所有命令 ()

linux命令:export BIN=`which nmap` && sudo setcap cap_net_raw,cap_net_admin+eip $BIN && sudo chown root $BIN && sudo chmod u+s $BIN $BIN u+s chmod sudo && $BIN root chown sudo && $BIN cap_net_raw,cap_net_admin+eip setcap sudo && nmap` BIN=`which export export BIN=`which nmap` && sudo setcap cap_net_raw,cap_net_admin+eip $BIN && sudo chown root $BIN && sudo chmod u+s $BINrootopen.com
linux命令:export BIN=`which nmap` && sudo setcap cap_net_raw,cap_net_admin+eip $BIN && sudo chown root $BIN && sudo chmod u+s $BIN $BIN u+s chmod sudo && $BIN root chown sudo && $BIN cap_net_raw,cap_net_admin+eip setcap sudo && nmap` BIN=`which export export BIN=`which nmap` && sudo setcap cap_net_raw,cap_net_admin+eip $BIN && sudo chown root $BIN && sudo chmod u+s $BINrootopen.com
katu 2019-06-04 22:35:28

linux命令:bitgen hex 12312381273918273128937128912c3b1293cb712938cb12983cb192cb1289b3 info info 12312381273918273128937128912c3b1293cb712938cb12983cb192cb1289b3 hex bitgen bitgen hex 12312381273918273128937128912c3b1293cb712938cb12983cb192cb1289b3 inforootopen.com
linux命令:bitgen hex 12312381273918273128937128912c3b1293cb712938cb12983cb192cb1289b3 info info 12312381273918273128937128912c3b1293cb712938cb12983cb192cb1289b3 hex bitgen bitgen hex 12312381273918273128937128912c3b1293cb712938cb12983cb192cb1289b3 inforootopen.com
katu 2019-06-04 22:35:05

linux命令:sudo synogear install && sudo su su sudo && install synogear sudo sudo synogear install && sudo surootopen.com
linux命令:sudo synogear install && sudo su su sudo && install synogear sudo sudo synogear install && sudo surootopen.com
katu 2019-06-04 22:34:02

linux命令:sed 's/linux-[^ ]* \{0,1\}//g' /path/to/file /path/to/file \{0,1\}//g' ]* 's/linux-[^ sed sed 's/linux-[^ ]* \{0,1\}//g' /path/to/filerootopen.com
linux命令:sed 's/linux-[^ ]* \{0,1\}//g' /path/to/file /path/to/file \{0,1\}//g' ]* 's/linux-[^ sed sed 's/linux-[^ ]* \{0,1\}//g' /path/to/filerootopen.com
katu 2019-06-04 22:33:07

linux命令:du -h --max-depth=1 --one-file-system / / --one-file-system --max-depth=1 -h du du -h --max-depth=1 --one-file-system /rootopen.com
linux命令:du -h --max-depth=1 --one-file-system / / --one-file-system --max-depth=1 -h du du -h --max-depth=1 --one-file-system /rootopen.com
katu 2019-06-04 22:32:37

linux命令:function memo() { history | grep -i $@ | awk '! seen[$2]++'; } } seen[$2]++'; '! awk | $@ -i grep | history { memo() function function memo() { history | grep -i $@ | awk '! seen[$2]++'; }rootopen.com
linux命令:function memo() { history | grep -i $@ | awk '! seen[$2]++'; } } seen[$2]++'; '! awk | $@ -i grep | history { memo() function function memo() { history | grep -i $@ | awk '! seen[$2]++'; }rootopen.com
katu 2019-06-04 22:32:08

linux命令:h(){ echo $@|awk '{d($1,$2,$3,$4);} function d(x,y,x2,y2,a,c,dx,dy){dx=r(x2-x);dy=r(y2-y);x=r(x);x2=r(x2);a=(sin(dx/2))^2+cos(x)*cos(x2)*(sin(dy/2))^2;c=2*atan2(sqrt(a),sqrt(1-a)); printf("%.4f",6372.8*c);} function r(g){return g*(3.1415926/180.);}';} g*(3.1415926/180.);}';} r(g){return function printf("%.4f",6372.8*c);} d(x,y,x2,y2,a,c,dx,dy){dx=r(x2-x);dy=r(y2-y);x=r(x);x2=r(x2);a=(sin(dx/2))^2+cos(x)*cos(x2)*(sin(dy/2))^2;c=2*atan2(sqrt(a),sqrt(1-a)); function '{d($1,$2,$3,$4);} $@|awk echo h(){ h(){ echo $@|awk '{d($1,$2,$3,$4);} function d(x,y,x2,y2,a,c,dx,dy){dx=r(x2-x);dy=r(y2-y);x=r(x);x2=r(x2);a=(sin(dx/2))^2+cos(x)*cos(x2)*(sin(dy/2))^2;c=2*atan2(sqrt(a),sqrt(1-a)); printf("%.4f",6372.8*c);} function r(g){return g*(3.1415926/180.);}';}rootopen.com
linux命令:h(){ echo $@|awk '{d($1,$2,$3,$4);} function d(x,y,x2,y2,a,c,dx,dy){dx=r(x2-x);dy=r(y2-y);x=r(x);x2=r(x2);a=(sin(dx/2))^2+cos(x)*cos(x2)*(sin(dy/2))^2;c=2*atan2(sqrt(a),sqrt(1-a)); printf("%.4f",6372.8*c);} function r(g){return g*(3.1415926/180.);}';} g*(3.1415926/180.);}';} r(g){return function printf("%.4f",6372.8*c);} d(x,y,x2,y2,a,c,dx,dy){dx=r(x2-x);dy=r(y2-y);x=r(x);x2=r(x2);a=(sin(dx/2))^2+cos(x)*cos(x2)*(sin(dy/2))^2;c=2*atan2(sqrt(a),sqrt(1-a)); function '{d($1,$2,$3,$4);} $@|awk echo h(){ h(){ echo $@|awk '{d($1,$2,$3,$4);} function d(x,y,x2,y2,a,c,dx,dy){dx=r(x2-x);dy=r(y2-y);x=r(x);x2=r(x2);a=(sin(dx/2))^2+cos(x)*cos(x2)*(sin(dy/2))^2;c=2*atan2(sqrt(a),sqrt(1-a)); printf("%.4f",6372.8*c);} function r(g){return g*(3.1415926/180.);}';}rootopen.com
katu 2019-06-04 22:31:14

linux命令:rename 's/\d+/sprintf("%04d",$&)/e' * * 's/\d+/sprintf("%04d",$&)/e' rename rename 's/\d+/sprintf("%04d",$&)/e' *rootopen.com
linux命令:rename 's/\d+/sprintf("%04d",$&)/e' * * 's/\d+/sprintf("%04d",$&)/e' rename rename 's/\d+/sprintf("%04d",$&)/e' *rootopen.com
katu 2019-06-04 22:29:09

linux命令: whois rootopen.com | grep -E '^\s{3}' '^\s{3}' -E grep | rootopen.com whois whois rootopen.com | grep -E '^\s{3}'rootopen.com
linux命令: whois rootopen.com | grep -E '^\s{3}' '^\s{3}' -E grep | rootopen.com whois whois rootopen.com | grep -E '^\s{3}'rootopen.com
katu 2019-06-04 22:28:52

linux命令:patator ssh_login host=192.168.1.16 port=22 user=FILE0 0=user.lst password=FILE1 1=pass.lst -x ignore:mesg='Authentication failed.' failed.' ignore:mesg='Authentication -x 1=pass.lst password=FILE1 0=user.lst user=FILE0 port=22 host=192.168.1.16 ssh_login patator patator ssh_login host=192.168.1.16 port=22 user=FILE0 0=user.lst password=FILE1 1=pass.lst -x ignore:mesg='Authentication failed.'rootopen.com
linux命令:patator ssh_login host=192.168.1.16 port=22 user=FILE0 0=user.lst password=FILE1 1=pass.lst -x ignore:mesg='Authentication failed.' failed.' ignore:mesg='Authentication -x 1=pass.lst password=FILE1 0=user.lst user=FILE0 port=22 host=192.168.1.16 ssh_login patator patator ssh_login host=192.168.1.16 port=22 user=FILE0 0=user.lst password=FILE1 1=pass.lst -x ignore:mesg='Authentication failed.'rootopen.com
katu 2019-06-04 22:28:16

linux命令:ssh-copy-id -i your-ed25519-key user@host user@host your-ed25519-key -i ssh-copy-id ssh-copy-id -i your-ed25519-key user@hostrootopen.com
linux命令:ssh-copy-id -i your-ed25519-key user@host user@host your-ed25519-key -i ssh-copy-id ssh-copy-id -i your-ed25519-key user@hostrootopen.com
katu 2019-06-04 22:27:39

linux命令:stringContains() { [ -z "${2##*$1*}" ] && [ -z "$1" -o -n "$2" ]; } } ]; "$2" -n -o "$1" -z [ && ] "${2##*$1*}" -z [ { stringContains() stringContains() { [ -z "${2##*$1*}" ] && [ -z "$1" -o -n "$2" ]; }rootopen.com
linux命令:stringContains() { [ -z "${2##*$1*}" ] && [ -z "$1" -o -n "$2" ]; } } ]; "$2" -n -o "$1" -z [ && ] "${2##*$1*}" -z [ { stringContains() stringContains() { [ -z "${2##*$1*}" ] && [ -z "$1" -o -n "$2" ]; }rootopen.com
katu 2019-06-04 22:26:02

linux命令:install -b -m 777 /dev/null file.txt file.txt /dev/null 777 -m -b install install -b -m 777 /dev/null file.txtrootopen.com
linux命令:install -b -m 777 /dev/null file.txt file.txt /dev/null 777 -m -b install install -b -m 777 /dev/null file.txtrootopen.com
katu 2019-06-04 22:23:01

linux命令:cp -a ~/.bash_history ~/.bash_history.bak && perl -ne 'print unless $seen{$_}++' ~/.bash_history.bak >~/.bash_history >~/.bash_history ~/.bash_history.bak $seen{$_}++' unless 'print -ne perl && ~/.bash_history.bak ~/.bash_history -a cp cp -a ~/.bash_history ~/.bash_history.bak && perl -ne 'print unless $seen{$_}++' ~/.bash_history.bak >~/.bash_historyrootopen.com
linux命令:cp -a ~/.bash_history ~/.bash_history.bak && perl -ne 'print unless $seen{$_}++' ~/.bash_history.bak >~/.bash_history >~/.bash_history ~/.bash_history.bak $seen{$_}++' unless 'print -ne perl && ~/.bash_history.bak ~/.bash_history -a cp cp -a ~/.bash_history ~/.bash_history.bak && perl -ne 'print unless $seen{$_}++' ~/.bash_history.bak >~/.bash_historyrootopen.com
katu 2019-06-04 22:22:40

linux命令:sort ~/.bash_history|uniq -c|sort -n|tail -n 10 10 -n -n|tail -c|sort ~/.bash_history|uniq sort sort ~/.bash_history|uniq -c|sort -n|tail -n 10rootopen.com
linux命令:sort ~/.bash_history|uniq -c|sort -n|tail -n 10 10 -n -n|tail -c|sort ~/.bash_history|uniq sort sort ~/.bash_history|uniq -c|sort -n|tail -n 10rootopen.com
katu 2019-06-04 22:20:41

linux命令:aws ec2 describe-instances --region us-east-1 --filters "Name=tag:YourTag,Values=YourValue" | jq '.["Reservations"]|.[]|.Instances|.[]|.IamInstanceProfile.Arn + "," +.InstanceId' +.InstanceId' "," + '.["Reservations"]|.[]|.Instances|.[]|.IamInstanceProfile.Arn jq | "Name=tag:YourTag,Values=YourValue" --filters us-east-1 --region describe-instances ec2 aws aws ec2 describe-instances --region us-east-1 --filters "Name=tag:YourTag,Values=YourValue" | jq '.["Reservations"]|.[]|.Instances|.[]|.IamInstanceProfile.Arn + "," +.InstanceId'rootopen.com
linux命令:aws ec2 describe-instances --region us-east-1 --filters "Name=tag:YourTag,Values=YourValue" | jq '.["Reservations"]|.[]|.Instances|.[]|.IamInstanceProfile.Arn + "," +.InstanceId' +.InstanceId' "," + '.["Reservations"]|.[]|.Instances|.[]|.IamInstanceProfile.Arn jq | "Name=tag:YourTag,Values=YourValue" --filters us-east-1 --region describe-instances ec2 aws aws ec2 describe-instances --region us-east-1 --filters "Name=tag:YourTag,Values=YourValue" | jq '.["Reservations"]|.[]|.Instances|.[]|.IamInstanceProfile.Arn + "," +.InstanceId'rootopen.com
katu 2019-06-04 22:19:55

linux命令:len=20; tr -dc A-Za-z0-9_ < /dev/urandom | head -c ${len} | xargs xargs | ${len} -c head | /dev/urandom < A-Za-z0-9_ -dc tr len=20; len=20; tr -dc A-Za-z0-9_ < /dev/urandom | head -c ${len} | xargsrootopen.com
linux命令:len=20; tr -dc A-Za-z0-9_ < /dev/urandom | head -c ${len} | xargs xargs | ${len} -c head | /dev/urandom < A-Za-z0-9_ -dc tr len=20; len=20; tr -dc A-Za-z0-9_ < /dev/urandom | head -c ${len} | xargsrootopen.com
katu 2019-06-04 22:19:03

linux命令:(echo -e 'GET / HTTP/1.0\r\n\r\n';) | ncat <IPaddress> 80 80 <IPaddress> ncat | HTTP/1.0\r\n\r\n';) / 'GET -e (echo (echo -e 'GET / HTTP/1.0\r\n\r\n';) | ncat <IPaddress> 80rootopen.com
linux命令:(echo -e 'GET / HTTP/1.0\r\n\r\n';) | ncat <IPaddress> 80 80 <IPaddress> ncat | HTTP/1.0\r\n\r\n';) / 'GET -e (echo (echo -e 'GET / HTTP/1.0\r\n\r\n';) | ncat <IPaddress> 80rootopen.com
katu 2019-06-04 22:17:49

linux命令:echo -e "linuxpassword\nlinuxpassword" | passwd linuxuser linuxuser passwd | "linuxpassword\nlinuxpassword" -e echo echo -e "linuxpassword\nlinuxpassword" | passwd linuxuserrootopen.com
linux命令:echo -e "linuxpassword\nlinuxpassword" | passwd linuxuser linuxuser passwd | "linuxpassword\nlinuxpassword" -e echo echo -e "linuxpassword\nlinuxpassword" | passwd linuxuserrootopen.com
katu 2019-06-04 22:17:26

linux命令:curl -I <IPaddress> <IPaddress> -I curl curl -I <IPaddress>rootopen.com
linux命令:curl -I <IPaddress> <IPaddress> -I curl curl -I <IPaddress>rootopen.com
katu 2019-06-04 22:16:59
共收录0条命令行
这里是记录和分享命令行的地方, 所有命令行都可以进行评论、提交替代方案.

热门文章