Tags¶
Browse our extensive collection of 680+ cheat sheets by tags to find exactly what you're looking for. Our comprehensive tagging system helps categorize tools by function, platform, and skill level.
🔍 How to Use Tags¶
- Click any tag to see all related cheat sheets
- Combine searches with the search bar above
- Filter by category using the sections below
- Bookmark frequently used tags for quick access
🛡️ Security Tools¶
Penetration Testing¶
Find tools for ethical hacking, vulnerability assessment, and security testing.
Popular Tags: penetration-testing • vulnerability-scanning • red-team • exploitation
Network Security¶
Discover network analysis, monitoring, and protection tools.
Popular Tags: network-security • packet-analysis • port-scanning • wireless-security
Web Security¶
Explore web application security testing and analysis tools.
Popular Tags: web-security • sql-injection • directory-enumeration • web-server
Digital Forensics¶
Access forensics and incident response tools.
Popular Tags: forensics • memory-analysis • disk-analysis • incident-response
Cryptography & Password Security¶
Browse encryption and password-related security tools.
Popular Tags: cryptography • password-cracking • encryption • certificates
💻 Development Tools¶
Programming & Languages¶
Find tools for various programming languages and development workflows.
Popular Tags: programming-languages • javascript • python • java-development
Web Development¶
Discover frontend and backend web development tools.
Popular Tags: web-development • frontend • backend • api-development
Mobile Development¶
Explore iOS, Android, and cross-platform development tools.
Popular Tags: mobile-development • android-development • ios-development • mobile-security
Development Environment¶
Access IDEs, editors, and development environment tools.
Popular Tags: ide-editors • text-editor • debugging • version-control
☁️ Cloud & DevOps¶
Cloud Platforms¶
Browse tools for major cloud service providers.
Popular Tags: aws • azure • gcp • cloud • serverless
Container & Orchestration¶
Find containerization and orchestration tools.
Popular Tags: containerization • docker • kubernetes • orchestration
Infrastructure & Automation¶
Discover infrastructure management and automation tools.
Popular Tags: infrastructure • iac • automation • configuration-management
CI/CD & Monitoring¶
Access continuous integration, deployment, and monitoring tools.
Popular Tags: ci-cd • monitoring • logging • metrics • alerting
🖥️ System Administration¶
Operating Systems¶
Find tools specific to different operating systems.
Popular Tags: linux • windows • macos • cross-platform
Networking & Services¶
Discover networking, web servers, and system services.
Popular Tags: networking • web-server • database • service-management
Performance & Monitoring¶
Access system monitoring and performance tools.
Popular Tags: monitoring • performance • process-management • system-calls
Backup & Security¶
Browse backup, recovery, and system security tools.
Popular Tags: backup-recovery • firewall • remote-access • file-transfer
📱 Tool Types¶
Interface Types¶
Browse tools by their interface and interaction method.
Popular Tags: cli-tool • gui-application • web-application • web-service
Skill Levels¶
Find tools appropriate for your experience level.
Popular Tags: beginner • intermediate • advanced • expert
Platform Compatibility¶
Discover tools by platform support.
Popular Tags: cross-platform • linux-only • windows-only • macos-only
🎯 Specialized Categories¶
OSINT & Reconnaissance¶
Open source intelligence and reconnaissance tools.
Popular Tags: osint • reconnaissance • subdomain-enumeration • investigation
Reverse Engineering¶
Tools for reverse engineering and malware analysis.
Popular Tags: reverse-engineering • malware-analysis • dynamic-analysis • static-analysis
Package Management¶
Package managers and dependency management tools.
Popular Tags: package-management • dependency-management • build-tools
📊 Tag Statistics¶
- Total Cheat Sheets: 680+
- Security Tools: 200+
- Development Tools: 150+
- Cloud/DevOps Tools: 100+
- System Admin Tools: 100+
- Specialized Tools: 130+
🔗 Quick Navigation¶
Most Popular Security Tags: penetration-testing • network-security • web-security • vulnerability-scanning
Most Popular Development Tags: web-development • programming-languages • version-control • ide-editors
Most Popular Cloud Tags: aws • docker • kubernetes • ci-cd
Most Popular System Tags: linux • networking • monitoring • automation
Use the search functionality above to find specific tools or combine tag searches for more precise results. All content is regularly updated and maintained.
3d-modeling¶
3d-printing¶
AI Research¶
Agile¶
Apache Flink¶
Apache Kafka¶
Apache Spark¶
App Deployment¶
Apple Business Manager¶
ChatGPT¶
Communication Skills¶
Compliance¶
Compliance Frameworks¶
Cryptographic Agility¶
Cryptographic Migration¶
Cybersecurity¶
- A Comprehensive Guide to Enterprise WiFi Security Hardening
- Database Encryption Best Practices
- Mobile Network Security: A Comprehensive Guide
- Mobile Threat Landscape: A Deep Dive into the Evolving Risks
Data Engineering¶
- A Practical Guide to GDPR Compliance for Data Teams
- Database Encryption Best Practices
- Enterprise Data Governance Frameworks: A Comprehensive Guide
- Stream Processing Security: A Comprehensive Guide for Data Engineers
Data Governance¶
Data Privacy¶
Data Protection¶
- Database Encryption Best Practices
- Mobile Network Security: A Comprehensive Guide
- SOC 2 Compliance for IT Teams: Your Complete Guide to Security Excellence
Data Quality¶
Data Security¶
Engineering¶
Enterprise¶
Enterprise Data¶
Enterprise IT¶
- A Comprehensive Guide to Enterprise WiFi Security Hardening
- A Deep Dive into iOS App Management & Deployment
- A Deep Dive into iOS Network & VPN Configuration
- Mobile Network Security: A Comprehensive Guide
Enterprise Security¶
Future-Proofing¶
GDPR¶
IT Governance¶
Kanban¶
Knowledge Management¶
Learning Systems¶
MDM¶
- A Deep Dive into iOS Enterprise Configuration
- A Deep Dive into iOS Network & VPN Configuration
- Mobile Threat Landscape: A Deep Dive into the Evolving Risks
Mobile Device Management¶
- A Deep Dive into iOS App Management & Deployment
- A Deep Dive into iOS Enterprise Configuration
- A Deep Dive into iOS Network & VPN Configuration
Mobile Security¶
- Mobile Network Security: A Comprehensive Guide
- Mobile Threat Landscape: A Deep Dive into the Evolving Risks
Monitoring¶
NIST Standards¶
Network¶
Network Configuration¶
Network Infrastructure¶
- A Practical Guide to Software-Defined Perimeter (SDP) Implementation
- Modern VPN Architecture Design for Network Engineers
Network Security¶
- A Comprehensive Guide to Enterprise WiFi Security Hardening
- A Practical Guide to Software-Defined Perimeter (SDP) Implementation
- Mobile Network Security: A Comprehensive Guide
- Modern VPN Architecture Design for Network Engineers
OpenTelemetry¶
Optimization¶
Performance¶
Perplexity Pro¶
Post-Quantum Cryptography¶
Productivity¶
- AI-Powered Research Mastery: Transform Your Research Workflow with Perplexity Pro and ChatGPT
- Professional Reference Tools Mastery: Build Your Ultimate Knowledge Management System
Professional Development¶
- Mastering Technical Writing: A Guide for Engineers
- Professional Reference Tools Mastery: Build Your Ultimate Knowledge Management System
Project Management¶
Quantum Computing¶
Quantum Resistance¶
Real-time Analytics¶
Reference Tools¶
Research Workflows¶
Risk Management¶
SDP¶
SOC 2¶
SRE¶
Scrum¶
Security¶
Security Audit¶
Security Controls¶
Security Protocols¶
Software Development¶
Stream Processing¶
Tech Teams¶
Technical Writing¶
Threat Landscape¶
Troubleshooting¶
Trust Service Criteria¶
VPN¶
- A Deep Dive into iOS Network & VPN Configuration
- Modern VPN Architecture Design for Network Engineers
VPN Architecture¶
WiFi Security¶
Wireless Security¶
Zero Trust¶
active-directory-security¶
additive-manufacturing¶
advanced¶
- 1TRACE Cheat Sheet
- ARACNE Cheat Sheet
- ArgoCD Cheat Sheet
- AutoPentest Cheat Sheet
- Binary Ninja Cheat Sheet
- Boofuzz Cheat Sheet
- Building Self-Referential Applications with Claude Code: Advanced Prompting for Meta-Programming
- CloudSploit Cheat Sheet
- Dalfox Cheat Sheet
- Elk
- FluxCD Cheat Sheet
- Forseti Security Cheat Sheet
- Frida Cheat Sheet
- GDB - GNU Debugger
- Ghidra - NSA Reverse Engineering Framework
- Ghidra Plugins Cheat Sheet
- Invicti Cheat Sheet
- JEB Decompiler Cheat Sheet
- JSParser Cheat Sheet
- KICS (Keeping Infrastructure as Code Secure) Cheat Sheet
- Kiterunner Cheat Sheet
- Kubernetes Cheatsheet
- Lighthouse Plugin Cheat Sheet
- Metasploit Cheat Sheet
- Metasploit Framework Cheat Sheet
- Ollydbg
- PTHelper Cheat Sheet
- PacBot Cheat Sheet
- Prowler Cheat Sheet
- REVEN Cheat Sheet
- Radare2 - Reverse Engineering Framework
- Retool Cheat Sheet
- ScoutSuite Cheat Sheet
- Splunk Cheatsheet
- Steampipe Cheat Sheet
- Subzy Cheat Sheet
- Terrascan Cheat Sheet
- Unicorn Engine Cheat Sheet
- Vectra AI Commands
- Volatility Cheat Sheet
- Wappalyzer Cheat Sheet
- WebAssembly (WASM) Tools Cheat Sheet
- WhatWeb Cheat Sheet
- XSStrike Cheat Sheet
- angr Cheat Sheet
- gf (Gf patterns) Cheat Sheet
- x64dbg - Windows Debugger
agent-programming¶
agentic-ai¶
agentic-programming¶
agile¶
ai¶
- AI-Assisted Coding: From IDE Assistants to Agent Programming
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- Anthropic Claude Cheatsheet
ai-assistant¶
ai-automation¶
ai-coding¶
- AI-Assisted Coding: From IDE Assistants to Agent Programming
- Claude Code CLI Cheatsheet
- Supermaven Commands
- Tabnine Commands
- The Evolution of AI Coding: From Code Completion to Autonomous Agents
ai-development¶
- Base44 Commands
- Building Self-Referential Applications with Claude Code: Advanced Prompting for Meta-Programming
- GPT-5 Cheatsheet
ai-guardian¶
ai-orchestration¶
ai-pentesting¶
ai-presentation¶
ai-programming¶
ai-search¶
ai-security¶
- AI Guardian Cheatsheet
- AI SBOM Generator Cheatsheet
- AirMDR AI SOC Platform Cheatsheet
- AutoFix AI Agent Cheatsheet
- AutoPentest Cheat Sheet
- Autonomous PowerShell Agent Cheatsheet
- Buttercup CRS Cheatsheet
- Commercial Intelligence Blend Tools Cheatsheet
- Cribl Guard Cheatsheet
- Cyera AI Guardian Cheatsheet
- Legit Security Commands
- Vectra AI Commands
- Wiz MCP Commands
ai-spm¶
ai-video¶
ai-voice¶
akheron-proxy¶
alert-triage¶
altium-designer¶
analysis¶
android¶
android-analysis¶
android-security¶
ansible¶
anthropic¶
anthropic-claude¶
api¶
api-discovery¶
api-docs¶
api-testing¶
app security¶
app-builder¶
app-development¶
application-security¶
architecture¶
arp-monitoring¶
arpwatch¶
articles¶
asana¶
aspm¶
at-protocol¶
attack-path-management¶
attack-surface-management¶
audio-generation¶
audit-preparation¶
augment code¶
autodesk¶
automated-security¶
automated-vulnerability-repair¶
automation¶
- AI-Powered Research Mastery
- AI-Powered Research Mastery
- Advanced Pipeline Security Integration: Mastering DevSecOps in CI/CD Environments
- Advanced Threat Hunting Techniques: Master Proactive Cybersecurity Defense in 2025
- AirMDR AI SOC Platform Cheatsheet
- Ansible
- Base44 Commands
- Boofuzz Cheat Sheet
- Chef
- Claude Code for System Administration: AI-Powered Infrastructure Automation
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
- Crontab
- Cybersecurity Workflow Automation: Transform Your Security Operations with Advanced Automation Frameworks
- Dalfox Cheat Sheet
- DevSecOps Excellence: Integrate Security into Every Stage of Software Development
- Enterprise Cloud Security Mastery: Build Bulletproof Multi-Cloud Security Architectures
- JSParser Cheat Sheet
- Jenkins
- Kiterunner Cheat Sheet
- Kubernetes Security Hardening: Bulletproof Container Orchestration Security
- MLOps Pipeline Implementation: A Comprehensive Guide for Data Engineers
- Network Security Architecture: Design Bulletproof Enterprise Network Defenses
- PacBot Cheat Sheet
- Puppet
- SOC 2 Compliance for IT Teams: Master Security Framework Implementation
- Scraper API Commands
- Subzy Cheat Sheet
- Terraform Enterprise Patterns: Mastering Infrastructure as Code at Scale
- Wappalyzer Cheat Sheet
- WhatWeb Cheat Sheet
- Wiz MCP Commands
- Zero Trust Network Implementation: A Comprehensive Guide to Modern Security Architecture
- angr Cheat Sheet
- env0 Cheat Sheet
- gf (Gf patterns) Cheat Sheet
automation excellence¶
autonomous-agents¶
autonomous-hacking¶
autonomous-pentesting¶
aws¶
- AWS CLI
- Amazon CodeWhisperer Cheat Sheet
- Amazon Q Cheat Sheet
- CloudSploit Cheat Sheet
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
- Hybrid Cloud Networking Excellence: Mastering Modern Infrastructure Integration
- Steampipe Cheat Sheet
aws lambda¶
aws-governance¶
aws-lambda¶
aws-security¶
azure¶
- Azure CLI
- CloudSploit Cheat Sheet
- Hybrid Cloud Networking Excellence: Mastering Modern Infrastructure Integration
- Steampipe Cheat Sheet
azure functions¶
azure-security¶
backend¶
bandwidth-testing¶
bash¶
beginner¶
- Atom
- Base44 Commands
- Bash - Bourne Again Shell
- Claude Code for Beginners: Master AI-Powered Development Through Smart Prompting
- CodeSandbox Cheat Sheet
- Crontab
- DevDocs Cheat Sheet
- Dirb
- Dirbuster
- Excalidraw Cheat Sheet
- Express
- Fish - Friendly Interactive Shell
- Gamma Commands
- Git Commands
- Gobuster Directory/File Brute Forcer Cheat Sheet
- Hexdump
- MLOps Pipeline Implementation: A Comprehensive Guide for Data Engineers
- Nikto Cheat Sheet
- Pip
- Presentify Commands
- Python - Programming Language Reference
- Shodan
- Strings
- Subfinder Subdomain Enumeration Cheat Sheet
- Sublist3R
- Supermaven Commands
- Systemctl
- Tabnine Commands
- VS Code Shortcuts
- Zsh - Z Shell
- npm Package Manager
- ssh - Secure Shell Remote Access
- theHarvester Email and Subdomain Enumeration Tool Cheat Sheet
best practices¶
best-practices¶
binary-analysis¶
- Binary Ninja Cheat Sheet
- Ghidra Plugins Cheat Sheet
- Lighthouse Plugin Cheat Sheet
- Unicorn Engine Cheat Sheet
- WebAssembly (WASM) Tools Cheat Sheet
- angr Cheat Sheet
bitlocker¶
bladerf¶
blockchain-security¶
blog¶
bloodhound¶
bluesky¶
bluetooth-hacking¶
boofuzz¶
bro¶
browser-ide¶
brute-force¶
bug-bounty¶
build-tools¶
business¶
buttercup-crs¶
caching¶
cad¶
cam¶
ccna¶
ccpa¶
certificates¶
chat¶
cheat-sheets¶
cheatsheets¶
ci-cd¶
- ArgoCD Cheat Sheet
- CircleCI
- GitHub Actions
- GitLab CI/CD
- Jenkins
- Qodana Cheat Sheet
- SonarCloud Cheat Sheet
ci-cd-security¶
cis-benchmark¶
cis-benchmarks¶
cisco¶
cisco-certification¶
claude code¶
claude-code¶
- Building Apps and Games with Claude Code: Master Prompting for Every Platform
- Building Self-Referential Applications with Claude Code: Advanced Prompting for Meta-Programming
- Claude Code CLI Cheatsheet
- Claude Code for Beginners: Master AI-Powered Development Through Smart Prompting
- Claude Code for System Administration: AI-Powered Infrastructure Automation
- The Evolution of AI Coding: From Code Completion to Autonomous Agents
claude-flow¶
cli¶
- Claude Code CLI Cheatsheet
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
cli tools¶
cli-tool¶
- AADInternals Azure AD Exploitation Toolkit Cheat Sheet
- AArch64 Assembly Language (ARM64)
- ADConnectDump Azure AD Connect Credential Extraction Tool Cheat Sheet
- APT Package Manager
- ARM Assembly Language (32-bit)
- ASNmap ASN Mapping Tool Cheat Sheet
- AWS CLI
- AWS Kiro
- Acunetix
- Age
- Aircrack-ng Cheat Sheet
- Alacritty - GPU-Accelerated Terminal
- AlterX Subdomain Wordlist Generator Cheat Sheet
- Anchore
- AndroGuard Cheatsheet
- Ansible
- Ant Cheatsheet
- Apimonitor
- Apktool
- Apt-Get
- Aqua
- Aquatone
- Arachni Cheat Sheet
- Ares RAT Cheat Sheet
- Arjun
- Arp-Scan
- Asreproast
- Assetfinder
- Atomic Red Team
- Augment Code Cheat Sheet
- AutoGen Multi-Agent Framework Cheat Sheet
- Awesome-Go
- Awesome-Java
- Awesome-Javascript
- Awesome-Nodejs
- Awesome-Python
- Azucar Azure Security Auditing Tool Cheat Sheet
- Azure CLI
- Azure Security Assessment Tool Cheat Sheet
- AzureHound BloodHound Data Collector Cheat Sheet
- Baby-naptime Cheat Sheet
- Backdoors & Breaches Commands
- Bandit Python Security Linter Cheat Sheet
- Bash - Bourne Again Shell
- Bash Bunny Cheat Sheet
- Batch
- Bazaar
- Bazel Cheatsheet
- BeEF Browser Exploitation Framework Cheat Sheet
- Beacon
- Bettercap Cheat Sheet
- Bingoo
- Binwalk - Firmware Analysis Tool
- Bitbucket
- Bitlocker
- Blackeye Phishing Tool Cheat Sheet
- BloodHound Cheat Sheet
- Brackets
- Brakeman Ruby on Rails Security Scanner Cheat Sheet
- Brute Ratel C4 Framework Cheat Sheet
- Brutespray
- Bugsy Commands
- Bully
- Bundler
- Burp
- Bwapp
- Bzr
- CLion
- CMake Cheatsheet
- Caine
- Censys
- Censys-Python
- Cewl
- Chai
- ChatGPT & GPT-4 - AI Prompting Guide
- Cheatsheet-God
- Checkmarx
- Chef
- Chisel Cheat Sheet
- Chocolatey
- Cisco ASA Cheatsheet
- Clair
- Clang/LLVM - Modern Compiler Infrastructure
- Class-Dump
- Claude - AI Prompting Guide
- Claude Code AI Assistant Cheat Sheet
- Claude Code Router
- Claude Code UI
- Claude Code Undo
- Claude Code Usage
- Claudia
- Cloud Scout Cheat Sheet
- CloudMapper Cheat Sheet
- Cloudflare
- Cloudfox
- Cloudgoat
- Cloudlist Cloud Assets Listing Cheat Sheet
- Cobalt Strike Cheat Sheet
- Codeql
- Composer
- Comsvcs
- Conda
- Consul
- Context7 MCP Server Cheat Sheet
- Continue.dev Cheat Sheet
- Cortex Commands
- Covenant C2 Framework Cheat Sheet
- Coverage
- Cowpatty
- CrackMapExec Cheat Sheet
- CrewAI Multi-Agent Framework Cheat Sheet
- Cron
- Crontab
- Crowbar
- Crunch
- Cti-Python-Stix2
- Cupp
- Cursor
- Cutter Cheat Sheet
- CyberChef Cheatsheet
- DNS Management Cheat Sheet
- DNSx DNS Toolkit Cheat Sheet
- DVWA (Damn Vulnerable Web Application) Cheat Sheet
- Datadog
- Dc3Dd
- Dcfldd
- Dd
- Decryptautologon
- DeepSeek AI Prompting Cheat Sheet
- DeimosC2 Framework Cheat Sheet
- Detours
- Dex2Jar
- Dia Browser Cheat Sheet
- Diagon
- Dig - DNS Lookup and Troubleshooting
- DigitalOcean CLI (doctl)
- Dirb
- Dirsearch
- Docker Bench Cheat Sheet
- Docker Commands
- Dostackbufferoverflowgood
- Dradis Cheat Sheet
- Draft
- Drone
- Drozer Cheat Sheet
- Duckduckgo
- Dumpit
- ELSA Commands
- Eaphammer
- Elastic SIEM Cheatsheet
- Element
- Emerge
- Empire Framework Cheat Sheet
- Enum4Linux
- EvilGinx2 Phishing Framework Cheat Sheet
- Evilgophish
- Excel - Formulas, Functions & Productivity
- Exegol
- Exiftool
- ExploitDB Cheat Sheet
- Eyewitness
- Fakelogonscreen
- Faker
- Fast-Google-Dorks-Scan
- Fastapi
- Feroxbuster
- Findomain
- Firebase - Google's Backend-as-a-Service Platform
- Fish - Friendly Interactive Shell
- Flamingo
- Flare-Vm
- Flink
- Fluxion
- Foremost
- Frida Cheat Sheet
- Ftkimager
- GCC - GNU Compiler Collection
- GDB - GNU Debugger
- GNOME Terminal - Linux Desktop Terminal
- GRR Rapid Response Cheatsheet
- Garak
- Gau
- Gedit
- Gem
- Gemini CLI
- Ghostpack
- Ghostty - Terminal Emulator
- Git Commands
- GitHub Copilot Cheat Sheet
- Go-Audit
- Go-For-Javascript-Developers
- GoLand
- Goad
- Goatrider
- Gobuster Directory/File Brute Forcer Cheat Sheet
- Goby
- Gocrack
- Godoh
- Godpotato
- Goexec
- Gofetch
- Golang
- Golden-Guide-For-Pentesting
- Goldencopy
- Goodfaith
- Goodhound
- Goodork
- Googd0Rker
- Google Cloud CLI (gcloud)
- Google Gemini - AI Prompting Guide
- Google-Domain-Fronting
- Goohak
- Gopher
- Gopherus
- Gophish Social Engineering Framework Cheat Sheet
- Gosint
- Goversioninfo
- Gowitness
- Gpg
- Gradle Cheatsheet
- Gruyere
- Guymager
- HTTPX Toolkit Cheat Sheet
- Harness
- Hashcat Cheat Sheet
- Havoc C2 Framework Cheat Sheet
- Helm
- Heroku CLI
- Hexdump
- Hexway Hive Commands
- Hg
- Homebrew Package Manager
- Host - Simple DNS Lookup Tool
- Hping3
- Hydra Cheat Sheet
- Hyper
- IDA Pro - Interactive Disassembler Professional
- Icinga
- Immunity
- Impacket Toolkit Cheat Sheet
- Init
- Insomnia Commands
- Interactsh OOB Interaction Gathering Cheat Sheet
- Invoke-Obfuscation Cheat Sheet
- Istio
- Jaeger
- Java-Deserialization-Scanner
- JavaScript - Modern Web Development
- Java_Idx_Parser
- Javascript-Malware-Collection
- Joe
- John
- John the Ripper Cheat Sheet
- Judas Phishing Proxy Cheat Sheet
- Juice-Shop
- Jupyter Notebook
- K8S
- Kafka
- Kali Linux Cheatsheet
- Karma
- Katana Web Crawler Cheat Sheet
- Kerberoast
- Keybase
- Kibana
- Kind
- King Phisher Social Engineering Toolkit Cheat Sheet
- Kingofbugbountytips
- Kismet Cheat Sheet
- Kiwi
- Knockpy
- Koadic C2 Framework Cheat Sheet
- Kong
- Kubernetes Cheatsheet
- LangChain Framework Cheat Sheet
- LangGraph Framework Cheat Sheet
- Lazagne
- Ldd
- Lighttpd
- Ligolo
- Ligolo-Ng
- Linenum
- Linkerd
- Linpeas
- Linpmem
- Linux File Management Cheat Sheet
- Linux Network Commands Cheat Sheet
- Linux Process Management Cheat Sheet
- Linux Text Processing Cheat Sheet
- Linux-Exploit-Suggester
- Linuxprivchecker
- Llama - Meta's Open Source AI Prompting Guide
- LlamaIndex Framework Cheat Sheet
- Lldb
- Logstash Cheatsheet
- Lovable.dev Cheat Sheet
- Lsassy
- Ltrace
- Luks
- Lynis Security Auditing Tool Cheat Sheet
- MIPS Assembly Language
- MISP Cheatsheet
- Mac Terminal (Terminal.app) - macOS Native Terminal
- Make Cheatsheet
- Maltego-Telegram
- Malwoverview Cheat Sheet
- Masscan - High-Speed Port Scanner
- Maven Cheatsheet
- Medusa
- Meg
- Megatron-Java
- Memcached
- Mercurial
- Merlin C2 Framework Cheat Sheet
- Metabigor
- Metagoofil
- Metasploit Cheat Sheet
- Metasploit Framework Cheat Sheet
- Metasploitable Commands
- Meterpreter
- MicroBurst Azure Security Testing Toolkit Cheat Sheet
- Microsoft Sentinel Cheatsheet
- Mimikatz Cheat Sheet
- Mix
- MobSF (Mobile Security Framework) Cheat Sheet
- Model Context Protocol (MCP) Servers Cheat Sheet
- Modlishka Reverse Proxy Phishing Tool Cheat Sheet
- Msfconsole
- Msfvenom
- Mutillidae
- Mythic C2 Framework Cheat Sheet
- Naabu Port Scanner Cheat Sheet
- Nagios
- Nano Cheatsheet
- Nanodump
- Nats
- Nbtscan
- Nc
- Ncat
- Ncrack
- Needle
- Neovim Cheatsheet
- NetExec
- Netcat
- Netdiscover
- NetworkMiner Network Forensic Analysis Tool Cheat Sheet
- Nexpose
- Ngrok
- Nikto Cheat Sheet
- Ninja
- Nix
- Nm
- Nmap Commands
- NoSQLMap Cheat Sheet
- Nodegoat
- Nomad
- Notify Notification System Cheat Sheet
- Notion Cheatsheet
- Nslookup - DNS Lookup and Troubleshooting
- Nuclei Vulnerability Scanner Cheat Sheet
- Nuget
- OSSEC Host-based Intrusion Detection System Cheat Sheet
- OWASP API Security Top 10 Commands
- OWASP Amass Network Mapping Tool Cheat Sheet
- OWASP Dependency-Check Cheat Sheet
- OWASP ZAP Cheat Sheet
- Objdump
- Objection Cheat Sheet
- Obsidian Cheatsheet
- Oh My Posh - Cross-Platform Prompt Engine
- Oh My Zsh - Zsh Framework and Configuration Manager
- Ollama
- Onesixtyone
- OpenAI Codex Code Generation Cheat Sheet
- OpenCanary Cheatsheet
- OpenVPN Cheatsheet
- Openshift
- Openssl
- Opentelemetry
- Opentracing
- Outguess
- Outline VPN Cheatsheet
- Owasp-Threat-Dragon-Desktop
- P4
- PTF (Pentesters Framework) Cheat Sheet
- PTF (Pentesters Framework) Commands
- Packer
- Pacman Package Manager
- Pacu
- Pagodo
- Paramspider
- Patator
- Pegasus-Pentest-Arsenal Cheat Sheet
- Perplexity AI - Search-Powered Prompting Guide
- Pgp
- PhpStorm
- Pip
- Plink
- Polaris
- Poortego
- Posh-Virustotal
- PoshC2 Framework Cheat Sheet
- Poshc2_Python
- Postman API Testing
- PowerShell Cheatsheet
- PowerSploit Cheat Sheet
- PowerView Active Directory Enumeration Tool Cheat Sheet
- PowerZure Azure Security Assessment Tool Cheat Sheet
- Powerlevel10k - High-Performance Zsh Theme
- Powershell-Empire
- Powerup
- Privesc
- Procdump
- Procmon
- Productivity Tools Cheatsheet
- Proxychains Cheat Sheet
- PuTTY - SSH and Telnet Client for Windows
- Pub
- Puppet
- Puppeteer
- Pupy C2 Framework Cheat Sheet
- Pure - Minimal Zsh Prompt
- Pwnagotchi
- PyCharm
- Pydantic AI Framework Cheat Sheet
- Pypykatz
- Pyrit
- Pythagora Cheat Sheet
- Python - Programming Language Reference
- Python-Dshield
- Python-Evt
- Python-Icap-Yara
- Python-Iocextract
- Python-Ntfs
- Python-Pentest-Tools
- Python-Pty-Shells
- Python-Uncompyle6
- Python3-Venv
- Pythonidae
- QARK Cheatsheet
- Qualys
- Qwen AI Prompting Cheat Sheet
- R2
- RISC-V Assembly Language
- RITA Real Intelligence Threat Analytics Cheat Sheet
- ROADtools Azure AD Assessment Framework Cheat Sheet
- Radare2 - Reverse Engineering Framework
- Railsgoat
- Rancher
- Reaver Cheat Sheet
- Recon-ng Web Reconnaissance Framework Cheat Sheet
- Regular Expressions (RegEx) - Pattern Matching
- Rekall
- Remnux
- Responder Cheat Sheet
- Rider
- Rizin Cheat Sheet
- Rogue Cheat Sheet
- Rpcclient
- Rsyslog
- Rubeus Kerberos Interaction Tool Cheat Sheet
- RubyMine
- Rust
- RustScan Cheat Sheet
- SBT Cheatsheet
- SIFT Workstation Cheatsheet
- SQLmap Cheat Sheet
- Safety
- Scalpel
- Scapy
- Scoop
- Screen Cheatsheet
- Scylla
- SearchSploit Cheat Sheet
- Seatbelt
- SecurityOnion Cheatsheet
- Selenium
- Semgrep Static Analysis Tool Cheat Sheet
- Serverless-Goat
- Sessiongopher
- Sguil Cheat Sheet
- SharpHound Cheat Sheet
- SharpUp Cheat Sheet
- Shellter Cheat Sheet
- Sherlock Social Media Username Hunter Cheat Sheet
- Shosubgo
- Showmount
- Sigma Cheatsheet
- Signal
- Silver
- Skipfish Commands
- Sleuth Kit Cheat Sheet
- Sliver C2 Framework Cheat Sheet
- Smbclient
- Smtp-User-Enum
- Snap
- Snmp-Check
- Snmpwalk
- Snorby Cheat Sheet
- Snort Cheatsheet
- Snyk
- Socat
- Social Engineer Toolkit (SET) Cheatsheet
- Social Engineering Toolkit (SET) Cheat Sheet
- SocialFish Phishing Tool Cheat Sheet
- Solr
- SonarQube Code Quality and Security Platform Cheat Sheet
- Sops
- Sourceforge
- Spark
- SpoofCard Caller ID Spoofing Cheat Sheet
- Spring-Boot
- Squert Cheat Sheet
- Sshuttle
- Stack
- Starship - Cross-Shell Prompt Customizer
- Stegcracker
- Steghide
- Stego-Toolkit
- Stegsolve
- Stenographer - Full Packet Capture System
- Storm
- Stormspotter Cheat Sheet
- Strace
- Strelka Cheatsheet
- Strings
- Subfinder Subdomain Enumeration Cheat Sheet
- Sublime Text
- Sublist3R
- Sumo Logic Cheatsheet
- Supabase - Open Source Firebase Alternative
- SuperClaude
- Suricata Network IDS/IPS Cheat Sheet
- Svn
- Sysdig
- Syslog-Ng
- Systemctl
- Systemd
- Tailscale Cheatsheet
- Taskmaster-AI Automation Framework Cheat Sheet
- Tcpdump
- Terraform
- Terragoat
- Thc-Hydra
- The-Little-Go-Book
- TheHive Cheat Sheet
- ThreatHunting Keywords Commands
- Throwback C2 Framework Cheat Sheet
- Traefik
- TrevorC2 Framework Cheat Sheet
- Truecrypt
- Trust
- Trusted
- Twint Twitter OSINT Tool Cheat Sheet
- USB Rubber Ducky Keystroke Injection Tool Cheat Sheet
- Uncover Search Engine Tool Cheat Sheet
- Unicornscan
- Untitledgoosetool
- VSagent Cheat Sheet
- Vagrant
- Vault
- Veil Cheat Sheet
- Velociraptor Cheatsheet
- Veracode
- Veracrypt
- Vercel CLI Commands
- Villain C2 Framework Cheat Sheet
- Vim Cheatsheet
- Visual Studio
- Volatility Cheat Sheet
- W3af Web Application Attack Framework Cheat Sheet
- Wapiti Cheat Sheet
- Warp - AI-Powered Terminal
- Watson
- Waybackurls
- Waypoint
- Wazuh Cheatsheet
- WebGoat Cheat Sheet
- WebStorm
- Webscreenshot
- Weirdaal
- Wfuzz Cheat Sheet
- White Rabbit Neo AI Prompting Cheat Sheet
- WifiForge Cheat Sheet
- Wifiphisher Wireless Phishing Framework Cheat Sheet
- Wifite Cheat Sheet
- Windbg
- Windows Terminal
- Windows-Exploit-Suggester
- Windsurf Editor
- Winlogon
- Winpeas
- Winpmem
- Wire
- Xplico Commands
- Xxd
- YARA Cheatsheet
- YUM/DNF Package Manager
- Yum
- Zabbix
- Zap-Api-Nodejs
- Zed Editor
- Zerologon-Bof
- Zipkin
- Zmap Cheat Sheet
- Zoomeye
- Zsh - Z Shell
- Zsteg
- Zuul
- btop - Modern Resource Monitor
- csh - C Shell
- curl - HTTP Client and Data Transfer
- dnSpy - .NET Debugger and Assembly Editor
- ffuf Fast Web Fuzzer Cheat Sheet
- iTerm2 Terminal
- iptables Cheatsheet
- ksh - Korn Shell
- kubectl Cheatsheet
- n8n Workflow Automation Cheat Sheet
- npm Package Manager
- osquery - SQL-Based Operating System Instrumentation
- pfSense Cheatsheet
- ping - Network Connectivity Testing
- sh - POSIX Shell
- ssh - Secure Shell Remote Access
- theHarvester Email and Subdomain Enumeration Tool Cheat Sheet
- tmux Cheatsheet
- x86 Assembly Language (32-bit)
- x86-64 Assembly Language (64-bit)
- xterm - X Window System Terminal Emulator
cli-tools¶
cloning¶
cloud¶
- AWS CLI
- AWS Kiro
- Advanced Penetration Testing Methodologies: Master Professional Red Team Operations
- Advanced Threat Hunting Techniques: Master Proactive Cybersecurity Defense in 2025
- Azure CLI
- AzureHound BloodHound Data Collector Cheat Sheet
- Cloud Scout Cheat Sheet
- CloudMapper Cheat Sheet
- Cloudflare
- Cloudfox
- Cloudgoat
- Cloudlist Cloud Assets Listing Cheat Sheet
- Command Line Mastery for Professionals
- DevSecOps Excellence: Integrate Security into Every Stage of Software Development
- Digital Forensics and Incident Response: Master Professional DFIR Operations
- Enterprise Cloud Security Mastery: Build Bulletproof Multi-Cloud Security Architectures
- Google Cloud CLI (gcloud)
- K8S
- Network Security Architecture: Design Bulletproof Enterprise Network Defenses
- SOC 2 Compliance for IT Teams: Master Security Framework Implementation
- Zero Trust Network Implementation: A Comprehensive Guide to Modern Security Architecture
cloud architecture¶
cloud governance¶
cloud technologies¶
- FinOps Implementation Strategies: Master Cloud Cost Optimization Excellence
- Serverless Security Best Practices: Comprehensive Guide for Cloud Technologies
cloud-architecture¶
cloud-auditing¶
cloud-computing¶
cloud-infrastructure¶
cloud-management¶
cloud-migration¶
cloud-security¶
- ALTR Commands
- CloudSploit Cheat Sheet
- Forseti Security Cheat Sheet
- Intruder Cheat Sheet
- Multi-Cloud Security Architecture
- PacBot Cheat Sheet
- Prowler Cheat Sheet
- ScoutSuite Cheat Sheet
- Serverless Security Best Practices
- Wiz MCP Commands
cloud-technologies¶
cloudformation¶
cloudsploit¶
cnapp¶
code-completion¶
- Amazon CodeWhisperer Cheat Sheet
- Amazon Q Cheat Sheet
- Claude Cheat Sheet
- Supermaven Commands
- Tabnine Commands
code-coverage¶
code-generator¶
code-quality¶
code-scanning¶
code-search¶
code-to-cloud-security¶
coding¶
collaboration¶
- Asana Cheatsheet
- Excalidraw Cheat Sheet
- Gamma Commands
- Google Meet Cheatsheet
- Mattermost Cheatsheet
- Microsoft Teams Cheatsheet
- Monday.com Cheatsheet
- Slack Cheatsheet
- Trello Cheatsheet
- Zoom Cheatsheet
command line¶
command-line¶
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
- Essential Linux Commands for IT Professionals: Master the Foundation of Modern Infrastructure
commands¶
communication¶
- Discord Cheatsheet
- Google Meet Cheatsheet
- IRC Cheatsheet
- Mattermost Cheatsheet
- Microsoft Teams Cheatsheet
- Slack Cheatsheet
- Telegram Cheatsheet
- WhatsApp Business Cheatsheet
- Zoom Cheatsheet
community¶
compliance¶
- AI Guardian Cheatsheet
- AI SBOM Generator Cheatsheet
- ALTR Commands
- Advanced Threat Hunting Techniques: Master Proactive Cybersecurity Defense in 2025
- Ansible Security Automation: Master DevOps Security Excellence
- CloudSploit Cheat Sheet
- Cribl Guard Cheatsheet
- Digital Forensics and Incident Response: Master Professional DFIR Operations
- Forseti Security Cheat Sheet
- Gatekeeper Cheat Sheet
- KICS (Keeping Infrastructure as Code Secure) Cheat Sheet
- Kube-bench Cheatsheet
- Multi-Cloud Security Architecture
- Open Policy Agent (OPA) Cheatsheet
- PacBot Cheat Sheet
- Privacy Policy
- Prowler Cheat Sheet
- SOC 2 Compliance for IT Teams: A Comprehensive Guide to Security Framework Implementation
- SOC 2 Compliance for IT Teams: Master Security Framework Implementation
- ScoutSuite Cheat Sheet
- Steampipe Cheat Sheet
- Terrascan Cheat Sheet
- Zero Trust Network Implementation: A Comprehensive Guide to Modern Security Architecture
compliance-reporting¶
compliance-scanning¶
configuration management¶
configuration-management¶
container-security¶
containerization¶
containers¶
content-creation¶
context7¶
continuous-deployment¶
continuous-monitoring¶
continuous-security¶
conversational-ai¶
copilot¶
cost optimization¶
covert-access¶
cpu-emulation¶
creative-ai¶
cross-platform¶
- AWS CLI
- Angular
- Ansible
- Apache
- Apktool
- Atom
- Autopsy Cheat Sheet
- Azure CLI
- Burp Suite Cheat Sheet
- Chef
- Dirbuster
- Django
- Docker Commands
- Elasticsearch
- Elk
- Emacs Cheatsheet
- Express
- Frida Cheat Sheet
- Ghidra - NSA Reverse Engineering Framework
- Git Commands
- Gobuster Directory/File Brute Forcer Cheat Sheet
- Google Cloud CLI (gcloud)
- Gpg
- Gradle Cheatsheet
- Grafana
- Hashcat Cheat Sheet
- Helm
- Hexdump
- Hydra Cheat Sheet
- Ida
- IntelliJ IDEA
- Jenkins
- John
- John the Ripper Cheat Sheet
- Kubernetes Cheatsheet
- Maltego Cheat Sheet
- Maven Cheatsheet
- Metasploit Cheat Sheet
- Metasploit Framework Cheat Sheet
- Nikto Cheat Sheet
- Nmap Commands
- NocoDB Commands
- Objection Cheat Sheet
- Openssl
- Pip
- Prometheus
- Puppet
- Python - Programming Language Reference
- Radare2 - Reverse Engineering Framework
- React
- Recon-ng Web Reconnaissance Framework Cheat Sheet
- SQLmap Cheat Sheet
- Shodan
- Sleuth Kit Cheat Sheet
- Splunk Cheatsheet
- Strings
- Subfinder Subdomain Enumeration Cheat Sheet
- Sublist3R
- Terraform
- VS Code Shortcuts
- Vercel CLI Commands
- Vim Cheatsheet
- Volatility Cheat Sheet
- Vue
- Wireshark Cheat Sheet
- kubectl Cheatsheet
- npm Package Manager
- ssh - Secure Shell Remote Access
- theHarvester Email and Subdomain Enumeration Tool Cheat Sheet
cryptography¶
- DNS Security & DNSSEC: Advanced Protection for Internet Infrastructure
- Gpg
- Hashcat Cheat Sheet
- John
- John the Ripper Cheat Sheet
- Openssl
cursor¶
customer-service¶
cybersecurity¶
- A Comprehensive Guide to Mobile Incident Response
- Advanced Penetration Testing Methodologies: Master Professional Red Team Operations
- Advanced Threat Hunting Techniques: Master Proactive Cybersecurity Defense in 2025
- Ansible Security Automation: Master DevOps Security Excellence
- Blog
- Cybersecurity Workflow Automation: Transform Your Security Operations with Advanced Automation Frameworks
- DevSecOps Excellence: Integrate Security into Every Stage of Software Development
- Digital Forensics and Evidence Collection: Master Professional Investigation Excellence
- Digital Forensics and Incident Response: Master Professional DFIR Operations
- Enterprise Blockchain Security: A Strategic Implementation Guide
- Enterprise Cloud Security Mastery: Build Bulletproof Multi-Cloud Security Architectures
- Ethical Hacking Methodologies
- Ethical Hacking Methodologies: Master Professional Penetration Testing in 2025
- Guided Threat Hunts Cheatsheet
- Kubernetes Security Hardening: Bulletproof Container Orchestration Security
- Modern API Security: OAuth 2.1 and Beyond
- Network Security Architecture: Design Bulletproof Enterprise Network Defenses
- Resources
- SOC 2 Compliance for IT Teams: A Comprehensive Guide to Security Framework Implementation
- SOC 2 Compliance for IT Teams: Master Security Framework Implementation
- Zeek Cheatsheet
- Zero Trust Network Implementation: A Comprehensive Guide to Modern Security Architecture
cyera¶
cynthion¶
dalfox¶
darpa-aixcc¶
dast-scanner¶
data engineering¶
data pipeline¶
data protection¶
data-collection¶
data-engineering¶
data-governance¶
data-protection¶
- ALTR Commands
- Cribl Guard Cheatsheet
- SOC 2 Compliance for IT Teams: A Comprehensive Guide to Security Framework Implementation
data-science¶
data-security¶
data-visualization¶
database¶
debugging¶
- GDB - GNU Debugger
- Logic Analyzer Cheatsheet
- Ltrace
- Ollydbg
- REVEN Cheat Sheet
- Strace
- x64dbg - Windows Debugger
decentralized¶
decompilation¶
decompiler¶
defi¶
deployment¶
design¶
desktop-apps¶
developer-portal¶
developer-tools¶
developer-workflows¶
development¶
- AI-Assisted Coding: From IDE Assistants to Agent Programming
- Augment Code Cheat Sheet
- Blog
- Claude Code AI Assistant Cheat Sheet
- Claude Code Router
- Claude Code UI
- Claude Code Undo
- Claude Code Usage
- Codeql
- Continue.dev Cheat Sheet
- Docker Commands
- Git Commands
- Go-For-Javascript-Developers
- Lovable.dev Cheat Sheet
- OpenAI Codex Code Generation Cheat Sheet
- Python - Programming Language Reference
- Resources
- Supermaven Commands
- Tabnine Commands
- Tools
- VS Code Shortcuts
- Veracode
development-environment¶
development-tools¶
- AI-Assisted Coding: From IDE Assistants to Agent Programming
- The Evolution of AI Coding: From Code Completion to Autonomous Agents
devops¶
- AWS Kiro
- Ansible Security Automation: Master DevOps Security Excellence
- AzureHound BloodHound Data Collector Cheat Sheet
- Claude Code for System Administration: AI-Powered Infrastructure Automation
- Cloud Scout Cheat Sheet
- CloudMapper Cheat Sheet
- Cloudflare
- Cloudfox
- Cloudgoat
- Cloudlist Cloud Assets Listing Cheat Sheet
- Cybersecurity Workflow Automation: Transform Your Security Operations with Advanced Automation Frameworks
- Docker Commands
- Essential Linux Commands for IT Professionals: Master the Foundation of Modern Infrastructure
- Falco Cheatsheet
- Forseti Security Cheat Sheet
- Hybrid Cloud Networking Excellence: Mastering Modern Infrastructure Integration
- K8S
- Kube-bench Cheatsheet
- Kube-hunter Cheatsheet
- Kubernetes Cheatsheet
- Kubernetes Security Hardening: Bulletproof Container Orchestration Security
- Open Policy Agent (OPA) Cheatsheet
- PacBot Cheat Sheet
- SRE Incident Management: Master Professional Site Reliability Engineering Excellence
- Serverless Security Best Practices: Comprehensive Guide for Cloud Technologies
- Terraform Enterprise Patterns: Mastering Infrastructure as Code at Scale
- Trivy Cheatsheet
devsecops¶
- Advanced Pipeline Security Integration: Mastering DevSecOps in CI/CD Environments
- Aikido Security Cheat Sheet
- AutoFix AI Agent Cheatsheet
- Checkov Cheat Sheet
- KICS (Keeping Infrastructure as Code Secure) Cheat Sheet
- Kube-bench Cheatsheet
- Kube-hunter Cheatsheet
- Legit Security Commands
- Secure Data Pipeline Architecture: A Comprehensive Guide
- TFSec Cheat Sheet
- Terrascan Cheat Sheet
- Trivy Cheatsheet
dfir¶
diagramming¶
digital forensics¶
digital-forensics¶
digital-logic¶
directory¶
directory-enumeration¶
disassembler¶
discord¶
disk-analysis¶
disk-imaging¶
distributed systems¶
distributed tracing¶
dns¶
- Advanced Penetration Testing Methodologies: Master Professional Red Team Operations
- DNS Best Practices & Standards: Master Enterprise Infrastructure Excellence
- DNS Fundamentals & Architecture: Master Internet Infrastructure Excellence
- DNS Management & Administration: Enterprise-Grade Infrastructure Excellence
- DNS Performance Optimization: Master Speed & Efficiency Excellence
- DNS Troubleshooting & Monitoring: Master Network Reliability Excellence
dns security¶
- DNS Management & Administration: Enterprise-Grade Infrastructure Excellence
- DNS Security & DNSSEC: Advanced Protection for Internet Infrastructure
dns-security¶
dnssec¶
docker¶
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
- GNS3 Cheatsheet
- Trivy Cheatsheet
dockerfile¶
document-forensics¶
documentation¶
dom-analysis¶
dynamic-analysis¶
eda¶
edge computing¶
edr¶
electronics¶
email¶
embedded-security¶
embedded-systems¶
emerging technologies¶
emulation¶
encryption¶
- A Deep Dive into Mobile Device Encryption
- Gpg
- ProtonMail Cheatsheet
- Serverless Security Best Practices
endpoint-discovery¶
engineering management¶
enterprise¶
enterprise infrastructure¶
enterprise it¶
enterprise-ai¶
enterprise-architecture¶
enterprise-security¶
- Enterprise Blockchain Security: A Strategic Implementation Guide
- Invicti Cheat Sheet
- Nessus Cheatsheet
esp32¶
ethernet-monitoring¶
ethical-hacking¶
- Ethical Hacking Methodologies
- Ethical Hacking Methodologies: Master Professional Penetration Testing in 2025
evidence collection¶
expert¶
exploitation¶
external-links¶
falco¶
fiddler¶
file explorer¶
file management¶
financial management¶
fingerprinting¶
finops¶
fintech¶
firewall¶
firmware¶
flipper-zero¶
flux¶
forensic investigation¶
forensics¶
- Advanced Penetration Testing Methodologies: Master Professional Red Team Operations
- Advanced Threat Hunting Techniques: Master Proactive Cybersecurity Defense in 2025
- Autopsy Cheat Sheet
- Binwalk - Firmware Analysis Tool
- BitUnlocker Cheatsheet
- Dd
- DevSecOps Excellence: Integrate Security into Every Stage of Software Development
- Digital Forensics and Incident Response: Master Professional DFIR Operations
- Enterprise Cloud Security Mastery: Build Bulletproof Multi-Cloud Security Architectures
- Hexdump
- Network Security Architecture: Design Bulletproof Enterprise Network Defenses
- SOC 2 Compliance for IT Teams: Master Security Framework Implementation
- Sleuth Kit Cheat Sheet
- Strings
- Volatility Cheat Sheet
- Wireshark Cheat Sheet
- Zero Trust Network Implementation: A Comprehensive Guide to Modern Security Architecture
forseti-security¶
frameworks¶
frontend¶
fusion-360¶
future-of-coding¶
fuzzing¶
game-development¶
gatekeeper¶
gcp¶
- CloudSploit Cheat Sheet
- Google Cloud CLI (gcloud)
- Hybrid Cloud Networking Excellence: Mastering Modern Infrastructure Integration
- Steampipe Cheat Sheet
gcp-security¶
gdpr¶
generative-ai¶
getting-started¶
gf¶
ghidra¶
git¶
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
github copilot¶
github-copilot¶
gitops¶
gns3¶
google cloud functions¶
google-cloud¶
google-meet¶
governance¶
- AI Guardian Cheatsheet
- Enterprise Blockchain Security: A Strategic Implementation Guide
- Multi-Cloud Security Architecture
- Open Policy Agent (OPA) Cheatsheet
gpt-4¶
gpt-5¶
great-scott-gadgets¶
greenbone¶
grep¶
gui-application¶
- Atom
- Autopsy Cheat Sheet
- Burp Suite Cheat Sheet
- Dirbuster
- Emacs Cheatsheet
- Ghidra - NSA Reverse Engineering Framework
- Ida
- IntelliJ IDEA
- Maltego Cheat Sheet
- Ollydbg
- Splunk Cheatsheet
- VS Code Shortcuts
- Wireshark Cheat Sheet
- x64dbg - Windows Debugger
guides¶
gvm¶
hackrf¶
hak5¶
- Hak5 Key Croc Cheatsheet
- Hak5 LAN Turtle Cheatsheet
- Hak5 Packet Squirrel Cheatsheet
- Hak5 Shark Jack Cheatsheet
- WiFi Pineapple Cheatsheet
hardware¶
- 3D Printable PCB Cheatsheet
- Bjorn Cheatsheet
- BladeRF Cheatsheet
- ESP32 Marauder Cheatsheet
- Flipper Zero Cheatsheet
- Flipper Zero Firmware Cheatsheet
- HackRF One Cheatsheet
- KiCad Cheatsheet
- Momentum Firmware Cheatsheet
- PandwaRF Cheatsheet
- PortaPack Cheatsheet
- RTL-SDR Cheatsheet
- WiFi Pineapple Cheatsheet
hardware-design¶
hardware-hacking¶
hardware-security¶
hashicorp¶
hayabusa¶
high availability¶
homepage¶
hop-analysis¶
http-proxy¶
humint¶
hybrid-cloud¶
- Hybrid Cloud Networking Excellence: Mastering Modern Infrastructure Integration
- Multi-Cloud Security Architecture
iOS¶
- A Deep Dive into iOS App Management & Deployment
- A Deep Dive into iOS Enterprise Configuration
- A Deep Dive into iOS Network & VPN Configuration
iac¶
iac-security¶
iam¶
- Serverless Security Best Practices
- Serverless Security Best Practices: Comprehensive Guide for Cloud Technologies
iast-security¶
icopy-x¶
ida-pro¶
ide-assistants¶
ide-editors¶
ide-integration¶
identity-security¶
implementation¶
incident management¶
incident response¶
- A Comprehensive Guide to Mobile Incident Response
- Digital Forensics and Evidence Collection: Master Professional Investigation Excellence
- SRE Incident Management: Master Professional Site Reliability Engineering Excellence
incident-response¶
- Autonomous PowerShell Agent Cheatsheet
- BitUnlocker Cheatsheet
- Hayabusa & Suzaku Cheatsheet
- PagerDuty
- Vectra AI Commands
index¶
information-gathering¶
information-security¶
infrastructure¶
- Claude Code for System Administration: AI-Powered Infrastructure Automation
- Essential Linux Commands for IT Professionals: Master the Foundation of Modern Infrastructure
- Hybrid Cloud Networking Excellence: Mastering Modern Infrastructure Integration
- Network Performance Optimization: A Comprehensive Guide
- Terraform
infrastructure protection¶
infrastructure security¶
- Ansible Security Automation: Master DevOps Security Excellence
- Edge Security Architecture: Comprehensive Guide to Securing Distributed Computing Infrastructure
infrastructure-as-code¶
- Checkov Cheat Sheet
- KICS (Keeping Infrastructure as Code Secure) Cheat Sheet
- Pulumi
- TFSec Cheat Sheet
- Terraform Enterprise Patterns: Mastering Infrastructure as Code at Scale
- Terragrunt
- Terrascan Cheat Sheet
- env0 Cheat Sheet
infrastructure-engineering¶
infrastructure-monitoring¶
infrastructure-security¶
instagram¶
integration-testing¶
intelligence-gathering¶
intermediate¶
- AADInternals Azure AD Exploitation Toolkit Cheat Sheet
- AArch64 Assembly Language (ARM64)
- ADConnectDump Azure AD Connect Credential Extraction Tool Cheat Sheet
- ALTR Commands
- APT Package Manager
- ARM Assembly Language (32-bit)
- ASNmap ASN Mapping Tool Cheat Sheet
- AWS CLI
- AWS Kiro
- Acunetix
- Age
- Aikido Security Cheat Sheet
- Aircrack-ng Cheat Sheet
- Alacritty - GPU-Accelerated Terminal
- AlterX Subdomain Wordlist Generator Cheat Sheet
- Amazon CodeWhisperer Cheat Sheet
- Amazon Q Cheat Sheet
- Anchore
- AndroGuard Cheatsheet
- Angular
- Ansible
- Ant Cheatsheet
- Apache
- Apimonitor
- Apktool
- Apt-Get
- Aqua
- Aquatone
- Arachni Cheat Sheet
- Ares RAT Cheat Sheet
- Arjun
- Arp-Scan
- Asreproast
- Assetfinder
- Atomic Red Team
- Augment Code Cheat Sheet
- AutoGen Multi-Agent Framework Cheat Sheet
- Autopsy Cheat Sheet
- Awesome-Go
- Awesome-Java
- Awesome-Javascript
- Awesome-Nodejs
- Awesome-Python
- Azucar Azure Security Auditing Tool Cheat Sheet
- Azure CLI
- Azure Security Assessment Tool Cheat Sheet
- AzureHound BloodHound Data Collector Cheat Sheet
- Baby-naptime Cheat Sheet
- Backdoors & Breaches Commands
- Bandit Python Security Linter Cheat Sheet
- Bash Bunny Cheat Sheet
- Batch
- Bazaar
- Bazel Cheatsheet
- BeEF Browser Exploitation Framework Cheat Sheet
- Beacon
- Bettercap Cheat Sheet
- Bingoo
- Binwalk - Firmware Analysis Tool
- Bitbucket
- Bitlocker
- Blackeye Phishing Tool Cheat Sheet
- BloodHound Cheat Sheet
- Brackets
- Brakeman Ruby on Rails Security Scanner Cheat Sheet
- Brute Ratel C4 Framework Cheat Sheet
- Brutespray
- Bugsy Commands
- Bully
- Bundler
- Burp
- Burp Suite Cheat Sheet
- Bwapp
- Bzr
- CLion
- CMake Cheatsheet
- Caine
- Censys
- Censys-Python
- Cewl
- Chai
- ChatGPT & GPT-4 - AI Prompting Guide
- Cheatsheet-God
- Checkmarx
- Checkov Cheat Sheet
- Chef
- Chisel Cheat Sheet
- Chocolatey
- Cisco ASA Cheatsheet
- Clair
- Clang/LLVM - Modern Compiler Infrastructure
- Class-Dump
- Claude - AI Prompting Guide
- Claude Cheat Sheet
- Claude Code AI Assistant Cheat Sheet
- Claude Code Router
- Claude Code UI
- Claude Code Undo
- Claude Code Usage
- Claudia
- ClickUp Cheat Sheet
- Cloud Scout Cheat Sheet
- CloudMapper Cheat Sheet
- Cloudflare
- Cloudfox
- Cloudgoat
- Cloudlist Cloud Assets Listing Cheat Sheet
- Cobalt Strike Cheat Sheet
- Codeql
- Composer
- Comsvcs
- Conda
- Consul
- Context7 MCP Server Cheat Sheet
- Continue.dev Cheat Sheet
- Cortex Commands
- Covenant C2 Framework Cheat Sheet
- Coverage
- Cowpatty
- CrackMapExec Cheat Sheet
- CrewAI Multi-Agent Framework Cheat Sheet
- Cron
- Crowbar
- Crunch
- Cti-Python-Stix2
- Cupp
- Cursor
- Cutter Cheat Sheet
- CyberChef Cheatsheet
- Cybersecurity Workflow Automation: Transform Your Security Operations with Advanced Automation Frameworks
- DNS Management Cheat Sheet
- DNSx DNS Toolkit Cheat Sheet
- DVWA (Damn Vulnerable Web Application) Cheat Sheet
- Datadog
- Dc3Dd
- Dcfldd
- Dd
- Decryptautologon
- DeepSeek AI Prompting Cheat Sheet
- DeimosC2 Framework Cheat Sheet
- Detours
- Dex2Jar
- Dia Browser Cheat Sheet
- Diagon
- Dig - DNS Lookup and Troubleshooting
- DigitalOcean CLI (doctl)
- Dirsearch
- Divjoy Commands
- Django
- Docker Bench Cheat Sheet
- Docker Commands
- Dostackbufferoverflowgood
- Dradis Cheat Sheet
- Draft
- Drone
- Drozer Cheat Sheet
- Duckduckgo
- Dumpit
- ELSA Commands
- Eaphammer
- Elastic SIEM Cheatsheet
- Elasticsearch
- Element
- ElevenLabs Commands
- Emacs Cheatsheet
- Emerge
- Empire Framework Cheat Sheet
- Enum4Linux
- EvilGinx2 Phishing Framework Cheat Sheet
- Evilgophish
- Excel - Formulas, Functions & Productivity
- Exegol
- Exiftool
- ExploitDB Cheat Sheet
- Eyewitness
- FOCA Cheat Sheet
- Fakelogonscreen
- Faker
- Fast-Google-Dorks-Scan
- Fastapi
- Feroxbuster
- Findomain
- Firebase - Google's Backend-as-a-Service Platform
- Flamingo
- Flare-Vm
- Flink
- Fluxion
- Foremost
- Ftkimager
- GCC - GNU Compiler Collection
- GNOME Terminal - Linux Desktop Terminal
- GRR Rapid Response Cheatsheet
- Garak
- Gau
- Gedit
- Gem
- Gemini CLI
- Ghostpack
- Ghostty - Terminal Emulator
- GitHub Copilot Cheat Sheet
- Go-Audit
- Go-For-Javascript-Developers
- GoLand
- Goad
- Goatrider
- Goby
- Gocrack
- Godoh
- Godpotato
- Goexec
- Gofetch
- Golang
- Golden-Guide-For-Pentesting
- Goldencopy
- Goodfaith
- Goodhound
- Goodork
- Googd0Rker
- Google Cloud CLI (gcloud)
- Google Gemini - AI Prompting Guide
- Google-Domain-Fronting
- Goohak
- Gopher
- Gopherus
- Gophish Social Engineering Framework Cheat Sheet
- Gosint
- Goversioninfo
- Gowitness
- Gpg
- Gradle Cheatsheet
- Grafana
- Gruyere
- Guymager
- HTTPX Toolkit Cheat Sheet
- Harness
- Hashcat Cheat Sheet
- Havoc C2 Framework Cheat Sheet
- Helm
- Heroku CLI
- Hexway Hive Commands
- Hg
- Homebrew Package Manager
- Host - Simple DNS Lookup Tool
- Hping3
- Hydra Cheat Sheet
- Hyper
- IDA Pro - Interactive Disassembler Professional
- Icinga
- Immunity
- Impacket Toolkit Cheat Sheet
- Init
- Insomnia Commands
- IntelliJ IDEA
- Interactsh OOB Interaction Gathering Cheat Sheet
- Intruder Cheat Sheet
- Invoke-Obfuscation Cheat Sheet
- Istio
- Jaeger
- Java-Deserialization-Scanner
- JavaScript - Modern Web Development
- Java_Idx_Parser
- Javascript-Malware-Collection
- Jenkins
- Joe
- John
- John the Ripper Cheat Sheet
- Judas Phishing Proxy Cheat Sheet
- Juice-Shop
- Jupyter Notebook
- K8S
- Kafka
- Kali Linux Cheatsheet
- Karma
- Katana Web Crawler Cheat Sheet
- Kerberoast
- Keybase
- Kibana
- Kind
- King Phisher Social Engineering Toolkit Cheat Sheet
- Kingofbugbountytips
- Kismet Cheat Sheet
- Kiwi
- Knockpy
- Koadic C2 Framework Cheat Sheet
- Kong
- LangChain Framework Cheat Sheet
- LangGraph Framework Cheat Sheet
- Lazagne
- Ldd
- Legit Security Commands
- Lighttpd
- Ligolo
- Ligolo-Ng
- Linear Cheat Sheet
- Linenum
- Linkerd
- Linpeas
- Linpmem
- Linux File Management Cheat Sheet
- Linux Network Commands Cheat Sheet
- Linux Process Management Cheat Sheet
- Linux Text Processing Cheat Sheet
- Linux-Exploit-Suggester
- Linuxprivchecker
- Llama - Meta's Open Source AI Prompting Guide
- LlamaIndex Framework Cheat Sheet
- Lldb
- Logstash Cheatsheet
- Lovable.dev Cheat Sheet
- Lsassy
- Ltrace
- Luks
- Lynis Security Auditing Tool Cheat Sheet
- MIPS Assembly Language
- MISP Cheatsheet
- Mac Terminal (Terminal.app) - macOS Native Terminal
- Make Cheatsheet
- Maltego Cheat Sheet
- Maltego-Telegram
- Malwoverview Cheat Sheet
- Masscan - High-Speed Port Scanner
- Maven Cheatsheet
- Medusa
- Meg
- Megatron-Java
- Memcached
- Mercurial
- Merlin C2 Framework Cheat Sheet
- Metabigor
- Metagoofil
- Metasploitable Commands
- Meterpreter
- MicroBurst Azure Security Testing Toolkit Cheat Sheet
- Microsoft Sentinel Cheatsheet
- Mimikatz Cheat Sheet
- Mix
- MobSF (Mobile Security Framework) Cheat Sheet
- Model Context Protocol (MCP) Servers Cheat Sheet
- Modlishka Reverse Proxy Phishing Tool Cheat Sheet
- Msfconsole
- Msfvenom
- Mutillidae
- Mythic C2 Framework Cheat Sheet
- Naabu Port Scanner Cheat Sheet
- Nagios
- Nano Cheatsheet
- Nanodump
- Nats
- Nbtscan
- Nc
- Ncat
- Ncrack
- Needle
- Neovim Cheatsheet
- NetExec
- Netcat
- Netdiscover
- NetworkMiner Network Forensic Analysis Tool Cheat Sheet
- Nexpose
- Nginx
- Ngrok
- Ninja
- Nix
- Nm
- Nmap Commands
- NoSQLMap Cheat Sheet
- NocoDB Commands
- Nodegoat
- Nomad
- Notify Notification System Cheat Sheet
- Notion Cheatsheet
- Nslookup - DNS Lookup and Troubleshooting
- Nuclei Vulnerability Scanner Cheat Sheet
- Nuget
- OSSEC Host-based Intrusion Detection System Cheat Sheet
- OWASP API Security Top 10 Commands
- OWASP Amass Network Mapping Tool Cheat Sheet
- OWASP Dependency-Check Cheat Sheet
- OWASP ZAP Cheat Sheet
- Objdump
- Objection Cheat Sheet
- Obsidian Cheatsheet
- Oh My Posh - Cross-Platform Prompt Engine
- Oh My Zsh - Zsh Framework and Configuration Manager
- Ollama
- Onesixtyone
- OpenAI Codex Code Generation Cheat Sheet
- OpenCanary Cheatsheet
- OpenVPN Cheatsheet
- Openshift
- Openssl
- Opentelemetry
- Opentracing
- Outguess
- Outline VPN Cheatsheet
- Owasp-Threat-Dragon-Desktop
- P4
- PTF (Pentesters Framework) Cheat Sheet
- PTF (Pentesters Framework) Commands
- Packer
- Pacman Package Manager
- Pacu
- Pagodo
- Paramspider
- Patator
- Pegasus-Pentest-Arsenal Cheat Sheet
- Perplexity AI - Search-Powered Prompting Guide
- Pgp
- PhpStorm
- PlexTrac Cheat Sheet
- Plink
- Polaris
- Poortego
- Port Cheat Sheet
- Posh-Virustotal
- PoshC2 Framework Cheat Sheet
- Poshc2_Python
- Postman API Testing
- PowerShell Cheatsheet
- PowerSploit Cheat Sheet
- PowerView Active Directory Enumeration Tool Cheat Sheet
- PowerZure Azure Security Assessment Tool Cheat Sheet
- Powerlevel10k - High-Performance Zsh Theme
- Powershell-Empire
- Powerup
- Privesc
- Procdump
- Procmon
- Productivity Tools Cheatsheet
- Prometheus
- Proxychains Cheat Sheet
- PuTTY - SSH and Telnet Client for Windows
- Pub
- Puppet
- Puppeteer
- Pupy C2 Framework Cheat Sheet
- Pure - Minimal Zsh Prompt
- Pwnagotchi
- PyCharm
- Pydantic AI Framework Cheat Sheet
- Pypykatz
- Pyrit
- Pythagora Cheat Sheet
- Python-Dshield
- Python-Evt
- Python-Icap-Yara
- Python-Iocextract
- Python-Ntfs
- Python-Pentest-Tools
- Python-Pty-Shells
- Python-Uncompyle6
- Python3-Venv
- Pythonidae
- QARK Cheatsheet
- Qodana Cheat Sheet
- Qualys
- Qwen AI Prompting Cheat Sheet
- R2
- RISC-V Assembly Language
- RITA Real Intelligence Threat Analytics Cheat Sheet
- ROADtools Azure AD Assessment Framework Cheat Sheet
- Railsgoat
- Rancher
- React
- Reaver Cheat Sheet
- Recon-ng Web Reconnaissance Framework Cheat Sheet
- Regular Expressions (RegEx) - Pattern Matching
- Rekall
- Remnux
- Responder Cheat Sheet
- Rider
- Rizin Cheat Sheet
- Rogue Cheat Sheet
- Rpcclient
- Rsyslog
- Rubeus Kerberos Interaction Tool Cheat Sheet
- RubyMine
- Runway Commands
- Rust
- RustScan Cheat Sheet
- SBT Cheatsheet
- SIFT Workstation Cheatsheet
- SQLmap Cheat Sheet
- Safety
- Scalpel
- Scapy
- Scoop
- Scraper API Commands
- Screen Cheatsheet
- Scylla
- SearchSploit Cheat Sheet
- Seatbelt
- SecurityOnion Cheatsheet
- Selenium
- Semgrep Static Analysis Tool Cheat Sheet
- Serverless-Goat
- Sessiongopher
- Sguil Cheat Sheet
- SharpHound Cheat Sheet
- SharpUp Cheat Sheet
- Shellter Cheat Sheet
- Sherlock Social Media Username Hunter Cheat Sheet
- Shosubgo
- Showmount
- Sigma Cheatsheet
- Signal
- Silver
- Skipfish Commands
- Sleuth Kit Cheat Sheet
- Sliver C2 Framework Cheat Sheet
- Smbclient
- Smtp-User-Enum
- Snap
- Snmp-Check
- Snmpwalk
- Snorby Cheat Sheet
- Snort Cheatsheet
- Snyk
- Socat
- Social Engineer Toolkit (SET) Cheatsheet
- Social Engineering Toolkit (SET) Cheat Sheet
- SocialFish Phishing Tool Cheat Sheet
- Solr
- SonarCloud Cheat Sheet
- SonarQube Code Quality and Security Platform Cheat Sheet
- Sops
- Sourceforge
- Sourcegraph Cheat Sheet
- Spark
- SpiderFoot Cheat Sheet
- SpoofCard Caller ID Spoofing Cheat Sheet
- Spring-Boot
- Squert Cheat Sheet
- Sshuttle
- Stack
- Starship - Cross-Shell Prompt Customizer
- Stegcracker
- Steghide
- Stego-Toolkit
- Stegsolve
- Stenographer - Full Packet Capture System
- Storm
- Stormspotter Cheat Sheet
- Strace
- Strelka Cheatsheet
- Sublime Text
- Sumo Logic Cheatsheet
- Supabase - Open Source Firebase Alternative
- SuperClaude
- Suricata Network IDS/IPS Cheat Sheet
- Svn
- Sysdig
- Syslog-Ng
- Systemd
- TFSec Cheat Sheet
- Tailscale Cheatsheet
- Taskmaster-AI Automation Framework Cheat Sheet
- Tcpdump
- Terraform
- Terragoat
- Thc-Hydra
- The-Little-Go-Book
- TheHive Cheat Sheet
- ThreatHunting Keywords Commands
- Throwback C2 Framework Cheat Sheet
- Traefik
- TrevorC2 Framework Cheat Sheet
- Truecrypt
- Trust
- Trusted
- Twint Twitter OSINT Tool Cheat Sheet
- USB Rubber Ducky Keystroke Injection Tool Cheat Sheet
- Uncover Search Engine Tool Cheat Sheet
- Unicornscan
- Untitledgoosetool
- VSagent Cheat Sheet
- Vagrant
- Vault
- Veil Cheat Sheet
- Velociraptor Cheatsheet
- Veracode
- Veracrypt
- Vercel CLI Commands
- Villain C2 Framework Cheat Sheet
- Vim Cheatsheet
- Visual Studio
- Vue
- W3af Web Application Attack Framework Cheat Sheet
- Wapiti Cheat Sheet
- Warp - AI-Powered Terminal
- Watson
- Waybackurls
- Waypoint
- Wazuh Cheatsheet
- WebGoat Cheat Sheet
- WebStorm
- Webscreenshot
- Weirdaal
- Wfuzz Cheat Sheet
- White Rabbit Neo AI Prompting Cheat Sheet
- WifiForge Cheat Sheet
- Wifiphisher Wireless Phishing Framework Cheat Sheet
- Wifite Cheat Sheet
- Windbg
- Windows Terminal
- Windows-Exploit-Suggester
- Windsurf Editor
- Winlogon
- Winpeas
- Winpmem
- Wire
- Wireshark Cheat Sheet
- Wiz MCP Commands
- Xplico Commands
- Xxd
- YARA Cheatsheet
- YUM/DNF Package Manager
- Yum
- Zabbix
- Zap-Api-Nodejs
- Zed Editor
- Zerologon-Bof
- Zipkin
- Zmap Cheat Sheet
- Zoomeye
- Zsteg
- Zuul
- btop - Modern Resource Monitor
- csh - C Shell
- curl - HTTP Client and Data Transfer
- dnSpy - .NET Debugger and Assembly Editor
- env0 Cheat Sheet
- ffuf Fast Web Fuzzer Cheat Sheet
- iTerm2 Terminal
- iptables Cheatsheet
- ksh - Korn Shell
- kubectl Cheatsheet
- n8n Workflow Automation Cheat Sheet
- osquery - SQL-Based Operating System Instrumentation
- pfSense Cheatsheet
- ping - Network Connectivity Testing
- sh - POSIX Shell
- tmux Cheatsheet
- x86 Assembly Language (32-bit)
- x86-64 Assembly Language (64-bit)
- xterm - X Window System Terminal Emulator
internal-developer-platform¶
internal-tools¶
internet¶
internet protocols¶
intrusion-detection¶
investigation¶
ios¶
iot security¶
iot-security¶
iperf¶
iperf3¶
irc¶
issue-tracking¶
it-professionals¶
java-analysis¶
java-development¶
javascript¶
javascript-analysis¶
jetbrains¶
jitter-measurement¶
jsparser¶
k8s¶
kanban¶
key-croc¶
keylogging¶
keystroke-injection¶
kicad¶
kics¶
kiterunner¶
kubernetes¶
- ArgoCD Cheat Sheet
- Calico
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
- Falco Cheatsheet
- FluxCD Cheat Sheet
- Gatekeeper Cheat Sheet
- Helm
- KEDA
- KICS (Keeping Infrastructure as Code Secure) Cheat Sheet
- Kube-bench Cheatsheet
- Kube-hunter Cheatsheet
- Kubernetes Security Hardening: Bulletproof Container Orchestration Security
- Kustomize
- Open Policy Agent (OPA) Cheatsheet
- Steampipe Cheat Sheet
- Terrascan Cheat Sheet
- Trivy Cheatsheet
- kubectl Cheatsheet
lab401¶
lan-turtle¶
langchain¶
large-language-models¶
latency-analysis¶
latency-testing¶
learning¶
legal¶
library¶
library-calls¶
lighthouse¶
linux¶
- Advanced Penetration Testing Methodologies: Master Professional Red Team Operations
- Aircrack-ng Cheat Sheet
- Bash - Bourne Again Shell
- Binwalk - Firmware Analysis Tool
- Crontab
- Dd
- DevSecOps Excellence: Integrate Security into Every Stage of Software Development
- Dirb
- Enterprise Cloud Security Mastery: Build Bulletproof Multi-Cloud Security Architectures
- Essential Linux Commands for IT Professionals: Master the Foundation of Modern Infrastructure
- Fish - Friendly Interactive Shell
- GDB - GNU Debugger
- Ltrace
- Masscan - High-Speed Port Scanner
- Network Security Architecture: Design Bulletproof Enterprise Network Defenses
- Nginx
- Screen Cheatsheet
- Strace
- Systemctl
- Zsh - Z Shell
- iptables Cheatsheet
- tmux Cheatsheet
linux-security¶
llm¶
llm-agent¶
load balancing¶
logging¶
logic-analyzer¶
low-code¶
mac-address-tracking¶
machine-learning¶
macos¶
malware¶
malware-analysis¶
man-in-the-middle¶
mattermost¶
mcp¶
mdr¶
memory-analysis¶
messaging¶
- Discord Cheatsheet
- Slack Cheatsheet
- Snapchat Cheatsheet
- Telegram Cheatsheet
- WhatsApp Business Cheatsheet
meta-programming¶
metadata-analysis¶
metrics¶
microblogging¶
microservices¶
microsoft-teams¶
mitmproxy¶
mlops¶
mobile device management¶
mobile security¶
- A Comprehensive Guide to Mobile App Security Assessment
- A Comprehensive Guide to Mobile Incident Response
- A Deep Dive into Mobile Device Encryption
mobile-development¶
mobile-security¶
monday.com¶
monitoring¶
- DNS Performance Optimization: Master Speed & Efficiency Excellence
- DNS Troubleshooting & Monitoring: Master Network Reliability Excellence
- Distributed Tracing Implementation: A Comprehensive Guide for SRE Professionals
- Elk
- Falco Cheatsheet
- Grafana
- MLOps Pipeline Implementation: A Comprehensive Guide for Data Engineers
- New Relic
- Performance Optimization Commands: Master Professional Command-Line Excellence
- Prometheus
- Splunk Cheatsheet
mtr¶
multi-cloud¶
multi-cloud-security¶
multimedia¶
my-traceroute¶
natural-language-processing¶
ndr¶
nessus¶
network¶
- Advanced Penetration Testing Methodologies: Master Professional Red Team Operations
- Advanced Threat Hunting Techniques: Master Proactive Cybersecurity Defense in 2025
- DevSecOps Excellence: Integrate Security into Every Stage of Software Development
- Digital Forensics and Incident Response: Master Professional DFIR Operations
- Enterprise Cloud Security Mastery: Build Bulletproof Multi-Cloud Security Architectures
- Network Performance Optimization: A Comprehensive Guide
- Network Security Architecture: Design Bulletproof Enterprise Network Defenses
- SOC 2 Compliance for IT Teams: Master Security Framework Implementation
- Zero Trust Network Implementation: A Comprehensive Guide to Modern Security Architecture
network administration¶
network diagnostics¶
network infrastructure¶
- Advanced Load Balancing Strategies for Modern Infrastructure
- DNS Best Practices & Standards: Master Enterprise Infrastructure Excellence
- DNS Fundamentals & Architecture: Master Internet Infrastructure Excellence
- DNS Performance Optimization: Master Speed & Efficiency Excellence
network security¶
- DNS Security & DNSSEC: Advanced Protection for Internet Infrastructure
- Edge Security Architecture: Comprehensive Guide to Securing Distributed Computing Infrastructure
network-analysis¶
network-benchmarking¶
network-design¶
network-diagnostics¶
network-forensics¶
network-learning¶
network-monitoring¶
network-performance¶
network-security¶
- Acunetix
- Arpwatch Cheatsheet
- Bjorn Cheatsheet
- Boofuzz Cheat Sheet
- Hak5 LAN Turtle Cheatsheet
- Hak5 Packet Squirrel Cheatsheet
- Hak5 Shark Jack Cheatsheet
- Hping3
- Hybrid Cloud Networking Excellence: Mastering Modern Infrastructure Integration
- Linux Network Commands Cheat Sheet
- Masscan - High-Speed Port Scanner
- Nessus Cheatsheet
- NetExec
- Netcat
- Netdiscover
- NetworkMiner Network Forensic Analysis Tool Cheat Sheet
- Nmap Commands
- OpenVAS Cheatsheet
- SSHamble Cheatsheet
- Tcpdump
- Vectra AI Commands
- WiFi Pineapple Cheatsheet
- Wireshark Cheat Sheet
- Zeek Cheatsheet
- ping - Network Connectivity Testing
- tshark Cheatsheet
network-simulation¶
network-surveillance¶
network-testing¶
network-tracing¶
network-training¶
network-troubleshooting¶
networking¶
- A Practical Guide to Implementing a Software-Defined Perimeter (SDP)
- Acunetix
- Apache
- Envoy Proxy
- GNS3 Cheatsheet
- Hping3
- Hybrid Cloud Networking Excellence: Mastering Modern Infrastructure Integration
- Linux Network Commands Cheat Sheet
- NetExec
- Netcat
- Netdiscover
- NetworkMiner Network Forensic Analysis Tool Cheat Sheet
- Nginx
- Packet Tracer Cheatsheet
- Tcpdump
- iptables Cheatsheet
- ping - Network Connectivity Testing
- ssh - Secure Shell Remote Access
- tshark Cheatsheet
newsletter¶
nfc¶
nist¶
no-code¶
non-human-identities¶
nsa-tools¶
ntt-data¶
observability¶
office-365¶
omg-cable¶
online-meetings¶
opa¶
open-source¶
- Akheron Proxy Cheatsheet
- Buttercup CRS Cheatsheet
- Hayabusa & Suzaku Cheatsheet
- Mattermost Cheatsheet
- PrusaSlicer Cheatsheet
- SigmaOptimizer Cheatsheet
openai¶
opengraph¶
openvas¶
operating systems¶
operating-systems¶
optimization¶
orchestration¶
osint¶
- Commercial Intelligence Blend Tools Cheatsheet
- Maltego Cheat Sheet
- Recon-ng Web Reconnaissance Framework Cheat Sheet
- Shodan
- Subfinder Subdomain Enumeration Cheat Sheet
- Sublist3R
- theHarvester Email and Subdomain Enumeration Tool Cheat Sheet
osint-automation¶
osint-investigation¶
overview¶
owasp¶
pacbot¶
package-management¶
package-managers¶
packet-analysis¶
packet-capture¶
packet-loss¶
packet-squirrel¶
packet-tracer¶
pandwarf¶
password-cracking¶
path-discovery¶
pattern-matching¶
pcap¶
pcb¶
pcb-design¶
penetration-testing¶
- Aircrack-ng Cheat Sheet
- Arp-Scan
- Azure Security Assessment Tool Cheat Sheet
- Burp Suite Cheat Sheet
- CrackMapExec Cheat Sheet
- Dalfox Cheat Sheet
- Dirsearch
- Enum4Linux
- Ethical Hacking Methodologies
- Ethical Hacking Methodologies: Master Professional Penetration Testing in 2025
- ExploitDB Cheat Sheet
- Fast-Google-Dorks-Scan
- Gocrack
- Golden-Guide-For-Pentesting
- HTTPX Toolkit Cheat Sheet
- Hak5 Key Croc Cheatsheet
- Hak5 LAN Turtle Cheatsheet
- Hak5 Packet Squirrel Cheatsheet
- Hak5 Shark Jack Cheatsheet
- Hydra Cheat Sheet
- JSParser Cheat Sheet
- Java-Deserialization-Scanner
- Kiterunner Cheat Sheet
- Kube-hunter Cheatsheet
- Lighttpd
- Linenum
- Linux-Exploit-Suggester
- Metasploit Cheat Sheet
- Metasploit Framework Cheat Sheet
- Nbtscan
- Ncrack
- Nessus Cheatsheet
- Nmap Commands
- NoSQLMap Cheat Sheet
- O.MG Cable Cheatsheet
- OSSEC Host-based Intrusion Detection System Cheat Sheet
- OWASP API Security Top 10 Commands
- OWASP Dependency-Check Cheat Sheet
- OpenCanary Cheatsheet
- OpenVAS Cheatsheet
- OpenVPN Cheatsheet
- Openshift
- Opentelemetry
- Opentracing
- PTF (Pentesters Framework) Commands
- PandwaRF Cheatsheet
- Pegasus-Pentest-Arsenal Cheat Sheet
- Prowler Cheat Sheet
- Proxmark 3 RDV4 Cheatsheet
- Python-Pentest-Tools
- RustScan Cheat Sheet
- SQLmap Cheat Sheet
- ScoutSuite Cheat Sheet
- SecurityOnion Cheatsheet
- Smtp-User-Enum
- Stegcracker
- Subzy Cheat Sheet
- USBNinja Cheatsheet
- Unicornscan
- Waybackurls
- WebGoat Cheat Sheet
- WebStorm
- Webscreenshot
- WhatWeb Cheat Sheet
- Windows-Exploit-Suggester
- XSStrike Cheat Sheet
- curl - HTTP Client and Data Transfer
- gf (Gf patterns) Cheat Sheet
- iCopy-X Cheatsheet
- mitmproxy Cheatsheet
pentest-reporting¶
pentesting¶
- Bjorn Cheatsheet
- ESP32 Marauder Cheatsheet
- Flipper Zero Cheatsheet
- Flipper Zero Firmware Cheatsheet
- HackRF One Cheatsheet
- Momentum Firmware Cheatsheet
- PTHelper Cheat Sheet
performance¶
- Advanced Load Balancing Strategies for Modern Infrastructure
- Network Performance Optimization: A Comprehensive Guide
performance optimization¶
- DNS Performance Optimization: Master Speed & Efficiency Excellence
- Performance Optimization Commands: Master Professional Command-Line Excellence
performance-testing¶
perplexity¶
photo-sharing¶
ping¶
pingplotter¶
pipeline¶
pipeline-security¶
platform-engineering¶
plugins¶
policy¶
policy-as-code¶
- KICS (Keeping Infrastructure as Code Secure) Cheat Sheet
- Open Policy Agent (OPA) Cheatsheet
- PacBot Cheat Sheet
- Terrascan Cheat Sheet
policy-enforcement¶
port-scanning¶
portapack¶
powershell¶
presentation¶
presentation-design¶
privacy¶
- A Deep Dive into iOS Security & Privacy Settings
- Privacy Policy
- ProtonMail Cheatsheet
- Telegram Cheatsheet
productivity¶
- Asana Cheatsheet
- ClickUp Cheat Sheet
- Command Line Mastery for Professionals: Transform Your Workflow with Essential CLI Tools
- DevDocs Cheat Sheet
- Essential Linux Commands for IT Professionals: Master the Foundation of Modern Infrastructure
- Gamma Commands
- Microsoft Teams Cheatsheet
- Monday.com Cheatsheet
- Presentify Commands
- Screen Cheatsheet
- Slack Cheatsheet
- Supermaven Commands
- Tabnine Commands
- Trello Cheatsheet
- Windows 11 Advanced File Management: Master Professional Organization Excellence
- tmux Cheatsheet
professional development¶
professional reference¶
- Performance Optimization Commands: Master Professional Command-Line Excellence
- SRE Incident Management: Master Professional Site Reliability Engineering Excellence
professional-development¶
programming¶
- Augment Code Cheat Sheet
- Claude Code AI Assistant Cheat Sheet
- Claude Code Router
- Claude Code UI
- Claude Code Undo
- Claude Code Usage
- Codeql
- Continue.dev Cheat Sheet
- Go-For-Javascript-Developers
- Lovable.dev Cheat Sheet
- OpenAI Codex Code Generation Cheat Sheet
- Veracode
programming-language¶
programming-languages¶
project-management¶
prompting¶
protocol¶
protocol-testing¶
protonmail¶
prototyping¶
prowler¶
proxmark3¶
proxy¶
prusa-slicer¶
publishing¶
python¶
qemu¶
radio-frequency¶
radio-hacking¶
rapid7¶
raspberry-pi¶
react¶
reconnaissance¶
- JSParser Cheat Sheet
- Kiterunner Cheat Sheet
- Recon-ng Web Reconnaissance Framework Cheat Sheet
- Shodan
- SpiderFoot Cheat Sheet
- Wappalyzer Cheat Sheet
- WhatWeb Cheat Sheet
- theHarvester Email and Subdomain Enumeration Tool Cheat Sheet
red-team¶
red-teaming¶
- Hak5 Shark Jack Cheatsheet
- O.MG Cable Cheatsheet
- SSHamble Cheatsheet
- USBNinja Cheatsheet
- WiFi Pineapple Cheatsheet
reference¶
- Cheat Sheets
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- DevDocs Cheat Sheet
- Home
references¶
rego¶
relationship-analysis¶
remediation-tracking¶
remote-access¶
research¶
resources¶
reverse-engineering¶
- Apktool
- Binary Ninja Cheat Sheet
- Binwalk - Firmware Analysis Tool
- GDB - GNU Debugger
- Ghidra - NSA Reverse Engineering Framework
- Ghidra Plugins Cheat Sheet
- Ida
- JEB Decompiler Cheat Sheet
- Lighthouse Plugin Cheat Sheet
- Ollydbg
- REVEN Cheat Sheet
- Radare2 - Reverse Engineering Framework
- Unicorn Engine Cheat Sheet
- WebAssembly (WASM) Tools Cheat Sheet
- angr Cheat Sheet
- x64dbg - Windows Debugger
rf-analysis¶
rfid¶
risk-management¶
route-analysis¶
rtl-sdr¶
runtime-analysis¶
runtime-protection¶
runtime-security¶
sbom¶
scalability¶
scheduling¶
scoutsuite¶
screen-annotation¶
scripting¶
- Bash - Bourne Again Shell
- Binary Ninja Cheat Sheet
- Fish - Friendly Interactive Shell
- PowerShell Cheatsheet
- Zsh - Z Shell
sdp¶
sdr¶
search¶
secrets management¶
secrets-management¶
- Advanced Pipeline Security Integration: Mastering DevSecOps in CI/CD Environments
- Secrets Insights Cheatsheet
security¶
- A Deep Dive into iOS Security & Privacy Settings
- A Practical Guide to Implementing a Software-Defined Perimeter (SDP)
- Arp-Scan
- Azure Security Assessment Tool Cheat Sheet
- CrackMapExec Cheat Sheet
- DNS Best Practices & Standards: Master Enterprise Infrastructure Excellence
- Enum4Linux
- ExploitDB Cheat Sheet
- Falco Cheatsheet
- Fast-Google-Dorks-Scan
- Gatekeeper Cheat Sheet
- Gitleaks
- Gocrack
- Golden-Guide-For-Pentesting
- Java-Deserialization-Scanner
- Kube-bench Cheatsheet
- Kube-hunter Cheatsheet
- Linenum
- Linux-Exploit-Suggester
- Nbtscan
- Ncrack
- OSSEC Host-based Intrusion Detection System Cheat Sheet
- OWASP API Security Top 10 Commands
- OWASP Dependency-Check Cheat Sheet
- Okta
- Open Policy Agent (OPA) Cheatsheet
- OpenCanary Cheatsheet
- OpenVPN Cheatsheet
- Openshift
- Opentelemetry
- Opentracing
- PTF (Pentesters Framework) Commands
- PandwaRF Cheatsheet
- Pegasus-Pentest-Arsenal Cheat Sheet
- ProtonMail Cheatsheet
- Python-Pentest-Tools
- RustScan Cheat Sheet
- Secure Data Pipeline Architecture: A Comprehensive Guide
- SecurityOnion Cheatsheet
- Serverless Security Best Practices
- Serverless Security Best Practices: Comprehensive Guide for Cloud Technologies
- Smtp-User-Enum
- Stegcracker
- Trivy Cheatsheet
- TruffleHog
- Unicornscan
- Windows-Exploit-Suggester
security architecture¶
security assessment¶
security automation¶
security-analytics¶
security-architecture¶
security-assessment¶
security-auditing¶
security-frameworks¶
security-monitoring¶
security-operations¶
- Cybersecurity Workflow Automation: Transform Your Security Operations with Advanced Automation Frameworks
- PlexTrac Cheat Sheet
- SigmaOptimizer Cheatsheet
security-professionals¶
security-research¶
security-scanning¶
- Checkov Cheat Sheet
- CloudSploit Cheat Sheet
- KICS (Keeping Infrastructure as Code Secure) Cheat Sheet
- SonarCloud Cheat Sheet
- Steampipe Cheat Sheet
- TFSec Cheat Sheet
- Terrascan Cheat Sheet
security-testing¶
- Boofuzz Cheat Sheet
- Ethical Hacking Methodologies: Master Professional Penetration Testing in 2025
- Fiddler Cheatsheet
- PTHelper Cheat Sheet
- Proxmark 3 RDV4 Cheatsheet
- mitmproxy Cheatsheet
security-tools¶
self-hosted¶
self-referential¶
serverless¶
serverless computing¶
service¶
service-catalog¶
service-management¶
shark-jack¶
shell¶
siem¶
sigma-optimizer¶
sigma-rules¶
simulation¶
site reliability engineering¶
slack¶
slicer¶
smart-contracts¶
snapchat¶
soc¶
soc2¶
social-engineering¶
social-mapping¶
social-media¶
- Bluesky Cheatsheet
- Instagram Cheatsheet
- Snapchat Cheatsheet
- Telegram Cheatsheet
- TikTok Cheatsheet
- X (Twitter) Cheatsheet
software¶
software-defined-radio¶
specterops¶
sql-injection¶
sql-queries¶
sre practices¶
ssh¶
ssh-exploitation¶
standards¶
static-analysis¶
steampipe¶
sub-ghz¶
subdomain-enumeration¶
subdomain-takeover¶
substack¶
subzy¶
supply-chain-security¶
- AI SBOM Generator Cheatsheet
- Advanced Pipeline Security Integration: Mastering DevSecOps in CI/CD Environments
surveillance¶
suzaku¶
symbolic-execution¶
sysadmin¶
system administration¶
- DNS Fundamentals & Architecture: Master Internet Infrastructure Excellence
- DNS Management & Administration: Enterprise-Grade Infrastructure Excellence
- DNS Troubleshooting & Monitoring: Master Network Reliability Excellence
- Performance Optimization Commands: Master Professional Command-Line Excellence
- Windows 11 Advanced File Management: Master Professional Organization Excellence
system reliability¶
system-administration¶
system-calls¶
system-tools¶
task-management¶
team building¶
technical leadership¶
technology-detection¶
telegram¶
telerik¶
tenable¶
terminal¶
- Essential Linux Commands for IT Professionals: Master the Foundation of Modern Infrastructure
- Screen Cheatsheet
- tmux Cheatsheet
terraform¶
- KICS (Keeping Infrastructure as Code Secure) Cheat Sheet
- TFSec Cheat Sheet
- Terraform Enterprise Patterns: Mastering Infrastructure as Code at Scale
- Terrascan Cheat Sheet
- env0 Cheat Sheet
terrascan¶
testing¶
text-editor¶
text-to-speech¶
threat hunting¶
threat modeling¶
threat-detection¶
threat-hunting¶
threat-intelligence¶
- Commercial Intelligence Blend Tools Cheatsheet
- Guided Threat Hunts Cheatsheet
- SpiderFoot Cheat Sheet
throughput-testing¶
tiktok¶
time-travel-debugging¶
tools¶
- Cheat Sheets
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- Command Line Mastery for Professionals
- Home
- Tools
topology-design¶
traceroute¶
tracert¶
traffic-analysis¶
trail-of-bits¶
training¶
trello¶
troubleshooting¶
trust-services-criteria¶
tshark¶
tutorial¶
tutorials¶
twitter¶
typescript¶
ui-framework¶
usb-hacking¶
usb-security¶
usbninja¶
utility¶
- AADInternals Azure AD Exploitation Toolkit Cheat Sheet
- AArch64 Assembly Language (ARM64)
- ADConnectDump Azure AD Connect Credential Extraction Tool Cheat Sheet
- APT Package Manager
- ARM Assembly Language (32-bit)
- ASNmap ASN Mapping Tool Cheat Sheet
- Age
- Alacritty - GPU-Accelerated Terminal
- AlterX Subdomain Wordlist Generator Cheat Sheet
- Anchore
- AndroGuard Cheatsheet
- Ant Cheatsheet
- Apimonitor
- Apt-Get
- Aqua
- Aquatone
- Arachni Cheat Sheet
- Ares RAT Cheat Sheet
- Arjun
- Asreproast
- Assetfinder
- Atomic Red Team
- AutoGen Multi-Agent Framework Cheat Sheet
- Awesome-Go
- Awesome-Java
- Awesome-Javascript
- Awesome-Nodejs
- Awesome-Python
- Azucar Azure Security Auditing Tool Cheat Sheet
- Baby-naptime Cheat Sheet
- Backdoors & Breaches Commands
- Bandit Python Security Linter Cheat Sheet
- Bash Bunny Cheat Sheet
- Batch
- Bazaar
- Bazel Cheatsheet
- BeEF Browser Exploitation Framework Cheat Sheet
- Beacon
- Bettercap Cheat Sheet
- Bingoo
- Bitbucket
- Bitlocker
- Blackeye Phishing Tool Cheat Sheet
- BloodHound Cheat Sheet
- Brackets
- Brakeman Ruby on Rails Security Scanner Cheat Sheet
- Brute Ratel C4 Framework Cheat Sheet
- Brutespray
- Bugsy Commands
- Bully
- Bundler
- Burp
- Bwapp
- Bzr
- CLion
- CMake Cheatsheet
- Caine
- Censys
- Censys-Python
- Cewl
- Chai
- ChatGPT & GPT-4 - AI Prompting Guide
- Cheatsheet-God
- Checkmarx
- Chisel Cheat Sheet
- Chocolatey
- Cisco ASA Cheatsheet
- Clair
- Clang/LLVM - Modern Compiler Infrastructure
- Class-Dump
- Claude - AI Prompting Guide
- Claudia
- Cobalt Strike Cheat Sheet
- Composer
- Comsvcs
- Conda
- Consul
- Context7 MCP Server Cheat Sheet
- Cortex Commands
- Covenant C2 Framework Cheat Sheet
- Coverage
- Cowpatty
- CrewAI Multi-Agent Framework Cheat Sheet
- Cron
- Crowbar
- Crunch
- Cti-Python-Stix2
- Cupp
- Cursor
- Cutter Cheat Sheet
- CyberChef Cheatsheet
- DNS Management Cheat Sheet
- DNSx DNS Toolkit Cheat Sheet
- DVWA (Damn Vulnerable Web Application) Cheat Sheet
- Datadog
- Dc3Dd
- Dcfldd
- Decryptautologon
- DeepSeek AI Prompting Cheat Sheet
- DeimosC2 Framework Cheat Sheet
- Detours
- Dex2Jar
- Dia Browser Cheat Sheet
- Diagon
- Dig - DNS Lookup and Troubleshooting
- DigitalOcean CLI (doctl)
- Docker Bench Cheat Sheet
- Dostackbufferoverflowgood
- Dradis Cheat Sheet
- Draft
- Drone
- Drozer Cheat Sheet
- Duckduckgo
- Dumpit
- ELSA Commands
- Eaphammer
- Elastic SIEM Cheatsheet
- Element
- Emerge
- Empire Framework Cheat Sheet
- EvilGinx2 Phishing Framework Cheat Sheet
- Evilgophish
- Excel - Formulas, Functions & Productivity
- Exegol
- Exiftool
- Eyewitness
- Fakelogonscreen
- Faker
- Fastapi
- Feroxbuster
- Findomain
- Firebase - Google's Backend-as-a-Service Platform
- Flamingo
- Flare-Vm
- Flink
- Fluxion
- Foremost
- Ftkimager
- GCC - GNU Compiler Collection
- GNOME Terminal - Linux Desktop Terminal
- GRR Rapid Response Cheatsheet
- Garak
- Gau
- Gedit
- Gem
- Gemini CLI
- Ghostpack
- Ghostty - Terminal Emulator
- GitHub Copilot Cheat Sheet
- Go-Audit
- GoLand
- Goad
- Goatrider
- Goby
- Godoh
- Godpotato
- Goexec
- Gofetch
- Golang
- Goldencopy
- Goodfaith
- Goodhound
- Goodork
- Googd0Rker
- Google Gemini - AI Prompting Guide
- Google-Domain-Fronting
- Goohak
- Gopher
- Gopherus
- Gophish Social Engineering Framework Cheat Sheet
- Gosint
- Goversioninfo
- Gowitness
- Gruyere
- Guymager
- Harness
- Havoc C2 Framework Cheat Sheet
- Heroku CLI
- Hexway Hive Commands
- Hg
- Homebrew Package Manager
- Host - Simple DNS Lookup Tool
- Hyper
- IDA Pro - Interactive Disassembler Professional
- Icinga
- Immunity
- Impacket Toolkit Cheat Sheet
- Init
- Insomnia Commands
- Interactsh OOB Interaction Gathering Cheat Sheet
- Invoke-Obfuscation Cheat Sheet
- Istio
- Jaeger
- JavaScript - Modern Web Development
- Java_Idx_Parser
- Javascript-Malware-Collection
- Joe
- Judas Phishing Proxy Cheat Sheet
- Juice-Shop
- Jupyter Notebook
- Kafka
- Kali Linux Cheatsheet
- Karma
- Katana Web Crawler Cheat Sheet
- Kerberoast
- Keybase
- Kibana
- Kind
- King Phisher Social Engineering Toolkit Cheat Sheet
- Kingofbugbountytips
- Kismet Cheat Sheet
- Kiwi
- Knockpy
- Koadic C2 Framework Cheat Sheet
- Kong
- LangChain Framework Cheat Sheet
- LangGraph Framework Cheat Sheet
- Lazagne
- Ldd
- Ligolo
- Ligolo-Ng
- Linkerd
- Linpeas
- Linpmem
- Linux File Management Cheat Sheet
- Linux Process Management Cheat Sheet
- Linux Text Processing Cheat Sheet
- Linuxprivchecker
- Llama - Meta's Open Source AI Prompting Guide
- LlamaIndex Framework Cheat Sheet
- Lldb
- Logstash Cheatsheet
- Lsassy
- Luks
- Lynis Security Auditing Tool Cheat Sheet
- MIPS Assembly Language
- MISP Cheatsheet
- Mac Terminal (Terminal.app) - macOS Native Terminal
- Make Cheatsheet
- Maltego-Telegram
- Malwoverview Cheat Sheet
- Medusa
- Meg
- Megatron-Java
- Memcached
- Mercurial
- Merlin C2 Framework Cheat Sheet
- Metabigor
- Metagoofil
- Metasploitable Commands
- Meterpreter
- MicroBurst Azure Security Testing Toolkit Cheat Sheet
- Microsoft Sentinel Cheatsheet
- Mimikatz Cheat Sheet
- Mix
- MobSF (Mobile Security Framework) Cheat Sheet
- Model Context Protocol (MCP) Servers Cheat Sheet
- Modlishka Reverse Proxy Phishing Tool Cheat Sheet
- Msfconsole
- Msfvenom
- Mutillidae
- Mythic C2 Framework Cheat Sheet
- Naabu Port Scanner Cheat Sheet
- Nagios
- Nano Cheatsheet
- Nanodump
- Nats
- Nc
- Ncat
- Needle
- Neovim Cheatsheet
- Nexpose
- Ngrok
- Ninja
- Nix
- Nm
- Nodegoat
- Nomad
- Notify Notification System Cheat Sheet
- Notion Cheatsheet
- Nslookup - DNS Lookup and Troubleshooting
- Nuclei Vulnerability Scanner Cheat Sheet
- Nuget
- OWASP Amass Network Mapping Tool Cheat Sheet
- OWASP ZAP Cheat Sheet
- Objdump
- Obsidian Cheatsheet
- Oh My Posh - Cross-Platform Prompt Engine
- Oh My Zsh - Zsh Framework and Configuration Manager
- Ollama
- Onesixtyone
- Outguess
- Outline VPN Cheatsheet
- Owasp-Threat-Dragon-Desktop
- P4
- PTF (Pentesters Framework) Cheat Sheet
- Packer
- Pacman Package Manager
- Pacu
- Pagodo
- Paramspider
- Patator
- Perplexity AI - Search-Powered Prompting Guide
- Pgp
- PhpStorm
- Plink
- Polaris
- Poortego
- Posh-Virustotal
- PoshC2 Framework Cheat Sheet
- Poshc2_Python
- Postman API Testing
- PowerSploit Cheat Sheet
- PowerView Active Directory Enumeration Tool Cheat Sheet
- PowerZure Azure Security Assessment Tool Cheat Sheet
- Powerlevel10k - High-Performance Zsh Theme
- Powershell-Empire
- Powerup
- Privesc
- Procdump
- Procmon
- Productivity Tools Cheatsheet
- Proxychains Cheat Sheet
- PuTTY - SSH and Telnet Client for Windows
- Pub
- Puppeteer
- Pupy C2 Framework Cheat Sheet
- Pure - Minimal Zsh Prompt
- Pwnagotchi
- PyCharm
- Pydantic AI Framework Cheat Sheet
- Pypykatz
- Pyrit
- Pythagora Cheat Sheet
- Python-Dshield
- Python-Evt
- Python-Icap-Yara
- Python-Iocextract
- Python-Ntfs
- Python-Pty-Shells
- Python-Uncompyle6
- Python3-Venv
- Pythonidae
- QARK Cheatsheet
- Qualys
- Qwen AI Prompting Cheat Sheet
- R2
- RISC-V Assembly Language
- RITA Real Intelligence Threat Analytics Cheat Sheet
- ROADtools Azure AD Assessment Framework Cheat Sheet
- Railsgoat
- Rancher
- Reaver Cheat Sheet
- Regular Expressions (RegEx) - Pattern Matching
- Rekall
- Remnux
- Responder Cheat Sheet
- Rider
- Rizin Cheat Sheet
- Rogue Cheat Sheet
- Rpcclient
- Rsyslog
- Rubeus Kerberos Interaction Tool Cheat Sheet
- RubyMine
- Rust
- SBT Cheatsheet
- SIFT Workstation Cheatsheet
- Safety
- Scalpel
- Scapy
- Scoop
- Scylla
- SearchSploit Cheat Sheet
- Seatbelt
- Selenium
- Semgrep Static Analysis Tool Cheat Sheet
- Serverless-Goat
- Sessiongopher
- Sguil Cheat Sheet
- SharpHound Cheat Sheet
- SharpUp Cheat Sheet
- Shellter Cheat Sheet
- Sherlock Social Media Username Hunter Cheat Sheet
- Shosubgo
- Showmount
- Sigma Cheatsheet
- Signal
- Silver
- Skipfish Commands
- Sliver C2 Framework Cheat Sheet
- Smbclient
- Snap
- Snmp-Check
- Snmpwalk
- Snorby Cheat Sheet
- Snort Cheatsheet
- Snyk
- Socat
- Social Engineer Toolkit (SET) Cheatsheet
- Social Engineering Toolkit (SET) Cheat Sheet
- SocialFish Phishing Tool Cheat Sheet
- Solr
- SonarQube Code Quality and Security Platform Cheat Sheet
- Sops
- Sourceforge
- Spark
- SpoofCard Caller ID Spoofing Cheat Sheet
- Spring-Boot
- Squert Cheat Sheet
- Sshuttle
- Stack
- Starship - Cross-Shell Prompt Customizer
- Steghide
- Stego-Toolkit
- Stegsolve
- Stenographer - Full Packet Capture System
- Storm
- Stormspotter Cheat Sheet
- Strelka Cheatsheet
- Sublime Text
- Sumo Logic Cheatsheet
- Supabase - Open Source Firebase Alternative
- SuperClaude
- Suricata Network IDS/IPS Cheat Sheet
- Svn
- Sysdig
- Syslog-Ng
- Systemd
- Tailscale Cheatsheet
- Taskmaster-AI Automation Framework Cheat Sheet
- Terragoat
- Thc-Hydra
- The-Little-Go-Book
- TheHive Cheat Sheet
- ThreatHunting Keywords Commands
- Throwback C2 Framework Cheat Sheet
- Traefik
- TrevorC2 Framework Cheat Sheet
- Truecrypt
- Trust
- Trusted
- Twint Twitter OSINT Tool Cheat Sheet
- USB Rubber Ducky Keystroke Injection Tool Cheat Sheet
- Uncover Search Engine Tool Cheat Sheet
- Untitledgoosetool
- VSagent Cheat Sheet
- Vagrant
- Vault
- Veil Cheat Sheet
- Velociraptor Cheatsheet
- Veracrypt
- Villain C2 Framework Cheat Sheet
- Visual Studio
- W3af Web Application Attack Framework Cheat Sheet
- Wapiti Cheat Sheet
- Warp - AI-Powered Terminal
- Watson
- Waypoint
- Wazuh Cheatsheet
- Weirdaal
- Wfuzz Cheat Sheet
- White Rabbit Neo AI Prompting Cheat Sheet
- WifiForge Cheat Sheet
- Wifiphisher Wireless Phishing Framework Cheat Sheet
- Wifite Cheat Sheet
- Windbg
- Windows Terminal
- Windsurf Editor
- Winlogon
- Winpeas
- Winpmem
- Wire
- Xplico Commands
- Xxd
- YARA Cheatsheet
- YUM/DNF Package Manager
- Yum
- Zabbix
- Zap-Api-Nodejs
- Zed Editor
- Zerologon-Bof
- Zipkin
- Zmap Cheat Sheet
- Zoomeye
- Zsteg
- Zuul
- btop - Modern Resource Monitor
- csh - C Shell
- dnSpy - .NET Debugger and Assembly Editor
- ffuf Fast Web Fuzzer Cheat Sheet
- iTerm2 Terminal
- ksh - Korn Shell
- n8n Workflow Automation Cheat Sheet
- osquery - SQL-Based Operating System Instrumentation
- pfSense Cheatsheet
- sh - POSIX Shell
- x86 Assembly Language (32-bit)
- x86-64 Assembly Language (64-bit)
- xterm - X Window System Terminal Emulator
version-control¶
vibe-coding¶
video¶
video-conferencing¶
video-editing¶
video-generation¶
video-recording¶
video-sharing¶
virtualbox¶
virtualization¶
visualization¶
vmware¶
voice-synthesis¶
voip¶
vscode¶
vulnerability-assessment¶
- AutoPentest Cheat Sheet
- CloudSploit Cheat Sheet
- Ethical Hacking Methodologies: Master Professional Penetration Testing in 2025
- PTHelper Cheat Sheet
- Prowler Cheat Sheet
- ScoutSuite Cheat Sheet
vulnerability-discovery¶
vulnerability-hunting¶
vulnerability-management¶
- Advanced Pipeline Security Integration: Mastering DevSecOps in CI/CD Environments
- AutoFix AI Agent Cheatsheet
- Legit Security Commands
- OpenVAS Cheatsheet
- PlexTrac Cheat Sheet
vulnerability-research¶
vulnerability-scanner¶
- Dalfox Cheat Sheet
- Intruder Cheat Sheet
- Nessus Cheatsheet
- OpenVAS Cheatsheet
- Subzy Cheat Sheet
- XSStrike Cheat Sheet
vulnerability-scanning¶
- Burp Suite Cheat Sheet
- Kube-hunter Cheatsheet
- Nikto Cheat Sheet
- Nmap Commands
- SSHamble Cheatsheet
- Trivy Cheatsheet
vulnerability-testing¶
waf-bypass¶
wappalyzer¶
wasm¶
web-application¶
web-application-security¶
web-debugging¶
web-development¶
- Angular
- Base44 Commands
- Building Apps and Games with Claude Code: Master Prompting for Every Platform
- Divjoy Commands
- Django
- Express
- Fiddler Cheatsheet
- React
- TypeScript Cheatsheet
- Vercel CLI Commands
- Vue
web-fingerprinting¶
web-interface¶
web-scraping¶
web-security¶
- Burp Suite Cheat Sheet
- Dalfox Cheat Sheet
- Dirb
- Dirbuster
- Dirsearch
- Gobuster Directory/File Brute Forcer Cheat Sheet
- HTTPX Toolkit Cheat Sheet
- JSParser Cheat Sheet
- Kiterunner Cheat Sheet
- Lighttpd
- Nikto Cheat Sheet
- NoSQLMap Cheat Sheet
- SQLmap Cheat Sheet
- Subzy Cheat Sheet
- Wappalyzer Cheat Sheet
- Waybackurls
- WebAssembly (WASM) Tools Cheat Sheet
- WebGoat Cheat Sheet
- WebStorm
- Webscreenshot
- WhatWeb Cheat Sheet
- XSStrike Cheat Sheet
- curl - HTTP Client and Data Transfer
- gf (Gf patterns) Cheat Sheet
web-server¶
web-service¶
web-technology¶
webassembly¶
whatsapp-business¶
whatweb¶
whiteboard¶
wifi-hacking¶
windows¶
windows 11¶
windows-only¶
windows-security¶
windsurf¶
wireless-security¶
wireshark¶
workflow¶
workflow-automation¶
- Claude Flow Cheatsheet
- Cybersecurity Workflow Automation: Transform Your Security Operations with Advanced Automation Frameworks