Skip to content

Tags

Browse our extensive collection of 680+ cheat sheets by tags to find exactly what you're looking for. Our comprehensive tagging system helps categorize tools by function, platform, and skill level.

🔍 How to Use Tags

  • Click any tag to see all related cheat sheets
  • Combine searches with the search bar above
  • Filter by category using the sections below
  • Bookmark frequently used tags for quick access

🛡️ Security Tools

Penetration Testing

Find tools for ethical hacking, vulnerability assessment, and security testing.

Popular Tags: penetration-testingvulnerability-scanningred-teamexploitation

Network Security

Discover network analysis, monitoring, and protection tools.

Popular Tags: network-securitypacket-analysisport-scanningwireless-security

Web Security

Explore web application security testing and analysis tools.

Popular Tags: web-securitysql-injectiondirectory-enumerationweb-server

Digital Forensics

Access forensics and incident response tools.

Popular Tags: forensicsmemory-analysisdisk-analysisincident-response

Cryptography & Password Security

Browse encryption and password-related security tools.

Popular Tags: cryptographypassword-crackingencryptioncertificates

💻 Development Tools

Programming & Languages

Find tools for various programming languages and development workflows.

Popular Tags: programming-languagesjavascriptpythonjava-development

Web Development

Discover frontend and backend web development tools.

Popular Tags: web-developmentfrontendbackendapi-development

Mobile Development

Explore iOS, Android, and cross-platform development tools.

Popular Tags: mobile-developmentandroid-developmentios-developmentmobile-security

Development Environment

Access IDEs, editors, and development environment tools.

Popular Tags: ide-editorstext-editordebuggingversion-control

☁️ Cloud & DevOps

Cloud Platforms

Browse tools for major cloud service providers.

Popular Tags: awsazuregcpcloudserverless

Container & Orchestration

Find containerization and orchestration tools.

Popular Tags: containerizationdockerkubernetesorchestration

Infrastructure & Automation

Discover infrastructure management and automation tools.

Popular Tags: infrastructureiacautomationconfiguration-management

CI/CD & Monitoring

Access continuous integration, deployment, and monitoring tools.

Popular Tags: ci-cdmonitoringloggingmetricsalerting

🖥️ System Administration

Operating Systems

Find tools specific to different operating systems.

Popular Tags: linuxwindowsmacoscross-platform

Networking & Services

Discover networking, web servers, and system services.

Popular Tags: networkingweb-serverdatabaseservice-management

Performance & Monitoring

Access system monitoring and performance tools.

Popular Tags: monitoringperformanceprocess-managementsystem-calls

Backup & Security

Browse backup, recovery, and system security tools.

Popular Tags: backup-recoveryfirewallremote-accessfile-transfer

📱 Tool Types

Interface Types

Browse tools by their interface and interaction method.

Popular Tags: cli-toolgui-applicationweb-applicationweb-service

Skill Levels

Find tools appropriate for your experience level.

Popular Tags: beginnerintermediateadvancedexpert

Platform Compatibility

Discover tools by platform support.

Popular Tags: cross-platformlinux-onlywindows-onlymacos-only

🎯 Specialized Categories

OSINT & Reconnaissance

Open source intelligence and reconnaissance tools.

Popular Tags: osintreconnaissancesubdomain-enumerationinvestigation

Reverse Engineering

Tools for reverse engineering and malware analysis.

Popular Tags: reverse-engineeringmalware-analysisdynamic-analysisstatic-analysis

Package Management

Package managers and dependency management tools.

Popular Tags: package-managementdependency-managementbuild-tools


📊 Tag Statistics

  • Total Cheat Sheets: 680+
  • Security Tools: 200+
  • Development Tools: 150+
  • Cloud/DevOps Tools: 100+
  • System Admin Tools: 100+
  • Specialized Tools: 130+

🔗 Quick Navigation

Most Popular Security Tags: penetration-testingnetwork-securityweb-securityvulnerability-scanning

Most Popular Development Tags: web-developmentprogramming-languagesversion-controlide-editors

Most Popular Cloud Tags: awsdockerkubernetesci-cd

Most Popular System Tags: linuxnetworkingmonitoringautomation


Use the search functionality above to find specific tools or combine tag searches for more precise results. All content is regularly updated and maintained.

AI Research

ChatGPT

Knowledge Management

Learning Systems

Perplexity Pro

Productivity

Professional Development

Reference Tools

Research Workflows

advanced

agent-programming

agile

ai

ai-assistant

ai-automation

ai-coding

ai-development

ai-pentesting

ai-programming

ai-security

analysis

android-analysis

android-security

ansible

anthropic

api-discovery

api-docs

api-testing

app-development

application-security

arp-monitoring

arpwatch

articles

astro

audit-preparation

augment code

automated-security

automation

automation excellence

autonomous-agents

autonomous-hacking

autonomous-pentesting

aws

aws lambda

aws-governance

aws-lambda

aws-security

azure

azure functions

azure-security

backend

bandwidth-testing

bash

beginner

best practices

best-practices

binary-analysis

blog

boofuzz

bro

browser-ide

brute-force

bug-bounty

build-tools

caching

ccna

ccpa

certificates

cheat-sheets

cheatsheets

ci-cd

ci-cd-security

cis-benchmark

cis-benchmarks

cisco

cisco-certification

claude code

claude-code

cli

cli tools

cli-tool

cloud

cloud architecture

cloud governance

cloud technologies

cloud-architecture

cloud-auditing

cloud-computing

cloud-infrastructure

cloud-management

cloud-migration

cloud-security

cloud-technologies

cloudformation

cloudsploit

code-completion

code-coverage

code-quality

code-to-cloud-security

coding

collaboration

command line

command-line

commands

compliance

compliance-reporting

compliance-scanning

configuration management

configuration-management

container-security

containerization

containers

context7

continuous-deployment

continuous-monitoring

continuous-security

cost optimization

cpu-emulation

cross-platform

cryptography

cursor

cybersecurity

dalfox

dast-scanner

data-engineering

data-protection

database

debugging

decompilation

decompiler

deployment

desarrollo-web

design

desktop-apps

developer-portal

developer-tools

developer-workflows

development

development-environment

development-tools

devops

devsecops

diagramming

digital forensics

directory

directory-enumeration

disassembler

disk-analysis

disk-imaging

distributed systems

dns

dns security

dns-security

dnssec

docker

dockerfile

document-forensics

documentation

dom-analysis

dynamic-analysis

edge computing

emerging technologies

emulation

encryption

endpoint-discovery

enterprise

enterprise infrastructure

enterprise-architecture

enterprise-security

ethernet-monitoring

ethical-hacking

evidence collection

expert

exploitation

falco

fiddler

file explorer

file management

financial management

fingerprinting

finops

firewall

flux

forensic investigation

forensics

forseti-security

framework

frameworks

frontend

full-stack

fuzzing

game-development

gatekeeper

gcp

gcp-security

gdpr

getting-started

gf

ghidra

git

github copilot

github-copilot

gitops

gns3

google cloud functions

google-cloud

governance

gpt-4

greenbone

grep

gui-application

guides

gvm

hashicorp

herramientas-construccion

homepage

hop-analysis

http-proxy

hybrid-cloud

iac

iac-security

iam

iast-security

ida-pro

ide-assistants

ide-editors

incident management

incident response

index

information-gathering

information-security

infrastructure

infrastructure protection

infrastructure security

infrastructure-as-code

infrastructure-engineering

infrastructure-monitoring

infrastructure-security

intelligence-gathering

intermediate

internal-developer-platform

internal-tools

internet protocols

intrusion-detection

investigation

iot security

iperf

iperf3

islands-architecture

issue-tracking

it-professionals

jamstack

java-analysis

java-development

javascript

javascript-analysis

jetbrains

jitter-measurement

jsparser

k8s

kics

kiterunner

kubernetes

langchain

latency-analysis

latency-testing

learning

legal

library

library-calls

lighthouse

linkfinder

linux

linux-security

llm-agent

logging

low-code

mac-address-tracking

machine-learning

malware-analysis

mcp

memory-analysis

meta-programming

metadata-analysis

metrics

mlops

mobile-development

mobile-security

monitoring

mtr

multi-cloud

multi-cloud-security

my-traceroute

nessus

network

network administration

network diagnostics

network infrastructure

network security

network-analysis

network-benchmarking

network-design

network-diagnostics

network-forensics

network-learning

network-monitoring

network-performance

network-security

network-simulation

network-surveillance

network-testing

network-tracing

network-training

network-troubleshooting

networking

nextjs

nsa-tools

nuxtjs

opa

openvas

operating systems

orchestration

osint

osint-automation

osint-investigation

overview

pacbot

package-management

packet-analysis

packet-capture

packet-loss

packet-tracer

password-cracking

path-discovery

pattern-matching

pcap

penetration-testing

pentest-reporting

pentesting

performance

performance optimization

perplexity

ping

pingplotter

pipeline

pipeline-security

platform-engineering

plugins

policy

policy-as-code

policy-enforcement

port-scanning

privacy

productivity

professional reference

professional-development

programming

programming-languages

project-management

prompting

protocol-testing

prototyping

prowler

python

qemu

react

reconnaissance

red-team

reference

references

rego

relationship-analysis

remediation-tracking

remote-access

research

resources

reverse-engineering

route-analysis

runtime-analysis

runtime-security

scheduling

scoutsuite

scripting

search

secrets management

secrets-management

security

security architecture

security automation

security-analytics

security-architecture

security-assessment

security-auditing

security-frameworks

security-monitoring

security-operations

security-professionals

security-research

security-scanning

security-testing

security-tools

self-referential

serverless

serverless computing

service

service-catalog

service-management

shell

simulation

site reliability engineering

soc2

social-mapping

software

sql-injection

sql-queries

sre practices

ssg

ssh-exploitation

ssr

standards

static-analysis

static-site-generator

steampipe

subdomain-enumeration

subdomain-takeover

subzy

supply-chain-security

surveillance

svelte

symbolic-execution

sysadmin

system administration

system reliability

system-administration

system-calls

task-management

technology-detection

telerik

tenable

terminal

terraform

terrascan

text-editor

threat hunting

threat-detection

threat-intelligence

throughput-testing

time-travel-debugging

tools

topology-design

traceroute

tracert

traffic-analysis

training

troubleshooting

trust-services-criteria

tshark

tutorial

tutorials

typescript

utility

vercel

version-control

virtualbox

virtualization

visualization

vite

vmware

vue

vulnerability-assessment

vulnerability-discovery

vulnerability-hunting

vulnerability-management

vulnerability-research

vulnerability-scanner

vulnerability-scanning

vulnerability-testing

waf-bypass

wappalyzer

wasm

web-application

web-application-security

web-debugging

web-development

web-fingerprinting

web-security

web-server

web-service

web-technology

webassembly

whatweb

whiteboard

wifi-hacking

windows

windows 11

windows-only

windsurf

wireless-security

wireshark

workflow-automation

xss

xsstrike

zeek

zero trust