
When I started learning cybersecurity, I quickly realized something:
π The problem isnβt lack of information β itβs fragmentation.
Every time I needed something simple like:
- a reverse shell
- a privilege escalation checklist
- or a quick command reference
β¦I had to jump between multiple sources:
- GTFOBins
- LOLBAS
- random GitHub repositories
- outdated blog posts
It was slow, confusing, and inefficient.
π So I decided to fix that
I created a centralized repository that contains 70+ hacking cheatsheets in one place.
π The goal is simple:
Make learning and practicing cybersecurity faster and more practical.
π Whatβs inside?
This repository includes cheatsheets for:
π΄ Offensive Security
- Metasploit Framework
- Mimikatz
- Privilege Escalation (Linux & Windows)
- Reverse shells & payloads
π Web & Bug Bounty
- SQL Injection (SQLMap)
- XSS, SSTI, LFI
- Burp Suite & OWASP ZAP
- Recon tools like ffuf, httpx, Subfinder
π‘ Networking & Enumeration
- Nmap
- SMB, LDAP, DNS enumeration
- MITM techniques
π Password Attacks
- Hydra
- John the Ripper
- Hashcat
π‘οΈ Blue Team & Detection
- Log analysis
- SIEM basics
- Threat hunting
βοΈ Cloud, Mobile & More
- AWS / Azure / GCP basics
- Android & iOS testing
- Docker & Kubernetes
β‘ Why this is useful
Instead of searching everywhere, you get:
β
Quick command references
β
Real-world examples
β
Structured learning
β
Offline access (Markdown format)
π Check it out
If you're learning cybersecurity or doing CTFs / pentesting, this might help:
π https://github.com/Ilias1988/Hacking-Cheatsheets
π§ Who is this for?
- Beginners in cybersecurity
- TryHackMe / HackTheBox users
- Bug bounty hunters
- Pentesters
- Anyone who wants quick references
π‘ Future plans
I plan to:
- Add more advanced techniques
- Expand Blue Team content
- Improve methodology guides
- Add more real-world scenarios
π€ Contribute
If you want to contribute or improve something:
- Open an issue
- Submit a pull request
- Suggest new cheatsheets
β οΈ Disclaimer
This content is for educational purposes only.
Always:
- Use on systems you own
- Have proper authorization
π₯ Final thoughts
Cybersecurity is hard β not because it's impossible, but because information is scattered.
This project is my attempt to simplify that.
β If you find it useful, consider starring the repo!
Happy hacking β ethically. π΄
Top comments (2)
Perhaps actually put a link to it?
I added the link! π