The Nmap Cheat Sheet is a comprehensive reference guide to Nmap's scripting engine and its various options, scripts, and target specifications. It provides a detailed overview of Nmap's scripting capabilities, including the use of scripts for tasks such as DNS zone transfers, harvesting robots.txt files, SMB brute forcing, and more. The guide covers Nmap's base syntax, target specification, and script categories, including authentication, broadcast, and more. This cheat sheet is a valuable resource for cybersecurity professionals and penetration testers who want to get the most out of Nmap's advanced features.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
CTF Writeups are detailed educational documents that explain the step-by-step solutions to Capture The Flag cybersecurity challenges, serving as learning resources for security professionals.
A quick reference guide for the VI editor, covering commands and modes.
A collection of CTF writeups from various competitions including picoCTF, GLUG, TUCTF, and HackTheBox challenges, providing detailed solutions and explanations for cybersecurity competition problems.
A comprehensive cheat sheet for using JtR (John the Ripper), a password cracking tool.
A collaborative repository of CTF write-ups and source files from 2014 competitions that allows community contributions to address scattered documentation issues.
A centralized repository containing CTF source files and write-ups from 2015 competitions, providing accessible documentation and solutions for cybersecurity challenges.
A comprehensive guide for computer security incident handling, providing guidelines for establishing incident response capabilities and handling incidents efficiently and effectively.
A comprehensive guide to securing Industrial Control Systems (ICS) from cyber threats, published by NIST.
A community-maintained archive of CTF write-ups and source files from cybersecurity competitions held in 2013.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.