
When I started learning cybersecurity, I quickly realized something:
👉 The problem isn’t lack of information — it’s fragmentation.
Every time I needed something simple like:
- a reverse shell
- a privilege escalation checklist
- or a quick command reference
…I had to jump between multiple sources:
- GTFOBins
- LOLBAS
- random GitHub repositories
- outdated blog posts
It was slow, confusing, and inefficient.
🚀 So I decided to fix that
I created a centralized repository that contains 70+ hacking cheatsheets in one place.
👉 The goal is simple:
Make learning and practicing cybersecurity faster and more practical.
📚 What’s inside?
This repository includes cheatsheets for:
🔴 Offensive Security
- Metasploit Framework
- Mimikatz
- Privilege Escalation (Linux & Windows)
- Reverse shells & payloads
🌐 Web & Bug Bounty
- SQL Injection (SQLMap)
- XSS, SSTI, LFI
- Burp Suite & OWASP ZAP
- Recon tools like ffuf, httpx, Subfinder
📡 Networking & Enumeration
- Nmap
- SMB, LDAP, DNS enumeration
- MITM techniques
🔓 Password Attacks
- Hydra
- John the Ripper
- Hashcat
🛡️ Blue Team & Detection
- Log analysis
- SIEM basics
- Threat hunting
☁️ Cloud, Mobile & More
- AWS / Azure / GCP basics
- Android & iOS testing
- Docker & Kubernetes
⚡ Why this is useful
Instead of searching everywhere, you get:
✅ Quick command references
✅ Real-world examples
✅ Structured learning
✅ Offline access (Markdown format)
🔗 Check it out
If you're learning cybersecurity or doing CTFs / pentesting, this might help:
👉 https://github.com/Ilias1988/Hacking-Cheatsheets
🧠 Who is this for?
- Beginners in cybersecurity
- TryHackMe / HackTheBox users
- Bug bounty hunters
- Pentesters
- Anyone who wants quick references
💡 Future plans
I plan to:
- Add more advanced techniques
- Expand Blue Team content
- Improve methodology guides
- Add more real-world scenarios
🤝 Contribute
If you want to contribute or improve something:
- Open an issue
- Submit a pull request
- Suggest new cheatsheets
⚠️ Disclaimer
This content is for educational purposes only.
Always:
- Use on systems you own
- Have proper authorization
🔥 Final thoughts
Cybersecurity is hard — not because it's impossible, but because information is scattered.
This project is my attempt to simplify that.
⭐ If you find it useful, consider starring the repo!
Happy hacking — ethically. 🔴
Top comments (2)
Perhaps actually put a link to it?
I added the link! 👌