diff --git a/pages/common/git-apply.md b/pages/common/git-apply.md index 9687569edb..035d6404de 100644 --- a/pages/common/git-apply.md +++ b/pages/common/git-apply.md @@ -6,7 +6,7 @@ - Print messages about the patched files: -`git apply --verbose {{path/to/file}}` +`git apply {{[-v|--verbose]}} {{path/to/file}}` - Apply and add the patched files to the index: @@ -14,7 +14,7 @@ - Apply a remote patch file: -`curl -L {{https://example.com/file.patch}} | git apply` +`curl {{[-L|--location]}} {{https://example.com/file.patch}} | git apply` - Output diffstat for the input and apply the patch: @@ -22,7 +22,7 @@ - Apply the patch in reverse: -`git apply --reverse {{path/to/file}}` +`git apply {{[-R|--reverse]}} {{path/to/file}}` - Store the patch result in the index without modifying the working tree: diff --git a/pages/common/hydra.md b/pages/common/hydra.md index 35e4aa8d0c..7977b2155e 100644 --- a/pages/common/hydra.md +++ b/pages/common/hydra.md @@ -2,7 +2,7 @@ > Online password guessing tool. > Protocols supported include FTP, HTTP(S), SMTP, SNMP, XMPP, SSH, and more. -> More information: . +> More information: . - Start Hydra's wizard: diff --git a/pages/common/iex.md b/pages/common/iex.md index 87845f6a9e..3bb5a150c9 100644 --- a/pages/common/iex.md +++ b/pages/common/iex.md @@ -1,7 +1,7 @@ # iex > IEx is the interactive shell for Elixir. -> More information: . +> More information: . - Start an interactive session: diff --git a/pages/common/ippeveps.md b/pages/common/ippeveps.md index 5bcdef5785..f713343904 100644 --- a/pages/common/ippeveps.md +++ b/pages/common/ippeveps.md @@ -11,4 +11,4 @@ - Print a file from `stdin` to `stdout`: -`{{wget -O - https://examplewebsite.com/file}} | ippeveps` +`{{wget {{[-O|--output-document]}} - https://examplewebsite.com/file}} | ippeveps` diff --git a/pages/common/medusa.md b/pages/common/medusa.md index 5c79200a44..38f9492c7d 100644 --- a/pages/common/medusa.md +++ b/pages/common/medusa.md @@ -1,7 +1,7 @@ # medusa > A modular and parallel login brute-forcer for a variety of protocols. -> More information: . +> More information: . - List all installed modules: diff --git a/pages/common/meson.md b/pages/common/meson.md index d4dca83ef3..9f3b5ad6fa 100644 --- a/pages/common/meson.md +++ b/pages/common/meson.md @@ -1,11 +1,11 @@ # meson > SCons-like build system that uses Python as a front-end language and Ninja as a building backend. -> More information: . +> More information: . - Generate a C project with a given name and version: -`meson init --language={{c}} --name={{myproject}} --version={{0.1}}` +`meson init {{[-l|--language]}} c {{[-n|--name]}} {{myproject}} --version {{0.1}}` - Configure the `builddir` with default values: @@ -21,8 +21,8 @@ - Show the help: -`meson --help` +`meson {{[-h|--help]}}` - Display version: -`meson --version` +`meson {{[-v|--version]}}` diff --git a/pages/common/mg.md b/pages/common/mg.md index e4c998813f..4b4b6d4084 100644 --- a/pages/common/mg.md +++ b/pages/common/mg.md @@ -1,7 +1,7 @@ # mg > A small, fast, and portable text editor based on `emacs`. -> More information: . +> More information: . - Open a file for editing: diff --git a/pages/common/mp3info.md b/pages/common/mp3info.md index 0f2ce9ba8c..600c988c7c 100644 --- a/pages/common/mp3info.md +++ b/pages/common/mp3info.md @@ -1,7 +1,7 @@ # mp3info > Viewer/editor for ID3v1 (but not ID3v2) tags of MP3 files. -> More information: . +> More information: . - Show all ID3v1 tags of a specific MP3 file: diff --git a/pages/common/mupdf.md b/pages/common/mupdf.md index b925b9c279..662bed8c3e 100644 --- a/pages/common/mupdf.md +++ b/pages/common/mupdf.md @@ -1,7 +1,7 @@ # mupdf > A lightweight PDF, XPS, and E-book viewer. -> More information: . +> More information: . - Open a PDF on the first page: diff --git a/pages/common/mutool.md b/pages/common/mutool.md index 8490beb2a1..3346071f8a 100644 --- a/pages/common/mutool.md +++ b/pages/common/mutool.md @@ -1,7 +1,7 @@ # mutool > Convert, query information and extract data from PDF files. -> More information: . +> More information: . - Convert a range of pages to PNGs (Note: `%nd` in the output placeholder must be replaced with a print modifier like `%d` or `%2d`): diff --git a/pages/common/mutt.md b/pages/common/mutt.md index 88e540c6ac..3093f81e4c 100644 --- a/pages/common/mutt.md +++ b/pages/common/mutt.md @@ -1,7 +1,7 @@ # mutt > Command-line email client. -> More information: . +> More information: . - Open the specified mailbox: diff --git a/pages/common/mvn.md b/pages/common/mvn.md index 6eed97fd82..6b3e564f37 100644 --- a/pages/common/mvn.md +++ b/pages/common/mvn.md @@ -1,7 +1,7 @@ # mvn > Apache Maven: build and manage Java-based projects. -> More information: . +> More information: . - Compile a project: @@ -13,7 +13,7 @@ - Compile and package, skipping unit tests: -`mvn package -DskipTests` +`mvn package {{[-D|--define]}} skipTests` - Install the built package in local maven repository. (This will invoke the compile and package commands too): @@ -29,8 +29,8 @@ - Clean and then package the code with a given build profile: -`mvn clean -P {{profile}} package` +`mvn clean {{[-P|--activate-profiles]}} {{profile}} package` - Run a class with a main method: -`mvn exec:java -Dexec.mainClass="{{com.example.Main}}" -Dexec.args="{{argument1 argument2 ...}}"` +`mvn exec:java {{[-D|--define]}} exec.mainClass="{{com.example.Main}}" {{[-D|--define]}} exec.args="{{argument1 argument2 ...}}"` diff --git a/pages/common/neomutt.md b/pages/common/neomutt.md index 47f936bc6c..c5885ec5b0 100644 --- a/pages/common/neomutt.md +++ b/pages/common/neomutt.md @@ -1,7 +1,7 @@ # neomutt > NeoMutt command-line email client. -> More information: . +> More information: . - Open the specified mailbox: diff --git a/pages/common/nmblookup.md b/pages/common/nmblookup.md index 7dd91b83a4..a94fe59fc8 100644 --- a/pages/common/nmblookup.md +++ b/pages/common/nmblookup.md @@ -5,8 +5,8 @@ - Find hosts in the local network with SMB shares: -`nmblookup -S '*'` +`nmblookup {{[-S|--status]}} '*'` - Find hosts in the local network with SMB shares run by SAMBA: -`nmblookup --status __SAMBA__` +`nmblookup {{[-S|--status]}} __SAMBA__` diff --git a/pages/common/nokogiri.md b/pages/common/nokogiri.md index 41fc07c771..1e9dc9a9ac 100644 --- a/pages/common/nokogiri.md +++ b/pages/common/nokogiri.md @@ -1,7 +1,7 @@ # nokogiri > An HTML, XML, SAX and Reader parser. -> More information: . +> More information: . - Parse the contents of a URL or file: @@ -17,7 +17,7 @@ - Parse using a specific encoding: -`nokogiri {{url|path/to/file}} --encoding {{encoding}}` +`nokogiri {{url|path/to/file}} {{[-E|--encoding]}} {{encoding}}` - Validate using a RELAX NG file: diff --git a/pages/common/nxc-ftp.md b/pages/common/nxc-ftp.md index d8248e63f2..3fdbfa15e2 100644 --- a/pages/common/nxc-ftp.md +++ b/pages/common/nxc-ftp.md @@ -3,22 +3,22 @@ > Pentest and exploit FTP servers. > More information: . -- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords: +- Search for valid credentials by trying out every combination in the specified lists of usernames and passwords: -`nxc ftp {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}` +`nxc ftp {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}` - Continue searching for valid credentials even after valid credentials have been found: -`nxc ftp {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}} --continue-on-success` +`nxc ftp {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}} --continue-on-success` - Perform directory listings on each FTP server the supplied credentials are valid on: -`nxc ftp {{192.168.178.0/24}} -u {{username}} -p {{password}} --ls` +`nxc ftp {{192.168.178.0/24}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --ls` - Download the specified file from the target server: -`nxc ftp {{192.168.178.2}} -u {{username}} -p {{password}} --get {{path/to/file}}` +`nxc ftp {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --get {{path/to/file}}` - Upload the specified file to the target server at the specified location: -`nxc ftp {{192.168.178.2}} -u {{username}} -p {{password}} --put {{path/to/local_file}} {{path/to/remote_location}}` +`nxc ftp {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --put {{path/to/local_file}} {{path/to/remote_location}}` diff --git a/pages/common/nxc-ldap.md b/pages/common/nxc-ldap.md index 8134b55f9d..38dc88bbe6 100644 --- a/pages/common/nxc-ldap.md +++ b/pages/common/nxc-ldap.md @@ -3,22 +3,22 @@ > Pentest and exploit Windows Active Directory Domains via LDAP. > More information: . -- Search for valid domain credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords: +- Search for valid domain credentials by trying out every combination in the specified lists of usernames and passwords: -`nxc ldap {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}` +`nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}` - Enumerate active domain users: -`nxc ldap {{192.168.178.2}} -u {{username}} -p {{password}} --active-users` +`nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --active-users` - Collect data about the targeted domain and automatically import these data into BloodHound: -`nxc ldap {{192.168.178.2}} -u {{username}} -p {{password}} --bloodhound --collection {{All}}` +`nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --bloodhound {{[-c|--collection]}} {{All}}` - Attempt to collect AS_REP messages for the specified user in order to perform an ASREPRoasting attack: -`nxc ldap {{192.168.178.2}} -u {{username}} -p '' --asreproast {{path/to/output.txt}}` +`nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} '' --asreproast {{path/to/output.txt}}` - Attempt to extract the passwords of group managed service accounts on the domain: -`nxc ldap {{192.168.178.2}} -u {{username}} -p {{password}} --gmsa` +`nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --gmsa` diff --git a/pages/common/nxc-mssql.md b/pages/common/nxc-mssql.md index 5604ece31e..e2d57da4d4 100644 --- a/pages/common/nxc-mssql.md +++ b/pages/common/nxc-mssql.md @@ -3,26 +3,26 @@ > Pentest and exploit Microsoft SQL servers. > More information: . -- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords: +- Search for valid credentials by trying out every combination in the specified lists of usernames and passwords: -`nxc mssql {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}` +`nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}` -- Execute the specified SQL [q]uery on the target server: +- Execute the specified SQL query on the target server: -`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --query '{{SELECT * FROM sys.databases;}}'` +`nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} {{[-q|--query]}} '{{SELECT * FROM sys.databases;}}'` - Execute the specified shell command on the target server through MSSQL: -`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} -x {{whoami}}` +`nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -x {{whoami}}` - Execute the specified PowerShell command on the target server through MSSQL without retrieving output: -`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} -X {{whoami}} --no-output` +`nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -X {{whoami}} --no-output` - Download a remote file from the target server and store it in the specified location: -`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --get-file {{C:\path\to\remote_file}} {{path/to/local_file}}` +`nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --get-file {{C:\path\to\remote_file}} {{path/to/local_file}}` - Upload a local file to the specified location on the target server: -`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --put-file {{path/to/local_file}} {{C:\path\to\remote_file}}` +`nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --put-file {{path/to/local_file}} {{C:\path\to\remote_file}}` diff --git a/pages/common/nxc-rdp.md b/pages/common/nxc-rdp.md index f34fc2fe81..08795d66f9 100644 --- a/pages/common/nxc-rdp.md +++ b/pages/common/nxc-rdp.md @@ -3,18 +3,18 @@ > Pentest and exploit RDP servers. > More information: . -- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords: +- Search for valid credentials by trying out every combination in the specified lists of usernames and passwords: -`nxc rdp {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}` +`nxc rdp {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}` - Take a screenshot after waiting the for specified number of seconds: -`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --screenshot --screentime {{10}}` +`nxc rdp {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --screenshot --screentime {{10}}` - Take a screenshot in the specified resolution: -`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --screenshot --res {{1024x768}}` +`nxc rdp {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --screenshot --res {{1024x768}}` - Take a screenshot of the RDP login prompt if Network Level Authentication is disabled: -`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --nla-screenshot` +`nxc rdp {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --nla-screenshot` diff --git a/pages/common/nxc-smb.md b/pages/common/nxc-smb.md index 871e40e3e4..419f489114 100644 --- a/pages/common/nxc-smb.md +++ b/pages/common/nxc-smb.md @@ -3,26 +3,26 @@ > Pentest and exploit SMB servers. > More information: . -- Search for valid domain credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords: +- Search for valid domain credentials by trying out every combination in the specified lists of usernames and passwords: -`nxc smb {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}` +`nxc smb {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}` - Search for valid credentials for local accounts instead of domain accounts: -`nxc smb {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}} --local-auth` +`nxc smb {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}} --local-auth` - Enumerate SMB shares and the specified users' access rights to them on the target hosts: -`nxc smb {{192.168.178.0/24}} -u {{username}} -p {{password}} --shares` +`nxc smb {{192.168.178.0/24}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --shares` - Enumerate network interfaces on the target hosts, performing authentication via pass-the-hash: -`nxc smb {{192.168.178.30-45}} -u {{username}} -H {{NTLM_hash}} --interfaces` +`nxc smb {{192.168.178.30-45}} {{[-u|--username]}} {{username}} {{[-H|--hash]}} {{NTLM_hash}} --interfaces` - Scan the target hosts for common vulnerabilities: -`nxc smb {{path/to/target_list.txt}} -u '' -p '' -M zerologon -M petitpotam` +`nxc smb {{path/to/target_list.txt}} {{[-u|--username]}} '' {{[-p|--password]}} '' {{[-M|--module]}} zerologon {{[-M|--module]}} petitpotam` - Attempt to execute a command on the target hosts: -`nxc smb {{192.168.178.2}} -u {{username}} -p {{password}} -x {{command}}` +`nxc smb {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -x {{command}}` diff --git a/pages/common/nxc-ssh.md b/pages/common/nxc-ssh.md index ce4e433105..87fa9b7e80 100644 --- a/pages/common/nxc-ssh.md +++ b/pages/common/nxc-ssh.md @@ -4,22 +4,22 @@ > See also: `hydra`. > More information: . -- Spray the specified [p]assword against a list of [u]sernames on the specified target: +- Spray the specified password against a list of usernames on the specified target: -`nxc ssh {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{password}}` +`nxc ssh {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{password}}` -- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords: +- Search for valid credentials by trying out every combination in the specified lists of usernames and passwords: -`nxc ssh {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}` +`nxc ssh {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}` -- Use the specified private key for authentication, using the supplied [p]assword as the key's passphrase: +- Use the specified private key for authentication, using the supplied password as the key's passphrase: -`nxc ssh {{192.186.178.2}} -u {{path/to/usernames.txt}} -p {{password}} --key-file {{path/to/id_rsa}}` +`nxc ssh {{192.186.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{password}} --key-file {{path/to/id_rsa}}` -- Try a combination of [u]sername and [p]assword on a number of targets: +- Try a combination of username and password on a number of targets: -`nxc ssh {{192.168.178.0/24}} -u {{username}} -p {{password}}` +`nxc ssh {{192.168.178.0/24}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}}` - Check for `sudo` privileges on a successful login: -`nxc ssh {{192.168.178.2}} -u {{username}} -p {{path/to/passwords.txt}} --sudo-check` +`nxc ssh {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{path/to/passwords.txt}} --sudo-check` diff --git a/pages/common/nxc-vnc.md b/pages/common/nxc-vnc.md index 867a4c5b0c..06a446de08 100644 --- a/pages/common/nxc-vnc.md +++ b/pages/common/nxc-vnc.md @@ -3,14 +3,14 @@ > Pentest and exploit VNC servers. > More information: . -- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords: +- Search for valid credentials by trying out every combination in the specified lists of usernames and passwords: -`nxc vnc {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}` +`nxc vnc {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}` - Avoid rate limiting through VNC-sleep: -`nxc vnc {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}} --vnc-sleep {{10}}` +`nxc vnc {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}} --vnc-sleep {{10}}` - Take a screenshot on the remote system after waiting the specified amount of time: -`nxc vnc {{192.168.178.2}} -u {{username}} -p {{password}} --screenshot --screentime {{10}}` +`nxc vnc {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --screenshot --screentime {{10}}` diff --git a/pages/common/nxc-winrm.md b/pages/common/nxc-winrm.md index 7d4381a426..30fa9931fa 100644 --- a/pages/common/nxc-winrm.md +++ b/pages/common/nxc-winrm.md @@ -3,18 +3,18 @@ > Pentest and exploit Windows Remote Management (winrm). > More information: . -- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords: +- Search for valid credentials by trying out every combination in the specified lists of usernames and passwords: -`nxc winrm {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}` +`nxc winrm {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}` - Specify the domain to authenticate to (avoids an initial SMB connection): -`nxc winrm {{192.168.178.2}} -u {{username}} -p {{password}} -d {{domain_name}}` +`nxc winrm {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -d {{domain_name}}` - Execute the specified command on the host: -`nxc winrm {{192.168.178.2}} -u {{username}} -p {{password}} -x {{whoami}}` +`nxc winrm {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -x {{whoami}}` - Execute the specified PowerShell command on the host as administrator using LAPS: -`nxc winrm {{192.168.178.2}} -u {{username}} -p {{password}} --laps -X {{whoami}}` +`nxc winrm {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --laps -X {{whoami}}` diff --git a/pages/common/nxc-wmi.md b/pages/common/nxc-wmi.md index 6f7f47f6be..e042d510a2 100644 --- a/pages/common/nxc-wmi.md +++ b/pages/common/nxc-wmi.md @@ -3,18 +3,18 @@ > Pentest and exploit the Windows Management Instrumentation (WMI). > More information: . -- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords: +- Search for valid credentials by trying out every combination in the specified lists of usernames and passwords: -`nxc wmi {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}` +`nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}` - Authenticate via local authentication (as opposed to authenticating to the domain): -`nxc wmi {{192.168.178.2}} -u {{username}} -p {{password}} --local-auth` +`nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --local-auth` - Issue the specified WMI query: -`nxc wmi {{192.168.178.2}} -u {{username}} -p {{password}} --wmi {{wmi_query}}` +`nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --wmi {{wmi_query}}` - Execute the specified command on the targeted host: -`nxc wmi {{192.168.178.2}} -u {{username}} -p {{password}} --x {{command}}` +`nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -x {{command}}` diff --git a/pages/common/racket.md b/pages/common/racket.md index 8bcb6bfc1f..682712b24d 100644 --- a/pages/common/racket.md +++ b/pages/common/racket.md @@ -1,7 +1,7 @@ # racket > Racket language interpreter. -> More information: . +> More information: . - Start a REPL (interactive shell): @@ -13,11 +13,11 @@ - Execute a Racket expression: -`racket --eval "{{expression}}"` +`racket {{[-e|--eval]}} "{{expression}}"` - Run module as a script (terminates option list): -`racket --lib {{module_name}} --main {{arguments}}` +`racket {{[-l|--lib]}} {{module_name}} {{[-m|--main]}} {{arguments}}` - Start a REPL (interactive shell) for the `typed/racket` hashlang: diff --git a/pages/common/ruby.md b/pages/common/ruby.md index 1a4bab6219..721b1b9aae 100644 --- a/pages/common/ruby.md +++ b/pages/common/ruby.md @@ -2,7 +2,7 @@ > Ruby programming language interpreter. > See also: `gem`, `bundler`, `rake`, `irb`. -> More information: . +> More information: . - Execute a Ruby script: diff --git a/pages/common/sngrep.md b/pages/common/sngrep.md index db29e9c06b..5277042ab8 100644 --- a/pages/common/sngrep.md +++ b/pages/common/sngrep.md @@ -1,7 +1,7 @@ # sngrep > Display SIP calls message flows from terminal. -> More information: . +> More information: . - Visualize SIP packets from a PCAP file: diff --git a/pages/common/w3m.md b/pages/common/w3m.md index 4548afce5a..0e3d7f4250 100644 --- a/pages/common/w3m.md +++ b/pages/common/w3m.md @@ -2,7 +2,7 @@ > A text-based web browser. > Supports SSL and mouse input, even over SSH. -> More information: . +> More information: . - Open a URL: diff --git a/pages/common/wal.md b/pages/common/wal.md index 9b96b26851..6eda3298ab 100644 --- a/pages/common/wal.md +++ b/pages/common/wal.md @@ -1,7 +1,7 @@ # wal > Create color schemes based on the dominant colors of a wallpaper. -> More information: . +> More information: . - Preview color scheme: diff --git a/pages/common/xe.md b/pages/common/xe.md index dfc3f841cd..e9354964f7 100644 --- a/pages/common/xe.md +++ b/pages/common/xe.md @@ -1,7 +1,7 @@ # xe > Execute a command once for each line piped from another command or file. -> More information: . +> More information: . - Run a command once for each line of input data as arguments: