10 Platforms To Learn Cybersecurity |
20 Ways to Block Mobile Attacks. |
60 Search Engines For Hackers |
8 Popular Network Protocol |
8 Rules |
A cheat sheet for system designs |
A Cybercriminal’s Path to Your Data |
ABC of Information Security Awareness |
Abusing rundll32.exe |
Active Directory Pentest Tools List |
ActiveDirectory DACL Abuse - Windows Event IDs that can be used to identify malicious modification of a user object |
ActiveDirectory trust types |
AD Attack Path |
AD FSMO Operations Masters Domain and Forest |
AD FSMO |
AD History |
Advantage OF RPM |
Antivirus Event Analysis Cheat Sheet |
apache web server |
API Type |
App password for gmail email |
Audit Policy for Domain controller |
Authentication Mechanism |
Available Packages Levels |
Available Packages |
Awesome SQL Cheatsheet |
AWS Network Architecture |
AWS Network |
AWS vs Azure vs GCP |
Azure Account, Subscription and Directory. |
Azure AD & Microsoft 365 kill chain |
Azure and Azure AD |
Azure-Network-Security-Group |
AzureAD Attach and Defence |
Backend burger |
Bash Shell Cheat Sheet |
bash-shellshock |
Basic IP commands for Windows |
Basic Linux Cheat Sheat |
Basic Linux Commands |
Basic Linux Commands |
Basics of Cyber Security |
Beautiful Vim Cheat Sheet |
Beginner's Python Cheat Sheet |
Best layers in the OSI model |
Best of Cyber Security Model |
Best of Hacking Tools Cheat Sheet |
Best of Logs Cheat Sheet |
Best of OSCP Linux Command Cheat Sheet |
Best of OSI Model Cheat Sheet |
Best of PORTS Cheat Sheet |
Best of SOC Tools |
Best of SQL Cheat Sheet |
Best of SQL Cheat Sheet |
Best of SQL Cheat Sheet_- |
Best of SQL Cheat Sheet_ |
Best of Windows Privileges Cheat Sheet |
Best practise of FSMO roles and Global Catalog (GC) |
Best-Linux-Package-Managers |
BlackHat |
Blue Team Toolkit |
BLUE TEAM TOOLKIT |
boot-sequence |
Bug Bounty Recon |
C-B8B7oXUAA9mrI |
CAP, BASE, SOLID, KISS, What do these acronyms mean |
catlogo |
CCNA and Internetworking Cheat Sheet. |
Certificate Chain |
Certificate Chain1 |
Certificate2 |
ChatGPT resume |
ChatGPT |
Cheat Sheet for Designing Fault-Tolerant Systems |
cheat sheet of different monitoring infrastructure in cloud services |
Cheatsheet on Relational Database Design |
CIDR-IPv4-Subnet-Mask-Cheat-Sheet |
Cisco SD-WAN Advanced Training LAB |
CLI Tools for Linux Admins |
Cloud Computing Notes Cheat sheet |
Cloud Computing |
Cloud Load Balancer Cheat Sheet |
Cluster Netowrking Migration |
Cognitive Biases That Screw up Your Decision |
Colors |
command line cheat sheet |
command |
Common HTTP Status Codes |
Common Ports Cheat Sheet |
Common Types of Password Attacks |
Comprehensive evaluation of the security measures implemented on servers and networks |
Comprehensive guide to learning Data Analytics in 2022 (Updated Version) |
Computer Networking Short Notes |
Computer Ports Identification |
Configuring Storage_1 |
Consumer Authentication Strength Maturity Model |
Cookie, JWT, Token, SSO, and OAuth 2.0 Explained in One Diagram |
core-capabilities |
Cron Cheat sheet |
Cron cheatsheet |
Cron cheatsheet |
CSS Basic cheat sheet |
CURL Cheat Sheet |
Cyber Attack Quick Response |
Cyber Security Certifications |
Cyber Security Cheat Sheett |
Cyber Security Domains Cheat Sheet |
Cyber Security Eco-System |
Cyber Security Read Map |
Cyber Security Small Business Guide |
Cyber Security Small Guide |
CyberSecurity Fields |
Cybersecurity YouTube Channels |
CyberSecurity101 |
DarkGate Malware Activity Spikes as Developer Rents Out Malware to Affiliates 1 |
DarkGate Malware Activity Spikes as Developer Rents Out Malware to Affiliates 2 |
Data is cached everywhere, from the front end to the back end |
DDOS National Cyber Security Center |
Defense in Depth structure of Cyber security |
Dell Storage Manager Client Host Configuration |
Detailed comparison of AWS, Google Cloud, and Microsoft Azure. |
Detecting a Phishing Email |
Detection and investigation in Google Cloud Platform (GCP) |
Difference Between AD and Azure AD |
Digital Evidence Cheat Sheet |
diskpart-extend-partitions |
DiskPart |
DKIM-DMARC-SPF |
DMARK |
DNS and How it works |
DNS and Name Resolution |
DNS Cache Poisoning |
Do you know how an email is delivered |
Email Like a Boss |
email security |
EMC-VNX |
Encoding vs Encryption vs Tokenization. |
ent_desk-mdm_365_vs_intune-f |
Ethical Hacking Proactive Training |
exchange-example |
file-permissions |
filesystem-structure |
file_permissions |
file_permissions1 |
Firewall vs Antivirus |
Fortinet FortiGate Cli Cheat Sheet 1 |
Fortinet FortiGate Cli Cheat Sheet 2 |
Forward proxy and Reverse server |
Forward Proxy vs Reverse Proxy |
Free Storage & Back-up Security Guide To Secure Your Enterprise Data |
FSMO roles for AD |
FSMO Roles |
fsmo-placement |
fsmo |
Fundamentals of cybersecurity |
Git Basic Cheatsheet |
GitOps Workflow - Simplified Visual Guide |
google working like |
Group Policy Loopback |
Hack-The-Box-logo |
Hacking Tools Cheat Sheet |
Hashcat |
Hoe Does HTTPS work |
How can Cache Systems go wrong |
how DNS works |
How do Apple Pay and Google Pay handle sensitive card info |
How Do C++, Java, Python Work |
How do Search Engines Work |
How does HTTPS Work |
How does VISA work when we 𝐬𝐰𝐢𝐩𝐞 𝐚 𝐜𝐫𝐞𝐝𝐢𝐭 𝐜𝐚𝐫𝐝 at a merchant’s shop |
How Firewall Works |
How Git works |
How Internet the Works |
How Spear Phishing Works |
How SSL Certificates Work |
How To Avoid Burnout |
how to become better person |
How to Spot a Pentester |
How to stay Anonymous 101 |
How well do you know your tools |
How Windows security descriptors work. |
HTML Basic CheatSheet |
HTML Input Types Cheatsheet |
HTTP Server Responses Cheat Sheet |
HTTP Status Code You Should Know. |
HTTP Status Code |
HTTP status codes |
HTTP1 to HTTP3 |
Hub Linux Cheat Sheet |
Human Based OSINT |
Hung EventID1002- |
Hung EventID1002 |
Hyper vdd |
Hyper-V planned failover prerequisite and actions |
Hyper-V Replica Explained, Windows Server 2012 Style |
hyperv-replica-overview-2012 |
IDS IPS |
IDS vs IPS |
IDS vs IPS |
IDSvsIPS |
If you can master your time you can master your life heres how |
In the web3 world |
Incident Response Cheat Sheet |
Incident Response Cheat Sheet |
index |
Infographic-on-Windows-wont-boot_ |
Information Security awareness |
Information Security Strategy Cheat Sheet |
Installing Package with RPM |
Internet traffic routing policies (DNS policies) |
Interview feedback |
Interview Preparation Cheat Sheet |
IP Subnetting Cheat Sheet Infographic |
IPS-IDS |
IPsec (Internet Protocol Security) Cheat Sheet |
IPV4 Multicast |
IPv4 Subnetting- |
IPv4 Subnetting |
IPv4 vs IPv6 |
IPv4 vs. IPv6, what are the differences |
IPv4-1 |
IPv4-2 |
IT Job Interview Tips |
IT MAP Design |
Job interview |
Kafka |
Kali Linux Commands Cheat Sheet |
Kali Linux KB |
KeyBoard ShortCut |
Kind Of Packages |
Knowing What Information Your Devices Contains |
Kubernetes cheat sheet |
Layers in the OSI model |
Lazarus Group |
Learn Excel for free |
Let's learn about some basic server types |
Linux System Path |
Linux - file system- |
Linux A Handy Cheatsheet for Engineers |
Linux and MAC command Cheat Sheet |
Linux bash cheatsheet |
Linux Basic Commands |
Linux Cheat Sheat |
Linux Command Cheat Sheet |
Linux Command Cheatsheet List |
linux command cheatsheet |
Linux command every developer should know |
Linux Command Line Cheat Sheet1 |
Linux Command Line Cheat Sheet2 |
Linux Command Line Cheat Sheet3 |
Linux Command |
Linux Container VS VM Container |
Linux Cron Cheat Sheet |
Linux CRON Cheatsheet |
Linux Directory |
Linux File Permission Cheat SHeet 666 |
Linux file permission illustrated. |
Linux File Permission |
Linux File Permission |
Linux File Permissions Cheat Sheet |
Linux file permissions |
Linux file system explained-. |
Linux file system explained. |
Linux file system explained. |
Linux File System-- |
Linux File Systems |
Linux File Systems |
Linux Logical Volume Manager Reference Sheet for sysadmins |
Linux LS |
Linux Performance Tools |
Linux Permissions - |
LinuxDirectory |
Load Balancer Realistic Use Cases |
Load Balancer |
Load Balancers |
lower level commnads |
LS |
Mail Services |
Main Directory format |
Making the meeting completely pointless. |
Maltego |
Malware uses various technique |
Mastering Body Language |
Metaverse Map |
Microsoft Intune Security Steps IT can take aftre you enroll |
Microsoft Intune Use your phone or tablet for work |
microsoft-windows-9-poster |
Mimikats |
Monitoring Tools and Commands 1 |
Monitoring Tools and Commands 2 |
Monitoring Tools and Commands 3 |
Most common registry keys that steal passwords |
Most Used Linux Commands Map |
Most Used Linux Commands Map |
MSA and gMSA |
Multi-tenant organization in Azure Active Directory |
NAS vs SAN vs DAS |
NAS vs SAN |
NAS-VS-SAN |
National Cyber Security Center |
Nessus |
netsh int ip reset |
netsh |
Network Communication Protocol Map |
Network Protocol |
Network-Programming-with-Python-Cheat-Sheet-5 |
Networking Essentials |
Networking Protocol Explained |
Neural Networks Cheat Sheets |
NIST Cybersecurity Framework |
Nmap Cheat Sheet |
NMAP |
O365PricingModel |
One Page Linux Manual |
One Page Linux Manuall |
Org charts comic by Manu Cornet |
OSI Layer and Cyber Attacks |
OSI Layers & Attacks |
OSI Layers and Attack |
OSI Layers and Attacks |
OSI Model Cheat -Sheet |
OSI Model Cheat Sheet |
OSI Model Reference All |
OSI Model Summary- |
OSI model |
OSI MODEL |
OSI Reference Model- |
OSI Reference Model |
OSI- Model Cheat Sheet |
OSINT Landscape |
OSINT Tools _Via Cyber Writes |
OSINT |
Package MGMT |
Package system |
Password Security Tips |
Path to get Job in Cyber Security |
Penetration Tests |
Pentesting Active Driectory |
permissions1 |
Phishing vs Vishing |
POP3 vs IMAP |
Popular password attacks |
possible network attacks in 7 OSI model layers |
PowerShell Basic Cheat Sheet |
PowerShell Cheat Sheet |
Powershell Cheat Sheet |
proc |
proc |
PRODUCTIVITY CHEAT SHEET |
Programmers when their programs dont work |
Python 3 Beginner's Reference Cheat Sheet- |
Python 3 Beginner's Reference Cheat Sheet |
Python 3 Cheat Sheet |
Python Penetration Testing Cheat Sheet |
Python Pentest Cheat Sheet |
Python Pentest Cheat Sheet |
Ransomware Rescue Plan |
Rapid Injection Cheat Sheet |
Redis |
Registry keys that steal passwords |
Reverse Proxy vs. API Gateway vs. Load alancer |
RoboCopy |
Role of a data analyst. Do you agree |
RootCA-IntermediateCA |
RPM- |
RPM-Installing Packages |
RPM |
rpo-rto-infographic |
Sandbox Best Practices1 |
Sandbox Best Practices2 |
sanvsnas |
Scalability, Availability, Reliability, and Performance |
Screen-Shot-2012-02-02-at-3.03.28-PM |
Search Engines for Pentesters |
Secure your API with these 16 Practices |
Security & Privacy by Design Principles |
Security checklist |
Seize FSMO Roles1 |
Seize FSMO Roles2 |
server+cache1 |
Session, Cookie, JWT, Token, SSO, and OAuth 2.0 Explained in One Diagram |
Share-NTFS--Permission |
ShortCut for Office 365 |
Skills needed for Data science. |
SnackOverflow |
Software Defined Radio (SDR) for Hackers, |
Source Control |
Spam Email |
Sql Basic Cheat Sheet |
SQL CheatSheet |
SQL vs NOSQL |
SQL vs NOSQL |
SSH Commands Cheat Sheet |
SSH Port Forwarding Why and How |
SSL (Secure Sockets Layer) certificates |
SSL Cert |
SSL |
Step by Step Installation and Configuratin of Hyper-V Cluster |
storage_protocols |
Sttack |
Subnetting, Subnet Masks and CIDR Notation |
System Design Blueprint The Ultimate Guide |
systemd-vs-sysVinit-cheatsheet-A4 |
TCP uses a three way handshake |
TCP vs UDP |
TCP vs UDP |
TCP |
TcpDump Cheat Sheet |
Tcpdump vs Wireshark |
Text Color |
The Network Intrusion Process |
The ONE page Linux Manual |
The SSL TLS Handshake Process- |
The SSL TLS Handshake Process |
The ultimate Linux cron cheatsheet |
thin-provisioning |
This Provisioning |
time management |
TLD-domain-url1 |
Tokenomics 101 Aave |
Top 10 Active Directory Attack Methods |
Top 4 Forms of Authentication Mechanisms |
Top 4 Most Popular Use Cases for UDP |
Top 6 Firewall Use Cases |
Top 6 Heartbeat Detection Mechanisms |
Top 8 Cyber Attacks |
Top 8 Popular Network Protocols |
Top DevOPS Tools |
Top strategies to reduce latency |
Transfer FSMO Roles |
Turn your interviews into offer letters |
Two Levels Package MGMT |
Type of DNS Records |
Types of Computer memory |
Types of Cyberattacks |
Types of DNS Records |
Types of Firewall |
Types of Memory and Storage |
Types of Privilege Accounts |
Types of VPN Protocols |
Types of VPN Protocols |
Ultimate HTML CheatSheet for Web |
Understanding How Saitama Abuses DNS Protocol |
Uninstalling-Package |
UNIX Linux Command Cheat Sheet |
Unix Permissions |
URL From Your Keyboard to a Fully Loaded Web Page |
Vim Commands Cheat Sheet |
Visual Studio Cheat Sheet |
VMWareResource |
VPN Protocol Security |
WAN Uplink Cabling |
Web App Penetration Testing |
Web application Penetration Testing Checklist 1 |
Web application Penetration Testing Checklist 2 |
Web Proxy Event Analysis Cheat Sheet |
Web3 |
What is an API, and how does it work |
What is an API |
What is Cloud Computing |
What is DevSecOps |
What makes HTTP2 faster than HTTP1 |
When you type www example com |
Which Linux Based OS should i go for |
wiki |
Windows 11 Security Book Update |
Windows Commands Cheat Sheet |
Windows Security Log Quick Reference Cheat-sheet |
Windows useful Directories |
Windows vs Linux |
Wireless Protocol Cheat Sheet |
X.509 |
X.5091 |
YUM |
Zero Trust User Access |
𝗖𝗿𝗼𝘀𝘀-𝗢𝗿𝗶𝗴𝗶𝗻 𝗥𝗲𝘀𝗼𝘂𝗿𝗰𝗲 𝗦𝗵𝗮𝗿𝗶𝗻𝗴 (𝗖𝗢𝗥𝗦) |