Reverse Engineering:
https://www.cybrary.it/wp-content/uploads/2017/11/cheat-sheet-reverse-v6.png
Linux commands:
http://linoxide.com/images/linux-cheat-sheet-612x792.png
Penetration Testing:
https://highon.coffee/blog/cheat-sheet
SQL Injection:
http://pentestmonkey.net/category/cheat-sheet/sql-injection
NMAP:
Professor Messer+s Quick Reference Guide to NMAP
Hacker Target: Nmap Cheat Sheet
XSS:
https://raw.githubusercontent.com/jhaddix/XSS.png/master/XSS2.png
TOR:
Injection:
INJECTION CHEAT SHEET (non-SQL)
Metasploit:
http://hackagon.com/metasploit-tools-cheat-sheet
What is Information Security exactly about?
https://www.cybrary.it/wp-content/uploads/2017/11/infosec-compressor2-compressor4.pdf
Web Applications security:
Mobile security:
Firewall:
GDB:
http://goo.gl/NcsukJ
https://goo.gl/fRhCYl
Find more here:
https://github.com/Snifer/security-cheatsheets
http://kali-linux.co/forums/topic/all-kinds-of-security-cheatsheet-collection
We hope that we’re helping you to improve your cyber security knowledge and skills. If you have any recommendations and additions you may find useful, please send them to us! Don't hesitate to share this note and bookmark it so you can get back to it later.