mirror of
https://github.com/tldr-pages/tldr.git
synced 2025-07-23 09:35:24 +02:00
*: add option placeholders (#16370)
This commit is contained in:
parent
13709c3d90
commit
ae3b7aff99
30 changed files with 88 additions and 88 deletions
|
@ -6,7 +6,7 @@
|
|||
|
||||
- Print messages about the patched files:
|
||||
|
||||
`git apply --verbose {{path/to/file}}`
|
||||
`git apply {{[-v|--verbose]}} {{path/to/file}}`
|
||||
|
||||
- Apply and add the patched files to the index:
|
||||
|
||||
|
@ -14,7 +14,7 @@
|
|||
|
||||
- Apply a remote patch file:
|
||||
|
||||
`curl -L {{https://example.com/file.patch}} | git apply`
|
||||
`curl {{[-L|--location]}} {{https://example.com/file.patch}} | git apply`
|
||||
|
||||
- Output diffstat for the input and apply the patch:
|
||||
|
||||
|
@ -22,7 +22,7 @@
|
|||
|
||||
- Apply the patch in reverse:
|
||||
|
||||
`git apply --reverse {{path/to/file}}`
|
||||
`git apply {{[-R|--reverse]}} {{path/to/file}}`
|
||||
|
||||
- Store the patch result in the index without modifying the working tree:
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
|
||||
> Online password guessing tool.
|
||||
> Protocols supported include FTP, HTTP(S), SMTP, SNMP, XMPP, SSH, and more.
|
||||
> More information: <https://github.com/vanhauser-thc/thc-hydra>.
|
||||
> More information: <https://manned.org/hydra>.
|
||||
|
||||
- Start Hydra's wizard:
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
# iex
|
||||
|
||||
> IEx is the interactive shell for Elixir.
|
||||
> More information: <https://hexdocs.pm/iex>.
|
||||
> More information: <https://manned.org/iex>.
|
||||
|
||||
- Start an interactive session:
|
||||
|
||||
|
|
|
@ -11,4 +11,4 @@
|
|||
|
||||
- Print a file from `stdin` to `stdout`:
|
||||
|
||||
`{{wget -O - https://examplewebsite.com/file}} | ippeveps`
|
||||
`{{wget {{[-O|--output-document]}} - https://examplewebsite.com/file}} | ippeveps`
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
# medusa
|
||||
|
||||
> A modular and parallel login brute-forcer for a variety of protocols.
|
||||
> More information: <https://jmk-foofus.github.io/medusa/medusa.html>.
|
||||
> More information: <https://manned.org/medusa>.
|
||||
|
||||
- List all installed modules:
|
||||
|
||||
|
|
|
@ -1,11 +1,11 @@
|
|||
# meson
|
||||
|
||||
> SCons-like build system that uses Python as a front-end language and Ninja as a building backend.
|
||||
> More information: <https://mesonbuild.com>.
|
||||
> More information: <https://mesonbuild.com/Commands.html>.
|
||||
|
||||
- Generate a C project with a given name and version:
|
||||
|
||||
`meson init --language={{c}} --name={{myproject}} --version={{0.1}}`
|
||||
`meson init {{[-l|--language]}} c {{[-n|--name]}} {{myproject}} --version {{0.1}}`
|
||||
|
||||
- Configure the `builddir` with default values:
|
||||
|
||||
|
@ -21,8 +21,8 @@
|
|||
|
||||
- Show the help:
|
||||
|
||||
`meson --help`
|
||||
`meson {{[-h|--help]}}`
|
||||
|
||||
- Display version:
|
||||
|
||||
`meson --version`
|
||||
`meson {{[-v|--version]}}`
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
# mg
|
||||
|
||||
> A small, fast, and portable text editor based on `emacs`.
|
||||
> More information: <https://github.com/hboetes/mg>.
|
||||
> More information: <https://manned.org/mg>.
|
||||
|
||||
- Open a file for editing:
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
# mp3info
|
||||
|
||||
> Viewer/editor for ID3v1 (but not ID3v2) tags of MP3 files.
|
||||
> More information: <https://www.ibiblio.org/mp3info>.
|
||||
> More information: <https://www.ibiblio.org/mp3info/mp3info.html>.
|
||||
|
||||
- Show all ID3v1 tags of a specific MP3 file:
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
# mupdf
|
||||
|
||||
> A lightweight PDF, XPS, and E-book viewer.
|
||||
> More information: <https://www.mupdf.com>.
|
||||
> More information: <https://mupdf.readthedocs.io/en/latest/mupdf-command-line.html>.
|
||||
|
||||
- Open a PDF on the first page:
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
# mutool
|
||||
|
||||
> Convert, query information and extract data from PDF files.
|
||||
> More information: <https://mupdf.readthedocs.io/en/latest/mupdf-command-line.html>.
|
||||
> More information: <https://mupdf.readthedocs.io/en/latest/mupdf-command-line.html#mupdf-command-line-mutool>.
|
||||
|
||||
- Convert a range of pages to PNGs (Note: `%nd` in the output placeholder must be replaced with a print modifier like `%d` or `%2d`):
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
# mutt
|
||||
|
||||
> Command-line email client.
|
||||
> More information: <http://mutt.org>.
|
||||
> More information: <http://mutt.org/doc/mutt.1.txt>.
|
||||
|
||||
- Open the specified mailbox:
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
# mvn
|
||||
|
||||
> Apache Maven: build and manage Java-based projects.
|
||||
> More information: <https://maven.apache.org>.
|
||||
> More information: <https://manned.org/mvn>.
|
||||
|
||||
- Compile a project:
|
||||
|
||||
|
@ -13,7 +13,7 @@
|
|||
|
||||
- Compile and package, skipping unit tests:
|
||||
|
||||
`mvn package -DskipTests`
|
||||
`mvn package {{[-D|--define]}} skipTests`
|
||||
|
||||
- Install the built package in local maven repository. (This will invoke the compile and package commands too):
|
||||
|
||||
|
@ -29,8 +29,8 @@
|
|||
|
||||
- Clean and then package the code with a given build profile:
|
||||
|
||||
`mvn clean -P {{profile}} package`
|
||||
`mvn clean {{[-P|--activate-profiles]}} {{profile}} package`
|
||||
|
||||
- Run a class with a main method:
|
||||
|
||||
`mvn exec:java -Dexec.mainClass="{{com.example.Main}}" -Dexec.args="{{argument1 argument2 ...}}"`
|
||||
`mvn exec:java {{[-D|--define]}} exec.mainClass="{{com.example.Main}}" {{[-D|--define]}} exec.args="{{argument1 argument2 ...}}"`
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
# neomutt
|
||||
|
||||
> NeoMutt command-line email client.
|
||||
> More information: <https://neomutt.org>.
|
||||
> More information: <https://neomutt.org/guide/reference.html>.
|
||||
|
||||
- Open the specified mailbox:
|
||||
|
||||
|
|
|
@ -5,8 +5,8 @@
|
|||
|
||||
- Find hosts in the local network with SMB shares:
|
||||
|
||||
`nmblookup -S '*'`
|
||||
`nmblookup {{[-S|--status]}} '*'`
|
||||
|
||||
- Find hosts in the local network with SMB shares run by SAMBA:
|
||||
|
||||
`nmblookup --status __SAMBA__`
|
||||
`nmblookup {{[-S|--status]}} __SAMBA__`
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
# nokogiri
|
||||
|
||||
> An HTML, XML, SAX and Reader parser.
|
||||
> More information: <https://nokogiri.org>.
|
||||
> More information: <https://manned.org/nokogiri>.
|
||||
|
||||
- Parse the contents of a URL or file:
|
||||
|
||||
|
@ -17,7 +17,7 @@
|
|||
|
||||
- Parse using a specific encoding:
|
||||
|
||||
`nokogiri {{url|path/to/file}} --encoding {{encoding}}`
|
||||
`nokogiri {{url|path/to/file}} {{[-E|--encoding]}} {{encoding}}`
|
||||
|
||||
- Validate using a RELAX NG file:
|
||||
|
||||
|
|
|
@ -3,22 +3,22 @@
|
|||
> Pentest and exploit FTP servers.
|
||||
> More information: <https://www.netexec.wiki/ftp-protocol>.
|
||||
|
||||
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
|
||||
- Search for valid credentials by trying out every combination in the specified lists of usernames and passwords:
|
||||
|
||||
`nxc ftp {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
|
||||
`nxc ftp {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
|
||||
|
||||
- Continue searching for valid credentials even after valid credentials have been found:
|
||||
|
||||
`nxc ftp {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}} --continue-on-success`
|
||||
`nxc ftp {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}} --continue-on-success`
|
||||
|
||||
- Perform directory listings on each FTP server the supplied credentials are valid on:
|
||||
|
||||
`nxc ftp {{192.168.178.0/24}} -u {{username}} -p {{password}} --ls`
|
||||
`nxc ftp {{192.168.178.0/24}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --ls`
|
||||
|
||||
- Download the specified file from the target server:
|
||||
|
||||
`nxc ftp {{192.168.178.2}} -u {{username}} -p {{password}} --get {{path/to/file}}`
|
||||
`nxc ftp {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --get {{path/to/file}}`
|
||||
|
||||
- Upload the specified file to the target server at the specified location:
|
||||
|
||||
`nxc ftp {{192.168.178.2}} -u {{username}} -p {{password}} --put {{path/to/local_file}} {{path/to/remote_location}}`
|
||||
`nxc ftp {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --put {{path/to/local_file}} {{path/to/remote_location}}`
|
||||
|
|
|
@ -3,22 +3,22 @@
|
|||
> Pentest and exploit Windows Active Directory Domains via LDAP.
|
||||
> More information: <https://www.netexec.wiki/ldap-protocol>.
|
||||
|
||||
- Search for valid domain credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
|
||||
- Search for valid domain credentials by trying out every combination in the specified lists of usernames and passwords:
|
||||
|
||||
`nxc ldap {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
|
||||
`nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
|
||||
|
||||
- Enumerate active domain users:
|
||||
|
||||
`nxc ldap {{192.168.178.2}} -u {{username}} -p {{password}} --active-users`
|
||||
`nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --active-users`
|
||||
|
||||
- Collect data about the targeted domain and automatically import these data into BloodHound:
|
||||
|
||||
`nxc ldap {{192.168.178.2}} -u {{username}} -p {{password}} --bloodhound --collection {{All}}`
|
||||
`nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --bloodhound {{[-c|--collection]}} {{All}}`
|
||||
|
||||
- Attempt to collect AS_REP messages for the specified user in order to perform an ASREPRoasting attack:
|
||||
|
||||
`nxc ldap {{192.168.178.2}} -u {{username}} -p '' --asreproast {{path/to/output.txt}}`
|
||||
`nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} '' --asreproast {{path/to/output.txt}}`
|
||||
|
||||
- Attempt to extract the passwords of group managed service accounts on the domain:
|
||||
|
||||
`nxc ldap {{192.168.178.2}} -u {{username}} -p {{password}} --gmsa`
|
||||
`nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --gmsa`
|
||||
|
|
|
@ -3,26 +3,26 @@
|
|||
> Pentest and exploit Microsoft SQL servers.
|
||||
> More information: <https://www.netexec.wiki/mssql-protocol>.
|
||||
|
||||
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
|
||||
- Search for valid credentials by trying out every combination in the specified lists of usernames and passwords:
|
||||
|
||||
`nxc mssql {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
|
||||
`nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
|
||||
|
||||
- Execute the specified SQL [q]uery on the target server:
|
||||
- Execute the specified SQL query on the target server:
|
||||
|
||||
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --query '{{SELECT * FROM sys.databases;}}'`
|
||||
`nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} {{[-q|--query]}} '{{SELECT * FROM sys.databases;}}'`
|
||||
|
||||
- Execute the specified shell command on the target server through MSSQL:
|
||||
|
||||
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} -x {{whoami}}`
|
||||
`nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -x {{whoami}}`
|
||||
|
||||
- Execute the specified PowerShell command on the target server through MSSQL without retrieving output:
|
||||
|
||||
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} -X {{whoami}} --no-output`
|
||||
`nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -X {{whoami}} --no-output`
|
||||
|
||||
- Download a remote file from the target server and store it in the specified location:
|
||||
|
||||
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --get-file {{C:\path\to\remote_file}} {{path/to/local_file}}`
|
||||
`nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --get-file {{C:\path\to\remote_file}} {{path/to/local_file}}`
|
||||
|
||||
- Upload a local file to the specified location on the target server:
|
||||
|
||||
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --put-file {{path/to/local_file}} {{C:\path\to\remote_file}}`
|
||||
`nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --put-file {{path/to/local_file}} {{C:\path\to\remote_file}}`
|
||||
|
|
|
@ -3,18 +3,18 @@
|
|||
> Pentest and exploit RDP servers.
|
||||
> More information: <https://www.netexec.wiki/rdp-protocol>.
|
||||
|
||||
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
|
||||
- Search for valid credentials by trying out every combination in the specified lists of usernames and passwords:
|
||||
|
||||
`nxc rdp {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
|
||||
`nxc rdp {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
|
||||
|
||||
- Take a screenshot after waiting the for specified number of seconds:
|
||||
|
||||
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --screenshot --screentime {{10}}`
|
||||
`nxc rdp {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --screenshot --screentime {{10}}`
|
||||
|
||||
- Take a screenshot in the specified resolution:
|
||||
|
||||
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --screenshot --res {{1024x768}}`
|
||||
`nxc rdp {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --screenshot --res {{1024x768}}`
|
||||
|
||||
- Take a screenshot of the RDP login prompt if Network Level Authentication is disabled:
|
||||
|
||||
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --nla-screenshot`
|
||||
`nxc rdp {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --nla-screenshot`
|
||||
|
|
|
@ -3,26 +3,26 @@
|
|||
> Pentest and exploit SMB servers.
|
||||
> More information: <https://www.netexec.wiki/smb-protocol>.
|
||||
|
||||
- Search for valid domain credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
|
||||
- Search for valid domain credentials by trying out every combination in the specified lists of usernames and passwords:
|
||||
|
||||
`nxc smb {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
|
||||
`nxc smb {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
|
||||
|
||||
- Search for valid credentials for local accounts instead of domain accounts:
|
||||
|
||||
`nxc smb {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}} --local-auth`
|
||||
`nxc smb {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}} --local-auth`
|
||||
|
||||
- Enumerate SMB shares and the specified users' access rights to them on the target hosts:
|
||||
|
||||
`nxc smb {{192.168.178.0/24}} -u {{username}} -p {{password}} --shares`
|
||||
`nxc smb {{192.168.178.0/24}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --shares`
|
||||
|
||||
- Enumerate network interfaces on the target hosts, performing authentication via pass-the-hash:
|
||||
|
||||
`nxc smb {{192.168.178.30-45}} -u {{username}} -H {{NTLM_hash}} --interfaces`
|
||||
`nxc smb {{192.168.178.30-45}} {{[-u|--username]}} {{username}} {{[-H|--hash]}} {{NTLM_hash}} --interfaces`
|
||||
|
||||
- Scan the target hosts for common vulnerabilities:
|
||||
|
||||
`nxc smb {{path/to/target_list.txt}} -u '' -p '' -M zerologon -M petitpotam`
|
||||
`nxc smb {{path/to/target_list.txt}} {{[-u|--username]}} '' {{[-p|--password]}} '' {{[-M|--module]}} zerologon {{[-M|--module]}} petitpotam`
|
||||
|
||||
- Attempt to execute a command on the target hosts:
|
||||
|
||||
`nxc smb {{192.168.178.2}} -u {{username}} -p {{password}} -x {{command}}`
|
||||
`nxc smb {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -x {{command}}`
|
||||
|
|
|
@ -4,22 +4,22 @@
|
|||
> See also: `hydra`.
|
||||
> More information: <https://www.netexec.wiki/ssh-protocol>.
|
||||
|
||||
- Spray the specified [p]assword against a list of [u]sernames on the specified target:
|
||||
- Spray the specified password against a list of usernames on the specified target:
|
||||
|
||||
`nxc ssh {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{password}}`
|
||||
`nxc ssh {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{password}}`
|
||||
|
||||
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
|
||||
- Search for valid credentials by trying out every combination in the specified lists of usernames and passwords:
|
||||
|
||||
`nxc ssh {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
|
||||
`nxc ssh {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
|
||||
|
||||
- Use the specified private key for authentication, using the supplied [p]assword as the key's passphrase:
|
||||
- Use the specified private key for authentication, using the supplied password as the key's passphrase:
|
||||
|
||||
`nxc ssh {{192.186.178.2}} -u {{path/to/usernames.txt}} -p {{password}} --key-file {{path/to/id_rsa}}`
|
||||
`nxc ssh {{192.186.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{password}} --key-file {{path/to/id_rsa}}`
|
||||
|
||||
- Try a combination of [u]sername and [p]assword on a number of targets:
|
||||
- Try a combination of username and password on a number of targets:
|
||||
|
||||
`nxc ssh {{192.168.178.0/24}} -u {{username}} -p {{password}}`
|
||||
`nxc ssh {{192.168.178.0/24}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}}`
|
||||
|
||||
- Check for `sudo` privileges on a successful login:
|
||||
|
||||
`nxc ssh {{192.168.178.2}} -u {{username}} -p {{path/to/passwords.txt}} --sudo-check`
|
||||
`nxc ssh {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{path/to/passwords.txt}} --sudo-check`
|
||||
|
|
|
@ -3,14 +3,14 @@
|
|||
> Pentest and exploit VNC servers.
|
||||
> More information: <https://www.netexec.wiki/>.
|
||||
|
||||
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
|
||||
- Search for valid credentials by trying out every combination in the specified lists of usernames and passwords:
|
||||
|
||||
`nxc vnc {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
|
||||
`nxc vnc {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
|
||||
|
||||
- Avoid rate limiting through VNC-sleep:
|
||||
|
||||
`nxc vnc {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}} --vnc-sleep {{10}}`
|
||||
`nxc vnc {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}} --vnc-sleep {{10}}`
|
||||
|
||||
- Take a screenshot on the remote system after waiting the specified amount of time:
|
||||
|
||||
`nxc vnc {{192.168.178.2}} -u {{username}} -p {{password}} --screenshot --screentime {{10}}`
|
||||
`nxc vnc {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --screenshot --screentime {{10}}`
|
||||
|
|
|
@ -3,18 +3,18 @@
|
|||
> Pentest and exploit Windows Remote Management (winrm).
|
||||
> More information: <https://www.netexec.wiki/winrm-protocol>.
|
||||
|
||||
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
|
||||
- Search for valid credentials by trying out every combination in the specified lists of usernames and passwords:
|
||||
|
||||
`nxc winrm {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
|
||||
`nxc winrm {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
|
||||
|
||||
- Specify the domain to authenticate to (avoids an initial SMB connection):
|
||||
|
||||
`nxc winrm {{192.168.178.2}} -u {{username}} -p {{password}} -d {{domain_name}}`
|
||||
`nxc winrm {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -d {{domain_name}}`
|
||||
|
||||
- Execute the specified command on the host:
|
||||
|
||||
`nxc winrm {{192.168.178.2}} -u {{username}} -p {{password}} -x {{whoami}}`
|
||||
`nxc winrm {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -x {{whoami}}`
|
||||
|
||||
- Execute the specified PowerShell command on the host as administrator using LAPS:
|
||||
|
||||
`nxc winrm {{192.168.178.2}} -u {{username}} -p {{password}} --laps -X {{whoami}}`
|
||||
`nxc winrm {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --laps -X {{whoami}}`
|
||||
|
|
|
@ -3,18 +3,18 @@
|
|||
> Pentest and exploit the Windows Management Instrumentation (WMI).
|
||||
> More information: <https://www.netexec.wiki/wmi-protocol>.
|
||||
|
||||
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
|
||||
- Search for valid credentials by trying out every combination in the specified lists of usernames and passwords:
|
||||
|
||||
`nxc wmi {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
|
||||
`nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
|
||||
|
||||
- Authenticate via local authentication (as opposed to authenticating to the domain):
|
||||
|
||||
`nxc wmi {{192.168.178.2}} -u {{username}} -p {{password}} --local-auth`
|
||||
`nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --local-auth`
|
||||
|
||||
- Issue the specified WMI query:
|
||||
|
||||
`nxc wmi {{192.168.178.2}} -u {{username}} -p {{password}} --wmi {{wmi_query}}`
|
||||
`nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --wmi {{wmi_query}}`
|
||||
|
||||
- Execute the specified command on the targeted host:
|
||||
|
||||
`nxc wmi {{192.168.178.2}} -u {{username}} -p {{password}} --x {{command}}`
|
||||
`nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -x {{command}}`
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
# racket
|
||||
|
||||
> Racket language interpreter.
|
||||
> More information: <https://racket-lang.org>.
|
||||
> More information: <https://docs.racket-lang.org/reference/running-sa.html#%28part._mz-cmdline%29>.
|
||||
|
||||
- Start a REPL (interactive shell):
|
||||
|
||||
|
@ -13,11 +13,11 @@
|
|||
|
||||
- Execute a Racket expression:
|
||||
|
||||
`racket --eval "{{expression}}"`
|
||||
`racket {{[-e|--eval]}} "{{expression}}"`
|
||||
|
||||
- Run module as a script (terminates option list):
|
||||
|
||||
`racket --lib {{module_name}} --main {{arguments}}`
|
||||
`racket {{[-l|--lib]}} {{module_name}} {{[-m|--main]}} {{arguments}}`
|
||||
|
||||
- Start a REPL (interactive shell) for the `typed/racket` hashlang:
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
|
||||
> Ruby programming language interpreter.
|
||||
> See also: `gem`, `bundler`, `rake`, `irb`.
|
||||
> More information: <https://www.ruby-lang.org>.
|
||||
> More information: <https://manned.org/ruby>.
|
||||
|
||||
- Execute a Ruby script:
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
# sngrep
|
||||
|
||||
> Display SIP calls message flows from terminal.
|
||||
> More information: <https://github.com/irontec/sngrep>.
|
||||
> More information: <https://manned.org/sngrep>.
|
||||
|
||||
- Visualize SIP packets from a PCAP file:
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
|
||||
> A text-based web browser.
|
||||
> Supports SSL and mouse input, even over SSH.
|
||||
> More information: <https://w3m.sourceforge.net>.
|
||||
> More information: <https://w3m.sourceforge.net/MANUAL>.
|
||||
|
||||
- Open a URL:
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
# wal
|
||||
|
||||
> Create color schemes based on the dominant colors of a wallpaper.
|
||||
> More information: <https://github.com/dylanaraps/pywal>.
|
||||
> More information: <https://github.com/dylanaraps/pywal/wiki/Getting-Started>.
|
||||
|
||||
- Preview color scheme:
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
# xe
|
||||
|
||||
> Execute a command once for each line piped from another command or file.
|
||||
> More information: <https://github.com/leahneukirchen/xe>.
|
||||
> More information: <https://github.com/leahneukirchen/xe/blob/master/README>.
|
||||
|
||||
- Run a command once for each line of input data as arguments:
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue