
Security Cheatsheets
#Knowledge Base#Resources
Platform offering cybersecurity courses for Red, Blue, and Purple Teamers by Picus.
These Security Cheatsheets Are Part of an Ethical Hacking Project
These security cheatsheets are part of a project for the Ethical Hacking and Penetration Testing course offered at the University of Florida. Building upon the standard set of cheatsheets, the goal of these resources is to assist penetration testers, CTF participants, and security enthusiasts in recalling commands that are useful but not often utilized. Most of the tools discussed here have been included in our class curriculum and are available in Kali Linux.
The Only Requirement to Use These Cheatsheets
The only requirement for using these cheatsheets is that the cheat must be installed.
How to Use the Cheatsheets
To use these cheatsheets, you need to place the cheatsheets from this repository into the ~/.cheat/ directory. Once the files are moved to that directory, you can display the ncat cheatsheet by using the command 'cheat ncat'.
Contributors:
Jose Moruno Cadima aka Snifer TWITTER BLOG
Jason Soto aka Jsitech TWITTER BLOG
GUTEM
- GITHUB
Original Contributors: Andrew Kerr (andrewjkerr), Angela Evans (angelaevans), Alex Bujduveanu (alexbujduveanu), Michael Christakos (truckiewow)
Resources:
Metasploit Cheat Sheet