Infosec Notes
Cheat sheets on cybersecurity tools and techniques.
All content is intended for educational purposes, CTF challenges, and
authorized penetration testing only. Do not use any of this against
systems you do not own or have explicit permission to test.
use #tag to filter by tag
/network
4 notes- RDP Enumeration, exploitation and post-exploitation techniques for RDP servers.rdpnetworkservice
- SSH Enumeration, exploitation and post-exploitation techniques for SSH servers.sshnetworkservice
- Telnet Enumeration, exploitation and post-exploitation techniques for Telnet servers.telnetnetworkservice
- FTP Enumeration, exploitation and post-exploitation techniques for FTP servers.ftpnetworkservice
/osint
5 notes- Information Gathering Essential cybersecurity cheatsheet for Information Gathering and Open Source Intelligence (OSINT). Discover data related to emails, domains, usernames, and images using both command line and online tools.osintenumerationinformation-gathering
- Sock Puppets Essential cheatsheet on creating and managing Sock Puppets (fake identities) for ethical security research and Open Source Intelligence (OSINT), focusing on maintaining separation from personal data and bypassing common verification.osintsock-puppets
- Tips A cheatsheet of practical tips and unconventional methods for Open Source Intelligence (OSINT), focusing on advanced data visualization, information leakage detection, and utilizing web archives for historical data.osint
- Bluesky Enumeration, search operators, API endpoints and tools for investigating Bluesky accounts.osintblueskysocial-mediaenumeration
- X / Twitter Enumeration, search operators, deleted content recovery and tools for investigating X accounts.osinttwitterxsocial-mediaenumeration
9 notes total