Tags: containerizationdockerkubernetesorchestration

Infrastructure & Automation

Discover infrastructure management and automation tools.

Popular Tags: infrastructureiacautomationconfiguration-management

CI/CD & Monitoring

Access continuous integration, deployment, and monitoring tools.

Popular Tags: ci-cdmonitoringloggingmetricsalerting

🖥️ System Administration

Operating Systems

Find tools specific to different operating systems.

Popular Tags: linuxwindowsmacoscross-platform

Networking & Services

Discover networking, web servers, and system services.

Popular Tags: networkingweb-serverdatabaseservice-management

Performance & Monitoring

Access system monitoring and performance tools.

Popular Tags: monitoringperformanceprocess-managementsystem-calls

Backup & Security

Browse backup, recovery, and system security tools.

Popular Tags: backup-recoveryfirewallremote-accessfile-transfer

📱 Tool Types

Interface Types

Browse tools by their interface and interaction method.

Popular Tags: cli-toolgui-applicationweb-applicationweb-service

Skill Levels

Find tools appropriate for your experience level.

Popular Tags: beginnerintermediateadvancedexpert

Platform Compatibility

Discover tools by platform support.

Popular Tags: cross-platformlinux-onlywindows-onlymacos-only

🎯 Specialized Categories

OSINT & Reconnaissance

Open source intelligence and reconnaissance tools.

Popular Tags: osintreconnaissancesubdomain-enumerationinvestigation

Reverse Engineering

Tools for reverse engineering and malware analysis.

Popular Tags: reverse-engineeringmalware-analysisdynamic-analysisstatic-analysis

Package Management

Package managers and dependency management tools.

Popular Tags: package-managementdependency-managementbuild-tools


📊 Tag Statistics

  • Total Cheat Sheets: 680+
  • Security Tools: 200+
  • Development Tools: 150+
  • Cloud/DevOps Tools: 100+
  • System Admin Tools: 100+
  • Specialized Tools: 130+

🔗 Quick Navigation

Most Popular Security Tags: penetration-testingnetwork-securityweb-securityvulnerability-scanning

Most Popular Development Tags: web-developmentprogramming-languagesversion-controlide-editors

Most Popular Cloud Tags: awsdockerkubernetesci-cd

Most Popular System Tags: linuxnetworkingmonitoringautomation


Use the search functionality above to find specific tools or combine tag searches for more precise results. All content is regularly updated and maintained.

3d-modeling

3d-printing

AI Research

Agile

Apache Kafka

Apache Spark

App Deployment

Apple Business Manager

ChatGPT

Communication Skills

Compliance

Compliance Frameworks

Cosa?

Cryptographic Agility

Cryptographic Migration

Cybersecurity

Data Engineering

Data Governance

Data Privacy

Data Protection

Data Quality

Data Security

Engineering

Enterprise

Enterprise Data

Enterprise IT

Enterprise Security

Future-Proofing

GDPR

IT Governance

Kanban

Knowledge Management

Learning Systems

MDM

Mobile Device Management

Mobile Security

Monitoring

NIST Standards

Network

Network Configuration

Network Infrastructure

Network Security

OpenTelemetry

Optimization

Performance

Perplexity Pro

Post-Quantum Cryptography

Productivity

Professional Development

Project Management

Quantum Computing

Quantum Resistance

Real-time Analytics

Reference Tools

Research Workflows

Risk Management

SDP

SOC 2

SRE

Scrum

Sdr

Security

Security Audit

Security Controls

Security Protocols

Software Development

Stream Processing

Tech Teams

Technical Writing

Threat Landscape

Troubleshooting

Trust Service Criteria

VPN

VPN Architecture

WiFi Security

Wireless Security

Zero Trust

active-directory-security

additive-manufacturing

advanced

agent-programming

agentic-ai

agentic-programming

ai

ai-assistant

ai-coding

ai-development

ai-guardian

ai-orchestration

ai-pentesting

ai-presentation

ai-programming

ai-security

ai-spm

ai-voice

akheron-proxy

alert-triage

altium-designer

android

ansible

anthropic

anthropic-claude

api

api-docs

api-testing

app security

app-builder

application-security

architecture

arp-monitoring

arpwatch

articles

asana

aspm

at-protocol

attack-path-management

attack-surface-management

audio-generation

augment code

autodesk

automated-vulnerability-repair

automation

automation excellence

autonomous-agents

autonomous-hacking

autonomous-pentesting

aws

aws-governance

aws-lambda

aws-security

azure

backend

bandwidth-testing

bash

beginner

best practices

best-practices

binary-analysis

bitlocker

bladerf

blockchain-security

blog

bloodhound

bluesky

bluetooth-hacking

boofuzz

bro

browser-ide

bug-bounty

build-tools

business

buttercup-crs

caching

cad

cam

ccpa

chat

cheat-sheets

cheatsheets

ci-cd

ci-cd-security

claude code

claude-code

claude-flow

cli

cli tools

cli-tool

cli-tools

cloning

cloud

cloud architecture

cloud governance

cloud technologies

cloud-architecture

cloud-computing

cloud-infrastructure

cloud-management

cloud-migration

cloud-security

cloud-technologies

cloudsploit

cnapp

code-completion

code-generator

code-scanning

code-to-cloud-security

coding

collaboration

command line

command-line

commands

communication

community

compliance

configuration management

configuration-management

container-security

containerization

containers

content-creation

context7

continuous-deployment

continuous-security

conversational-ai

copilot

cost optimization

covert-access

cross-platform

cryptography

cursor

customer-service

cybersecurity

cyera

cynthion

dalfox

darpa-aixcc

dast-scanner

data engineering

data pipeline

data protection

data-collection

data-engineering

data-governance

data-protection

data-security

database

debugging

decentralized

decompilation

decompiler

defi

deployment

design

desktop-apps

developer-tools

developer-workflows

development

development-environment

development-tools

devops

devsecops

dfir

diagramming

digital forensics

digital-forensics

digital-logic

directory

directory-enumeration

discord

disk-analysis

disk-imaging

distributed systems

distributed tracing

dns

dns security

dnssec

docker

document-forensics

documentation

dom-analysis

dynamic-analysis

eda

edge computing

edr

electronics

email

embedded-security

embedded-systems

emerging technologies

encryption

engineering management

enterprise infrastructure

enterprise it

enterprise-ai

enterprise-architecture

enterprise-security

esp32

ethernet-monitoring

ethical-hacking

evidence collection

fiddler

file explorer

file management

financial management

fingerprinting

finops

fintech

firewall

firmware

flipper-zero

flux

forensic investigation

forensics

forseti-security

frameworks

frontend

fusion-360

future-of-coding

fuzzing

game-development

gatekeeper

gcp

gcp-security

gdpr

generative-ai

getting-started

gf

ghidra

git

github copilot

github-copilot

gitops

google-cloud

google-meet

governance

gpt-4

gpt-5

great-scott-gadgets

grep

gui-application

guides

hackrf

hak5

hardware

hardware-design

hardware-hacking

hardware-security

hashicorp

hayabusa

high availability

homepage

http-proxy

humint

hybrid-cloud

iOS

iac

iam

iast-security

icopy-x

ide-assistants

ide-editors

identity-security

implementation

incident management

incident response

incident-response

index

information-gathering

infrastructure

infrastructure protection

infrastructure security

infrastructure-as-code

infrastructure-engineering

infrastructure-security

instagram

intelligence-gathering

intermediate

internet

internet protocols

intrusion-detection

ios

iot security

iot-security

iperf

iperf3

irc

it-professionals

java-development

javascript

jitter-measurement

kanban

key-croc

keylogging

keystroke-injection

kicad

kubernetes

lab401

lan-turtle

langchain

large-language-models

latency-analysis

latency-testing

learning

legal

library

linux

linux-security

llm-agent

load balancing

logging

logic-analyzer

mac-address-tracking

machine-learning

macos

malware

malware-analysis

man-in-the-middle

mattermost

mcp

mdr

memory-analysis

messaging

meta-programming

metadata-analysis

microblogging

microservices

microsoft-teams

mlops

mobile device management

mobile security

mobile-development

mobile-security

monday.com

monitoring

mtr

multi-cloud

my-traceroute

natural-language-processing

ndr

network

network administration

network diagnostics

network infrastructure

network security

network-benchmarking

network-diagnostics

network-forensics

network-monitoring

network-performance

network-security

network-surveillance

networking

newsletter

nfc

nist

no-code

non-human-identities

nsa-tools

ntt-data

observability

office-365

omg-cable

online-meetings

opa

open-source

openai

opengraph

operating systems

operating-systems

optimization

osint

osint-investigation

overview

owasp

pacbot

packet-analysis

packet-loss

packet-squirrel

pandwarf

pattern-matching

pcb

pcb-design

penetration-testing

pentesting

performance

performance optimization

performance-testing

perplexity

photo-sharing

ping

pipeline

pipeline-security

plugins

policy

policy-as-code

policy-enforcement

port-scanning

portapack

powershell

presentation

presentation-design

privacy

productivity

professional development

professional reference

professional-development

programming

programming-language

programming-languages

project-management

prompting

protocol

protocol-testing

protonmail

prototyping

proxmark3

proxy

prusa-slicer

publishing

python

radio-frequency

radio-hacking

rapid7

raspberry-pi

react

reconnaissance

red-teaming

reference

references

relationship-analysis

remote-access

research

resources

reverse-engineering

rf-analysis

rfid

risk-management

runtime-analysis

runtime-protection

sbom

scalability

scheduling

screen-annotation

scripting

sdp

sdr

search

secrets-management

security

security architecture

security assessment

security automation

security-analytics

security-architecture

security-assessment

security-monitoring

security-operations

security-professionals

security-research

security-scanning

security-testing

security-tools

self-hosted

self-referential

serverless

service

shark-jack

shell

siem

site reliability engineering

slack

slicer

smart-contracts

snapchat

soc

social-engineering

social-mapping

social-media

software

software-defined-radio

specterops

sre practices

ssh

ssh-exploitation

standards

sub-ghz

substack

supply-chain-security

surveillance

suzaku

symbolic-execution

sysadmin

system administration

system reliability

system-administration

task-management

team building

technical leadership

technology-detection

telegram

telerik

terminal

terraform

testing

text-editor

text-to-speech

threat hunting

threat modeling

threat-detection

threat-hunting

threat-intelligence

throughput-testing

tiktok

tools

traceroute

traffic-analysis

trail-of-bits

training

trello

troubleshooting

tutorial

tutorials

twitter

typescript

ui-framework

usb-hacking

usb-security

usbninja

utility

version-control

vibe-coding

video

video-conferencing

video-recording

video-sharing

voice-synthesis

voip

vulnerability-assessment

vulnerability-discovery

vulnerability-hunting

vulnerability-management

vulnerability-research

vulnerability-scanner

vulnerability-scanning

vulnerability-testing

waf-bypass

wappalyzer

wasm

web-application-security

web-debugging

web-development

web-fingerprinting

web-scraping

web-security

web-server

web-technology

webassembly

whatsapp-business

whatweb

whiteboard

wifi-hacking

windows

windows 11

windows-only

windows-security

windsurf

wireless-security

workflow

workflow-automation

writing

x

xss

xsstrike

zeek

zero trust

zero-trust

zoom