Security Cheatsheets Logo

Security Cheatsheets

0
Free
1 saves
Updated 11 March 2025
Visit Website

These security cheatsheets are part of a project for the Ethical Hacking and Penetration Testing course offered at the University of Florida. Expanding on the default set of cheatsheets, the purpose of these cheatsheets are to aid penetration testers/CTF participants/security enthusiasts in remembering commands that are useful, but not frequently used. Most of the tools that will be covered have been included in our class and are available in Kali Linux. Requirements: The only requirement to use these cheatsheets is for cheat to be installed. How to Use: In order to use these cheatsheets, the cheatsheets in this repository need to go into ~/.cheat/ directory. After the files are moved into that directory, cheat ncat will display the ncat cheatsheet. Contributors: Jose Moruno Cadima aka Snifer TWITTER BLOG Jason Soto aka Jsitech TWITTER BLOG GUTEM - GITHUB Original Contributors: Andrew Kerr (andrewjkerr), Angela Evans (angelaevans), Alex Bujduveanu (alexbujduveanu), Michael Christakos (truckiewow) Resources: Metasploit Cheat Sheet

FEATURES

SIMILAR TOOLS

Exhaustive checklist for securing Node.js web services with a focus on error handling and custom error pages.

A collection of computer science courses with video lectures covering a wide range of topics.

A reference cheat sheet documenting vulnerabilities in SSL/TLS protocol versions and cipher suites for security assessment purposes.

Project hosting scripts for implementing Pass the Hash mitigations with PtHTools module commands.

A reference guide listing 44 advanced Google search operators for enhanced search filtering and precision in information gathering activities.

An intentionally insecure Android app designed to teach developers and security professionals about common app vulnerabilities.

A collection of write-ups from Capture The Flag hacking competitions

A project developed for pentesters to practice SQL Injection concepts in a controlled environment.

A collection of reports and resources highlighting Android security vulnerabilities and best practices.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved