instruction
stringlengths
1
659
input
stringclasses
1 value
output
stringlengths
1
532
Wait for a virtual machine to start and automatically reconnect if it shutdown and restarts
virt-viewer --reconnect --wait "domain"
Connect to a specific remote virtual machine over TLS
virt-viewer --connect "xen//url" "domain"
Connect to a specific remote virtual machine over SSH
virt-viewer --connect "qemu+ssh//username@url/system" "domain"
Install a Ruby version
rbenv install version
Display a list of the latest stable versions for each Ruby
rbenv install --list
Display a list of installed Ruby versions
rbenv versions
Use a specific Ruby version across the whole system
rbenv global version
Use a specific Ruby version for an application/project directory
rbenv local version
Display the currently selected Ruby version
rbenv version
Uninstall a Ruby version
rbenv uninstall version
Display all Ruby versions that contain the specified executable
rbenv whence executable
Convert a PBM image into a MGR bitmap
pbmtomgr path/to/image.pbm > path/to/output.mgr
Display the current state of the system (known screens, resolutions, ...)
xrandr --query
Disable disconnected outputs and enable connected ones with default settings
xrandr --auto
Change the resolution and update frequency of DisplayPort 1 to 1920x1080, 60Hz
xrandr --output DP1 --mode 1920x1080 --rate 60
Set the resolution of HDMI2 to 1280x1024 and put it on the right of DP1
xrandr --output HDMI2 --mode 1280x1024 --right-of DP1
Disable the VGA1 output
xrandr --output VGA1 --off
Set the brightness for LVDS1 to 50%
xrandr --output LVDS1 --brightness 0.5
Display the current state of any X server
xrandr --display :0 --query
Connect to a Zapier account
zapier login
Initialize a new Zapier integration with a project template
zapier init path/to/directory
Add a starting trigger, create, search, or resource to your integration
zapier scaffold trigger|create|search|resource name
Test an integration
zapier test
Build and upload an integration to Zapier
zapier push
Display help
zapier help
Display help for a specific command
zapier help command
Display job ID, job name, partition, account, number of allocated cpus, job state, and job exit codes for recent jobs
sacct
Display job ID, job state, job exit code for recent jobs
sacct --brief
Display the allocations of a job
sacct --jobs job_id --allocations
Display elapsed time, job name, number of requested CPUs, and memory requested of a job
sacct --jobs job_id --format=Elapsed,JobName,ReqCPUS,ReqMem
Display recent jobs that occurred from one week ago up to the present day
sacct --starttime=$(date -d "1 week ago" +'%F')
Output a larger number of characters for an attribute
sacct --format=JobID,JobName%100
Display the file access control list
getfacl path/to/file_or_directory
Display the file access control list with [n]umeric user and group IDs
getfacl --numeric path/to/file_or_directory
Display the file access control list with [t]abular output format
getfacl --tabular path/to/file_or_directory
Show transactions and running balance in the `assets:bank:checking` account
hledger aregister assets:bank:checking
Show transactions and running balance in the first account named `*savings*`
hledger aregister savings
Show the checking account's cleared transactions, with a specified width
hledger aregister checking --cleared --width 120
Show the checking register, including transactions from forecast rules
hledger aregister checking --forecast
Start an interactive shell session
sh
Execute a command and then exit
sh -c "command"
Execute a script
sh path/to/script.sh
Read and execute commands from `stdin`
sh -s
Show information for job
scontrol show job job_id
Suspend a comma-separated list of running jobs
scontrol suspend job_id1,job_id2,...
Resume a comma-separated list of suspended jobs
scontrol resume job_id1,job_id2,...
Hold a comma-separated list of queued jobs (Use `release` command to permit the jobs to be scheduled)
scontrol hold job_id1,job_id2,...
Release a comma-separated list of suspended job
scontrol release job_id1,job_id2,...
Perform a brute-force attack (mode 3) with the default hashcat mask
hashcat --hash-type hash_type_id --attack-mode 3 hash_value
Perform a brute-force attack (mode 3) with a known pattern of 4 digits
hashcat --hash-type hash_type_id --attack-mode 3 hash_value "?d?d?d?d"
Perform a brute-force attack (mode 3) using at most 8 of all printable ASCII characters
hashcat --hash-type hash_type_id --attack-mode 3 --increment hash_value "?a?a?a?a?a?a?a?a"
Perform a dictionary attack (mode 0) using the RockYou wordlist of a Kali Linux box
hashcat --hash-type hash_type_id --attack-mode 0 hash_value /usr/share/wordlists/rockyou.txt
Perform a rule-based dictionary attack (mode 0) using the RockYou wordlist mutated with common password variations
hashcat --hash-type hash_type_id --attack-mode 0 --rules-file /usr/share/hashcat/rules/best64.rule hash_value /usr/share/wordlists/rockyou.txt
Perform a combination attack (mode 1) using the concatenation of words from two different custom dictionaries
hashcat --hash-type hash_type_id --attack-mode 1 hash_value /path/to/dictionary1.txt /path/to/dictionary2.txt
Show result of an already cracked hash
hashcat --show hash_value
Show all example hashes
hashcat --example-hashes
Review files that need maintenance in interactive mode
pacdiff
Use sudo and sudoedit to remove and merge files
pacdiff --sudo
Review files needing maintenance, creating `.bak`ups of the original if you `(O)verwrite`
pacdiff --sudo --backup
Use a specific editor to view and merge configuration files (default is `vim -d`)
DIFFPROG=editor pacdiff
Scan for configuration files with `locate` instead of using `pacman` database
pacdiff --locate
Display help
pacdiff --help
Start an interactive shell (Bash, by default) in a new root directory
arch-chroot path/to/new/root
Specify the user (other than the current user) to run the shell as
arch-chroot -u user path/to/new/root
Run a custom command (instead of the default Bash) in the new root directory
arch-chroot path/to/new/root command command_arguments
Specify the shell, other than the default Bash (in this case, the `zsh` package should have been installed in the target system)
arch-chroot path/to/new/root zsh
Authorize `twurl` to access a Twitter account
twurl authorize --consumer-key twitter_api_key --consumer-secret twitter_api_secret
Make a GET request to an API endpoint
twurl -X GET twitter_api_endpoint
Make a POST request to an API endpoint
twurl -X POST -d 'endpoint_params' twitter_api_endpoint
Upload media to Twitter
twurl -H "twitter_upload_url" -X POST "twitter_upload_endpoint" --file "path/to/media.jpg" --file-field "media"
Access a different Twitter API host
twurl -H twitter_api_url -X GET twitter_api_endpoint
Create an alias for a requested resource
twurl alias alias_name resource
Create a logic app
az logicapp create --name name --resource-group resource_group --storage-account storage_account
Delete a logic app
az logicapp delete --name name --resource-group resource_group
List logic apps
az logicapp list --resource-group resource_group
Restart a logic app
az logicapp restart --name name --resource-group resource_group
Start a logic app
az logicapp start --name name --resource-group resource_group
Stop a logic app
az logicapp stop --name name --resource-group resource_group
Kill in-progress connections at a specified interface, host and port
tcpkill -i eth1 host 192.95.4.27 and port 2266
Run a `doctl databases firewalls` command with an access token
doctl databases firewalls command --access-token access_token
Retrieve a list of firewall rules for a given database
doctl databases firewalls list
Add a database firewall rule to a given database
doctl databases firewalls append database_id --rule droplet|k8s|ip_addr|tag|app:value
Remove a firewall rule for a given database
doctl databases firewalls remove database_id rule_uuid
View documentation for the command runner
tldr just.1
View documentation for the V8 JavaScript runtime
tldr just.js
Add a new user to a password file (will prompt to enter the password)
mosquitto_passwd path/to/password_file username
Create the password file if it doesn't already exist
mosquitto_passwd -c path/to/password_file username
Delete the specified username instead
mosquitto_passwd -D path/to/password_file username
Upgrade an old plain-text password file to a hashed password file
mosquitto_passwd -U path/to/password_file
Run all request files from the current directory
bru run
Run a single request from the current directory by specifying its filename
bru run file.bru
Run requests using an environment
bru run --env environment_name
Run requests using an environment with a variable
bru run --env environment_name --env-var variable_name=variable_value
Run request and collect the results in an output file
bru run --output path/to/output.json
Display help
bru run --help
Install a new crontab from the specified file
scrontab path/to/file
[e]dit the crontab of the current user
scrontab -e
[e]dit the crontab of the specified user
scrontab --user=user_id -e
[r]emove the current crontab
scrontab -r
Print the crontab of the current user to `stdout`
scrontab -l