mirror of
https://github.com/ivuorinen/cheatsheet-tldr.git
synced 2026-01-26 11:33:59 +00:00
Update cheatsheets
This commit is contained in:
25
tldr/linux/evtest
Normal file
25
tldr/linux/evtest
Normal file
@@ -0,0 +1,25 @@
|
||||
---
|
||||
syntax: markdown
|
||||
tags: [tldr, linux]
|
||||
source: https://github.com/tldr-pages/tldr.git
|
||||
---
|
||||
# evtest
|
||||
|
||||
> Display information from input device drivers.
|
||||
> More information: <https://manned.org/evtest>.
|
||||
|
||||
- List all detected input devices:
|
||||
|
||||
`sudo evtest`
|
||||
|
||||
- Display events from a specific input device:
|
||||
|
||||
`sudo evtest /dev/input/event{{number}}`
|
||||
|
||||
- Grab the device exclusively, preventing other clients from receiving events:
|
||||
|
||||
`sudo evtest --grab /dev/input/event{{number}}`
|
||||
|
||||
- Query the state of a specific key or button on an input device:
|
||||
|
||||
`sudo evtest --query /dev/input/event{{number}} {{event_type}} {{event_code}}`
|
||||
25
tldr/medusa
Normal file
25
tldr/medusa
Normal file
@@ -0,0 +1,25 @@
|
||||
---
|
||||
syntax: markdown
|
||||
tags: [tldr, common]
|
||||
source: https://github.com/tldr-pages/tldr.git
|
||||
---
|
||||
# Medusa
|
||||
|
||||
> A modular and parallel login brute-forcer for a variety of protocols.
|
||||
> More information: <https://jmk-foofus.github.io/medusa/medusa.html>.
|
||||
|
||||
- Execute brute force against an FTP server using a file containing usernames and a file containing passwords:
|
||||
|
||||
`medusa -M ftp -h host -U {{path/to/username_file}} -P {{path/to/password_file}}`
|
||||
|
||||
- Execute a login attempt against an HTTP server using the username, password and user-agent specified:
|
||||
|
||||
`medusa -M HTTP -h host -u {{username}} -p {{password}} -m USER-AGENT:"{{Agent}}"`
|
||||
|
||||
- Execute a brute force against a MySQL server using a file containing usernames and a hash:
|
||||
|
||||
`medusa -M mysql -h host -U {{path/to/username_file}} -p {{hash}} -m PASS:HASH`
|
||||
|
||||
- Execute a brute force against a list of SMB servers using a username and a pwdump file:
|
||||
|
||||
`medusa -M smbnt -H {{path/to/hosts_file}} -C {{path/to/pwdump_file}} -u {{username}} -m PASS:HASH`
|
||||
18
tldr/windows/test-netconnection
Normal file
18
tldr/windows/test-netconnection
Normal file
@@ -0,0 +1,18 @@
|
||||
---
|
||||
syntax: markdown
|
||||
tags: [tldr, windows]
|
||||
source: https://github.com/tldr-pages/tldr.git
|
||||
---
|
||||
# Test-NetConnection
|
||||
|
||||
> Display diagnostic information for a connection.
|
||||
> This command can only be used through PowerShell.
|
||||
> More information: <https://learn.microsoft.com/powershell/module/nettcpip/test-netconnection>.
|
||||
|
||||
- Test a connection and display detailed results:
|
||||
|
||||
`Test-NetConnection -InformationLevel Detailed`
|
||||
|
||||
- Test a connection to a remote host using the specified port number:
|
||||
|
||||
`Test-NetConnection -ComputerName {{ip_or_hostname}} -Port {{port_number}}`
|
||||
Reference in New Issue
Block a user