From bd231121c7cc0997715d42e12437a27dea6a4a49 Mon Sep 17 00:00:00 2001 From: "$./Netrunner_&" <114373528+00xNetrunner@users.noreply.github.com> Date: Sun, 15 Oct 2023 23:05:59 +0100 Subject: [PATCH] Update README.md --- README.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/README.md b/README.md index b39de3c..81c54b1 100644 --- a/README.md +++ b/README.md @@ -6,19 +6,19 @@ This repository contains various cybersecurity related cheat sheets for referenc - [Aircrack-ng](Aircrack-ng.md) - Cheatsheet for using Aircrack-ng to audit wireless networks. 📡 -- [Bettercap](bettercap.md) - Commands for network reconnaissance, sniffing, ARP spoofing, MITM attacks with Bettercap. 🕵️ +- [Bettercap](bettercap-cheatsheet.md) - Commands for network reconnaissance, sniffing, ARP spoofing, MITM attacks with Bettercap. 🕵️ -- [GPG](gpg.md) - Commands for GPG encryption, decryption, key management, and more. 🔐 +- [GPG](GPG_Cheatsheet.md) - Commands for GPG encryption, decryption, key management, and more. 🔐 -- [Hashcat](hashcat.md) - Useful Hashcat commands and examples for password cracking. 🔑 +- [Hashcat](hashcat_cheatsheet.md) - Useful Hashcat commands and examples for password cracking. 🔑 -- [John the Ripper](john-the-ripper.md) - John the Ripper cheatsheet for dictionary attacks, brute forcing, tips and tricks. 💉 +- [John the Ripper](JtR_cheatsheet.md) - John the Ripper cheatsheet for dictionary attacks, brute forcing, tips and tricks. 💉 -- [Nmap](nmap.md) - Cheatsheet for Nmap scanning and scripting. 🖥️ +- [Nmap](nmap-cheatsheet.md) - Cheatsheet for Nmap scanning and scripting. 🖥️ -- [Reformat USB](reformat-usb.md) - Steps for reformatting a USB drive on Linux and Windows. 💽 +- [Reformat USB](Reformat_USB.md) - Steps for reformatting a USB drive on Linux and Windows. 💽 -- [WiFi Handshake](wifi-handshake.md) - Capturing and cracking WiFi handshakes. 🤝 +- [WiFi Handshake](Wi-Fi_handshake_capture_cheatsheet.md) - Capturing and cracking WiFi handshakes. 🤝 These cheat sheets contain commonly used commands and syntax for pentesting tools. They can be used as a quick reference when conducting security assessments and wireless network audits.