1
0
Fork 0
mirror of https://github.com/tldr-pages/tldr.git synced 2025-08-29 21:13:50 +02:00

*: add option placeholders (#16370)

This commit is contained in:
Managor 2025-05-04 20:03:26 +03:00 committed by GitHub
parent 13709c3d90
commit ae3b7aff99
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
30 changed files with 88 additions and 88 deletions

View file

@ -6,7 +6,7 @@
- Print messages about the patched files: - Print messages about the patched files:
`git apply --verbose {{path/to/file}}` `git apply {{[-v|--verbose]}} {{path/to/file}}`
- Apply and add the patched files to the index: - Apply and add the patched files to the index:
@ -14,7 +14,7 @@
- Apply a remote patch file: - Apply a remote patch file:
`curl -L {{https://example.com/file.patch}} | git apply` `curl {{[-L|--location]}} {{https://example.com/file.patch}} | git apply`
- Output diffstat for the input and apply the patch: - Output diffstat for the input and apply the patch:
@ -22,7 +22,7 @@
- Apply the patch in reverse: - Apply the patch in reverse:
`git apply --reverse {{path/to/file}}` `git apply {{[-R|--reverse]}} {{path/to/file}}`
- Store the patch result in the index without modifying the working tree: - Store the patch result in the index without modifying the working tree:

View file

@ -2,7 +2,7 @@
> Online password guessing tool. > Online password guessing tool.
> Protocols supported include FTP, HTTP(S), SMTP, SNMP, XMPP, SSH, and more. > Protocols supported include FTP, HTTP(S), SMTP, SNMP, XMPP, SSH, and more.
> More information: <https://github.com/vanhauser-thc/thc-hydra>. > More information: <https://manned.org/hydra>.
- Start Hydra's wizard: - Start Hydra's wizard:

View file

@ -1,7 +1,7 @@
# iex # iex
> IEx is the interactive shell for Elixir. > IEx is the interactive shell for Elixir.
> More information: <https://hexdocs.pm/iex>. > More information: <https://manned.org/iex>.
- Start an interactive session: - Start an interactive session:

View file

@ -11,4 +11,4 @@
- Print a file from `stdin` to `stdout`: - Print a file from `stdin` to `stdout`:
`{{wget -O - https://examplewebsite.com/file}} | ippeveps` `{{wget {{[-O|--output-document]}} - https://examplewebsite.com/file}} | ippeveps`

View file

@ -1,7 +1,7 @@
# medusa # medusa
> A modular and parallel login brute-forcer for a variety of protocols. > A modular and parallel login brute-forcer for a variety of protocols.
> More information: <https://jmk-foofus.github.io/medusa/medusa.html>. > More information: <https://manned.org/medusa>.
- List all installed modules: - List all installed modules:

View file

@ -1,11 +1,11 @@
# meson # meson
> SCons-like build system that uses Python as a front-end language and Ninja as a building backend. > SCons-like build system that uses Python as a front-end language and Ninja as a building backend.
> More information: <https://mesonbuild.com>. > More information: <https://mesonbuild.com/Commands.html>.
- Generate a C project with a given name and version: - Generate a C project with a given name and version:
`meson init --language={{c}} --name={{myproject}} --version={{0.1}}` `meson init {{[-l|--language]}} c {{[-n|--name]}} {{myproject}} --version {{0.1}}`
- Configure the `builddir` with default values: - Configure the `builddir` with default values:
@ -21,8 +21,8 @@
- Show the help: - Show the help:
`meson --help` `meson {{[-h|--help]}}`
- Display version: - Display version:
`meson --version` `meson {{[-v|--version]}}`

View file

@ -1,7 +1,7 @@
# mg # mg
> A small, fast, and portable text editor based on `emacs`. > A small, fast, and portable text editor based on `emacs`.
> More information: <https://github.com/hboetes/mg>. > More information: <https://manned.org/mg>.
- Open a file for editing: - Open a file for editing:

View file

@ -1,7 +1,7 @@
# mp3info # mp3info
> Viewer/editor for ID3v1 (but not ID3v2) tags of MP3 files. > Viewer/editor for ID3v1 (but not ID3v2) tags of MP3 files.
> More information: <https://www.ibiblio.org/mp3info>. > More information: <https://www.ibiblio.org/mp3info/mp3info.html>.
- Show all ID3v1 tags of a specific MP3 file: - Show all ID3v1 tags of a specific MP3 file:

View file

@ -1,7 +1,7 @@
# mupdf # mupdf
> A lightweight PDF, XPS, and E-book viewer. > A lightweight PDF, XPS, and E-book viewer.
> More information: <https://www.mupdf.com>. > More information: <https://mupdf.readthedocs.io/en/latest/mupdf-command-line.html>.
- Open a PDF on the first page: - Open a PDF on the first page:

View file

@ -1,7 +1,7 @@
# mutool # mutool
> Convert, query information and extract data from PDF files. > Convert, query information and extract data from PDF files.
> More information: <https://mupdf.readthedocs.io/en/latest/mupdf-command-line.html>. > More information: <https://mupdf.readthedocs.io/en/latest/mupdf-command-line.html#mupdf-command-line-mutool>.
- Convert a range of pages to PNGs (Note: `%nd` in the output placeholder must be replaced with a print modifier like `%d` or `%2d`): - Convert a range of pages to PNGs (Note: `%nd` in the output placeholder must be replaced with a print modifier like `%d` or `%2d`):

View file

@ -1,7 +1,7 @@
# mutt # mutt
> Command-line email client. > Command-line email client.
> More information: <http://mutt.org>. > More information: <http://mutt.org/doc/mutt.1.txt>.
- Open the specified mailbox: - Open the specified mailbox:

View file

@ -1,7 +1,7 @@
# mvn # mvn
> Apache Maven: build and manage Java-based projects. > Apache Maven: build and manage Java-based projects.
> More information: <https://maven.apache.org>. > More information: <https://manned.org/mvn>.
- Compile a project: - Compile a project:
@ -13,7 +13,7 @@
- Compile and package, skipping unit tests: - Compile and package, skipping unit tests:
`mvn package -DskipTests` `mvn package {{[-D|--define]}} skipTests`
- Install the built package in local maven repository. (This will invoke the compile and package commands too): - Install the built package in local maven repository. (This will invoke the compile and package commands too):
@ -29,8 +29,8 @@
- Clean and then package the code with a given build profile: - Clean and then package the code with a given build profile:
`mvn clean -P {{profile}} package` `mvn clean {{[-P|--activate-profiles]}} {{profile}} package`
- Run a class with a main method: - Run a class with a main method:
`mvn exec:java -Dexec.mainClass="{{com.example.Main}}" -Dexec.args="{{argument1 argument2 ...}}"` `mvn exec:java {{[-D|--define]}} exec.mainClass="{{com.example.Main}}" {{[-D|--define]}} exec.args="{{argument1 argument2 ...}}"`

View file

@ -1,7 +1,7 @@
# neomutt # neomutt
> NeoMutt command-line email client. > NeoMutt command-line email client.
> More information: <https://neomutt.org>. > More information: <https://neomutt.org/guide/reference.html>.
- Open the specified mailbox: - Open the specified mailbox:

View file

@ -5,8 +5,8 @@
- Find hosts in the local network with SMB shares: - Find hosts in the local network with SMB shares:
`nmblookup -S '*'` `nmblookup {{[-S|--status]}} '*'`
- Find hosts in the local network with SMB shares run by SAMBA: - Find hosts in the local network with SMB shares run by SAMBA:
`nmblookup --status __SAMBA__` `nmblookup {{[-S|--status]}} __SAMBA__`

View file

@ -1,7 +1,7 @@
# nokogiri # nokogiri
> An HTML, XML, SAX and Reader parser. > An HTML, XML, SAX and Reader parser.
> More information: <https://nokogiri.org>. > More information: <https://manned.org/nokogiri>.
- Parse the contents of a URL or file: - Parse the contents of a URL or file:
@ -17,7 +17,7 @@
- Parse using a specific encoding: - Parse using a specific encoding:
`nokogiri {{url|path/to/file}} --encoding {{encoding}}` `nokogiri {{url|path/to/file}} {{[-E|--encoding]}} {{encoding}}`
- Validate using a RELAX NG file: - Validate using a RELAX NG file:

View file

@ -3,22 +3,22 @@
> Pentest and exploit FTP servers. > Pentest and exploit FTP servers.
> More information: <https://www.netexec.wiki/ftp-protocol>. > More information: <https://www.netexec.wiki/ftp-protocol>.
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords: - Search for valid credentials by trying out every combination in the specified lists of usernames and passwords:
`nxc ftp {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}` `nxc ftp {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
- Continue searching for valid credentials even after valid credentials have been found: - Continue searching for valid credentials even after valid credentials have been found:
`nxc ftp {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}} --continue-on-success` `nxc ftp {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}} --continue-on-success`
- Perform directory listings on each FTP server the supplied credentials are valid on: - Perform directory listings on each FTP server the supplied credentials are valid on:
`nxc ftp {{192.168.178.0/24}} -u {{username}} -p {{password}} --ls` `nxc ftp {{192.168.178.0/24}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --ls`
- Download the specified file from the target server: - Download the specified file from the target server:
`nxc ftp {{192.168.178.2}} -u {{username}} -p {{password}} --get {{path/to/file}}` `nxc ftp {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --get {{path/to/file}}`
- Upload the specified file to the target server at the specified location: - Upload the specified file to the target server at the specified location:
`nxc ftp {{192.168.178.2}} -u {{username}} -p {{password}} --put {{path/to/local_file}} {{path/to/remote_location}}` `nxc ftp {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --put {{path/to/local_file}} {{path/to/remote_location}}`

View file

@ -3,22 +3,22 @@
> Pentest and exploit Windows Active Directory Domains via LDAP. > Pentest and exploit Windows Active Directory Domains via LDAP.
> More information: <https://www.netexec.wiki/ldap-protocol>. > More information: <https://www.netexec.wiki/ldap-protocol>.
- Search for valid domain credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords: - Search for valid domain credentials by trying out every combination in the specified lists of usernames and passwords:
`nxc ldap {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}` `nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
- Enumerate active domain users: - Enumerate active domain users:
`nxc ldap {{192.168.178.2}} -u {{username}} -p {{password}} --active-users` `nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --active-users`
- Collect data about the targeted domain and automatically import these data into BloodHound: - Collect data about the targeted domain and automatically import these data into BloodHound:
`nxc ldap {{192.168.178.2}} -u {{username}} -p {{password}} --bloodhound --collection {{All}}` `nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --bloodhound {{[-c|--collection]}} {{All}}`
- Attempt to collect AS_REP messages for the specified user in order to perform an ASREPRoasting attack: - Attempt to collect AS_REP messages for the specified user in order to perform an ASREPRoasting attack:
`nxc ldap {{192.168.178.2}} -u {{username}} -p '' --asreproast {{path/to/output.txt}}` `nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} '' --asreproast {{path/to/output.txt}}`
- Attempt to extract the passwords of group managed service accounts on the domain: - Attempt to extract the passwords of group managed service accounts on the domain:
`nxc ldap {{192.168.178.2}} -u {{username}} -p {{password}} --gmsa` `nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --gmsa`

View file

@ -3,26 +3,26 @@
> Pentest and exploit Microsoft SQL servers. > Pentest and exploit Microsoft SQL servers.
> More information: <https://www.netexec.wiki/mssql-protocol>. > More information: <https://www.netexec.wiki/mssql-protocol>.
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords: - Search for valid credentials by trying out every combination in the specified lists of usernames and passwords:
`nxc mssql {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}` `nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
- Execute the specified SQL [q]uery on the target server: - Execute the specified SQL query on the target server:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --query '{{SELECT * FROM sys.databases;}}'` `nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} {{[-q|--query]}} '{{SELECT * FROM sys.databases;}}'`
- Execute the specified shell command on the target server through MSSQL: - Execute the specified shell command on the target server through MSSQL:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} -x {{whoami}}` `nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -x {{whoami}}`
- Execute the specified PowerShell command on the target server through MSSQL without retrieving output: - Execute the specified PowerShell command on the target server through MSSQL without retrieving output:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} -X {{whoami}} --no-output` `nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -X {{whoami}} --no-output`
- Download a remote file from the target server and store it in the specified location: - Download a remote file from the target server and store it in the specified location:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --get-file {{C:\path\to\remote_file}} {{path/to/local_file}}` `nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --get-file {{C:\path\to\remote_file}} {{path/to/local_file}}`
- Upload a local file to the specified location on the target server: - Upload a local file to the specified location on the target server:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --put-file {{path/to/local_file}} {{C:\path\to\remote_file}}` `nxc mssql {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --put-file {{path/to/local_file}} {{C:\path\to\remote_file}}`

View file

@ -3,18 +3,18 @@
> Pentest and exploit RDP servers. > Pentest and exploit RDP servers.
> More information: <https://www.netexec.wiki/rdp-protocol>. > More information: <https://www.netexec.wiki/rdp-protocol>.
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords: - Search for valid credentials by trying out every combination in the specified lists of usernames and passwords:
`nxc rdp {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}` `nxc rdp {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
- Take a screenshot after waiting the for specified number of seconds: - Take a screenshot after waiting the for specified number of seconds:
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --screenshot --screentime {{10}}` `nxc rdp {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --screenshot --screentime {{10}}`
- Take a screenshot in the specified resolution: - Take a screenshot in the specified resolution:
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --screenshot --res {{1024x768}}` `nxc rdp {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --screenshot --res {{1024x768}}`
- Take a screenshot of the RDP login prompt if Network Level Authentication is disabled: - Take a screenshot of the RDP login prompt if Network Level Authentication is disabled:
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --nla-screenshot` `nxc rdp {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --nla-screenshot`

View file

@ -3,26 +3,26 @@
> Pentest and exploit SMB servers. > Pentest and exploit SMB servers.
> More information: <https://www.netexec.wiki/smb-protocol>. > More information: <https://www.netexec.wiki/smb-protocol>.
- Search for valid domain credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords: - Search for valid domain credentials by trying out every combination in the specified lists of usernames and passwords:
`nxc smb {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}` `nxc smb {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
- Search for valid credentials for local accounts instead of domain accounts: - Search for valid credentials for local accounts instead of domain accounts:
`nxc smb {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}} --local-auth` `nxc smb {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}} --local-auth`
- Enumerate SMB shares and the specified users' access rights to them on the target hosts: - Enumerate SMB shares and the specified users' access rights to them on the target hosts:
`nxc smb {{192.168.178.0/24}} -u {{username}} -p {{password}} --shares` `nxc smb {{192.168.178.0/24}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --shares`
- Enumerate network interfaces on the target hosts, performing authentication via pass-the-hash: - Enumerate network interfaces on the target hosts, performing authentication via pass-the-hash:
`nxc smb {{192.168.178.30-45}} -u {{username}} -H {{NTLM_hash}} --interfaces` `nxc smb {{192.168.178.30-45}} {{[-u|--username]}} {{username}} {{[-H|--hash]}} {{NTLM_hash}} --interfaces`
- Scan the target hosts for common vulnerabilities: - Scan the target hosts for common vulnerabilities:
`nxc smb {{path/to/target_list.txt}} -u '' -p '' -M zerologon -M petitpotam` `nxc smb {{path/to/target_list.txt}} {{[-u|--username]}} '' {{[-p|--password]}} '' {{[-M|--module]}} zerologon {{[-M|--module]}} petitpotam`
- Attempt to execute a command on the target hosts: - Attempt to execute a command on the target hosts:
`nxc smb {{192.168.178.2}} -u {{username}} -p {{password}} -x {{command}}` `nxc smb {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -x {{command}}`

View file

@ -4,22 +4,22 @@
> See also: `hydra`. > See also: `hydra`.
> More information: <https://www.netexec.wiki/ssh-protocol>. > More information: <https://www.netexec.wiki/ssh-protocol>.
- Spray the specified [p]assword against a list of [u]sernames on the specified target: - Spray the specified password against a list of usernames on the specified target:
`nxc ssh {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{password}}` `nxc ssh {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{password}}`
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords: - Search for valid credentials by trying out every combination in the specified lists of usernames and passwords:
`nxc ssh {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}` `nxc ssh {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
- Use the specified private key for authentication, using the supplied [p]assword as the key's passphrase: - Use the specified private key for authentication, using the supplied password as the key's passphrase:
`nxc ssh {{192.186.178.2}} -u {{path/to/usernames.txt}} -p {{password}} --key-file {{path/to/id_rsa}}` `nxc ssh {{192.186.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{password}} --key-file {{path/to/id_rsa}}`
- Try a combination of [u]sername and [p]assword on a number of targets: - Try a combination of username and password on a number of targets:
`nxc ssh {{192.168.178.0/24}} -u {{username}} -p {{password}}` `nxc ssh {{192.168.178.0/24}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}}`
- Check for `sudo` privileges on a successful login: - Check for `sudo` privileges on a successful login:
`nxc ssh {{192.168.178.2}} -u {{username}} -p {{path/to/passwords.txt}} --sudo-check` `nxc ssh {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{path/to/passwords.txt}} --sudo-check`

View file

@ -3,14 +3,14 @@
> Pentest and exploit VNC servers. > Pentest and exploit VNC servers.
> More information: <https://www.netexec.wiki/>. > More information: <https://www.netexec.wiki/>.
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords: - Search for valid credentials by trying out every combination in the specified lists of usernames and passwords:
`nxc vnc {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}` `nxc vnc {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
- Avoid rate limiting through VNC-sleep: - Avoid rate limiting through VNC-sleep:
`nxc vnc {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}} --vnc-sleep {{10}}` `nxc vnc {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}} --vnc-sleep {{10}}`
- Take a screenshot on the remote system after waiting the specified amount of time: - Take a screenshot on the remote system after waiting the specified amount of time:
`nxc vnc {{192.168.178.2}} -u {{username}} -p {{password}} --screenshot --screentime {{10}}` `nxc vnc {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --screenshot --screentime {{10}}`

View file

@ -3,18 +3,18 @@
> Pentest and exploit Windows Remote Management (winrm). > Pentest and exploit Windows Remote Management (winrm).
> More information: <https://www.netexec.wiki/winrm-protocol>. > More information: <https://www.netexec.wiki/winrm-protocol>.
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords: - Search for valid credentials by trying out every combination in the specified lists of usernames and passwords:
`nxc winrm {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}` `nxc winrm {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
- Specify the domain to authenticate to (avoids an initial SMB connection): - Specify the domain to authenticate to (avoids an initial SMB connection):
`nxc winrm {{192.168.178.2}} -u {{username}} -p {{password}} -d {{domain_name}}` `nxc winrm {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -d {{domain_name}}`
- Execute the specified command on the host: - Execute the specified command on the host:
`nxc winrm {{192.168.178.2}} -u {{username}} -p {{password}} -x {{whoami}}` `nxc winrm {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -x {{whoami}}`
- Execute the specified PowerShell command on the host as administrator using LAPS: - Execute the specified PowerShell command on the host as administrator using LAPS:
`nxc winrm {{192.168.178.2}} -u {{username}} -p {{password}} --laps -X {{whoami}}` `nxc winrm {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --laps -X {{whoami}}`

View file

@ -3,18 +3,18 @@
> Pentest and exploit the Windows Management Instrumentation (WMI). > Pentest and exploit the Windows Management Instrumentation (WMI).
> More information: <https://www.netexec.wiki/wmi-protocol>. > More information: <https://www.netexec.wiki/wmi-protocol>.
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords: - Search for valid credentials by trying out every combination in the specified lists of usernames and passwords:
`nxc wmi {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}` `nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}`
- Authenticate via local authentication (as opposed to authenticating to the domain): - Authenticate via local authentication (as opposed to authenticating to the domain):
`nxc wmi {{192.168.178.2}} -u {{username}} -p {{password}} --local-auth` `nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --local-auth`
- Issue the specified WMI query: - Issue the specified WMI query:
`nxc wmi {{192.168.178.2}} -u {{username}} -p {{password}} --wmi {{wmi_query}}` `nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --wmi {{wmi_query}}`
- Execute the specified command on the targeted host: - Execute the specified command on the targeted host:
`nxc wmi {{192.168.178.2}} -u {{username}} -p {{password}} --x {{command}}` `nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -x {{command}}`

View file

@ -1,7 +1,7 @@
# racket # racket
> Racket language interpreter. > Racket language interpreter.
> More information: <https://racket-lang.org>. > More information: <https://docs.racket-lang.org/reference/running-sa.html#%28part._mz-cmdline%29>.
- Start a REPL (interactive shell): - Start a REPL (interactive shell):
@ -13,11 +13,11 @@
- Execute a Racket expression: - Execute a Racket expression:
`racket --eval "{{expression}}"` `racket {{[-e|--eval]}} "{{expression}}"`
- Run module as a script (terminates option list): - Run module as a script (terminates option list):
`racket --lib {{module_name}} --main {{arguments}}` `racket {{[-l|--lib]}} {{module_name}} {{[-m|--main]}} {{arguments}}`
- Start a REPL (interactive shell) for the `typed/racket` hashlang: - Start a REPL (interactive shell) for the `typed/racket` hashlang:

View file

@ -2,7 +2,7 @@
> Ruby programming language interpreter. > Ruby programming language interpreter.
> See also: `gem`, `bundler`, `rake`, `irb`. > See also: `gem`, `bundler`, `rake`, `irb`.
> More information: <https://www.ruby-lang.org>. > More information: <https://manned.org/ruby>.
- Execute a Ruby script: - Execute a Ruby script:

View file

@ -1,7 +1,7 @@
# sngrep # sngrep
> Display SIP calls message flows from terminal. > Display SIP calls message flows from terminal.
> More information: <https://github.com/irontec/sngrep>. > More information: <https://manned.org/sngrep>.
- Visualize SIP packets from a PCAP file: - Visualize SIP packets from a PCAP file:

View file

@ -2,7 +2,7 @@
> A text-based web browser. > A text-based web browser.
> Supports SSL and mouse input, even over SSH. > Supports SSL and mouse input, even over SSH.
> More information: <https://w3m.sourceforge.net>. > More information: <https://w3m.sourceforge.net/MANUAL>.
- Open a URL: - Open a URL:

View file

@ -1,7 +1,7 @@
# wal # wal
> Create color schemes based on the dominant colors of a wallpaper. > Create color schemes based on the dominant colors of a wallpaper.
> More information: <https://github.com/dylanaraps/pywal>. > More information: <https://github.com/dylanaraps/pywal/wiki/Getting-Started>.
- Preview color scheme: - Preview color scheme:

View file

@ -1,7 +1,7 @@
# xe # xe
> Execute a command once for each line piped from another command or file. > Execute a command once for each line piped from another command or file.
> More information: <https://github.com/leahneukirchen/xe>. > More information: <https://github.com/leahneukirchen/xe/blob/master/README>.
- Run a command once for each line of input data as arguments: - Run a command once for each line of input data as arguments: