OSCP+ · OSWE · OSEP · OSDA · OSWA · PNPT · CPTS · HTB CPTS
⭐ If this saved you time, please leave a star. It's the simplest way to support this work.
- 2000+ commands across 33 categories covering the full penetration testing lifecycle
- Full CRUD — Add, edit, and delete your own categories, subcategories, and commands
- Instant search with
Ctrl+Kkeyboard shortcut - One-click copy on every command block
- Dark / Light theme toggle with persistent preference
- Safe placeholders — All IPs and sensitive values use
<TARGET_IP>,<ATTACKER_IP>,<DOMAIN>, etc. - Mobile responsive sidebar navigation
- Variable Fill Bar — Fill
<PLACEHOLDER>values in the UI and auto-copy completed command - Favorites — Bookmark frequently used commands (stored in browser)
- Tag filtering — Filter by
essential,tool,advanced - Write-ups — Built-in Markdown editor for machine write-ups with image upload
- Notes — Per-category sticky notes
- Export / Import your custom command database as JSON
- TR/EN bilingual interface support
- Docker ready — Single command deployment
| # | Category | Description |
|---|---|---|
| 1 | Target Profiling & Network Mapping | DNS, OSINT, Nmap, SMB, SNMP, LDAP, HTTP |
| 2 | Weakness Identification & Scanning | Nmap NSE, Nikto, WPScan, Nuclei, SSL |
| 3 | Web Attack Techniques | LFI/RFI, Command Injection, SSRF, XXE, SSTI, Upload |
| 4 | Database Exploitation via Injection | UNION, Blind, Error-based, SQLMap, MSSQL, PostgreSQL |
| 5 | Browser-Side Exploitation | XSS (Reflected/Stored/DOM), CSRF, Filter Bypass |
| 6 | Payload Engineering & Delivery | msfvenom, shellcode, macros, HTA, staged/stageless |
| 7 | Shells, Listeners & Stabilization | Bash, Python, PowerShell, Netcat, Socat, TTY upgrade |
| 8 | Windows Privilege Escalation | WinPEAS, services, tokens, AlwaysInstallElevated |
| 9 | Linux Privilege Escalation | LinPEAS, SUID, sudo, cron, capabilities, Docker escape |
| 10 | Credential Attacks & Hash Cracking | Hydra, Hashcat, John, Mimikatz, spraying, wordlists |
| 11 | Defense Evasion & AV Bypass | AMSI, encoding, AppLocker, CLM, obfuscation |
| 12 | Network Pivoting & Traffic Routing | SSH, Chisel, Ligolo-ng, proxychains, netsh |
| 13 | Metasploit Operations | Modules, Meterpreter, pivoting, auxiliary |
| 14 | Active Directory Reconnaissance | BloodHound, PowerView, SPNs, ACLs, trusts |
| 15 | Active Directory Exploitation | Kerberoast, AS-REP, Golden/Silver Ticket, DCSync |
| 16 | Lateral Movement Techniques | PSExec, WMIExec, Evil-WinRM, RDP, DCOM |
| 17 | AWS Cloud Security Testing | IAM, S3, EC2, IMDS, Pacu, Prowler |
| 18 | File Transfer Arsenal | Python HTTP, PowerShell, certutil, SMB, SCP |
| 19 | Protocol Tunneling & Firewall Evasion | HTTP, DNS, ICMP tunneling, DPI bypass |
| 20 | Social Engineering & Phishing | GoPhish, SET, Evilginx2, SPF/DKIM/DMARC |
| 21 | Exploit Research & Development | SearchSploit, cross-compile, buffer overflow |
| 22 | Engagement Methodology & Playbook | Recon workflow, pivoting, post-exploitation, proofs |
| 23 | Container & Infrastructure Testing | Docker escape, Kubernetes, CI/CD attacks |
| 24 | NetExec / CrackMapExec | SMB enum/exec, hash dump, spray, WinRM, MSSQL modules |
| 25 | BloodHound & SharpHound | Collection methods, setup, 17 Cypher attack-path queries |
| 26 | ADCS — Certificate Services Attacks | ESC1–ESC8 with Certipy/Certify, golden cert, PassTheCert |
| 27 | Network Service Exploitation | FTP, SSH, SMTP, SMB, MSSQL, MySQL, RDP, Redis, LDAP, WinRM |
| 28 | PowerShell for Pentesters | PowerView, PowerUp, AMSI bypass, native AD module |
| 29 | Impacket Toolsuite | PsExec, WMIExec, Kerberoast, SecretsDump, NTLMRelay, Responder |
| 30 | Mimikatz Commands | logonpasswords, DCSync, golden/silver ticket, overpass-the-hash |
| 31 | Windows Post-Exploitation | Situational awareness, credential hunting, persistence, tokens |
| 32 | Linux Post-Exploitation | Situational awareness, credential hunting, persistence |
| 33 | Wireless Security Testing | WPA/WPA2 handshake, PMKID, WPS/Pixie Dust, Evil Twin |
git clone [https://github.com/<your-username>/cheat-sheet.git](https://github.com/halilibrahimd27/cheat-sheet.git)
cd cheat-sheet
docker compose up -dOpen http://localhost:8899 in your browser.
Data is persisted in a Docker volume — your custom commands survive container restarts and updates.
git clone [https://github.com/<your-username>/cheat-sheet.gi](https://github.com/halilibrahimd27/cheat-sheet.git)
cd cheat-sheet
npm install
npm startOpen http://localhost:3000 in your browser.
If you already have the app running and want to pull the latest seed commands:
git pull
# Then hit the reset endpoint (this will overwrite your custom data!)
curl -X POST http://localhost:8899/api/resetWarning: Reset overwrites your data. Export a backup first via the ⬇ Export button.
- Click any category in the sidebar to filter
- Use
Ctrl+Kto open search, type any keyword - Click Copy on any command block to copy to clipboard
- Toggle dark/light theme with the
◐button
- Click + New Category in the sidebar to create a category
- Click + Sub on a category header to add a subcategory
- Click + Cmd on a subcategory to add a new command
- Use
✎to edit and✕to delete any item
All commands use safe placeholders instead of real IPs:
| Placeholder | Meaning |
|---|---|
<TARGET_IP> |
Target machine IP |
<ATTACKER_IP> |
Your attack machine IP |
<DOMAIN> |
Target domain name |
<PORT> |
Port number |
<USERNAME> |
Username |
<PASSWORD> |
Password |
<NETWORK>/<CIDR> |
Network range (e.g., 192.168.1.0/24) |
<TARGET_URL> |
Full target URL |
<DC_IP> |
Domain Controller IP |
| Method | Endpoint | Description |
|---|---|---|
GET |
/api/categories |
List all categories |
POST |
/api/categories |
Create a category |
PUT |
/api/categories/:id |
Update a category |
DELETE |
/api/categories/:id |
Delete a category |
POST |
/api/categories/:id/subcategories |
Add subcategory |
POST |
.../subcategories/:idx/commands |
Add command |
PUT |
.../commands/:cmdIdx |
Update command |
DELETE |
.../commands/:cmdIdx |
Delete command |
GET |
/api/export |
Download full backup (JSON) |
POST |
/api/import |
Import from JSON |
POST |
/api/reset |
Reset to default commands |
- Frontend: Vanilla HTML/CSS/JS (no framework, no build step)
- Backend: Node.js + Express
- Storage: JSON file (persisted via Docker volume)
- Fonts: Inter + JetBrains Mono (Google Fonts)
cheat-sheet/
├── docker-compose.yml # Docker orchestration
├── Dockerfile # Container build
├── package.json # Node.js dependencies
├── server.js # Express REST API
├── seed.js # Default 2000+ commands (seed data)
├── public/
│ ├── index.html # Main HTML
│ ├── style.css # Dark/Light theme styles
│ └── app.js # Frontend logic + CRUD
└── data/
└── commands.json # Persistent data (auto-generated)
This tool is intended for educational purposes only. All commands and techniques are meant for use in authorized penetration testing, CTF competitions, and security certification preparation. Always ensure you have proper authorization before testing any system.
Contributions are welcome! If you want to add commands, fix errors, or improve the UI:
- Fork the repository
- Create a feature branch (
git checkout -b feat/add-commands) - Add your commands to
seed.jsfollowing the existing structure - Submit a pull request
MIT License — Feel free to use, modify, and distribute. See LICENSE for full text.
| Time | How you can help |
|---|---|
| 5 seconds | Click the ⭐ Star button at the top |
| 30 seconds | Share on Twitter / LinkedIn / your Discord |
| 5 minutes | Open an issue for a missing command |
| 30 minutes | Submit a PR with new commands or fixes |
| 2 hours | Add a whole new category |
Star history:







