mirror of
https://github.com/cheat/cheat.git
synced 2025-09-01 09:38:29 +02:00
Compare commits
332 Commits
Author | SHA1 | Date | |
---|---|---|---|
c922ef4c8d | |||
574a7ec3c9 | |||
5ae49228b7 | |||
09acdf1a69 | |||
9ea60d12ff | |||
f7d747e101 | |||
3b207b4d51 | |||
5e1d3abce8 | |||
ad25e16dc6 | |||
92c07c0137 | |||
7e35263e90 | |||
1b6b5b79b7 | |||
b377984b59 | |||
e319332138 | |||
13c0ea7525 | |||
87448c49fa | |||
80b8cfc06b | |||
8a8f30679d | |||
4d19505b79 | |||
a2e028fd19 | |||
5eec6bf040 | |||
3a4c2a887d | |||
879a58b721 | |||
7814de96d2 | |||
a651426075 | |||
c4c935a6a5 | |||
df86142b8e | |||
60b05c8781 | |||
22b64d2d08 | |||
1224908445 | |||
28a2902e20 | |||
730c488854 | |||
ba9051e3cd | |||
7c7278ac8b | |||
e1fdca231e | |||
6b796adaf7 | |||
95843e4674 | |||
2b58300d84 | |||
bf1be86fb9 | |||
35c4a8d639 | |||
6910adae90 | |||
b47b4bc1d1 | |||
ea7e71b002 | |||
d576eef13b | |||
bec516b30a | |||
f0b3f8037b | |||
3938032595 | |||
f35cfa084e | |||
cdb22f310d | |||
6d1eff16a1 | |||
9241de04d6 | |||
8ac1851a69 | |||
cccf37c284 | |||
15f70c2cc3 | |||
cebe3de389 | |||
8ec51d3194 | |||
500dbbbd4a | |||
66ebae4ed5 | |||
5a83a22888 | |||
62a2bf3c2d | |||
4b6dc22c0a | |||
cd46559250 | |||
03fb44159a | |||
f0bd3ba4e6 | |||
72f8c88394 | |||
2fcc808e63 | |||
4aef22f457 | |||
146b671412 | |||
feab7a9706 | |||
a5b0132b08 | |||
ce1f4a099c | |||
0e84cae79e | |||
93180c3852 | |||
795bcaffcb | |||
d6f12c4397 | |||
8ccc8bd546 | |||
c29a3dfdc1 | |||
7e94f1e0ba | |||
ff1227bca8 | |||
b0aa272b49 | |||
130cf1d830 | |||
f93ca8f7ce | |||
c0fe871b33 | |||
b210fbca5f | |||
45c0dad364 | |||
544d11aebc | |||
51f7a42ece | |||
cd6826d5d4 | |||
c09f0b0c6c | |||
3fe72a03cc | |||
0c0d924df6 | |||
aa1e12625e | |||
d09353bfca | |||
81e80c87a1 | |||
3d498d5ce7 | |||
d90d509702 | |||
b46f5b2c34 | |||
e2d63e7603 | |||
67f52f8317 | |||
67134b9240 | |||
c67adb1422 | |||
c2aa5e0148 | |||
332f0bd4ee | |||
b303bc0028 | |||
02f79ddd13 | |||
71680c6586 | |||
a240413eb9 | |||
cde64e3ea4 | |||
0b0bc441c6 | |||
2aa37432cb | |||
89de3705b0 | |||
d12718b8c4 | |||
900e083b99 | |||
837e0b5b71 | |||
30d2a77a6c | |||
1a8cdf84f4 | |||
181403e7ac | |||
2c10955690 | |||
4319b8e699 | |||
57dff86a44 | |||
761bf2eb2f | |||
aa4f6daf77 | |||
d7272c50c4 | |||
cdf573a725 | |||
eb6dfaad39 | |||
f8d2ce516e | |||
e5bf9146fe | |||
d6dc39c687 | |||
fb5ec798fa | |||
866eb68d64 | |||
e17f60e4d5 | |||
ed2ef113f0 | |||
432379d1e6 | |||
7089bef7cc | |||
aa57371819 | |||
921db35400 | |||
852db958a4 | |||
d58bbba1f8 | |||
e5ffcf65e4 | |||
d59ac66f1c | |||
f4f8592933 | |||
c540a600b2 | |||
9224216581 | |||
2da5c2b710 | |||
e468f8d0a0 | |||
cdee0e44cd | |||
efcd687070 | |||
ae309c7dc4 | |||
86ba22e7b8 | |||
2a6ec9cef5 | |||
2d59026b0d | |||
bcb0d71dd3 | |||
d1526ede16 | |||
374d381c00 | |||
1f3f9828c3 | |||
5d3f89924c | |||
74808845a5 | |||
517bf9599b | |||
7716827dfc | |||
c65fde1b3a | |||
bb3c4105cb | |||
edd7b5e806 | |||
7abb663bf4 | |||
f6f1233b12 | |||
b9241efab1 | |||
8019325f1e | |||
7209f2c929 | |||
068d117bef | |||
9ead66461d | |||
d00bd87dd1 | |||
dd8b20a17a | |||
84e42e7f2f | |||
a59e91ead7 | |||
f495a4dfd9 | |||
10dd0e9a8b | |||
d06e5bab6f | |||
aa9403d432 | |||
75b2555710 | |||
632da2024a | |||
1baa6d39c0 | |||
8cad76943a | |||
a6ec02c296 | |||
7392787e31 | |||
208dd24a0c | |||
df34774a7a | |||
8d65424ffb | |||
597acec6ac | |||
7d4150b937 | |||
5df5b1ab49 | |||
f1c8017342 | |||
8f2912e5da | |||
3139796524 | |||
bcd4563bf3 | |||
5cd5387a47 | |||
c8f0e6295b | |||
31e442d7f9 | |||
05400a92ed | |||
034c1a2415 | |||
dab8645394 | |||
352a760561 | |||
6be87e2d42 | |||
403d715127 | |||
0edd1450dc | |||
d87a26ce4f | |||
cdf240b70e | |||
809c6d77bc | |||
be543450c7 | |||
9889d77adb | |||
354376340f | |||
d82eee726c | |||
9a23458a2d | |||
32802c2907 | |||
2a6d34de35 | |||
f1253031f2 | |||
76fa9cfc23 | |||
0a54b2a2ff | |||
6a1742984c | |||
80d2a09456 | |||
5121fece91 | |||
e8d32102cb | |||
eff042d50b | |||
f000756f2c | |||
ef1dfb2168 | |||
3c1b5c5860 | |||
3494827403 | |||
f0879831c5 | |||
8c056d09e9 | |||
dd8d0ae58b | |||
6cc99a2b6a | |||
70ad22c12e | |||
b28e6a84ac | |||
bf4f1c80ca | |||
9cf1a5761d | |||
13fdcec332 | |||
b2feeab4e8 | |||
c4b7fd507f | |||
b77aa0974b | |||
3be95142ed | |||
bb324e94a4 | |||
7084ce2f45 | |||
905006f09c | |||
06a368fb1f | |||
6a9422502a | |||
41332f1d8a | |||
b6d54b135c | |||
a3c682729e | |||
f38da23741 | |||
20d985d993 | |||
09f821835c | |||
7e5e4315e5 | |||
869e7095f3 | |||
6dd8faf26a | |||
c0585ee55c | |||
c0d755e102 | |||
49e1fc46f4 | |||
3d90b26b04 | |||
3b73b9b06b | |||
74d1bc1ec7 | |||
78c76dc75a | |||
f204ed66e1 | |||
29c53b754d | |||
5a7fdfcca7 | |||
c3f082eccf | |||
808a2585ef | |||
c0aad062ec | |||
8ffeaa4211 | |||
c1d4c768de | |||
a063c7bb64 | |||
d058ee087e | |||
35c38be120 | |||
cc86f23dba | |||
54086bf8d6 | |||
429ed25aba | |||
128f28ac99 | |||
420a320839 | |||
e3f435a78a | |||
dcc01bb980 | |||
6f27a3e614 | |||
36b078c9f6 | |||
73c1842866 | |||
ceb3707d28 | |||
f9e8e041ef | |||
b59e83e706 | |||
bfa813a0b8 | |||
c179ef64c6 | |||
14a4ee867e | |||
70ef6239fe | |||
1b55a238df | |||
eeb2c92576 | |||
c1fbeffde5 | |||
b6137cac8b | |||
711fd02195 | |||
248f5a0526 | |||
8e7ce511bd | |||
ba7ebc8392 | |||
6670785a2a | |||
aabaab1185 | |||
22eb1f2df4 | |||
a519ea163e | |||
6a2eda80d4 | |||
20d52376f9 | |||
3b2848668a | |||
a8f91d4224 | |||
e0adbbc5b9 | |||
905f12a279 | |||
0c24bbbaaf | |||
baa782b8ce | |||
740358e4c0 | |||
2ebc8c9fac | |||
f3ecf76239 | |||
84df17a0f6 | |||
91c28712e6 | |||
8eda2266bc | |||
47fd7c90f4 | |||
cafa2fb2fd | |||
9c31ba5102 | |||
da65ea32d8 | |||
e1aec49ed6 | |||
ab86ac970d | |||
90f66ccaf3 | |||
f63406bc3e | |||
b3a93bc128 | |||
8f0d2e9fc3 | |||
4c2d0d2d8e | |||
ac445388d9 | |||
705601f0b1 | |||
d897a8a8ea | |||
4d57f529c9 | |||
5caa8fed38 | |||
69f91e0cf4 | |||
fdbc8909cc | |||
76a91ce358 |
1
.gitignore
vendored
1
.gitignore
vendored
@ -1,4 +1,5 @@
|
||||
*.pyc
|
||||
.env
|
||||
MANIFEST
|
||||
build
|
||||
cheat.egg-info
|
||||
|
@ -1,9 +1,29 @@
|
||||
Contributing
|
||||
============
|
||||
If you would like to contribute cheetsheets or program functionality, please
|
||||
fork this repository, make your changes, and send me a pull request.
|
||||
fork this repository, make your changes, and submit a pull request against the
|
||||
`master` branch.
|
||||
|
||||
Python code show follow the standards laid out by [PEP 8][].
|
||||
|
||||
## Python standards ##
|
||||
Python code should conform to [PEP 8][].
|
||||
|
||||
|
||||
## Cheatsheet Format ##
|
||||
Please pattern your cheatsheets after the following:
|
||||
|
||||
```sh
|
||||
# To extract an uncompressed archive:
|
||||
tar -xvf /path/to/foo.tar
|
||||
|
||||
# To create an uncompressed archive:
|
||||
tar -cvf /path/to/foo.tar /path/to/foo/
|
||||
|
||||
# To extract a .gz archive:
|
||||
tar -xzvf /path/to/foo.tgz
|
||||
```
|
||||
|
||||
If you are submitting a cheatsheet that contains side-by-side columns of text,
|
||||
please align the columns using spaces rather than tabs.
|
||||
|
||||
[PEP 8]: http://legacy.python.org/dev/peps/pep-0008/
|
||||
|
680
LICENSE
680
LICENSE
@ -1,678 +1,2 @@
|
||||
|
||||
GNU GENERAL PUBLIC LICENSE
|
||||
Version 3, 29 June 2007
|
||||
|
||||
Copyright (C) 2007 Free Software Foundation, Inc. [http://fsf.org/]
|
||||
Everyone is permitted to copy and distribute verbatim copies
|
||||
of this license document, but changing it is not allowed.
|
||||
|
||||
Preamble
|
||||
|
||||
The GNU General Public License is a free, copyleft license for
|
||||
software and other kinds of works.
|
||||
|
||||
The licenses for most software and other practical works are designed
|
||||
to take away your freedom to share and change the works. By contrast,
|
||||
the GNU General Public License is intended to guarantee your freedom to
|
||||
share and change all versions of a program--to make sure it remains free
|
||||
software for all its users. We, the Free Software Foundation, use the
|
||||
GNU General Public License for most of our software; it applies also to
|
||||
any other work released this way by its authors. You can apply it to
|
||||
your programs, too.
|
||||
|
||||
When we speak of free software, we are referring to freedom, not
|
||||
price. Our General Public Licenses are designed to make sure that you
|
||||
have the freedom to distribute copies of free software (and charge for
|
||||
them if you wish), that you receive source code or can get it if you
|
||||
want it, that you can change the software or use pieces of it in new
|
||||
free programs, and that you know you can do these things.
|
||||
|
||||
To protect your rights, we need to prevent others from denying you
|
||||
these rights or asking you to surrender the rights. Therefore, you have
|
||||
certain responsibilities if you distribute copies of the software, or if
|
||||
you modify it: responsibilities to respect the freedom of others.
|
||||
|
||||
For example, if you distribute copies of such a program, whether
|
||||
gratis or for a fee, you must pass on to the recipients the same
|
||||
freedoms that you received. You must make sure that they, too, receive
|
||||
or can get the source code. And you must show them these terms so they
|
||||
know their rights.
|
||||
|
||||
Developers that use the GNU GPL protect your rights with two steps:
|
||||
(1) assert copyright on the software, and (2) offer you this License
|
||||
giving you legal permission to copy, distribute and/or modify it.
|
||||
|
||||
For the developers' and authors' protection, the GPL clearly explains
|
||||
that there is no warranty for this free software. For both users' and
|
||||
authors' sake, the GPL requires that modified versions be marked as
|
||||
changed, so that their problems will not be attributed erroneously to
|
||||
authors of previous versions.
|
||||
|
||||
Some devices are designed to deny users access to install or run
|
||||
modified versions of the software inside them, although the manufacturer
|
||||
can do so. This is fundamentally incompatible with the aim of
|
||||
protecting users' freedom to change the software. The systematic
|
||||
pattern of such abuse occurs in the area of products for individuals to
|
||||
use, which is precisely where it is most unacceptable. Therefore, we
|
||||
have designed this version of the GPL to prohibit the practice for those
|
||||
products. If such problems arise substantially in other domains, we
|
||||
stand ready to extend this provision to those domains in future versions
|
||||
of the GPL, as needed to protect the freedom of users.
|
||||
|
||||
Finally, every program is threatened constantly by software patents.
|
||||
States should not allow patents to restrict development and use of
|
||||
software on general-purpose computers, but in those that do, we wish to
|
||||
avoid the special danger that patents applied to a free program could
|
||||
make it effectively proprietary. To prevent this, the GPL assures that
|
||||
patents cannot be used to render the program non-free.
|
||||
|
||||
The precise terms and conditions for copying, distribution and
|
||||
modification follow.
|
||||
|
||||
TERMS AND CONDITIONS
|
||||
|
||||
0. Definitions.
|
||||
|
||||
"This License" refers to version 3 of the GNU General Public License.
|
||||
|
||||
"Copyright" also means copyright-like laws that apply to other kinds of
|
||||
works, such as semiconductor masks.
|
||||
|
||||
"The Program" refers to any copyrightable work licensed under this
|
||||
License. Each licensee is addressed as "you". "Licensees" and
|
||||
"recipients" may be individuals or organizations.
|
||||
|
||||
To "modify" a work means to copy from or adapt all or part of the work
|
||||
in a fashion requiring copyright permission, other than the making of an
|
||||
exact copy. The resulting work is called a "modified version" of the
|
||||
earlier work or a work "based on" the earlier work.
|
||||
|
||||
A "covered work" means either the unmodified Program or a work based
|
||||
on the Program.
|
||||
|
||||
To "propagate" a work means to do anything with it that, without
|
||||
permission, would make you directly or secondarily liable for
|
||||
infringement under applicable copyright law, except executing it on a
|
||||
computer or modifying a private copy. Propagation includes copying,
|
||||
distribution (with or without modification), making available to the
|
||||
public, and in some countries other activities as well.
|
||||
|
||||
To "convey" a work means any kind of propagation that enables other
|
||||
parties to make or receive copies. Mere interaction with a user through
|
||||
a computer network, with no transfer of a copy, is not conveying.
|
||||
|
||||
An interactive user interface displays "Appropriate Legal Notices"
|
||||
to the extent that it includes a convenient and prominently visible
|
||||
feature that (1) displays an appropriate copyright notice, and (2)
|
||||
tells the user that there is no warranty for the work (except to the
|
||||
extent that warranties are provided), that licensees may convey the
|
||||
work under this License, and how to view a copy of this License. If
|
||||
the interface presents a list of user commands or options, such as a
|
||||
menu, a prominent item in the list meets this criterion.
|
||||
|
||||
1. Source Code.
|
||||
|
||||
The "source code" for a work means the preferred form of the work
|
||||
for making modifications to it. "Object code" means any non-source
|
||||
form of a work.
|
||||
|
||||
A "Standard Interface" means an interface that either is an official
|
||||
standard defined by a recognized standards body, or, in the case of
|
||||
interfaces specified for a particular programming language, one that
|
||||
is widely used among developers working in that language.
|
||||
|
||||
The "System Libraries" of an executable work include anything, other
|
||||
than the work as a whole, that (a) is included in the normal form of
|
||||
packaging a Major Component, but which is not part of that Major
|
||||
Component, and (b) serves only to enable use of the work with that
|
||||
Major Component, or to implement a Standard Interface for which an
|
||||
implementation is available to the public in source code form. A
|
||||
"Major Component", in this context, means a major essential component
|
||||
(kernel, window system, and so on) of the specific operating system
|
||||
(if any) on which the executable work runs, or a compiler used to
|
||||
produce the work, or an object code interpreter used to run it.
|
||||
|
||||
The "Corresponding Source" for a work in object code form means all
|
||||
the source code needed to generate, install, and (for an executable
|
||||
work) run the object code and to modify the work, including scripts to
|
||||
control those activities. However, it does not include the work's
|
||||
System Libraries, or general-purpose tools or generally available free
|
||||
programs which are used unmodified in performing those activities but
|
||||
which are not part of the work. For example, Corresponding Source
|
||||
includes interface definition files associated with source files for
|
||||
the work, and the source code for shared libraries and dynamically
|
||||
linked subprograms that the work is specifically designed to require,
|
||||
such as by intimate data communication or control flow between those
|
||||
subprograms and other parts of the work.
|
||||
|
||||
The Corresponding Source need not include anything that users
|
||||
can regenerate automatically from other parts of the Corresponding
|
||||
Source.
|
||||
|
||||
The Corresponding Source for a work in source code form is that
|
||||
same work.
|
||||
|
||||
2. Basic Permissions.
|
||||
|
||||
All rights granted under this License are granted for the term of
|
||||
copyright on the Program, and are irrevocable provided the stated
|
||||
conditions are met. This License explicitly affirms your unlimited
|
||||
permission to run the unmodified Program. The output from running a
|
||||
covered work is covered by this License only if the output, given its
|
||||
content, constitutes a covered work. This License acknowledges your
|
||||
rights of fair use or other equivalent, as provided by copyright law.
|
||||
|
||||
You may make, run and propagate covered works that you do not
|
||||
convey, without conditions so long as your license otherwise remains
|
||||
in force. You may convey covered works to others for the sole purpose
|
||||
of having them make modifications exclusively for you, or provide you
|
||||
with facilities for running those works, provided that you comply with
|
||||
the terms of this License in conveying all material for which you do
|
||||
not control copyright. Those thus making or running the covered works
|
||||
for you must do so exclusively on your behalf, under your direction
|
||||
and control, on terms that prohibit them from making any copies of
|
||||
your copyrighted material outside their relationship with you.
|
||||
|
||||
Conveying under any other circumstances is permitted solely under
|
||||
the conditions stated below. Sublicensing is not allowed; section 10
|
||||
makes it unnecessary.
|
||||
|
||||
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
||||
|
||||
No covered work shall be deemed part of an effective technological
|
||||
measure under any applicable law fulfilling obligations under article
|
||||
11 of the WIPO copyright treaty adopted on 20 December 1996, or
|
||||
similar laws prohibiting or restricting circumvention of such
|
||||
measures.
|
||||
|
||||
When you convey a covered work, you waive any legal power to forbid
|
||||
circumvention of technological measures to the extent such circumvention
|
||||
is effected by exercising rights under this License with respect to
|
||||
the covered work, and you disclaim any intention to limit operation or
|
||||
modification of the work as a means of enforcing, against the work's
|
||||
users, your or third parties' legal rights to forbid circumvention of
|
||||
technological measures.
|
||||
|
||||
4. Conveying Verbatim Copies.
|
||||
|
||||
You may convey verbatim copies of the Program's source code as you
|
||||
receive it, in any medium, provided that you conspicuously and
|
||||
appropriately publish on each copy an appropriate copyright notice;
|
||||
keep intact all notices stating that this License and any
|
||||
non-permissive terms added in accord with section 7 apply to the code;
|
||||
keep intact all notices of the absence of any warranty; and give all
|
||||
recipients a copy of this License along with the Program.
|
||||
|
||||
You may charge any price or no price for each copy that you convey,
|
||||
and you may offer support or warranty protection for a fee.
|
||||
|
||||
5. Conveying Modified Source Versions.
|
||||
|
||||
You may convey a work based on the Program, or the modifications to
|
||||
produce it from the Program, in the form of source code under the
|
||||
terms of section 4, provided that you also meet all of these conditions:
|
||||
|
||||
a) The work must carry prominent notices stating that you modified
|
||||
it, and giving a relevant date.
|
||||
|
||||
b) The work must carry prominent notices stating that it is
|
||||
released under this License and any conditions added under section
|
||||
7. This requirement modifies the requirement in section 4 to
|
||||
"keep intact all notices".
|
||||
|
||||
c) You must license the entire work, as a whole, under this
|
||||
License to anyone who comes into possession of a copy. This
|
||||
License will therefore apply, along with any applicable section 7
|
||||
additional terms, to the whole of the work, and all its parts,
|
||||
regardless of how they are packaged. This License gives no
|
||||
permission to license the work in any other way, but it does not
|
||||
invalidate such permission if you have separately received it.
|
||||
|
||||
d) If the work has interactive user interfaces, each must display
|
||||
Appropriate Legal Notices; however, if the Program has interactive
|
||||
interfaces that do not display Appropriate Legal Notices, your
|
||||
work need not make them do so.
|
||||
|
||||
A compilation of a covered work with other separate and independent
|
||||
works, which are not by their nature extensions of the covered work,
|
||||
and which are not combined with it such as to form a larger program,
|
||||
in or on a volume of a storage or distribution medium, is called an
|
||||
"aggregate" if the compilation and its resulting copyright are not
|
||||
used to limit the access or legal rights of the compilation's users
|
||||
beyond what the individual works permit. Inclusion of a covered work
|
||||
in an aggregate does not cause this License to apply to the other
|
||||
parts of the aggregate.
|
||||
|
||||
6. Conveying Non-Source Forms.
|
||||
|
||||
You may convey a covered work in object code form under the terms
|
||||
of sections 4 and 5, provided that you also convey the
|
||||
machine-readable Corresponding Source under the terms of this License,
|
||||
in one of these ways:
|
||||
|
||||
a) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by the
|
||||
Corresponding Source fixed on a durable physical medium
|
||||
customarily used for software interchange.
|
||||
|
||||
b) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by a
|
||||
written offer, valid for at least three years and valid for as
|
||||
long as you offer spare parts or customer support for that product
|
||||
model, to give anyone who possesses the object code either (1) a
|
||||
copy of the Corresponding Source for all the software in the
|
||||
product that is covered by this License, on a durable physical
|
||||
medium customarily used for software interchange, for a price no
|
||||
more than your reasonable cost of physically performing this
|
||||
conveying of source, or (2) access to copy the
|
||||
Corresponding Source from a network server at no charge.
|
||||
|
||||
c) Convey individual copies of the object code with a copy of the
|
||||
written offer to provide the Corresponding Source. This
|
||||
alternative is allowed only occasionally and noncommercially, and
|
||||
only if you received the object code with such an offer, in accord
|
||||
with subsection 6b.
|
||||
|
||||
d) Convey the object code by offering access from a designated
|
||||
place (gratis or for a charge), and offer equivalent access to the
|
||||
Corresponding Source in the same way through the same place at no
|
||||
further charge. You need not require recipients to copy the
|
||||
Corresponding Source along with the object code. If the place to
|
||||
copy the object code is a network server, the Corresponding Source
|
||||
may be on a different server (operated by you or a third party)
|
||||
that supports equivalent copying facilities, provided you maintain
|
||||
clear directions next to the object code saying where to find the
|
||||
Corresponding Source. Regardless of what server hosts the
|
||||
Corresponding Source, you remain obligated to ensure that it is
|
||||
available for as long as needed to satisfy these requirements.
|
||||
|
||||
e) Convey the object code using peer-to-peer transmission, provided
|
||||
you inform other peers where the object code and Corresponding
|
||||
Source of the work are being offered to the general public at no
|
||||
charge under subsection 6d.
|
||||
|
||||
A separable portion of the object code, whose source code is excluded
|
||||
from the Corresponding Source as a System Library, need not be
|
||||
included in conveying the object code work.
|
||||
|
||||
A "User Product" is either (1) a "consumer product", which means any
|
||||
tangible personal property which is normally used for personal, family,
|
||||
or household purposes, or (2) anything designed or sold for incorporation
|
||||
into a dwelling. In determining whether a product is a consumer product,
|
||||
doubtful cases shall be resolved in favor of coverage. For a particular
|
||||
product received by a particular user, "normally used" refers to a
|
||||
typical or common use of that class of product, regardless of the status
|
||||
of the particular user or of the way in which the particular user
|
||||
actually uses, or expects or is expected to use, the product. A product
|
||||
is a consumer product regardless of whether the product has substantial
|
||||
commercial, industrial or non-consumer uses, unless such uses represent
|
||||
the only significant mode of use of the product.
|
||||
|
||||
"Installation Information" for a User Product means any methods,
|
||||
procedures, authorization keys, or other information required to install
|
||||
and execute modified versions of a covered work in that User Product from
|
||||
a modified version of its Corresponding Source. The information must
|
||||
suffice to ensure that the continued functioning of the modified object
|
||||
code is in no case prevented or interfered with solely because
|
||||
modification has been made.
|
||||
|
||||
If you convey an object code work under this section in, or with, or
|
||||
specifically for use in, a User Product, and the conveying occurs as
|
||||
part of a transaction in which the right of possession and use of the
|
||||
User Product is transferred to the recipient in perpetuity or for a
|
||||
fixed term (regardless of how the transaction is characterized), the
|
||||
Corresponding Source conveyed under this section must be accompanied
|
||||
by the Installation Information. But this requirement does not apply
|
||||
if neither you nor any third party retains the ability to install
|
||||
modified object code on the User Product (for example, the work has
|
||||
been installed in ROM).
|
||||
|
||||
The requirement to provide Installation Information does not include a
|
||||
requirement to continue to provide support service, warranty, or updates
|
||||
for a work that has been modified or installed by the recipient, or for
|
||||
the User Product in which it has been modified or installed. Access to a
|
||||
network may be denied when the modification itself materially and
|
||||
adversely affects the operation of the network or violates the rules and
|
||||
protocols for communication across the network.
|
||||
|
||||
Corresponding Source conveyed, and Installation Information provided,
|
||||
in accord with this section must be in a format that is publicly
|
||||
documented (and with an implementation available to the public in
|
||||
source code form), and must require no special password or key for
|
||||
unpacking, reading or copying.
|
||||
|
||||
7. Additional Terms.
|
||||
|
||||
"Additional permissions" are terms that supplement the terms of this
|
||||
License by making exceptions from one or more of its conditions.
|
||||
Additional permissions that are applicable to the entire Program shall
|
||||
be treated as though they were included in this License, to the extent
|
||||
that they are valid under applicable law. If additional permissions
|
||||
apply only to part of the Program, that part may be used separately
|
||||
under those permissions, but the entire Program remains governed by
|
||||
this License without regard to the additional permissions.
|
||||
|
||||
When you convey a copy of a covered work, you may at your option
|
||||
remove any additional permissions from that copy, or from any part of
|
||||
it. (Additional permissions may be written to require their own
|
||||
removal in certain cases when you modify the work.) You may place
|
||||
additional permissions on material, added by you to a covered work,
|
||||
for which you have or can give appropriate copyright permission.
|
||||
|
||||
Notwithstanding any other provision of this License, for material you
|
||||
add to a covered work, you may (if authorized by the copyright holders of
|
||||
that material) supplement the terms of this License with terms:
|
||||
|
||||
a) Disclaiming warranty or limiting liability differently from the
|
||||
terms of sections 15 and 16 of this License; or
|
||||
|
||||
b) Requiring preservation of specified reasonable legal notices or
|
||||
author attributions in that material or in the Appropriate Legal
|
||||
Notices displayed by works containing it; or
|
||||
|
||||
c) Prohibiting misrepresentation of the origin of that material, or
|
||||
requiring that modified versions of such material be marked in
|
||||
reasonable ways as different from the original version; or
|
||||
|
||||
d) Limiting the use for publicity purposes of names of licensors or
|
||||
authors of the material; or
|
||||
|
||||
e) Declining to grant rights under trademark law for use of some
|
||||
trade names, trademarks, or service marks; or
|
||||
|
||||
f) Requiring indemnification of licensors and authors of that
|
||||
material by anyone who conveys the material (or modified versions of
|
||||
it) with contractual assumptions of liability to the recipient, for
|
||||
any liability that these contractual assumptions directly impose on
|
||||
those licensors and authors.
|
||||
|
||||
All other non-permissive additional terms are considered "further
|
||||
restrictions" within the meaning of section 10. If the Program as you
|
||||
received it, or any part of it, contains a notice stating that it is
|
||||
governed by this License along with a term that is a further
|
||||
restriction, you may remove that term. If a license document contains
|
||||
a further restriction but permits relicensing or conveying under this
|
||||
License, you may add to a covered work material governed by the terms
|
||||
of that license document, provided that the further restriction does
|
||||
not survive such relicensing or conveying.
|
||||
|
||||
If you add terms to a covered work in accord with this section, you
|
||||
must place, in the relevant source files, a statement of the
|
||||
additional terms that apply to those files, or a notice indicating
|
||||
where to find the applicable terms.
|
||||
|
||||
Additional terms, permissive or non-permissive, may be stated in the
|
||||
form of a separately written license, or stated as exceptions;
|
||||
the above requirements apply either way.
|
||||
|
||||
8. Termination.
|
||||
|
||||
You may not propagate or modify a covered work except as expressly
|
||||
provided under this License. Any attempt otherwise to propagate or
|
||||
modify it is void, and will automatically terminate your rights under
|
||||
this License (including any patent licenses granted under the third
|
||||
paragraph of section 11).
|
||||
|
||||
However, if you cease all violation of this License, then your
|
||||
license from a particular copyright holder is reinstated (a)
|
||||
provisionally, unless and until the copyright holder explicitly and
|
||||
finally terminates your license, and (b) permanently, if the copyright
|
||||
holder fails to notify you of the violation by some reasonable means
|
||||
prior to 60 days after the cessation.
|
||||
|
||||
Moreover, your license from a particular copyright holder is
|
||||
reinstated permanently if the copyright holder notifies you of the
|
||||
violation by some reasonable means, this is the first time you have
|
||||
received notice of violation of this License (for any work) from that
|
||||
copyright holder, and you cure the violation prior to 30 days after
|
||||
your receipt of the notice.
|
||||
|
||||
Termination of your rights under this section does not terminate the
|
||||
licenses of parties who have received copies or rights from you under
|
||||
this License. If your rights have been terminated and not permanently
|
||||
reinstated, you do not qualify to receive new licenses for the same
|
||||
material under section 10.
|
||||
|
||||
9. Acceptance Not Required for Having Copies.
|
||||
|
||||
You are not required to accept this License in order to receive or
|
||||
run a copy of the Program. Ancillary propagation of a covered work
|
||||
occurring solely as a consequence of using peer-to-peer transmission
|
||||
to receive a copy likewise does not require acceptance. However,
|
||||
nothing other than this License grants you permission to propagate or
|
||||
modify any covered work. These actions infringe copyright if you do
|
||||
not accept this License. Therefore, by modifying or propagating a
|
||||
covered work, you indicate your acceptance of this License to do so.
|
||||
|
||||
10. Automatic Licensing of Downstream Recipients.
|
||||
|
||||
Each time you convey a covered work, the recipient automatically
|
||||
receives a license from the original licensors, to run, modify and
|
||||
propagate that work, subject to this License. You are not responsible
|
||||
for enforcing compliance by third parties with this License.
|
||||
|
||||
An "entity transaction" is a transaction transferring control of an
|
||||
organization, or substantially all assets of one, or subdividing an
|
||||
organization, or merging organizations. If propagation of a covered
|
||||
work results from an entity transaction, each party to that
|
||||
transaction who receives a copy of the work also receives whatever
|
||||
licenses to the work the party's predecessor in interest had or could
|
||||
give under the previous paragraph, plus a right to possession of the
|
||||
Corresponding Source of the work from the predecessor in interest, if
|
||||
the predecessor has it or can get it with reasonable efforts.
|
||||
|
||||
You may not impose any further restrictions on the exercise of the
|
||||
rights granted or affirmed under this License. For example, you may
|
||||
not impose a license fee, royalty, or other charge for exercise of
|
||||
rights granted under this License, and you may not initiate litigation
|
||||
(including a cross-claim or counterclaim in a lawsuit) alleging that
|
||||
any patent claim is infringed by making, using, selling, offering for
|
||||
sale, or importing the Program or any portion of it.
|
||||
|
||||
11. Patents.
|
||||
|
||||
A "contributor" is a copyright holder who authorizes use under this
|
||||
License of the Program or a work on which the Program is based. The
|
||||
work thus licensed is called the contributor's "contributor version".
|
||||
|
||||
A contributor's "essential patent claims" are all patent claims
|
||||
owned or controlled by the contributor, whether already acquired or
|
||||
hereafter acquired, that would be infringed by some manner, permitted
|
||||
by this License, of making, using, or selling its contributor version,
|
||||
but do not include claims that would be infringed only as a
|
||||
consequence of further modification of the contributor version. For
|
||||
purposes of this definition, "control" includes the right to grant
|
||||
patent sublicenses in a manner consistent with the requirements of
|
||||
this License.
|
||||
|
||||
Each contributor grants you a non-exclusive, worldwide, royalty-free
|
||||
patent license under the contributor's essential patent claims, to
|
||||
make, use, sell, offer for sale, import and otherwise run, modify and
|
||||
propagate the contents of its contributor version.
|
||||
|
||||
In the following three paragraphs, a "patent license" is any express
|
||||
agreement or commitment, however denominated, not to enforce a patent
|
||||
(such as an express permission to practice a patent or covenant not to
|
||||
sue for patent infringement). To "grant" such a patent license to a
|
||||
party means to make such an agreement or commitment not to enforce a
|
||||
patent against the party.
|
||||
|
||||
If you convey a covered work, knowingly relying on a patent license,
|
||||
and the Corresponding Source of the work is not available for anyone
|
||||
to copy, free of charge and under the terms of this License, through a
|
||||
publicly available network server or other readily accessible means,
|
||||
then you must either (1) cause the Corresponding Source to be so
|
||||
available, or (2) arrange to deprive yourself of the benefit of the
|
||||
patent license for this particular work, or (3) arrange, in a manner
|
||||
consistent with the requirements of this License, to extend the patent
|
||||
license to downstream recipients. "Knowingly relying" means you have
|
||||
actual knowledge that, but for the patent license, your conveying the
|
||||
covered work in a country, or your recipient's use of the covered work
|
||||
in a country, would infringe one or more identifiable patents in that
|
||||
country that you have reason to believe are valid.
|
||||
|
||||
If, pursuant to or in connection with a single transaction or
|
||||
arrangement, you convey, or propagate by procuring conveyance of, a
|
||||
covered work, and grant a patent license to some of the parties
|
||||
receiving the covered work authorizing them to use, propagate, modify
|
||||
or convey a specific copy of the covered work, then the patent license
|
||||
you grant is automatically extended to all recipients of the covered
|
||||
work and works based on it.
|
||||
|
||||
A patent license is "discriminatory" if it does not include within
|
||||
the scope of its coverage, prohibits the exercise of, or is
|
||||
conditioned on the non-exercise of one or more of the rights that are
|
||||
specifically granted under this License. You may not convey a covered
|
||||
work if you are a party to an arrangement with a third party that is
|
||||
in the business of distributing software, under which you make payment
|
||||
to the third party based on the extent of your activity of conveying
|
||||
the work, and under which the third party grants, to any of the
|
||||
parties who would receive the covered work from you, a discriminatory
|
||||
patent license (a) in connection with copies of the covered work
|
||||
conveyed by you (or copies made from those copies), or (b) primarily
|
||||
for and in connection with specific products or compilations that
|
||||
contain the covered work, unless you entered into that arrangement,
|
||||
or that patent license was granted, prior to 28 March 2007.
|
||||
|
||||
Nothing in this License shall be construed as excluding or limiting
|
||||
any implied license or other defenses to infringement that may
|
||||
otherwise be available to you under applicable patent law.
|
||||
|
||||
12. No Surrender of Others' Freedom.
|
||||
|
||||
If conditions are imposed on you (whether by court order, agreement or
|
||||
otherwise) that contradict the conditions of this License, they do not
|
||||
excuse you from the conditions of this License. If you cannot convey a
|
||||
covered work so as to satisfy simultaneously your obligations under this
|
||||
License and any other pertinent obligations, then as a consequence you may
|
||||
not convey it at all. For example, if you agree to terms that obligate you
|
||||
to collect a royalty for further conveying from those to whom you convey
|
||||
the Program, the only way you could satisfy both those terms and this
|
||||
License would be to refrain entirely from conveying the Program.
|
||||
|
||||
13. Use with the GNU Affero General Public License.
|
||||
|
||||
Notwithstanding any other provision of this License, you have
|
||||
permission to link or combine any covered work with a work licensed
|
||||
under version 3 of the GNU Affero General Public License into a single
|
||||
combined work, and to convey the resulting work. The terms of this
|
||||
License will continue to apply to the part which is the covered work,
|
||||
but the special requirements of the GNU Affero General Public License,
|
||||
section 13, concerning interaction through a network will apply to the
|
||||
combination as such.
|
||||
|
||||
14. Revised Versions of this License.
|
||||
|
||||
The Free Software Foundation may publish revised and/or new versions of
|
||||
the GNU General Public License from time to time. Such new versions will
|
||||
be similar in spirit to the present version, but may differ in detail to
|
||||
address new problems or concerns.
|
||||
|
||||
Each version is given a distinguishing version number. If the
|
||||
Program specifies that a certain numbered version of the GNU General
|
||||
Public License "or any later version" applies to it, you have the
|
||||
option of following the terms and conditions either of that numbered
|
||||
version or of any later version published by the Free Software
|
||||
Foundation. If the Program does not specify a version number of the
|
||||
GNU General Public License, you may choose any version ever published
|
||||
by the Free Software Foundation.
|
||||
|
||||
If the Program specifies that a proxy can decide which future
|
||||
versions of the GNU General Public License can be used, that proxy's
|
||||
public statement of acceptance of a version permanently authorizes you
|
||||
to choose that version for the Program.
|
||||
|
||||
Later license versions may give you additional or different
|
||||
permissions. However, no additional obligations are imposed on any
|
||||
author or copyright holder as a result of your choosing to follow a
|
||||
later version.
|
||||
|
||||
15. Disclaimer of Warranty.
|
||||
|
||||
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
||||
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
|
||||
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
|
||||
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
|
||||
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
|
||||
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
|
||||
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
||||
|
||||
16. Limitation of Liability.
|
||||
|
||||
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
|
||||
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
|
||||
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
|
||||
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
|
||||
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
|
||||
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
|
||||
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
|
||||
SUCH DAMAGES.
|
||||
|
||||
17. Interpretation of Sections 15 and 16.
|
||||
|
||||
If the disclaimer of warranty and limitation of liability provided
|
||||
above cannot be given local legal effect according to their terms,
|
||||
reviewing courts shall apply local law that most closely approximates
|
||||
an absolute waiver of all civil liability in connection with the
|
||||
Program, unless a warranty or assumption of liability accompanies a
|
||||
copy of the Program in return for a fee.
|
||||
|
||||
END OF TERMS AND CONDITIONS
|
||||
|
||||
How to Apply These Terms to Your New Programs
|
||||
|
||||
If you develop a new program, and you want it to be of the greatest
|
||||
possible use to the public, the best way to achieve this is to make it
|
||||
free software which everyone can redistribute and change under these terms.
|
||||
|
||||
To do so, attach the following notices to the program. It is safest
|
||||
to attach them to the start of each source file to most effectively
|
||||
state the exclusion of warranty; and each file should have at least
|
||||
the "copyright" line and a pointer to where the full notice is found.
|
||||
|
||||
{one line to give the program's name and a brief idea of what it does.}
|
||||
Copyright (C) {year} {name of author}
|
||||
|
||||
This program is free software: you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
the Free Software Foundation, either version 3 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU General Public License
|
||||
along with this program. If not, see [http://www.gnu.org/licenses/].
|
||||
|
||||
Also add information on how to contact you by electronic and paper mail.
|
||||
|
||||
If the program does terminal interaction, make it output a short
|
||||
notice like this when it starts in an interactive mode:
|
||||
|
||||
{project} Copyright (C) {year} {fullname}
|
||||
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||||
This is free software, and you are welcome to redistribute it
|
||||
under certain conditions; type `show c' for details.
|
||||
|
||||
The hypothetical commands `show w' and `show c' should show the appropriate
|
||||
parts of the General Public License. Of course, your program's commands
|
||||
might be different; for a GUI interface, you would use an "about box".
|
||||
|
||||
You should also get your employer (if you work as a programmer) or school,
|
||||
if any, to sign a "copyright disclaimer" for the program, if necessary.
|
||||
For more information on this, and how to apply and follow the GNU GPL, see
|
||||
[http://www.gnu.org/licenses/].
|
||||
|
||||
The GNU General Public License does not permit incorporating your program
|
||||
into proprietary programs. If your program is a subroutine library, you
|
||||
may consider it more useful to permit linking proprietary applications with
|
||||
the library. If this is what you want to do, use the GNU Lesser General
|
||||
Public License instead of this License. But first, please read
|
||||
[http://www.gnu.org/philosophy/why-not-lgpl.html].
|
||||
|
||||
|
||||
|
||||
This program is dual-licensed under the MIT and GPL3 licenses. See the licenses
|
||||
directory for the license text in full.
|
||||
|
6
MANIFEST.in
Normal file
6
MANIFEST.in
Normal file
@ -0,0 +1,6 @@
|
||||
include CHANGELOG
|
||||
include CONTRIBUTING.md
|
||||
include LICENSE
|
||||
include README.md
|
||||
include licenses/gpl-3.txt
|
||||
include licenses/mit.txt
|
158
README.md
158
README.md
@ -1,3 +1,5 @@
|
||||
[](https://pypi.python.org/pypi/cheat/)
|
||||
|
||||
cheat
|
||||
=====
|
||||
`cheat` allows you to create and view interactive cheatsheets on the
|
||||
@ -7,66 +9,51 @@ remember.
|
||||
|
||||

|
||||
|
||||
`cheat` depends only on `python` and `pip`.
|
||||
|
||||
PyPI status:
|
||||
|
||||
[](https://pypi.python.org/pypi/cheat/)
|
||||
[](https://pypi.python.org/pypi/cheat/)
|
||||
|
||||
Example
|
||||
-------
|
||||
The next time you're forced to disarm a nuclear weapon without consulting
|
||||
Google, you may run:
|
||||
|
||||
cheat tar
|
||||
```sh
|
||||
cheat tar
|
||||
```
|
||||
|
||||
You will be presented with a cheatsheet resembling:
|
||||
|
||||
```
|
||||
```sh
|
||||
# To extract an uncompressed archive:
|
||||
tar -xvf /path/to/foo.tar
|
||||
tar -xvf '/path/to/foo.tar'
|
||||
|
||||
# To extract a .gz archive:
|
||||
tar -xzvf /path/to/foo.tgz
|
||||
tar -xzvf '/path/to/foo.tgz'
|
||||
|
||||
# To create a .gz archive:
|
||||
tar -czvf /path/to/foo.tgz /path/to/foo/
|
||||
tar -czvf '/path/to/foo.tgz' '/path/to/foo/'
|
||||
|
||||
# To extract a .bz2 archive:
|
||||
tar -xjvf /path/to/foo.tgz
|
||||
tar -xjvf '/path/to/foo.tgz'
|
||||
|
||||
# To create a .bz2 archive:
|
||||
tar -cjvf /path/to/foo.tgz /path/to/foo/
|
||||
tar -cjvf '/path/to/foo.tgz' '/path/to/foo/'
|
||||
```
|
||||
|
||||
To see what cheatsheets are availble, run `cheat -l`.
|
||||
To see what cheatsheets are available, run `cheat -l`.
|
||||
|
||||
Note that, while `cheat` was designed primarily for *nix system administrators,
|
||||
Note that, while `cheat` was designed primarily for \*nix system administrators,
|
||||
it is agnostic as to what content it stores. If you would like to use `cheat`
|
||||
to store notes on your favorite cookie recipes, feel free.
|
||||
|
||||
|
||||
Installing
|
||||
----------
|
||||
It is recommended to install `cheat` with `pip`:
|
||||
|
||||
### Using pip ###
|
||||
```sh
|
||||
[sudo] pip install cheat
|
||||
```
|
||||
|
||||
sudo pip install cheat
|
||||
|
||||
### Using homebrew ###
|
||||
|
||||
brew install cheat
|
||||
|
||||
### Manually ###
|
||||
|
||||
First install the required python dependencies with:
|
||||
|
||||
sudo pip install docopt pygments
|
||||
|
||||
Then, clone this repository, `cd` into it, and run:
|
||||
|
||||
sudo python setup.py install
|
||||
[Other installation methods are available][installing].
|
||||
|
||||
|
||||
Modifying Cheatsheets
|
||||
@ -79,12 +66,14 @@ Cheatsheets are stored in the `~/.cheat/` directory, and are named on a
|
||||
per-keyphrase basis. In other words, the content for the `tar` cheatsheet lives
|
||||
in the `~/.cheat/tar` file.
|
||||
|
||||
Provided that you have an `EDITOR` environment variable set, you may edit
|
||||
cheatsheets with:
|
||||
Provided that you have a `CHEAT_EDITOR`, `VISUAL`, or `EDITOR` environment
|
||||
variable set, you may edit cheatsheets with:
|
||||
|
||||
cheat -e foo
|
||||
```sh
|
||||
cheat -e foo
|
||||
```
|
||||
|
||||
If the 'foo' cheatsheet already exists, it will be opened for editing.
|
||||
If the `foo` cheatsheet already exists, it will be opened for editing.
|
||||
Otherwise, it will be created automatically.
|
||||
|
||||
After you've customized your cheatsheets, I urge you to track `~/.cheat/` along
|
||||
@ -94,60 +83,87 @@ with your [dotfiles][].
|
||||
Configuring
|
||||
-----------
|
||||
|
||||
### Setting a DEFAULT_CHEAT_DIR ###
|
||||
### Setting a CHEAT_DEFAULT_DIR ###
|
||||
Personal cheatsheets are saved in the `~/.cheat` directory by default, but you
|
||||
can specify a different default by exporting a `DEFAULT_CHEAT_DIR` environment
|
||||
can specify a different default by exporting a `CHEAT_DEFAULT_DIR` environment
|
||||
variable:
|
||||
|
||||
export DEFAULT_CHEAT_DIR=/path/to/my/cheats
|
||||
```sh
|
||||
export CHEAT_DEFAULT_DIR='/path/to/my/cheats'
|
||||
```
|
||||
|
||||
### Setting a CHEATPATH ###
|
||||
### Setting a CHEAT_PATH ###
|
||||
You can additionally instruct `cheat` to look for cheatsheets in other
|
||||
directories by exporting a `CHEATPATH` environment variable:
|
||||
directories by exporting a `CHEAT_PATH` environment variable:
|
||||
|
||||
export CHEATPATH=/path/to/my/cheats
|
||||
```sh
|
||||
export CHEAT_PATH='/path/to/my/cheats'
|
||||
```
|
||||
|
||||
You may, of course, append multiple directories to your `CHEATPATH`:
|
||||
You may, of course, append multiple directories to your `CHEAT_PATH`:
|
||||
|
||||
export CHEATPATH=$CHEATPATH:/path/to/more/cheats
|
||||
```sh
|
||||
export CHEAT_PATH="$CHEAT_PATH:/path/to/more/cheats"
|
||||
```
|
||||
|
||||
You may view which directories are on your `CHEATPATH` with `cheat -d`.
|
||||
You may view which directories are on your `CHEAT_PATH` with `cheat -d`.
|
||||
|
||||
### Enabling Syntax Highlighting ###
|
||||
`cheat` can apply syntax highlighting to your cheatsheets if so desired. To
|
||||
enable this feature, set a `CHEATCOLORS` environment variable:
|
||||
`cheat` can optionally apply syntax highlighting to your cheatsheets. To
|
||||
enable syntax highlighting, export a `CHEAT_COLORS` environment variable:
|
||||
|
||||
export CHEATCOLORS=true
|
||||
```sh
|
||||
export CHEAT_COLORS=true
|
||||
```
|
||||
|
||||
### Enabling Command-line Autocompletion ###
|
||||
The `cheat/autocompletion` directory contains scripts to enable command-line
|
||||
autocompletion for various shells. To activate autocompletion, simply copy the
|
||||
appropriate script to the appropriate path on your system. (The "appropriate
|
||||
path" will vary on a per-platform basis, so this documentation shall not
|
||||
speculate as to where that may be.)
|
||||
Note that [pygments][] must be installed on your system for this to work.
|
||||
|
||||
|
||||
Related Projects
|
||||
----------------
|
||||
#### Specifying a Syntax Highlighter ####
|
||||
You may manually specify which syntax highlighter to use for each cheatsheet by
|
||||
wrapping the sheet's contents in a [Github-Flavored Markdown code-fence][gfm].
|
||||
|
||||
- [lucaswerkmeister/cheats][1]: An implementation of this concept in pure bash
|
||||
that also allows not only for numerical indexing of subcomands but also
|
||||
supports running commands interactively.
|
||||
Example:
|
||||
|
||||
- [jahendrie/cheat][2]: A bash-only implementation that additionally allows for
|
||||
cheatsheets to be created and `grep` searched from the command-line.
|
||||
([jahendrie][] contributed key ideas to this project as well.)
|
||||
<pre>
|
||||
```sql
|
||||
-- to select a user by ID
|
||||
SELECT *
|
||||
FROM Users
|
||||
WHERE id = 100
|
||||
```
|
||||
</pre>
|
||||
|
||||
- [`cheat` RubyGem][3]: A clever gem from 2006 that clearly had similar
|
||||
motivations. It is unclear whether or not it is currently maintained.
|
||||
If no syntax highlighter is specified, the `bash` highlighter will be used by
|
||||
default.
|
||||
|
||||
- [`tldr`][tldr]: "Simplified and community-driven man pages".
|
||||
### Enabling Search Match Highlighting ###
|
||||
`cheat` can optionally be configured to highlight search term matches in search
|
||||
results. To do so, export a `CHEAT_HIGHLIGHT` environment variable with a value
|
||||
of one of the following:
|
||||
|
||||
- blue
|
||||
- cyan
|
||||
- green
|
||||
- grey
|
||||
- magenta
|
||||
- red
|
||||
- white
|
||||
- yellow
|
||||
|
||||
Note that the `termcolor` module must be installed on your system for this to
|
||||
work.
|
||||
|
||||
|
||||
[dotfiles]: http://dotfiles.github.io/
|
||||
[jahendrie]: https://github.com/jahendrie
|
||||
[1]: https://github.com/lucaswerkmeister/cheats
|
||||
[2]: https://github.com/jahendrie/cheat
|
||||
[3]: http://errtheblog.com/posts/21-cheat
|
||||
[4]: https://github.com/chrisallenlane/cheat/pull/77
|
||||
[tldr]: https://github.com/tldr-pages/tldr
|
||||
See Also:
|
||||
---------
|
||||
- [Enabling Command-line Autocompletion][autocompletion]
|
||||
- [Related Projects][related-projects]
|
||||
|
||||
|
||||
[autocompletion]: https://github.com/chrisallenlane/cheat/wiki/Enabling-Command-line-Autocompletion
|
||||
[dotfiles]: http://dotfiles.github.io/
|
||||
[gfm]: https://help.github.com/articles/creating-and-highlighting-code-blocks/
|
||||
[installing]: https://github.com/chrisallenlane/cheat/wiki/Installing
|
||||
[pygments]: http://pygments.org/
|
||||
[related-projects]: https://github.com/chrisallenlane/cheat/wiki/Related-Projects
|
||||
|
50
bin/cheat
50
bin/cheat
@ -2,6 +2,8 @@
|
||||
|
||||
"""cheat
|
||||
|
||||
Create and view cheatsheets on the command line.
|
||||
|
||||
Usage:
|
||||
cheat <cheatsheet>
|
||||
cheat -e <cheatsheet>
|
||||
@ -10,35 +12,47 @@ Usage:
|
||||
cheat -d
|
||||
cheat -v
|
||||
|
||||
cheat allows you to create and view interactive cheatsheets on the
|
||||
command-line. It was designed to help remind *nix system
|
||||
administrators of options for commands that they use frequently,
|
||||
but not frequently enough to remember.
|
||||
|
||||
Examples:
|
||||
To look up 'tar':
|
||||
cheat tar
|
||||
|
||||
To create or edit the cheatsheet for 'foo':
|
||||
cheat -e foo
|
||||
|
||||
Options:
|
||||
-d --directories List directories on CHEATPATH
|
||||
-e --edit Edit cheatsheet
|
||||
-l --list List cheatsheets
|
||||
-s --search Search cheatsheets for <keyword>
|
||||
-v --version Print the version number
|
||||
|
||||
Examples:
|
||||
|
||||
To view the `tar` cheatsheet:
|
||||
cheat tar
|
||||
|
||||
To edit (or create) the `foo` cheatsheet:
|
||||
cheat -e foo
|
||||
|
||||
To list all available cheatsheets:
|
||||
cheat -l
|
||||
|
||||
To search for "ssh" among all cheatsheets:
|
||||
cheat -s ssh
|
||||
"""
|
||||
|
||||
# require the dependencies
|
||||
from cheat import *
|
||||
from cheat.utils import *
|
||||
from __future__ import print_function
|
||||
from cheat.sheets import Sheets
|
||||
from cheat.sheet import Sheet
|
||||
from cheat.utils import Utils
|
||||
from cheat.configuration import Configuration
|
||||
from docopt import docopt
|
||||
import os
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
|
||||
# parse the command-line options
|
||||
options = docopt(__doc__, version='cheat 2.1.14')
|
||||
options = docopt(__doc__, version='cheat 2.4.2')
|
||||
|
||||
config = Configuration()
|
||||
sheets = Sheets(config)
|
||||
utils = Utils(config)
|
||||
sheet = Sheet(sheets, utils)
|
||||
|
||||
# list directories
|
||||
if options['--directories']:
|
||||
@ -46,7 +60,7 @@ if __name__ == '__main__':
|
||||
|
||||
# list cheatsheets
|
||||
elif options['--list']:
|
||||
print(sheets.list())
|
||||
print(sheets.list(), end="")
|
||||
|
||||
# create/edit cheatsheet
|
||||
elif options['--edit']:
|
||||
@ -54,8 +68,8 @@ if __name__ == '__main__':
|
||||
|
||||
# search among the cheatsheets
|
||||
elif options['--search']:
|
||||
print(colorize(sheets.search(options['<keyword>'])))
|
||||
print(utils.colorize(sheets.search(options['<keyword>'])), end="")
|
||||
|
||||
# print the cheatsheet
|
||||
else:
|
||||
print(colorize(sheet.read(options['<cheatsheet>'])))
|
||||
print(utils.colorize(sheet.read(options['<cheatsheet>'])), end="")
|
||||
|
@ -1,3 +1,4 @@
|
||||
from . import sheet
|
||||
from . import sheets
|
||||
from . import utils
|
||||
from . import configuration
|
@ -11,7 +11,7 @@ u update
|
||||
x extract with full paths
|
||||
|
||||
Example:
|
||||
7z a -t7z -m0-lzma -mx=9 -mfb=64 -md=32m -ms=on archive.7z dir1
|
||||
7z a -t7z -m0=lzma -mx=9 -mfb=64 -md=32m -ms=on archive.7z dir1
|
||||
|
||||
-t7z 7z archive
|
||||
-m0=lzma lzma method
|
||||
|
@ -1,4 +0,0 @@
|
||||
import os
|
||||
|
||||
def sheets_dir():
|
||||
return os.path.split(__file__)
|
5
cheat/cheatsheets/alias
Normal file
5
cheat/cheatsheets/alias
Normal file
@ -0,0 +1,5 @@
|
||||
# Show a list of your current shell aliases
|
||||
alias
|
||||
|
||||
# Map `ll` to `ls -l` (Can be used per session or put inside a shell config file)
|
||||
alias ll='ls -l'
|
72
cheat/cheatsheets/ansi
Normal file
72
cheat/cheatsheets/ansi
Normal file
@ -0,0 +1,72 @@
|
||||
# Reset
|
||||
Color_Off='\e[0m' # Text Reset
|
||||
|
||||
# Regular Colors
|
||||
Black='\e[0;30m' # Black
|
||||
Red='\e[0;31m' # Red
|
||||
Green='\e[0;32m' # Green
|
||||
Yellow='\e[0;33m' # Yellow
|
||||
Blue='\e[0;34m' # Blue
|
||||
Purple='\e[0;35m' # Purple
|
||||
Cyan='\e[0;36m' # Cyan
|
||||
White='\e[0;37m' # White
|
||||
|
||||
# Bold
|
||||
BBlack='\e[1;30m' # Black
|
||||
BRed='\e[1;31m' # Red
|
||||
BGreen='\e[1;32m' # Green
|
||||
BYellow='\e[1;33m' # Yellow
|
||||
BBlue='\e[1;34m' # Blue
|
||||
BPurple='\e[1;35m' # Purple
|
||||
BCyan='\e[1;36m' # Cyan
|
||||
BWhite='\e[1;37m' # White
|
||||
|
||||
# Underline
|
||||
UBlack='\e[4;30m' # Black
|
||||
URed='\e[4;31m' # Red
|
||||
UGreen='\e[4;32m' # Green
|
||||
UYellow='\e[4;33m' # Yellow
|
||||
UBlue='\e[4;34m' # Blue
|
||||
UPurple='\e[4;35m' # Purple
|
||||
UCyan='\e[4;36m' # Cyan
|
||||
UWhite='\e[4;37m' # White
|
||||
|
||||
# Background
|
||||
On_Black='\e[40m' # Black
|
||||
On_Red='\e[41m' # Red
|
||||
On_Green='\e[42m' # Green
|
||||
On_Yellow='\e[43m' # Yellow
|
||||
On_Blue='\e[44m' # Blue
|
||||
On_Purple='\e[45m' # Purple
|
||||
On_Cyan='\e[46m' # Cyan
|
||||
On_White='\e[47m' # White
|
||||
|
||||
# High Intensity
|
||||
IBlack='\e[0;90m' # Black
|
||||
IRed='\e[0;91m' # Red
|
||||
IGreen='\e[0;92m' # Green
|
||||
IYellow='\e[0;93m' # Yellow
|
||||
IBlue='\e[0;94m' # Blue
|
||||
IPurple='\e[0;95m' # Purple
|
||||
ICyan='\e[0;96m' # Cyan
|
||||
IWhite='\e[0;97m' # White
|
||||
|
||||
# Bold High Intensity
|
||||
BIBlack='\e[1;90m' # Black
|
||||
BIRed='\e[1;91m' # Red
|
||||
BIGreen='\e[1;92m' # Green
|
||||
BIYellow='\e[1;93m' # Yellow
|
||||
BIBlue='\e[1;94m' # Blue
|
||||
BIPurple='\e[1;95m' # Purple
|
||||
BICyan='\e[1;96m' # Cyan
|
||||
BIWhite='\e[1;97m' # White
|
||||
|
||||
# High Intensity backgrounds
|
||||
On_IBlack='\e[0;100m' # Black
|
||||
On_IRed='\e[0;101m' # Red
|
||||
On_IGreen='\e[0;102m' # Green
|
||||
On_IYellow='\e[0;103m' # Yellow
|
||||
On_IBlue='\e[0;104m' # Blue
|
||||
On_IPurple='\e[0;105m' # Purple
|
||||
On_ICyan='\e[0;106m' # Cyan
|
||||
On_IWhite='\e[0;107m' # White
|
23
cheat/cheatsheets/apt
Normal file
23
cheat/cheatsheets/apt
Normal file
@ -0,0 +1,23 @@
|
||||
# To search a package:
|
||||
apt search package
|
||||
|
||||
# To show package informations:
|
||||
apt show package
|
||||
|
||||
# To fetch package list:
|
||||
apt update
|
||||
|
||||
# To download and install updates without installing new package:
|
||||
apt upgrade
|
||||
|
||||
# To download and install the updates AND install new necessary packages:
|
||||
apt dist-upgrade
|
||||
|
||||
# Full command:
|
||||
apt update && apt dist-upgrade
|
||||
|
||||
# To install a new package(s):
|
||||
apt install package(s)
|
||||
|
||||
# To uninstall package(s)
|
||||
apt remove package(s)
|
@ -23,3 +23,6 @@ apt-get -o Dir::Cache="/path/to/destination/dir/" -o Dir::Cache::archives="./" i
|
||||
|
||||
# Show apt-get installed packages.
|
||||
grep 'install ' /var/log/dpkg.log
|
||||
|
||||
# Silently keep old configuration during batch updates
|
||||
apt-get update -o DPkg::Options::='--force-confold' ...
|
||||
|
12
cheat/cheatsheets/aria2c
Normal file
12
cheat/cheatsheets/aria2c
Normal file
@ -0,0 +1,12 @@
|
||||
# Just download a file
|
||||
# The url can be a http(s), ftp, .torrent file or even a magnet link
|
||||
aria2c <url>
|
||||
|
||||
# To prevent downloading the .torrent file
|
||||
aria2c --follow-torrent=mem <url>
|
||||
|
||||
# Download 1 file at a time (-j)
|
||||
# continuing (-c) any partially downloaded ones
|
||||
# to the directory specified (-d)
|
||||
# reading urls from the file (-i)
|
||||
aria2c -j 1 -c -d ~/Downloads -i /path/to/file
|
@ -6,3 +6,6 @@ printf '1:2:3' | awk -F ":" '{print $1+$2+$3}'
|
||||
|
||||
# print a multiplication table
|
||||
seq 9 | sed 'H;g' | awk -v RS='' '{for(i=1;i<=NF;i++)printf("%dx%d=%d%s", i, NR, i*NR, i==NR?"\n":"\t")}'
|
||||
|
||||
# Specify output separator character
|
||||
printf '1 2 3' | awk 'BEGIN {OFS=":"}; {print $1,$2,$3}'
|
||||
|
@ -18,3 +18,10 @@ set -x
|
||||
|
||||
# Turn off debugging:
|
||||
set +x
|
||||
|
||||
# Retrieve N-th piped command exit status
|
||||
printf 'foo' | fgrep 'foo' | sed 's/foo/bar/'
|
||||
echo ${PIPESTATUS[0]} # replace 0 with N
|
||||
|
||||
# Lock file:
|
||||
( set -o noclobber; echo > my.lock ) || echo 'Failed to create lock file'
|
||||
|
11
cheat/cheatsheets/bzip2
Normal file
11
cheat/cheatsheets/bzip2
Normal file
@ -0,0 +1,11 @@
|
||||
# compress foo -> foo.bz2
|
||||
bzip2 -z foo
|
||||
|
||||
# decompress foo.bz2 -> foo
|
||||
bzip2 -d foo.bz2
|
||||
|
||||
# compress foo to stdout
|
||||
bzip2 -zc foo > foo.bz2
|
||||
|
||||
# decompress foo.bz2 to stdout
|
||||
bzip2 -dc foo.bz2
|
8
cheat/cheatsheets/cat
Normal file
8
cheat/cheatsheets/cat
Normal file
@ -0,0 +1,8 @@
|
||||
# Display the contents of a file
|
||||
cat /path/to/foo
|
||||
|
||||
# Display contents with line numbers
|
||||
cat -n /path/to/foo
|
||||
|
||||
# Display contents with line numbers (blank lines excluded)
|
||||
cat -b /path/to/foo
|
11
cheat/cheatsheets/cd
Normal file
11
cheat/cheatsheets/cd
Normal file
@ -0,0 +1,11 @@
|
||||
#Go to the given directory
|
||||
cd path/to/directory
|
||||
|
||||
#Go to home directory of current user
|
||||
cd
|
||||
|
||||
#Go up to the parent of the current directory
|
||||
cd ..
|
||||
|
||||
#Go to the previously chosen directory
|
||||
cd -
|
14
cheat/cheatsheets/cheat
Normal file
14
cheat/cheatsheets/cheat
Normal file
@ -0,0 +1,14 @@
|
||||
# To see example usage of a program:
|
||||
cheat <command>
|
||||
|
||||
# To edit a cheatsheet
|
||||
cheat -e <command>
|
||||
|
||||
# To list available cheatsheets
|
||||
cheat -l
|
||||
|
||||
# To search available cheatsheets
|
||||
cheat -s <command>
|
||||
|
||||
# To get the current `cheat' version
|
||||
cheat -v
|
@ -15,5 +15,5 @@ convert original-image.jpg -resize 100x converted-image.png
|
||||
for file in `ls original/image/path/`;
|
||||
do new_path=${file%.*};
|
||||
new_file=`basename $new_path`;
|
||||
convert $file -resize 150 conerted/image/path/$new_file.png;
|
||||
convert $file -resize 150 converted/image/path/$new_file.png;
|
||||
done
|
||||
|
11
cheat/cheatsheets/cp
Normal file
11
cheat/cheatsheets/cp
Normal file
@ -0,0 +1,11 @@
|
||||
# Create a copy of a file
|
||||
cp ~/Desktop/foo.txt ~/Downloads/foo.txt
|
||||
|
||||
# Create a copy of a directory
|
||||
cp -r ~/Desktop/cruise_pics/ ~/Pictures/
|
||||
|
||||
# Create a copy but ask to overwrite if the destination file already exists
|
||||
cp -i ~/Desktop/foo.txt ~/Documents/foo.txt
|
||||
|
||||
# Create a backup file with date
|
||||
cp foo.txt{,."$(date +%Y%m%d-%H%M%S)"}
|
132
cheat/cheatsheets/cpdf
Normal file
132
cheat/cheatsheets/cpdf
Normal file
@ -0,0 +1,132 @@
|
||||
# Read in.pdf, select pages 1, 2, 3 and 6, and write those pages to
|
||||
# out.pdf
|
||||
cpdf in.pdf 1-3,6 -o out.pdf
|
||||
|
||||
# Select the even pages (2, 4, 6...) from in.pdf and write those pages
|
||||
# to out.pdf
|
||||
cpdf in.pdf even -o out.pdf
|
||||
|
||||
# Using AND to perform several operations in order, here merging two
|
||||
# files together and adding a copyright stamp to every page.
|
||||
cpdf -merge in.pdf in2.pdf AND -add-text "Copyright 2014" -o out.pdf
|
||||
|
||||
# Read control.txt and use its contents as the command line arguments
|
||||
# for cpdf.
|
||||
cpdf -control control.txt
|
||||
|
||||
# Merge in.pdf and in2.pdf into one document, writing to out.pdf.
|
||||
cpdf -merge in.pdf in2.pdf -o out.pdf
|
||||
|
||||
# Split in.pdf into ten-page chunks, writing them to Chunk001.pdf,
|
||||
# Chunk002.pdf etc
|
||||
cpdf -split in.pdf -o Chunk%%%.pdf -chunk 10
|
||||
|
||||
# Split in.pdf on bookmark boundaries, writing each to a file whose
|
||||
# name is the bookmark label
|
||||
cpdf -split-bookmarks 0 in.pdf -o @N.pdf
|
||||
|
||||
# Scale both the dimensions and contents of in.pdf by a factor of two
|
||||
# in x and y directions.
|
||||
cpdf -scale-page "2 2" in.pdf -o out.pdf
|
||||
|
||||
# Scale the pages in in.pdf to fit the US Letter page size, writing to
|
||||
# out.pdf
|
||||
cpdf -scale-to-fit usletterportrait in.pdf -o out.pdf
|
||||
|
||||
# Shift the contents of the page by 26 pts in the x direction, and 18
|
||||
# millimetres in the y direction, writing to out.pdf
|
||||
cpdf -shift "26pt 18mm" in.pdf -o out.pdf
|
||||
|
||||
# Rotate the contents of the pages in in.pdf by ninety degrees and
|
||||
# write to out.pdf.
|
||||
cpdf -rotate-contents 90 in.pdf -o out.pdf
|
||||
|
||||
# Crop the pages in in.pdf to a 600 pts by 400 pts rectangle.
|
||||
cpdf -crop "0 0 600pt 400pt" in.pdf -o out.pdf
|
||||
|
||||
# Encrypt using 128bit PDF encryption using the owner password 'fred'
|
||||
# and the user password 'joe'
|
||||
cpdf -encrypt 128bit fred joe in.pdf -o out.pdf
|
||||
|
||||
# Decrypt using the owner password, writing to out.pdf.
|
||||
cpdf -decrypt in.pdf owner=fred -o out.pdf
|
||||
|
||||
# Compress the data streams in in.pdf, writing the result to out.pdf.
|
||||
cpdf -compress in.pdf -o out.pdf
|
||||
|
||||
# Decompress the data streams in in.pdf, writing to out.pdf.
|
||||
cpdf -decompress in.pdf -o out.pdf
|
||||
|
||||
# List the bookmarks in in.pdf. This would produce:
|
||||
cpdf -list-bookmarks in.pdf
|
||||
|
||||
# Outputs:
|
||||
|
||||
# Add bookmarks in the same form from a prepared file bookmarks.txt to
|
||||
# in.pdf, writing to out.pdf.
|
||||
cpdf -add-bookmarks bookmarks.txt in.pdf -o out.pdf
|
||||
|
||||
# Use the Split style to build a presentation from the PDF in.pdf,
|
||||
# each slide staying 10 seconds on screen unless manually advanced.
|
||||
# The first page, being a title does not move on automatically, and
|
||||
# has no transition effect.
|
||||
cpdf -presentation in.pdf 2-end -trans Split -duration 10 -o out.pdf
|
||||
|
||||
# Stamp the file watermark.pdf on to each page of in.pdf, writing the
|
||||
# result to out.pdf.
|
||||
cpdf -stamp-on watermark.pdf in.pdf -o out.pdf
|
||||
|
||||
# Add a page number and date to all the pages in in.pdf using the
|
||||
# Courier font, writing to out.pdf
|
||||
cpdf -topleft 10 -font Courier -add-text "Page %Page\nDate %d-%m-%Y" in.pdf -o out.pdf
|
||||
|
||||
# Two up impose the file in.pdf, writing to out.pdf
|
||||
cpdf -twoup-stack in.pdf -o out.pdf
|
||||
|
||||
# Add extra blank pages after pages one, three and four of a document.
|
||||
cpdf -pad-after 1,3,4 in.pdf -o out.pdf
|
||||
|
||||
# List the annotations in a file in.pdf to standard output.
|
||||
cpdf -list-annotations in.pdf
|
||||
|
||||
# Might Produce:
|
||||
|
||||
# -- # Annotation text content 1 # -- # -- # Annotation text content 2
|
||||
# --
|
||||
|
||||
# Copy the annotations from from.pdf to in.pdf, writing to out.pdf.
|
||||
cpdf -copy-annotations from.pdf in.pdf -o out.pdf
|
||||
|
||||
# Set the document title of in.pdf. writing to out.pdf.
|
||||
cpdf -set-title "The New Title" in.pdf -o out.pdf
|
||||
|
||||
# Set the document in.pdf to open with the Acrobat Viewer's toolbar
|
||||
# hidden, writing to out.pdf.
|
||||
cpdf -hide-toolbar true in.pdf -o out.pdf
|
||||
|
||||
# Set the metadata in a PDF in.pdf to the contents of the file
|
||||
# metadata.xml, and write the output to out.pdf.
|
||||
cpdf -set-metadata metadata.xml in.pdf -o out.pdf
|
||||
|
||||
# Set the document in.pdf to open in Acrobat Viewer showing two
|
||||
# columns of pages, starting on the right, putting the result in
|
||||
# out.pdf.
|
||||
cpdf -set-page-layout TwoColumnRight in.pdf -o out.pdf
|
||||
|
||||
# Set the document in.pdf to open in Acrobat Viewer in full screen
|
||||
# mode, putting the result in out.pdf.
|
||||
cpdf -set-page-mode FullScreen in.pdf -o out.pdf
|
||||
|
||||
# Attach the file sheet.xls to in.pdf, writing to out.pdf.
|
||||
cpdf -attach-file sheet.xls in.pdf -o out.pdf
|
||||
|
||||
# Remove any attachments from in.pdf, writing to out.pdf.
|
||||
cpdf -remove-files in.pdf -o out.pdf
|
||||
|
||||
# Blacken all the text in in.pdf, writing to out.pdf.
|
||||
cpdf -blacktext in.pdf -o out.pdf
|
||||
|
||||
# Make sure all lines in in.pdf are at least 2 pts wide, writing to
|
||||
# out.pdf.
|
||||
cpdf -thinlines 2pt in.pdf -o out.pdf
|
||||
|
@ -14,7 +14,9 @@ SHELL=/bin/bash
|
||||
# example entries
|
||||
# every 15 min
|
||||
*/15 * * * * /home/user/command.sh
|
||||
|
||||
# every midnight
|
||||
0 * * * * /home/user/command.sh
|
||||
0 0 * * * /home/user/command.sh
|
||||
|
||||
# every Saturday at 8:05 AM
|
||||
5 8 * * 6 /home/user/command.sh
|
||||
|
8
cheat/cheatsheets/cryptsetup
Normal file
8
cheat/cheatsheets/cryptsetup
Normal file
@ -0,0 +1,8 @@
|
||||
# open encrypted partition /dev/sdb1 (reachable at /dev/mapper/backup)
|
||||
cryptsetup open --type luks /dev/sdb1 backup
|
||||
|
||||
# open encrypted partition /dev/sdb1 using a keyfile (reachable at /dev/mapper/hdd)
|
||||
cryptsetup open --type luks --key-file hdd.key /dev/sdb1 hdd
|
||||
|
||||
# close luks container at /dev/mapper/hdd
|
||||
cryptsetup close hdd
|
22
cheat/cheatsheets/cups
Normal file
22
cheat/cheatsheets/cups
Normal file
@ -0,0 +1,22 @@
|
||||
# Manage printers through CUPS:
|
||||
http://localhost:631 (in web browser)
|
||||
|
||||
# Print file from command line
|
||||
lp myfile.txt
|
||||
|
||||
# Display print queue
|
||||
lpq
|
||||
|
||||
# Remove print job from queue
|
||||
lprm 545
|
||||
or
|
||||
lprm -
|
||||
|
||||
# Print log location
|
||||
/var/log/cups
|
||||
|
||||
# Reject new jobs
|
||||
cupsreject printername
|
||||
|
||||
# Accept new jobs
|
||||
cupsaccept printername
|
@ -29,7 +29,13 @@ curl -C - -o partial_file.zip http://example.com/file.zip
|
||||
curl -I http://example.com
|
||||
|
||||
# Fetch your external IP and network info as JSON
|
||||
curl http://ifconfig.me/all/json
|
||||
curl http://ifconfig.me/all.json
|
||||
|
||||
# Limit the rate of a download
|
||||
curl --limit-rate 1000B -O http://path.to.the/file
|
||||
|
||||
# Get your global IP
|
||||
curl httpbin.org/ip
|
||||
|
||||
# Get only the HTTP status code
|
||||
curl -o /dev/null -w '%{http_code}\n' -s -I URL
|
||||
|
@ -1,5 +1,8 @@
|
||||
# Print date in format suitable for affixing to file names
|
||||
date +"%Y%m%d_%H%M%S"
|
||||
|
||||
# Convert Unix timestamp to Date
|
||||
# Convert Unix timestamp to Date(Linux)
|
||||
date -d @1440359821
|
||||
|
||||
# Convert Unix timestamp to Date(Mac)
|
||||
date -r 1440359821
|
||||
|
@ -1,7 +1,7 @@
|
||||
# Read from {/dev/urandom} 2*512 Bytes and put it into {/tmp/test.txt}
|
||||
# Note: At the first iteration, we read 512 Bytes.
|
||||
# Note: At the second iteration, we read 512 Bytes.
|
||||
dd if=/dev/urandom of=/tmp/test.txt count=512 bs=2
|
||||
dd if=/dev/urandom of=/tmp/test.txt count=2 bs=512
|
||||
|
||||
# Watch the progress of 'dd'
|
||||
dd if=/dev/zero of=/dev/null bs=4KB &; export dd_pid=`pgrep '^dd'`; while [[ -d /proc/$dd_pid ]]; do kill -USR1 $dd_pid && sleep 1 && clear; done
|
||||
@ -12,6 +12,11 @@ dd if=/dev/zero of=/dev/null bs=4KB &; export dd_pid=`pgrep '^dd'`; while [[ -d
|
||||
# Watch the progress of 'dd' with `pv` and `zenity` (apt-get install pv zenity)
|
||||
(pv -n /dev/zero | dd of=/dev/null bs=128M conv=notrunc,noerror) 2>&1 | zenity --title 'Running dd command (cloning), please wait...' --progress
|
||||
|
||||
# Watch the progress of 'dd' with the built-in `progress` functionality (introduced in coreutils v8.24)
|
||||
dd if=/dev/zero of=/dev/null bs=128M status=progress
|
||||
|
||||
# DD with "graphical" return
|
||||
dcfldd if=/dev/zero of=/dev/null bs=500K
|
||||
|
||||
# This will output the sound from your microphone port to the ssh target computer's speaker port. The sound quality is very bad, so you will hear a lot of hissing.
|
||||
dd if=/dev/dsp | ssh -c arcfour -C username@host dd of=/dev/dsp
|
||||
|
7
cheat/cheatsheets/deb
Normal file
7
cheat/cheatsheets/deb
Normal file
@ -0,0 +1,7 @@
|
||||
# Extract contents of a .deb file
|
||||
$ ar vx foo.deb # -> data.tar.gz
|
||||
$ tar xf data.tar.gz
|
||||
|
||||
# Install .deb file to a debian like system, e.g. ubuntu
|
||||
$ sudo dpkg -i foo.deb
|
||||
$ sudo apt-get install -f
|
@ -21,3 +21,6 @@ diff -s version1 version2
|
||||
|
||||
# To diff the output of two commands or scripts:
|
||||
diff <(command1) <(command2)
|
||||
|
||||
# Generate a patch file from two files
|
||||
diff -Naur version1 version2 > version.patch
|
||||
|
@ -19,6 +19,9 @@ docker inspect --format {{.State.Pid}} <container_name_or_ID>
|
||||
# http://nathanleclaire.com/blog/2014/07/12/10-docker-tips-and-tricks-that-will-make-you-sing-a-whale-song-of-joy/
|
||||
docker inspect --format='{{json .Volumes}}' <container_id> | python -mjson.tool
|
||||
|
||||
# Copy files/folders between a container and your host
|
||||
docker cp foo.txt mycontainer:/foo.txt
|
||||
|
||||
# list currently running containers
|
||||
docker ps
|
||||
|
||||
|
@ -1,21 +1,28 @@
|
||||
# Running emacs
|
||||
|
||||
GUI mode $ emacs
|
||||
Terminal mode $ emacs -nw
|
||||
|
||||
# Basic usage
|
||||
|
||||
Indent Select text then press TAB
|
||||
Cut CTRL-w
|
||||
Copy ALT-w
|
||||
Paste CTRL-y
|
||||
Paste ("yank") CTRL-y
|
||||
Begin selection CTRL-SPACE
|
||||
Search/Find CTRL-s
|
||||
Replace ALT-% (ALT-SHIFT-5)
|
||||
Save CTRL-x CTRL-s
|
||||
Save as CTRL-x CTRL-w
|
||||
Load/Open CTRL-x CTRL-f
|
||||
Undo CTRL-x u
|
||||
Highlight all text CTRL-x h
|
||||
Directory listing CTRL-x d
|
||||
Cancel a command ESC ESC ESC
|
||||
Cancel a command CTRL-g
|
||||
Font size bigger CTRL-x CTRL-+
|
||||
Font size smaller CTRL-x CTRL--
|
||||
|
||||
# Buffers
|
||||
# Buffers
|
||||
|
||||
Split screen vertically CTRL-x 2
|
||||
Split screen vertically with 5 row height CTRL-u 5 CTRL-x 2
|
||||
@ -23,11 +30,21 @@
|
||||
Split screen horizontally with 24 column width CTRL-u 24 CTRL-x 3
|
||||
Revert to single screen CTRL-x 1
|
||||
Hide the current screen CTRL-x 0
|
||||
Kill the current screen CTRL-x k
|
||||
Move to the next buffer CTRL-x O
|
||||
Move to the next screen CTRL-x o
|
||||
Kill the current buffer CTRL-x k
|
||||
Select a buffer CTRL-x b
|
||||
Run command in the scratch buffer CTRL-x CTRL-e
|
||||
|
||||
# Navigation ( backward / forward )
|
||||
|
||||
Character-wise CTRL-b , CTRL-f
|
||||
Word-wise ALT-b , ALT-f
|
||||
Line-wise CTRL-p , CTRL-n
|
||||
Sentence-wise ALT-a , ALT-e
|
||||
Paragraph-wise ALT-{ , ALT-}
|
||||
Function-wise CTRL-ALT-a , CTRL-ALT-e
|
||||
Line beginning / end CTRL-a , CTRL-e
|
||||
|
||||
# Other stuff
|
||||
|
||||
Open a shell ALT-x eshell
|
||||
@ -39,32 +56,9 @@
|
||||
Compile some code ALT-x compile
|
||||
List packages ALT-x package-list-packages
|
||||
|
||||
# Sudoing within eshell
|
||||
|
||||
By default when using the sudo command within eshell you'll just
|
||||
get "permission denied" messages. To overcome that type:
|
||||
|
||||
alias sudo '*sudo $*'
|
||||
|
||||
# Line numbers
|
||||
|
||||
To add line numbers and enable moving to a line with CTRL-l:
|
||||
|
||||
(global-set-key "\C-l" 'goto-line)
|
||||
(add-hook 'find-file-hook (lambda () (linum-mode 1)))
|
||||
|
||||
# Org-mode
|
||||
|
||||
To begin org-mode ALT-x org-mode
|
||||
Table column separator Vertical/pipe character
|
||||
Reorganize table TAB
|
||||
Section heading *
|
||||
Open/collapse section TAB
|
||||
Open/collapse All CTRL-TAB
|
||||
Export in other file formats (eg HTML,PDF) CTRL-c CTRL-e
|
||||
|
||||
To make org-mode automatically wrap lines:
|
||||
|
||||
(add-hook 'org-mode-hook
|
||||
'(lambda ()
|
||||
(visual-line-mode 1)))
|
||||
|
5
cheat/cheatsheets/export
Normal file
5
cheat/cheatsheets/export
Normal file
@ -0,0 +1,5 @@
|
||||
# Calling export with no arguments will show current shell attributes
|
||||
export
|
||||
|
||||
# Create new environment variable
|
||||
export VARNAME="value"
|
@ -2,7 +2,17 @@
|
||||
ffmpeg -i path/to/file.ext
|
||||
|
||||
# Convert all m4a files to mp3
|
||||
for f in *.m4a; do ffmpeg -i "$f" -acodec libmp3lame -ab 320k "${f%.m4a}.mp3"; done
|
||||
for f in *.m4a; do ffmpeg -i "$f" -acodec libmp3lame -vn -b:a 320k "${f%.m4a}.mp3"; done
|
||||
|
||||
# Convert video from .foo to .bar
|
||||
# -g : GOP, for searchability
|
||||
ffmpeg -i input.foo -vcodec bar -acodec baz -b:v 21000k -b:a 320k -g 150 -threads 4 output.bar
|
||||
|
||||
# Convert image sequence to video
|
||||
ffmpeg -r 18 -pattern_type glob -i '*.png' -b:v 21000k -s hd1080 -vcodec vp9 -an -pix_fmt yuv420p -deinterlace output.ext
|
||||
|
||||
# Combine video and audio into one file
|
||||
ffmpeg -i video.ext -i audio.ext -c:v copy -c:a copy output.ext
|
||||
|
||||
# Listen to 10 seconds of audio from a video file
|
||||
#
|
||||
@ -10,3 +20,4 @@ for f in *.m4a; do ffmpeg -i "$f" -acodec libmp3lame -ab 320k "${f%.m4a}.mp3"; d
|
||||
# -t : seconds to cut
|
||||
# -autoexit : closes ffplay as soon as the audio finishes
|
||||
ffmpeg -ss 00:34:24.85 -t 10 -i path/to/file.mp4 -f mp3 pipe:play | ffplay -i pipe:play -autoexit
|
||||
|
||||
|
@ -19,11 +19,11 @@ find ./path/ -name '*.txt' -exec rm '{}' \;
|
||||
# To find files with extension '.txt' and look for a string into them:
|
||||
find ./path/ -name '*.txt' | xargs grep 'string'
|
||||
|
||||
# To find files with size bigger than 5 Mb and sort them by size:
|
||||
# To find files with size bigger than 5 Mebibyte and sort them by size:
|
||||
find . -size +5M -type f -print0 | xargs -0 ls -Ssh | sort -z
|
||||
|
||||
# To find files bigger thank 2 MB and list them:
|
||||
find . -type f -size +20000k -exec ls -lh {} \; | awk '{ print $9 ": " $5 }'
|
||||
# To find files bigger than 2 Megabyte and list them:
|
||||
find . -type f -size +200000000c -exec ls -lh {} \; | awk '{ print $9 ": " $5 }'
|
||||
|
||||
# To find files modified more than 7 days ago and list file information
|
||||
find . -type f -mtime +7d -ls
|
||||
@ -40,5 +40,8 @@ find . -maxdepth 2 -name build -type d
|
||||
# To search all files who are not in .git directory
|
||||
find . ! -iwholename '*.git*' -type f
|
||||
|
||||
# Find all files that have the same node (hard link) as MY_FILE_HERE
|
||||
# To find all files that have the same node (hard link) as MY_FILE_HERE
|
||||
find . -type f -samefile MY_FILE_HERE 2>/dev/null
|
||||
|
||||
# To find all files in the current directory and modify their permissions
|
||||
find . -type f -exec chmod 644 {} \;
|
||||
|
35
cheat/cheatsheets/for
Normal file
35
cheat/cheatsheets/for
Normal file
@ -0,0 +1,35 @@
|
||||
# basic loop
|
||||
for i in 1 2 3 4 5 6 7 8 9 10
|
||||
do
|
||||
echo $i
|
||||
done
|
||||
|
||||
# loop ls command results
|
||||
for var in `ls -alF`
|
||||
do
|
||||
echo $var
|
||||
done
|
||||
|
||||
# loop over all the JPG files in the current directory
|
||||
for jpg_file in *.jpg
|
||||
do
|
||||
echo $jpg_file
|
||||
done
|
||||
|
||||
# loop specified number of times
|
||||
for i in `seq 1 10`
|
||||
do
|
||||
echo $i
|
||||
done
|
||||
|
||||
# loop specified number of times: the C/C++ style
|
||||
for ((i=1;i<=10;++i))
|
||||
do
|
||||
echo $i
|
||||
done
|
||||
|
||||
# loop specified number of times: the brace expansion
|
||||
for i in {1..10}
|
||||
do
|
||||
echo $i
|
||||
done
|
@ -11,6 +11,24 @@ git config --global color.ui true
|
||||
# To stage all changes for commit:
|
||||
git add --all
|
||||
|
||||
# To stash changes locally, this will keep the changes in a separate changelist
|
||||
# called stash and the working directory is cleaned. You can apply changes
|
||||
# from the stash anytime
|
||||
git stash
|
||||
|
||||
# To stash changes with a message
|
||||
git stash save "message"
|
||||
|
||||
# To list all the stashed changes
|
||||
git stash list
|
||||
|
||||
# To apply the most recent change and remove the stash from the stash list
|
||||
git stash pop
|
||||
|
||||
# To apply any stash from the list of stashes. This does not remove the stash
|
||||
# from the stash list
|
||||
git stash apply stash@{6}
|
||||
|
||||
# To commit staged changes
|
||||
git commit -m "Your commit message"
|
||||
|
||||
@ -104,3 +122,30 @@ git clone --depth 1 <remote-url>
|
||||
|
||||
# To unshallow a clone
|
||||
git pull --unshallow
|
||||
|
||||
# Create a bare branch (one that has no commits on it)
|
||||
git checkout --orphan branch_name
|
||||
|
||||
# Checkout a new branch from a different starting point
|
||||
git checkout -b master upstream/master
|
||||
|
||||
# Remove all stale branches (ones that have been deleted on remote)
|
||||
# So if you have a lot of useless branches, delete them on Github and then run this
|
||||
git remote prune origin
|
||||
|
||||
# The following can be used to prune all remotes at once
|
||||
git remote prune $(git remote | tr '\n' ' ')
|
||||
|
||||
# Revisions can also be identified with :/text
|
||||
# So, this will show the first commit that has "cool" in their message body
|
||||
git show :/cool
|
||||
|
||||
# Undo parts of last commit in a specific file
|
||||
git checkout -p HEAD^ -- /path/to/file
|
||||
|
||||
# Revert a commit and keep the history of the reverted change as a separate revert commit
|
||||
git revert <commit SHA>
|
||||
|
||||
# Pich a commit from a branch to current branch. This is different than merge as
|
||||
# this just applies a single commit from a branch to current branch
|
||||
git cherry-pick <commit SHA1>
|
||||
|
12
cheat/cheatsheets/gyb
Normal file
12
cheat/cheatsheets/gyb
Normal file
@ -0,0 +1,12 @@
|
||||
# To estimate the number and the size of all mails on youremail@gmail.com
|
||||
gyb --email youremail@gmail.com --action estimate
|
||||
|
||||
# To backup from youremail@gmail.com to your local-folder
|
||||
gyb --email youremail@gmail.com --action backup --local-folder "~/MyLocalFolder/"
|
||||
|
||||
# To backup from youremail@gmail.com only important or starred emails to the
|
||||
# default local folder GYB-GMail-Backup-youremail@gmail.com
|
||||
gyb --email youremail@gmail.com --search "is:important OR is:starred"
|
||||
|
||||
# To restore from your local-folder to youremail@gmail.com
|
||||
gyb --email youremail@gmail.com --action restore --local-folder "~/MyLocalFolder/"
|
32
cheat/cheatsheets/hardware-info
Normal file
32
cheat/cheatsheets/hardware-info
Normal file
@ -0,0 +1,32 @@
|
||||
# Display all hardware details
|
||||
sudo lshw
|
||||
|
||||
# List currently loaded kernel modules
|
||||
lsmod
|
||||
|
||||
# List all modules available to the system
|
||||
find /lib/modules/$(uname -r) -type f -iname "*.ko"
|
||||
|
||||
# Load a module into kernel
|
||||
modprobe modulename
|
||||
|
||||
# Remove a module from kernel
|
||||
modprobe -r modulename
|
||||
|
||||
# List devices connected via pci bus
|
||||
lspci
|
||||
|
||||
# Debug output for pci devices (hex)
|
||||
lspci -vvxxx
|
||||
|
||||
# Display cpu hardware stats
|
||||
cat /proc/cpuinfo
|
||||
|
||||
# Display memory hardware stats
|
||||
cat /proc/meminfo
|
||||
|
||||
# Output the kernel ring buffer
|
||||
dmesg
|
||||
|
||||
# Ouput kernel messages
|
||||
dmesg --kernel
|
20
cheat/cheatsheets/hg
Normal file
20
cheat/cheatsheets/hg
Normal file
@ -0,0 +1,20 @@
|
||||
# Clone a directory
|
||||
hg clone
|
||||
|
||||
# Add files to hg tracker
|
||||
hg add filename
|
||||
|
||||
# Add all files in a folder to hg tracker
|
||||
hg add folder/
|
||||
|
||||
# Create a commit with all tracked changes and a message
|
||||
hg commit -m "message"
|
||||
|
||||
# Push commits to source repository
|
||||
hg push
|
||||
|
||||
# Pull changes from source repository
|
||||
hg pull
|
||||
|
||||
# Rebase local commits to disambiguate with remote repository
|
||||
hg pull --rebase
|
195
cheat/cheatsheets/http
Normal file
195
cheat/cheatsheets/http
Normal file
@ -0,0 +1,195 @@
|
||||
# Custom HTTP method HTTP headers and JSON data:
|
||||
http PUT example.org X-API-Token:123 name=John
|
||||
|
||||
# Submitting forms:
|
||||
http -f POST example.org hello=World
|
||||
|
||||
# See the request that is being sent using one of the output options:
|
||||
http -v example.org
|
||||
|
||||
# Use Github API to post a comment on an issue with authentication:
|
||||
http -a USERNAME POST https://api.github.com/repos/jkbrzt/httpie/issues/83/comments body='HTTPie is awesome!'
|
||||
|
||||
# Upload a file using redirected input:
|
||||
http example.org < file.json
|
||||
|
||||
# Download a file and save it via redirected output:
|
||||
http example.org/file > file
|
||||
|
||||
# Download a file wget style:
|
||||
http --download example.org/file
|
||||
|
||||
# Use named sessions_ to make certain aspects or the communication
|
||||
# persistent between requests to the same host:
|
||||
# http --session=logged-in -a username:password httpbin.org/get API-Key:123
|
||||
http --session=logged-in httpbin.org/headers
|
||||
|
||||
# Set a custom Host header to work around missing DNS records:
|
||||
http localhost:8000 Host:example.com
|
||||
|
||||
# Simple JSON example:
|
||||
http PUT example.org name=John email=john@example.org
|
||||
|
||||
# Non-string fields use the := separator, which allows you to embed raw
|
||||
# JSON into the resulting object. Text and raw JSON files can also be
|
||||
# embedded into fields using =@ and :=@:
|
||||
http PUT api.example.com/person/1 name=John age:=29 married:=false hobbies:='["http", "pies"]' description=@about-john.txt bookmarks:=@bookmarks.json
|
||||
|
||||
# Send JSON data stored in a file:
|
||||
http POST api.example.com/person/1 < person.json
|
||||
|
||||
# Regular Forms
|
||||
http --form POST api.example.org/person/1 name='John Smith' email=john@example.org cv=@~/Documents/cv.txt
|
||||
|
||||
# File Upload Forms
|
||||
# If one or more file fields is present, the serialization and content
|
||||
# type is multipart/form-data:
|
||||
http -f POST example.com/jobs name='John Smith' cv@~/Documents/cv.pdf
|
||||
|
||||
# To set custom headers you can use the Header:Value notation:
|
||||
http example.org User-Agent:Bacon/1.0 'Cookie:valued-visitor=yes;foo=bar' X-Foo:Bar Referer:http://httpie.org/
|
||||
|
||||
# Basic auth:
|
||||
http -a username:password example.org
|
||||
|
||||
# Digest auth:
|
||||
http --auth-type=digest -a username:password example.org
|
||||
|
||||
# With password prompt:
|
||||
http -a username example.org
|
||||
|
||||
# Authorization information from your ~/.netrc file is honored as well:
|
||||
cat ~/.netrc
|
||||
machine httpbin.org
|
||||
login httpie
|
||||
# password test
|
||||
http httpbin.org/basic-auth/httpie/test
|
||||
|
||||
# You can specify proxies to be used through the --proxy argument for each
|
||||
# protocol (which is included in the value in case of redirects across
|
||||
# protocols):
|
||||
http --proxy=http:http://10.10.1.10:3128 --proxy=https:https://10.10.1.10:1080 example.org
|
||||
|
||||
# With Basic authentication:
|
||||
http --proxy=http:http://user:pass@10.10.1.10:3128 example.org
|
||||
|
||||
# To skip the HOST'S SSL CERTIFICATE VERIFICATION, you can pass
|
||||
# --verify=no (default is yes):
|
||||
http --verify=no https://example.org
|
||||
|
||||
# You can also use --verify=<CA_BUNDLE_PATH> to set a CUSTOM CA BUNDLE path:
|
||||
http --verify=/ssl/custom_ca_bundle https://example.org
|
||||
|
||||
# To use a CLIENT SIDE CERTIFICATE for the SSL communication, you can pass
|
||||
# the path of the cert file with --cert:
|
||||
http --cert=client.pem https://example.org
|
||||
|
||||
# If the PRIVATE KEY is not contained in the cert file you may pass the
|
||||
# path of the key file with --cert-key:
|
||||
http --cert=client.crt --cert-key=client.key https://example.org
|
||||
|
||||
# You can control what should be printed via several options:
|
||||
# --headers, -h Only the response headers are printed.
|
||||
# --body, -b Only the response body is printed.
|
||||
# --verbose, -v Print the whole HTTP exchange (request and response).
|
||||
# --print, -p Selects parts of the HTTP exchange.
|
||||
http --verbose PUT httpbin.org/put hello=world
|
||||
|
||||
# Print request and response headers:
|
||||
# Character Stands for
|
||||
# ----------- -------------------
|
||||
# H Request headers.
|
||||
# B Request body.
|
||||
# h Response headers.
|
||||
# b Response body.
|
||||
http --print=Hh PUT httpbin.org/put hello=world
|
||||
|
||||
# Let's say that there is an API that returns the whole resource when it
|
||||
# is updated, but you are only interested in the response headers to see
|
||||
# the status code after an update:
|
||||
http --headers PATCH example.org/Really-Huge-Resource name='New Name'
|
||||
|
||||
# Redirect from a file:
|
||||
http PUT example.com/person/1 X-API-Token:123 < person.json
|
||||
|
||||
# Or the output of another program:
|
||||
grep '401 Unauthorized' /var/log/httpd/error_log | http POST example.org/intruders
|
||||
|
||||
# You can use echo for simple data:
|
||||
echo '{"name": "John"}' | http PATCH example.com/person/1 X-API-Token:123
|
||||
|
||||
# You can even pipe web services together using HTTPie:
|
||||
http GET https://api.github.com/repos/jkbrzt/httpie | http POST httpbin.org/post
|
||||
|
||||
# You can use cat to enter multiline data on the terminal:
|
||||
cat | http POST example.com
|
||||
<paste>
|
||||
# ^D
|
||||
cat | http POST example.com/todos Content-Type:text/plain
|
||||
- buy milk
|
||||
- call parents
|
||||
^D
|
||||
|
||||
# On OS X, you can send the contents of the clipboard with pbpaste:
|
||||
pbpaste | http PUT example.com
|
||||
|
||||
# Passing data through stdin cannot be combined with data fields specified
|
||||
# on the command line:
|
||||
echo 'data' | http POST example.org more=data # This is invalid
|
||||
|
||||
|
||||
# AN ALTERNATIVE TO REDIRECTED stdin is specifying a filename (as
|
||||
# @/path/to/file) whose content is used as if it came from stdin.
|
||||
|
||||
# It has the advantage that THE Content-Type HEADER IS AUTOMATICALLY SET
|
||||
# to the appropriate value based on the filename extension. For example,
|
||||
# the following request sends the verbatim contents of that XML file with
|
||||
# Content-Type: application/xml:
|
||||
http PUT httpbin.org/put @/data/file.xml
|
||||
|
||||
# Download a file:
|
||||
http example.org/Movie.mov > Movie.mov
|
||||
|
||||
# Download an image of Octocat, resize it using ImageMagick, upload it
|
||||
# elsewhere:
|
||||
http octodex.github.com/images/original.jpg | convert - -resize 25% - | http example.org/Octocats
|
||||
|
||||
# Force colorizing and formatting, and show both the request and the
|
||||
# response in less pager:
|
||||
http --pretty=all --verbose example.org | less -R
|
||||
|
||||
# When enabled using the --download, -d flag, response headers are printed
|
||||
# to the terminal (stderr), and a progress bar is shown while the response
|
||||
# body is being saved to a file.
|
||||
http --download https://github.com/jkbrzt/httpie/tarball/master
|
||||
|
||||
# You can also redirect the response body to another program while the
|
||||
# response headers and progress are still shown in the terminal:
|
||||
http -d https://github.com/jkbrzt/httpie/tarball/master | tar zxf -
|
||||
|
||||
# If --output, -o is specified, you can resume a partial download using
|
||||
# the --continue, -c option. This only works with servers that support
|
||||
# Range requests and 206 Partial Content responses. If the server doesn't
|
||||
# support that, the whole file will simply be downloaded:
|
||||
http -dco file.zip example.org/file
|
||||
|
||||
# Prettified streamed response:
|
||||
http --stream -f -a YOUR-TWITTER-NAME https://stream.twitter.com/1/statuses/filter.json track='Justin Bieber'
|
||||
|
||||
# Send each new tweet (JSON object) mentioning "Apple" to another
|
||||
# server as soon as it arrives from the Twitter streaming API:
|
||||
http --stream -f -a YOUR-TWITTER-NAME https://stream.twitter.com/1/statuses/filter.json track=Apple | while read tweet; do echo "$tweet" | http POST example.org/tweets ; done
|
||||
|
||||
# Create a new session named user1 for example.org:
|
||||
http --session=user1 -a user1:password example.org X-Foo:Bar
|
||||
|
||||
# Now you can refer to the session by its name, and the previously used
|
||||
# authorization and HTTP headers will automatically be set:
|
||||
http --session=user1 example.org
|
||||
|
||||
# To create or reuse a different session, simple specify a different name:
|
||||
http --session=user2 -a user2:password example.org X-Bar:Foo
|
||||
|
||||
# Instead of a name, you can also directly specify a path to a session
|
||||
# file. This allows for sessions to be re-used across multiple hosts:
|
||||
http --session=/tmp/session.json example.orghttp --session=/tmp/session.json admin.example.orghttp --session=~/.httpie/sessions/another.example.org/test.json example.orghttp --session-read-only=/tmp/session.json example.org
|
3
cheat/cheatsheets/iconv
Normal file
3
cheat/cheatsheets/iconv
Normal file
@ -0,0 +1,3 @@
|
||||
# To convert file (iconv.src) from iso-8859-1 to utf-8 and save to
|
||||
# /tmp/iconv.out
|
||||
iconv -f iso-8859-1 -t utf-8 iconv.src -o /tmp/iconv.out
|
@ -16,11 +16,18 @@
|
||||
# To switch between channel windows
|
||||
ALT+<number>, eg. ALT+1, ALT+2
|
||||
|
||||
# To list the nicknames within a channel
|
||||
# To list the nicknames within the active channel
|
||||
/names
|
||||
|
||||
# To change the topic
|
||||
# To change the channel topic
|
||||
/topic <description>
|
||||
|
||||
# To quit irssi
|
||||
# To limit channel background noise (joins, parts, quits, etc.)
|
||||
/ignore #foo,#bar JOINS PARTS QUITS NICKS # Quieten only channels `#foo`, `#bar`
|
||||
/ignore * JOINS PARTS QUITS NICKS # Quieten all channels
|
||||
|
||||
# To save the current Irssi session config into the configuration file
|
||||
/save
|
||||
|
||||
# To quit Irssi
|
||||
/exit
|
||||
|
5
cheat/cheatsheets/kill
Normal file
5
cheat/cheatsheets/kill
Normal file
@ -0,0 +1,5 @@
|
||||
# Kill a process gracefully
|
||||
kill -15 <process id>
|
||||
|
||||
# Kill a process forcefully
|
||||
kill -9 <process id>
|
@ -1,2 +1,9 @@
|
||||
# To disable the terminal refresh when exiting
|
||||
less -X
|
||||
|
||||
# To save the contents to a file
|
||||
# Method 1 - Only works when the input is a pipe
|
||||
s <filename>
|
||||
|
||||
# Method 2 - This should work whether input is a pipe or an ordinary file.
|
||||
Type g or < (g or less-than) | $ (pipe then dollar) then cat > <filename> and Enter.
|
||||
|
23
cheat/cheatsheets/lib
Normal file
23
cheat/cheatsheets/lib
Normal file
@ -0,0 +1,23 @@
|
||||
# Display available libraries
|
||||
ldconfig -p
|
||||
|
||||
# Update library resources
|
||||
ldconfig
|
||||
|
||||
# Display libraries and file location
|
||||
ldd
|
||||
|
||||
# Libraries available to apps in real-time
|
||||
"Dynamic Libraries" (.so.)
|
||||
|
||||
# Libraries only available to apps when installed (imported)
|
||||
"Static Libraries" (.a.)
|
||||
|
||||
# Standard (usual) library file location
|
||||
/lib
|
||||
|
||||
# Sofware-accessible source for library info
|
||||
/etc/ld.so.cache # (binary)
|
||||
|
||||
# Human-readable source for library info
|
||||
/etc/ld.so.conf # (points to /etc/ld.so.conf.d)
|
@ -9,3 +9,9 @@ ls -lh
|
||||
|
||||
# Display files, sorted by size
|
||||
ls -S
|
||||
|
||||
# Display directories only
|
||||
ls -d */
|
||||
|
||||
# Display directories only, include hidden
|
||||
ls -d .*/ */
|
||||
|
21
cheat/cheatsheets/lsblk
Normal file
21
cheat/cheatsheets/lsblk
Normal file
@ -0,0 +1,21 @@
|
||||
# Show all available block devices along with their partitioning schemes
|
||||
lsblk
|
||||
|
||||
# To show SCSI devices:
|
||||
lsblk --scsi
|
||||
|
||||
# To show a specific device
|
||||
lsblk /dev/sda
|
||||
|
||||
# To verify TRIM support:
|
||||
# Check the values of DISC-GRAN (discard granularity) and DISC-MAX (discard max bytes) columns.
|
||||
# Non-zero values indicate TRIM support
|
||||
lsblk --discard
|
||||
|
||||
# To featch info about filesystems:
|
||||
lsblk --fs
|
||||
|
||||
# For JSON, LIST or TREE output formats use the following flags:
|
||||
lsblk --json
|
||||
lsblk --list
|
||||
lsblk --tree # default view
|
@ -4,20 +4,34 @@ sudo lsof -i4
|
||||
# List all IPv6 network files
|
||||
sudo lsof -i6
|
||||
|
||||
# To find listening ports:
|
||||
# List all open sockets
|
||||
lsof -i
|
||||
|
||||
# List all listening ports
|
||||
lsof -Pnl +M -i4
|
||||
|
||||
# To find which program is using the port 80:
|
||||
# Find which program is using the port 80
|
||||
lsof -i TCP:80
|
||||
|
||||
# List all connections to a specific host
|
||||
lsof -i@192.168.1.5
|
||||
|
||||
# List all processes accessing a particular file/directory
|
||||
lsof </path/to/file>
|
||||
|
||||
# List all files open for a particular user
|
||||
lsof -u <username>
|
||||
|
||||
# List all files/network connections a given process is using
|
||||
# List all files/network connections a command is using
|
||||
lsof -c <command-name>
|
||||
|
||||
# List all files a process has open
|
||||
lsof -p <pid>
|
||||
|
||||
# List all files open mounted at /mount/point.
|
||||
# Particularly useful for finding which process(es) are using a
|
||||
# mounted USB stick or CD/DVD.
|
||||
lsof +f -- </mount/point>
|
||||
|
||||
# See this primer: http://www.danielmiessler.com/study/lsof/
|
||||
# for a number of other useful lsof tips
|
||||
|
@ -38,7 +38,7 @@ This is [an example](http://example.com "Title") inline link.
|
||||
# image
|
||||

|
||||
|
||||
# emphasis
|
||||
# formatting
|
||||
*em* _em_
|
||||
|
||||
**strong** __strong__
|
||||
~~strikethrough~~
|
||||
|
58
cheat/cheatsheets/mdadm
Normal file
58
cheat/cheatsheets/mdadm
Normal file
@ -0,0 +1,58 @@
|
||||
# For the sake of briefness, we use Bash "group compound" stanza:
|
||||
# /dev/sd{a,b,...}1 => /dev/sda1 /dev/sdb1 ...
|
||||
# Along the following variables:
|
||||
# ${M} array identifier (/dev/md${M})
|
||||
# ${D} device identifier (/dev/sd${D})
|
||||
# ${P} partition identifier (/dev/sd${D}${P})
|
||||
|
||||
# Create (initialize) a new array
|
||||
mdadm --create /dev/md${M} --level=raid5 --raid-devices=4 /dev/sd{a,b,c,d,e}${P} --spare-devices=/dev/sdf1
|
||||
|
||||
# Manually assemble (activate) an existing array
|
||||
mdadm --assemble /dev/md${M} /dev/sd{a,b,c,d,e}${P}
|
||||
|
||||
# Automatically assemble (activate) all existing arrays
|
||||
mdadm --assemble --scan
|
||||
|
||||
# Stop an assembled (active) array
|
||||
mdadm --stop /dev/md${M}
|
||||
|
||||
# See array configuration
|
||||
mdadm --query /dev/md${M}
|
||||
|
||||
# See array component configuration (dump superblock content)
|
||||
mdadm --query --examine /dev/sd${D}${P}
|
||||
|
||||
# See detailed array confiration/status
|
||||
mdadm --detail /dev/md${M}
|
||||
|
||||
# Save existing arrays configuration
|
||||
# (MAY be required by initrd for successfull boot)
|
||||
mdadm --detail --scan > /etc/mdadm/mdadm.conf
|
||||
|
||||
# Erase array component superblock
|
||||
# (MUST do before reusing a partition for other purposes)
|
||||
mdadm --zero-superblock /dev/sd${D}${P}
|
||||
|
||||
# Manually mark a component as failed
|
||||
# (SHOULD when a device shows wear-and-tear signs, e.g. through SMART)
|
||||
mdadm --manage /dev/md${M} --fail /dev/sd${D}${P}
|
||||
|
||||
# Remove a failed component
|
||||
# (SHOULD before preemptively replacing a device, after failing it)
|
||||
mdadm --manage /dev/md${M} --remove /dev/sd${D}${P}
|
||||
|
||||
# Prepare (format) a new device to replace a failed one
|
||||
sfdisk -d /dev/sd${D,sane} | sfdisk /dev/sd${D,new}
|
||||
|
||||
# Add new component to an existing array
|
||||
# (this will trigger the rebuild)
|
||||
mdadm --manage /dev/md${M} --add /dev/sd${D,new}${P}
|
||||
|
||||
# See assembled (active) arrays status
|
||||
cat /proc/mdstat
|
||||
|
||||
# Rename a device
|
||||
# (SHOULD after hostname change; eg. name="$(hostname -s)")
|
||||
mdadm --assemble /dev/md${M} /dev/sd{a,b,c,d,e}${P} --name="${name}:${M}" --update=name
|
||||
|
@ -9,3 +9,6 @@ mount -o uid=username,gid=usergroup /dev/sdx /mnt/xxx
|
||||
|
||||
# To mount a remote NFS directory
|
||||
mount -t nfs example.com:/remote/example/dir /local/example/dir
|
||||
|
||||
# To mount an ISO
|
||||
mount -o loop disk1.iso /mnt/disk
|
||||
|
22
cheat/cheatsheets/mutt
Normal file
22
cheat/cheatsheets/mutt
Normal file
@ -0,0 +1,22 @@
|
||||
# Create new mailbox in IMAP
|
||||
+ When located in mailbox list (c)
|
||||
shift + C
|
||||
|
||||
# Move multiple messages to folder (bulk operations)
|
||||
|
||||
1. Select/tag them with alt+'t'
|
||||
2. ;s in mail inbox overview for bulk operation
|
||||
|
||||
# Deleting / Undeleting all messages in mutt
|
||||
|
||||
1. In mutt’s index, hit ‘D’ (UPPERCASE D)
|
||||
2. It will prompt you with “Delete messages matching: “
|
||||
|
||||
+ enter this string:
|
||||
|
||||
~A
|
||||
|
||||
3. It should mark all for deletion!
|
||||
|
||||
|
||||
4. Conversely, you can do the same thing with UPPERCASE U to undelete multiple messages.
|
17
cheat/cheatsheets/mv
Normal file
17
cheat/cheatsheets/mv
Normal file
@ -0,0 +1,17 @@
|
||||
# Move a file from one place to another
|
||||
mv ~/Desktop/foo.txt ~/Documents/foo.txt
|
||||
|
||||
# Move a file from one place to another and automatically overwrite if the destination file exists
|
||||
# (This will override any previous -i or -n args)
|
||||
mv -f ~/Desktop/foo.txt ~/Documents/foo.txt
|
||||
|
||||
# Move a file from one place to another but ask before overwriting an existing file
|
||||
# (This will override any previous -f or -n args)
|
||||
mv -i ~/Desktop/foo.txt ~/Documents/foo.txt
|
||||
|
||||
# Move a file from one place to another but never overwrite anything
|
||||
# (This will override any previous -f or -i args)
|
||||
mv -n ~/Desktop/foo.txt ~/Documents/foo.txt
|
||||
|
||||
# Move listed files to a directory
|
||||
mv -t ~/Desktop/ file1 file2 file3
|
@ -12,3 +12,26 @@ CREATE DATABASE owa CHARACTER SET utf8 COLLATE utf8_general_ci;
|
||||
|
||||
# To add a user and give rights on the given database
|
||||
GRANT ALL PRIVILEGES ON database.* TO 'user'@'localhost'IDENTIFIED BY 'password' WITH GRANT OPTION;
|
||||
|
||||
# To list the privileges granted to the account that you are using to connect to the server. Any of the 3 statements will work.
|
||||
SHOW GRANTS FOR CURRENT_USER();
|
||||
SHOW GRANTS;
|
||||
SHOW GRANTS FOR CURRENT_USER;
|
||||
|
||||
# Basic SELECT Statement
|
||||
SELECT * FROM tbl_name;
|
||||
|
||||
# Basic INSERT Statement
|
||||
INSERT INTO tbl_name (col1,col2) VALUES(15,col1*2);
|
||||
|
||||
# Basic UPDATE Statement
|
||||
UPDATE tbl_name SET col1 = "example";
|
||||
|
||||
# Basic DELETE Statement
|
||||
DELETE FROM tbl_name WHERE user = 'jcole';
|
||||
|
||||
# To check stored procedure
|
||||
SHOW PROCEDURE STATUS;
|
||||
|
||||
# To check stored function
|
||||
SHOW FUNCTION STATUS;
|
||||
|
11
cheat/cheatsheets/ncdu
Normal file
11
cheat/cheatsheets/ncdu
Normal file
@ -0,0 +1,11 @@
|
||||
# Save results to file
|
||||
ncdu -o ncdu.file
|
||||
|
||||
# Read from file
|
||||
ncdu -f ncdu.file
|
||||
|
||||
# Save results to compressed file
|
||||
ncdu -o-| gzip > ncdu.file.gz
|
||||
|
||||
# Read from compressed file
|
||||
zcat ncdu.file.gz | ncdu -f-
|
29
cheat/cheatsheets/nkf
Normal file
29
cheat/cheatsheets/nkf
Normal file
@ -0,0 +1,29 @@
|
||||
# check the file's charactor code
|
||||
nkf -g test.txt
|
||||
|
||||
# convert charactor code to UTF-8
|
||||
nkf -w --overwrite test.txt
|
||||
|
||||
# convert charactor code to EUC-JP
|
||||
nkf -e --overwrite test.txt
|
||||
|
||||
# convert charactor code to Shift-JIS
|
||||
nkf -s --overwrite test.txt
|
||||
|
||||
# convert charactor code to ISO-2022-JP
|
||||
nkf -j --overwrite test.txt
|
||||
|
||||
# convert newline to LF
|
||||
nkf -Lu --overwrite test.txt
|
||||
|
||||
# convert newline to CRLF
|
||||
nkf -Lw --overwrite test.txt
|
||||
|
||||
# convert newline to CR
|
||||
nkf -Lm --overwrite test.txt
|
||||
|
||||
# MIME encode
|
||||
echo テスト | nkf -WwMQ
|
||||
|
||||
# MIME decode
|
||||
echo "=E3=83=86=E3=82=B9=E3=83=88" | nkf -WwmQ
|
43
cheat/cheatsheets/nmcli
Normal file
43
cheat/cheatsheets/nmcli
Normal file
@ -0,0 +1,43 @@
|
||||
# Desc: Command line interface to NetworkManager
|
||||
|
||||
# Connect to a wireless access point - Parameters:
|
||||
# <wiface> -- the name of your wireless interface
|
||||
# <ssid> -- the SSID of the access point
|
||||
# <pass> -- the WiFi password
|
||||
nmcli d wifi connect <ssid> password <pass> iface <wiface>
|
||||
|
||||
# Disconnect from WiFi - Parameters:
|
||||
# <wiface> -- the name of your wireless interface
|
||||
nmcli d wifi disconnect iface <wiface>
|
||||
|
||||
# Get WiFi status (enabled / disabled)
|
||||
nmcli radio wifi
|
||||
|
||||
# Enable / Disable WiFi
|
||||
nmcli radio wifi <on|off>
|
||||
|
||||
# Show all available WiFi access points
|
||||
nmcli dev wifi list
|
||||
|
||||
# Refresh the available WiFi connection list
|
||||
nmcli dev wifi rescan
|
||||
|
||||
# Show all available connections
|
||||
nmcli con
|
||||
|
||||
# Show only active connections
|
||||
nmcli con show --active
|
||||
|
||||
# Review the available devices
|
||||
nmcli dev status
|
||||
|
||||
# Add a dynamic ethernet connection - parameters:
|
||||
# <name> -- the name of the connection
|
||||
# <iface_name> -- the name of the interface
|
||||
nmcli con add type ethernet con-name <name> ifname <iface_name>
|
||||
|
||||
# Import OpenVPN connection settings from file:
|
||||
nmcli con import type openvpn file <path_to_ovpn_file>
|
||||
|
||||
# Bring up the ethernet connection
|
||||
nmcli con up <name>
|
22
cheat/cheatsheets/npm
Normal file
22
cheat/cheatsheets/npm
Normal file
@ -0,0 +1,22 @@
|
||||
# Every command shown here can be used with the `-g` switch for global scope
|
||||
|
||||
# Install a package in the current directory
|
||||
npm install <package>
|
||||
|
||||
# Install a package, and save it in the `dependencies` section of `package.json`
|
||||
npm install --save <package>
|
||||
|
||||
# Install a package, and save it in the `devDependencies` section of `package.json`
|
||||
npm install --save-dev <package>
|
||||
|
||||
# Show outdated packages in the current directory
|
||||
npm outdated
|
||||
|
||||
# Update outdated packages
|
||||
npm update
|
||||
|
||||
# Update `npm` (will override the one shipped with Node.js)
|
||||
npm install -g npm
|
||||
|
||||
# Uninstall a package
|
||||
npm uninstall <package>
|
33
cheat/cheatsheets/ntp
Normal file
33
cheat/cheatsheets/ntp
Normal file
@ -0,0 +1,33 @@
|
||||
# Verify ntpd running:
|
||||
service ntp status
|
||||
|
||||
# Start ntpd if not running:
|
||||
service ntp start
|
||||
|
||||
# Display current hardware clock value:
|
||||
sudo hwclock -r
|
||||
|
||||
# Apply system time to hardware time:
|
||||
sudo hwclock --systohc
|
||||
|
||||
# Apply hardware time to system time:
|
||||
sudo hwclock --hctosys
|
||||
|
||||
# Set hwclock to local time:
|
||||
sudo hwclock --localtime
|
||||
|
||||
# Set hwclock to UTC:
|
||||
sudo hwclock --utc
|
||||
|
||||
# Set hwclock manually:
|
||||
sudo hwclock --set --date="8/10/15 13:10:05"
|
||||
|
||||
# Query surrounding stratum time servers
|
||||
ntpq -pn
|
||||
|
||||
# Config file:
|
||||
/etc/ntp.conf
|
||||
|
||||
# Driftfile:
|
||||
location of "drift" of your system clock compared to ntp servers
|
||||
/var/lib/ntp/ntp.drift
|
@ -15,7 +15,13 @@ openssl req -text -noout -in server.csr
|
||||
# To show certificate information for generated certificate
|
||||
openssl x509 -text -noout -in server.crt
|
||||
|
||||
# To get the sha256 fingerprint of a certificate
|
||||
openssl x509 -in server.crt -noout -sha256 -fingerprint
|
||||
|
||||
# To view certificate expiration:
|
||||
echo | openssl s_client -connect <hostname>:443 2> /dev/null | \
|
||||
awk '/-----BEGIN/,/END CERTIFICATE-----/' | \
|
||||
openssl x509 -noout -enddate
|
||||
|
||||
# Generate Diffie-Hellman parameters:
|
||||
openssl dhparam -outform PEM -out dhparams.pem 2048
|
||||
|
46
cheat/cheatsheets/org-mode
Normal file
46
cheat/cheatsheets/org-mode
Normal file
@ -0,0 +1,46 @@
|
||||
Begin org-mode ALT-x org-mode
|
||||
Save CTRL-x CTRL-s
|
||||
Export in other file formats (eg HTML,PDF) CTRL-c CTRL-e
|
||||
|
||||
# Outline
|
||||
|
||||
Section heading *
|
||||
New headline ALT-return
|
||||
Move headline up or down ALT-up_arrow/down_arrow
|
||||
Adjust indent depth of headline ALT-left_arrow/right_arrow
|
||||
Open/collapse section TAB
|
||||
Open/collapse All CTRL-TAB
|
||||
|
||||
# To-Do Lists
|
||||
|
||||
Mark list item as TODO ** TODO
|
||||
Cycle through workflow SHIFT-left_arrow/right_arrow
|
||||
Show only outstanding TODO items CTRL-c CTRL-v
|
||||
|
||||
# Tables
|
||||
|
||||
Table column separator Vertical/pipe character
|
||||
Reorganize table TAB
|
||||
Move column ALT-left_arrow/right_arrow
|
||||
Move row ALT-up_arrow/down_arrow
|
||||
|
||||
# Styles
|
||||
|
||||
*bold*
|
||||
/italic/
|
||||
_underlined_
|
||||
=code=
|
||||
~verbatim~
|
||||
+strike-through+
|
||||
|
||||
# Heading
|
||||
|
||||
Header -*- mode: org -*-
|
||||
|
||||
# .emacs
|
||||
|
||||
To make org-mode automatically wrap lines:
|
||||
|
||||
(add-hook 'org-mode-hook
|
||||
'(lambda ()
|
||||
(visual-line-mode 1)))
|
@ -27,6 +27,9 @@ pacman -Ql <package name> | sed -n -e 's/.*\/bin\///p' | tail -n +2
|
||||
# To list explicitly installed packages
|
||||
pacman -Qe
|
||||
|
||||
# To list the top-most recent explicitly installed packages (not in the base groups)
|
||||
expac --timefmt='%Y-%m-%d %T' '%l\t%n' $(comm -23 <(pacman -Qeq|sort) <(pacman -Qqg base base-devel|sort)) | sort -r | head -20
|
||||
|
||||
# To list orphan packages (installed as dependencies and not required anymore)
|
||||
pacman -Qdt
|
||||
|
||||
|
13
cheat/cheatsheets/patch
Normal file
13
cheat/cheatsheets/patch
Normal file
@ -0,0 +1,13 @@
|
||||
# Patch one file
|
||||
patch version1 < version.patch
|
||||
|
||||
# Reverse a patch
|
||||
patch -R version1 < version.patch
|
||||
|
||||
# Patch all files in a directory, adding any missing new files
|
||||
# -p strips leading slashes
|
||||
$ cd dir
|
||||
$ patch -p1 -i ../big.patch
|
||||
|
||||
# Patch files in a directory, with one level (/) offset
|
||||
patch -p1 -r version1/ < version.patch
|
8
cheat/cheatsheets/perl
Normal file
8
cheat/cheatsheets/perl
Normal file
@ -0,0 +1,8 @@
|
||||
# To view the perl version:
|
||||
perl -v
|
||||
|
||||
# Replace string "\n" to newline
|
||||
echo -e "foo\nbar\nbaz" | perl -pe 's/\n/\\n/g;'
|
||||
|
||||
# Replace newline with multiple line to space
|
||||
cat test.txt | perl -0pe "s/test1\ntest2/test1 test2/m"
|
5
cheat/cheatsheets/pgrep
Normal file
5
cheat/cheatsheets/pgrep
Normal file
@ -0,0 +1,5 @@
|
||||
# Get a list of PIDs matching the pattern
|
||||
pgrep example
|
||||
|
||||
# Kill all PIDs matching the pattern
|
||||
pgrep -f example | xargs kill
|
8
cheat/cheatsheets/ping
Normal file
8
cheat/cheatsheets/ping
Normal file
@ -0,0 +1,8 @@
|
||||
# ping a host with a total count of 15 packets overall.
|
||||
ping -c 15 www.example.com
|
||||
|
||||
# ping a host with a total count of 15 packets overall, one every .5 seconds (faster ping).
|
||||
ping -c 15 -i .5 www.example.com
|
||||
|
||||
# test if a packet size of 1500 bytes is supported (to check the MTU for example)
|
||||
ping -s 1500 -c 10 -M do www.example.com
|
@ -4,6 +4,12 @@ pip search SomePackage
|
||||
# Install some packages
|
||||
pip install SomePackage
|
||||
|
||||
# Install some package in user space
|
||||
pip install --user SomePackage
|
||||
|
||||
# Upgrade some package
|
||||
pip install --upgrade SomePackage
|
||||
|
||||
# Output and install packages in a requirement file
|
||||
pip freeze > requirements.txt
|
||||
pip install -r requirements.txt
|
||||
@ -17,5 +23,8 @@ pip list --outdated
|
||||
# Upgrade all outdated packages, thanks to http://stackoverflow.com/a/3452888
|
||||
pip freeze --local | grep -v '^\-e' | cut -d = -f 1 | xargs -n1 pip install -U
|
||||
|
||||
# Upgrade outdated packages on latest version of pip
|
||||
pip list --outdated --format=freeze | cut -d = -f 1 | xargs -n1 pip install -U
|
||||
|
||||
# Install specific version of a package
|
||||
pip install -I SomePackage1==1.1.0 'SomePackage2>=1.0.4'
|
||||
|
27
cheat/cheatsheets/pkgtools
Normal file
27
cheat/cheatsheets/pkgtools
Normal file
@ -0,0 +1,27 @@
|
||||
# Create a Slackware package from a structured directory and sub-tree
|
||||
$ cd /path/to/pkg/dir
|
||||
$ su - c 'makepkg --linkadd y --chown n $foo-1.0.3-x86_64-1_tag.tgz'
|
||||
|
||||
|
||||
# Install a Slackware package
|
||||
installpkg foo-1.0.3-x86_64-1.tgz
|
||||
|
||||
# Install a Slackware package to non-standard location
|
||||
ROOT=/path/to/dir installpkg foo-1.0.4-noarch-1.tgz
|
||||
|
||||
# Create backup of files that will be overwritten when installing
|
||||
tar czvf /tmp/backup.tar.gz $(installpkg --warn foo-1.0.4-noarch-1.tgz)
|
||||
|
||||
|
||||
# Upgrade a Slackware package including files only in new version
|
||||
upgradepkg --install-new foo-1.0.6-noarch-1.tgz
|
||||
|
||||
# Upgrade a Slackware package even if version is the same
|
||||
upgradepkg --reinstall foo-1.0.4-noarch-1.tgz
|
||||
|
||||
|
||||
# Remove a Slackware package
|
||||
removepkg foo-0.2.8-x86_64-1
|
||||
|
||||
# Remove a Slackware package, retaining a backup (uninstalled) copy
|
||||
removepkg -copy foo-0.2.8-x86_64-1 # -> /var/log/setup/tmp/preserved_packages/foo...
|
5
cheat/cheatsheets/pkill
Normal file
5
cheat/cheatsheets/pkill
Normal file
@ -0,0 +1,5 @@
|
||||
# To kill a process using it's full process name
|
||||
pkill <processname>
|
||||
|
||||
# To kill a process by it's partial name
|
||||
pkill -f <string>
|
2
cheat/cheatsheets/popd
Normal file
2
cheat/cheatsheets/popd
Normal file
@ -0,0 +1,2 @@
|
||||
# Returns to the directory at the top of the `pushd' stack
|
||||
popd
|
26
cheat/cheatsheets/psql
Normal file
26
cheat/cheatsheets/psql
Normal file
@ -0,0 +1,26 @@
|
||||
# psql is the PostgreSQL terminal interface. The following commands were tested on version 9.5.
|
||||
# Connection options:
|
||||
# -U username (if not specified current OS user is used).
|
||||
# -p port.
|
||||
# -h server hostname/address.
|
||||
|
||||
# Connect to a specific database:
|
||||
psql -U postgres -h serverAddress -d dbName
|
||||
|
||||
# Get databases on a server:
|
||||
psql -U postgres -h serverAddress --list
|
||||
|
||||
# Execute sql query and save output to file:
|
||||
psql -U postgres -d dbName -c 'select * from tableName;' -o fileName
|
||||
|
||||
# Execute query and get tabular html output:
|
||||
psql -U postgres -d dbName -H -c 'select * from tableName;'
|
||||
|
||||
# Execute query and save resulting rows to csv file:
|
||||
psql -U postgres -d dbName -t -A -P fieldsep=',' -c 'select * from tableName;' -o fileName.csv
|
||||
|
||||
# Read commands from file:
|
||||
psql -f fileName
|
||||
|
||||
# Restore databases from file:
|
||||
psql -f fileName.backup postgres
|
5
cheat/cheatsheets/pushd
Normal file
5
cheat/cheatsheets/pushd
Normal file
@ -0,0 +1,5 @@
|
||||
# Pushes your current directory to the top of a stack while changing to the specified directory
|
||||
pushd <directory>
|
||||
|
||||
# To return use popd
|
||||
popd
|
2
cheat/cheatsheets/pwd
Normal file
2
cheat/cheatsheets/pwd
Normal file
@ -0,0 +1,2 @@
|
||||
# Show the absolute path of your current working directory on the filesystem
|
||||
pwd
|
936
cheat/cheatsheets/r2
Normal file
936
cheat/cheatsheets/r2
Normal file
@ -0,0 +1,936 @@
|
||||
# Command Line options
|
||||
-L: List of supported IO plugins
|
||||
|
||||
-q: Exit after processing commands
|
||||
|
||||
-w: Write mode enabled
|
||||
|
||||
-i: Interprets a r2 script
|
||||
|
||||
-A: Analize executable at load time (xrefs, etc)
|
||||
|
||||
-n: Bare load. Do not load executable info as the entrypoint
|
||||
|
||||
-c'cmds': Run r2 and execute commands (eg: r2 -wqc'wx 3c @ main')
|
||||
|
||||
-p: Creates a project for the file being analyzed (CC add a comment when opening a file as a project)
|
||||
|
||||
-: Opens r2 with the malloc plugin that gives a 512 bytes memory area to play with (size can be changed); Similar to r2 malloc://512
|
||||
|
||||
-----------------------------------------------------------------------------------------------------------------------------
|
||||
|
||||
# Configuration properties
|
||||
e: Returs configuration properties
|
||||
|
||||
e <property>: Checks a specific property:
|
||||
e asm.tabs => false
|
||||
|
||||
e <property>=<value>: Change property value
|
||||
e asm.arch=ppc
|
||||
|
||||
e? help about a configuration property
|
||||
e? cmd.stack
|
||||
|
||||
|
||||
|
||||
# Show comments at right of disassembly if they fit in screen
|
||||
e asm.cmtright=true
|
||||
|
||||
# Shows pseudocode in disassembly. Eg mov eax, str.ok = > eax = str.ok
|
||||
e asm.pseudo = true
|
||||
|
||||
# Display stack and register values on top of disasembly view (visual mode)
|
||||
e cmd.stack = true
|
||||
|
||||
# Solarized theme
|
||||
eco solarized
|
||||
|
||||
# Use UTF-8 to show cool arrows that do not look like crap :)
|
||||
e scr.utf8 = true
|
||||
|
||||
-----------------------------------------------------------------------------------------------------------------------------
|
||||
|
||||
# Basic Commands
|
||||
|
||||
; Command chaining: x 3;s+3;pi 3;s+3;pxo 4;
|
||||
|
||||
| Pipe with shell commands: pd | less
|
||||
|
||||
! Run shell commands: !cat /etc/passwd
|
||||
|
||||
!! Escapes to shell, run command and pass output to radare buffer
|
||||
|
||||
Note: The double exclamation mark tells radare to skip the plugin list to find an IO plugin handling this
|
||||
command to launch it directly to the shell. A single one will walk through the io plugin list.
|
||||
|
||||
` Radare commands: wx `!ragg2 -i exec`
|
||||
|
||||
~ grep
|
||||
|
||||
~! grep -v
|
||||
|
||||
~[n] grep by columns afl~[0]
|
||||
|
||||
~:n grep by rows afl~:0
|
||||
|
||||
<command>~.. less/more mode
|
||||
|
||||
+-------------------------------------------------------------------
|
||||
|
||||
pi~mov,eax ; lines with mov or eax
|
||||
pi~mov&eax ; lines with mov and eax
|
||||
pi~mov,eax:6 ; 6 first lines with mov or eax
|
||||
pd 20~call[0]:0 ; grep first column of the first row matching 'call'
|
||||
|
||||
+-------------------------------------------------------------------
|
||||
|
||||
.cmd Interprets command output
|
||||
|
||||
+-------------------------------------------------------------------
|
||||
|
||||
is* prints symbolos
|
||||
.is* interprets output and define the symbols in radare (normally they are already loaded if r2 was not invoked with -n)
|
||||
|
||||
+-------------------------------------------------------------------
|
||||
|
||||
.. repeats last commands (same as enter \n)
|
||||
|
||||
( Used to define and run macros
|
||||
|
||||
$ Used to define alias
|
||||
|
||||
$$: Resolves to current address
|
||||
|
||||
Offsets (@) are absolute, we can use $$ for relative ones @ $$+4
|
||||
|
||||
? Evaluate expression
|
||||
+-------------------------------------------------------------------
|
||||
|
||||
[0x00000000]> ? 33 +2
|
||||
35 0x23 043 0000:0023 35 00100011 35.0 0.000000
|
||||
Note: | and & need to be escaped
|
||||
|
||||
+-------------------------------------------------------------------
|
||||
|
||||
?$? Help for variables used in expressions
|
||||
|
||||
$$: Here
|
||||
|
||||
$s: File size
|
||||
|
||||
$b: Block size
|
||||
|
||||
$l: Opcode length
|
||||
|
||||
$j: When $$ is at a jmp, $j is the address where we are going to jump to
|
||||
|
||||
$f: Same for jmp fail address
|
||||
|
||||
$m: Opcode memory reference (e.g. mov eax,[0x10] => 0x10)
|
||||
|
||||
??? Help for ? command
|
||||
|
||||
?i Takes input from stdin. Eg ?i username
|
||||
|
||||
?? Result from previous operations
|
||||
|
||||
?s from to [step]: Generates sequence from to every
|
||||
|
||||
?p: Get physical address for given virtual address
|
||||
|
||||
?P: Get virtual address for given physical one
|
||||
|
||||
?v Show hex value of math expr
|
||||
|
||||
+-------------------------------------------------------------------
|
||||
|
||||
?v 0x1625d4ca ^ 0x72ca4247 = 0x64ef968d
|
||||
?v 0x4141414a - 0x41414140 = 0xa
|
||||
|
||||
+-------------------------------------------------------------------
|
||||
|
||||
?l str: Returns the length of string
|
||||
|
||||
@@: Used for iteractions
|
||||
|
||||
+-------------------------------------------------------------------
|
||||
|
||||
wx ff @@10 20 30 Writes ff at offsets 10, 20 and 30
|
||||
wx ff @@`?s 1 10 2` Writes ff at offsets 1, 2 and 3
|
||||
wx 90 @@ sym.* Writes a nop on every symbol
|
||||
|
||||
+-------------------------------------------------------------------
|
||||
|
||||
# Positioning
|
||||
|
||||
s address: Move cursor to address or symbol
|
||||
|
||||
s-5 (5 bytes backwards)
|
||||
|
||||
s- undo seek
|
||||
|
||||
s+ redo seek
|
||||
|
||||
# Block Size
|
||||
|
||||
b size: Change block size
|
||||
|
||||
# Analyze
|
||||
|
||||
aa: Analyze all (fcns + bbs) same that running r2 with -A
|
||||
|
||||
ahl <length> <range>: fake opcode length for a range of bytes
|
||||
|
||||
ad: Analyze data
|
||||
|
||||
ad@rsp (analize the stack)
|
||||
|
||||
+ Normal mode
|
||||
|
||||
af: Analyze functions
|
||||
|
||||
afl: List all functions
|
||||
number of functions: afl~?
|
||||
|
||||
afi: Returns information about the functions we are currently at
|
||||
|
||||
afr: Rename function: structure and flag
|
||||
|
||||
afr off: Restore function name set by r2
|
||||
|
||||
afn: Rename function
|
||||
|
||||
afn strlen 0x080483f0
|
||||
|
||||
af-: Removes metadata generated by the function analysis
|
||||
|
||||
af+: Define a function manually given the start address and length
|
||||
af+ 0xd6f 403 checker_loop
|
||||
|
||||
axt: Returns cross references to (xref to)
|
||||
|
||||
axf: Returns cross references from (xref from)
|
||||
|
||||
+ Visual mode
|
||||
|
||||
d, f: Function analysis
|
||||
|
||||
d, u: Remove metadata generated by function analysis
|
||||
|
||||
+ Opcode analysis
|
||||
|
||||
ao x: Analize x opcodes from current offset
|
||||
|
||||
a8 bytes: Analize the instruction represented by specified bytes
|
||||
|
||||
# Information
|
||||
|
||||
iI: File info
|
||||
|
||||
iz: Strings in data section
|
||||
|
||||
izz: Strings in the whole binary
|
||||
|
||||
iS: Sections
|
||||
iS~w returns writable sections
|
||||
|
||||
is: Symbols
|
||||
is~FUNC exports
|
||||
|
||||
il: Linked libraries
|
||||
|
||||
ii: Imports
|
||||
|
||||
ie: Entrypoint
|
||||
|
||||
+ Mitigations
|
||||
|
||||
i~pic : check if the binary has position-independent-code
|
||||
|
||||
i~nx : check if the binary has non-executable stack
|
||||
|
||||
i~canary : check if the binary has canaries
|
||||
|
||||
# Print
|
||||
|
||||
psz n @ offset: Print n zero terminated String
|
||||
|
||||
px n @ offset: Print hexdump (or just x) of n bytes
|
||||
|
||||
pxw n @ offset: Print hexdump of n words
|
||||
pxw size@offset prints hexadecimal words at address
|
||||
|
||||
pd n @ offset: Print n opcodes disassambled
|
||||
|
||||
pD n @ offset: Print n bytes disassembled
|
||||
|
||||
pi n @ offset: Print n instructions disassambeled (no address, XREFs, etc. just instrunctions)
|
||||
|
||||
pdf @ offset: Print disassembled function
|
||||
pdf~XREF (grep: XREFs)
|
||||
pdf~call (grep: calls)
|
||||
|
||||
pcp n @ offset: Print n bytes in python string output.
|
||||
pcp 0x20@0x8048550
|
||||
import struct
|
||||
buf = struct.pack ("32B",
|
||||
0x55,0x89,0xe5,0x83,0xzz,0xzz,0xzz,0xzz,0xf0,0x00,0x00,
|
||||
0x00,0x00,0xc7,0x45,0xf4,0x00,0x00,0x00,0x00,0xeb,0x20,
|
||||
0xc7,0x44,0x24,0x04,0x01,0x00,0x00,0x00,0xzz,0xzz)
|
||||
|
||||
p8 n @ offset: Print n bytes (8bits) (no hexdump)
|
||||
|
||||
pv: Print file contents as IDA bar and shows metadata for each byte (flags , ...)
|
||||
|
||||
pt: Interpret data as dates
|
||||
|
||||
pf: Print with format
|
||||
|
||||
pf.: list all formats
|
||||
|
||||
p=: Print entropy ascii graph
|
||||
|
||||
# Write
|
||||
|
||||
wx: Write hex values in current offset
|
||||
wx 123456
|
||||
wx ff @ 4
|
||||
|
||||
wa: Write assembly
|
||||
wa jnz 0x400d24
|
||||
|
||||
wc: Write cache commit
|
||||
|
||||
wv: Writes value doing endian conversion and padding to byte
|
||||
|
||||
wo[x]: Write result of operation
|
||||
wow 11223344 @102!10
|
||||
write looped value from 102 to 102+10
|
||||
0x00000066 1122 3344 1122 3344 1122 0000 0000 0000
|
||||
|
||||
wox 0x90
|
||||
XOR the current block with 0x90. Equivalent to wox 0x90 $$!$b (write from current position, a whole block)
|
||||
|
||||
wox 67 @4!10
|
||||
XOR from offset 4 to 10 with value 67
|
||||
|
||||
wf file: Writes the content of the file at the current address or specified offset (ASCII characters only)
|
||||
|
||||
wF file: Writes the content of the file at the current address or specified offset
|
||||
|
||||
wt file [sz]: Write to file (from current seek, blocksize or sz bytes)
|
||||
Eg: Dump ELF files with wt @@ hit0* (after searching for ELF headers: \x7fELF)
|
||||
|
||||
woO 41424344 : get the index in the De Bruijn Pattern of the given word
|
||||
|
||||
# Flags
|
||||
|
||||
f: List flags
|
||||
|
||||
f label @ offset: Define a flag `label` at offset
|
||||
f str.pass_len @ 0x804999c
|
||||
|
||||
f -label: Removes flag
|
||||
|
||||
fr: Rename flag
|
||||
|
||||
fd: Returns position from nearest flag (looking backwards). Eg => entry+21
|
||||
|
||||
fs: Show all flag spaces
|
||||
|
||||
fs flagspace: Change to the specified flag space
|
||||
|
||||
fe loop and create numbered flags:
|
||||
|
||||
1. fs demo_flagspace
|
||||
2. fe demo_flagspace @@=`pdf~jne[1]`
|
||||
|
||||
# Yank & Paste
|
||||
|
||||
y n: Copies n bytes from current position
|
||||
|
||||
y: Shows yank buffer contentent with address and length where each entry was copied from
|
||||
|
||||
yp: Prints yank buffer
|
||||
|
||||
yy offset: Paste the contents of the yank buffer at the specified offset
|
||||
|
||||
yt n target @ source: Yank to. Copy n bytes fromsource to target address
|
||||
|
||||
# Visual Mode
|
||||
|
||||
q: Exits visual mode
|
||||
|
||||
hjkl: move around (or HJKL) (left-down-up-right)
|
||||
|
||||
o: go/seek to given offset
|
||||
|
||||
?: Help
|
||||
|
||||
.: Seek EIP
|
||||
|
||||
<enter>: Follow address of the current jump/call
|
||||
|
||||
:cmd: Enter radare commands. Eg: x @ esi
|
||||
|
||||
d[f?]: Define cursor as a string, data, code, a function, or simply to undefine it.
|
||||
dr: Rename a function
|
||||
df: Define a function
|
||||
|
||||
v: Get into the visual code analysis menu to edit/look closely at the current function.
|
||||
|
||||
p/P: Rotate print (visualization) modes
|
||||
hex, the hexadecimal view
|
||||
disasm, the disassembly listing
|
||||
Use numbers in [] to follow jump
|
||||
Use "u" to go back
|
||||
|
||||
debug, the debugger
|
||||
words, the word-hexidecimal view
|
||||
buf, the C-formatted buffer
|
||||
annotated, the annotated hexdump.
|
||||
|
||||
c: Changes to cursor mode or exits the cursor mode
|
||||
select: Shift+[hjkl]
|
||||
i: Insert mode
|
||||
a: assembly inline
|
||||
A: Assembly in visual mode
|
||||
y: Copy
|
||||
Y: Paste
|
||||
f: Creates a flag where cursor points to
|
||||
<tab> in the hexdump view to toggle between hex and strings columns
|
||||
|
||||
V: View ascii-art basic block graph of current function
|
||||
|
||||
W: WebUI
|
||||
|
||||
x, X: XREFs to current function. ("u" to go back)
|
||||
|
||||
t: track flags (browse symbols, functions..)
|
||||
|
||||
gG: Begging or end of file
|
||||
|
||||
HUD
|
||||
_ Show HUD
|
||||
backspace: Exits HUD
|
||||
We can add new commands to HUD in: radare2/shlr/hud/main
|
||||
|
||||
;[-]cmt: Add/remove comment
|
||||
|
||||
m<char>: Define a bookmark
|
||||
|
||||
'<char>: Go to previously defined bookmark
|
||||
|
||||
# ROP
|
||||
|
||||
/R opcodes: Search opcodes
|
||||
|
||||
/R pop,pop,ret
|
||||
|
||||
/Rl opcodes: Search opcodes and print them in linear way
|
||||
|
||||
/Rl jmp eax,call ebx
|
||||
|
||||
/a: Search assembly
|
||||
|
||||
/a jmp eax
|
||||
|
||||
pda: Returns a library of gadgets that can be use. These gadgets are obtained by disassmbling byte per byte instead of obeying to opcode leng
|
||||
|
||||
e search.roplen = 4 (change the depth of the search, to speed-up the hunt)
|
||||
|
||||
# Searching
|
||||
|
||||
/ bytes: Search bytes
|
||||
\x7fELF
|
||||
|
||||
+-------------------------------------------------------------------
|
||||
|
||||
push ebp
|
||||
mov ebp, esp
|
||||
|
||||
Opcodes: 5589e5
|
||||
|
||||
/x 5589e5
|
||||
[# ]hits: 54c0f4 < 0x0804c600 hits = 1
|
||||
0x08049f70 hit0_0 5589e557565383e4f081ec
|
||||
0x0804c31a hit0_1 5589e583ec18c704246031
|
||||
0x0804c353 hit0_2 5589e583ec1889442404c7
|
||||
0x0804c379 hit0_3 5589e583ec08e87cffffff
|
||||
0x0804c3a2 hit0_4 5589e583ec18c70424302d
|
||||
|
||||
pi 5 @@hit* (Print 5 first instructions of every hit)
|
||||
|
||||
+-------------------------------------------------------------------
|
||||
|
||||
Its possible to run a command for each hit. Use the cmd.hit property:
|
||||
|
||||
e cmd.hit=px
|
||||
|
||||
# Comments and defines
|
||||
|
||||
Cd [size]: Define as data
|
||||
|
||||
C- [size]: Define as code
|
||||
|
||||
Cs [size]: Define as String
|
||||
|
||||
Cf [size]: Define as struct
|
||||
We can define structures to be shown in the disassmbly
|
||||
|
||||
CC: List all comments or add a new comment in console mode
|
||||
C* Show all comments/metadata
|
||||
CC <comment> add new comment
|
||||
CC- remove comment
|
||||
|
||||
# Magic files
|
||||
|
||||
pm: Print Magic files analysis
|
||||
[0x00000000]> pm
|
||||
0x00000000 1 ELF 32-bit LSB executable, Intel 80386, version 1
|
||||
|
||||
/m [magicfile]: Search magic number headers with libmagic
|
||||
|
||||
search.align
|
||||
search.from (0 = beginning)
|
||||
search.to (0 = end)
|
||||
search.asmstr
|
||||
search.in
|
||||
|
||||
# Yara
|
||||
|
||||
:yara scan
|
||||
|
||||
# Zignatures
|
||||
|
||||
zg <language> <output file>: Generate signatures
|
||||
eg: zg go go.z
|
||||
|
||||
Run the generated script to load signatures
|
||||
eg: . go.z
|
||||
|
||||
z: To show signatures loaded:
|
||||
|
||||
+-------------------------------------------------------------------
|
||||
|
||||
r2-(pid2)> pd 35 @ 0x08049adb-10
|
||||
| 0x08049adb call fcn.0805b030
|
||||
| fcn.0805b030(unk, unk, unk, unk) ; sign.sign.b.sym.fmt.Println
|
||||
| 0x08049ae0 add esp, 0xc
|
||||
| 0x08049ae3 call fcn.08095580
|
||||
|
||||
+-------------------------------------------------------------------
|
||||
|
||||
# Compare Files
|
||||
|
||||
r2 -m 0xf0000 /etc/fstab ; Open source file
|
||||
|
||||
o /etc/issue ; Open file2 at offset 0
|
||||
|
||||
o ; List both files
|
||||
|
||||
cc offset: Diff by columns between current offset address and "offset"
|
||||
|
||||
# Graphs
|
||||
|
||||
+ Basic block graphs
|
||||
|
||||
af: Load function metadata
|
||||
|
||||
ag $$ > a.dot: Dump basic block graph to file
|
||||
|
||||
ag $$ | xdot: Show current function basic block graph
|
||||
|
||||
+ Call graphs
|
||||
|
||||
af: Load function metadata
|
||||
|
||||
agc $$ > b.dot: Dump basic block graph to file
|
||||
|
||||
+ Convert .dot in .png
|
||||
|
||||
dot -Tpng -o /tmp/b.png b.dot
|
||||
|
||||
+ Generate graph for file
|
||||
|
||||
radiff2 -g main crackme.bin crackme.bin > /tmp/a
|
||||
xdot /tmp/a
|
||||
|
||||
# Debugger
|
||||
|
||||
+ Start r2 in debugger mode. r2 will fork and attach
|
||||
|
||||
r2 -d [pid|cmd|ptrace] (if command contains spaces use quotes: r2 -d "ls /")
|
||||
|
||||
ptrace://pid (debug backend does not notice, only access to mapped memory)
|
||||
|
||||
+ Pass arguments
|
||||
|
||||
r2 -d rarun2 program=pwn1 arg1=$(python exploit.py)
|
||||
|
||||
+ Pass stdin
|
||||
|
||||
r2 -d rarun2 program=/bin/ls stdin=$(python exploit.py)
|
||||
|
||||
+ Commands
|
||||
|
||||
do: Reopen program
|
||||
|
||||
dp: Shows debugged process, child processes and threads
|
||||
|
||||
dc: Continue
|
||||
|
||||
dcu <address or symbol>: Continue until symbol (sets bp in address, continua until bp and remove bp)
|
||||
|
||||
dc[sfcp]: Continue until syscall(eg: write), fork, call, program address (To exit a library)
|
||||
|
||||
ds: Step in
|
||||
|
||||
dso: Step out
|
||||
|
||||
dss: Skip instruction
|
||||
|
||||
dr register=value: Change register value
|
||||
|
||||
dr(=)?: Show register values
|
||||
|
||||
db address: Sets a breakpoint at address
|
||||
db sym.main add breakpoint into sym.main
|
||||
db 0x804800 add breakpoint
|
||||
db -0x804800 remove breakpoint
|
||||
|
||||
dsi (conditional step): Eg: "dsi eax==3,ecx>0"
|
||||
|
||||
dbt: Shows backtrace
|
||||
|
||||
drr: Display in colors and words all the refs from registers or memory
|
||||
|
||||
dm: Shows memory map (* indicates current section)
|
||||
[0xb776c110]> dm
|
||||
sys 0x08048000 - 0x08062000 s r-x /usr/bin/ls
|
||||
sys 0x08062000 - 0x08064000 s rw- /usr/bin/ls
|
||||
sys 0xb776a000 - 0xb776b000 s r-x [vdso]
|
||||
sys 0xb776b000 * 0xb778b000 s r-x /usr/lib/ld-2.17.so
|
||||
sys 0xb778b000 - 0xb778d000 s rw- /usr/lib/ld-2.17.so
|
||||
sys 0xbfe5d000 - 0xbfe7e000 s rw- [stack]
|
||||
|
||||
+ To follow child processes in forks (set-follow-fork-mode in gdb)
|
||||
|
||||
dcf until a fork happen then use dp to select what process you want to debug.
|
||||
|
||||
+ PEDA like details
|
||||
|
||||
drr;pd 10@-10;pxr 40@esp
|
||||
|
||||
+ Debug in visual mode
|
||||
|
||||
toggl breakpoints with F2
|
||||
single-step with F7 (s)
|
||||
step-over with F8 (S)
|
||||
continue with F9
|
||||
|
||||
# WebGUI
|
||||
|
||||
=h: Start the server
|
||||
=H: Start server and browser
|
||||
|
||||
# rax2 - Base Conversion
|
||||
|
||||
-e: Change endian
|
||||
|
||||
-k: random ASCII art to represent a number/hash. Similar to how SSH represents keys
|
||||
|
||||
-s: ASCII to hex
|
||||
rax2 -S hola (from string to hex)
|
||||
rax2 -s 686f6c61 (from hex to string)
|
||||
|
||||
-S: binary to hex (for files)
|
||||
|
||||
-N: pack an integer
|
||||
rax2 -N 0x1234 # \x34\x12\x00\x00
|
||||
|
||||
# rahash2 - Entropy, hashes and checksums
|
||||
|
||||
-a: Specify the algorithm
|
||||
|
||||
-b XXX: Block size
|
||||
|
||||
-B: Print all blocks
|
||||
|
||||
-a entropy: Show file entropy or entropy per block (-B -b 512 -a entropy)
|
||||
|
||||
+ Rot13 with rahash2
|
||||
rahash2 -E rot -S s:13 -s ‘Hello\n’
|
||||
|
||||
# radiff2 - File diffing
|
||||
|
||||
-s: Calculate text distance from two files.
|
||||
|
||||
-d: Delta diffing (For files with different sizes. Its not byte per byte)
|
||||
|
||||
-C: Code diffing (instead of data)
|
||||
|
||||
+-------------------------------------------------------------------
|
||||
|
||||
Diff original and patched on x86_32, using graphdiff algorithm
|
||||
radiff2 -a x86 -b32 -C original patched
|
||||
|
||||
Show differences between original and patched on x86_32
|
||||
radiff2 -a x86 -b32 original patched :
|
||||
|
||||
+-------------------------------------------------------------------
|
||||
|
||||
# rasm2 - Assembly/Disasembly
|
||||
|
||||
-L: Supported architectures
|
||||
|
||||
-a arch instruction: Sets architecture
|
||||
rasm2 -a x86 'mov eax,30' => b81e000000
|
||||
|
||||
-b tam: Sets block size
|
||||
|
||||
-d: Disassembly
|
||||
rasm2 -d b81e000000 => mov eax, 0x1e
|
||||
|
||||
-C: Assembly in C output
|
||||
rasm2 -C 'mov eax,30' => "\xb8\x1e\x00\x00\x00"
|
||||
|
||||
-D: Disassemble showing hexpair and opcode
|
||||
rasm2 -D b81e0000 => 0x00000000 5 b81e000000 mov eax, 0x1e
|
||||
|
||||
-f: Read data from file instead of ARG.
|
||||
|
||||
-t: Write data to file
|
||||
|
||||
+ Disassemble shellcode from hex stdin
|
||||
|
||||
+-------------------------------------------------------------------
|
||||
|
||||
echo -n "31c048bbd19d9691d08c97ff48f7db53545f995257545eb03b0f05" | rasm2 -a x86 -b 64 -d -
|
||||
xor eax, eax
|
||||
movabs rbx, 0xff978cd091969dd1
|
||||
neg rbx
|
||||
push rbx
|
||||
push rsp
|
||||
pop rdi
|
||||
cdq
|
||||
push rdx
|
||||
push rdi
|
||||
push rsp
|
||||
pop rsi
|
||||
mov al, 0x3b
|
||||
syscall
|
||||
|
||||
+-------------------------------------------------------------------
|
||||
|
||||
# rafind2 - Search
|
||||
|
||||
-Z: Look for Zero terminated strings
|
||||
|
||||
-s str: Look for specifc string
|
||||
|
||||
-X: Hex dump around output
|
||||
|
||||
+ Search "/bin/sh" in libc
|
||||
|
||||
rafind2 -X -s "/bin/sh" /usr/lib/libc.so.6
|
||||
|
||||
# ragg2 - Shellcode generator, C/opcode compiler
|
||||
|
||||
P: Generate De Bruijn patterns
|
||||
ragg2 -P 300 -r
|
||||
|
||||
-a arch: Configure architecture
|
||||
|
||||
-b bits: Specify architecture bits (32/64)
|
||||
|
||||
-i shellcode: Specify shellcode to generate
|
||||
|
||||
-e encoder: Specify encoder
|
||||
|
||||
+ ragg2-cc: Generate shellcode from c
|
||||
|
||||
+ Generate a x86, 32 bits exec shellcode
|
||||
ragg2 -a x86 -b 32 -i exec
|
||||
|
||||
# rabin2 - Executable analysis: symbols, imports, strings
|
||||
|
||||
-I: Executable information
|
||||
|
||||
-C: Returns classes. Useful to list Java Classes
|
||||
|
||||
-l: Dynamic linked libraries
|
||||
|
||||
-s: Symbols
|
||||
|
||||
-z: Strings
|
||||
|
||||
# rarun2 - Launcher to run programs with different environments, args, stdin, permissions, fds
|
||||
|
||||
r2 -b 32 -d rarun2 program=pwn1 arg1=$(ragg2 -P 300 -r) : runs pwn1 with a De Bruijn Pattern as first argument, inside radare2's debugger, and force 32 bits
|
||||
r2 -d rarun2 program=/bin/ls stdin=$(python exploit.py) : runs /bin/ls with the output of exploit.py directed to stdin
|
||||
|
||||
# ESIL emulation
|
||||
|
||||
1) aei: Initialize ESIL VM
|
||||
|
||||
2) aeim: Assign ESIL stack
|
||||
aeim 0xffffd000 0x1000 stack
|
||||
|
||||
3) aeip: Program counter to current seek
|
||||
|
||||
4) e io.cache=true: Enable caching read/write of virtual memory (Important if self modifying code)
|
||||
|
||||
5) aes: Single stepping in emulation mode
|
||||
|
||||
+ Toggle IL representation via O in Visual Mode
|
||||
|
||||
# ESIL Linear emulation
|
||||
|
||||
Find all references to curr. address using linear esil emulation on all imports.
|
||||
|
||||
/re$$@@ sym.imp.*
|
||||
|
||||
# ESIL IL Representation
|
||||
|
||||
op esil
|
||||
------------
|
||||
mov =
|
||||
mul *
|
||||
div /
|
||||
and &
|
||||
neg !
|
||||
read []
|
||||
if ?{
|
||||
add +
|
||||
sub -
|
||||
xor ^
|
||||
or |
|
||||
cmp ==
|
||||
write =[]
|
||||
|
||||
+ prefix is %
|
||||
+ carry from bit x -> %cx
|
||||
+ borrow from bit x -> %bx
|
||||
+ zero-flag -> %z
|
||||
+ parity of dst -> %p
|
||||
+ sign-flag -> %s
|
||||
+ overflow-flag -> %o
|
||||
|
||||
+ BREAK - Stop parsing and emulate next instruction
|
||||
+ LOOP - restart emulation of instruction
|
||||
+ GOTO n - jump to n
|
||||
+ TODO - stop emulation and eprintf("TDOD %s", ins)
|
||||
|
||||
x86 ESIL
|
||||
------------------------------------------------------
|
||||
mov eax, ebx ebx,eax,=
|
||||
jz 0xaabbccdd zf,?{,0xaabbccdd,eip,=,}
|
||||
cmp ecx,edx edx,ecx,==,%z,zf,=,%b32,cf,=,%p,pf,=,%s,sf,=
|
||||
push ebp 4,esp,-=ebp,esp,=[4]
|
||||
|
||||
+ ESIL Doc
|
||||
https://github.com/radare/radare2book/blob/master/esil.md
|
||||
|
||||
# r2pipe commands
|
||||
|
||||
+ Invoke r2pipe script via r2 cmdline
|
||||
|
||||
[0x00000000]> #!pipe node script.js
|
||||
[0x00000000]> #!pipe python script.py
|
||||
|
||||
+ Good collection:
|
||||
https://radare.org/get/r2pipe-nn2015.pdf
|
||||
https://github.com/jpenalbae/r2-scripts
|
||||
# Parsing ELF
|
||||
|
||||
!!! open with r2 -nn
|
||||
|
||||
+ Parse 9 program headers (elf_phdr) from curr. seek plus offset 0x40 with temporary block size 0x200 in less mode (~..)
|
||||
|
||||
[0x00000000]> pf 9? (elf_phdr)phdr @ $$+0x40!0x200~..
|
||||
|
||||
# pf Templates
|
||||
|
||||
+ Generate templates for structs/enums with td command
|
||||
|
||||
"td enum elf_class {ELFCLASSNONE=0, ELFCLASS32=1, ELFCLASS64=2};"
|
||||
|
||||
https://github.com/Maijin/r2-pf-templates/
|
||||
|
||||
+ Cast data @ <addr> to <type> and print it
|
||||
|
||||
tp <type> = <address>
|
||||
|
||||
# r2scapy
|
||||
|
||||
r2 -i r2scapy.py dump.bin
|
||||
[0x00000000]> scapy DNS 0x81de3c 48
|
||||
DNS(aa=1L, qr=1L, an=DNSRR(rclass=32769, ttl=120, rrname='flashair.local.', rdata='192.168.0.1', type=1), ad=0L, nscount=0, qdcount=1, ns=None, tc=0L, rd=1L, arcount=0, ar=None, opcode=0L, ra=0L, cd=0L, z=0L, rcode=0L, id=0, ancount=1, qd=DNSQR(qclass=32769, qtype=255, qname='flashair.local.'))
|
||||
|
||||
+ generate packets with scapy
|
||||
>>> from scapy.all import *
|
||||
>>> sr1(IP(dst="8.8.8.8")/UDP(dport=53)/DNS(rd=1,qd=DNSQR(qname="www.thepacketgeek.com")),verbose=0)
|
||||
|
||||
# r2m2 -Miasm Intermediate Representation Plugin
|
||||
|
||||
+ Assemble and disassemble MIPS32 using rasm2
|
||||
|
||||
r2m2$ export R2M2_ARCH=mips32l; rasm2 -a r2m2 'addiu a0, a1, 2' |rasm2 -a r2m2 -d -
|
||||
ADDIU A0, A1, 0x2
|
||||
|
||||
+ Disassemble random MSP430 instructions in r2
|
||||
|
||||
r2m2$ R2M2_ARCH=msp430 r2 -a r2m2 -qc 'woR; pd 5' -
|
||||
0x00000000 07fa and.w R10, R7
|
||||
0x00000002 47ad dadd.b R13, R7
|
||||
0x00000004 f05e0778 add.b @R14+, 0x7807(PC)
|
||||
0x00000008 f46d81ed addc.b @R13+, 0xED81(R4)
|
||||
0x0000000c 3fdc bis.w @R12+, R15
|
||||
+ Assemble MIPS32 using rasm2 and display the call graph using r2
|
||||
|
||||
r2m2$ R2M2_ARCH=mips32b rasm2 -a r2m2 'j 0x4; nop' -B > j_nop.bin
|
||||
|
||||
r2m2$ R2M2_ARCH=mips32b r2 -a r2m2 -qc 'pd 2' j_nop.bin
|
||||
,=< 0x00000000 0c000001 JAL 0x4
|
||||
`-> 0x00000004 00000000 NOP
|
||||
|
||||
# bin carving with r2
|
||||
|
||||
+ Open raw dump
|
||||
|
||||
r2 -n dump.bin
|
||||
|
||||
+ Searching for magic
|
||||
|
||||
[0x00000000]> / \x7fELF
|
||||
Searching 4 bytes from 0x00000000 to 0x0000002d: 7f 45 4c 46
|
||||
0x00001340 hit0_0
|
||||
0x00001744 hit0_1
|
||||
...
|
||||
|
||||
+ Dump 1M with at several hits
|
||||
|
||||
[0x00000000]> b 1M
|
||||
[0x00000000]> wt @@ hit0*
|
||||
|
||||
+ Automate it
|
||||
|
||||
$ for a in dump.* ; do
|
||||
sz=`rabin2 -Z $a` # get RBin.filesize
|
||||
r2 -wnqc"r $sz" $a # resize file
|
||||
done
|
||||
|
||||
http://radare.today/posts/carving-bins/
|
||||
|
||||
# r4ge - symbolic execution
|
||||
+ https://github.com/gast04/r4ge
|
||||
|
||||
Usage: https://asciinema.org/a/155856
|
||||
|
||||
# r2wiki -Macro for using wiki in commandline
|
||||
|
||||
+ https://github.com/securisec/r2wiki
|
||||
|
||||
$wiki "query string"
|
||||
|
26
cheat/cheatsheets/rcs
Normal file
26
cheat/cheatsheets/rcs
Normal file
@ -0,0 +1,26 @@
|
||||
# Initial check-in of file (leaving file active in filesystem)
|
||||
ci -u <filename>
|
||||
|
||||
# Check out with lock
|
||||
co -l <filename>
|
||||
|
||||
# Check in and unlock (leaving file active in filesystem)
|
||||
ci -u <filename>
|
||||
|
||||
# Display version x.y of a file
|
||||
co -px.y <filename>
|
||||
|
||||
# Undo to version x.y (overwrites file active in filesystem with the specified revision)
|
||||
co -rx.y <filename>
|
||||
|
||||
# Diff file active in filesystem and last revision
|
||||
rcsdiff <filename>
|
||||
|
||||
# Diff versions x.y and x.z
|
||||
rcsdiff -rx.y -rx.z <filename>
|
||||
|
||||
# View log of check-ins
|
||||
rlog <filename>
|
||||
|
||||
# Break an RCS lock held by another person on a file
|
||||
rcs -u <filename>
|
2
cheat/cheatsheets/rename
Normal file
2
cheat/cheatsheets/rename
Normal file
@ -0,0 +1,2 @@
|
||||
# Lowercase all files and folders in current directory
|
||||
rename 'y/A-Z/a-z/' *
|
@ -4,6 +4,9 @@ rpm -ivh <rpm>
|
||||
# To remove a package:
|
||||
rpm -e <package>
|
||||
|
||||
# To remove a package, but not its dependencies
|
||||
rpm -e --nodeps <package>
|
||||
|
||||
# To find what package installs a file:
|
||||
rpm -qf </path/to/file>
|
||||
|
||||
@ -17,3 +20,12 @@ rpm -q --whatrequires <file>
|
||||
|
||||
# To list all installed packages:
|
||||
rpm -qa
|
||||
|
||||
# To find a pkg's dependencies
|
||||
rpm -i --test <package>
|
||||
|
||||
# Display checksum against source
|
||||
rpm -K <package>
|
||||
|
||||
# Verify a package
|
||||
rpm -V <package>
|
||||
|
5
cheat/cheatsheets/rpm2cpio
Normal file
5
cheat/cheatsheets/rpm2cpio
Normal file
@ -0,0 +1,5 @@
|
||||
# List contents of RPM
|
||||
rpm2cpio foo.rpm | cpio -vt
|
||||
|
||||
# Extract contents of RPM
|
||||
rpm2cpio foo.rpm | cpio -vid
|
21
cheat/cheatsheets/rss2email
Normal file
21
cheat/cheatsheets/rss2email
Normal file
@ -0,0 +1,21 @@
|
||||
'rss2email -- converts rss feeds and emails them to your inbox'
|
||||
|
||||
# List all feeds
|
||||
r2e list
|
||||
|
||||
# Convert RSS entries to email
|
||||
r2e run
|
||||
|
||||
# Add a new feed
|
||||
r2e add <feed address>
|
||||
|
||||
# Add a new feed with new email address
|
||||
r2e add <feed address> [newemail address]
|
||||
|
||||
# Delete a feed
|
||||
r2e delete <# of feed in list/>
|
||||
|
||||
# Help
|
||||
r2e -h
|
||||
|
||||
|
@ -12,3 +12,6 @@ rsync -auv /src/foo /dest
|
||||
|
||||
# Explicitly copy /src/foo to /dest/foo
|
||||
rsync -auv /src/foo/ /dest/foo
|
||||
|
||||
# Copy file from local to remote over ssh with non standard port 1234 to destination folder in remoteuser's home directory
|
||||
rsync -avz -e "ssh -p1234" /source/file1 remoteuser@X.X.X.X:~/destination/
|
||||
|
20
cheat/cheatsheets/scd
Normal file
20
cheat/cheatsheets/scd
Normal file
@ -0,0 +1,20 @@
|
||||
# To index recursively some paths for the very first run:
|
||||
scd -ar ~/Documents/
|
||||
|
||||
# To change to a directory path matching "doc":
|
||||
scd doc
|
||||
|
||||
# To change to a path matching all of "a", "b" and "c":
|
||||
scd a b c
|
||||
|
||||
# To change to a directory path that ends with "ts":
|
||||
scd "ts$"
|
||||
|
||||
# To show selection menu and ranking of 20 most likely directories:
|
||||
scd -v
|
||||
|
||||
# To alias current directory as "xray":
|
||||
scd --alias=xray
|
||||
|
||||
# To jump to a previously defined aliased directory:
|
||||
scd xray
|
@ -3,3 +3,6 @@ scp foo.txt user@example.com:remote/dir
|
||||
|
||||
# To copy a file from a remote server to your local machine:
|
||||
scp user@example.com:remote/dir/foo.txt local/dir
|
||||
|
||||
# To scp a file over a SOCKS proxy on localhost and port 9999 (see ssh for tunnel setup):
|
||||
scp -o "ProxyCommand nc -x 127.0.0.1:9999 -X 4 %h %p" file.txt username@example2.com:/tmp/
|
||||
|
@ -15,3 +15,9 @@ sed '/^$/d' file.txt
|
||||
|
||||
# To replace newlines in multiple lines
|
||||
sed ':a;N;$!ba;s/\n//g' file.txt
|
||||
|
||||
# Insert a line before a matching pattern:
|
||||
sed '/Once upon a time/i\Chapter 1'
|
||||
|
||||
# Add a line after a matching pattern:
|
||||
sed '/happily ever after/a\The end.'
|
||||
|
8
cheat/cheatsheets/shutdown
Normal file
8
cheat/cheatsheets/shutdown
Normal file
@ -0,0 +1,8 @@
|
||||
# Reboot the system immediately
|
||||
shutdown -r now
|
||||
|
||||
# Shut system down immediately
|
||||
shutdown -h now
|
||||
|
||||
# Reboot system after 5 minutes
|
||||
shutdown -r +5
|
15
cheat/cheatsheets/slurm
Normal file
15
cheat/cheatsheets/slurm
Normal file
@ -0,0 +1,15 @@
|
||||
# Submit a new job:
|
||||
sbatch job.sh
|
||||
|
||||
# List all jobs for a user:
|
||||
squeue -u user_name
|
||||
|
||||
# Cancel a job by id or name:
|
||||
scancel job_id
|
||||
scancel --name job_name
|
||||
|
||||
# List all information for a job:
|
||||
scontrol show jobid -dd job_id
|
||||
|
||||
# Status info for currently running job:
|
||||
sstat --format=AveCPU,AvePages,AveRSS,AveVMSize,JobID -j job_id --allsteps
|
98
cheat/cheatsheets/snap
Normal file
98
cheat/cheatsheets/snap
Normal file
@ -0,0 +1,98 @@
|
||||
# To find the `foo` snap:
|
||||
snap find foo
|
||||
|
||||
# To view detailed information about snap `foo`:
|
||||
snap info foo
|
||||
|
||||
# To view all private snaps (must be logged in):
|
||||
snap find --private
|
||||
|
||||
# To install the `foo` snap:
|
||||
sudo snap install foo
|
||||
|
||||
# To install the `foo` snap from the "beta" channel:
|
||||
sudo snap install foo --channel=beta
|
||||
|
||||
# To view installed snaps:
|
||||
snap list
|
||||
|
||||
# To list all revisions of installed snaps:
|
||||
snap list --all
|
||||
|
||||
# To (manually) update all snaps:
|
||||
sudo snap refresh
|
||||
|
||||
# To (manually) update the `foo` snap:
|
||||
sudo snap refresh foo
|
||||
|
||||
# To update the `foo` snap to the "beta" channel:
|
||||
sudo snap refresh foo --channel=beta
|
||||
|
||||
# To revert the `foo` snap to a prior version:
|
||||
sudo snap revert foo
|
||||
|
||||
# To revert the `foo` snap to revision 5:
|
||||
snap revert foo --revision 5
|
||||
|
||||
# To remove the `foo` snap:
|
||||
sudo snap remove foo
|
||||
|
||||
# To log in to snap (must first create account online):
|
||||
sudo snap login
|
||||
|
||||
# To log out of snap:
|
||||
snap logout
|
||||
|
||||
# To view a transaction log summary:
|
||||
snap changes
|
||||
|
||||
# To view details of item 123 in the transaction log:
|
||||
snap change 123
|
||||
|
||||
# To watch transaction 123:
|
||||
snap watch 123
|
||||
|
||||
# To abort transaction 123:
|
||||
snap abort 123
|
||||
|
||||
# To download the `foo` snap (and its assertions) *without* installing it:
|
||||
snap download foo
|
||||
|
||||
# To install the locally-downloaded `foo` snap with assertions:
|
||||
snap ack foo.assert
|
||||
snap install foo.snap
|
||||
|
||||
# To install the locally-downloaded `foo` snap without assertions:
|
||||
# NB: this is dangerous, because the integrity of the snap will not be
|
||||
# verified. You should only do this to test a snap that you are currently
|
||||
# developing.
|
||||
snap install --dangerous foo.snap
|
||||
|
||||
# To install snap `foo` in "dev mode":
|
||||
# NB: this is dangerous, and bypasses the snap sandboxing mechanisms
|
||||
snap install --devmode foo
|
||||
|
||||
# To install snap `foo` in "classic mode":
|
||||
# NB: this is likewise dangerous
|
||||
snap install --classic foo
|
||||
|
||||
# To view available snap interfaces:
|
||||
snap interfaces
|
||||
|
||||
# To connect the `foo:camera` plug to the ubuntu core slot:
|
||||
snap connect foo:camera :camera
|
||||
|
||||
# To disconnect the `foo:camera` plug from the ubuntu core slot:
|
||||
snap disconnect foo:camera
|
||||
|
||||
# To disable the `foo` snap
|
||||
snap disable foo
|
||||
|
||||
# To enable the `foo` snap
|
||||
snap enable foo
|
||||
|
||||
# To set snap `foo`'s `bar` property to 10:
|
||||
snap set foo bar=10
|
||||
|
||||
# To read snap `foo`'s current `bar` property:
|
||||
snap get foo bar
|
37
cheat/cheatsheets/socat
Normal file
37
cheat/cheatsheets/socat
Normal file
@ -0,0 +1,37 @@
|
||||
# socat connect to http-server (port 80 on 'butzel.info')
|
||||
socat TCP4:butzel.info:80 -
|
||||
|
||||
# connect to https-server (port 443 on 'butzel.info' with tls)
|
||||
socat openssl:butzel.info:443 -
|
||||
|
||||
# tcp-listener (port 3180), output as hexdump (-x) and fork for new connetions
|
||||
socat -x tcp-listen:3180,fork -
|
||||
|
||||
# practical examples:
|
||||
|
||||
# complete real working http-example:
|
||||
# (sleep is necessary to prevent socat closing socket before data received)
|
||||
(echo -e "GET / HTTP/1.1\r\nHost: butzel.info\r\n\r" && sleep 1) \
|
||||
| socat tcp4:butzel.info:80 -
|
||||
|
||||
# http to httpS 'Proxy' (for an webserver without TLS-Support)
|
||||
socat OPENSSL-LISTEN:443,reuseaddr,pf=ip4,fork,cert=server.pem,cafile=client.crt,verify=0 TCP4-CONNECT:127.0.0.1:80
|
||||
|
||||
# port forwarding (e.g. own port 3180 to port 22(ssh) on target
|
||||
socat TCP4-LISTEN:3180,reuseaddr,fork TCP4:butzel.info:ssh
|
||||
|
||||
# TOR-forwarding (needs tor-daemon on port 9050 running)
|
||||
socat tcp4-listen:8080,reuseaddr,fork socks4A:127.0.0.1:t0rhidd3ns3rvice.onion:80,socksport=9050
|
||||
|
||||
# network (port 8266) to serial bridge (/dev/ttyUSB0 baudrate: 115200)
|
||||
socat TCP4-LISTEN:8266,fork,reuseaddr /dev/ttyUSB0,raw,crnl,b115200
|
||||
|
||||
# udp to tcp
|
||||
socat -u udp-recvfrom:1234,fork tcp:localhost:4321
|
||||
|
||||
# reverse shell:
|
||||
socat exec:'bash -i',pty,stderr tcp:remote.butzel.info:3180
|
||||
|
||||
# listener for above reverse shell (on remote.butzel.info):
|
||||
socat file:`tty`,raw,echo=0 tcp-listen:3180
|
||||
# or: nc -lp 3180
|
32
cheat/cheatsheets/sport
Normal file
32
cheat/cheatsheets/sport
Normal file
@ -0,0 +1,32 @@
|
||||
# Sync to newest SlackBuild.org tree
|
||||
sport r
|
||||
|
||||
# Search (fuzzy) SlackBuild tree for packages foo and BaR
|
||||
sport s foo bar
|
||||
|
||||
# Operate from alternate build tree
|
||||
SBOPATH=/path/to/tree sport s foo
|
||||
|
||||
# View info and README of BaR (not fuzzy)
|
||||
sport c foo BaR
|
||||
|
||||
# Build a package
|
||||
sport i --build-only foo
|
||||
|
||||
# Build and install package foo and BaR
|
||||
sport i foo BaR
|
||||
|
||||
# Build and install package from current directory
|
||||
sport i .
|
||||
|
||||
# Upgrade instead of install
|
||||
INSTALLER=upgradepkg sport i foo
|
||||
|
||||
# Build dependency list for baz
|
||||
echo "foo BaR" >> /tmp/baz.list
|
||||
|
||||
# Install list of packages from file
|
||||
sport i $(< /tmp/baz.list)
|
||||
|
||||
# Check if package is installed
|
||||
sport k foo
|
20
cheat/cheatsheets/sqlite3
Normal file
20
cheat/cheatsheets/sqlite3
Normal file
@ -0,0 +1,20 @@
|
||||
# create database and launch interactive shell
|
||||
sqlite3 example.db
|
||||
|
||||
# create table
|
||||
sqlite3 example.db "CREATE TABLE Os(ID INTEGER PRIMARY KEY, Name TEXT, Year INTEGER);"
|
||||
|
||||
# insert data
|
||||
sqlite3 example.db "INSERT INTO 'Os' VALUES(1,'Linux',1991);"
|
||||
|
||||
# list tables
|
||||
sqlite3 example.db ".tables"
|
||||
|
||||
# view records in table
|
||||
sqlite3 example.db "SELECT * FROM 'Os';"
|
||||
|
||||
# view records in table conditionally
|
||||
sqlite example.db "SELECT * FROM 'Os' WHERE Year='1991';"
|
||||
|
||||
# view records with fuzzy matching
|
||||
sqlite3 ~/example.db "SELECT * FROM 'Os' WHERE Year like '19%';"
|
@ -23,6 +23,9 @@ ssh -X -t user@example.com 'chromium-browser'
|
||||
# To create a SOCKS proxy on localhost and port 9999
|
||||
ssh -D 9999 user@example.com
|
||||
|
||||
# To tunnel an ssh session over the SOCKS proxy on localhost and port 9999
|
||||
ssh -o "ProxyCommand nc -x 127.0.0.1:9999 -X 4 %h %p" username@example2.com
|
||||
|
||||
# -X use an xsession, -C compress data, "-c blowfish" use the encryption blowfish
|
||||
ssh user@example.com -C -c blowfish -X
|
||||
|
||||
@ -32,3 +35,12 @@ ssh user@example.com -C -c blowfish -X
|
||||
# Copy files and folders through ssh from remote host to pwd with tar.gz compression
|
||||
# when there is no rsync command available
|
||||
ssh user@example.com "cd /var/www/Shared/; tar zcf - asset1 asset2" | tar zxf -
|
||||
|
||||
# Mount folder/filesystem through SSH
|
||||
# Install SSHFS from https://github.com/libfuse/sshfs
|
||||
# Will allow you to mount a folder securely over a network.
|
||||
sshfs name@server:/path/to/folder /path/to/mount/point
|
||||
|
||||
# Emacs can read file through SSH
|
||||
# Doc: http://www.gnu.org/software/emacs/manual/html_node/emacs/Remote-Files.html
|
||||
emacs /ssh:name@server:/path/to/file
|
||||
|
2
cheat/cheatsheets/su
Normal file
2
cheat/cheatsheets/su
Normal file
@ -0,0 +1,2 @@
|
||||
# Switch to another user account
|
||||
su USERNAME
|
20
cheat/cheatsheets/svn
Normal file
20
cheat/cheatsheets/svn
Normal file
@ -0,0 +1,20 @@
|
||||
# update working copy from repository
|
||||
svn update "/path"
|
||||
|
||||
# show changed files in working copy
|
||||
svn status
|
||||
|
||||
# show what changed in local file
|
||||
svn diff "/path/filename"
|
||||
|
||||
# add files or folders
|
||||
svn add "path/item"
|
||||
|
||||
# revert local uncommited changes
|
||||
svn revert "/path/file"
|
||||
|
||||
# commit changes to repo
|
||||
svn commit -m "message" "/path"
|
||||
|
||||
# show help for 'svn diff'
|
||||
svn help diff
|
18
cheat/cheatsheets/systemd
Normal file
18
cheat/cheatsheets/systemd
Normal file
@ -0,0 +1,18 @@
|
||||
# Display process startup time
|
||||
systemd-analyze
|
||||
|
||||
# Display process startup time at service level
|
||||
systemd-analyze blame
|
||||
|
||||
# List running units
|
||||
systemctl list-units
|
||||
|
||||
# Load a unit at startup
|
||||
systemctl enable foo.service
|
||||
|
||||
# Start or Stop a unit
|
||||
systemctl <start | stop> foo.service
|
||||
|
||||
# Unit file locations
|
||||
/etc/systemd/system
|
||||
/usr/lib/systemd/system
|
@ -19,8 +19,16 @@ tar -xjvf /path/to/foo.tgz
|
||||
# To create a .bz2 archive:
|
||||
tar -cjvf /path/to/foo.tgz /path/to/foo/
|
||||
|
||||
# To extract a .tar in specified Directory:
|
||||
tar -xvf /path/to/foo.tar -C /path/to/destination/
|
||||
|
||||
# To list the content of an .bz2 archive:
|
||||
tar -jtvf /path/to/foo.tgz
|
||||
|
||||
# To create a .gz archive and exclude all jpg,gif,... from the tgz
|
||||
tar czvf /path/to/foo.tgz --exclude=\*.{jpg,gif,png,wmv,flv,tar.gz,zip} /path/to/foo/
|
||||
|
||||
# To use parallel (multi-threaded) implementation of compression algorithms:
|
||||
tar -z ... -> tar -Ipigz ...
|
||||
tar -j ... -> tar -Ipbzip2 ...
|
||||
tar -J ... -> tar -Ipixz ...
|
||||
|
@ -3,3 +3,6 @@ ls | tee outfile.txt
|
||||
|
||||
# To tee stdout and append to a file:
|
||||
ls | tee -a outfile.txt
|
||||
|
||||
# To tee stdout to the terminal, and also pipe it into another program for further processing:
|
||||
ls | tee /dev/tty | xargs printf "\033[1;34m%s\033[m\n"
|
||||
|
@ -13,6 +13,12 @@ tmux attach -d
|
||||
# Display session:
|
||||
tmux ls
|
||||
|
||||
# Rename session:
|
||||
Ctrl-b $
|
||||
|
||||
# Switch session:
|
||||
Ctrl-b s
|
||||
|
||||
# Start a shared session:
|
||||
tmux -S /tmp/your_shared_session
|
||||
chmod 777 /tmp/your_shared_session
|
||||
|
22
cheat/cheatsheets/tr
Normal file
22
cheat/cheatsheets/tr
Normal file
@ -0,0 +1,22 @@
|
||||
#replace : with new line
|
||||
echo $PATH|tr ":" "\n" #equivalent with:
|
||||
echo $PATH|tr -t ":" \n
|
||||
|
||||
#remove all occurance of "ab"
|
||||
echo aabbcc |tr -d "ab"
|
||||
#ouput: cc
|
||||
|
||||
#complement "aa"
|
||||
echo aabbccd |tr -c "aa" 1
|
||||
#output: aa11111 without new line
|
||||
#tip: Complement meaning keep aa,all others are replaced with 1
|
||||
|
||||
#complement "ab\n"
|
||||
echo aabbccd |tr -c "ab\n" 1
|
||||
#output: aabb111 with new line
|
||||
|
||||
#Preserve all alpha(-c). ":-[:digit:] etc" will be translated to "\n". sequeeze mode.
|
||||
echo $PATH|tr -cs "[:alpha:]" "\n"
|
||||
|
||||
#ordered list to unordered list
|
||||
echo "1. /usr/bin\n2. /bin" |tr -cs " /[:alpha:]\n" "+"
|
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user