Skip to main content

Cheatsheet

MSSQL Cheat Sheet

·1598 words·8 mins· loading · loading
Microsoft SQL Server forensics and threat hunting guide covering registry paths, log locations, attack indicators, and configuration analysis for compromised SQL Server instances.

Sigma Rule Cheat Sheet

·627 words·3 mins· loading · loading
Concise guide for writing Sigma detection rules covering structure, modifiers, best practices, and tools for SOC analysts and detection engineers working with Splunk, Elastic, or LogPoint.

Regex Cheat Sheet

·648 words·4 mins· loading · loading
Essential regex patterns for matching, capturing, and string manipulation adapted for security analysts, blue teamers, and SOC professionals working with detection rules.

IP & Domain Investigation Cheat Sheet

·730 words·4 mins· loading · loading
Essential techniques for IP and domain investigations including reputation checks, WHOIS lookups, DNS inspection, passive intelligence, and payload retrieval for threat hunting and incident response.

MacOS CLI Commands Cheat Sheet

·651 words·4 mins· loading · loading
Essential macOS Terminal commands for file operations, process management, networking, Homebrew, and security controls like Gatekeeper and SIP for sysadmins and DFIR practitioners.

Markdown Cheatsheet

·326 words·2 mins· loading · loading
Quick reference for Markdown syntax covering headings, formatting, lists, links, code blocks, and tables for documentation and technical writing.

Windows CLI Commands Cheat Sheet

·652 words·4 mins· loading · loading
Fast-access PowerShell reference for system administration, automation, security auditing, covering file management, networking, scripting, and Winget for IT pros and analysts.

Windows Registry Cheat Sheet

·343 words·2 mins· loading · loading
Key Windows Registry locations for persistence mechanisms, user activity traces, and IOC hunting in malware analysis and forensic investigations for DFIR professionals.

Windows Log Analysis Cheat Sheet (+ Chainsaw)

·968 words·5 mins· loading · loading
Critical Windows event IDs, logon types, and log locations for threat hunting and incident response, including Security.evtx, PowerShell logs, and Chainsaw analysis techniques.

Malware Analysis Cheat Sheet

·1457 words·7 mins· loading · loading
Comprehensive reference for static and dynamic malware analysis using Ghidra, x64dbg, REMnux, including PDF analysis, unpacking techniques, and reverse engineering workflows. - static-analysis - dynamic-analysis