This is a document where I'll be writing up some gemmy CLI commands
for easy retrieval when I need it; It will be organized into sections
as per what type of task the program does, and deeper in the tree as
per what the program needs to do.
Some sections will also contain useful links to cheat sheets/relevant blogs.
WEB ENUMERATIONhttps://0xdf.gitlab.io/cheatsheets/404#nmap -sV -sC -T5 <ip> -o scan.txt
whatweb
http://cuckflare.com/ >> scan.txt
FILE MANIPULATIONCompress/uncompress a directory into a .tar.gz:
tar -czvf archivename.tar.gz /directory/to/zip/
tar -xf archivename.tar.gz
^^^ will output to working directoryMANAGING REMOTE CONNECTIONSSSH connections, tunnels:
todo: add tunneling cmd
ssh neo@zion.org
TigerVNC
Viewing:
vncviewer 13.37.13.37::5900
PGP ENCRYPTION# 1. Generate a new keypair (creates ~/.gnupg/ on first run)
gpg –full-generate-key
# \u2192 Interactive: choose RSA 3072, set name/email, strong passphrase.
# 2. List secret keys (find your key ID)
gpg
list-secret-keys keyid-format LONG
# \u2192 Look for 'sec' line; key ID is after '/' (e.g., A1B2C3D4E5F6G7H8)
# 3. Export your public key (to share with others)
gpg
armor export your@email.example > mypubkey.asc
# \u2192 Creates ASCII-armored public key file.
# 4. Import someone else's public key
gpg –import theirpubkey.asc
# \u2192 Adds their key to your public keyring.
# 5. Encrypt file symmetrically (passphrase only, no keys needed)
gpg
symmetric cipher-algo AES256 zecretazzets.txt
# \u2192 Prompts for passphrase; creates zecretazzets.txt.gpg
# 6. Encrypt file for a specific recipient (public-key encryption)
gpg
encrypt recipient their@email.example zecretazzets.txt
# \u2192 Creates zecretazzets.txt.gpg (only recipient can decrypt)
# 7. Encrypt and sign (for yourself + recipient, proves origin)
gpg
encrypt sign
recipient your@email.example recipient their@email.example zecretazzets.txt
# \u2192 Creates signed & encrypted zecretazzets.txt.gpg
# 8. Decrypt any .gpg file
gpg –decrypt zecretazzets.txt.gpg > zecretazzets.txt
# \u2192 Prompts for passphrase (or private key passphrase); restores original.
# 9. Create detached signature (prove file integrity/authenticity)
gpg
armor detach-sign zecretazzets.txt
# \u2192 Creates zecretazzets.txt.asc (signature file)
# 10. Verify detached signature
gpg –verify zecretazzets.txt.asc zecretazzets.txt
# \u2192 Confirms file hasn't been tampered with and matches signer's key.
# 11. Quick one-liners
gpg -c file.txt # Symmetric encrypt
gpg -e -r recip@email file.txt # Encrypt to recipient
gpg -d file.txt.gpg > file.txt # Decrypt
gpg -se -r you@email file.txt # Sign + encrypt to self
gpg
export-secret-keys armor you@email > mysecret.asc # Backup private key
# 12. Secure cleanup (overwrite & delete original plaintext)
shred -u zecretazzets.txt # Linux: overwrite and delete
# rm -P zecretazzets.txt # macOS alternative (use with caution)