I do not own nor did I create these. I simply found publicly available cheat sheets and compiled a list for InfoSec students. This list contains a variety of screenshots for Tools/Networking Concepts/Cryptography/Linux Commands/OSINT/Python/etc.
☆89Apr 21, 2022Updated 3 years ago
Alternatives and similar repositories for infosec-cheat-sheets
Users that are interested in infosec-cheat-sheets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Quick OSINT checks for IPs and Domains during triage and investigations.☆31Updated this week
- Push-button Security Operations Center using Kubernetes☆13Oct 19, 2016Updated 9 years ago
- Framework for Telegram users and chats investigating☆75Jun 5, 2025Updated 9 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆99Jan 20, 2023Updated 3 years ago
- OSCP Privilege Escalation MindMap/Guide☆199Apr 4, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)☆18May 23, 2023Updated 2 years ago
- ☆212Mar 14, 2026Updated 2 weeks ago
- Collection of FOSS/Freeware. Most tools here are portable, which can be useful for when you are out-and-about. Obviously dedicated lab …☆26Feb 2, 2026Updated last month
- This script will automatically set up an OSINT workstation starting from a Ubuntu OS.☆161Dec 10, 2022Updated 3 years ago
- SSH Reverse Tunnels with Login Notifications via Telegram Bot☆31Feb 22, 2023Updated 3 years ago
- Harvest Linux forensic data for operational triage of an event.☆51Nov 30, 2025Updated 3 months ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Nov 13, 2022Updated 3 years ago
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆17Jan 15, 2022Updated 4 years ago
- A curated list of tools for incident response. With repository stars⭐ and forks🍴☆257Mar 22, 2026Updated last week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Automate Sysmon Deployment and Configuration☆20Jul 26, 2024Updated last year
- privilege escalation POCs built in Rust.☆19Jun 30, 2022Updated 3 years ago
- 🌵 Command and Action routine Server☆16Updated this week
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆241Nov 4, 2020Updated 5 years ago
- ☆11Mar 21, 2020Updated 6 years ago
- List of tools and references used by NU Cybersecurity students,☆15Feb 12, 2024Updated 2 years ago
- Mainly YouTube, tools, techniques & tradecraft OSINT resources.☆104Mar 1, 2026Updated 3 weeks ago
- The goal of this guide is very simple - to teach anyone interested in cyber security, regardless of their knowledge level, how to make th…☆847Jun 27, 2025Updated 9 months ago
- Show Window Stations, Desktops and top level windows☆17Jun 10, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆26Dec 1, 2022Updated 3 years ago
- Gotanda is browser Web Extension for OSINT.☆195Oct 11, 2023Updated 2 years ago
- Clone of the Fallout hacking mini-game, rendered into a browser canvas.☆18Mar 31, 2022Updated 3 years ago
- go-audit is an alternative to the auditd daemon that ships with many distros☆16Oct 28, 2018Updated 7 years ago
- A collection of tools adversaries commonly use in an attack.☆15Nov 23, 2024Updated last year
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Dec 1, 2022Updated 3 years ago
- Useful commands for infosec☆29Feb 13, 2023Updated 3 years ago
- ☆441Oct 23, 2022Updated 3 years ago
- RomBuster is a router exploitation tool that allows to disclosure network router admin password.☆542Jul 18, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆105Jul 5, 2025Updated 8 months ago
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- Beta release☆185Oct 8, 2021Updated 4 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 3 months ago
- Js File Scanner☆11Mar 30, 2021Updated 4 years ago
- All MITM attacks in one place.☆1,022Dec 17, 2021Updated 4 years ago
- PINTool to help analyzing malware that uses process injection☆16Jan 3, 2022Updated 4 years ago