DEV Community

Ilias Georgopoulos
Ilias Georgopoulos

Posted on

I Built a Repository with 70+ Hacking Cheatsheets — Here’s Why It Matters


When I started learning cybersecurity, I quickly realized something:

👉 The problem isn’t lack of information — it’s fragmentation.

Every time I needed something simple like:

  • a reverse shell
  • a privilege escalation checklist
  • or a quick command reference

…I had to jump between multiple sources:

  • GTFOBins
  • LOLBAS
  • random GitHub repositories
  • outdated blog posts

It was slow, confusing, and inefficient.


🚀 So I decided to fix that

I created a centralized repository that contains 70+ hacking cheatsheets in one place.

👉 The goal is simple:
Make learning and practicing cybersecurity faster and more practical.


📚 What’s inside?

This repository includes cheatsheets for:

🔴 Offensive Security

  • Metasploit Framework
  • Mimikatz
  • Privilege Escalation (Linux & Windows)
  • Reverse shells & payloads

🌐 Web & Bug Bounty

  • SQL Injection (SQLMap)
  • XSS, SSTI, LFI
  • Burp Suite & OWASP ZAP
  • Recon tools like ffuf, httpx, Subfinder

📡 Networking & Enumeration

  • Nmap
  • SMB, LDAP, DNS enumeration
  • MITM techniques

🔓 Password Attacks

  • Hydra
  • John the Ripper
  • Hashcat

🛡️ Blue Team & Detection

  • Log analysis
  • SIEM basics
  • Threat hunting

☁️ Cloud, Mobile & More

  • AWS / Azure / GCP basics
  • Android & iOS testing
  • Docker & Kubernetes

⚡ Why this is useful

Instead of searching everywhere, you get:

✅ Quick command references

✅ Real-world examples

✅ Structured learning

✅ Offline access (Markdown format)


🔗 Check it out

If you're learning cybersecurity or doing CTFs / pentesting, this might help:

👉 https://github.com/Ilias1988/Hacking-Cheatsheets


🧠 Who is this for?

  • Beginners in cybersecurity
  • TryHackMe / HackTheBox users
  • Bug bounty hunters
  • Pentesters
  • Anyone who wants quick references

💡 Future plans

I plan to:

  • Add more advanced techniques
  • Expand Blue Team content
  • Improve methodology guides
  • Add more real-world scenarios

🤝 Contribute

If you want to contribute or improve something:

  • Open an issue
  • Submit a pull request
  • Suggest new cheatsheets

⚠️ Disclaimer

This content is for educational purposes only.

Always:

  • Use on systems you own
  • Have proper authorization

🔥 Final thoughts

Cybersecurity is hard — not because it's impossible, but because information is scattered.

This project is my attempt to simplify that.


⭐ If you find it useful, consider starring the repo!

Happy hacking — ethically. 🔴

Top comments (2)

Collapse
 
dogers profile image
Dogers

Perhaps actually put a link to it?

Collapse
 
ilias_1988 profile image
Ilias Georgopoulos

I added the link! 👌