Skip to content

A comprehensive collection of penetration testing cheatsheets, guides, and tools.

License

Notifications You must be signed in to change notification settings

jasonhillva/Hacking-Cheatsheets

Β 
Β 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

53 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ”΄ Hacking Cheatsheets

    β–ˆβ–ˆβ•—  β–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•—  β–ˆβ–ˆβ•—β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— 
    β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•β•β• 
    β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β• β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ–ˆβ•—
    β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘
    β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘ β•šβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•
    β•šβ•β•  β•šβ•β•β•šβ•β•  β•šβ•β• β•šβ•β•β•β•β•β•β•šβ•β•  β•šβ•β•β•šβ•β•β•šβ•β•  β•šβ•β•β•β• β•šβ•β•β•β•β•β• 
     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•—  β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•—  β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—
    β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β•šβ•β•β–ˆβ–ˆβ•”β•β•β•β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•”β•β•β•β•β•β•šβ•β•β–ˆβ–ˆβ•”β•β•β•β–ˆβ–ˆβ•”β•β•β•β•β•
    β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—     β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—
    β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•  β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘   β•šβ•β•β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•  β–ˆβ–ˆβ•”β•β•β•     β–ˆβ–ˆβ•‘   β•šβ•β•β•β•β–ˆβ–ˆβ•‘
    β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘
     β•šβ•β•β•β•β•β•β•šβ•β•  β•šβ•β•β•šβ•β•β•β•β•β•β•β•šβ•β•  β•šβ•β•   β•šβ•β•   β•šβ•β•β•β•β•β•β•β•šβ•β•  β•šβ•β•β•šβ•β•β•β•β•β•β•β•šβ•β•β•β•β•β•β•   β•šβ•β•   β•šβ•β•β•β•β•β•β•

Penetration Testing Ethical Hacking Cybersecurity License

πŸ“š A comprehensive collection of penetration testing cheatsheets for security professionals

Cheatsheets β€’ Quick Start β€’ Contributing β€’ License


🎯 About

Hacking Cheatsheets is a curated collection of quick reference guides for penetration testing and ethical hacking tools. Each cheatsheet provides:

  • βœ… Clear explanations of tool functionality
  • βœ… Command syntax with practical examples
  • βœ… Real-world scenarios and use cases
  • βœ… Quick reference tables for rapid lookup
  • βœ… Tips & best practices from experienced pentesters

🎯 Attack Methodology (Kill Chain)

NEW! Complete step-by-step guide for penetration testing based on MITRE ATT&CK framework.

Phase Description Guide
1. Initial Access Exploits, phishing, credentials πŸ“„ View
2. Enumeration System & network discovery πŸ“„ View
3. Privilege Escalation Get root/SYSTEM access πŸ“„ View
4. Lateral Movement Move across the network πŸ“„ View
5. Persistence Maintain access πŸ“„ View
6. Defense Evasion Bypass AV/EDR/AMSI πŸ“„ View
7. Actions on Objectives Data exfiltration & impact πŸ“„ View

πŸ‘‰ Full Kill Chain Overview


πŸ›‘οΈ Blue Team (Defensive Security)

NEW! Complete defensive security guides for SOC analysts and incident responders.

Topic Description Guide
Incident Response IR lifecycle, containment, procedures πŸ“„ View
Log Analysis Windows/Linux log analysis & Event IDs πŸ“„ View
SIEM Detection Splunk/ELK queries & dashboards πŸ“„ View
Threat Hunting Proactive hunting techniques πŸ“„ View
Hardening Windows/Linux hardening checklists πŸ“„ View
Sigma Rules Platform-agnostic detection rules πŸ“„ View
YARA Rules Malware & IOC detection patterns πŸ“„ View

πŸ‘‰ Full Blue Team Overview


☁️ Cloud Security

NEW! Cloud pentesting guides for AWS, Azure, and GCP.

Provider Description Guide
AWS S3, IAM, Lambda, EC2, IMDS πŸ“„ View
Azure Azure AD, Blob Storage, VMs, Key Vault πŸ“„ View
GCP GCS, IAM, Compute, Cloud Functions πŸ“„ View

πŸ‘‰ Full Cloud Security Overview


πŸ“± Mobile Security

NEW! Mobile app pentesting guides for Android and iOS.

Platform Description Guide
Android APK analysis, Frida, root detection bypass πŸ“„ View
iOS IPA analysis, jailbreak, Objection, keychain πŸ“„ View

πŸ‘‰ Full Mobile Security Overview


🐳 Container Security

NEW! Docker & Kubernetes pentesting guides.

Platform Description Guide
Docker Container escape, image analysis, daemon exploitation πŸ“„ View
Kubernetes RBAC bypass, pod escape, secrets extraction πŸ“„ View

πŸ‘‰ Full Container Security Overview


🎭 Social Engineering

NEW! Social engineering techniques, phishing campaigns, and pretexting guides.

Topic Description Guide
Phishing Email phishing, GoPhish, Evilginx2, vishing, smishing πŸ“„ View
Pretexting Personas, scenarios, psychological manipulation πŸ“„ View

πŸ‘‰ Full Social Engineering Overview


πŸ“ Reporting Templates

NEW! Professional report templates for pentesters and bug bounty hunters.

Template Description Guide
Pentest Report Full penetration test report structure πŸ“„ View
Bug Bounty Report HackerOne/Bugcrowd submission template πŸ“„ View
Executive Summary Non-technical summary for C-level πŸ“„ View

πŸ” OSINT (Open Source Intelligence)

NEW! Complete OSINT methodology and tool guides.

Topic Description Guide
People Search Find individuals online, phone/address lookup πŸ“„ View
Email OSINT Email discovery, breach checking, verification πŸ“„ View
Social Media Username search, platform-specific OSINT πŸ“„ View
Domain & IP WHOIS, DNS, subdomain, IP reconnaissance πŸ“„ View
Image OSINT Reverse image search, EXIF metadata πŸ“„ View

πŸ‘‰ Full OSINT Overview


🌐 Network Pentesting

NEW! Complete network penetration testing guides.

Topic Description Guide
Port Scanning Nmap, Masscan, RustScan πŸ“„ View
Network Enumeration SMB, SNMP, NFS, LDAP, DNS πŸ“„ View
MITM Attacks ARP spoofing, DNS spoofing, SSL strip πŸ“„ View
Service Exploitation FTP, SSH, SMB, RDP, databases πŸ“„ View

πŸ‘‰ Full Network Pentesting Overview


🏁 CTF Cheatsheets

NEW! Complete CTF competition guides for HackTheBox, TryHackMe, PicoCTF.

Category Description Guide
Web SQLi, XSS, SSTI, LFI, Auth bypass πŸ“„ View
Crypto RSA, AES, hashes, encoding, XOR πŸ“„ View
Reverse Engineering Ghidra, IDA, GDB, patching πŸ“„ View
Forensics Steganography, memory, disk, PCAP πŸ“„ View
Pwn/Binary Buffer overflow, ROP, shellcode πŸ“„ View

πŸ‘‰ Full CTF Overview


πŸ“‘ IoT Hacking

NEW! IoT device hacking, firmware analysis, and hardware hacking guides.

Topic Description Guide
Firmware Analysis Binwalk, extraction, RE, secrets πŸ“„ View
Hardware Hacking UART, JTAG, SPI, I2C, debug ports πŸ“„ View

πŸ‘‰ Full IoT Hacking Overview


πŸ“– Cheatsheets

πŸ”΄ Exploitation Framework

Tool Description Cheatsheet
Metasploit Framework The world's most used penetration testing framework πŸ“„ View
Meterpreter Advanced post-exploitation payload πŸ“„ View
Mimikatz Windows credential extraction tool πŸ“„ View
PowerShell Windows scripting for pentesting πŸ“„ View
Linux Commands Linux & Bash for pentesting πŸ“„ View

πŸ” Reconnaissance & Scanning

Tool Description Cheatsheet
Nmap Network discovery and security auditing πŸ“„ View
Gobuster Directory/DNS/VHost brute-forcing πŸ“„ View
Nikto Web server scanner πŸ“„ View

🌐 Web Application Testing

Tool Description Cheatsheet
SQLMap SQL injection automation tool πŸ“„ View
Burp Suite Web application security testing platform πŸ“„ View
OWASP ZAP Free web app security scanner πŸ“„ View

πŸ”“ Password Cracking

Tool Description Cheatsheet
Hydra Fast network login cracker πŸ“„ View
John the Ripper Legendary password cracker πŸ“„ View
Hashcat World's fastest GPU password cracker πŸ“„ View

πŸ“‘ Network Analysis

Tool Description Cheatsheet
Wireshark Network protocol analyzer πŸ“„ View
tcpdump Command-line packet analyzer πŸ“„ View

πŸ› Bug Bounty

Tool Description Cheatsheet
⭐ BB Methodology Complete bug bounty hunting guide πŸ“„ View
Nuclei Template-based vulnerability scanner πŸ“„ View
ffuf Fast web fuzzer πŸ“„ View
Subfinder Subdomain discovery πŸ“„ View
httpx HTTP probe & toolkit πŸ“„ View
Amass In-depth attack surface mapping πŸ“„ View
GAU Get All URLs from archives πŸ“„ View
Katana Next-gen web crawler πŸ“„ View
Arjun Hidden parameter discovery πŸ“„ View
Dalfox XSS vulnerability scanner πŸ“„ View

πŸ’‰ Payloads Collection

Vulnerability Description Cheatsheet
XSS Cross-Site Scripting payloads πŸ“„ View
SQLi SQL Injection payloads πŸ“„ View
LFI Local File Inclusion payloads πŸ“„ View
SSTI Server-Side Template Injection πŸ“„ View
Command Injection OS command injection payloads πŸ“„ View
NoSQL Injection MongoDB, CouchDB, Redis payloads πŸ“„ View
Deserialization Java, PHP, Python, .NET payloads πŸ“„ View
WebSocket Attacks CSWSH, injection, hijacking πŸ“„ View
GraphQL Injection Introspection, IDOR, injection πŸ“„ View

πŸ”΄ Web Vulnerabilities

Vulnerability Description Cheatsheet
API Security REST/GraphQL/JWT testing guide πŸ“„ View
IDOR Insecure Direct Object Reference πŸ“„ View
SSRF Server-Side Request Forgery πŸ“„ View
XXE XML External Entity Injection πŸ“„ View
Race Conditions Timing & concurrency attacks πŸ“„ View
Auth Bypass Authentication bypass techniques πŸ“„ View
CORS Cross-Origin misconfigurations πŸ“„ View
Open Redirect URL redirect vulnerabilities πŸ“„ View

πŸ›‘οΈ Advanced Attack Techniques

Topic Description Cheatsheet
WAF Bypass Origin IP discovery & WAF evasion πŸ“„ View
Cloudflare Bypass Find origin IP behind Cloudflare πŸ“„ View
Subdomain Takeover Dangling CNAME exploitation πŸ“„ View
Cache Poisoning Web cache poisoning & deception πŸ“„ View
HTTP Smuggling Request smuggling (CL.TE/TE.CL) πŸ“„ View
Prototype Pollution JavaScript prototype attacks πŸ“„ View

πŸ”Ž Dorking & OSINT

Tool Description Cheatsheet
Google Dorking Advanced Google search techniques πŸ“„ View
Shodan IoT & device search engine πŸ“„ View
GitHub Dorking Secret hunting in repositories πŸ“„ View

πŸ” Privilege Escalation

Topic Description Cheatsheet
Linux PrivEsc Linux privilege escalation techniques πŸ“„ View
Windows PrivEsc Windows privilege escalation techniques πŸ“„ View

πŸ”¬ Digital Forensics

Tool Description Cheatsheet
Volatility Memory forensics framework πŸ“„ View
Autopsy Digital forensics platform (GUI) πŸ“„ View
ExifTool Metadata extraction & analysis πŸ“„ View
Binwalk Firmware analysis & extraction πŸ“„ View

πŸ”„ Reverse Engineering

Tool Description Cheatsheet
Ghidra NSA reverse engineering suite πŸ“„ View
GDB GNU Debugger (Linux debugging) πŸ“„ View
x64dbg Windows x64/x32 debugger πŸ“„ View

πŸ“Ά WiFi Hacking

Tool Description Cheatsheet
Aircrack-ng WiFi hacking suite (WPA/WPA2) πŸ“„ View
Wifite Automated WiFi auditor πŸ“„ View
Bettercap Network attack framework (MITM/WiFi) πŸ“„ View

🏒 Active Directory

Tool Description Cheatsheet
⭐ AD Methodology Step-by-step attack guide πŸ“„ View
BloodHound AD attack path visualization πŸ“„ View
Impacket Python AD attack toolkit πŸ“„ View
CrackMapExec AD Swiss Army knife πŸ“„ View
Rubeus Kerberos abuse toolkit πŸ“„ View
PowerView PowerShell AD enumeration πŸ“„ View
Responder LLMNR/NBT-NS poisoning πŸ“„ View
Evil-WinRM WinRM shell for pentesters πŸ“„ View
Kerbrute Kerberos user enum & spray πŸ“„ View

πŸ“š Resources

Resource Description Cheatsheet
Wordlists Complete wordlist reference guide πŸ“„ View
Kali Linux Tools 600+ tools by category πŸ“„ View

πŸš€ Quick Start

Clone the Repository

git clone https://github.com/Ilias1988/Hacking-Cheatsheets.git
cd Hacking-Cheatsheets

Browse Cheatsheets

Navigate to any tool folder and open the README.md file:

# View Metasploit cheatsheet
cat Metasploit/README.md

# Or open in your favorite editor
code Metasploit/

Offline Access

All cheatsheets are in Markdown format, making them:

  • πŸ“± Mobile-friendly - Read on any device
  • πŸ”Œ Offline accessible - No internet required
  • πŸ–¨οΈ Printable - Create physical copies
  • πŸ” Searchable - Use grep or your editor's search

πŸ“‚ Repository Structure

Hacking-Cheatsheets/
β”‚
β”œβ”€β”€ README.md              # This file - Main index
β”œβ”€β”€ LICENSE                # MIT License
β”œβ”€β”€ CONTRIBUTING.md        # Contribution guidelines
β”œβ”€β”€ .gitignore             # Git ignore rules
β”‚
β”œβ”€β”€ Metasploit/            # Metasploit Framework
β”‚   β”œβ”€β”€ README.md          # Complete msfconsole guide
β”‚   └── Meterpreter.md     # Meterpreter cheatsheet
β”‚
β”œβ”€β”€ Nmap/                  # Network Scanner
β”‚   └── README.md          # Complete Nmap guide
β”‚
β”œβ”€β”€ Gobuster/              # Directory/DNS Enumeration
β”‚   └── README.md          # Complete Gobuster guide
β”‚
β”œβ”€β”€ Nikto/                 # Web Server Scanner
β”‚   └── README.md          # Complete Nikto guide
β”‚
β”œβ”€β”€ SQLMap/                # SQL Injection Tool
β”‚   └── README.md          # Complete SQLMap guide
β”‚
β”œβ”€β”€ Burp-Suite/            # Web Application Testing
β”‚   └── README.md          # Complete Burp Suite guide
β”‚
β”œβ”€β”€ OWASP-ZAP/             # OWASP Zed Attack Proxy
β”‚   └── README.md          # Complete ZAP guide
β”‚
β”œβ”€β”€ Hydra/                 # Network Login Cracker
β”‚   └── README.md          # Complete Hydra guide
β”‚
β”œβ”€β”€ John-The-Ripper/       # Password Cracker
β”‚   └── README.md          # Complete John guide
β”‚
β”œβ”€β”€ Hashcat/               # GPU Password Cracker
β”‚   └── README.md          # Complete Hashcat guide
β”‚
β”œβ”€β”€ Wireshark/             # Network Protocol Analyzer
β”‚   └── README.md          # Complete Wireshark guide
β”‚
β”œβ”€β”€ tcpdump/               # Command-Line Packet Analyzer
β”‚   └── README.md          # Complete tcpdump guide
β”‚
β”œβ”€β”€ Nuclei/                # Bug Bounty Scanner
β”‚   └── README.md          # Complete Nuclei guide
β”‚
β”œβ”€β”€ ffuf/                  # Web Fuzzer
β”‚   └── README.md          # Complete ffuf guide
β”‚
β”œβ”€β”€ Subfinder/             # Subdomain Discovery
β”‚   └── README.md          # Complete Subfinder guide
β”‚
β”œβ”€β”€ httpx/                 # HTTP Probe & Toolkit
β”‚   └── README.md          # Complete httpx guide
β”‚
β”œβ”€β”€ Google-Dorking/        # Google Search Hacking
β”‚   └── README.md          # Complete Google Dorking guide
β”‚
β”œβ”€β”€ Shodan/                # IoT Search Engine
β”‚   └── README.md          # Complete Shodan guide
β”‚
β”œβ”€β”€ GitHub-Dorking/        # Secret Hunting
β”‚   └── README.md          # Complete GitHub Dorking guide
β”‚
└── ...

🀝 Contributing

Contributions are welcome! Please read our Contributing Guidelines before submitting a pull request.

Ways to Contribute

  • πŸ“ Add new cheatsheets for tools not yet covered
  • πŸ”§ Improve existing cheatsheets with better examples
  • πŸ› Report issues or suggest improvements
  • 🌐 Translate cheatsheets to other languages
  • ⭐ Star this repo to show your support!

⚠️ Legal Disclaimer

IMPORTANT: These cheatsheets are intended for educational purposes and authorized security testing only.

  • βœ… Use on systems you own
  • βœ… Use with explicit written permission
  • βœ… Use in legal penetration testing engagements
  • ❌ Never use for unauthorized access
  • ❌ Never use for malicious purposes

Unauthorized access to computer systems is illegal. The authors are not responsible for any misuse of this information.


πŸ“œ License

This project is licensed under the MIT License - see the LICENSE file for details.


🌟 Show Your Support

If you find these cheatsheets useful, please consider:

  • ⭐ Starring this repository
  • 🍴 Forking to contribute
  • πŸ“’ Sharing with fellow security professionals
  • πŸ’¬ Providing feedback for improvements

πŸ“¬ Contact

  • GitHub Issues - For bug reports and feature requests
  • Pull Requests - For contributions

Happy Hacking! πŸ”΄
Remember: Hack responsibly, hack ethically!


Made with ❀️ for the cybersecurity community

About

A comprehensive collection of penetration testing cheatsheets, guides, and tools.

Resources

License

Contributing

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published