Burp Suite | CheatSheets Hub

Web security testing platform. Burp Suite is essential for web app testing

burp suite, web security, pentest, proxy

CDN Security Best Practices

Configure TLS certificates, WAF rules, and origin shielding.

cdn, security, waf, tls

Cybersecurity Tips

Online safety best practices

cybersecurity, security, privacy, online safety

Edge Caching Strategies

Tune TTLs, cache purges, and origin fallbacks for CDNs.

edge, caching, ttl, cdn

Encryption Basics

Encryption types, algorithms, tools, and best practices for data security

encryption, cryptography, AES, RSA, security, data protection

Incident Command System

Ship roles, communications, and updates during incidents.

incident, command

Incident Postmortem Template

Document timeline, impact metrics, root cause, and action items.

incident, postmortem, timeline, blameless

Metasploit | CheatSheets Hub

Penetration testing framework. Always get written authorization before testing

metasploit, pentest, security, hacking

Network Security Automation

Automate firewall audits, anomaly detection, and remediation

network security, automation, firewall

Network Security | CheatSheets Hub

Protect your network infrastructure. Secure your network from threats

network security, firewall, intrusion detection

Nmap | CheatSheets Hub

Network scanning tool. Nmap is the standard for network discovery

nmap, network scanning, port scanning, security

Node.js Security

Audit dependencies, configure CSP, and lock env variables

node security, dependencies, csp, env

OWASP Top 10 | CheatSheets Hub

Critical web application security risks. Always validate input on both client and server side

owasp, security, web security, vulnerabilities

Penetration Test Prep

Document authorized targets, tools, and reporting templates.

pentest, prep

Penetration Testing Essentials

Plan scopes, gather intel, exploit safely, and document findings.

pentest, penetration, recon, exploitation

Penetration Testing | CheatSheets Hub

Ethical hacking and security testing. Authorized security testing only

pentesting, ethical hacking, security

Privacy Tools

Privacy-focused tools and services for secure browsing, communication, and data protection

privacy tools, encryption, secure messaging, anonymous browsing, data protection

Redis SSL Connections

Enable TLS listeners and update clients to use encrypted ports.

redis, ssl

SaaS Hardening

Configure SSO, MFA, and audit logging for SaaS apps.

security, saas

Security Incident Communications

Define owners for status pages, communications, and follow-up.

security, incident

Security Incident Templates

Use templates for status updates, command, and postmortems.

security, incident

Security Incident Templates (Batch 8)

Use templates for status updates, postmortems, and action items.

security, incident

Security Patch Cycle

Track assets, schedule patch windows, verify installation.

patch, security

Security Remote Access Policy

Define policies for remote VPN, MFA, and device posture.

security, remote access

Security SaaS Hardening (Batch 8)

Configure enterprise SaaS security settings and log changes.

security, saas

SSH Bastion Setup

Route SSH access through hardened bastions with MFA.

ssh, bastion

SSL/TLS | CheatSheets Hub

Secure communication protocols. Always use HTTPS in production

ssl, tls, https, certificates, encryption

TLS Rotation Playbook

Rotate TLS assets before expiration with automation and alerts.

tls, certificates, rotation

VPN Access Ops

Automate issuance and revocation of VPN credentials with logging.

vpn, access

VPN Access Ops (Batch 8)

Automate provisioning and revoking VPN credentials.

vpn, access

VPN Guide

VPN comparison guide, setup instructions, protocols, and security best practices

vpn, privacy, security, wireguard, openvpn, protocols

VPN Rotation Ops

Refresh VPN certificates/keys regularly.

vpn, rotation

VPN Setup | CheatSheets Hub

Virtual private network configuration. WireGuard is the future of VPN

vpn, networking, security, remote access

Wireshark | CheatSheets Hub

Network protocol analyzer. Wireshark is the de facto network analyzer

wireshark, network analysis, packet capture, security

Zero-Knowledge Apps

Zero-knowledge encryption apps and principles

zero-knowledge, encryption, privacy, security, protonmail, signal