mirror of
https://github.com/00xNetrunner/Cheatsheets.git
synced 2025-01-18 14:01:10 +01:00
Update README.md
This commit is contained in:
parent
32fd8a0818
commit
bd231121c7
1 changed files with 7 additions and 7 deletions
14
README.md
14
README.md
|
@ -6,19 +6,19 @@ This repository contains various cybersecurity related cheat sheets for referenc
|
|||
|
||||
- [Aircrack-ng](Aircrack-ng.md) - Cheatsheet for using Aircrack-ng to audit wireless networks. 📡
|
||||
|
||||
- [Bettercap](bettercap.md) - Commands for network reconnaissance, sniffing, ARP spoofing, MITM attacks with Bettercap. 🕵️
|
||||
- [Bettercap](bettercap-cheatsheet.md) - Commands for network reconnaissance, sniffing, ARP spoofing, MITM attacks with Bettercap. 🕵️
|
||||
|
||||
- [GPG](gpg.md) - Commands for GPG encryption, decryption, key management, and more. 🔐
|
||||
- [GPG](GPG_Cheatsheet.md) - Commands for GPG encryption, decryption, key management, and more. 🔐
|
||||
|
||||
- [Hashcat](hashcat.md) - Useful Hashcat commands and examples for password cracking. 🔑
|
||||
- [Hashcat](hashcat_cheatsheet.md) - Useful Hashcat commands and examples for password cracking. 🔑
|
||||
|
||||
- [John the Ripper](john-the-ripper.md) - John the Ripper cheatsheet for dictionary attacks, brute forcing, tips and tricks. 💉
|
||||
- [John the Ripper](JtR_cheatsheet.md) - John the Ripper cheatsheet for dictionary attacks, brute forcing, tips and tricks. 💉
|
||||
|
||||
- [Nmap](nmap.md) - Cheatsheet for Nmap scanning and scripting. 🖥️
|
||||
- [Nmap](nmap-cheatsheet.md) - Cheatsheet for Nmap scanning and scripting. 🖥️
|
||||
|
||||
- [Reformat USB](reformat-usb.md) - Steps for reformatting a USB drive on Linux and Windows. 💽
|
||||
- [Reformat USB](Reformat_USB.md) - Steps for reformatting a USB drive on Linux and Windows. 💽
|
||||
|
||||
- [WiFi Handshake](wifi-handshake.md) - Capturing and cracking WiFi handshakes. 🤝
|
||||
- [WiFi Handshake](Wi-Fi_handshake_capture_cheatsheet.md) - Capturing and cracking WiFi handshakes. 🤝
|
||||
|
||||
These cheat sheets contain commonly used commands and syntax for pentesting tools. They can be used as a quick reference when conducting security assessments and wireless network audits.
|
||||
|
||||
|
|
Loading…
Reference in a new issue