Security Cheatsheets Logo

Security Cheatsheets

0
Free
Visit Website

These security cheatsheets are part of a project for the Ethical Hacking and Penetration Testing course offered at the University of Florida. Expanding on the default set of cheatsheets, the purpose of these cheatsheets are to aid penetration testers/CTF participants/security enthusiasts in remembering commands that are useful, but not frequently used. Most of the tools that will be covered have been included in our class and are available in Kali Linux. Requirements: The only requirement to use these cheatsheets is for cheat to be installed. How to Use: In order to use these cheatsheets, the cheatsheets in this repository need to go into ~/.cheat/ directory. After the files are moved into that directory, cheat ncat will display the ncat cheatsheet. Contributors: Jose Moruno Cadima aka Snifer TWITTER BLOG Jason Soto aka Jsitech TWITTER BLOG GUTEM - GITHUB Original Contributors: Andrew Kerr (andrewjkerr), Angela Evans (angelaevans), Alex Bujduveanu (alexbujduveanu), Michael Christakos (truckiewow) Resources: Metasploit Cheat Sheet

FEATURES

ALTERNATIVES

HTB Academy offers guided cybersecurity training with industry certifications to help you become a market-ready professional.

A cheat sheet for pentesters and researchers about deserialization vulnerabilities in various Java (JVM) serialization libraries.

Collection of recent infosec/hacking videos from conferences.

edb is a powerful debugger for Linux binaries, enhancing reverse engineering efforts with a user-friendly interface and extensible plugins.

FARA is a repository of purposefully erroneous Yara rules for training security analysts.

Java MODBUS simulator with scriptable functions and dynamic resource creation.

IT certification training for CompTIA exams with free resources.

The best security training environment for Developers and AppSec Professionals.