Skip to main content

Posts

My alias file for shotcut

Recent posts

my bashrc file for linux terminal

#####################################################################                                                 Start of code ##################################################################### # # ~/.bashrc # # If not running interactively, don't do anything #[[ $- != *i* ]] && return #alias ls='ls --color=auto' #PS1='[\u@\h \W]\$ ' ################################################################# ################################################################# #self added ################################################################# #for sudo work for auto completion if [ "$PS1" ]; then complete -cf sudo fi # set up to use vi command editing mode set -o vi #Allows you to cd into directory by typing the directory name shopt -s autocd ################################################################# # ~/.bashrc: executed by bash(1) for non-login shells. # see /usr/share/doc/bash/examples/

How To Autocomplete Commands Preceded By 'sudo'

How To Autocomplete Commands Preceded By 'sudo'  When writing a command in the terminal, you can autocomplete it by pressing the TAB key. Example: type "nau" in the terminal and press TAB -> "nautilus" should show up (if you have Nautilus installed, obviously). However, the autocomplete doesn't work in Ubuntu if you are trying to run a command with "sudo". For example, typing "sudo nau" and then pressing the TAB key will not autocomplete the command to "sudo nautilus". Here is how to get autocomplete to work in the Terminal while using "sudo". Simply open the ".bashrc" hidden file from your home folder. If you use GNOME, paste this in a terminal to open it: sudo gedit ~/.bashrc Then paste this at the bottom of the file: if [ "$PS1" ]; then complete -cf sudo fi Then type this in a terminal to reload: bash Now try the example in the beginning of the file "sudo nau&qu

How to set up your shell to use vi command editing mode in Terminal

Most shells that have a command line editing feature support Emacs key bindings. (a tiny subset) Up Ctrl + P Down Ctrl + N Left Ctrl + B Right Ctrl + F Home Ctrl + A End Ctrl + E Delete Ctrl + D Alternatively, you could set up your shell to use vi command editing mode, by adding   set -o vi to your shell startup file (e.g., ~/.bashrc ).  Then, for example, you can Use Esc  k  Enter to re-execute the previous command (same as !! ).  The minus key - also works as a "move up" command. Use Esc  k  k  k  k  k  k  k  k  k  k  k   k Enter or Esc  1 2  k  Enter to re-execute the 12th previous command (same as !-12 ). Use Esc and a motion command (i.e., k , suitably repeated), and then edit the bash command line you find there.  Remember, you will still be in vi command mode, so you will need to use a vi editing command (e.g., I , A , C , R , or one of their lowercase counterparts) to actually add to the command from history. So, for examp

How To Add The BlackArch Pentesting Repository To Arch Linux

BlackArch is a penetration testing distribution, similar to Kali Linux, but it’s built on top of Arch Linux. In reality, BlackArch is really a pre-configured Arch installation with an extra repository full of security tools. As a result, you can add the BlackArch repository to a regular install of Arch and gain access to all the same tools. In this tutorial you will learn: How to Download the BackArch Setup Script How to Verify The BlackArch Script How to Run The BlackArch Setup Script How to Install a Package from BlackArch How to Install an Entire Category from BlackArch Install BlackArch on Arch. Software Requirements and Conventions Used Software Requirements and Linux Command Line Conventions Category Requirements, Conventions or Software Version Used System Arch Linux Software BlackArch Repository Other Privileged access to your Linux system as root or via the sudo command. Conventions # - requires given linux commands to be

install WiFi-Pumpkin (ex 3vilTwinAttacker) for almost any linux

WiFi-Pumpkin (ex 3vilTwinAttacker) WiFi-Pumpkin Description Framework for Rogue Wi-Fi Access Point Attack. WiFi-Pumpkin is a very complete framework for auditing Wi-Fi security. The main feature is the ability to create a fake AP and make Man In The Middle attack, but the list of features is quite broad. Features Rogue Wi-Fi Access Point Deauth Attack Clients AP Probe Request Monitor DHCP Starvation Attack Credentials Monitor Transparent Proxy Windows Update Attack Phishing Manager Partial Bypass HSTS protocol Support beef hook ARP Poison DNS Spoof Patch Binaries via MITM Karma Attacks (support hostapd-mana) LLMNR, NBT-NS and MDNS poisoner (Responder) Pumpkin-Proxy (ProxyServer (mitmproxy API)) Capture images on the fly TCP-Proxy (with scapy) Plugins dns2proxy  - This tools offer a different features for post-explotation once you ch

My Favorite Sublime SetUp

following are the setting and themes that i used to make my sublime text look cool and meaningful  1. Preference.Sublime-setting -USER {     "caret_extra_bottom": 1,     "caret_extra_top": 1,     "caret_extra_width": 1,     "color_scheme": "Packages/Theme - Tech49/Tech49.tmTheme",     "drag_text": false,     "font_size": 12.3,     "highlight_line": true,     "highlight_modified_tabs": true,     "indent_to_bracket": true,     "line_padding_bottom": 1.5,     "line_padding_top": 2,     "overlay_scroll_bars": "enabled",     "theme": "Tech49.sublime-theme" } 2. Programming Language - Build Files     i. Python2        {   "cmd": ["tilix -e 'bash -c \"python2 -u $file;echo;echo Press ENTER to exit; read line\"'"],   "shell": true } ii. Python3 {   "cmd": ["tili

Sublime text 3 free license key

----- BEGIN LICENSE ----- Member J2TeaM Single User License EA7E-1011316 D7DA350E 1B8B0760 972F8B60 F3E64036 B9B4E234 F356F38F 0AD1E3B7 0E9C5FAD FA0A2ABE 25F65BD8 D51458E5 3923CE80 87428428 79079A01 AA69F319 A1AF29A4 A684C2DC 0B1583D4 19CBD290 217618CD 5653E0A0 BACE3948 BB2EE45E 422D2C87 DD9AF44B 99C49590 D2DBDEE1 75860FD2 8C8BB2AD B2ECE5A4 EFC08AF2 25A9B864 ------ END LICENSE ------​ explore more  Here

How To Install Brave Browser On Debian Linux

installing brave on Debian (specially on kali) linux is not an easy. so it can be painful. but suppose you install it any how but it is still painful to open brave. in fact, you can't open it without using --no-sandbox .And using --no-sandbox to open brave is extremely dangerous for your machine security. after many research, i found a very simple solution.   STEP1: On machine,  follow the  official Ubuntu instructions and only change the following step: echo "deb [arch=amd64] https://brave-browser-apt-release.s3.brave.com/ $UBUNTU_CODENAME main" | sudo tee /etc/apt/sources.list.d/brave-browser-release- ${UBUNTU_CODENAME} .list to this: echo "deb [arch=amd64] https://brave-browser-apt-release.s3.brave.com/ bionic main" | sudo tee /etc/apt/sources. list .d/brave-browser-release-bionic. list STEP2: Then add the following in  /etc/sysctl.d/00-local-userns.conf : kernel.unprivileged_userns_clone = 1   STEP3: finally run the following comma

How to untar a tar file or gzip-bz2 tar file in Linux

Type at the command prompt tar xzf file.tar.gz - to uncompress a gzip tar file (.tgz or .tar.gz) tar xjf file.tar.bz2 - to uncompress a bzip2 tar file (.tbz or .tar.bz2) to extract the contents. tar xf file.tar - to uncompressed tar file (.tar) tar xC /var/tmp -f file.tar - to uncompress tar file (.tar) to another directory x = eXtract, this indicated an extraction c = create to create ) v = verbose (optional) the files with relative locations will be displayed. z = gzip-ped; j = bzip2-zipped f = from/to file ... (what is next after the f is the archive file) C = directory. In c and r mode, this changes the directory before adding the following files. In x mode, changes directoriy after opening the archive but before extracting entries from the archive. The files will be extracted in the current folder

How Make Terminal look like Parrot's OS terminal?

copy the following codes and paste this code to file name bashrc which is locate in /home/username/ eg . /home/lazyboy/bashrc   copy code from  HERE or just copy following code ------------------------------------------------------------------------------------------------------------------------- # ~/.bashrc: executed by bash(1) for non-login shells. # see /usr/share/doc/bash/examples/startup-files (in the package bash-doc) # for examples # If not running interactively, don't do anything [ -z "$PS1" ] && return # don't put duplicate lines in the history. See bash(1) for more options # ... or force ignoredups and ignorespace HISTCONTROL=ignoredups:ignorespace # append to the history file, don't overwrite it shopt -s histappend # for setting history length see HISTSIZE and HISTFILESIZE in bash(1) HISTSIZE=1000 HISTFILESIZE=2000 # check the window size after each command and, if necessary, # update the values of LINES and COLUMNS. shopt -s

How to Connect Wi-Fi from Linux Terminal Using Nmcli Command

There are several command-line tools for managing a wireless network interface in Linux systems. A number of these can be used to simply view the wireless network interface status (whether it is up or down , or if it is connected to any network), such as iw , iwlist , ip , ifconfig and others. And some are used to connect to a wireless network, and these include: nmcli , is a command-line tool used to create, show, edit, delete, enable, and disable network connections, as well as control and display network device status. First start by checking the name of your network device using the following command. From the output of this command, the device name/interface is wlp1s0 as shown. $ iw dev phy#0 Interface wlp1s0 ifindex 3 wdev 0x1 addr 38:b1:db:7c:78:c7 type managed     Next, check the Wi-Fi device connection status using the following command.   $ iw wlp2s0 link Not connected. From the output above the device is not connected to any network, run the

How to stop MAC address from changing after disconnecting? linux

Network-Manager will reset your mac address during the wifi scanning. To permanently change your mac address: Edit your  /etc/NetworkManager/NetworkManager.conf  as follows: [main] plugins=ifupdown,keyfile [ifupdown] managed=false [device] wifi.scan-rand-mac-address=no [keyfile] Edit your  /etc/network/interfaces  by adding the following line: pre-up ifconfig wlp68s0b1 hw ether xx:xx:xx:yy:yy:yy The  xx:xx:xx:yy:yy:yy  is the new mac address obtained from the output of  macchanger -A wlp68s0b1   sources: click here

Random Posts