logo  ONESTOPCYBERSHOP

  Cheat Sheets

Incident Preperation Intrusion Detection | Network Forensics | DFIR & Threat Hunting | Malware Analysis | Steganography
Reconnaissance | Delivery | Network Enumeration | Post Exploitation | Credential Harvesting | Command & Control
OSINT | Dark Web



VScode macOS Keyboard Shortcuts
Download 

    Command Lines

    Operating System CLI
Windows & Linux CLI
Download 
Linux Commands
Download 
Linux CLI Fundamentals
Download 
Linux CLI
Download 
Linux Shell
Download 
Common Attacks/Defences
Download 
Windows CLI
Download 
Vim
Download 
Vi
Download 
Nano
Download 


    Cloud CLI
AWS
Download 
GCP
Download 
Multi-Cloud CLI
Download 
Cloud Security DevOps
Download 



    PowerShell & WMIC
Download 
Download 
Download 
Download 
Download 


    Python
Download 
Download 



    Structures & Schemas
HEX & Regex
Download 
RegEx
Download 
sort & uniq
Download 
JSON & jq
Download 



    Query Languages
Log Parsing
Download 
SQLite
Download 
SQL
Download 
KQL
Download 
KQL
Download 
SPL (Splunk)
Download 
Advanced Search Operators
Download 
JIRA Query Language
Download 
VT File Search Modifiers



    Cyber Defence (Blue Team)

    Preperation
IR Lifecycle
Download 
Critical Log Review
Download 
DDoS Incident Response
Download 
Security Architecture
Download 
Writing Tips
Download 



    Intrusion Detection
Windows
Download 
Windows 2K
Download 
Linux
Download 
Evidence Collection
Download 



    DFIR & Threat Hunting
SIFT
Download 
REMnux
Download 
macOS Forensics
Download 
Memory Forensics
Download 
Volatility
Download 
plaso
Download 
Eric Zimmerman Tools
Download 
oledump
Download 
TZWorks
Download 
Windows Processes
Download 
Event Log Analysis
Download 
Awesome Event IDs
Sysmon
Download 


    Network Forensics
Lateral Movement Analysis
Download 
Common Ports
Download 
Web Proxy Event Analysis
Download 
TCP/IP & tcpdump
Download 
SMB Access from Linux
Download 



    Malware Analysis & Reverse Engineering
Malware Analysis
Download 
Malicious Documents
Download 
Reverse Engineering
Download 
Reverse Engineering
Download 
Anti-virus Event Analysis
Download 
IDA Pro
Download 



    Steganography



    Offensive Security (Red Team)

Payloads All The Things
    Reconnaissance
Kali
Download 
NMAP
Download 
Google Hacking
Download 



    Network Interception/Enumeration
hping
Download 
Scapy
Download 
tcpdump
Download 
Netcat
Download 
Burp Suite
Download 



    Post Exploitation
Bloodhound
Download 
SharpHound
Download 
Metasploit
Download 
Empire
Download 
Pivoting
Download 
SMB Access from Linux
Download 



    Credential Harvesting



    Command & Control



    Threat Intelligence

NMAP
Download 
Google Hacking
Download 
Miscellaneous
Download 
RITA
Download 
Search Operators
Download 
Shodan Dorks

    Additional cheat sheets:




  With great power, comes great responsibility; this material has been collated to encourage learning and development, and not to be leveraged for unethical and/or illegal behaviour.
  By visiting any of these sites, you are doing so at your own risk.

  I would like to thank all of the authors, instructors, publishers, developers (and others) - both individuals and teams - for the content collated on this site. I must stress that none of the content referenced/linked on this site is my own.
  If you have any suggestions and/or content you feel is missing or would like included, please email me at oscybershop [at] gmail [dot] com