βββ βββ ββββββ ββββββββββ ββββββββββ βββ βββββββ
βββ ββββββββββββββββββββββ ββββββββββββ βββββββββββ
βββββββββββββββββββ βββββββ βββββββββ ββββββ ββββ
βββββββββββββββββββ βββββββ ββββββββββββββββ βββ
βββ ββββββ ββββββββββββββ βββββββββ βββββββββββββββ
βββ ββββββ βββ ββββββββββ βββββββββ βββββ βββββββ
ββββββββββ βββββββββββ ββββββ ββββββββββββββββββββ ββββββββββββββββββββββββββββββββββββ
βββββββββββ βββββββββββββββββββββββββββββββββββββββ ββββββββββββββββββββββββββββββββββββ
βββ ββββββββββββββ ββββββββ βββ ββββββββββββββββββββββ ββββββ βββ ββββββββ
βββ ββββββββββββββ ββββββββ βββ ββββββββββββββββββββββ ββββββ βββ ββββββββ
βββββββββββ ββββββββββββββ βββ βββ βββββββββββ βββββββββββββββββββ βββ ββββββββ
ββββββββββ ββββββββββββββ βββ βββ βββββββββββ βββββββββββββββββββ βββ ββββββββ
π A comprehensive collection of penetration testing cheatsheets for security professionals
Cheatsheets β’ Quick Start β’ Contributing β’ License
Hacking Cheatsheets is a curated collection of quick reference guides for penetration testing and ethical hacking tools. Each cheatsheet provides:
- β Clear explanations of tool functionality
- β Command syntax with practical examples
- β Real-world scenarios and use cases
- β Quick reference tables for rapid lookup
- β Tips & best practices from experienced pentesters
NEW! Complete step-by-step guide for penetration testing based on MITRE ATT&CK framework.
| Phase | Description | Guide |
|---|---|---|
| 1. Initial Access | Exploits, phishing, credentials | π View |
| 2. Enumeration | System & network discovery | π View |
| 3. Privilege Escalation | Get root/SYSTEM access | π View |
| 4. Lateral Movement | Move across the network | π View |
| 5. Persistence | Maintain access | π View |
| 6. Defense Evasion | Bypass AV/EDR/AMSI | π View |
| 7. Actions on Objectives | Data exfiltration & impact | π View |
NEW! Complete defensive security guides for SOC analysts and incident responders.
| Topic | Description | Guide |
|---|---|---|
| Incident Response | IR lifecycle, containment, procedures | π View |
| Log Analysis | Windows/Linux log analysis & Event IDs | π View |
| SIEM Detection | Splunk/ELK queries & dashboards | π View |
| Threat Hunting | Proactive hunting techniques | π View |
| Hardening | Windows/Linux hardening checklists | π View |
| Sigma Rules | Platform-agnostic detection rules | π View |
| YARA Rules | Malware & IOC detection patterns | π View |
NEW! Cloud pentesting guides for AWS, Azure, and GCP.
| Provider | Description | Guide |
|---|---|---|
| AWS | S3, IAM, Lambda, EC2, IMDS | π View |
| Azure | Azure AD, Blob Storage, VMs, Key Vault | π View |
| GCP | GCS, IAM, Compute, Cloud Functions | π View |
π Full Cloud Security Overview
NEW! Mobile app pentesting guides for Android and iOS.
| Platform | Description | Guide |
|---|---|---|
| Android | APK analysis, Frida, root detection bypass | π View |
| iOS | IPA analysis, jailbreak, Objection, keychain | π View |
π Full Mobile Security Overview
NEW! Docker & Kubernetes pentesting guides.
| Platform | Description | Guide |
|---|---|---|
| Docker | Container escape, image analysis, daemon exploitation | π View |
| Kubernetes | RBAC bypass, pod escape, secrets extraction | π View |
π Full Container Security Overview
NEW! Social engineering techniques, phishing campaigns, and pretexting guides.
| Topic | Description | Guide |
|---|---|---|
| Phishing | Email phishing, GoPhish, Evilginx2, vishing, smishing | π View |
| Pretexting | Personas, scenarios, psychological manipulation | π View |
π Full Social Engineering Overview
NEW! Professional report templates for pentesters and bug bounty hunters.
| Template | Description | Guide |
|---|---|---|
| Pentest Report | Full penetration test report structure | π View |
| Bug Bounty Report | HackerOne/Bugcrowd submission template | π View |
| Executive Summary | Non-technical summary for C-level | π View |
NEW! Complete OSINT methodology and tool guides.
| Topic | Description | Guide |
|---|---|---|
| People Search | Find individuals online, phone/address lookup | π View |
| Email OSINT | Email discovery, breach checking, verification | π View |
| Social Media | Username search, platform-specific OSINT | π View |
| Domain & IP | WHOIS, DNS, subdomain, IP reconnaissance | π View |
| Image OSINT | Reverse image search, EXIF metadata | π View |
π Full OSINT Overview
NEW! Complete network penetration testing guides.
| Topic | Description | Guide |
|---|---|---|
| Port Scanning | Nmap, Masscan, RustScan | π View |
| Network Enumeration | SMB, SNMP, NFS, LDAP, DNS | π View |
| MITM Attacks | ARP spoofing, DNS spoofing, SSL strip | π View |
| Service Exploitation | FTP, SSH, SMB, RDP, databases | π View |
π Full Network Pentesting Overview
NEW! Complete CTF competition guides for HackTheBox, TryHackMe, PicoCTF.
| Category | Description | Guide |
|---|---|---|
| Web | SQLi, XSS, SSTI, LFI, Auth bypass | π View |
| Crypto | RSA, AES, hashes, encoding, XOR | π View |
| Reverse Engineering | Ghidra, IDA, GDB, patching | π View |
| Forensics | Steganography, memory, disk, PCAP | π View |
| Pwn/Binary | Buffer overflow, ROP, shellcode | π View |
π Full CTF Overview
NEW! IoT device hacking, firmware analysis, and hardware hacking guides.
| Topic | Description | Guide |
|---|---|---|
| Firmware Analysis | Binwalk, extraction, RE, secrets | π View |
| Hardware Hacking | UART, JTAG, SPI, I2C, debug ports | π View |
π Full IoT Hacking Overview
| Tool | Description | Cheatsheet |
|---|---|---|
| Metasploit Framework | The world's most used penetration testing framework | π View |
| Meterpreter | Advanced post-exploitation payload | π View |
| Mimikatz | Windows credential extraction tool | π View |
| PowerShell | Windows scripting for pentesting | π View |
| Linux Commands | Linux & Bash for pentesting | π View |
| Tool | Description | Cheatsheet |
|---|---|---|
| Nmap | Network discovery and security auditing | π View |
| Gobuster | Directory/DNS/VHost brute-forcing | π View |
| Nikto | Web server scanner | π View |
| Tool | Description | Cheatsheet |
|---|---|---|
| SQLMap | SQL injection automation tool | π View |
| Burp Suite | Web application security testing platform | π View |
| OWASP ZAP | Free web app security scanner | π View |
| Tool | Description | Cheatsheet |
|---|---|---|
| Hydra | Fast network login cracker | π View |
| John the Ripper | Legendary password cracker | π View |
| Hashcat | World's fastest GPU password cracker | π View |
| Tool | Description | Cheatsheet |
|---|---|---|
| Wireshark | Network protocol analyzer | π View |
| tcpdump | Command-line packet analyzer | π View |
| Tool | Description | Cheatsheet |
|---|---|---|
| β BB Methodology | Complete bug bounty hunting guide | π View |
| Nuclei | Template-based vulnerability scanner | π View |
| ffuf | Fast web fuzzer | π View |
| Subfinder | Subdomain discovery | π View |
| httpx | HTTP probe & toolkit | π View |
| Amass | In-depth attack surface mapping | π View |
| GAU | Get All URLs from archives | π View |
| Katana | Next-gen web crawler | π View |
| Arjun | Hidden parameter discovery | π View |
| Dalfox | XSS vulnerability scanner | π View |
| Vulnerability | Description | Cheatsheet |
|---|---|---|
| XSS | Cross-Site Scripting payloads | π View |
| SQLi | SQL Injection payloads | π View |
| LFI | Local File Inclusion payloads | π View |
| SSTI | Server-Side Template Injection | π View |
| Command Injection | OS command injection payloads | π View |
| NoSQL Injection | MongoDB, CouchDB, Redis payloads | π View |
| Deserialization | Java, PHP, Python, .NET payloads | π View |
| WebSocket Attacks | CSWSH, injection, hijacking | π View |
| GraphQL Injection | Introspection, IDOR, injection | π View |
| Vulnerability | Description | Cheatsheet |
|---|---|---|
| API Security | REST/GraphQL/JWT testing guide | π View |
| IDOR | Insecure Direct Object Reference | π View |
| SSRF | Server-Side Request Forgery | π View |
| XXE | XML External Entity Injection | π View |
| Race Conditions | Timing & concurrency attacks | π View |
| Auth Bypass | Authentication bypass techniques | π View |
| CORS | Cross-Origin misconfigurations | π View |
| Open Redirect | URL redirect vulnerabilities | π View |
| Topic | Description | Cheatsheet |
|---|---|---|
| WAF Bypass | Origin IP discovery & WAF evasion | π View |
| Cloudflare Bypass | Find origin IP behind Cloudflare | π View |
| Subdomain Takeover | Dangling CNAME exploitation | π View |
| Cache Poisoning | Web cache poisoning & deception | π View |
| HTTP Smuggling | Request smuggling (CL.TE/TE.CL) | π View |
| Prototype Pollution | JavaScript prototype attacks | π View |
| Tool | Description | Cheatsheet |
|---|---|---|
| Google Dorking | Advanced Google search techniques | π View |
| Shodan | IoT & device search engine | π View |
| GitHub Dorking | Secret hunting in repositories | π View |
| Topic | Description | Cheatsheet |
|---|---|---|
| Linux PrivEsc | Linux privilege escalation techniques | π View |
| Windows PrivEsc | Windows privilege escalation techniques | π View |
| Tool | Description | Cheatsheet |
|---|---|---|
| Volatility | Memory forensics framework | π View |
| Autopsy | Digital forensics platform (GUI) | π View |
| ExifTool | Metadata extraction & analysis | π View |
| Binwalk | Firmware analysis & extraction | π View |
| Tool | Description | Cheatsheet |
|---|---|---|
| Ghidra | NSA reverse engineering suite | π View |
| GDB | GNU Debugger (Linux debugging) | π View |
| x64dbg | Windows x64/x32 debugger | π View |
| Tool | Description | Cheatsheet |
|---|---|---|
| Aircrack-ng | WiFi hacking suite (WPA/WPA2) | π View |
| Wifite | Automated WiFi auditor | π View |
| Bettercap | Network attack framework (MITM/WiFi) | π View |
| Tool | Description | Cheatsheet |
|---|---|---|
| β AD Methodology | Step-by-step attack guide | π View |
| BloodHound | AD attack path visualization | π View |
| Impacket | Python AD attack toolkit | π View |
| CrackMapExec | AD Swiss Army knife | π View |
| Rubeus | Kerberos abuse toolkit | π View |
| PowerView | PowerShell AD enumeration | π View |
| Responder | LLMNR/NBT-NS poisoning | π View |
| Evil-WinRM | WinRM shell for pentesters | π View |
| Kerbrute | Kerberos user enum & spray | π View |
| Resource | Description | Cheatsheet |
|---|---|---|
| Wordlists | Complete wordlist reference guide | π View |
| Kali Linux Tools | 600+ tools by category | π View |
git clone https://github.com/Ilias1988/Hacking-Cheatsheets.git
cd Hacking-CheatsheetsNavigate to any tool folder and open the README.md file:
# View Metasploit cheatsheet
cat Metasploit/README.md
# Or open in your favorite editor
code Metasploit/All cheatsheets are in Markdown format, making them:
- π± Mobile-friendly - Read on any device
- π Offline accessible - No internet required
- π¨οΈ Printable - Create physical copies
- π Searchable - Use grep or your editor's search
Hacking-Cheatsheets/
β
βββ README.md # This file - Main index
βββ LICENSE # MIT License
βββ CONTRIBUTING.md # Contribution guidelines
βββ .gitignore # Git ignore rules
β
βββ Metasploit/ # Metasploit Framework
β βββ README.md # Complete msfconsole guide
β βββ Meterpreter.md # Meterpreter cheatsheet
β
βββ Nmap/ # Network Scanner
β βββ README.md # Complete Nmap guide
β
βββ Gobuster/ # Directory/DNS Enumeration
β βββ README.md # Complete Gobuster guide
β
βββ Nikto/ # Web Server Scanner
β βββ README.md # Complete Nikto guide
β
βββ SQLMap/ # SQL Injection Tool
β βββ README.md # Complete SQLMap guide
β
βββ Burp-Suite/ # Web Application Testing
β βββ README.md # Complete Burp Suite guide
β
βββ OWASP-ZAP/ # OWASP Zed Attack Proxy
β βββ README.md # Complete ZAP guide
β
βββ Hydra/ # Network Login Cracker
β βββ README.md # Complete Hydra guide
β
βββ John-The-Ripper/ # Password Cracker
β βββ README.md # Complete John guide
β
βββ Hashcat/ # GPU Password Cracker
β βββ README.md # Complete Hashcat guide
β
βββ Wireshark/ # Network Protocol Analyzer
β βββ README.md # Complete Wireshark guide
β
βββ tcpdump/ # Command-Line Packet Analyzer
β βββ README.md # Complete tcpdump guide
β
βββ Nuclei/ # Bug Bounty Scanner
β βββ README.md # Complete Nuclei guide
β
βββ ffuf/ # Web Fuzzer
β βββ README.md # Complete ffuf guide
β
βββ Subfinder/ # Subdomain Discovery
β βββ README.md # Complete Subfinder guide
β
βββ httpx/ # HTTP Probe & Toolkit
β βββ README.md # Complete httpx guide
β
βββ Google-Dorking/ # Google Search Hacking
β βββ README.md # Complete Google Dorking guide
β
βββ Shodan/ # IoT Search Engine
β βββ README.md # Complete Shodan guide
β
βββ GitHub-Dorking/ # Secret Hunting
β βββ README.md # Complete GitHub Dorking guide
β
βββ ...
Contributions are welcome! Please read our Contributing Guidelines before submitting a pull request.
- π Add new cheatsheets for tools not yet covered
- π§ Improve existing cheatsheets with better examples
- π Report issues or suggest improvements
- π Translate cheatsheets to other languages
- β Star this repo to show your support!
IMPORTANT: These cheatsheets are intended for educational purposes and authorized security testing only.
- β Use on systems you own
- β Use with explicit written permission
- β Use in legal penetration testing engagements
- β Never use for unauthorized access
- β Never use for malicious purposes
Unauthorized access to computer systems is illegal. The authors are not responsible for any misuse of this information.
This project is licensed under the MIT License - see the LICENSE file for details.
If you find these cheatsheets useful, please consider:
- β Starring this repository
- π΄ Forking to contribute
- π’ Sharing with fellow security professionals
- π¬ Providing feedback for improvements
- GitHub Issues - For bug reports and feature requests
- Pull Requests - For contributions
Happy Hacking! π΄
Remember: Hack responsibly, hack ethically!
Made with β€οΈ for the cybersecurity community