Skip to content

πŸ›‘οΈ The Ultimate Cybersecurity Cheat Sheets Hub β€” Pentest, Red Team, Blue Team, Purple Team, GRC β€” Tools, Methodologies, Frameworks & Compliance. Practical, Uncompromising.

License

Notifications You must be signed in to change notification settings

franckferman/SecSheets

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

1 Commit
Β 
Β 
Β 
Β 

Repository files navigation

Contributors Forks Stargazers Issues License

πŸ›‘οΈ SecSheets

The Ultimate Cybersecurity Cheat Sheets Hub β€” Structured Knowledge for Cybersecurity Professionals.
Pentest, Red Team, Blue Team, Purple Team, GRC β€” Tools, Methodologies, Frameworks & Compliance. Practical, Uncompromising.

πŸ“œ Table of Contents

Click to collapse/expand
  1. πŸ“– About
  2. βš–οΈ Legal Disclaimer
  3. πŸ“œ License
  4. πŸ“ž Contact

πŸ“– About

SecSheets is a structured cybersecurity resource covering tools, methodologies, frameworks, and governance.
Designed for practitioners, analysts, engineers, and strategists, it provides clear, actionable, and refined knowledge across multiple domains.

πŸ”Ή Pentest: Exploitation, privilege escalation, lateral movement, network attacks.
πŸ”Ή Red Team: Advanced adversary simulation, obfuscation, evasion tactics, persistence.
πŸ”Ή Blue Team: SOC workflows, detection engineering, threat intelligence, DFIR.
πŸ”Ή Purple Team: Adversary emulation, detection bypass, attack surface reduction.
πŸ”Ή Governance & Compliance: Risk frameworks, security policies, regulatory strategy.

No noise, no distractionsβ€”just structured intelligence for those who need it.

πŸ”— Access SecSheets (Coming soon)


πŸš€ Features

βœ” Comprehensive cheat sheets for security tools

  • Pentest: NetExec, MetaDetective, Evil-WinRM, FFUF, Foxbuster, Nmap, Metasploit, Mimikatz, PowerView
  • Red Team: Cobalt Strike, Havoc, Sliver, Empire, Covenant
  • Blue Team: Wazuh, Velociraptor, Suricata, Zeek, ELK, Sigma Rules

βœ” High-level methodologies & frameworks

  • MITRE ATT&CK, Cyber Kill Chain, OWASP, DFIR playbooks
  • Threat modeling, adversary tactics, incident response

βœ” Governance, Risk, and Compliance (GRC)

  • EBIOS RM, ISO 27001, NIST 800-53, SOC 2, PCI-DSS
  • Risk management, compliance audits, policy development

βœ” Concise, structured, and regularly updated

(πŸ”Ό Back to top)

βš–οΈ Legal Disclaimer

SecSheets is a cybersecurity knowledge resource intended for educational and professional reference purposes. It provides structured information on tools, methodologies, and frameworks used in security operations.

⚠️ Warning: The content available on SecSheets is strictly for legitimate research, professional security assessments, and authorized engagements.
Any unauthorized use of offensive security tools or techniques against systems without explicit written permission may constitute illegal activity.
Users are solely responsible for ensuring their actions comply with applicable laws and ethical standards.

The authors and contributors of SecSheets disclaim any liability for misuse of the information provided.

πŸ”Ή By accessing SecSheets, you confirm that you have read, understood, and agreed to this disclaimer.

(πŸ”Ό Back to top)

πŸ“š License

This project is licensed under the GNU Affero General Public License, Version 3.0. For more details, please refer to the LICENSE file in the repository: Read the license on GitHub

(πŸ”Ό Back to top)

πŸ“ž Contact

ProtonMail LinkedIn Twitter

(πŸ”Ό Back to top)