Created
September 29, 2020 14:28
-
-
Save babywyrm/0100e8eb8c14bfc46edf7e927d1af483 to your computer and use it in GitHub Desktop.
big_huge_cheatsheet_arch_of_the_coveneant__
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
########################################################### | |
## https://www.reddit.com/r/cybersecurity/comments/iu17uu/cybersec_cheat_sheets_in_all_flavors_huge_list/ | |
########################################################### | |
Posted byu/HeyGuyGuyGuy | |
12 days ago | |
Cybersec Cheat Sheets in all Flavors! (Huge List Inside) | |
"UGH! Whats the command to [insert function here]?" | |
########################################################### | |
########################################################### | |
Shortcuts, hot-keys, and power use is leveraged through knowing application commands. Sad thing is, if you aren't in the application all the time, it's easy to remember that it can be done, but tough to recall the keystrokes to accomplish it. FEAR NOT INFOSEC COMPATRIOTS! I got you. | |
Here is a curated list of cheat sheets for many many popular tech in our cybersecurity space. I've been compiling them for a bit, but this seems like the group that would most benefit. Cheers! | |
I didnt create any of these cheatsheets, so much love and appreciation to the authors themselves. We all win. | |
Gerry's Cheatsheets Compilation | |
Privilege-Escalation: This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples. https://github.com/Ignitetechnologies/Privilege-Escalation | |
Malware analysis tools and resources. https://github.com/rshipp/awesome-malware-analysis | |
Analyzing Malicious Documents Cheat Sheet https://zeltser.com/analyzing-malicious-documents/ | |
ReverseEngineering Cheat Sheet https://www.cybrary.it/wp-content/uploads/2017/11/cheat-sheet-reverse-v6.png | |
SQL Injection | Various DBs http://pentestmonkey.net/category/cheat-sheet/sql-injection | |
Nmap Cheat Sheet and Pro Tips https://hackertarget.com/nmap-cheatsheet-a-quick-reference-guide/ | |
PENTESTING LocalFileInclude Cheat Sheet https://highon.coffee/blog/lfi-cheat-sheet/ | |
Penetration Testing Tools Cheat Sheet https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/ | |
Reverse Shell Cheat Sheet https://highon.coffee/blog/reverse-shell-cheat-sheet/ | |
nbtscan Cheat Sheet https://highon.coffee/blog/nbtscan-cheat-sheet/ | |
Linux Commands Cheat Sheet https://highon.coffee/blog/linux-commands-cheat-sheet/ | |
Kali Linux Cheat Sheet https://i.redd.it/9bu827i9tr751.jpg | |
Hacking Tools Cheat Sheet (Diff tools) https://i.redd.it/fviaw8s43q851.jpg | |
Google Search Operators: The Complete List (42 Advanced Operators) https://ahrefs.com/blog/google-advanced-search-operators/ | |
(Multiple) (Good) Cheat Sheets - Imgur https://imgur.com/gallery/U5jqgik | |
Active-Directory-Exploitation-Cheat-Sheet: A cheat sheet that contains common enumeration and attack methods for Windows Active Directory. https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet | |
Shodan Query Filters https://github.com/JavierOlmedo/shodan-filters | |
Getting Real with XSS - A reference on the new technquies to XSS https://labs.f-secure.com/blog/getting-real-with-xss/ | |
SANS Massive List of Cheat Sheets Curated from here: https://www.sans.org/blog/the-ultimate-list-of-sans-cheat-sheets/ | |
General IT Security | |
Windows and Linux Terminals & Command Lines https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/bltea7de5267932e94b/5eb08aafcf88d36e47cf0644/Cheatsheet_SEC301-401_R7.pdf | |
TCP/IP and tcpdump https://www.sans.org/security-resources/tcpip.pdf?msc=Cheat+Sheet+Blog | |
IPv6 Pocket Guide https://www.sans.org/security-resources/ipv6_tcpip_pocketguide.pdf?msc=Cheat+Sheet+Blog | |
Powershell Cheat Sheet https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/bltf146e4f361db3938/5e34a7bc946d717e2eab6139/power-shell-cheat-sheet-v41.pdf | |
Writing Tips for IT Professionals https://zeltser.com/writing-tips-for-it-professionals/ | |
Tips for Creating and Managing New IT Products https://zeltser.com/new-product-management-tips/ | |
Tips for Getting the Right IT Job https://zeltser.com/getting-the-right-it-job-tips/ | |
Tips for Creating a Strong Cybersecurity Assessment Report https://zeltser.com/security-assessment-report-cheat-sheet/ | |
Critical Log Review Checklist for Security Incidents https://zeltser.com/security-incident-log-review-checklist/ | |
Security Architecture Cheat Sheet for Internet Applications https://zeltser.com/security-architecture-cheat-sheet/ | |
Tips for Troubleshooting Human Communications https://zeltser.com/human-communications-cheat-sheet/ | |
Security Incident Survey Cheat Sheet for Server Administrators https://zeltser.com/security-incident-survey-cheat-sheet/ | |
Network DDoS Incident Response Cheat Sheet https://zeltser.com/ddos-incident-cheat-sheet/ | |
Information Security Assessment RFP Cheat Sheet https://zeltser.com/cheat-sheets/ | |
Digital Forensics and Incident Response | |
SIFT Workstation Cheat Sheet https://digital-forensics.sans.org/media/sift_cheat_sheet.pdf?msc=Cheat+Sheet+Blog | |
Plaso Filtering Cheat Sheet https://digital-forensics.sans.org/media/Plaso-Cheat-Sheet.pdf?msc=Cheat+Sheet+Blog | |
Tips for Reverse-Engineering Malicious Code https://digital-forensics.sans.org/media/reverse-engineering-malicious-code-tips.pdf?msc=Cheat+Sheet+Blog | |
REMnux Usage Tips for Malware Analysis on Linux https://digital-forensics.sans.org/media/remnux-malware-analysis-tips.pdf?msc=Cheat+Sheet+Blog | |
Analyzing Malicious Documents https://digital-forensics.sans.org/media/analyzing-malicious-document-files.pdf?msc=Cheat+Sheet+Blog | |
Malware Analysis and Reverse-Engineering Cheat Sheet https://digital-forensics.sans.org/media/malware-analysis-cheat-sheet.pdf?msc=Cheat+Sheet+Blog | |
SQlite Pocket Reference Guide https://digital-forensics.sans.org/media/SQlite-PocketReference-final.pdf?msc=Cheat+Sheet+Blog | |
Eric Zimmerman's tools Cheat Sheet https://digital-forensics.sans.org/media/EricZimmermanCommandLineToolsCheatSheet-v1.0.pdf?msc=Cheat+Sheet+Blog | |
Rekall Memory Forensics Cheat Sheet https://digital-forensics.sans.org/media/rekall-memory-forensics-cheatsheet.pdf?msc=Cheat+Sheet+Blog | |
Linux Shell Survival Guide https://digital-forensics.sans.org/media/linux-shell-survival-guide.pdf?msc=Cheat+Sheet+Blog | |
Windows to Unix Cheat Sheet https://digital-forensics.sans.org/media/windows_to_unix_cheatsheet.pdf?msc=Cheat+Sheet+Blog | |
Memory Forensics Cheat Sheet https://digital-forensics.sans.org/media/volatility-memory-forensics-cheat-sheet.pdf?msc=Cheat+Sheet+Blog | |
Hex and Regex Forensics Cheat Sheet https://digital-forensics.sans.org/media/hex_file_and_regex_cheat_sheet.pdf?msc=Cheat+Sheet+Blog | |
FOR518 Mac & iOS HFS+ Filesystem Reference Sheet https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt61c336e02577e733/5eb0940e248a28605479ccf0/FOR518_APFS_CheatSheet_012020.pdf | |
The majority of DFIR Cheat Sheets can be found here --> https://digital-forensics.sans.org/community/cheat-sheets?msc=Cheat+Sheet+Blog. | |
Penetration Testing | |
Windows Intrusion Discovery Cheat Sheet v3.0 https://pen-testing.sans.org/retrieve/windows-cheat-sheet.pdf?msc=Cheat+Sheet+Blog | |
Intrusion Discovery Cheat Sheet v2.0 (Linux) https://pen-testing.sans.org/retrieve/linux-cheat-sheet.pdf?msc=Cheat+Sheet+Blog | |
Intrusion Discovery Cheat Sheet v2.0 (Windows 2000) https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/bltd6fa777a3215f34a/5eb08aae08d37e6d82ef77fe/win2ksacheatsheet.pdf | |
Windows Command Line https://pen-testing.sans.org/retrieve/windows-command-line-sheet.pdf?msc=Cheat+Sheet+Blog | |
Netcat Cheat Sheet https://pen-testing.sans.org/retrieve/netcat-cheat-sheet.pdf?msc=Cheat+Sheet+Blog | |
Misc Tools Cheat Sheet https://pen-testing.sans.org/retrieve/misc-tools-sheet.pdf?msc=Cheat+Sheet+Blog | |
Python 3 Essentials https://www.sans.org/blog/sans-cheat-sheet-python-3/?msc=Cheat+Sheet+Blog | |
Windows Command Line Cheat Sheet https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt4e45e00c2973546d/5eb08aae4461f75d77a48fd4/WindowsCommandLineSheetV1.pdf | |
SMB Access from Linux Cheat Sheet https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blta6a2ae64ec0ed535/5eb08aaeead3926127b4df44/SMB-Access-from-Linux.pdf | |
Pivot Cheat Sheet https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt0f228a4b9a1165e4/5ef3d602395b554cb3523e7b/pivot-cheat-sheet-v1.0.pdf | |
Google Hacking and Defense Cheat Sheet https://www.sans.org/security-resources/GoogleCheatSheet.pdf?msc=Cheat+Sheet+Blog | |
Scapy Cheat Sheet https://wiki.sans.blue/Tools/pdfs/ScapyCheatSheet_v0.2.pdf | |
Nmap Cheat Sheet https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blte37ba962036d487b/5eb08aae26a7212f2db1c1da/NmapCheatSheetv1.1.pdf | |
Cloud Security | |
Multicloud Cheat Sheet https://www.sans.org/security-resources/posters/cloud/multicloud-cheat-sheet-215?msc=blog-ultimate-list-cheat-sheets | |
All Around Defender Primers | |
Linux CLI 101 https://wiki.sans.blue/Tools/pdfs/LinuxCLI101.pdf | |
Linux CLI https://wiki.sans.blue/Tools/pdfs/LinuxCLI.pdf | |
PowerShell Primer https://wiki.sans.blue/Tools/pdfs/PowerShell.pdf | |
PowerShell Get-WinEvent https://wiki.sans.blue/Tools/pdfs/Get-WinEvent.pdf | |
########################################################### | |
########################################################### |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment