Logo
Security Cheatsheets

Security Cheatsheets

#Knowledge Base#Resources

Platform offering cybersecurity courses for Red, Blue, and Purple Teamers by Picus.

Visit Website

These Security Cheatsheets Are Part of an Ethical Hacking Project

These security cheatsheets are part of a project for the Ethical Hacking and Penetration Testing course offered at the University of Florida. Building upon the standard set of cheatsheets, the goal of these resources is to assist penetration testers, CTF participants, and security enthusiasts in recalling commands that are useful but not often utilized. Most of the tools discussed here have been included in our class curriculum and are available in Kali Linux.

The Only Requirement to Use These Cheatsheets

The only requirement for using these cheatsheets is that the cheat must be installed.

How to Use the Cheatsheets

To use these cheatsheets, you need to place the cheatsheets from this repository into the ~/.cheat/ directory. Once the files are moved to that directory, you can display the ncat cheatsheet by using the command 'cheat ncat'. Contributors: Jose Moruno Cadima aka Snifer TWITTER BLOG Jason Soto aka Jsitech TWITTER BLOG GUTEM - GITHUB Original Contributors: Andrew Kerr (andrewjkerr), Angela Evans (angelaevans), Alex Bujduveanu (alexbujduveanu), Michael Christakos (truckiewow) Resources: Metasploit Cheat Sheet