所有命令 ()

linux命令:osascript -e{'set text item delimiters to linefeed','tell app"google chrome"to url of tabs of window 1 as text'} text'} as 1 window of tabs of url chrome"to app"google linefeed','tell to delimiters item text -e{'set osascript osascript -e{'set text item delimiters to linefeed','tell app"google chrome"to url of tabs of window 1 as text'}rootopen.com
linux命令:osascript -e{'set text item delimiters to linefeed','tell app"google chrome"to url of tabs of window 1 as text'} text'} as 1 window of tabs of url chrome"to app"google linefeed','tell to delimiters item text -e{'set osascript osascript -e{'set text item delimiters to linefeed','tell app"google chrome"to url of tabs of window 1 as text'}rootopen.com
evwa 2019-02-12 21:18:43

linux命令:osascript -e'get the clipboard as"RTF "'|sed 's/«data RTF //;s/»//'|xxd -r -p|textutil -convert html -stdin -stdout|pandoc -f html -t markdown_strict --no-wrap --atx-headers --atx-headers --no-wrap markdown_strict -t html -f -stdout|pandoc -stdin html -convert -p|textutil -r //;s/»//'|xxd RTF 's/«data "'|sed as"RTF clipboard the -e'get osascript osascript -e'get the clipboard as"RTF "'|sed 's/«data RTF //;s/»//'|xxd -r -p|textutil -convert html -stdin -stdout|pandoc -f html -t markdown_strict --no-wrap --atx-headersrootopen.com
linux命令:osascript -e'get the clipboard as"RTF "'|sed 's/«data RTF //;s/»//'|xxd -r -p|textutil -convert html -stdin -stdout|pandoc -f html -t markdown_strict --no-wrap --atx-headers --atx-headers --no-wrap markdown_strict -t html -f -stdout|pandoc -stdin html -convert -p|textutil -r //;s/»//'|xxd RTF 's/«data "'|sed as"RTF clipboard the -e'get osascript osascript -e'get the clipboard as"RTF "'|sed 's/«data RTF //;s/»//'|xxd -r -p|textutil -convert html -stdin -stdout|pandoc -f html -t markdown_strict --no-wrap --atx-headersrootopen.com
evwa 2019-02-12 21:17:46

linux命令:bind '"\ej": "!#:$\e^"' "!#:$\e^"' '"\ej": bind bind '"\ej": "!#:$\e^"'rootopen.com
linux命令:bind '"\ej": "!#:$\e^"' "!#:$\e^"' '"\ej": bind bind '"\ej": "!#:$\e^"'rootopen.com
evwa 2019-02-12 21:16:29

linux命令:menu-complete-backward 在Bash 4.1中添加了。 要完成的单词为空的空格之后插入当前目录中的第一个文件的路径。 4.1中添加了。 要完成的单词为空的空格之后插入当前目录中的第一个文件的路径。 在Bash menu-complete-backward menu-complete-backward 在Bash 4.1中添加了。 要完成的单词为空的空格之后插入当前目录中的第一个文件的路径。rootopen.com
linux命令:menu-complete-backward 在Bash 4.1中添加了。 要完成的单词为空的空格之后插入当前目录中的第一个文件的路径。 4.1中添加了。 要完成的单词为空的空格之后插入当前目录中的第一个文件的路径。 在Bash menu-complete-backward menu-complete-backward 在Bash 4.1中添加了。 要完成的单词为空的空格之后插入当前目录中的第一个文件的路径。rootopen.com
evwa 2019-02-12 21:15:42

linux命令:bind -x '"\er":READLINE_LINE=$(eval "$READLINE_LINE");READLINE_POINT=${#READLINE_LINE}' "$READLINE_LINE");READLINE_POINT=${#READLINE_LINE}' '"\er":READLINE_LINE=$(eval -x bind bind -x '"\er":READLINE_LINE=$(eval "$READLINE_LINE");READLINE_POINT=${#READLINE_LINE}'rootopen.com
linux命令:bind -x '"\er":READLINE_LINE=$(eval "$READLINE_LINE");READLINE_POINT=${#READLINE_LINE}' "$READLINE_LINE");READLINE_POINT=${#READLINE_LINE}' '"\er":READLINE_LINE=$(eval -x bind bind -x '"\er":READLINE_LINE=$(eval "$READLINE_LINE");READLINE_POINT=${#READLINE_LINE}'rootopen.com
evwa 2019-02-12 21:13:47

linux命令: du -sh * * -sh du du -sh *rootopen.com
linux命令: du -sh * * -sh du du -sh *rootopen.com
evwa 2019-02-12 21:12:07

linux命令:ls -sSh /path | head head | /path -sSh ls ls -sSh /path | headrootopen.com
linux命令:ls -sSh /path | head head | /path -sSh ls ls -sSh /path | headrootopen.com
evwa 2019-02-12 21:11:04

linux命令:nmap -sP "$(ip -4 -o route get 1 | cut -d ' ' -f 7)"/24 | grep report | cut -d ' ' -f 5- 5- -f ' ' -d cut | report grep | 7)"/24 -f ' ' -d cut | 1 get route -o -4 "$(ip -sP nmap nmap -sP "$(ip -4 -o route get 1 | cut -d ' ' -f 7)"/24 | grep report | cut -d ' ' -f 5-rootopen.com
linux命令:nmap -sP "$(ip -4 -o route get 1 | cut -d ' ' -f 7)"/24 | grep report | cut -d ' ' -f 5- 5- -f ' ' -d cut | report grep | 7)"/24 -f ' ' -d cut | 1 get route -o -4 "$(ip -sP nmap nmap -sP "$(ip -4 -o route get 1 | cut -d ' ' -f 7)"/24 | grep report | cut -d ' ' -f 5-rootopen.com
evwa 2019-02-12 21:09:23

linux命令: sudo tcpdump port http or port ftp or port smtp or port imap or port pop3 or port telnet -l -A | egrep -i -B5 'pass=|pwd=|log=|login=|user=|username=|pw=|passw=|passwd=|password=|pass:|user:|username:|password:|login:|pass |user ' ' |user 'pass=|pwd=|log=|login=|user=|username=|pw=|passw=|passwd=|password=|pass:|user:|username:|password:|login:|pass -B5 -i egrep | -A -l telnet port or pop3 port or imap port or smtp port or ftp port or http port tcpdump sudo sudo tcpdump port http or port ftp or port smtp or port imap or port pop3 or port telnet -l -A | egrep -i -B5 'pass=|pwd=|log=|login=|user=|username=|pw=|passw=|passwd=|password=|pass:|user:|username:|password:|login:|pass |user 'rootopen.com
linux命令: sudo tcpdump port http or port ftp or port smtp or port imap or port pop3 or port telnet -l -A | egrep -i -B5 'pass=|pwd=|log=|login=|user=|username=|pw=|passw=|passwd=|password=|pass:|user:|username:|password:|login:|pass |user ' ' |user 'pass=|pwd=|log=|login=|user=|username=|pw=|passw=|passwd=|password=|pass:|user:|username:|password:|login:|pass -B5 -i egrep | -A -l telnet port or pop3 port or imap port or smtp port or ftp port or http port tcpdump sudo sudo tcpdump port http or port ftp or port smtp or port imap or port pop3 or port telnet -l -A | egrep -i -B5 'pass=|pwd=|log=|login=|user=|username=|pw=|passw=|passwd=|password=|pass:|user:|username:|password:|login:|pass |user 'rootopen.com
evwa 2019-02-12 21:08:10

linux命令:sudo tcpdump -nn -v port ftp or ftp-data ftp-data or ftp port -v -nn tcpdump sudo sudo tcpdump -nn -v port ftp or ftp-datarootopen.com
linux命令:sudo tcpdump -nn -v port ftp or ftp-data ftp-data or ftp port -v -nn tcpdump sudo sudo tcpdump -nn -v port ftp or ftp-datarootopen.com
evwa 2019-02-12 21:07:49

linux命令:sudo tcpdump -s 0 -A -n -l | egrep -i "POST /|pwd=|passwd=|password=|Host:" /|pwd=|passwd=|password=|Host:" "POST -i egrep | -l -n -A 0 -s tcpdump sudo sudo tcpdump -s 0 -A -n -l | egrep -i "POST /|pwd=|passwd=|password=|Host:"rootopen.com
linux命令:sudo tcpdump -s 0 -A -n -l | egrep -i "POST /|pwd=|passwd=|password=|Host:" /|pwd=|passwd=|password=|Host:" "POST -i egrep | -l -n -A 0 -s tcpdump sudo sudo tcpdump -s 0 -A -n -l | egrep -i "POST /|pwd=|passwd=|password=|Host:"rootopen.com
evwa 2019-02-12 21:07:28

linux命令:sudo tcpdump -nn -l port 25 | grep -i 'MAIL FROM\|RCPT TO' TO' FROM\|RCPT 'MAIL -i grep | 25 port -l -nn tcpdump sudo sudo tcpdump -nn -l port 25 | grep -i 'MAIL FROM\|RCPT TO'rootopen.com
linux命令:sudo tcpdump -nn -l port 25 | grep -i 'MAIL FROM\|RCPT TO' TO' FROM\|RCPT 'MAIL -i grep | 25 port -l -nn tcpdump sudo sudo tcpdump -nn -l port 25 | grep -i 'MAIL FROM\|RCPT TO'rootopen.com
evwa 2019-02-12 21:06:41

linux命令:git log -p --name-only --follow <file> <file> --follow --name-only -p log git git log -p --name-only --follow <file>rootopen.com
linux命令:git log -p --name-only --follow <file> <file> --follow --name-only -p log git git log -p --name-only --follow <file>rootopen.com
evwa 2019-02-12 21:06:17

linux命令:unix-permissions convert.stat $(unix-permissions invert $(umask)) $(umask)) invert $(unix-permissions convert.stat unix-permissions unix-permissions convert.stat $(unix-permissions invert $(umask))rootopen.com
linux命令:unix-permissions convert.stat $(unix-permissions invert $(umask)) $(umask)) invert $(unix-permissions convert.stat unix-permissions unix-permissions convert.stat $(unix-permissions invert $(umask))rootopen.com
evwa 2019-02-12 21:05:38

linux命令:printf "IPv6 is "; [ $(cat /proc/sys/net/ipv6/conf/all/disable_ipv6) -eq 0 ] && printf "enabled\n" || printf "disabled\n" "disabled\n" printf || "enabled\n" printf && ] 0 -eq /proc/sys/net/ipv6/conf/all/disable_ipv6) $(cat [ "; is "IPv6 printf printf "IPv6 is "; [ $(cat /proc/sys/net/ipv6/conf/all/disable_ipv6) -eq 0 ] && printf "enabled\n" || printf "disabled\n"rootopen.com
linux命令:printf "IPv6 is "; [ $(cat /proc/sys/net/ipv6/conf/all/disable_ipv6) -eq 0 ] && printf "enabled\n" || printf "disabled\n" "disabled\n" printf || "enabled\n" printf && ] 0 -eq /proc/sys/net/ipv6/conf/all/disable_ipv6) $(cat [ "; is "IPv6 printf printf "IPv6 is "; [ $(cat /proc/sys/net/ipv6/conf/all/disable_ipv6) -eq 0 ] && printf "enabled\n" || printf "disabled\n"rootopen.com
evwa 2019-02-12 21:04:26

linux命令:calc(){ printf "%.8g\n" $(printf "%s\n" "$*" | bc -l); } } -l); bc | "$*" "%s\n" $(printf "%.8g\n" printf calc(){ calc(){ printf "%.8g\n" $(printf "%s\n" "$*" | bc -l); }rootopen.com
linux命令:calc(){ printf "%.8g\n" $(printf "%s\n" "$*" | bc -l); } } -l); bc | "$*" "%s\n" $(printf "%.8g\n" printf calc(){ calc(){ printf "%.8g\n" $(printf "%s\n" "$*" | bc -l); }rootopen.com
evwa 2019-02-12 21:03:52

linux命令:exiftool '-MDItemFSCreationDate<CreationDate' '-FileModifyDate<CreationDate' '-filename<CreationDate' -d %Y-%m-%d_%H-%M-%S%%+c.%%le . -ext mov mov -ext . %Y-%m-%d_%H-%M-%S%%+c.%%le -d '-filename<CreationDate' '-FileModifyDate<CreationDate' '-MDItemFSCreationDate<CreationDate' exiftool exiftool '-MDItemFSCreationDate<CreationDate' '-FileModifyDate<CreationDate' '-filename<CreationDate' -d %Y-%m-%d_%H-%M-%S%%+c.%%le . -ext movrootopen.com
linux命令:exiftool '-MDItemFSCreationDate<CreationDate' '-FileModifyDate<CreationDate' '-filename<CreationDate' -d %Y-%m-%d_%H-%M-%S%%+c.%%le . -ext mov mov -ext . %Y-%m-%d_%H-%M-%S%%+c.%%le -d '-filename<CreationDate' '-FileModifyDate<CreationDate' '-MDItemFSCreationDate<CreationDate' exiftool exiftool '-MDItemFSCreationDate<CreationDate' '-FileModifyDate<CreationDate' '-filename<CreationDate' -d %Y-%m-%d_%H-%M-%S%%+c.%%le . -ext movrootopen.com
evwa 2019-02-12 21:02:31

linux命令:gzip -cd gzippedarchive.tar.gz | tar -xf - - -xf tar | gzippedarchive.tar.gz -cd gzip gzip -cd gzippedarchive.tar.gz | tar -xf -rootopen.com
linux命令:gzip -cd gzippedarchive.tar.gz | tar -xf - - -xf tar | gzippedarchive.tar.gz -cd gzip gzip -cd gzippedarchive.tar.gz | tar -xf -rootopen.com
evwa 2019-02-12 21:01:34

linux命令:gunzip -c file.tar.gz | tar -xvf - - -xvf tar | file.tar.gz -c gunzip gunzip -c file.tar.gz | tar -xvf -rootopen.com
linux命令:gunzip -c file.tar.gz | tar -xvf - - -xvf tar | file.tar.gz -c gunzip gunzip -c file.tar.gz | tar -xvf -rootopen.com
evwa 2019-02-12 21:01:08

linux命令:alias game='DRI_PRIME=1' game='DRI_PRIME=1' alias alias game='DRI_PRIME=1'rootopen.com
linux命令:alias game='DRI_PRIME=1' game='DRI_PRIME=1' alias alias game='DRI_PRIME=1'rootopen.com
evwa 2019-02-12 21:00:24
共收录0条命令行
这里是记录和分享命令行的地方, 所有命令行都可以进行评论、提交替代方案.

热门文章