Reverse Engineering:
https://www.cybrary.it/wp-content/uploads/2017/11/cheat-sheet-reverse-v6.png
Linux commands:
http://linoxide.com/images/linux-cheat-sheet-612x792.png
Penetration Testing:
https://highon.coffee/blog/cheat-sheet
SQL Injection:
http://pentestmonkey.net/category/cheat-sheet/sql-injection
NMAP:
Professor Messer+s Quick Reference Guide to NMAP
Hacker Target: Nmap Cheat Sheet
XSS:
https://raw.githubusercontent.com/jhaddix/XSS.png/master/XSS2.png
TOR:
TOR for Newbies
Injection:
INJECTION CHEAT SHEET (non-SQL)
Metasploit:
http://hackagon.com/metasploit-tools-cheat-sheet
What is Information Security exactly about?
https://www.cybrary.it/wp-content/uploads/2017/11/infosec-compressor2-compressor4.pdf
Web Applications security:
https://goo.gl/BjJ8oU
Mobile security:
https://goo.gl/Gsjcph
Firewall:
https://goo.gl/I520X2
GDB:
http://goo.gl/NcsukJ
https://goo.gl/fRhCYl
Find more here:
https://github.com/Snifer/security-cheatsheets
http://kali-linux.co/forums/topic/all-kinds-of-security-cheatsheet-collection
We hope that we’re helping you to improve your cyber security knowledge and skills. If you have any recommendations and additions you may find useful, please send them to us! Don't hesitate to share this note and bookmark it so you can get back to it later.