Security Cheatsheets Logo

Security Cheatsheets

0
Free
Visit Website

These security cheatsheets are part of a project for the Ethical Hacking and Penetration Testing course offered at the University of Florida. Expanding on the default set of cheatsheets, the purpose of these cheatsheets are to aid penetration testers/CTF participants/security enthusiasts in remembering commands that are useful, but not frequently used. Most of the tools that will be covered have been included in our class and are available in Kali Linux. Requirements: The only requirement to use these cheatsheets is for cheat to be installed. How to Use: In order to use these cheatsheets, the cheatsheets in this repository need to go into ~/.cheat/ directory. After the files are moved into that directory, cheat ncat will display the ncat cheatsheet. Contributors: Jose Moruno Cadima aka Snifer TWITTER BLOG Jason Soto aka Jsitech TWITTER BLOG GUTEM - GITHUB Original Contributors: Andrew Kerr (andrewjkerr), Angela Evans (angelaevans), Alex Bujduveanu (alexbujduveanu), Michael Christakos (truckiewow) Resources: Metasploit Cheat Sheet

FEATURES

ALTERNATIVES

Free cyber security training and resources for career development.

A vulnerable web application for learning about web application vulnerabilities and writing secure code.

Collection of cybersecurity conference videos from GreHack 2018 covering various cutting-edge topics.

Comprehensive endpoint protection platform providing unified visibility and security for cloud workloads, endpoints, and containers.

A compilation of Red Teaming resources including cheatsheets, notes, scripts, and practice platforms for cybersecurity learning and skill development.

A set of PHP scripts for practicing LFI, RFI, and CMD injection vulnerabilities.

Website providing information on Snap7 open-source communication library.

Learn about 'Admin Free' Active Directory and the significance of privileged groups in AD.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved