Pentester-in-training, CTF player, and security blogger. These are the reference sheets I actually use; hands-on, no fluff, with quizzes to make the knowledge stick.
Server-side template injection in Jinja2, Twig, Freemarker — detection, payloads, and RCE chains.
XML external entity attacks — file read, SSRF, blind/OOB exfiltration, and WAF bypass techniques.
Signature wrapping, XML injection, authentication bypass, and common SSO misconfigurations.
Stacey Matrix, planning chain, network diagrams, Gantt charts, critical path and milestones — the core of classical PM.
Roles, artifacts, events, user stories, acceptance criteria, Planning Poker and story point estimation.