security-cheatsheets/README.md

55 lines
2.6 KiB
Markdown

# Security Cheatsheets
A collection of security, pentesting, and technical reference cheatsheets.
## Categories
- [Information Security](#information-security)
- [AI Security](#ai-security)
- [Cryptography](#cryptography)
- [Privacy](#privacy)
- [Development](#development)
## Information Security
| Cheatsheet | Description |
|------------|-------------|
| [Web Application Security](infosec/web-application-security.md) | OWASP Top 10, SQLi, XSS, SSRF, and web app testing |
| [Network Pentesting](infosec/network-pentesting.md) | Nmap, Wireshark, service enumeration |
| [Privilege Escalation](infosec/privilege-escalation.md) | Linux and Windows privesc techniques |
| [Active Directory](infosec/active-directory.md) | AD attacks, Kerberoasting, BloodHound, lateral movement |
| [OSINT](infosec/osint.md) | Open source intelligence, reconnaissance, dorking |
| [Pentesting Methodology](infosec/pentesting-methodology.md) | Basic methodology for pentesters |
| [Penetration Testing Reporting](infosec/pentest-reporting.md) | Comprehensive guide for creating professional pentest reports |
| [SOC Analyst Reference](infosec/soc-analyst.md) | Essential knowledge for Security Operations Center analysts |
| [CTF Jeopardy Guide](infosec/ctf-jeopardy.md) | Techniques for solving common CTF challenge categories |
| [PJPT Reference Guide](infosec/pjpt-reference.md) | Common commands and techniques for the PJPT certification |
| [CIS 18 Controls](infosec/cis_18_controls.md) | CIS Critical Security Controls reference |
| [Incident Response](infosec/incident-response.md) | Quick techniques for IR |
| [GitHub Commands](infosec/github-commands.md) | Git and GitHub command reference |
| [Command Line Reference](infosec/command-line-reference.md) | Cross-platform CLI commands |
## AI Security
| Cheatsheet | Description |
|------------|-------------|
| [AI Pentesting](ai-security/ai-pentesting.md) | Framework for testing and securing AI systems |
| [Prompt Engineering](ai-security/prompt-engineering.md) | Techniques for effective LLM prompting |
## Cryptography
| Cheatsheet | Description |
|------------|-------------|
| [Cryptography Reference](cryptography/crypto-reference.md) | Algorithms, tools, and implementation guidance |
## Privacy
| Cheatsheet | Description |
|------------|-------------|
| [Privacy Protection](privacy/privacy-protection.md) | Techniques and tools for protecting personal information |
## Development
| Cheatsheet | Description |
|------------| ------------|
| [Automation & DevSecOps](development/automation-devsecops.md) | Helpful commands for Automation and DevSecOps |