๐Ÿ“ Cheatsheets

Quick reference sheets to accelerate your workflow and support on-the-fly cybersecurity operations.

๐Ÿš€ Cheat Sheets ๐Ÿ“œ

Welcome to the Cheat Sheets section of our Cybersecurity Repository! ๐Ÿ›ก๏ธ Whether you're a SOC analyst, pen tester, or just a cyber geek, this is your ultimate quick-reference hub! โšก

๐Ÿ“ก HTTP Response Codes

Quick lookup for HTTP status codes.

โŒจ๏ธ Keyboard Shortcuts Linux

Essential Linux keyboard shortcuts for efficiency.

๐Ÿ–ฅ๏ธ Keyboard Shortcuts Windows

Boost productivity with Windows shortcuts.

๐ŸŒ Ports & Protocols

Common network ports & protocols for analysts.

๐Ÿ•ต๏ธ Sysmon Event ID's

Windows Sysmon event codes for threat hunting.

๐Ÿ” Windows Security Event Codes

Key Windows event logs for monitoring.

๐Ÿ–ฅ๏ธ Linux Commands

Must-know CLI commands for sysadmins & hackers.

๐Ÿ”Ž Regex

Master pattern matching with Regular Expressions.

๐Ÿ“Š Splunk Query Language

Build powerful Splunk queries for log analysis.

๐Ÿดโ€โ˜ ๏ธ Windows Commands

Essential Windows CMD & PowerShell commands.

๐Ÿ“ Markdown

Format docs like a pro with Markdown syntax.

๐Ÿ“ก DNS Query Types

Understand DNS records & query types.

๐Ÿ“ Subnetting

IP addressing and subnet calculations explained.

๐Ÿ”— Useful (Cyber) Domains

Go-to cybersecurity-related websites & tools.

๐Ÿดโ€โ˜ ๏ธ Windows Executables

Common Windows executable file types & uses.

๐Ÿ”  A to Z of Cyber

Cybersecurity terms & concepts from A to Z.

โšก Quick Reference Commands

Essential commands at a glance.

๐Ÿ”ข URL Encoding

Encoding & decoding URLs made easy.

๐Ÿ› ๏ธ Windows Registry Keys

Important registry paths for security & troubleshooting.

๐Ÿ“‚ Magic Bytes

Recognizing file types based on unique identifiers.

๐ŸŒ Language Database

Various languages used across dev fields.

๐Ÿ“– Acronyms & Keywords

Highly utilized acronyms in cybersecurity.

โš™๏ธ Windows API Calls

Important API calls for malware analysis.

๐Ÿ“ข Disclaimer: All content within this repository has been curated by the author to the best of their ability and fact-checked as of 2025. However, it cannot be 100% authenticated. Use the information at your own discretion. ๐Ÿ”