Update cheatsheets

This commit is contained in:
ivuorinen
2024-10-29 00:17:52 +00:00
parent 72b426647f
commit 271ab85d39
13 changed files with 308 additions and 6 deletions

View File

@@ -6,7 +6,7 @@ source: https://github.com/tldr-pages/tldr.git
# elinks
> A text based browser similar to `lynx`.
> More information: <http://elinks.or.cz>.
> More information: <https://github.com/rkd77/elinks>.
- Start ELinks:

30
tldr/linux/swww Normal file
View File

@@ -0,0 +1,30 @@
---
syntax: markdown
tags: [tldr, linux]
source: https://github.com/tldr-pages/tldr.git
---
# swww
> Efficient animated wallpaper daemon for Wayland.
> See also: `swww-daemon`.
> More information: <https://github.com/LGFae/swww>.
- Set wallpaper:
`swww img {{path/to/image}}`
- Set wallpaper to specified [o]utputs:
`swww img -o {{output1,output2,...}} {{path/to/image}}`
- Restore last wallpaper:
`swww restore`
- Kill daemon:
`swww kill`
- Display output information:
`swww query`

18
tldr/linux/tzselect Normal file
View File

@@ -0,0 +1,18 @@
---
syntax: markdown
tags: [tldr, linux]
source: https://github.com/tldr-pages/tldr.git
---
# tzselect
> Interactively select timezone.
> Note: this program doesn't actually set the timezone.
> More information: <https://manned.org/tzselect>.
- Open the interactive menu for timezone selection and print the selected timezone to `stdout`:
`tzselect`
- Ask for nearest timezone to coordinates in ISO 6709 notation:
`tzselect -c {{coordinates}}`

17
tldr/linux/zic Normal file
View File

@@ -0,0 +1,17 @@
---
syntax: markdown
tags: [tldr, linux]
source: https://github.com/tldr-pages/tldr.git
---
# zic
> Compile timezones into binary files.
> More information: <https://manned.org/zic>.
- Compile a timezone file from a directory:
`zic -d {{path/to/directory}}`
- Report warnings during compilation of a specific file:
`zic -v {{path/to/file}}.infile`

37
tldr/npm-access Normal file
View File

@@ -0,0 +1,37 @@
---
syntax: markdown
tags: [tldr, common]
source: https://github.com/tldr-pages/tldr.git
---
# npm access
> Set access level on published packages.
> More information: <https://docs.npmjs.com/cli/npm-access>.
- List packages for a user or scope:
`npm access list packages {{user|scope|scope:team}} {{package_name}}`
- List collaborators on a package:
`npm access list collaborators {{package_name}} {{username}}`
- Get status of a package:
`npm access get status {{package_name}}`
- Set package status (public or private):
`npm access set status={{public|private}} {{package_name}}`
- Grant access to a package:
`npm access grant {{read-only|read-write}} {{scope:team}} {{package_name}}`
- Revoke access to a package:
`npm access revoke {{scope:team}} {{package_name}}`
- Configure two-factor authentication requirement:
`npm access set mfa={{none|publish|automation}} {{package_name}}`

25
tldr/ntpctl Normal file
View File

@@ -0,0 +1,25 @@
---
syntax: markdown
tags: [tldr, common]
source: https://github.com/tldr-pages/tldr.git
---
# ntpctl
> Display information about the running instance of OpenNTPD.
> More information: <https://man.openbsd.org/ntpctl>.
- Show all data:
`ntpctl -s {{a|all}}`
- Show information about each peer:
`ntpctl -s {{p|peers}}`
- Show the status of peers and sensors, and whether the system clock is synced:
`ntpctl -s {{s|status}}`
- Show information about each sensor:
`ntpctl -s {{S|Sensors}}`

33
tldr/nxc-mssql Normal file
View File

@@ -0,0 +1,33 @@
---
syntax: markdown
tags: [tldr, common]
source: https://github.com/tldr-pages/tldr.git
---
# nxc mssql
> Pentest and exploit Microsoft SQL servers.
> More information: <https://www.netexec.wiki/mssql-protocol>.
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
`nxc mssql {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
- Execute the specified SQL [q]uery on the target server:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --query '{{SELECT * FROM sys.databases;}}'`
- Execute the specified shell command on the target server through MSSQL:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} -x {{whoami}}`
- Execute the specified PowerShell command on the target server through MSSQL without retrieving output:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} -X {{whoami}} --no-output`
- Download a remote file from the target server and store it in the specified location:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --get-file {{C:\path o
emote_file}} {{path/to/local_file}}`
- Upload a local file to the specified location on the target server:

29
tldr/nxc-nfs Normal file
View File

@@ -0,0 +1,29 @@
---
syntax: markdown
tags: [tldr, common]
source: https://github.com/tldr-pages/tldr.git
---
# nxc nfs
> Pentest and exploit NFS servers. Currently supports anonymous mode only.
> More information: <https://www.netexec.wiki/nfs-protocol>.
- Detect the version of a remote NFS server:
`nxc nfs {{192.168.178.0/24}}`
- List the available NFS shares:
`nxc nfs {{192.168.178.2}} --shares`
- Enumerate the exposed shares recursively to the specified depth:
`nxc nfs {{192.168.178.2}} --enum-shares {{5}}`
- Download the specified remote file:
`nxc nfs {{192.168.178.2}} --get-file {{path/to/remote_file}} {{path/to/local_file}}`
- Upload the specified local file to the remote share:
`nxc nfs {{192.168.178.2}} --put-file {{path/to/local_file}} {{path/to/remote_file}}`

25
tldr/nxc-rdp Normal file
View File

@@ -0,0 +1,25 @@
---
syntax: markdown
tags: [tldr, common]
source: https://github.com/tldr-pages/tldr.git
---
# nxc rdp
> Pentest and exploit RDP servers.
> More information: <https://www.netexec.wiki/rdp-protocol>.
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
`nxc rdp {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
- Take a screenshot after waiting the for specified number of seconds:
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --screenshot --screentime {{10}}`
- Take a screenshot in the specified resolution:
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --screenshot --res {{1024x768}}`
- Take a screenshot of the RDP login prompt if Network Level Authentication is disabled:
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --nla-screenshot`

21
tldr/nxc-vnc Normal file
View File

@@ -0,0 +1,21 @@
---
syntax: markdown
tags: [tldr, common]
source: https://github.com/tldr-pages/tldr.git
---
# nxc vnc
> Pentest and exploit VNC servers.
> More information: <https://www.netexec.wiki/>.
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
`nxc vnc {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
- Avoid rate limiting through VNC-sleep:
`nxc vnc {{192.168.178.2}} -u {{{path/to/usernames.txt}}} -p {{path/to/passwords.txt}} --vnc-sleep {{10}}`
- Take a screenshot on the remote system after waiting the specified amount of time:
`nxc vnc {{192.168.178.2}} -u {{{username}}} -p {{password}} --screenshot --screentime {{10}}`

25
tldr/nxcdb Normal file
View File

@@ -0,0 +1,25 @@
---
syntax: markdown
tags: [tldr, common]
source: https://github.com/tldr-pages/tldr.git
---
# nxcdb
> Interact with the NetExec database.
> More information: <https://www.netexec.wiki/getting-started/database-general-usage>.
- Enter an interactive database session:
`nxcdb`
- Display the currently active workspace:
`nxcdb --get-workspace`
- Create a new workspace:
`nxcdb --create-workspace {{workspace_name}}`
- Activate the specified workspace:
`nxcdb --set-workspace {{workspace_name}}`

View File

@@ -6,19 +6,19 @@ source: https://github.com/tldr-pages/tldr.git
# pandoc
> Convert documents between various formats.
> More information: <https://pandoc.org>.
> More information: <https://pandoc.org/MANUAL.html>.
- Convert file to PDF (the output format is determined by file extension):
`pandoc {{input.md}} -o {{output.pdf}}`
`pandoc {{path/to/input.md}} {{-o|--output}} {{path/to/output.pdf}}`
- Convert to a standalone file with the appropriate headers/footers (for LaTeX, HTML, etc.):
`pandoc {{input.md}} -s -o {{output.html}}`
`pandoc {{path/to/input.md}} {{-s|--standalone}} {{-o|--output}} {{path/to/output.html}}`
- Force conversion to use a specific format:
- Manually specify format detection and conversion (overriding automatic format detection using filename extension or when filename extension is missing altogether):
`pandoc {{input.docx}} --to {{gfm}} -o {{output.md}}`
`pandoc {{-f|-r|--from|--read}} {{docx|...}} {{path/to/input}} {{-t|-w|--to|--write}} {{pdf|...}} {{-o|--output}} {{path/to/output}}`
- List all supported input formats:

42
tldr/step Normal file
View File

@@ -0,0 +1,42 @@
---
syntax: markdown
tags: [tldr, common]
source: https://github.com/tldr-pages/tldr.git
---
# step
> An easy-to-use CLI tool for building, operating, and automating Public Key Infrastructure (PKI) systems and workflows.
> See also: `openssl`.
> More information: <https://smallstep.com/docs/step-cli/>.
- Inspect the contents of a certificate:
`step certificate inspect {{path/to/certificate.crt}}`
- Create a root CA certificate and a key (append `--no-password --insecure` to skip private key password protection):
`step certificate create "{{Example Root CA}}" {{path/to/root-ca.crt}} {{path/to/root-ca.key}} --profile root-ca`
- Generate a certificate for a specific hostname and sign it with the root CA (generating a CSR can be skipped for simplification):
`step certificate create {{hostname.example.com}} {{path/to/hostname.crt}} {{path/to/hostname.key}} --profile leaf --ca {{path/to/root-ca.crt}} --ca-key {{path/to/root-ca.key}}`
- Verify a certificate chain:
`step certificate verify {{path/to/hostname.crt}} --roots {{path/to/root-ca.crt}} --verbose`
- Convert a PEM format certificate to DER and write it to disk:
`step certificate format {{path/to/certificate.pem}} --out {{path/to/certificate.der}}`
- Install or uninstall a root certificate in the system's default trust store:
`step certificate {{install|uninstall}} {{path/to/root-ca.crt}}`
- Create a RSA/EC private and public keypair (append `--no-password --insecure` to skip private key password protection):
`step crypto keypair {{path/to/public_key}} {{path/to/private_key}} --kty {{RSA|EC}}`
- Show help for subcommands:
`step {{path|base64|certificate|completion|context|crl|crypto|oauth|ca|beta|ssh}} --help`