├── Free Resources To Learn Cybersecurity ├── Day 1- Overview Cybersecurity ├── Awesome Tips For Resume Prep ├── Day 2 - Setting Up Enviorment ├── README.md ├── Prequisites To Learn Before Starting Into Cybersecurity ├── Day 5 Programming & Scripting For Hackers ├── Bug Bounty Guide ├── Day 4 Web Appplication Security ├── Day 6 Getting Job Ready For Entry Level Roles With No Experience ├── Day 7 Free Cyber Security Courses ├── Day 3 Understanding Common Security Frameworks └── Cheetsheets /Free Resources To Learn Cybersecurity: -------------------------------------------------------------------------------- 1 | Blogs : 2 | 3 | Writeups : 4 | 5 | https://medium.com/infosec 6 | https://infosecwriteups.com/ 7 | 8 | Repositories : 9 | https://github.com/PaulSec/awesome-sec-talks 10 | 11 | 12 | Free Courses : 13 | 14 | https://learndigital.withgoogle.com/digitalgarage/course/introduction-to-cybersecurity 15 | 16 | 17 | 18 | 19 | 20 | 21 | -------------------------------------------------------------------------------- /Day 1- Overview Cybersecurity: -------------------------------------------------------------------------------- 1 | 2 | Cyber Security : Cyber Means Anything Related To Internet Stands Securing Things In Online/digital 3 | Terms So Combinely Cyber Security is a Practice Of SafeGuarding/Securitng Our Online Data. 4 | 5 | Kickstarting Your Career Into Cybersecurity : 6 | 7 | https://www.youtube.com/watch?v=uucrZDKltR0&t=12s 8 | 9 | Cyber Security As a Career : 10 | 11 | https://www.youtube.com/watch?v=uucrZDKltR0&t=12s 12 | 13 | Cyber Security As Carrer & Roadmap ! 14 | 15 | https://www.youtube.com/watch?v=cwOWqPjI1BI 16 | -------------------------------------------------------------------------------- /Awesome Tips For Resume Prep: -------------------------------------------------------------------------------- 1 | Tips : 2 | 3 | 1st. Use A Profesional Format (Student/Job Prof) 4 | 2. Points To Mention Mention : Career Objective | Contact Details | Skills | Keywords Related To Your Stream/domain 5 | 3. Use Hyperlinks For Linkedin/Github 6 | 4. Update All Possible Information By Latest 7 | 5. Add Bullet Points & Keywords Related To Your Work 8 | 7. Make ATS Friendly Resume 9 | 8. Add Prof Certifications / Expeerience In Prof. Manner 10 | 9. Do Minor changes For every diffrenet Profile Youre Applying 11 | 10.Dont Use Same Resume/CV For All Roles 12 | 13 | -------------------------------------------------------------------------------- /Day 2 - Setting Up Enviorment: -------------------------------------------------------------------------------- 1 | 2 | Video Guide : 3 | https://youtu.be/kbwpmjgvzL0 4 | 5 | 6 | Installation Guide : 7 | 8 | https://www.youtube.com/watch?v=mXbnvuVy0jo&t=10s (Kali Linux Virtual Box Tutorial) 9 | https://www.youtube.com/watch?v=B8dmnJLWWG4 (OWASP BWA) 10 | 11 | Hacking OS : 12 | https://www.kali.org/downloads/ 13 | https://www.parrotsec.org/ 14 | 15 | Labs & Enviorment : 16 | 17 | Virtual Box 18 | https://www.virtualbox.org/ 19 | 20 | Metasploitble (PIntentionally Vulnerable Machine) 21 | https://sourceforge.net/projects/metasploitable/ 22 | 23 | OWASP BWA (Curated Vulnerable Enviorments) 24 | https://sourceforge.net/projects/owaspbwa/ 25 | 26 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Cyber-Security-Foundations 2 | 3 | 4 | A curated list of amazingly awesome cybersecurity resources. These resources are colleted & curated from publicly available sources. 5 | Curated Bunch Of Overview , Tools , Courses Etc 6 | 7 | For Any Concerns Mail Us at acelakshitverma@gmail.com 8 | 9 |

10 | 11 | 12 | 13 | ## Contact 14 | 15 | Lakshit Verma - [@acelakshitverma](https://twitter.com/your_acelakshitverma) 16 | 17 | Subscribe To Our Youtube Channel - [@Youtube Channel](https://youtube.com/AceTrivia) 18 | 19 | Project Link: [https://github.com/acelakshitverma/Cyber-Security-Foundations](https://github.com/acelakshitverma/Cyber-Security-Foundations) 20 | 21 | -------------------------------------------------------------------------------- /Prequisites To Learn Before Starting Into Cybersecurity: -------------------------------------------------------------------------------- 1 | 2 | 3 | 1. Computer Fundamentals : 4 | 5 | https://www.geeksforgeeks.org/computer-organization-and-architecture-tutorials/ 6 | 7 | 2. Networking : 8 | 9 | https://www.cisco.com/c/en_in/solutions/small-business/resource-center/networking/networking-basics.html#~switches 10 | https://www.geeksforgeeks.org/basics-computer-networking/ 11 | 12 | 3. Opearting Systems : 13 | https://www.tutorialspoint.com/operating_system/index.htm 14 | Android Basics: https://www.educba.com/android-operating-system/ 15 | Windows Basics: https://www.educba.com/introduction-to-windows/ 16 | 17 | 4. Linux : 18 | 19 | https://linuxjourney.com/ 20 | 21 | 5. Programming : 22 | 23 | https://www.codecademy.com/ 24 | https://www.sololearn.com/home 25 | 26 | -------------------------------------------------------------------------------- /Day 5 Programming & Scripting For Hackers: -------------------------------------------------------------------------------- 1 | Programming : Process Of Doing Coding With Integrating Security Issue Patches 2 | fsScripting : Process Of Devoloping Tools For Automating Stufs 3 | 4 | Why To Learn : 5 | 6 | 1.Stuy & Manipulation Of Code 7 | 2.Finding Security Issues 8 | 3.Automation & Scripting 9 | 10 | Languages To Learn : 11 | 12 | Website Security : HTML + CSSS + JAVA + SQL + PHP 13 | Application Security : 14 | MalwareAnalysis / Exploit Dev / Reverse Engineering : 15 | Security Automation : Python / Bash 16 | Scripting : Ruby | Perl | 17 | 18 | Links To Learn : 19 | 20 | https://www.sololearn.com/learning 21 | https://www.tutorialspoint.com/assembly_programming/assembly_introduction.htm 22 | https://www.tutorialspoint.com/python/index.htm 23 | https://www.tutorialspoint.com/cprogramming/index.htm 24 | https://www.w3schools.com/cpp/ 25 | 26 | -------------------------------------------------------------------------------- /Bug Bounty Guide: -------------------------------------------------------------------------------- 1 | Prerequisites : 2 | 3 | Devolopment Basis (According t6o platform for example website) 4 | Burpsuite / or any proxy scanner 5 | 6 | Platforms : 7 | 8 | https://www.bugcrowd.com/bug-bounty-list/ 9 | https://hackerone.com/bug-bounty-programs 10 | https://www.openbugbounty.org/ 11 | 12 | Books : 13 | 14 | Web Hacking 101 15 | Web Application Hackers Handbook 16 | HackerPlaybook (All Series) 17 | 18 | Labs : 19 | https://portswigger.net/web-security 20 | https://application.security/ 21 | 22 | Resources To Learn : 23 | 24 | https://owasp.org/www-project-top-ten/ 25 | https://blog.intigriti.com/ 26 | https://owasp.org/www-project-mobile-top-10/ 27 | https://hackerone.com/reports/745324 28 | https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters 29 | https://github.com/djadmin/awesome-bug-bounty 30 | https://github.com/EdOverflow/bugbounty-cheatsheet 31 | -------------------------------------------------------------------------------- /Day 4 Web Appplication Security: -------------------------------------------------------------------------------- 1 | The web application is one of the widely encountered things during my journey as an application security engineer and offensive security guy. 2 | Most of the externally faced resources of any organization are web applications 3 | 4 | Before diving deeper into how to test for Web Application Security, it is essential to know various concepts about Web Application, their communication, and components. This includes understanding how an HTTP Request is formed, how HTTP Response works, what are the various security headers, browser security features, what is CSP and CORS, etc. This is a basic concept and will eventually help you throughout your journey as Application Security Guy! 5 | 6 | Resources to learn Basic Concepts 7 | 8 | About HTTP: https://developer.mozilla.org/en-US/docs/Web/HTTP 9 | HTTP Headers: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers 10 | HTTP Security: https://developer.mozilla.org/en-US/docs/Web/Security 11 | Content-Security Policy: https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP 12 | HTTP Cookies: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies#Secure_and_HttpOnly_cookies 13 | Web Security Cheatsheet: https://infosec.mozilla.org/guidelines/web_security 14 | Cross-Origin Resource Sharing: https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS 15 | 16 | 17 | 18 | Portswigger Lab : https://portswigger.net/web-security 19 | OWASP Web Top 10: https://owasp.org/www-project-top-ten/ 20 | OWASP API Top 10: https://owasp.org/www-project-api-security/ 21 | OWASP Mobile Top 10: https://owasp.org/www-project-mobile-top-10/ 22 | OWASP Vulnerability Management Guide: https://owasp.org/www-project-vulnerability-management-guide/OWASP-Vuln-Mgm-Guide-Jul23-2020.pdf 23 | OWASP Risk Rating Methodology: https://owasp.org/www-community/OWASP_Risk_Rating_Methodology 24 | 25 | -------------------------------------------------------------------------------- /Day 6 Getting Job Ready For Entry Level Roles With No Experience: -------------------------------------------------------------------------------- 1 | Security Operating Systems : 2 | 3 | https://www.parrotsec.org/ 4 | https://kali.org/ 5 | 6 | 7 | Security Fundamentals : Networking & Operating System 8 | 9 | Linux Basics: https://linuxjourney.com/ 10 | Android Basics: https://www.educba.com/android-operating-system/ 11 | Windows Basics: https://www.educba.com/introduction-to-windows/ 12 | Operating System Basics: https://www.tutorialspoint.com/operating_system/index.htm 13 | Networking : https://www.cisco.com/c/en_in/solutions/small-business/resource-center/networking/networking-basics.html#~wireless-networking 14 | https://www.geeksforgeeks.org/basics-computer-networking/ 15 | 16 | What To Learn : 17 | 18 | OWASP Top 10 Web App Vulnerabilities: https://owasp.org/www-project-top-ten/ 19 | https://www.mcafee.com/enterprise/en-in/security-awareness/cybersecurity/what-is-mitre-attack-framework.html 20 | https://www.sans.org/top25-software-errors/ 21 | 22 | Free online cyber security programs/certs/MOOCs: 23 | 24 | https://www.onlinecoursereport.com/free/cybersecurity/ 25 | https://www.nist.gov/itl/applied-cybersecurity/nice/resources/online-learning-content 26 | https://www.cyberaces.org/ 27 | https://www.cyberdegrees.org/resources/free-online-courses/ 28 | 29 | 30 | CTF Challenges 31 | 32 | 1. Basics 33 | 1. Competitions 34 | PicoCTF: https://picoctf.com/ 35 | 2. Online Practice Labs 36 | Hacker101: https://www.hacker101.com/ 37 | TryHackMe: https://tryhackme.com 38 | 39 | 2. Intermediate to Advanced 40 | 1. Competitions 41 | HITCON CTF: https://ctf2019.hitcon.org/ 42 | Google CTF: https://capturetheflag.withgoogle.com/ 43 | 2. Online Practice Labs 44 | HackTheBox: https://www.hackthebox.eu/ 45 | OverTheWire: https://overthewire.org/wargames/ 46 | Natas: https://overthewire.org/wargames/natas/ 47 | Bandit: https://overthewire.org/wargames/bandit/ 48 | 49 | 50 | -------------------------------------------------------------------------------- /Day 7 Free Cyber Security Courses: -------------------------------------------------------------------------------- 1 | Selected Certifications in Cyber Security :) 2 | 3 | 1. ICS-CERT VLP 4 | https://ics-cert-training.inl.gov/learn 5 | 6 | 2. CNSS | ICSI https://www.icsi.co.uk/users/sign_in 7 | 8 | 3. Digital Forensics | Autopsy 9 | https://training.autopsy.com/users/sign_in 10 | 11 | 4. Forensics FTK | AccessData 12 | https://training.accessdata.com/ 13 | 14 | 5. eLearncollege 15 | https://www.elearningcollege.com/login.php 16 | 17 | 6. Introduction to CyberSecurity | eLearn Uttrakhand 18 | http://elearning.uou.ac.in/ 19 | 20 | 7. PTS vStudent | elearnsecurity 21 | https://members.elearnsecurity.com/ 22 | 23 | 8. BurpSuite | Ethical Hacking 24 | https://academy.ehacking.net/courses/ 25 | 26 | 9. Cybersecurity | Infysec 27 | https://academy.infysec.com/ 28 | 29 | 10. NSE Associate 2 | Fortinet 30 | https://training.fortinet.com/ 31 | 32 | 11. Nessus Course | Tenable University 33 | https://university.tenable.com/learn/course/ 34 | 35 | 12. Certified Mobilyze Operator | BlackBag Tech. 36 | https://www.blackbagtech.com/training/certifications/ 37 | 38 | 13. Free Short Certifications | Charles Sturt University 39 | https://www.itmasters.edu.au/about-it-masters/free-short-courses/ 40 | 41 | 14. Oracle Courses | Oracle University 42 | https://learn.oracle.com/ols/course-list/35644 43 | 44 | 15.https://learndigital.withgoogle.com/digitalgarage/course/introduction-to-cybersecurity 45 | 46 | 16. 47 | https://www.netacad.com/courses/cybersecurity 48 | 49 | 17. 50 | https://training.fortinet.com/local/staticpage/view.php?page=certifications 51 | 52 | 18 53 | https://www.edx.org/course/fundamentals-of-red-hat-enterprise-linux 54 | 55 | 19. 56 | https://www.securitylearningacademy.com/local/navigator/index.php 57 | 58 | 20. 59 | https://info.microsoft.com/US-AzureApp-CATALOG-FY20-05May-12-TrainingAzure900fundamentalsforeducation-SRDEM15957_CatalogDisplayPage.html?fbclid=IwAR0E3ahbcZfbyiTLhHMS_AAYGUTULGetPLfSb55eLRQMZVobgnBeronXTY0 60 | 61 | 21. 62 | https://www.cybrary.it/catalog/cybersecurity/ 63 | 64 | Enjoy 👍 65 | -------------------------------------------------------------------------------- /Day 3 Understanding Common Security Frameworks: -------------------------------------------------------------------------------- 1 | Once you have gained enough understanding about the basic concepts of Web Application, Operating Systems & Computer Networks, the next part before exploring the Security perspective is to understand some of the common security frameworks which are followed at the industry standard. This is going to help you in proper referencing and understanding which category your security vulnerability lies in. How you can rate the severity of an identified security issue and how to approach for remediation. 2 | 3 | OWASP: The Open Web Application Security Project is an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security. 4 | 5 | OWASP Web Top 10: https://owasp.org/www-project-top-ten/ 6 | OWASP API Top 10: https://owasp.org/www-project-api-security/ 7 | OWASP Mobile Top 10: https://owasp.org/www-project-mobile-top-10/ 8 | OWASP ASVS: https://owasp.org/www-project-application-security-verification-standard/ 9 | OWASP Vulnerability Management Guide: https://owasp.org/www-project-vulnerability-management-guide/OWASP-Vuln-Mgm-Guide-Jul23-2020.pdf 10 | OWASP Risk Rating Methodology: https://owasp.org/www-community/OWASP_Risk_Rating_Methodology 11 | 12 | STRIDE: The STRIDE model was developed by Microsoft in order to help security engineers understand and classify all possible threats on a server. 13 | The name of this model is an acronym for the six main types of threats. 14 | 15 | Read More: https://docs.microsoft.com/en-us/previous-versions/commerce-server/ee823878(v=cs.20)?redirectedfrom=MSDN 16 | 17 | CVSS: The Common Vulnerability Scoring System (CVSS) provides a way to capture the principal characteristics of a vulnerability and produce a numerical score reflecting its severity. The numerical score can then be translated into a qualitative representation (such as low, medium, high, and critical) to help organizations properly assess and prioritize their vulnerability management processes. 18 | 19 | Read More: https://www.first.org/cvss/ 20 | -------------------------------------------------------------------------------- /Cheetsheets: -------------------------------------------------------------------------------- 1 | Windows and Linux Terminals & Command Lines: https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/bltea7de5267932e94b/5eb08aafcf88d36e47cf0644/Cheatsheet_SEC301-401_R7.pdf 2 | 3 | TCP/IP and tcpdump: https://www.sans.org/security-resources/tcpip.pdf?msc=Cheat+Sheet+Blog 4 | 5 | IPv6 Pocket Guide: https://www.sans.org/security-resources/ipv6_tcpip_pocketguide.pdf?msc=Cheat+Sheet+Blog 6 | 7 | Powershell Cheat Sheet: https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/bltf146e4f361db3938/5e34a7bc946d717e2eab6139/power-shell-cheat-sheet-v41.pdf 8 | 9 | Critical Log Review Checklist for Security Incidents: https://zeltser.com/security-incident-log-review-checklist/ 10 | 11 | Security Architecture Cheat Sheet for Internet Applications: https://zeltser.com/security-architecture-cheat-sheet/ 12 | 13 | Security Incident Survey Cheat Sheet for Server Administrators: https://zeltser.com/security-incident-survey-cheat-sheet/ 14 | 15 | Network DDoS Incident Response Cheat Sheet: https://zeltser.com/ddos-incident-cheat-sheet/ 16 | 17 | Information Security Assessment RFP Cheat Sheet: https://zeltser.com/cheat-sheets/ 18 | 19 | Privilege-Escalation: This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples: 20 | https://github.com/Ignitetechnologies/Privilege-Escalation 21 | 22 | Malware analysis tools and resources: https://github.com/rshipp/awesome-malware-analysis 23 | 24 | Analyzing Malicious Documents Cheat Sheet: https://zeltser.com/analyzing-malicious-documents/ 25 | 26 | ReverseEngineering Cheat Sheet: https://www.cybrary.it/wp-content/uploads/2017/11/cheat-sheet-reverse-v6.png 27 | 28 | SQL Injection | Various DBs: http://pentestmonkey.net/category/cheat-sheet/sql-injection 29 | 30 | Nmap Cheat Sheet and Pro Tips: https://hackertarget.com/nmap-cheatsheet-a-quick-reference-guide/ 31 | 32 | PENTESTING LocalFileInclude Cheat Sheet: https://highon.coffee/blog/lfi-cheat-sheet/ 33 | 34 | Penetration Testing Tools Cheat Sheet: https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/ 35 | 36 | Reverse Shell Cheat Sheet: https://highon.coffee/blog/reverse-shell-cheat-sheet/ 37 | 38 | nbtscan Cheat Sheet: https://highon.coffee/blog/nbtscan-cheat-sheet/ 39 | 40 | Linux Commands Cheat Sheet: https://highon.coffee/blog/linux-commands-cheat-sheet/ 41 | 42 | Kali Linux Cheat Sheet: https://i.redd.it/9bu827i9tr751.jpg 43 | 44 | Hacking Tools Cheat Sheet (Diff tools): https://i.redd.it/fviaw8s43q851.jpg 45 | 46 | Google Search Operators: The Complete List (42 Advanced Operators) https://ahrefs.com/blog/google-advanced-search-operators/ 47 | 48 | (Multiple) (Good) Cheat Sheets – Imgur https://imgur.com/gallery/U5jqgik 49 | 50 | Active-Directory-Exploitation-Cheat-Sheet: A cheat sheet that contains common enumeration and attack methods for Windows Active Directory: https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet 51 | 52 | Shodan Query Filters: https://github.com/JavierOlmedo/shodan-filters 53 | 54 | Getting Real with XSS – A reference on the new technquies to XSS: https://labs.f-secure.com/blog/getting-real-with-xss/ 55 | 56 | SANS Massive List of Cheat Sheets Curated from here: https://www.sans.org/blog/the-ultimate-list-of-sans-cheat-sheets/ 57 | 58 | SIFT Workstation Cheat Sheet: https://digital-forensics.sans.org/media/sift_cheat_sheet.pdf?msc=Cheat+Sheet+Blog 59 | 60 | Plaso Filtering Cheat Sheet: https://digital-forensics.sans.org/media/Plaso-Cheat-Sheet.pdf?msc=Cheat+Sheet+Blog 61 | 62 | Tips for Reverse-Engineering Malicious Code: https://digital-forensics.sans.org/media/reverse-engineering-malicious-code-tips.pdf?msc=Cheat+Sheet+Blog 63 | 64 | REMnux Usage Tips for Malware Analysis on Linux: https://digital-forensics.sans.org/media/remnux-malware-analysis-tips.pdf?msc=Cheat+Sheet+Blog 65 | 66 | Analyzing Malicious Documents: https://digital-forensics.sans.org/media/analyzing-malicious-document-files.pdf?msc=Cheat+Sheet+Blog 67 | 68 | Malware Analysis and Reverse-Engineering Cheat Sheet: https://digital-forensics.sans.org/media/malware-analysis-cheat-sheet.pdf?msc=Cheat+Sheet+Blog 69 | 70 | SQlite Pocket Reference Guide: https://digital-forensics.sans.org/media/SQlite-PocketReference-final.pdf?msc=Cheat+Sheet+Blog 71 | 72 | Eric Zimmerman’s tools Cheat Sheet: https://digital-forensics.sans.org/media/EricZimmermanCommandLineToolsCheatSheet-v1.0.pdf?msc=Cheat+Sheet+Blog 73 | 74 | Rekall Memory Forensics Cheat Sheet: https://digital-forensics.sans.org/media/rekall-memory-forensics-cheatsheet.pdf?msc=Cheat+Sheet+Blog 75 | 76 | Linux Shell Survival Guide: https://digital-forensics.sans.org/media/linux-shell-survival-guide.pdf?msc=Cheat+Sheet+Blog 77 | 78 | Windows to Unix Cheat Sheet: https://digital-forensics.sans.org/media/windows_to_unix_cheatsheet.pdf?msc=Cheat+Sheet+Blog 79 | 80 | Memory Forensics Cheat Sheet: https://digital-forensics.sans.org/media/volatility-memory-forensics-cheat-sheet.pdf?msc=Cheat+Sheet+Blog 81 | 82 | Hex and Regex Forensics Cheat Sheet: https://digital-forensics.sans.org/media/hex_file_and_regex_cheat_sheet.pdf?msc=Cheat+Sheet+Blog 83 | 84 | FOR518 Mac & iOS HFS+ Filesystem Reference Sheet: https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt61c336e02577e733/5eb0940e248a28605479ccf0/FOR518_APFS_CheatSheet_012020.pdf 85 | 86 | The majority of DFIR Cheat Sheets can be found here –> https://digital-forensics.sans.org/community/cheat-sheets?msc=Cheat+Sheet+Blog. 87 | 88 | Windows Intrusion Discovery Cheat Sheet v3.0: https://pen-testing.sans.org/retrieve/windows-cheat-sheet.pdf?msc=Cheat+Sheet+Blog 89 | 90 | Intrusion Discovery Cheat Sheet v2.0 (Linux): https://pen-testing.sans.org/retrieve/linux-cheat-sheet.pdf?msc=Cheat+Sheet+Blog 91 | 92 | Intrusion Discovery Cheat Sheet v2.0 (Windows 2000): https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/bltd6fa777a3215f34a/5eb08aae08d37e6d82ef77fe/win2ksacheatsheet.pdf 93 | 94 | Windows Command Line: https://pen-testing.sans.org/retrieve/windows-command-line-sheet.pdf?msc=Cheat+Sheet+Blog 95 | 96 | Netcat Cheat Sheet: https://pen-testing.sans.org/retrieve/netcat-cheat-sheet.pdf?msc=Cheat+Sheet+Blog 97 | 98 | Misc Tools Cheat Sheet: https://pen-testing.sans.org/retrieve/misc-tools-sheet.pdf?msc=Cheat+Sheet+Blog 99 | 100 | Python 3 Essentials: https://www.sans.org/blog/sans-cheat-sheet-python-3/?msc=Cheat+Sheet+Blog 101 | 102 | Windows Command Line Cheat Sheet: https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt4e45e00c2973546d/5eb08aae4461f75d77a48fd4/WindowsCommandLineSheetV1.pdf 103 | 104 | SMB Access from Linux Cheat Sheet: https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blta6a2ae64ec0ed535/5eb08aaeead3926127b4df44/SMB-Access-from-Linux.pdf 105 | 106 | Pivot Cheat Sheet: https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt0f228a4b9a1165e4/5ef3d602395b554cb3523e7b/pivot-cheat-sheet-v1.0.pdf 107 | 108 | Google Hacking and Defense Cheat Sheet: https://www.sans.org/security-resources/GoogleCheatSheet.pdf?msc=Cheat+Sheet+Blog 109 | 110 | Scapy Cheat Sheet: https://wiki.sans.blue/Tools/pdfs/ScapyCheatSheet_v0.2.pdf 111 | 112 | Nmap Cheat Sheet: https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blte37ba962036d487b/5eb08aae26a7212f2db1c1da/NmapCheatSheetv1.1.pdf 113 | 114 | Multicloud Cheat Sheet: https://www.sans.org/security-resources/posters/cloud/multicloud-cheat-sheet-215?msc=blog-ultimate-list-cheat-sheets 115 | 116 | Linux CLI 101: https://wiki.sans.blue/Tools/pdfs/LinuxCLI101.pdf 117 | 118 | Linux CLI: https://wiki.sans.blue/Tools/pdfs/LinuxCLI.pdf 119 | 120 | PowerShell Primer: https://wiki.sans.blue/Tools/pdfs/PowerShell.pdf 121 | 122 | PowerShell Get-WinEvent: https://wiki.sans.blue/Tools/pdfs/Get-WinEvent.pdf 123 | 124 | --------------------------------------------------------------------------------