Skip to content

Commit a96f9b8

Browse files
committed
Improve command detail quality
1 parent ea34a25 commit a96f9b8

1,070 files changed

Lines changed: 19102 additions & 7724 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

assets/commands/7za.md

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -63,19 +63,28 @@ standalone file archiver from the 7-Zip family
6363
> Compression level (0-9)
6464
6565
**-t**_type_
66-
> Archive type (7z, zip, gzip, bzip2, tar)
66+
> Archive type (7z, zip, gzip, bzip2, xz, tar)
6767
6868
**-r**
6969
> Recurse subdirectories
7070
7171
**-y**
7272
> Assume yes to queries
7373
74+
**-si**
75+
> Read from stdin
76+
77+
**-so**
78+
> Write to stdout
79+
80+
**-mhe=on**
81+
> Encrypt archive headers (7z format)
82+
7483
# DESCRIPTION
7584

7685
**7za** is the standalone version of the 7-Zip command-line tool. Unlike **7z** which may use external plugins, 7za includes all codecs in a single executable.
7786

78-
7za supports fewer formats than the full 7z but is more portable as a single binary. It handles 7z, ZIP, GZIP, BZIP2, TAR, and XZ formats.
87+
7za supports fewer formats than the full 7z but is more portable as a single binary. It handles 7z, ZIP, GZIP, BZIP2, XZ, TAR, and CAB formats.
7988

8089
The command syntax is identical to **7z**. For scripts that only need common formats, 7za is often preferred for its simplicity and reliability.
8190

assets/commands/aa-audit.md

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -16,17 +16,13 @@ Set a profile to audit mode from a **specific directory**
1616

1717
```sudo aa-audit -d /path/to/profiles [profile_name]```
1818

19-
**Remove** audit mode for a profile
20-
21-
```sudo aa-audit -r [profile_name]```
22-
2319
Set a profile to audit mode **without reloading** it
2420

2521
```sudo aa-audit --no-reload [profile_name]```
2622

2723
# SYNOPSIS
2824

29-
**aa-audit** _executable_ [_executable_ ...] [_-d /path/to/profiles_] [_--no-reload_] [_-r_]
25+
**aa-audit** _executable_ [_executable_ ...] [_-d /path/to/profiles_] [_--no-reload_]
3026

3127
# DESCRIPTION
3228

@@ -40,9 +36,6 @@ Set a profile to audit mode **without reloading** it
4036
**--no-reload**
4137
> Prevents automatic profile reloading after modifications
4238
43-
**-r, --remove**
44-
> Deactivates audit mode for the specified profile(s)
45-
4639
**-h, --help**
4740
> Display help information
4841

assets/commands/aa-unconfined.md

Lines changed: 15 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,18 +4,22 @@ Find network-listening processes without AppArmor profiles
44

55
# TLDR
66

7-
List **unconfined processes** using the ss command (default)
7+
**List unconfined processes** with open network sockets (using ss by default)
88

99
```sudo aa-unconfined```
1010

11-
Use **netstat** instead of ss to detect open network sockets
11+
**Use netstat** instead of ss to detect open network sockets
1212

1313
```sudo aa-unconfined --with-netstat```
1414

15-
Show all processes with TCP/UDP ports and **no profiles** (paranoid mode)
15+
**Show all processes** from /proc with TCP/UDP ports without confinement
1616

1717
```sudo aa-unconfined --paranoid```
1818

19+
**Show only server processes** (those with listening sockets)
20+
21+
```sudo aa-unconfined --show=server```
22+
1923
# SYNOPSIS
2024

2125
**aa-unconfined** [_--paranoid_] [_--with-ss_ | _--with-netstat_]
@@ -29,16 +33,19 @@ This tool is useful for identifying services that may benefit from AppArmor conf
2933
# PARAMETERS
3034

3135
**--paranoid**
32-
> Examines all processes from the /proc filesystem that have active TCP or UDP ports without AppArmor confinement
36+
> Examines all processes from the /proc filesystem that have active TCP or UDP ports without AppArmor confinement. Equivalent to --show=all.
37+
38+
**--show=**_MODE_
39+
> Determines the set of processes displayed: all (all processes), network (processes with any sockets), server (processes with listening sockets), client (processes with non-listening sockets).
3340
3441
**--with-ss**
35-
> Uses the ss(8) utility to identify network socket listeners (default)
42+
> Uses the ss(8) utility to identify network socket listeners (default).
3643
3744
**--with-netstat**
38-
> Uses the netstat(8) command for network socket discovery instead of ss
45+
> Uses the netstat(8) command for network socket discovery instead of ss. Used as fallback when ss is not available.
3946
40-
**-h, --help**
41-
> Display help information
47+
**-h**, **--help**
48+
> Display help information.
4249
4350
# CAVEATS
4451

assets/commands/act.md

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,14 @@ Run with **secrets** from file
2424

2525
```act --secret-file [.secrets]```
2626

27+
**Dry run** to see what would be executed
28+
29+
```act -n```
30+
31+
Run with a specific **platform image**
32+
33+
```act -P ubuntu-latest=catthehacker/ubuntu:act-latest```
34+
2735
# SYNOPSIS
2836

2937
**act** [_-W workflow_] [_-j job_] [_-e event_] [_--secret-file file_] [_options_]
@@ -55,7 +63,19 @@ The tool supports most GitHub Actions features including matrix builds, secrets,
5563
> Load environment variables from file
5664
5765
**-P** _platform_, **--platform** _platform_
58-
> Custom Docker image for platform (e.g., ubuntu-latest=nektos/act-environments-ubuntu:18.04)
66+
> Custom Docker image for platform (e.g., ubuntu-latest=catthehacker/ubuntu:act-latest)
67+
68+
**--input** _input_
69+
> Set a workflow input (KEY=VALUE)
70+
71+
**--input-file** _file_
72+
> Load workflow inputs from file
73+
74+
**--matrix** _matrix_
75+
> Select specific matrix configuration to run
76+
77+
**--action-offline-mode**
78+
> Don't pull images or fetch remote actions if already cached
5979
6080
**-l**, **--list**
6181
> List available workflows and jobs

assets/commands/adb-devices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# TAGLINE
22

3-
connected Android device lister
3+
list connected Android devices
44

55
# TLDR
66

assets/commands/adb-forward.md

Lines changed: 13 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ Android device port forwarder
88

99
```adb forward tcp:[8080] tcp:[8080]```
1010

11-
Forward to a **Unix domain socket**
11+
Forward to a **Unix abstract domain socket**
1212

1313
```adb forward tcp:[8080] localabstract:[socket_name]```
1414

@@ -24,6 +24,10 @@ Remove **all** forwards
2424

2525
```adb forward --remove-all```
2626

27+
Forward to a **specific device** by serial number
28+
29+
```adb -s [serial] forward tcp:[8080] tcp:[8080]```
30+
2731
# SYNOPSIS
2832

2933
**adb forward** [_--no-rebind_] _local_ _remote_
@@ -39,19 +43,22 @@ Common uses include debugging apps with remote debuggers, accessing development
3943
# PARAMETERS
4044

4145
**tcp:**_port_
42-
> TCP port number
46+
> TCP port number. Remote may be "tcp:0" to pick any open port.
4347
4448
**localabstract:**_name_
45-
> Unix domain socket in abstract namespace
49+
> Unix domain socket in abstract namespace.
4650
4751
**localreserved:**_name_
48-
> Unix domain socket in reserved namespace
52+
> Unix domain socket in reserved namespace.
4953
5054
**localfilesystem:**_name_
51-
> Unix domain socket in filesystem namespace
55+
> Unix domain socket in filesystem namespace.
5256
5357
**jdwp:**_pid_
54-
> JDWP (Java Debug Wire Protocol) for process ID
58+
> JDWP (Java Debug Wire Protocol) for process ID.
59+
60+
**vsock:**_CID:port_
61+
> vsock address (CID and port).
5562
5663
**--no-rebind**
5764
> Fail if local port is already forwarded

assets/commands/adb-logcat.md

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,20 +41,29 @@ Filter expressions allow you to select which log messages to display based on ta
4141
# PARAMETERS
4242

4343
**-v** _format_
44-
> Output format: brief, process, tag, thread, raw, time, threadtime, long
44+
> Output format: brief, process, tag, thread, raw, time, threadtime (default), long
4545
4646
**-b** _buffer_
4747
> Log buffer: main, system, radio, events, crash, all
4848
4949
**-c**
50-
> Clear the log buffers
50+
> Clear the log buffers and exit
5151
5252
**-d**
5353
> Dump log and exit (don't block)
5454
5555
**-f** _file_
5656
> Write output to file
5757
58+
**-g**
59+
> Print the size of the specified log buffer and exit
60+
61+
**-n** _count_
62+
> Set the maximum number of rotated logs (default 4, requires -r)
63+
64+
**-r** _kbytes_
65+
> Rotate log every kbytes of output (default 16, requires -f)
66+
5867
**-s**
5968
> Set default filter to silent (equivalent to *:S)
6069

assets/commands/add-computer.py.md

Lines changed: 22 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -38,16 +38,34 @@ This is commonly used in penetration testing for resource-based constrained dele
3838
> Password for the computer account (auto-generated if not specified)
3939
4040
**-method** _method_
41-
> Method to add computer: SAMR or LDAP
41+
> Method to add computer: SAMR or LDAPS (default SAMR).
42+
43+
**-dc-host** _hostname_
44+
> Domain controller hostname (FQDN). If omitted, derived from the domain argument.
45+
46+
**-baseDN** _dn_
47+
> Distinguished name base in LDAP. If omitted, derived from the domain.
48+
49+
**-domain-netbios** _name_
50+
> Domain NetBIOS name when the forest handles multiple domains.
51+
52+
**-no-add**
53+
> Only change an existing computer account password without adding a new one.
4254
4355
**-k**
44-
> Use Kerberos authentication (requires ccache)
56+
> Use Kerberos authentication (requires KRB5CCNAME ccache).
4557
4658
**-no-pass**
47-
> Don't prompt for password (use with -k)
59+
> Don't prompt for password (use with -k).
4860
4961
**-hashes** _LMHASH:NTHASH_
50-
> Use NTLM hash for authentication
62+
> Use NTLM hash for pass-the-hash authentication.
63+
64+
**-aesKey** _key_
65+
> AES128 or AES256 hex key for Kerberos pass-the-key authentication.
66+
67+
**-debug**
68+
> Enable verbose debug output.
5169
5270
# CAVEATS
5371

assets/commands/addcomputer.py.md

Lines changed: 12 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,18 @@ Create machine accounts in Active Directory
88

99
```addcomputer.py [domain]/[user]:[password] -computer-name [hostname]```
1010

11-
Specify **domain controller**
11+
Specify **domain controller** IP
1212

1313
```addcomputer.py [domain]/[user]:[password] -dc-ip [192.168.1.1] -computer-name [hostname]```
1414

15-
Use **pass-the-hash**
15+
Use **pass-the-hash** authentication
1616

1717
```addcomputer.py [domain]/[user] -hashes :[NTHASH] -computer-name [hostname]```
1818

19+
Add computer with a **specific password** using LDAP method
20+
21+
```addcomputer.py [domain]/[user]:[password] -computer-name [hostname] -computer-pass [password] -method LDAPS```
22+
1923
# SYNOPSIS
2024

2125
**addcomputer.py** _domain_/_user_:_password_ -computer-name _name_ [_options_]
@@ -37,8 +41,8 @@ This capability is useful in penetration testing for setting up resource-based c
3741
**-computer-pass** _password_
3842
> Password for the computer account
3943
40-
**-method** _SAMR|LDAP_
41-
> Protocol to use for adding the computer
44+
**-method** _SAMR|LDAPS_
45+
> Protocol to use for adding the computer (default: SAMR)
4246
4347
**-hashes** _LMHASH:NTHASH_
4448
> Authenticate using NT hash
@@ -49,6 +53,9 @@ This capability is useful in penetration testing for setting up resource-based c
4953
**-no-pass**
5054
> Don't prompt for password
5155
56+
**-dc-host** _hostname_
57+
> Hostname of the domain controller
58+
5259
# CAVEATS
5360

5461
For authorized security testing only. The default ms-DS-MachineAccountQuota of 10 can be modified or set to 0 by administrators. Computer accounts created this way are visible to domain administrators.
@@ -59,4 +66,4 @@ Part of the Impacket suite maintained by SecureAuth, this tool gained prominence
5966

6067
# SEE ALSO
6168

62-
[add-computer.py](/man/add-computer.py)(1), [rbcd.py](/man/rbcd.py)(1), [getST.py](/man/getST.py)(1)
69+
[add-computer.py](/man/add-computer.py)(1), [impacket-getnpusers](/man/impacket-getnpusers)(1)

0 commit comments

Comments
 (0)