1
0
Fork 0
mirror of https://github.com/tldr-pages/tldr.git synced 2025-07-23 09:35:24 +02:00

*: add option placeholders (#16370)

This commit is contained in:
Managor 2025-05-04 20:03:26 +03:00 committed by GitHub
parent 13709c3d90
commit ae3b7aff99
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
30 changed files with 88 additions and 88 deletions

View file

@ -6,7 +6,7 @@
- Print messages about the patched files:
`git apply --verbose {{path/to/file}}`
`git apply {{[-v|--verbose]}} {{path/to/file}}`
- Apply and add the patched files to the index:
@ -14,7 +14,7 @@
- Apply a remote patch file:
`curl -L {{https://example.com/file.patch}} | git apply`
`curl {{[-L|--location]}} {{https://example.com/file.patch}} | git apply`
- Output diffstat for the input and apply the patch:
@ -22,7 +22,7 @@
- Apply the patch in reverse:
`git apply --reverse {{path/to/file}}`
`git apply {{[-R|--reverse]}} {{path/to/file}}`
- Store the patch result in the index without modifying the working tree:

View file

@ -2,7 +2,7 @@
> Online password guessing tool.
> Protocols supported include FTP, HTTP(S), SMTP, SNMP, XMPP, SSH, and more.
> More information: <https://github.com/vanhauser-thc/thc-hydra>.
> More information: <https://manned.org/hydra>.
- Start Hydra's wizard:

View file

@ -1,7 +1,7 @@
# iex
> IEx is the interactive shell for Elixir.
> More information: <https://hexdocs.pm/iex>.
> More information: <https://manned.org/iex>.
- Start an interactive session:

View file

@ -11,4 +11,4 @@
- Print a file from `stdin` to `stdout`:
`{{wget -O - https://examplewebsite.com/file}} | ippeveps`
`{{wget {{[-O|--output-document]}} - https://examplewebsite.com/file}} | ippeveps`

View file

@ -1,7 +1,7 @@
# medusa
> A modular and parallel login brute-forcer for a variety of protocols.
> More information: <https://jmk-foofus.github.io/medusa/medusa.html>.
> More information: <https://manned.org/medusa>.
- List all installed modules:

View file

@ -1,11 +1,11 @@
# meson
> SCons-like build system that uses Python as a front-end language and Ninja as a building backend.
> More information: <https://mesonbuild.com>.
> More information: <https://mesonbuild.com/Commands.html>.
- Generate a C project with a given name and version:
`meson init --language={{c}} --name={{myproject}} --version={{0.1}}`
`meson init {{[-l|--language]}} c {{[-n|--name]}} {{myproject}} --version {{0.1}}`
- Configure the `builddir` with default values:
@ -21,8 +21,8 @@
- Show the help:
`meson --help`
`meson {{[-h|--help]}}`
- Display version:
`meson --version`
`meson {{[-v|--version]}}`

View file

@ -1,7 +1,7 @@
# mg
> A small, fast, and portable text editor based on `emacs`.
> More information: <https://github.com/hboetes/mg>.
> More information: <https://manned.org/mg>.
- Open a file for editing:

View file

@ -1,7 +1,7 @@
# mp3info
> Viewer/editor for ID3v1 (but not ID3v2) tags of MP3 files.
> More information: <https://www.ibiblio.org/mp3info>.
> More information: <https://www.ibiblio.org/mp3info/mp3info.html>.
- Show all ID3v1 tags of a specific MP3 file:

View file

@ -1,7 +1,7 @@
# mupdf
> A lightweight PDF, XPS, and E-book viewer.
> More information: <https://www.mupdf.com>.
> More information: <https://mupdf.readthedocs.io/en/latest/mupdf-command-line.html>.
- Open a PDF on the first page:

View file

@ -1,7 +1,7 @@
# mutool
> Convert, query information and extract data from PDF files.
> More information: <https://mupdf.readthedocs.io/en/latest/mupdf-command-line.html>.
> More information: <https://mupdf.readthedocs.io/en/latest/mupdf-command-line.html#mupdf-command-line-mutool>.
- Convert a range of pages to PNGs (Note: `%nd` in the output placeholder must be replaced with a print modifier like `%d` or `%2d`):

View file

@ -1,7 +1,7 @@
# mutt
> Command-line email client.
> More information: <http://mutt.org>.
> More information: <http://mutt.org/doc/mutt.1.txt>.
- Open the specified mailbox:

View file

@ -1,7 +1,7 @@
# mvn
> Apache Maven: build and manage Java-based projects.
> More information: <https://maven.apache.org>.
> More information: <https://manned.org/mvn>.
- Compile a project:
@ -13,7 +13,7 @@
- Compile and package, skipping unit tests:
`mvn package -DskipTests`
`mvn package {{[-D|--define]}} skipTests`
- Install the built package in local maven repository. (This will invoke the compile and package commands too):
@ -29,8 +29,8 @@
- Clean and then package the code with a given build profile:
`mvn clean -P {{profile}} package`
`mvn clean {{[-P|--activate-profiles]}} {{profile}} package`
- Run a class with a main method:
`mvn exec:java -Dexec.mainClass="{{com.example.Main}}" -Dexec.args="{{argument1 argument2 ...}}"`
`mvn exec:java {{[-D|--define]}} exec.mainClass="{{com.example.Main}}" {{[-D|--define]}} exec.args="{{argument1 argument2 ...}}"`

View file

@ -1,7 +1,7 @@
# neomutt
> NeoMutt command-line email client.
> More information: <https://neomutt.org>.
> More information: <https://neomutt.org/guide/reference.html>.
- Open the specified mailbox:

View file

@ -5,8 +5,8 @@
- Find hosts in the local network with SMB shares:
`nmblookup -S '*'`
`nmblookup {{[-S|--status]}} '*'`
- Find hosts in the local network with SMB shares run by SAMBA:
`nmblookup --status __SAMBA__`
`nmblookup {{[-S|--status]}} __SAMBA__`

View file

@ -1,7 +1,7 @@
# nokogiri
> An HTML, XML, SAX and Reader parser.
> More information: <https://nokogiri.org>.
> More information: <https://manned.org/nokogiri>.
- Parse the contents of a URL or file:
@ -17,7 +17,7 @@
- Parse using a specific encoding:
`nokogiri {{url|path/to/file}} --encoding {{encoding}}`
`nokogiri {{url|path/to/file}} {{[-E|--encoding]}} {{encoding}}`
- Validate using a RELAX NG file:

View file

@ -3,22 +3,22 @@
> Pentest and exploit FTP servers.
> More information: <https://www.netexec.wiki/ftp-protocol>.
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
- Search for valid credentials by trying out every combination in the specified lists of usernames and passwords:
`nxc ftp {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
`nxc ftp {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
- Continue searching for valid credentials even after valid credentials have been found:
`nxc ftp {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}} --continue-on-success`
`nxc ftp {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}} --continue-on-success`
- Perform directory listings on each FTP server the supplied credentials are valid on:
`nxc ftp {{192.168.178.0/24}} -u {{username}} -p {{password}} --ls`
`nxc ftp {{192.168.178.0/24}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --ls`
- Download the specified file from the target server:
`nxc ftp {{192.168.178.2}} -u {{username}} -p {{password}} --get {{path/to/file}}`
`nxc ftp {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --get {{path/to/file}}`
- Upload the specified file to the target server at the specified location:
`nxc ftp {{192.168.178.2}} -u {{username}} -p {{password}} --put {{path/to/local_file}} {{path/to/remote_location}}`
`nxc ftp {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --put {{path/to/local_file}} {{path/to/remote_location}}`

View file

@ -3,22 +3,22 @@
> Pentest and exploit Windows Active Directory Domains via LDAP.
> More information: <https://www.netexec.wiki/ldap-protocol>.
- Search for valid domain credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
- Search for valid domain credentials by trying out every combination in the specified lists of usernames and passwords:
`nxc ldap {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
`nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
- Enumerate active domain users:
`nxc ldap {{192.168.178.2}} -u {{username}} -p {{password}} --active-users`
`nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --active-users`
- Collect data about the targeted domain and automatically import these data into BloodHound:
`nxc ldap {{192.168.178.2}} -u {{username}} -p {{password}} --bloodhound --collection {{All}}`
`nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --bloodhound {{[-c|--collection]}} {{All}}`
- Attempt to collect AS_REP messages for the specified user in order to perform an ASREPRoasting attack:
`nxc ldap {{192.168.178.2}} -u {{username}} -p '' --asreproast {{path/to/output.txt}}`
`nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} '' --asreproast {{path/to/output.txt}}`
- Attempt to extract the passwords of group managed service accounts on the domain:
`nxc ldap {{192.168.178.2}} -u {{username}} -p {{password}} --gmsa`
`nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --gmsa`

View file

@ -3,26 +3,26 @@
> Pentest and exploit Microsoft SQL servers.
> More information: <https://www.netexec.wiki/mssql-protocol>.
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
- Search for valid credentials by trying out every combination in the specified lists of usernames and passwords:
`nxc mssql {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
`nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
- Execute the specified SQL [q]uery on the target server:
- Execute the specified SQL query on the target server:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --query '{{SELECT * FROM sys.databases;}}'`
`nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} {{[-q|--query]}} '{{SELECT * FROM sys.databases;}}'`
- Execute the specified shell command on the target server through MSSQL:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} -x {{whoami}}`
`nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -x {{whoami}}`
- Execute the specified PowerShell command on the target server through MSSQL without retrieving output:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} -X {{whoami}} --no-output`
`nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -X {{whoami}} --no-output`
- Download a remote file from the target server and store it in the specified location:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --get-file {{C:\path\to\remote_file}} {{path/to/local_file}}`
`nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --get-file {{C:\path\to\remote_file}} {{path/to/local_file}}`
- Upload a local file to the specified location on the target server:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --put-file {{path/to/local_file}} {{C:\path\to\remote_file}}`
`nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --put-file {{path/to/local_file}} {{C:\path\to\remote_file}}`

View file

@ -3,18 +3,18 @@
> Pentest and exploit RDP servers.
> More information: <https://www.netexec.wiki/rdp-protocol>.
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
- Search for valid credentials by trying out every combination in the specified lists of usernames and passwords:
`nxc rdp {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
`nxc rdp {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
- Take a screenshot after waiting the for specified number of seconds:
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --screenshot --screentime {{10}}`
`nxc rdp {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --screenshot --screentime {{10}}`
- Take a screenshot in the specified resolution:
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --screenshot --res {{1024x768}}`
`nxc rdp {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --screenshot --res {{1024x768}}`
- Take a screenshot of the RDP login prompt if Network Level Authentication is disabled:
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --nla-screenshot`
`nxc rdp {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --nla-screenshot`

View file

@ -3,26 +3,26 @@
> Pentest and exploit SMB servers.
> More information: <https://www.netexec.wiki/smb-protocol>.
- Search for valid domain credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
- Search for valid domain credentials by trying out every combination in the specified lists of usernames and passwords:
`nxc smb {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
`nxc smb {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
- Search for valid credentials for local accounts instead of domain accounts:
`nxc smb {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}} --local-auth`
`nxc smb {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}} --local-auth`
- Enumerate SMB shares and the specified users' access rights to them on the target hosts:
`nxc smb {{192.168.178.0/24}} -u {{username}} -p {{password}} --shares`
`nxc smb {{192.168.178.0/24}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --shares`
- Enumerate network interfaces on the target hosts, performing authentication via pass-the-hash:
`nxc smb {{192.168.178.30-45}} -u {{username}} -H {{NTLM_hash}} --interfaces`
`nxc smb {{192.168.178.30-45}} {{[-u|--username]}} {{username}} {{[-H|--hash]}} {{NTLM_hash}} --interfaces`
- Scan the target hosts for common vulnerabilities:
`nxc smb {{path/to/target_list.txt}} -u '' -p '' -M zerologon -M petitpotam`
`nxc smb {{path/to/target_list.txt}} {{[-u|--username]}} '' {{[-p|--password]}} '' {{[-M|--module]}} zerologon {{[-M|--module]}} petitpotam`
- Attempt to execute a command on the target hosts:
`nxc smb {{192.168.178.2}} -u {{username}} -p {{password}} -x {{command}}`
`nxc smb {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -x {{command}}`

View file

@ -4,22 +4,22 @@
> See also: `hydra`.
> More information: <https://www.netexec.wiki/ssh-protocol>.
- Spray the specified [p]assword against a list of [u]sernames on the specified target:
- Spray the specified password against a list of usernames on the specified target:
`nxc ssh {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{password}}`
`nxc ssh {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{password}}`
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
- Search for valid credentials by trying out every combination in the specified lists of usernames and passwords:
`nxc ssh {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
`nxc ssh {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
- Use the specified private key for authentication, using the supplied [p]assword as the key's passphrase:
- Use the specified private key for authentication, using the supplied password as the key's passphrase:
`nxc ssh {{192.186.178.2}} -u {{path/to/usernames.txt}} -p {{password}} --key-file {{path/to/id_rsa}}`
`nxc ssh {{192.186.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{password}} --key-file {{path/to/id_rsa}}`
- Try a combination of [u]sername and [p]assword on a number of targets:
- Try a combination of username and password on a number of targets:
`nxc ssh {{192.168.178.0/24}} -u {{username}} -p {{password}}`
`nxc ssh {{192.168.178.0/24}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}}`
- Check for `sudo` privileges on a successful login:
`nxc ssh {{192.168.178.2}} -u {{username}} -p {{path/to/passwords.txt}} --sudo-check`
`nxc ssh {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{path/to/passwords.txt}} --sudo-check`

View file

@ -3,14 +3,14 @@
> Pentest and exploit VNC servers.
> More information: <https://www.netexec.wiki/>.
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
- Search for valid credentials by trying out every combination in the specified lists of usernames and passwords:
`nxc vnc {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
`nxc vnc {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
- Avoid rate limiting through VNC-sleep:
`nxc vnc {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}} --vnc-sleep {{10}}`
`nxc vnc {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}} --vnc-sleep {{10}}`
- Take a screenshot on the remote system after waiting the specified amount of time:
`nxc vnc {{192.168.178.2}} -u {{username}} -p {{password}} --screenshot --screentime {{10}}`
`nxc vnc {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --screenshot --screentime {{10}}`

View file

@ -3,18 +3,18 @@
> Pentest and exploit Windows Remote Management (winrm).
> More information: <https://www.netexec.wiki/winrm-protocol>.
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
- Search for valid credentials by trying out every combination in the specified lists of usernames and passwords:
`nxc winrm {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
`nxc winrm {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
- Specify the domain to authenticate to (avoids an initial SMB connection):
`nxc winrm {{192.168.178.2}} -u {{username}} -p {{password}} -d {{domain_name}}`
`nxc winrm {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -d {{domain_name}}`
- Execute the specified command on the host:
`nxc winrm {{192.168.178.2}} -u {{username}} -p {{password}} -x {{whoami}}`
`nxc winrm {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -x {{whoami}}`
- Execute the specified PowerShell command on the host as administrator using LAPS:
`nxc winrm {{192.168.178.2}} -u {{username}} -p {{password}} --laps -X {{whoami}}`
`nxc winrm {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --laps -X {{whoami}}`

View file

@ -3,18 +3,18 @@
> Pentest and exploit the Windows Management Instrumentation (WMI).
> More information: <https://www.netexec.wiki/wmi-protocol>.
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
- Search for valid credentials by trying out every combination in the specified lists of usernames and passwords:
`nxc wmi {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
`nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
- Authenticate via local authentication (as opposed to authenticating to the domain):
`nxc wmi {{192.168.178.2}} -u {{username}} -p {{password}} --local-auth`
`nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --local-auth`
- Issue the specified WMI query:
`nxc wmi {{192.168.178.2}} -u {{username}} -p {{password}} --wmi {{wmi_query}}`
`nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --wmi {{wmi_query}}`
- Execute the specified command on the targeted host:
`nxc wmi {{192.168.178.2}} -u {{username}} -p {{password}} --x {{command}}`
`nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -x {{command}}`

View file

@ -1,7 +1,7 @@
# racket
> Racket language interpreter.
> More information: <https://racket-lang.org>.
> More information: <https://docs.racket-lang.org/reference/running-sa.html#%28part._mz-cmdline%29>.
- Start a REPL (interactive shell):
@ -13,11 +13,11 @@
- Execute a Racket expression:
`racket --eval "{{expression}}"`
`racket {{[-e|--eval]}} "{{expression}}"`
- Run module as a script (terminates option list):
`racket --lib {{module_name}} --main {{arguments}}`
`racket {{[-l|--lib]}} {{module_name}} {{[-m|--main]}} {{arguments}}`
- Start a REPL (interactive shell) for the `typed/racket` hashlang:

View file

@ -2,7 +2,7 @@
> Ruby programming language interpreter.
> See also: `gem`, `bundler`, `rake`, `irb`.
> More information: <https://www.ruby-lang.org>.
> More information: <https://manned.org/ruby>.
- Execute a Ruby script:

View file

@ -1,7 +1,7 @@
# sngrep
> Display SIP calls message flows from terminal.
> More information: <https://github.com/irontec/sngrep>.
> More information: <https://manned.org/sngrep>.
- Visualize SIP packets from a PCAP file:

View file

@ -2,7 +2,7 @@
> A text-based web browser.
> Supports SSL and mouse input, even over SSH.
> More information: <https://w3m.sourceforge.net>.
> More information: <https://w3m.sourceforge.net/MANUAL>.
- Open a URL:

View file

@ -1,7 +1,7 @@
# wal
> Create color schemes based on the dominant colors of a wallpaper.
> More information: <https://github.com/dylanaraps/pywal>.
> More information: <https://github.com/dylanaraps/pywal/wiki/Getting-Started>.
- Preview color scheme:

View file

@ -1,7 +1,7 @@
# xe
> Execute a command once for each line piped from another command or file.
> More information: <https://github.com/leahneukirchen/xe>.
> More information: <https://github.com/leahneukirchen/xe/blob/master/README>.
- Run a command once for each line of input data as arguments: