File Report

File Name
10 Platforms To Learn Cybersecurity
20 Ways to Block Mobile Attacks.
60 Search Engines For Hackers
8 Popular Network Protocol
8 Rules
A cheat sheet for system designs
A Cybercriminal’s Path to Your Data
ABC of Information Security Awareness
Abusing rundll32.exe
Active Directory Pentest Tools List
ActiveDirectory DACL Abuse - Windows Event IDs that can be used to identify malicious modification of a user object
ActiveDirectory trust types
AD Attack Path
AD FSMO Operations Masters Domain and Forest
AD FSMO
AD History
Advantage OF RPM
Antivirus Event Analysis Cheat Sheet
apache web server
API Type
App password for gmail email
Audit Policy for Domain controller
Authentication Mechanism
Available Packages Levels
Available Packages
Awesome SQL Cheatsheet
AWS Network Architecture
AWS Network
AWS vs Azure vs GCP
Azure Account, Subscription and Directory.
Azure AD & Microsoft 365 kill chain
Azure and Azure AD
Azure-Network-Security-Group
AzureAD Attach and Defence
Backend burger
Bash Shell Cheat Sheet
bash-shellshock
Basic IP commands for Windows
Basic Linux Cheat Sheat
Basic Linux Commands
Basic Linux Commands
Basics of Cyber Security
Beautiful Vim Cheat Sheet
Beginner's Python Cheat Sheet
Best layers in the OSI model
Best of Cyber Security Model
Best of Hacking Tools Cheat Sheet
Best of Logs Cheat Sheet
Best of OSCP Linux Command Cheat Sheet
Best of OSI Model Cheat Sheet
Best of PORTS Cheat Sheet
Best of SOC Tools
Best of SQL Cheat Sheet
Best of SQL Cheat Sheet
Best of SQL Cheat Sheet_-
Best of SQL Cheat Sheet_
Best of Windows Privileges Cheat Sheet
Best practise of FSMO roles and Global Catalog (GC)
Best-Linux-Package-Managers
BlackHat
Blue Team Toolkit
BLUE TEAM TOOLKIT
boot-sequence
Bug Bounty Recon
C-B8B7oXUAA9mrI
CAP, BASE, SOLID, KISS, What do these acronyms mean
catlogo
CCNA and Internetworking Cheat Sheet.
Certificate Chain
Certificate Chain1
Certificate2
ChatGPT resume
ChatGPT
Cheat Sheet for Designing Fault-Tolerant Systems
cheat sheet of different monitoring infrastructure in cloud services
Cheatsheet on Relational Database Design
CIDR-IPv4-Subnet-Mask-Cheat-Sheet
Cisco SD-WAN Advanced Training LAB
CLI Tools for Linux Admins
Cloud Computing Notes Cheat sheet
Cloud Computing
Cloud Load Balancer Cheat Sheet
Cluster Netowrking Migration
Cognitive Biases That Screw up Your Decision
Colors
command line cheat sheet
command
Common HTTP Status Codes
Common Ports Cheat Sheet
Common Types of Password Attacks
Comprehensive evaluation of the security measures implemented on servers and networks
Comprehensive guide to learning Data Analytics in 2022 (Updated Version)
Computer Networking Short Notes
Computer Ports Identification
Configuring Storage_1
Consumer Authentication Strength Maturity Model
Cookie, JWT, Token, SSO, and OAuth 2.0 Explained in One Diagram
core-capabilities
Cron Cheat sheet
Cron cheatsheet
Cron cheatsheet
CSS Basic cheat sheet
CURL Cheat Sheet
Cyber Attack Quick Response
Cyber Security Certifications
Cyber Security Cheat Sheett
Cyber Security Domains Cheat Sheet
Cyber Security Eco-System
Cyber Security Read Map
Cyber Security Small Business Guide
Cyber Security Small Guide
CyberSecurity Fields
Cybersecurity YouTube Channels
CyberSecurity101
DarkGate Malware Activity Spikes as Developer Rents Out Malware to Affiliates 1
DarkGate Malware Activity Spikes as Developer Rents Out Malware to Affiliates 2
Data is cached everywhere, from the front end to the back end
DDOS National Cyber Security Center
Defense in Depth structure of Cyber security
Dell Storage Manager Client Host Configuration
Detailed comparison of AWS, Google Cloud, and Microsoft Azure.
Detecting a Phishing Email
Detection and investigation in Google Cloud Platform (GCP)
Difference Between AD and Azure AD
Digital Evidence Cheat Sheet
diskpart-extend-partitions
DiskPart
DKIM-DMARC-SPF
DMARK
DNS and How it works
DNS and Name Resolution
DNS Cache Poisoning
Do you know how an email is delivered
Email Like a Boss
email security
EMC-VNX
Encoding vs Encryption vs Tokenization.
ent_desk-mdm_365_vs_intune-f
Ethical Hacking Proactive Training
exchange-example
file-permissions
filesystem-structure
file_permissions
file_permissions1
Firewall vs Antivirus
Fortinet FortiGate Cli Cheat Sheet 1
Fortinet FortiGate Cli Cheat Sheet 2
Forward proxy and Reverse server
Forward Proxy vs Reverse Proxy
Free Storage & Back-up Security Guide To Secure Your Enterprise Data
FSMO roles for AD
FSMO Roles
fsmo-placement
fsmo
Fundamentals of cybersecurity
Git Basic Cheatsheet
GitOps Workflow - Simplified Visual Guide
google working like
Group Policy Loopback
Hack-The-Box-logo
Hacking Tools Cheat Sheet
Hashcat
Hoe Does HTTPS work
How can Cache Systems go wrong
how DNS works
How do Apple Pay and Google Pay handle sensitive card info
How Do C++, Java, Python Work
How do Search Engines Work
How does HTTPS Work
How does VISA work when we 𝐬𝐰𝐢𝐩𝐞 𝐚 𝐜𝐫𝐞𝐝𝐢𝐭 𝐜𝐚𝐫𝐝 at a merchant’s shop
How Firewall Works
How Git works
How Internet the Works
How Spear Phishing Works
How SSL Certificates Work
How To Avoid Burnout
how to become better person
How to Spot a Pentester
How to stay Anonymous 101
How well do you know your tools
How Windows security descriptors work.
HTML Basic CheatSheet
HTML Input Types Cheatsheet
HTTP Server Responses Cheat Sheet
HTTP Status Code You Should Know.
HTTP Status Code
HTTP status codes
HTTP1 to HTTP3
Hub Linux Cheat Sheet
Human Based OSINT
Hung EventID1002-
Hung EventID1002
Hyper vdd
Hyper-V planned failover prerequisite and actions
Hyper-V Replica Explained, Windows Server 2012 Style
hyperv-replica-overview-2012
IDS IPS
IDS vs IPS
IDS vs IPS
IDSvsIPS
If you can master your time you can master your life heres how
In the web3 world
Incident Response Cheat Sheet
Incident Response Cheat Sheet
index
Infographic-on-Windows-wont-boot_
Information Security awareness
Information Security Strategy Cheat Sheet
Installing Package with RPM
Internet traffic routing policies (DNS policies)
Interview feedback
Interview Preparation Cheat Sheet
IP Subnetting Cheat Sheet Infographic
IPS-IDS
IPsec (Internet Protocol Security) Cheat Sheet
IPV4 Multicast
IPv4 Subnetting-
IPv4 Subnetting
IPv4 vs IPv6
IPv4 vs. IPv6, what are the differences
IPv4-1
IPv4-2
IT Job Interview Tips
IT MAP Design
Job interview
Kafka
Kali Linux Commands Cheat Sheet
Kali Linux KB
KeyBoard ShortCut
Kind Of Packages
Knowing What Information Your Devices Contains
Kubernetes cheat sheet
Layers in the OSI model
Lazarus Group
Learn Excel for free
Let's learn about some basic server types
Linux System Path
Linux - file system-
Linux A Handy Cheatsheet for Engineers
Linux and MAC command Cheat Sheet
Linux bash cheatsheet
Linux Basic Commands
Linux Cheat Sheat
Linux Command Cheat Sheet
Linux Command Cheatsheet List
linux command cheatsheet
Linux command every developer should know
Linux Command Line Cheat Sheet1
Linux Command Line Cheat Sheet2
Linux Command Line Cheat Sheet3
Linux Command
Linux Container VS VM Container
Linux Cron Cheat Sheet
Linux CRON Cheatsheet
Linux Directory
Linux File Permission Cheat SHeet 666
Linux file permission illustrated.
Linux File Permission
Linux File Permission
Linux File Permissions Cheat Sheet
Linux file permissions
Linux file system explained-.
Linux file system explained.
Linux file system explained.
Linux File System--
Linux File Systems
Linux File Systems
Linux Logical Volume Manager Reference Sheet for sysadmins
Linux LS
Linux Performance Tools
Linux Permissions -
LinuxDirectory
Load Balancer Realistic Use Cases
Load Balancer
Load Balancers
lower level commnads
LS
Mail Services
Main Directory format
Making the meeting completely pointless.
Maltego
Malware uses various technique
Mastering Body Language
Metaverse Map
Microsoft Intune Security Steps IT can take aftre you enroll
Microsoft Intune Use your phone or tablet for work
microsoft-windows-9-poster
Mimikats
Monitoring Tools and Commands 1
Monitoring Tools and Commands 2
Monitoring Tools and Commands 3
Most common registry keys that steal passwords
Most Used Linux Commands Map
Most Used Linux Commands Map
MSA and gMSA
Multi-tenant organization in Azure Active Directory
NAS vs SAN vs DAS
NAS vs SAN
NAS-VS-SAN
National Cyber Security Center
Nessus
netsh int ip reset
netsh
Network Communication Protocol Map
Network Protocol
Network-Programming-with-Python-Cheat-Sheet-5
Networking Essentials
Networking Protocol Explained
Neural Networks Cheat Sheets
NIST Cybersecurity Framework
Nmap Cheat Sheet
NMAP
O365PricingModel
One Page Linux Manual
One Page Linux Manuall
Org charts comic by Manu Cornet
OSI Layer and Cyber Attacks
OSI Layers & Attacks
OSI Layers and Attack
OSI Layers and Attacks
OSI Model Cheat -Sheet
OSI Model Cheat Sheet
OSI Model Reference All
OSI Model Summary-
OSI model
OSI MODEL
OSI Reference Model-
OSI Reference Model
OSI- Model Cheat Sheet
OSINT Landscape
OSINT Tools _Via Cyber Writes
OSINT
Package MGMT
Package system
Password Security Tips
Path to get Job in Cyber Security
Penetration Tests
Pentesting Active Driectory
permissions1
Phishing vs Vishing
POP3 vs IMAP
Popular password attacks
possible network attacks in 7 OSI model layers
PowerShell Basic Cheat Sheet
PowerShell Cheat Sheet
Powershell Cheat Sheet
proc
proc
PRODUCTIVITY CHEAT SHEET
Programmers when their programs dont work
Python 3 Beginner's Reference Cheat Sheet-
Python 3 Beginner's Reference Cheat Sheet
Python 3 Cheat Sheet
Python Penetration Testing Cheat Sheet
Python Pentest Cheat Sheet
Python Pentest Cheat Sheet
Ransomware Rescue Plan
Rapid Injection Cheat Sheet
Redis
Registry keys that steal passwords
Reverse Proxy vs. API Gateway vs. Load alancer
RoboCopy
Role of a data analyst. Do you agree
RootCA-IntermediateCA
RPM-
RPM-Installing Packages
RPM
rpo-rto-infographic
Sandbox Best Practices1
Sandbox Best Practices2
sanvsnas
Scalability, Availability, Reliability, and Performance
Screen-Shot-2012-02-02-at-3.03.28-PM
Search Engines for Pentesters
Secure your API with these 16 Practices
Security & Privacy by Design Principles
Security checklist
Seize FSMO Roles1
Seize FSMO Roles2
server+cache1
Session, Cookie, JWT, Token, SSO, and OAuth 2.0 Explained in One Diagram
Share-NTFS--Permission
ShortCut for Office 365
Skills needed for Data science.
SnackOverflow
Software Defined Radio (SDR) for Hackers,
Source Control
Spam Email
Sql Basic Cheat Sheet
SQL CheatSheet
SQL vs NOSQL
SQL vs NOSQL
SSH Commands Cheat Sheet
SSH Port Forwarding Why and How
SSL (Secure Sockets Layer) certificates
SSL Cert
SSL
Step by Step Installation and Configuratin of Hyper-V Cluster
storage_protocols
Sttack
Subnetting, Subnet Masks and CIDR Notation
System Design Blueprint The Ultimate Guide
systemd-vs-sysVinit-cheatsheet-A4
TCP uses a three way handshake
TCP vs UDP
TCP vs UDP
TCP
TcpDump Cheat Sheet
Tcpdump vs Wireshark
Text Color
The Network Intrusion Process
The ONE page Linux Manual
The SSL TLS Handshake Process-
The SSL TLS Handshake Process
The ultimate Linux cron cheatsheet
thin-provisioning
This Provisioning
time management
TLD-domain-url1
Tokenomics 101 Aave
Top 10 Active Directory Attack Methods
Top 4 Forms of Authentication Mechanisms
Top 4 Most Popular Use Cases for UDP
Top 6 Firewall Use Cases
Top 6 Heartbeat Detection Mechanisms
Top 8 Cyber Attacks
Top 8 Popular Network Protocols
Top DevOPS Tools
Top strategies to reduce latency
Transfer FSMO Roles
Turn your interviews into offer letters
Two Levels Package MGMT
Type of DNS Records
Types of Computer memory
Types of Cyberattacks
Types of DNS Records
Types of Firewall
Types of Memory and Storage
Types of Privilege Accounts
Types of VPN Protocols
Types of VPN Protocols
Ultimate HTML CheatSheet for Web
Understanding How Saitama Abuses DNS Protocol
Uninstalling-Package
UNIX Linux Command Cheat Sheet
Unix Permissions
URL From Your Keyboard to a Fully Loaded Web Page
Vim Commands Cheat Sheet
Visual Studio Cheat Sheet
VMWareResource
VPN Protocol Security
WAN Uplink Cabling
Web App Penetration Testing
Web application Penetration Testing Checklist 1
Web application Penetration Testing Checklist 2
Web Proxy Event Analysis Cheat Sheet
Web3
What is an API, and how does it work
What is an API
What is Cloud Computing
What is DevSecOps
What makes HTTP2 faster than HTTP1
When you type www example com
Which Linux Based OS should i go for
wiki
Windows 11 Security Book Update
Windows Commands Cheat Sheet
Windows Security Log Quick Reference Cheat-sheet
Windows useful Directories
Windows vs Linux
Wireless Protocol Cheat Sheet
X.509
X.5091
YUM
Zero Trust User Access
𝗖𝗿𝗼𝘀𝘀-𝗢𝗿𝗶𝗴𝗶𝗻 𝗥𝗲𝘀𝗼𝘂𝗿𝗰𝗲 𝗦𝗵𝗮𝗿𝗶𝗻𝗴 (𝗖𝗢𝗥𝗦)