man-pages
X Shell Command Reference
Section titled “X Shell Command Reference”Complete command documentation for the X Shell GreyScript framework.
Table of Contents
Section titled “Table of Contents”- System & Process Management
- File Operations
- Network Operations
- Security & Exploitation
- Text Processing
- Development Tools
- Package Management
- Utilities
System & Process Management
Section titled “System & Process Management”Interactive process monitoring with real-time CPU/memory visualization.
Usage: htop [--deploy]
Flags:
--deploy- Install htop on target system
Features:
- Real-time process list with CPU/memory bars
- Color-coded resource usage
- PID, user, CPU%, memory%, command display
- Auto-refresh every 3 seconds
Examples:
htop # Launch monitorhtop --deploy # Install on systemDisplay running processes (used in pipes).
Usage: ps [-u user] [-C command]
Flags:
-u <user>- Filter by username-C <command>- Filter by command name
Output Format: USER PID CPU% MEM% COMMAND
Examples:
ps # All processesps -u root # Root's processesps -C sshd # SSH daemon processesps -u guest -C bash # Guest's bash processesps | wc -l # Count processesTerminate processes by PID or name.
Usage: kill <pid|name>... [--all|-a [name]]
Arguments:
<pid>- Process ID to kill<name>- Process name to kill
Flags:
-a/--all- Kill all processes-a <name>- Kill all processes matching name
Examples:
kill 1234 # Kill PID 1234kill Terminal.exe # Kill by namekill -a bash # Kill all bash processeskill -a # Kill all (dangerous!)List open files and processes for current user.
Usage: lsof
Features:
- Shows all running processes
- Displays full path to executables
- Current user context only
Examples:
lsof # List all open filesuptime
Section titled “uptime”Display system uptime and load information.
Usage: uptime
Features:
- Shows boot time
- Current uptime duration
- User count
- Load averages (if available)
Examples:
uptime # Show system uptimereboot
Section titled “reboot”Reboot the computer (requires root).
Usage: reboot
Examples:
reboot # Restart systemPause execution for specified seconds.
Usage: wait <seconds>
Arguments:
<seconds>- Number of seconds to wait
Examples:
wait 5 # Wait 5 secondswait 0.5 # Wait half secondExecute command and measure execution time.
Usage: time <command> [args...]
Features:
- Measures real execution time
- Displays in seconds with precision
- Works with any command
Examples:
time ls -la # Time directory listingtime nmap 192.168.1.1 # Time port scanneofetch
Section titled “neofetch”Display system information with ASCII art.
Usage: neofetch
Features:
- Hostname and user
- OS information
- Kernel version
- Uptime
- Shell type
- CPU info
- Memory usage
- Disk usage
- Network info
- ASCII art logo
Examples:
neofetch # Show system infosystemLock
Section titled “systemLock”Monitor and log system access attempts.
Usage: systemLock
Features:
- Monitors login attempts
- Logs unauthorized access
- Alerts on suspicious activity
- Continuous background monitoring
Examples:
systemLock # Start system monitorIntrusion Detection System with multi-vector monitoring.
Usage: ids
Features:
- Process monitoring
- File integrity checking
- Firewall rule monitoring
- Real-time alerts
- Automatic response options
Examples:
ids # Launch IDSmissions
Section titled “missions”Automated mission contract handler for email-based contracts.
Usage: missions [--bypass-rshell]
Flags:
--bypass-rshell- Skip rshell server requirement check
Mission Types:
- ACADEMIC - Grade manipulation (requires GUI access)
- POLICE - Police record modification (requires GUI access)
- CORRUPTION - Boot process corruption (rename /boot to /boots)
- GETFILE - Remote file retrieval and download
- DELETEFILE - File deletion on target systems
- CREDENTIALS - Password extraction from /etc/passwd
Features:
- Automatic email parsing of mission contracts
- Intelligent exploit acquisition and prioritization
- Shell priority: root > user > guest
- Router bounce attacks for indirect access
- GUI automation for manual tasks
- Result reporting and statistics
- Log clearing after operations
Requirements:
- Active mail session (
email -l) - Exploit database (
expcommand) - Mission email with subject: “Mission Contract”
- Router attack configuration for some missions (
config -v)
Configuration:
Many missions require router attack settings in ~/.xrc:
- Router Attack Library - Library for advanced attacks (set via
config -v NAME, e.g.,config -v ssh) - Router Attack Method - Specific exploit to use (set via
config -x INDEX, e.g.,config -x 3)
Configure via: config -v and config -x or manually edit ~/.xrc
Examples:
# Setupemail -l missions@mail.com # Login to mission accountapt update -e -c 5 # Update exploits (5 passes)
# Run missionsmissions # Process all contractsmissions --bypass-rshell # Skip rshell check
# Check configurationconfig # View current settingsconfig -v # Interactive setupOutput Example:
Mission Statistics: Academic: 2 Police: 1 GetFile: 3
Academic Mission #1: IP: 192.168.1.100 Target: 192.168.1.50 Student: John Doe Subject: Mathematics Action: change to 8 [SUCCESS] Successfully modified gradeNotes:
- Academic/Police missions open GUIs for manual completion
- CRITICAL: Configure router attack settings via
config -v - Many missions require router attack library configuration
- RShell servers managed via
rshell listcommand - Failed missions marked with yellow/red text
- “Any User” missions exclude guest accounts
See Also: email, exp, open, rshell, config
reload
Section titled “reload”Reload cached data lists and databases.
Usage: reload -a|-d|-P|-m|-c
Flags:
-a- Reload all cached lists and databases-d- Reload exploit database-P- Rebuild rainbow table hash index-m- Reload metaxploit framework data-c- Reload crypto library data
Features:
- Database cache management
- Exploit list refresh
- Rainbow table indexing
- Framework data reload
- Corruption recovery
Examples:
reload -a # Reload everythingreload -d # Reload exploits onlyreload -P # Rebuild rainbow indexreload -m # Reload metaxploitreload -c # Reload crypto dataSee Also: load, exp
Display X statistics and metrics.
Usage: stats -s|-l|-d|-dl [-s]
Flags:
-s- General system statistics-l- Library usage statistics-d- Database statistics-dl [-s]- Detailed database view (optional sort with -s)
Features:
- System performance metrics
- Library usage tracking
- Database statistics
- Resource usage analysis
Examples:
stats -s # System statisticsstats -l # Library statisticsstats -d # Database statisticsstats -dl -s # Detailed sorted database statsSpawn new X instance for multi-session work.
Usage: spawn [-p|--pass PASSWORD] [-u USER]
Flags:
-p- Launch as root with password prompt (secure)--pass PASSWORD- Launch as root with password specified-u USER- Launch as specific user
Features:
- Multi-session support
- User switching
- Root spawning
- MAIN session only
Examples:
spawn # Spawn as current userspawn -p # Spawn as root (prompt)spawn --pass mypass # Spawn as root (password)spawn -u tux # Spawn as user tuxSee Also: sess
Exit framework or active session.
Usage: exit [y]
Arguments:
[y]- Skip confirmation prompt
Aliases: x, home
Features:
- Session termination
- Connection cleanup
- Optional confirmation
- Return to main system
Examples:
exit # Exit with promptexit y # Exit immediatelyx # Quick exit aliashome # Return home aliasSee Also: close
Close session or object without terminating.
Usage: close
Alias: c
Features:
- Keep sessions active
- Close without termination
- Preserves connections
- Alternative to exit/home
Note: Use close to keep sessions active. Using x, exit, or home terminates active sessions.
Examples:
close # Close sessionc # Quick close aliasSee Also: exit, home
File Operations
Section titled “File Operations”List directory contents with detailed information.
Usage: ls [directory] [-a|--all] [-o|--octal]
Arguments:
[directory]- Directory to list (default: current)
Flags:
-a/--all- Recursive listing-o/--octal- Show octal permissions
Features:
- Color-coded by type (directories, files, links, bins)
- Permission display (symbolic or octal)
- Owner and group information
- File size in human-readable format
- Last modified timestamp
- Icon support for file types
Examples:
ls # List current directoryls /home # List /homels -a # Recursive all subdirsls -o # Show octal permissionsls -a -o /etc # Recursive with octalChange working directory with smart navigation.
Usage: cd [directory]
Arguments:
[directory]- Target directory (default: home)
Special Patterns:
~- Home directory..- Parent directory-- Previous directory*- Wildcard (opens interactive menu)
Features:
- Tab completion support
- Wildcard matching with selection menu
- History tracking (previous directory)
- Auto-completion for partial matches
Examples:
cd # Go to homecd /etc # Go to /etccd .. # Go up one levelcd - # Go to previous dircd lib* # Wildcard menu (lib, libs, library)Change directory and list contents in one operation.
Usage: cdl [directory]
Arguments:
[directory]- Target directory (default: home)
Special Patterns:
..- Parent directory-/back- Previous directory
Features:
- Combined cd + ls operation
- Time-saving reconnaissance tool
- Standard cd shortcuts
- Auto-listing after navigation
Examples:
cdl # Go home and listcdl /etc # Go to /etc and listcdl .. # Go up one level and listcdl - # Go to previous dir and listcdl back # Same as cdl -cdl /var/log # Navigate to logs and show contentsPrint working directory.
Usage: pwd
Examples:
pwd # Show current directoryCreate new directories with batch support.
Usage: mkdir <directory>... [-y] [-l] [-p path]
Arguments:
<directory>...- One or more directory names
Flags:
-y- Overwrite if exists-l- Loop mode (create until ‘x’)-p <path>- Prefix path for all directories
Features:
- Batch creation
- Interactive loop mode
- Prefix path support
- Overwrite protection
Examples:
mkdir newdir # Create single directorymkdir dir1 dir2 dir3 # Create multiplemkdir -y testdir # Overwrite if existsmkdir -l # Loop mode (create many)mkdir -p /var/ test1 test2 # Create in /var/Create directory and change into it atomically.
Usage: mkcd <directory>
Arguments:
<directory>- Directory to create and enter
Examples:
mkcd newproject # Create and cdmkcd /var/workspace # Create nested and cdCreate empty files or update timestamps.
Usage: touch <file>...
Arguments:
<file>...- One or more files to create/update
Features:
- Creates empty files if not exist
- Updates timestamps if exist
- Batch creation support
- Glob pattern support
Examples:
touch file.txt # Create single filetouch a.txt b.txt c.txt # Create multipletouch *.log # Update all .log filesRemove files and directories.
Usage: rm <path>... [-r|-R]
Arguments:
<path>...- Files or directories to remove
Flags:
-r/-R- Recursive deletion (for directories)
Features:
- Single or batch deletion
- Directory removal with recursive flag
- Glob pattern support
- Confirmation prompts
Examples:
rm file.txt # Remove filerm *.tmp # Remove all .tmp filesrm -r directory # Remove directory recursivelyrm file1.txt file2.txt # Remove multiple filesRemove empty directories.
Usage: rmdir <directory>...
Arguments:
<directory>...- Empty directories to remove
Features:
- Only removes empty directories
- Batch removal support
- Glob pattern support
- Safety checks
Examples:
rmdir olddir # Remove empty directoryrmdir dir1 dir2 # Remove multiplermdir test* # Remove all matchingQuick remove with minimal prompts.
Usage: qrm <path>...
Arguments:
<path>...- Files or directories to remove
Features:
- Fast deletion without confirmations
- Recursive by default
- Batch support
- Glob patterns
Examples:
qrm *.log # Remove all logsqrm temp/ # Remove directoryqrm file1 file2 dir1 # Remove multipleCopy files and directories.
Usage: cp <source> <dest> [name] [-r] [-l] [-n name] [-z]
Arguments:
<source>- Source file or directory<dest>- Destination path[name]- Optional new name
Flags:
-r- Recursive copy (for directories)-l- Create link instead of copy-n <name>- Specify name-z- Create zip archive
Features:
- File and directory copying
- Rename during copy
- Link creation
- Zip compression
- Batch operations
- Glob support
Examples:
cp file.txt /var # Copy filecp file.txt /var backup.txt # Copy and renamecp -r /etc/config /backup # Copy directorycp -z files/ archive.zip # Create zipcp *.txt /backup # Copy all .txt filesMove or rename files and directories.
Usage: mv <source> <dest> [name] [-r] [-l] [-n name] [-z]
Arguments:
<source>- Source file or directory<dest>- Destination path[name]- Optional new name
Flags:
-r- Recursive move (for directories)-l- Create link-n <name>- Specify name-z- Create zip
Features:
- Move or rename files/directories
- Cross-directory moves
- Rename during move
- Batch operations
- Glob support
Examples:
mv file.txt newname.txt # Rename filemv file.txt /var # Move filemv file.txt /var backup.txt # Move and renamemv -r olddir /var newdir # Move directorymv *.log /archive # Move all logsDisplay file contents with optional syntax highlighting.
Usage: cat <file>... [-n] [-f]
Arguments:
<file>...- Files to display
Flags:
-n- Show line numbers-f- Force syntax highlighting
Features:
- Multi-file concatenation
- Syntax highlighting for .src files
- Line numbers option
- Glob pattern support
- Large file handling
Examples:
cat file.txt # Display filecat file1.txt file2.txt # Display multiplecat -n script.src # With line numberscat *.log # Display all logscat -f code.src # Force highlightingPaginated file viewer with scrolling.
Usage: more <file> [-c number]
Arguments:
<file>- File to view
Flags:
-c <number>- Lines per page (default: 25)
Features:
- Paginated viewing
- Forward/backward navigation
- Search functionality
- Custom page size
- Large file support
Controls:
- Space/Enter - Next page
- ‘b’ - Previous page
- ‘q’ - Quit
- ’/’ - Search
Examples:
more largefile.txt # View with paginationmore -c 50 data.txt # 50 lines per pageDisplay beginning of file with optional auto-refresh.
Usage: head <file> [-l lines] [-p seconds]
Arguments:
<file>- File to display
Flags:
-l <lines>- Number of lines to show (default: 10)-p <seconds>- Periodic refresh interval
Features:
- First N lines display
- Auto-refresh mode for logs
- Configurable line count
- Real-time monitoring
Examples:
head log.txt # First 10 lineshead -l 20 file.txt # First 20 lineshead -l 5 -p 2 log.txt # 5 lines, refresh every 2sDisplay end of file with optional follow mode.
Usage: tail <file> [-l lines] [-f]
Arguments:
<file>- File to display
Flags:
-l <lines>- Number of lines to show (default: 10)-f- Follow mode (real-time updates)
Features:
- Last N lines display
- Real-time log following
- Configurable line count
- Auto-scroll
Examples:
tail log.txt # Last 10 linestail -l 20 file.txt # Last 20 linestail -f log.txt # Follow mode (Ctrl+C to stop)Display directory tree structure.
Usage: tree [directory]
Arguments:
[directory]- Root directory (default: current)
Features:
- Hierarchical tree view
- Color-coded by type
- Size information
- Permission display
- Nested structure visualization
Examples:
tree # Current directory treetree /etc # /etc directory treetreeSimple
Section titled “treeSimple”Simplified directory tree (names only).
Usage: treeSimple [directory]
Arguments:
[directory]- Root directory (default: current)
Examples:
treeSimple # Simple treetreeSimple /home # Simple tree of /hometreeWide
Section titled “treeWide”Wide directory tree with full paths.
Usage: treeWide [directory]
Arguments:
[directory]- Root directory (default: current)
Examples:
treeWide # Wide tree formattreeWide /var # Wide tree of /varDisplay comprehensive file/directory information.
Usage: file <path> [-o] [-s]
Arguments:
<path>- File or directory path
Flags:
-o- Show octal permissions-s- Show system stats
Features:
- File type detection
- Permission display (symbolic/octal)
- Owner and group
- File size
- Timestamps (created, modified, accessed)
- Path information
- System stats
Examples:
file script.sh # File infofile -o binary # With octal permissionsfile -s /etc # With system statsDisplay file statistics.
Usage: stat <file>
Arguments:
<file>- File path
Features:
- Detailed file metadata
- Inode information
- Block size
- Links count
- Full timestamp details
Examples:
stat important.txt # Show file statsCreate symbolic links or list existing links.
Usage: ln <source> <dest> [name] [-l]
Arguments:
<source>- Target file/directory<dest>- Link destination[name]- Optional link name
Flags:
-l- List all symlinks in system
Features:
- Symbolic link creation
- Link listing
- Glob pattern support
- Multi-link creation
Examples:
ln /bin/tool /usr/bin mytool # Create linkln -l # List all symlinksln *.sh /usr/bin # Link multiple filesAdvanced filesystem search with multiple criteria.
Usage: find [-a pattern] [-p path] [-i] [-e] [-c] [--type]
Flags:
-a <pattern>- Filename pattern-p <path>- Search path (default: current)-i- Case-insensitive-e- Exact match-c- Search file contents
Type Filters:
--binary- Binary executables only--folder- Directories only--text- Text files only--link- Symlinks only
Permission Filters:
-r- Readable files only-w- Writable files only-x- Executable files only
Features:
- Recursive search
- Wildcard support
- Content search
- Type filtering
- Permission filtering
- Regex patterns
Examples:
find -a "*.txt" # Find all .txt filesfind -a config -i # Case-insensitive searchfind -p /etc -a "*.conf" # Search in /etcfind -c "password" # Search file contentsfind --binary -x # Find executablesfind -a "test*" --folder # Find test directorieslocate
Section titled “locate”Fast file search using full path matching.
Usage: locate <pattern> [-s]
Arguments:
<pattern>- Filename or pattern to search
Flags:
-s- Strict/exact match mode
Features:
- Fast whole-system search
- Pattern matching
- Exact match mode
- Full path search
Examples:
locate config.txt # Find config.txtlocate -s passwd # Exact match onlylocate "*.log" # Find all log filesOpen file or directory with default application.
Usage: open <path>
Arguments:
<path>- File or directory to open
Features:
- Default app selection
- Directory opening in file manager
- Text file editor
- Binary execution
Examples:
open . # Open current directoryopen file.txt # Open in editoropen script.src # Open GreyScript fileText editor with syntax highlighting.
Usage: vi <file>...
Arguments:
<file>...- Files to edit
Features:
- Full-screen text editor
- Syntax highlighting
- Multi-file editing
- Line numbers
- Search and replace
- Glob pattern support
Examples:
vi file.txt # Edit single filevi script1.src script2.src # Edit multiplevi *.conf # Edit all .conf filesEmpty file contents (file remains).
Usage: clean [file]
Arguments:
[file]- File to clean (default: prompt)
Features:
- Clears file content
- File structure preserved
- No deletion
- Quick reset
Examples:
clean log.txt # Clear log fileclean # Prompt for fileChange file permissions (symbolic or octal).
Usage: chmod <mode> <path>... [-R|-r]
Arguments:
<mode>- Permission mode (octal or symbolic)<path>...- Files/directories to modify
Flags:
-R/-r- Recursive (apply to all subdirectories/files)
Modes:
- Octal: 755, 644, 777, etc.
- Symbolic: u+x, go-w, a+r, etc.
- u (user), g (group), o (others), a (all)
-
- (add), - (remove), = (set)
- r (read), w (write), x (execute)
Features:
- Octal and symbolic modes
- Recursive application
- Batch operations
- Glob pattern support
Examples:
chmod 755 script.sh # Octal modechmod u+x script.sh # Add execute for userchmod go-w file.txt # Remove write for group/otherschmod a+r document.txt # Add read for allchmod -R 644 /var/www # Recursive octalchmod -r u+x *.sh # Add execute to all .sh filesChange file owner.
Usage: chown <user> <path>... [-R|-r]
Arguments:
<user>- New owner username<path>...- Files/directories to modify
Flags:
-R/-r- Recursive
Features:
- Change file ownership
- Recursive application
- Batch operations
- Glob pattern support
Examples:
chown root file.txt # Change ownerchown -R admin /etc/config # Recursive changechown user *.txt # Change multiple filesChange file group.
Usage: chgrp <group> <path>... [-R|-r]
Arguments:
<group>- New group name<path>...- Files/directories to modify
Flags:
-R/-r- Recursive
Features:
- Change file group
- Recursive application
- Batch operations
- Glob pattern support
Examples:
chgrp admin file.txt # Change groupchgrp -R developers /project # Recursive changechgrp staff *.txt # Change multiple filesChange owner and group simultaneously with permissions.
Usage: chog <user> <path>... [-R|-r]
Arguments:
<user>- New owner (group set to user’s primary)<path>...- Files/directories to modify
Flags:
-R/-r- Recursive
Features:
- Changes owner, group, and permissions
- Sets full rwx permissions
- Recursive application
- Batch operations
- Glob pattern support
Examples:
chog root script.sh # Full ownership changechog -R admin /srv/app # Recursive with permschog user *.conf # Change multiple filesfolderWatcher (fw)
Section titled “folderWatcher (fw)”Monitor directory for changes in real-time.
Usage: folderWatcher <directory> [interval]
Alias: fw
Arguments:
<directory>- Directory to watch[interval]- Check interval in seconds (default: 5)
Features:
- Real-time change detection
- New file alerts
- Modified file alerts
- Deleted file alerts
- Timestamp tracking
- Continuous monitoring
Examples:
fw /var # Watch /var (5s interval)fw /var/log 2 # Watch with 2s intervalfolderWatcher /home/user 10 # 10s intervallogWatcher
Section titled “logWatcher”Monitor system log in real-time.
Usage: logWatcher
Features:
- Watches /var/system.log
- Real-time log streaming
- Auto-scroll
- Color-coded entries
- Timestamp display
Examples:
logWatcher # Watch system logNetwork Operations
Section titled “Network Operations”ifconfig
Section titled “ifconfig”Display and configure Ethernet network interface.
Usage: ifconfig [interface] [ip] [gateway]
Arguments:
[interface]- Network interface name (default: eth0)[ip]- IP address to assign[gateway]- Gateway address
Features:
- Display network configuration
- Set IP address
- Configure gateway
- Interface status
- MAC address display
Examples:
ifconfig # Show configifconfig eth0 # Show eth0ifconfig eth0 192.168.1.100 192.168.1.1 # Configureiwconfig
Section titled “iwconfig”Display and configure WiFi network interface.
Usage: iwconfig [interface] [essid] [bssid] [password]
Arguments:
[interface]- WiFi interface (default: wlan0)[essid]- Network ESSID[bssid]- Router BSSID (MAC)[password]- Network password
Features:
- Display WiFi configuration
- Connect to networks
- Signal strength display
- MAC address display
- Encryption status
Examples:
iwconfig # Show WiFi configiwconfig wlan0 # Show wlan0iwconfig wlan0 MyNetwork AA:BB:CC:DD:EE:FF password123Quick network connection (auto-detects Ethernet/WiFi).
Usage:
- Ethernet:
jump <ip> <gateway> - WiFi:
jump <essid> <bssid> [password]
Features:
- Auto-detection of connection type
- Quick Ethernet setup
- Quick WiFi connection
- Minimal syntax
Examples:
jump 192.168.1.100 192.168.1.1 # Ethernetjump HomeWiFi AA:BB:CC:DD:EE:FF pass # WiFiTest network connectivity with ICMP echo.
Usage: ping <host>
Arguments:
<host>- Hostname or IP address
Features:
- ICMP echo request
- DNS resolution
- Latency measurement
- Packet loss detection
- Round-trip time
Examples:
ping google.com # Ping by hostnameping 8.8.8.8 # Ping by IPnslookup
Section titled “nslookup”DNS hostname resolution.
Usage: nslookup <hostname>
Arguments:
<hostname>- Domain name to resolve
Features:
- DNS query
- IP address resolution
- Multiple result handling
- Error reporting
Examples:
nslookup google.com # Resolve to IPnslookup github.com # Resolve GitHubDisplay detailed router/host information.
Usage: whois <ip>
Arguments:
<ip>- IP address to query
Features:
- Router information
- Open ports display
- LAN devices
- Public IP
- Local IP
- Gateway info
- Service detection
Examples:
whois 192.168.1.1 # Query routerwhois 8.8.8.8 # Query remote IPNetwork port scanner with service detection.
Usage: nmap <target> [-r|-l|-p] [-e]
Arguments:
<target>- IP address or hostname
Flags:
-r- Use remote IP for scan source-l- Use local IP-p- Use public IP-e- Extended information
Features:
- Port scanning
- Service detection
- Version detection (extended)
- Banner grabbing
- LAN IP detection
- Multiple target types
Examples:
nmap 192.168.1.1 # Basic scannmap target.com -e # Extended scannmap 10.0.0.1 -l # Scan from local IPscanlib
Section titled “scanlib”Scan and exploit vulnerable libraries on target.
Usage: scanlib <target>
Arguments:
<target>- IP address to scan
Features:
- Library enumeration
- Vulnerability detection
- Exploit suggestions
- Metaxploit integration
Examples:
scanlib 192.168.1.50 # Scan librariesscanrouter
Section titled “scanrouter”Scan router for vulnerabilities and open ports.
Usage: scanrouter <ip>
Arguments:
<ip>- Router IP address
Features:
- Port enumeration
- Service detection
- Vulnerability assessment
- Exploit database lookup
Examples:
scanrouter 192.168.1.1 # Scan routerSecure copy files over SSH.
Usage: scp <source> <dest>
Arguments:
<source>- Local or remote file path<dest>- Destination path
Features:
- Secure file transfer
- Shell connection required
- Bidirectional transfer
- Progress indication
Examples:
scp local.txt /remote/path # Uploadscp /remote/file.txt /local # DownloadSynchronize files/directories.
Usage: rsync <source> <dest> [-r] [-v]
Arguments:
<source>- Source path<dest>- Destination path
Flags:
-r- Recursive-v- Verbose
Features:
- Incremental sync
- Recursive directory sync
- Minimal data transfer
- Progress display
Examples:
rsync file.txt /backup # Sync filersync -r /home/user /backup # Sync directoryDenial of Service attack tools and network flooding.
Usage: ddos [-p target] [-d] [-r count] [-f count] [-ff] [-c cycles] [-b]
Flags:
-p <target>- Target IP for port flooding-d- Deploy reverse shells-r <count>- Create N reverse shell files-f <count>- Filesystem flood (N files)-ff- Extreme filesystem flood-c <cycles>- Number of attack cycles-b- Background mode
Features:
- Port flooding
- Reverse shell deployment
- Filesystem flooding
- Multi-cycle attacks
- Background operation
Examples:
ddos -p 192.168.1.1 -c 5 # Port flood 5 cyclesddos -r 10 # Deploy 10 rshellsddos -f 1000 # Create 1000 filesddos -d -b # Deploy rshells backgroundairmon
Section titled “airmon”WiFi monitor mode management.
Usage: airmon <start|stop> <interface>
Arguments:
<start|stop>- Enable or disable monitor mode<interface>- WiFi interface name
Features:
- Monitor mode control
- Packet capture preparation
- Interface management
Examples:
airmon start wlan0 # Enable monitor modeairmon stop wlan0 # Disable monitor modeaireplay
Section titled “aireplay”WiFi packet injection for capturing handshakes.
Usage: aireplay <bssid> <essid> [acks]
Arguments:
<bssid>- Target router MAC address<essid>- Network ESSID[acks]- Number of packets to inject (default: 100)
Features:
- Deauth packet injection
- Handshake capture
- Packet generation
- Progress display
Examples:
aireplay AA:BB:CC:DD:EE:FF HomeNet # Inject 100 packetsaireplay AA:BB:CC:DD:EE:FF HomeNet 500 # Inject 500 packetsaircrack
Section titled “aircrack”Crack WiFi passwords from capture files.
Usage: aircrack <capture_file>
Arguments:
<capture_file>- .cap file path
Features:
- WPA/WPA2 cracking
- Dictionary attack
- Handshake analysis
- Multi-file support
Examples:
aircrack capture.cap # Crack from captureaircrack wpa.cap # Crack WPA handshakeSecurity & Exploitation
Section titled “Security & Exploitation”decipher
Section titled “decipher”Password hash cracker for MD5 hashes.
Usage: decipher <hash|file> [-d] [-u user]
Arguments:
<hash>- MD5 hash to crack<file>- File containing hashes (e.g., /etc/passwd)
Flags:
-d- Dictionary mode (uses wordlist)-u <user>- Filter by username in passwd file
Features:
- MD5 hash cracking
- Dictionary attacks
- Crypto library integration
- /etc/passwd parsing
- Progress display
- Multiple hash support
Examples:
decipher 5f4dcc3b5aa765d61d8327deb882cf99 # Crack single hashdecipher /etc/passwd -u root # Crack root passworddecipher -d hashes.txt # Dictionary attackhashcat (hc)
Section titled “hashcat (hc)”Hash generation and cracking tools.
Usage: hashcat [-w word] [-h hash] [-d hash] [-f file]
Flags:
-w <word>- Generate MD5 hash from word-h <hash>- Crack hash with dictionary-d <hash>- Crack hash with crypto-f <file>- Process file of hashes
Features:
- MD5 hash generation
- Dictionary-based cracking
- Crypto library cracking
- Batch file processing
- Progress tracking
Examples:
hashcat -w password123 # Generate hashhashcat -h 5f4dcc3b5aa765d61d8327deb882cf99 # Dictionary crackhashcat -d 5f4dcc3b5aa765d61d8327deb882cf99 # Crypto crackhashcat -f hashes.txt # Crack filehashfile (hf)
Section titled “hashfile (hf)”Batch password hash cracker.
Usage: hashfile <file> [-p]
Arguments:
<file>- File containing hashes
Flags:
-p- Shortcut for /etc/passwd
Features:
- Batch hash cracking
- /etc/passwd support
- Progress tracking
- Result caching
Examples:
hashfile hashes.txt # Crack filehf -p # Crack /etc/passwdSecurely wipe files and log entries.
Usage: scrub <file>
Arguments:
<file>- File to securely delete
Features:
- Secure file deletion
- Multi-pass overwrite
- Log entry removal
- No recovery possible
Examples:
scrub sensitive.txt # Secure deletescrub evidence.log # Wipe filePObject 0day exploitation framework.
Usage: 0day [command] [options]
Commands:
-m- List managed engineers-a <name> <pass>- Add engineer credentials-v- View patch status-r <index>- Remove engineerpurge- Clear all engineers-p <library>- Patch library-c <library|ip:port> [true]- Exploit library/service-pa <path>- Patch all libraries in pathmode [ip]- Launch 0day modeneuro [options]- Automated Neurobox scanningnext- Next Neurobox IPleft- IPs remaining in Neurobox
Library Shortcuts:
router, ssh, ftp, http, chat, rshell, repo, cam, sql, smtp, init, kernel, net, apt, cry, meta
Neuro Flags:
-e <email>- Email address-p <pass>- Email password-t <target>- Target IP-i <ip>- Start IP-l <start>- Start line--bash <script>- Execute bash script
Features:
- PObject exploitation
- Library patching
- Engineer credential management
- Automated Neurobox scanning
- Interactive PObject interpreter
- Multi-hop attack support
- Requires root shell
PObject Interpreter Commands:
help, exit, cls, libs, scan, meta, ports, probe, main, chmod, chown, chgrp, cp, mv, rn, rm, mkdir, touch, passwd, useradd, userdel, groupadd, groupdel, ps
Examples:
# Engineer management0day -m # List engineers0day -a admin mypass # Add engineer0day -v # View patch status0day -r 1 # Remove engineer
# Library operations0day -p ssh # Patch libssh.so0day -c router # Exploit router0day -c 192.168.1.1:22 true # Exploit IP:port with verbose0day -pa /lib # Patch all in /lib
# 0day mode and Neurobox0day mode # Launch 0day mode0day mode 192.168.1.1 # With rshell server IP0day neuro -e mail@test.com -p pass -t 192.168.1.10day next # Next Neurobox IP0day left # Remaining IPsContexts: main, proxy, shell only (disabled for ftpshell)
See Also: exploit, scan, lms
inject
Section titled “inject”Inject reverse shell backdoor into source files.
Usage: inject <file> [-i ip] [-p port] [-n name]
Arguments:
<file>- Source file to inject
Flags:
-i <ip>- Callback IP address-p <port>- Callback port-n <name>- Process name to hide as
Features:
- Reverse shell injection
- Process name masking
- Auto-compilation option
- Stealth mode
Examples:
inject script.src -i 1.2.3.4 -p 1222 # Basic injectioninject app.src -i 1.2.3.4 -p 1222 -n ps # With maskingQuick exploitation and pwning tools.
Usage: zap
Features:
- Rapid exploitation
- Auto-escalation
- Multi-vector attacks
- Session establishment
Examples:
zap # Launch exploitationwallet
Section titled “wallet”Cryptocurrency wallet management.
Usage: wallet
Features:
- Coin balance display
- Transaction history
- Multiple wallet support
- Transfer functions
Examples:
wallet # Manage walletsblockchain
Section titled “blockchain”Cryptocurrency coin and subwallet creation.
Usage: blockchain [-n coin_name] [-u username] [-p password]
Flags:
-n <name>- Coin name-u <username>- Username-p <password>- Password
Features:
- Create new coins
- Generate subwallets
- Blockchain initialization
- Wallet management
Examples:
blockchain -n MyCoin -u admin -p secret # Create coinblockchain -n TestCoin # Create test coinsmtpUserList
Section titled “smtpUserList”Query SMTP server for user list.
Usage: smtpUserList <ip>
Arguments:
<ip>- SMTP server IP
Features:
- SMTP user enumeration
- Email address discovery
- Server probing
Examples:
smtpUserList 192.168.1.50 # Query SMTP usersSwitch user context.
Usage: su [user] [password]
Arguments:
[user]- Username (default: root)[password]- User password
Features:
- User context switching
- Root escalation
- Password prompt
- Deferred command support
Examples:
su # Switch to root (prompt)su admin # Switch to admin (prompt)su root password123 # Switch with passwordpasswd
Section titled “passwd”Change user password.
Usage: passwd <username> [password]
Arguments:
<username>- User to change password for[password]- New password (optional, will prompt)
Features:
- Password modification
- Root-only for others
- Password strength checking
- Confirmation prompts
Examples:
passwd root # Change root password (prompt)passwd user newpass123 # Change with passworduseradd
Section titled “useradd”Add new user account.
Usage: useradd <username> <password>
Arguments:
<username>- New username<password>- User password
Features:
- User account creation
- Home directory setup
- Default permissions
- Group assignment
Examples:
useradd john password123 # Create useruseradd admin SecurePass! # Create adminuserdel
Section titled “userdel”Delete user account.
Usage: userdel <username>
Arguments:
<username>- User to delete
Features:
- User account removal
- Home directory cleanup
- Group removal
- Permission cleanup
Examples:
userdel john # Delete useruserdel oldadmin # Remove old admingroups
Section titled “groups”Display user’s group memberships.
Usage: groups <username>
Arguments:
<username>- User to query
Features:
- Group membership display
- Primary group indication
- Secondary groups list
Examples:
groups root # Show root's groupsgroups john # Show john's groupsgroupadd
Section titled “groupadd”Add user to group.
Usage: groupadd <user> <group>
Arguments:
<user>- Username<group>- Group name (creates if doesn’t exist)
Features:
- Group membership assignment
- Auto-create groups
- Permission inheritance
Examples:
groupadd john developers # Add to developersgroupadd admin sudo # Add to sudogroupdel
Section titled “groupdel”Remove user from group.
Usage: groupdel <user> <group>
Arguments:
<user>- Username<group>- Group name
Features:
- Group membership removal
- Permission revocation
- Multi-group support
Examples:
groupdel john developers # Remove from developersgroupdel user admin # Remove from adminpsLock
Section titled “psLock”Lock specific processes from termination.
Usage: psLock
Features:
- Process protection
- Kill prevention
- Critical process locking
- Unlock functionality
Examples:
psLock # Lock processesMonitor and log process activity.
Usage: psMon
Features:
- Process monitoring
- Activity logging
- Resource tracking
- Alert generation
Examples:
psMon # Monitor processesText Processing
Section titled “Text Processing”Search for patterns in files with regex support.
Usage: grep <pattern> <file>... [-i] [-l] [-n|-v] [-o] [-c] [-e]
Arguments:
<pattern>- Search pattern<file>...- Files to search (or use in pipes)
Flags:
-i- Case-insensitive search-l- Show line numbers-n/-v- Invert match (show non-matching lines)-o- Count only (return number)-c- Count matching lines-e- Enable regex mode
Features:
- Pattern matching
- Regex support
- Multi-file search
- Line numbers
- Count matches
- Invert matching
- Glob pattern support
Examples:
grep "error" log.txt # Find "error"grep "ERROR" log.txt -i # Case-insensitivegrep "failed" log.txt -l # With line numbersgrep "success" log.txt -v # Invert (non-matching)grep "warning" *.log # Search all .log filesgrep "pattern" file.txt -c # Count matchesgrep "[0-9]+" data.txt -e # Regex searchStream editor for find and replace operations.
Usage: sed <pattern> <replacement> [file]
Arguments:
<pattern>- Text to find<replacement>- Replacement text[file]- File to process (or use in pipes)
Features:
- Text substitution
- Regex support
- Global replacement
- Pipe integration
- In-place editing option
Examples:
sed "old" "new" file.txt # Replace old with newcat file.txt | sed "foo" "bar" # Pipe usagesed "error" "ERROR" *.log # Multiple filesField extraction and text processing.
Usage: awk '<script>' [file]
Arguments:
<script>- AWK script/pattern[file]- File to process (or use in pipes)
Special Variables:
$0- Entire line$1, $2, ...- Fields (space-separated by default)$NF- Last fieldNF- Number of fieldsNR- Line number
Flags:
-F<delimiter>- Set field separator
Features:
- Field extraction
- Custom delimiters
- Pattern matching
- Mathematical operations
- Built-in variables
Examples:
awk '{print $1}' data.txt # First fieldawk -F: '{print $1}' /etc/passwd # Colon delimiterawk '{print $1, $3}' file.txt # Multiple fieldsawk '{print NR, $0}' file.txt # Line numbersawk -F: '{print $1, $NF}' data.txt # First and lastExtract sections from each line.
Usage: cut <file> [-b positions] [-c positions] [-f fields] [-d delimiter]
Arguments:
<file>- File to process
Flags:
-b <positions>- Byte positions (e.g., 1-5, 10-, -20)-c <positions>- Character positions-f <fields>- Field numbers (1-based)-d <delimiter>- Field delimiter (default: whitespace)
Features:
- Byte extraction
- Character extraction
- Field extraction
- Custom delimiters
- Range support
Examples:
cut -f 1 data.txt # First fieldcut -f 1,3 data.txt # Fields 1 and 3cut -f 2 -d : /etc/passwd # Second field, colon delimcut -c 1-10 file.txt # First 10 characterscut -b 5-15 data.bin # Bytes 5-15Sort lines of text.
Usage: sort [file]
Arguments:
[file]- File to sort (or use in pipes)
Flags:
-n- Numeric sort-r- Reverse order-u- Unique (remove duplicates)
Features:
- Alphabetical sorting
- Numeric sorting
- Reverse sorting
- Deduplication
- Pipe integration
Examples:
sort file.txt # Alphabetical sortsort -n numbers.txt # Numeric sortsort -r file.txt # Reverse sortsort -u file.txt # Sort and deduplicatecat data.txt | sort # Pipe usageRemove or count duplicate lines.
Usage: uniq [file]
Arguments:
[file]- File to process (or use in pipes)
Flags:
-c- Count occurrences-i- Case-insensitive
Features:
- Remove consecutive duplicates
- Count duplicates
- Case-insensitive mode
- Works best with sorted input
Examples:
uniq file.txt # Remove duplicatesuniq -c file.txt # Count occurrencesuniq -i file.txt # Case-insensitivesort file.txt | uniq # Sort then deduplicateCount words, lines, and characters.
Usage: wc [file] [-l] [-w] [-c]
Arguments:
[file]- File to count (or use in pipes)
Flags:
-l- Count lines only-w- Count words only-c- Count characters only
Features:
- Line counting
- Word counting
- Character counting
- Multi-file support
- Glob pattern support
Examples:
wc file.txt # All countswc -l file.txt # Line countwc -w file.txt # Word countwc -c file.txt # Character countwc *.txt # Count all .txt filescat file.txt | wc -l # Pipe usageTranslate or delete characters.
Usage: tr <set1> <set2> [file]
Arguments:
<set1>- Characters to replace<set2>- Replacement characters[file]- File to process (or use in pipes)
Features:
- Character translation
- Case conversion
- Character deletion
- Range support (a-z, A-Z, 0-9)
Examples:
tr 'a-z' 'A-Z' file.txt # Lowercase to uppercasetr ',' ' ' data.csv # Replace commas with spacesecho "hello" | tr 'l' 'L' # Replace l with Ltr -d '0-9' file.txt # Delete all digitsReverse strings or lines.
Usage: rev [file]
Arguments:
[file]- File to reverse (or use in pipes)
Features:
- String reversal
- Line-by-line processing
- Pipe integration
Examples:
rev file.txt # Reverse each lineecho "hello" | rev # Output: ollehcat data.txt | rev # Pipe usageTranslate or delete characters from input.
Usage: tr <set1> <set2> or tr -d|-s|-c <set1> [set2]
Flags:
-d- Delete characters in SET1-s- Squeeze repeated characters-c- Complement SET1 (use all characters NOT in SET1)
Character Sets:
- Individual characters:
aeiou - Ranges:
a-z,0-9,A-Z
Features:
- Character translation
- Character deletion
- Repeated character squeezing
- Range support
- Pipe integration
Examples:
# Character translationecho hello | tr aeiou 43100 # h3ll0echo HELLO WORLD | tr A-Z a-z # hello worldecho hello world | tr a-z A-Z # HELLO WORLD
# Character deletionecho hello123world456 | tr -d 0-9 # helloworldecho a:b:c:d | tr -d : # abcdecho hello world | tr -d ' ' # helloworld
# Squeeze repeated charactersecho hello world | tr -s ' ' # hello worldecho heeelllooo | tr -s elo # helo
# Combined operationsecho Hello World123 | tr -d 0-9 | tr -s ' ' # Hello Worldcat file.txt | tr A-Z a-z | tr -s ' ' # Normalize
# With pipingcat /etc/passwd | tr : ' ' | awk '{print $1}' # Extract usernamesecho test123 | tr -d 0-9 | rev # Delete digits then reverseSee Also: sed, awk, grep, cut, rev
Split strings into arrays or files.
Usage: split <delimiter> [file]
Arguments:
<delimiter>- Split delimiter[file]- File to split (or use in pipes)
Features:
- Custom delimiter splitting
- Array output
- Multi-line support
- Pipe integration
Examples:
split , data.csv # Split CSVecho "a:b:c" | split : # Output: [a, b, c]split " " words.txt # Split on spacesJoin array elements or lines with delimiter.
Usage: join [delimiter] [file]
Arguments:
[delimiter]- Join delimiter (default: space)[file]- File to join (or use in pipes)
Features:
- Custom delimiter joining
- Array to string conversion
- Multi-line joining
- Pipe integration
Examples:
echo ["a", "b", "c"] | join , # Output: a,b,cjoin - items.txt # Join with dashjoin "" letters.txt # Join with no separatorCompare two files line by line.
Usage: diff <file1> <file2>
Arguments:
<file1>- First file<file2>- Second file
Features:
- Line-by-line comparison
- Show differences
- Unified diff format
- Color-coded output
Examples:
diff old.txt new.txt # Compare filesdiff config.bak config.txt > changes.txtConvert text to/from l33t speak.
Usage: l33t [-t|-f] [-i input] [-o output]
Flags:
-t- Convert to l33t speak-f- Convert from l33t speak-i <file>- Input file-o <file>- Output file
Features:
- L33t speak conversion
- Reverse conversion
- File I/O support
- Character substitution
Examples:
l33t -t -i input.txt -o output.txt # To l33tl33t -f -i l33t.txt -o normal.txt # From l33techo "hello" | l33t -t # Pipe usageDisplay text with formatting.
Usage: print <text...>
Arguments:
<text...>- Text to display
Features:
- Simple text output
- No newline option
- Color support via Text lib
Examples:
print Hello World # Display textprint "Line 1" "Line 2" # Multiple argsDisplay text with redirect support.
Usage: echo <text...> [> file] [>> file]
Arguments:
<text...>- Text to display
Redirects:
> file- Overwrite file>> file- Append to file
Examples:
echo Hello World # Displayecho "log entry" >> log.txt # Appendecho "config" > config.txt # OverwriteWrite text to file (interactive).
Usage: write <file>
Arguments:
<file>- File to write to
Features:
- Interactive text entry
- Multi-line support
- Append mode
- Save confirmation
Examples:
write notes.txt # Interactive writeCopy text to system clipboard.
Usage: xclip <text>
Arguments:
<text>- Text to copy
Features:
- Clipboard integration
- Pipe support
- Cross-terminal
Examples:
xclip "text to copy" # Copy textcat file.txt | xclip # Copy file contentsDevelopment Tools
Section titled “Development Tools”Compile GreyScript source files.
Usage: build <source> <output> [-a] [-r]
Arguments:
<source>- .src file to compile<output>- Output directory
Flags:
-a- Allow imports-r- Run after build
Features:
- GreyScript compilation
- Import resolution
- Binary output
- Auto-execution option
- Error reporting
Examples:
build script.src /bin # Compile to /binbuild app.src /usr/bin -a # With importsbuild tool.src /bin -r # Compile and runAdvanced build system for custom binaries and tools.
Usage: make [-b flags name] [-a] [-t name] [-r] [-pm|-pp|-pc] [-i bin mode]
Flags:
-b <flags> <name>- Build with flags (S,V,R,T,P,E,D,C,F)- S: System info, V: Verbose, R: rshell, T: Terminal output
- P: Progress bar, E: Encryption, D: Database, C: Crypto
- F: Firewall disable
-a- Build all tools-t <name>- Build specific tool-r- Build rshell backdoor-pm- Build proxy manager-pp- Build proxy parser-pc- Build proxy chain-i <bin> <mode>- Inject code into binary
Features:
- Multi-flag compilation
- Tool-specific builds
- Proxy chain creation
- Code injection
- rshell generation
- Custom binaries
Examples:
make -b RP htop # Build htop with rshell+progressmake -a # Build all toolsmake -t nmap # Build nmap toolmake -r # Build rshellmake -pm # Build proxy managermake -i /bin/tool S # Inject system infoExecute binaries with directory search.
Usage: exec <file> [args...] [-u] [-b]
Arguments:
<file>- Binary to execute[args...]- Command arguments
Flags:
-u- Search /usr/bin-b- Search /bin
Features:
- Binary execution
- Multi-directory search
- Argument passing
- Path resolution
Examples:
exec tool # Execute ./toolexec -b nmap 192.168.1.1 # Execute /bin/nmapexec -u program arg1 arg2 # Execute /usr/bin/programAI-powered natural language command execution.
Usage: ai <natural_language_command>
Arguments:
<natural_language_command>- Plain English command description
Separators (priority order):
and then- Highest priority step separatoralso- Secondary step separator,(comma) - Tertiary separatorand- Lowest priority separator
Features:
- Natural language parsing
- Multi-step automation
- Conditional execution (“if not root then su”)
- Context switching support
- IP/port/service extraction
- Credential detection
- GUI app translation (21 apps)
- Deferred command mechanism
Examples:
ai scan 192.168.1.1 for ssh # Port scanai get ssh from 192.168.1.1 then show accounts # Multi-stepai connect to ftp.example.com also download config.txtai exploit target.com, if not root then su, then install backdoorai open email local with login # Open GUI appConditional Examples:
ai if not root then su # Check privilegeai get shell then if not root then escalate # Multi-conditionalService Detection:
ai connect to ssh 192.168.1.1 port 22 # Explicit portai get ftp shell from target.com # Service typeai scan for http and exploit # Service scanAdvanced bash script interpreter with full programming features.
Usage: run script|@script [-e [name]] [--list] [-n [name]] [-o] [--FILE file script] [--DEBUG] [--ALLOWABS]
Shorthand: @script_name
Flags:
-e [name]- Edit existing bash script in vi--list- List all available bash scripts-n [name]- Create new bash script in vi-o- Open bash folder--FILE <file> <script>- Execute with parameters from file--DEBUG- Enable debug mode with execution flow--ALLOWABS- Allow absolute path execution--SIGBREAK- Break execution on warnings--SIGCONT- Continue after errors--ONERROR <cmd>- Execute command on error
Control Flow:
if/elif/else/endif- Conditionals (==, !=, <, >, <=, >=, and, or, not)switch/case/default/endswitch- Pattern matchingwhile/endwhile- Condition-based loopsuntil/enduntil- Loop until condition truefor/endfor- Iteration (lists, ranges, variables)break- Exit loopcontinue- Skip to next iteration
Functions:
func name(params) / endfunc- Define functions (recursion depth: 10)return_value expr- Return value with arithmeticreturn [command]- Exit script/function
Variables:
set_var(name,value)- Set variableget_var(name)- Retrieve variable- Arithmetic: +, -, *, /, %, ** (power)
Arrays:
push_var list value- Add to endpop_var list- Remove from endpull_var list- Remove from startlen_var name- Get lengthin_var list value- Check existence
Built-in Functions:
- String:
len(),upper(),lower(),substr(),concat(),contains(),replace(),join(),split_str(),trim_str() - Math:
floor(),ceil(),abs(),round(),min(),max(),random(),timestamp(),date() - File:
file_exists(),is_folder(),is_binary(),file_read() - Permissions:
get_permissions(),can_write(),can_execute() - Context:
get_user(),get_home(),get_shell_type(),get_computer_lan_ip(),get_computer_public_ip(),get_root(),get_layer() - Type:
typeof_val(),get_type() - Boolean:
to_yesno(),to_truefalse()
Typed Input:
get_string [prompt]- String inputget_integer [prompt]- Integer inputget_decimal [prompt]- Decimal inputget_any [prompt]- Any value (unlimited use)get_yesno [prompt]- Yes/no input (returns 1/0)
Bash Commands:
bash_print- Print with color support and variable substitutionbash_read- Read file contentbash_view- Display file contentbash_write- Write to filebash_find- Search files (-c content, -e exact)bash_put- Upload file to remote (shell only)bash_get- Download file from remote (shell only)bash_home- Safe return to caller (prevents IPC deadlock)bash_whoami- Get current usernamebash_whatami- Get execution context typebash_pwd- Print working directorybash_scanner- Scan router for portsbash_router_info- Display router informationbash_lan_devices- List LAN devicesbash_device_ports- Show device portsbash_firewall_rules- Display firewall rulesbash_random- Generate random public IP
Color Functions:
orange(), cyan(), magenta(), lime(), bred(), green(), password(), blue(), liteblue(), yellow(), white(), purple(), iyellow(), liteGrey(), error(), red(), grey(), black(), bold()
Examples:
# Basic executionrun myscript.src # Run script@myscript # Shorthandrun script.src arg1 arg2 # With parameters
# Script managementrun --list # List all scriptsrun -n newscript # Create new scriptrun -e oldscript # Edit scriptrun -o # Open bash folder
# Conditionalsif get_var(age) >= 18 bash_print Access grantedelse bash_print Access deniedendif
# Loopsfor ip in [192.168.1.1,192.168.1.2,192.168.1.3] bash_print Scanning get_var(ip) scan --c get_var(ip) routerendfor
# Functionsfunc multiply(a,b) return_value get_var(a)*get_var(b)endfuncset_var(result,multiply(6,7))bash_print 6 * 7 = get_var(result)
# User inputset_var(target,get_string(Enter target IP:))bash_print Targeting: get_var(target)
# Debug moderun --DEBUG script.srcSee Also: bash.md (in docs/), ai
editor
Section titled “editor”Simple GUI text editor.
Usage: edit <file> or edit -n <name> [text]
Command: edit
Flags:
-n <name> [text]- Create new file with optional initial text
Features:
- Graphical interface
- File creation and editing
- Optional initial content
Examples:
edit /home/tux/config.src # Edit existing fileedit -n /home/tux/notes.txt # Create new empty fileedit -n readme.txt Welcome! # Create with initial textSee Also: cat, vi, post
Package Management
Section titled “Package Management”pacman
Section titled “pacman”Arch-style package manager for Grey Hack system.
Usage: pacman <command> [options]
Commands:
setup- Initialize pacman and apt structure-Sl- List all repositories-Sy- Synchronize and update package databases-S- Install packages-Ss <query>- Search for packages-Si [repo]- Show packages from repository-Sa <ip> [port]- Add repository-Sd <ip>- Delete repository-Su- Upgrade packages
Sync/Update Flags (-Sy):
-e- Update exploit database only-l- Update local exploit database-f- Update only scannable libraries--force- Force rescan all libraries-c <count>- Number of passes (default: 10)
Install Flags (-S):
-m- Install/upgrade metaxploit.so-c- Install/upgrade crypto.so-b- Install/upgrade both critical libraries-a- Install arbitrary packages-p <path>- Specify install path-i <path>- Alternative path specification
Add Repo Flags (-Sa):
-r- Fetch random public repository
Upgrade Flags (-Su):
-y- Auto-confirm upgrades-a <package>- Upgrade specific package-p <path>- Specify search path-i <path>- Specify install path
Features:
- Arch-style interface
- Automatic path detection by extension
- Root permission handling for system dirs
- Multi-package installation
- Exploit database synchronization
- Deep library extraction via shell exploits
- Repository management
- Smart upgrade detection
Examples:
pacman setup # Initialize systempacman -Sl # List repositoriespacman -Sa -r # Add random repopacman -Sa 192.168.1.1 1542 # Add specific repopacman -Sd 192.168.1.1 # Remove repopacman -Sy # Sync/update databasespacman -Sy -e -c 20 # Update exploits (20 passes)pacman -Sy -f # Update scannable onlypacman -Sy --force # Force rescan allpacman -S -m # Install metaxploitpacman -S -b # Install both critical libspacman -S -a nmap # Install nmappacman -S -a tool.exe -p /bin # Install to /binpacman -Ss nmap # Search for nmappacman -Si # Show packages from default repopacman -Si 192.168.1.1 # Show from specific repopacman -Su # Upgrade all packagespacman -Su -a nmap -y # Upgrade nmap, auto-confirmSee Also: build
Utilities
Section titled “Utilities”Advanced calculator with functions.
Usage: bc <operation> [args...]
Operations:
- Arithmetic:
+,-,*,/,%,^(power) - Functions:
sqrt,abs,sin,cos,tan,floor,ceil,round - Constants:
pi,e - Random:
rnd [max],rip [count](random IPs) - Conversion:
bin,hex,oct,char,code
Features:
- Order of operations (PEMDAS)
- Trigonometric functions
- Random number generation
- Random IP generation
- Number base conversion
- Character/ASCII conversion
Examples:
bc 10 + 5 # 15bc 2 ^ 10 # 1024bc sqrt 144 # 12bc sin 0 # 0bc pi # 3.14159...bc rnd 100 # Random 0-100bc rip 5 # 5 random IPsbc hex 255 # FFbc char 65 # Abc code A # 65!
Execute last command from history.
Usage: !
Features:
- Re-run most recent command
- No modification
- Quick repetition
Examples:
scan -l # Run scan command! # Re-execute scan -l
hunt ssh # Find SSH service! # Find another SSH service! # And another
exploit -l 192.168.1.50 ssh s # Exploit target! # Retry exploitationSee Also: !!, !!!
Display command history.
Usage: !!
Features:
- Show history buffer
- Review past operations
- Command selection
Examples:
!! # Show command history
# Review recent operationsscan -l # Execute commandsexploit -l TARGET ssh s # More commands!! # Review what was done
# Combined usage!! # View history! # Execute last commandSee Also: !, !!!
Print last issued command without executing.
Usage: !!!
Features:
- Display last command
- No execution
- Command verification
Examples:
scan -l # Execute a command!!! # Print scan -l
# Verification workflowexploit -l 192.168.1.50 ssh s # Run complex command!!! # Verify what was executed! # Re-execute if correct
# Command comparison!!! # Show last command!! # Show full history! # Execute last commandSee Also: !, !!
Swap contents of two files.
Usage: swap <file1> <file2>
Arguments:
<file1>- First file<file2>- Second file
Features:
- Atomic content swap
- Preserves permissions
- No data loss
Examples:
swap config.txt config.bak # Swap configsswap a.txt b.txt # Swap contentsRename files with pattern support.
Usage: rn <old> <new> [path]
Arguments:
<old>- Pattern to find<new>- Replacement pattern[path]- Directory (default: current)
Features:
- Batch renaming
- Pattern matching
- Wildcard support
- Recursive option
Examples:
rn .txt .bak # Rename extensionsrn old new /var # Rename in /varrn test prod # Rename test to prodReverse all filenames in directory (chaos mode).
Usage: bork [directory]
Arguments:
[directory]- Directory to process (default: current)
Features:
- Reverse all filenames
- Extension preservation
- Recursive option
- Undo capability
Examples:
bork # Reverse current dirbork /var # Reverse /varAppend entries to persistent notes file.
Usage: post <text...>
Arguments:
<text...>- Text to append
Features:
- Persistent notes
- Timestamp entries
- Append mode
- Quick access
Examples:
post Remember to backup # Add notepost "Meeting at 3pm" # Add reminderpostPW
Section titled “postPW”Append password entries to secure notes.
Usage: postPW <text...>
Arguments:
<text...>- Password entry
Features:
- Secure password storage
- Encrypted notes
- Timestamp entries
- Quick recall
Examples:
postPW root@server: pass123 # Store passwordpostPW admin login credentials # Store credsMeasure command execution time.
Usage: time <command> [args...]
Features:
- Precise timing
- Millisecond accuracy
- Any command support
- Performance profiling
Examples:
time ls -la # Time directory listtime find -a "*.txt" # Time searchView command help documentation and manual pages.
Usage: man <command> or <command> --help
Commands:
man <command>- Display command manualman apropos <keyword>- Search man pagesman search <keyword>- Find commands by keywordman dump [command]- Export man pages to filescmds/help- List all commands
Wildcards:
$- Home directory.- Current directory..- Parent directory*- Wildcard pattern
Examples:
man ls # View ls manualman apropos network # Find network commandsman dump ssh # Export ssh man pagecmds # List all commandsNetwork & Remote Access
Section titled “Network & Remote Access”Securely access remote computers via SSH.
Usage: ssh [-l] [-t] [-p port] [-P password] user@host
Flags:
-p <port>- Custom port (default: 22)-P <password>- Provide password-t- Enable tunneling (map public IP)-l- Force local main shell
Features:
- Secure remote access
- File transfer with scp
- Password encryption support
- Interactive mode
Examples:
ssh tux@remotehost # Connect with promptssh -P linux tux@host # With password flagssh -p 2222 admin@server # Custom portssh -t -P mypass root@target # Tunnel with passwordscp -d file.txt # Download filescp -u local.txt # Upload fileSee Also: ftp, sssh, nmap
SSH that returns shell object instead of terminal.
Usage: sssh [-l] [-t] [-p port] [-P password] user@host
Flags:
-p <port>- Custom port (default: 22)-P <password>- Provide password-t- Enable tunneling-l- Force local main shell
Features:
- Returns shell object for scripting
- Programmatic remote access
- Same flags as ssh command
Examples:
sssh tux@remotehost # Get shell objectsssh -p 2222 admin@server # Custom portsssh -t -P pass root@target # Tunnel with passwordSee Also: ssh, ftp
File Transfer Protocol for file exchange.
Usage: ftp [-l] [-t] [-p port] [-P password] user@host
Flags:
-p <port>- Custom port (default: 21)-P <password>- Provide password-t/--tunnel- Enable tunneling-l- Force local main shell
Features:
- File upload/download
- Directory navigation
- No remote command execution
- Interactive mode with help
Examples:
ftp tux@remotehost # Connect with promptftp -p 2121 admin@server # Custom portftp -t -P pass root@target # Tunnel with passwordget file.txt # Download (when connected)put local.txt # Upload (when connected)See Also: ssh, sssh, scp
Advanced proxy chain and routing management.
Usage: proxy [options]
Key Flags:
-b- Build proxy chain from Map.conf-q- Quick single hop router proxy-c- Count hops in chain-x- Combine proxy.dat and Map.conf-ri <file>- Import IPs to Map.conf-wo <file>- Export Map.conf-d- Create crash decoy-d -r- Remove and recreate decoy
Features:
- Multi-hop proxy chains
- IP mapping and routing
- Decoy creation
- Chain management
Examples:
proxy -b # Build proxy chainproxy -q # Quick single hopproxy -c # Count hopsproxy -ri custom_ips.dat # Import IPsproxy -d # Create decoyCopy and launch X framework on target systems.
Usage: pivot [-y]
Flags:
-y- Full pivot (complete X framework copy)
Pivot Types:
- Minimal (default) - Used for scanning libraries, installing services
- Full (-y flag) - Complete X framework copy with all features
Features:
- Remote framework deployment
- Continued operations on compromised systems
- Auto-detection of existing X installations
- Maximum pivots (self launches): 17
Examples:
# Basic pivotingscan -p 192.168.1.50 22 # Exploit SSHpivot # Minimal pivot (prompted)pivot -y # Full pivot
# Multi-hop pivotingscan 192.168.1.100 # Compromise first targetpivot # Pivot to first systemscan -n # Scan from pivotscan -p 192.168.2.50 22 # Exploit second targetpivot # Nested pivot
# Strategic operationspivot -y # Full pivot for extended opsscan -l # Scan libraries after pivotscan -n # Scan network from pivot
# Pivot chainhunt ssh -c 1 # Find SSH targetscan -p TARGET 22 # Exploit found targetpivot # Establish pivot pointSee Also: pull, hops, proxy
Upload payload folder for fresh launch.
Usage: pull
Features:
- Payload folder upload
- Fresh framework initialization
- Required before launching
- Pivoted instances only
Examples:
# Pre-launch setuppull # Upload payload datalaunch # Start framework
# Pivot workflowpull # Upload to pivoted systemstart # Initialize frameworkSee Also: pivot
View, wipe, or interact with proxy chain.
Usage: hops -v|-w|-s <index>
Flags:
-v- View all proxy chain hops-w- Wipe logs from all hops-s <index>- Take shell from specific hop
Features:
- Proxy chain visualization
- Log cleaning across chain
- Shell control from any hop
- Chain management
Examples:
hops -v # List all hopshops -w # Clean logs from all proxieshops -s 3 # Take control of 3rd hophops -s 1 # Take control of first hopSee Also: proxy, pivot
netcat
Section titled “netcat”Display comprehensive LAN network information.
Usage: netcat
Features:
- Extensive subnet details
- Network reconnaissance
- Alternative to recon/map
- Shell objects only (main, shell, pivot, proxy)
Examples:
netcat # Show LAN infoSee Also: nmap, ifconfig, iwconfig
System Tools
Section titled “System Tools”Remote RAT server file editor.
Usage: rat [ip] [port] [password]
Features:
- On-the-fly RAT file editing
- Remote management
- Interactive credential prompts
Examples:
rat 136.22.27.184 22 xxxx # Connect with passwordrat 136.22.27.184 22 # Prompt for passwordrat # Prompt for all detailsSee Also: ssh, ftp
Control main instance from pivoted sessions.
Usage: main <command> or main [-u|-d] [-p path] [--log] files...
Flags:
-u- Upload files from main to target-d- Download files from target to main-p <path>- Specify source/destination path--log- Transfer system.log file
Features:
- Run commands on main instance
- File transfer between main and target
- Log file management
- Pivot/proxy contexts only
Examples:
main ls -la # Run command on mainmain -u file1 file2 # Upload to targetmain -d -p /downloads data.txt # Download to pathmain -u --log # Upload system.logSee Also: pivot, proxy
Memory buffer overflow exploitation tool.
Usage: loop -r ip:port memory unsecure_value wait [extra]
Usage: loop -l library memory unsecure_value wait [extra]
Flags:
-r- Remote attack (IP:PORT)-l- Local attack (library file)
Examples:
loop -r 127.1.1.1:22 0x29320210 destr 5loop -l /lib/libssh.so 0xAABBCCDD exploit 10See Also: decipher, scanlib, build
System log file management and transfer.
Usage: logs [-s|-r|-u|-d]
Flags:
logs- Download, edit, re-upload system.log-s- Send to server:/temp-r- Retrieve from server:/temp-u- Upload to server-d- Download from server
Features:
- Log editing workflow
- Server storage (requires x database)
- Shell objects only
- Requires root for modifications
Examples:
logs # Edit target loglogs -s # Send to serverlogs -r # Retrieve from serverSee Also: cat, vi, chmod
Log route tracking and visualization.
Usage: lt -a|-r|-l|-x|-m|-w <args>
Flags:
-a <from_ip> <to_ip>- Add IP pair to tracker-r <index>- Remove entry by index-l- List all tracked routes-x- Clear all entries-m- Enter management mode (interactive)-w- Write to ip_tracker.lst in current directory
Color Coding:
- Yellow = LAN IP address
- Green = Public IP address
Tracing Strategy: When both IPs are green, attack the router and examine logs. Search for the LAN IP in logs, then track that system. Final entry should show two green IPs when you reach origin.
Features:
- Visual route tracking
- Multi-hop path following
- Router bounce tracing
- Color-coded IP display
- Connection chain management
Examples:
# Build route chainlt -a 177.61.158.111 192.168.0.2 # Add first hoplt -a 177.61.158.111 101.35.57.9 # Add second hoplt -a 101.35.57.9 26.87.87.62 # Continue tracking
# View and managelt -l # List all routeslt -m # Interactive modelt -r 2 # Remove entry 2lt -x # Clear alllt -w # Save to fileSee Also: logs, cat
Display system specifications calculator.
Usage: specs
Examples:
specs # Show system infoSee Also: ifconfig, iwconfig
Display calendar with output redirection support.
Usage: cal [> file] [>> file]
Examples:
cal # Show calendarcal > cal.txt # Save to filecal >> cal.txt # Append to filedevices
Section titled “devices”List available devices for operations.
Usage: devices
Examples:
devices # List all devicesRepeat commands multiple times or continuously.
Usage: do -c <count> <command> or do --while <command>
Flags:
-c <count>- Execute N times--while- Execute while watcherApp runs
Examples:
do -c 5 print hello # Print 5 timesdo -c 10 ls # List 10 timesdo --while nmap 192.168.1.1 # Continuous scanningSee Also: wait, arrow
Internal timer for benchmarking.
Usage: mark
Features:
- Start/display elapsed time
- Benchmarking tool
- Seconds counter
Examples:
mark # Start timermark # Show elapsed timeSee Also: wait, time
lmkdir
Section titled “lmkdir”Create directory on main object (local mkdir).
Usage: lmkdir <name> [y]
Arguments:
<name>- Directory name[y]- Force overwrite
Examples:
lmkdir NewFolder # Create directorylmkdir /home/tux/Projects # Full pathlmkdir folder y # Force overwriteSee Also: mkdir, lcd, lls
Display main object current directory (local pwd).
Usage: lpwd
Examples:
lpwd # Show main directorySee Also: pwd, lcd
List main object processes (local ps).
Usage: lps
Examples:
lps # List main processesSee Also: ps, lsof
ltouch
Section titled “ltouch”Create file on main object (local touch).
Usage: ltouch <file>
Examples:
ltouch newfile.txt # Create on mainSee Also: touch, lmkdir
Encryption & Security
Section titled “Encryption & Security”File encryption with crypto library.
Usage: pzip [-c|-e|-d] [-r] [-p password] <file|path>
Flags:
-c- Check encryption status-e- Encrypt file/directory-d- Decrypt file/directory-r- Recursive (directories)-p <password>- Specify password
Examples:
pzip -c /etc/passwd # Check statuspzip -e -p mypass /etc/passwd # Encrypt filepzip -e -r /bin # Encrypt directorypzip -d -p mypass file.enc # DecryptSee Also: enc, dec, aes128
Encrypt file with X algorithm.
Usage: enc <file> [seed|key]
Features:
- X encryption algorithm
- Immune to crypto library overflows
- Optional seed/key
Examples:
enc secret.txt # Encrypt fileenc data.bin mykey123 # With keySee Also: dec, pzip
Decrypt file with X algorithm.
Usage: dec <file> [seed|key]
Features:
- X decryption algorithm
- Immune to crypto library overflows
- Optional seed/key
Examples:
dec secret.txt # Decrypt filedec data.bin mykey123 # With keySee Also: enc, pzip
aes128
Section titled “aes128”128-bit AES encryption and decryption.
Usage: aes128 -e|-d|-k <key> <string>
Flags:
-e <key> <string>- Encrypt password or string with 128-bit key-d <key> <string>- Decrypt password or string with 128-bit key-k- Generate new AES 128-bit encryption key
Features:
- Advanced Encryption Standard
- Key generation
- String/password encryption
- 128-bit security
Examples:
# Generate keyaes128 -k # Generate 128-bit key
# Encryptaes128 -e a1b2c3d4 mypassword # Encrypt with key
# Decryptaes128 -d a1b2c3d4 encrypted # Decrypt with keySee Also: enc, dec, sha256, pzip
sha256
Section titled “sha256”SHA-256 cryptographic hashing.
Usage: sha256 <text> or sha256 -c <hash>
Flags:
-c <hash>- Attempt to crack SHA-256 hash
Features:
- 256-bit hash generation
- Cryptographic security
- Hash cracking
- One-way transformation
Examples:
# Generate hashsha256 password123 # Hash a passwordsha256 Hello World # Hash text string
# Crack hashsha256 -c a665a45920422f9d417e4867efdc4fb8a04a1f3fff1fa07e998e86f7f7a27ae3See Also: decipher, crack, aes128
Additional Commands from Man2
Section titled “Additional Commands from Man2”List files and directories on local system (local ls).
Usage: lls [-o|--octal] [-a|--all] [PATH]
Flags:
-o, --octal- Display octal permissions-a, --all- List all system files
Features:
- Local callback for main object
- Shows current or specified path
- Supports redirects
- Octal permission display
Examples:
lls # List local directorylls /home # List specific pathlls -o # Show octal permissionslls --all # List all system filesChange directory on local system (local cd).
Usage: lcd [PATH|..|back|-|dir*]
Features:
- Local callback for main object
- Navigate local filesystem
- Supports parent directory navigation (..)
- Home directory return (lcd with no args)
- Previous directory recall (back or -)
- Wildcard patterns for directory selection
Examples:
lcd /home/guest # Go to guest homelcd Pictures # Enter Pictures folderlcd .. # Move up one levellcd # Return to local homelcd back # Go to previous directorylcd D* # List dirs starting with DExecute command on local system (local exec).
Usage: lexec COMMAND [ARGS...]
Features:
- Local callback for main object
- Execute commands on local system
- Supports all standard commands
- Useful during remote sessions
Examples:
lexec ls /home # List local directorylexec cat file.txt # Read local filelexec ps # View local processesserver
Section titled “server”Manage database or LMS server operations.
Usage: server [-l|-t|-s|-o|-f|-p|-r|-n|-z|refresh]
Flags:
-l- Launch a binary or script-t- Start a terminal-s- Start a shell-o OPEN_FLAG [PARAMS]- Open files or resources-f- View filesystem statistics-p- View and manage server processes-r- Wipe trash-n- View the notes file-z- Secure the server and filesystemrefresh- Refresh the exploit database
Features:
- Manage server without running sys -d
- Execute common management commands
- Launch binaries and start sessions
- View stats and manage processes
- Requires active server connection
Examples:
server -l scanner.bin # Launch scanner on serverserver -t # Start terminal sessionserver -f # View filesystem statsserver -z # Secure server filesystemserver refresh # Update exploit databaseNetwork toolkit for SSH connections, IP spoofing, and server installation.
Usage: net [-c|-l|-b|-g|-x|-z|-i]
Flags:
-c IP PORT USER PASSWORD- Connect to network-l- List background connections-b -l [SECONDS] [-m MIN] [-x MAX]- Change local LAN IP dynamically-b -f FILE [SECONDS]- Change local LAN IP from file-b -w FILE [SECONDS]- Change WiFi connection from file-g- View network configuration-x ID- Close background network connection-z- Clear the network cache-i rshell|ssh|ftp|http|chat|repo- Install server on localhost
Features:
- Background SSH connections
- Dynamic IP rotation for evasion
- WiFi connection rotation
- Server installation from vfile/share
- Network configuration management
Examples:
net -c 192.168.1.5 22 admin pass123 # Connect to SSHnet -l # List background connectionsnet -b -l # Auto-rotate LAN IPnet -b -l -m 10 -x 100 5 # Rotate IP .10-.100 every 5snet -b -w wifi.txt # Rotate WiFi from listnet -i ssh # Install SSH serverSee Also: ssh, service, ifconfig
Virtual file cache management system.
Usage: vfile [-l|-a|-ap|-al|-ts|-v|-g|-r|-x]
Flags:
-l- List cached files-a FILE [FILE...]- Add files to cache-ap- Add passwd to cache-al- Add system.log to cache-ts- Transfer vfile to share-v ID- View cached file-g ID [ID...]- Get files from cache (download)-r ID [ID...]- Remove files from cache-x- Clear all cache
Features:
- Store files with virtual IDs
- Temporary memory cache
- Transfer between objects
- Download to local machine
- Quick access to passwd/system.log
- Cache cleared when x closes
Examples:
vfile -l # List cached filesvfile -a exploit.bin # Add file to cachevfile -ap # Add passwd to cachevfile -v 1 # View cached file ID 1vfile -g 1 2 3 # Download files 1, 2, 3vfile -ts # Transfer to sharePersistent file sharing system.
Usage: share [-l|-a|-v|-g|-r|-x]
Flags:
-l- List shared files-a FILE [FILE...]- Add files to share-v ID- View shared file-g ID [ID...]- Get files from share-r ID [ID...]- Remove files from share-x- Clear all shared files
Features:
- Persistent file storage
- Survives x restart
- Transfer files between sessions
- Library and binary sharing
- Unique ID assignment
Examples:
share -l # List shared filesshare -a tool.bin # Add file to shareshare -v 1 # View shared fileshare -g 1 2 # Download filesshare -r 1 # Remove fileManage system libraries and dependencies.
Usage: libs [-l|-s|-d|-i|-r]
Flags:
-l- List available libraries-s LIB- Search for specific library-d LIB- Download library-i LIB- Install library-r LIB- Remove library
Features:
- Library management
- Dependency resolution
- Installation automation
- Version tracking
Examples:
libs -l # List librarieslibs -s metaxploit # Search for librarylibs -d crypto.so # Download librarylibs -i aptclient.so # Install libraryLoad specific libraries into memory.
Usage: load [-m|-c|-b|-a|-t|-s]
Flags:
-m- Load Metaxploit (metaxploit.so)-c- Load Crypto (crypto.so)-b- Load Blockchain (blockchain.so)-a- Load APTClient (aptclient.so)-t- Load TrafficNet (libtrafficnet.so)-s- Load Smart Appliance (libsmartappliance.so)
Features:
- Load libraries into memory
- Immediate function access
- Six supported libraries
- Reduces disk access
Examples:
load -m # Load metaxploit frameworkload -c # Load crypto libraryload -b # Load blockchain libraryload -t # Load traffic network libraryNetwork search tool for finding services and computers.
Usage: hunt TYPE [OPTIONS]
Types:
custom -p PORT- Search custom portlib [-n NAME]- Find librariesrepo|rshell|ssh|ftp- Find specific servicesspecial [-n NAME]- Find special computersemployee|student|criminal- Find person typeshttp|smtp|chat|bank|cam|router|sql- Find service typesneuro|wifi- Find neurobox/WiFiawifi [-b BSSID] [-e ESSID]- Search WiFi by BSSID/ESSIDfile [-n NAME]- Find files
Flags:
-k- Kill Run_While when finished-p PORT- Custom port number-n NAME- Name filter-s- Save results to directory-d- Download library-c COUNT- Result count (default: 1)-v VERSION- Version filter-b BSSID- WiFi BSSID filter-e ESSID- WiFi ESSID filter
Features:
- 21 different hunt types
- Network service discovery
- Resource finding
- WiFi network scanning
- CTRL+C or close Run_While to exit
Examples:
hunt custom -p 8080 -c 5 # Find 5 systems on port 8080hunt lib -n crypto -d # Find and download crypto libshunt ssh -c 3 -v 1.0 # Find 3 SSH v1.0 serviceshunt special -n Bank # Find bankshunt employee -s -c 10 # Find 10 employees, savehunt wifi -c 5 # Find 5 WiFi networkshunt awifi -e HomeNetwork # Find specific WiFi ESSIDcompare
Section titled “compare”Compare two values or strings.
Usage: compare VALUE1 VALUE2
Features:
- Compare numbers or strings
- Equality checking
- Useful in scripts and conditionals
Examples:
compare 10 10 # Check if equalcompare "abc" "abc" # String comparisoncompare 5 10 # Number comparisondecimal
Section titled “decimal”Convert number to decimal format.
Usage: decimal NUMBER
Features:
- Convert to decimal representation
- Number format conversion
Examples:
decimal 0xFF # Convert hex to decimaldecimal 0b1010 # Convert binary to decimalbinary
Section titled “binary”Convert number to binary format.
Usage: binary NUMBER
Features:
- Convert to binary representation
- Number format conversion
Examples:
binary 255 # Convert to binarybinary 128 # Convert to binarypercent
Section titled “percent”Calculate percentage.
Usage: percent PART TOTAL
Features:
- Calculate percentage values
- Mathematical operations
- Useful for progress indicators
Examples:
percent 25 100 # Calculate 25% of 100percent 50 200 # Calculate 50% of 200median
Section titled “median”Calculate median of numbers.
Usage: median NUMBER [NUMBER...]
Features:
- Calculate middle value
- Statistical analysis
- Works with multiple values
Examples:
median 1 2 3 4 5 # Median of 5 numbersmedian 10 20 30 # Median of 3 numberssessions
Section titled “sessions”Manage active X sessions.
Usage: sessions [-l|-k]
Flags:
-l- List active sessions-k ID- Kill session by ID
Features:
- View all X instances
- Terminate specific sessions
- Session management
Examples:
sessions -l # List all sessionssessions -k 2 # Kill session ID 2service
Section titled “service”Manage system services and servers.
Usage: service [-v|-l|-r] [SERVICE -i|start|stop]
Services: rshell, ssh, ftp, http, chat, repo
Flags:
-v- View default service info-l- List all found services-r- Reload local service listSERVICE -i- Install service (requires root & repo)SERVICE start|stop- Control service
Features:
- Service installation
- Start/stop control
- Service monitoring
- Requires repository setup for install
Examples:
service -l # List all servicesservice ssh -i # Install SSH serviceservice ssh start # Start SSH serviceservice http stop # Stop HTTP serviceDirectory change monitor.
Usage: gmon [-p PATH] [--deploy]
Flags:
-p PATH- Specify directory to monitor (default: /home/guest)--deploy- Launch as background process
Features:
- Monitor directory for changes
- File modification tracking
- Background deployment
- Requires root if not deployed
Examples:
gmon # Monitor /home/guestgmon --deploy # Monitor in backgroundgmon -p /var # Monitor /var directorygmon -p /home --deploy # Monitor /home in backgroundSee Also: htop
Website defacement tool (sk).
Usage: sk [-f FILE] [-w [-n NAME] [-p PATH]]
Flags:
-f FILE- Deface with custom HTML file-w- Write default template to disk-n NAME- Template filename (default: sk)-p PATH- Template path (default: data folder)
Features:
- Website defacement
- Default or custom HTML
- Template generation
- Active computer targeting
Examples:
sk # Deface with default pagesk -f /home/tux/custom.html # Custom HTMLsk -w # Write templatesk -w -n mypage -p /var # Write to /var as mypageaverage
Section titled “average”Calculate average of numbers.
Usage: average NUMBER [NUMBER...]
Features:
- Calculate mean value
- Statistical operations
- Multiple number support
Examples:
average 10 20 30 # Average of 3 numbers (20)average 5 10 15 20 25 # Average of 5 numbers (15)average 100 200 # Average of 2 numbers (150)Verify user assignment.
Usage: check
Features:
- Verify current user assignment
- Fix corrupted permissions
- Automatic reset if discrepancy found
Examples:
check # Verify and fix userCommand aliasing system.
Usage: alias [-s|-r|-l]
Flags:
-s ALIAS COMMAND [PARAMS]- Set alias-r ALIAS- Remove alias-l- List all aliases
Features:
- Create command shortcuts
- Persistent across sessions
- Parameter support
- Faster access to frequent commands
Examples:
alias -l # List all aliasesalias -s ll ls -la # Create ll aliasalias -s scan nmap -sS # Create scan aliasalias -r ll # Remove ll aliasDisplay X interface legend.
Usage: index
Features:
- Explain prompt indicators
- Session type colors
- Access level display
- System state indicators
Prompt Indicators:
[MAIN]- Local Host Object (blue)[PIVOT[n]]- Main after pivot (orange)[PROXY[n]]- Main after proxy (purple)[SHELL]- Captured Shell Object (green)[COMPUTER]- Captured Computer Object (yellow)[FILE]- Captured File Object (red)[P]- Have Read Access To PASSWD (green/red)[R]- Have Root Password (green)
Examples:
index # View interface legendPrint cached root password.
Usage: info
Features:
- Display root password from cache
- Must be previously cached
- Quick password retrieval
Examples:
info # Print root passwordinfo && echo root:$(info) > creds.txt # Save to filescan -l && info # Exploit then retrieve passwordSee Also: show, shadow, addpass
Display cached credentials and public IP.
Usage: show
Features:
- Display root password and public IP
- Public IP always shown
- Password shown if cached
- Combined information display
Examples:
show # Display credentials and IPscan -l && show # Exploit then show infoshow > target_info.txt # Save to fileshow | grep password # Extract password onlySee Also: info, shadow, addpass
Cryptocurrency wallet manager.
Usage: coin -n COIN_NAME -u USER [-p PASS]
Flags:
-n COIN_NAME- Coin service name-u USER- Username for authentication-p PASS- Password (optional, will prompt if omitted)
Features:
- Access coin services
- Manage balances and transfers
- Interactive or direct login
- Transaction management
Examples:
coin -n BitForce -u hacker123 # Login with promptcoin -n CryptoBank -u admin -p secret # Direct logincoin -n BitMiner -u miner01 # Interactive passwordcoin -n WalletService -u bot -p $(cat .coinpass) # From fileLaunch X instances or terminal sessions.
Usage: start x [PATH]|[-t|-s|--terminal]
Flags:
x [PATH]- Launch new X instance at optional PATH-t- Terminal interface (disabled during pivot)-s- Remote shell (SSH/FTP connection)--terminal- Full terminal session (closes X)
Features:
- Launch nested X instances (max 17 pivots)
- Terminal-like interfaces
- Remote shell connections
- Multi-hop pivoting support
Examples:
start x # Launch X in current dirstart x /root # Launch X in /rootstart -t # Terminal interfacestart -s 98.110.69.115 22 root password ssh # SSH connectionstart --terminal # Full terminal (exits X)Copy and launch X framework on target systems.
Usage: pivot [-y]
Flags:
pivot- Minimal pivot (for scanning/basic ops)-y- Full pivot (complete X framework)
Features:
- Copy X to compromised systems
- Minimal or full framework
- Reuses existing X if present
- Maximum 17 self-launches
- Prompted for location
Examples:
scan -p 192.168.1.50 22 # Exploit SSHpivot # Minimal pivotpivot -y # Full pivot with all featuresscan -n && scan -p TARGET 22 && pivot # Multi-hop chainDirty router log management.
Usage: dirty [-l|-a|-s|-m|-r|-c|-x]
Flags:
-l- List dirty routers-a- Add router to dirty buffer-s- Scrub logs on tracked routers-m- Manual clean-r- Reload buffer-c- Count dirty routers-x- Clear all entries
Features:
- Track routers with uncleared logs
- Automated log scrubbing
- May need multiple runs
- Buffer persistence
Examples:
dirty -l # List uncleared routersdirty -c # Show countdirty -a # Add current routerdirty -s # Scrub logsdirty -s && dirty -c # Scrub and check remainingdirty -x # Clear bufferFile and text compression utility.
Usage: gzip [-c|-u] [-t] [--force] [-f FILE|TEXT] [-r DIR]
Flags:
-c- Compress file/string to base64-u- Uncompress base64 file/string-t- Output to console instead of file--force- Skip .gz extension check (caution)-f FILE|TEXT- File path or text string-r DIRECTORY- Recursive directory operation
Features:
- Base64 compression
- File and text support
- Recursive directory operations
- Console or file output
- Default requires .gz suffix for uncompress
Examples:
gzip -c -f data.txt # Compress to data.txt.gzgzip -c -f "secret message" # Compress textgzip -c -r /home/user/docs # Compress directorygzip -u -f data.txt.gz # Uncompress filegzip -u -f archive.dat --force # Force without .gzgzip -c -f data.txt -t # Compress to consolegzip -c -f logs.txt && rm logs.txt # Compress and deletepingport (pp)
Section titled “pingport (pp)”Ping network port repeatedly.
Usage: pp [-w WAIT] [-c COUNT] IP PORT
Flags:
-w WAIT- Seconds between pings (0.01-300, default: 1)-c COUNT- Number of ping attempts
Features:
- Repeated port pinging
- Launch attack when available
- Configurable wait time
- Limited or infinite attempts
Examples:
pp 192.168.1.50 22 # Ping SSH continuouslypp 10.0.0.5 80 # Ping HTTP portpp -c 10 192.168.1.50 22 # Ping 10 timespp -w 0.5 192.168.1.50 22 # Ping every 0.5 secondspp -w 5 -c 20 10.0.0.5 80 # Every 5s, 20 timespp -c 60 -w 60 192.168.1.1 80 # Monitor for 1 hourList open ports on system.
Usage: ports
Features:
- Display all open network ports
- Show port numbers
- Associated services
- Current system only
Examples:
ports # List all open portsPrivate HTTP interweb service.
Usage: web
Features:
- Install and launch private HTTP server
- Secure browsing for coin/bank/repo services
- Not port forwarded (local only)
- Requires root privileges
- Auto-closes on terminal exit
- Repository fetch capability only
Examples:
web # Start private HTTP serverSee Also: service, open, start
Comprehensive vulnerability scanner and exploit framework.
Usage: scan [-l|-lp|-n|-r|-d|-nf|-nd|-nfd|-a|-p|-pd|--n|--l|--c] [TARGET]
Flags:
-l- Scan and attack localhost-lp- Localhost with 0day exploits-n- Scan local network-r- Find random network-d- Disable all firewalls-nf- Show network firewalls-nd- Disable network firewalls-nfd- Show and disable network firewalls-a [-w CRITERIA] [-s START_IP] [-e END_IP]- Mass IP scan-p IP PORT|LIBRARY- Attack partial object-pd PATH- Scan library folder (recommend /lib)--n [-r ROUTER_IP] LIBRARY OBJECT [EXTRA]- Smart LAN scan--l LIBRARY INDEX [EXTRA]- Custom local scan--c IP LIBRARY OBJECT [EXTRA]- Custom public scan
Port Shortcuts:
- router:0, ssh:22, ftp:21, http:80, chat:6667
- rshell:1222, repo:1542, cam:37777, sql:3306, smtp:25
Object Types:
- s=shell, c=computer, f=file, l=lan bounce
- i=internal lan bounce, d=disable firewall
- p=change root password, w=change user password
Features:
- Localhost, LAN, and remote scanning
- Automated exploitation
- Partial object attacks
- Smart library scanning
- Custom exploit index
- Firewall management
- Mass IP scanning
Examples:
scan -l # Scan localhostscan -lp # Localhost with 0dayscan -n # Scan local networkscan target.com # Attack remote hostscan -r # Find random targetscan -p target.host 0 # Attack router portscan -p target.host 22 # Attack SSHscan -p /lib/init.so # Attack with libraryscan --n http s # Find shell via HTTP on LANscan --l apt 6 router.local # Custom local exploitscan --c target.host router l gateway.local # Remote LAN bouncescan -nf # Show network firewallsscan -a -w Neurobox -s 1.196.1.169 -e 1.196.255.169 # Mass scanscan -pd /lib # Index library exploitsSee Also: open, exploits, system
Additional Commands from Man3
Section titled “Additional Commands from Man3”system (sys)
Section titled “system (sys)”System management framework.
Usage: sys -e | -z | -t [PATH] | restore [OPTIONS] | -c | -s | list OPTIONS | -r | -l | -b | -d | -ld | -a
Options:
-e- Encrypt filesystem (default target: root /)-z- Decrypt filesystem (default target: root /)-t [PATH]- Brick system or directory (WARNING: DESTRUCTIVE)restore --all|--boot|--system|--perms|--etc- Restore system components-c- Soft secure system (chmod root and delete passwd)-s- Hard secure system (enhanced soft secure, WARNING: DO NOT RUN IF /home MODIFIED)list -n -c- Check name file duplicateslist -n -x- Clear master name listlist -n -l- Load master name listlist -p -c- Check password duplicateslist -p -x- Clear master password listlist -p -l- Load master password list-r- Resecure hard-secured system-l- Create x system link in /bin-b- Remove all /bin files-d- Manage database server-ld- Manage library database-a- Audit /bin binaries
Features:
- Comprehensive system management
- Filesystem encryption and decryption
- Security hardening modes (soft and hard)
- Master name and password list management
- System restoration capabilities
- Database administration
- Binary auditing and management
Examples:
sys -e # Encrypt root filesystemsys -z # Decrypt root filesystemsys -c # Soft secure systemsys -s # Hard secure systemsys restore --all # Restore everythingsys list -n -l # Load master name listsys -d # Manage databasesys -a # Audit /bin binariesSee Also: secure, restore, encrypt
exploits (exp)
Section titled “exploits (exp)”Exploit database management.
Usage: exp -l | -d | -f OPTIONS CRITERIA | -p INDEX [EXPLOIT_INDEX] | -r OPTIONS | -x | grind OPTIONS | defrag | SERVICE [-p PASSES] | reset | view -l LIB -v VER | refresh | bloom OPTIONS | backup | restore [SNAPSHOT]
Search Options:
-f -n CRITERIA- Search by name (use operators: =:name)-f -v CRITERIA- Search by version (use operators: >:1.0.3)-f -e CRITERIA- Search by exploit type (shell, computer, file, lan)-f -m CRITERIA- Search by memory address-f -s CRITERIA- Search by string tree value-f -u CRITERIA- Search by user level (root, user, guest)-f -r CRITERIA- Search by requirement tree
Database Operations:
-l- List all exploits-d- Dump libraries to file (saves as ‘libs’)-p INDEX- View all exploits at library INDEX-p INDEX EXPLOIT_INDEX- View specific exploit-r -i INDEX | -l LIBRARY -v VERSION- Remove exploit-x- Remove ALL exploitsdefrag- Remove orphaned indexesrefresh- Refresh exploit cache
Grinding:
grind -l LIBRARY MEMORY UNSECURED (EXTRA)- Grind local librarygrind -r IP LIBRARY MEMORY UNSECURED (EXTRA)- Grind remote library
Updates:
router [-p PASSES]- Update router exploits (default: 100 passes)http|ssh|ftp|smtp|rshell|repo|sql [-p PASSES]- Update service exploits (default: 10)all [-p PASSES]- Update all exploits
Bloom Filter:
bloom -s- Show bloom filter statisticsbloom -a- Analyze bloom filter distributionbloom reset- Reset bloom filter to zerosbloom rebuild- Rebuild bloom filter from cache
Backup/Restore:
backup- Backup exploit database (creates snapshot: payload/snapshot/day_month_year_N)restore [SNAPSHOT]- Restore from snapshot (shows menu if no snapshot specified)
Features:
- Comprehensive exploit database management
- Powerful search with operators
- Custom exploit grinding
- Service-specific updates
- Bloom filter optimization
- Backup and restore functionality
Examples:
exp -l # List all exploitsexp -f -v >:1.0.3 # Find versions greater than 1.0.3exp -f -u =:root -e =:shell # Root shell exploitsexp -p 7 2 # View exploit [2] from library [7]exp grind -l init 0x2BB8CD82 seltaddparentexp router # Update router exploitsexp ssh -p 20 # 20 SSH update passesexp bloom -s # Show filter statsexp backup # Create snapshotexp restore 27_Jan_2000_1 # Restore specific snapshotSee Also: scan, metaxploit, deepscan
passwords (pass)
Section titled “passwords (pass)”Password generator and database manager.
Usage: pass | pass OPTIONS [LENGTH] [COUNT] | pass OPTIONS -R MIN MAX [COUNT]
Options:
pass- View and edit password databaseOPTIONS [LENGTH] [COUNT]- Generate fixed-length password listOPTIONS -R MIN MAX [COUNT]- Generate random-length passwords
Option Flags (combine multiple):
u- Include uppercase letters (A-Z)l- Include lowercase letters (a-z)n- Include numbers (0-9)s- Include special charactersc- Capitalize first character (cannot combine with u)
Features:
- Advanced password testing tool
- Custom password list generation
- Configurable character sets
- Fixed or random length support
- Database management interface
Examples:
pass # Open password databasepass ln 8 100 # 100 8-char lowercase+number passwordspass uln 10 500 # 500 10-char mixed-case alphanumericpass ulns 12 200 # 200 12-char with special charspass uln -R 8 16 1000 # 1000 passwords, 8-16 chars eachpass cln 8 100 # Capitalized first letterpass n 4 1000 # 1000 4-digit PIN codesSee Also: brute, dict, rainbow
Get bank accounts, email accounts, map/proxy accounts, and more.
Usage: get -p | -z | -i | -w | -n [OPTIONS] | -m [OPTIONS] | -b [OPTIONS] | -e [OPTIONS]
Options:
-p- Download the passwd file-z- Determine best letter combination for smallest file compile size-i- View local network status-w- Show wifi information-n [-c [QUANTITY] -s -n [SAVENAME]]- Get random names (for <=19k should be safe)-m [-c [QUANTITY] -d -s -n [SAVENAME]]- Get map/proxy accounts-b [-c [QUANTITY] -d -s -n [SAVENAME]]- Get bank accounts-e [-c [QUANTITY] -d -s -n [SAVENAME]]- Get email accounts
Account Flags:
-c [QUANTITY]- Specify number of accounts (fuzzy meaning targets QUANTITY systems)-d- Use decipher method (default: dictionary attack)-s- Use shells-n [SAVENAME]- Save results to file
Features:
- Multi-account harvesting
- Dictionary or decipher methods
- Configurable quantities
- Network and WiFi info viewing
- Random name generation
Examples:
get -p # Download passwd fileget -i # View network statusget -w # Show WiFi infoget -n -c 100 # Get 100 random namesget -m -c 5 -d # Get 5 map accounts with decipherget -b -c 10 -s # Get 10 bank accounts using shellsget -e -c 20 -n emails.txt # Get 20 email accounts, save to filershell
Section titled “rshell”X’s rshell framework for reverse shell management.
Usage: rshell -s [IP [PORT] [NAME]] | import | -b | -i | -bi | -d|-da|-dc|-dca OPTIONS | -p|-pa|-pc|-pca OPTIONS | dump [PATH] | -z OPTIONS | -e|-ea COMMAND | -l | -u INDEX | -c OPTIONS | logs | list | refresh | -k INDEX | -x [PNAME] | -h [OPTIONS]
Server Management:
-s [IP] [PORT] [NAME]- Start temporary rshell with optional server IP, port, and nameimport- Import a rshell server-b- Build a rshell-i- Install already built rshell and launch-bi- Build and install rshell
File Operations:
-d INDEX TFILE_PATH DPATH- Download file from rshell by ID-da TFILE_PATH DPATH- Download from all rshells-dc INDEX TFILE_PATH DPATH- Download to active object-dca TFILE_PATH DPATH- Download from all to active object-p INDEX TFILE_PATH UPATH- Upload file to rshell by ID-pa TFILE_PATH UPATH- Upload to all rshells-pc INDEX TFILE_PATH UPATH- Upload to active object-pca TFILE_PATH UPATH- Upload to all from active objectdump [PATH]- Dump rshell server list to file
Command Execution:
-z -e INDEX,INDEX,... COMMAND [PARAMS]- Execute on multiple rshells-z -k INDEX,INDEX,...- Kill multiple rshells-e INDEX COMMAND [PARAMS]- Execute on rshell by ID (NOT available with rshell lite)-ea COMMAND [PARAMS]- Execute across all rshells (NOT available with rshell lite)
Management:
-l- List captured rshells-u INDEX- Open shell from selected rshell ID-c -a|-h|-r|-s- Clear caches (all/history/rshells/server)logs- Download all system.log files from rshellslist- List all imported rshell serversrefresh- Check for new rshells-k INDEX [PNAME]- Kill captured rshell by ID-x [PNAME]- Kill all captured rshells-h -l- List rshells from history-h -u INDEX- Open shell from history-h -c- Clear history cache
Features:
- Full rshell lifecycle management
- Batch file operations
- Multi-rshell command execution
- History tracking
- Server import/export
Examples:
rshell -s # Start temporary rshellrshell -bi # Build and installrshell -l # List captured rshellsrshell -d 0 /etc/passwd ./loot # Download passwd from first rshellrshell -p 1 exploit.src /var # Upload exploit to second rshellrshell -z -e 1,2,3 ps # Execute ps on rshells 1,2,3rshell -ea ls -la # Execute ls on all rshellsrshell -k 0 # Kill first rshellrshell refresh # Check for new connectionsBinary build and infection framework.
Usage: make -t [-y] (-f) (-c [-b]|[-e]) (-p [PASSWORD]) (-s [START]) BINARY | -rec | -r | -cs | -pm | -pp | -pc | -i BINARY V|R|T|C | -l | -v BINARY | -a [-y] | -b [OPTIONS] BINARY | -p BINARY
Standalone Tools:
-t BINARY- Make standalone tool (use -y to keep in current dir)-rec- System recovery binary-r- Generic rshell binary-cs- Custom server frontend-pm- Proxy from Map.conf-pp- Proxy from proxy.dat-pc- Proxy custom input
Binary Infection:
-i BINARY V- Inject virus-i BINARY R- Inject rshell-i BINARY T- Inject RAT (requires /root/rat file on C2 server)-i BINARY C- Inject custom payload
Build Operations:
-l- List buildable binaries-v BINARY- View binary source-a (-y)- Build all default binaries (use -y to place in /bin)-b BINARY- Build single binary-b S BINARY- View source-b T BINARY- Build with RAT-b V BINARY- Build with virus-b R BINARY- Build with rshell-b P BINARY- Build with password-b E BINARY- Build encrypt filesystem-b D BINARY- Build decrypt filesystem-b C BINARY- Build with custom payload-b F BINARY- Build from file content-p BINARY- View source code
Features:
- Complete binary building framework
- Malware injection capabilities
- Standalone tool creation
- Proxy binary generation
- Password protection support
- Custom payload integration
Examples:
make -l # List all binariesmake -b ls # Build ls binarymake -a # Build all defaultsmake -t lock # Create lock toolmake -i /bin/cat V # Inject virus into catmake -b V ls # Build ls with virusmake -pm # Proxy from Map.confmake -rec # System recovery binaryInteractive file explorer and manager.
Usage: mc [-d] (path1) (path2)
Options:
-d- Start in dual panel modepath1- Starting directory for left panel (optional)path2- Right panel directory for dual mode (optional)
Display Features:
- Directory Size - Shows total size of files
- File Counts - Number of files and folders
- Permissions - Toggle between symbolic and octal
- Symlinks - Show or hide symbolic link targets
- Hidden Files - Toggle files starting with ’.’
Sorting:
- Sort By Name - Alphabetical (default)
- Sort By Size - File size sorting
- Sort By Date - Modification date sorting
- Reverse Order - Reverse current sort
- Un-Sort - Disable sorting
File Operations:
- Rename File - Rename files and directories
- New File - Create new files
- New Directory - Create new directories
- Delete Files - Delete files and directories
- Change Permissions - Set permissions (supports octal)
Navigation:
- cd… - Change to any directory
- Quick Nav - Jump to /, home, or other panel
- Filter - Filter current directory by name
- Search for File - Recursively search and navigate
Dual Panel Features:
- Copy Files - Copy between panels with progress
- Move Files - Move between panels with progress
- Switch Panel - Toggle between left and right
- Single Panel - Return to single panel mode
- indicates active panel
Features:
- Full-featured file manager
- Dual panel support
- Advanced sorting and filtering
- Permission management (octal/symbolic)
- File operations with progress
- Hidden file support
Examples:
mc # Open in current directorymc /home # Open /home directorymc -d # Open dual panel modemc -d /home/user /var # Dual panel with pathsLocal machine file explorer.
Usage: lmc [path]
Features:
- Local machine file exploration
- Interactive directory browsing
- File opening and editing
- Delete files and folders
- Keyboard navigation
- Works on local system only
Examples:
lmc # Open in current directorylmc /home # Open local home directorylmc /var/log # Browse local log fileslmc /etc # Browse local config filesRemote system attack cache management.
Usage: cache -l | -u NICKNAME|INDEX | -e NICKNAME|INDEX | -y | -n | -v | -d | -r NICKNAME|INDEX | -x | --u OPTIONS INDEX
Options:
-l- List captured systems-u NICKNAME|INDEX- Use cached system-e NICKNAME|INDEX- Edit cached entry-y- Reload cache from disk-n- Add new entry-v- Load external cache file-d- Dump cache to file (cache.dat)-r NICKNAME|INDEX- Remove cached system-x- Clear entire cache
Remote Operations:
--u -a INDEX- Attack cached system--u -t INDEX [PORT] [SERVICE]- Start terminal connection--u -s INDEX [PORT] [SERVICE]- Open shell connection--u -u INDEX [PORT] [SERVICE]- Upload to cached system
Features:
- Persistent access to compromised systems
- SSH and FTP backdoor storage
- Populated by ‘jack’ command
- Terminal, shell, and upload operations
- Default connection: SSH port 22
Examples:
cache -l # List all cached systemscache -n # Add new cache entrycache -u 0 # Use first cached systemcache -u rshell # Use system by nicknamecache --u -s 0 # Open shell on first systemcache --u -t 1 21 ftp # FTP terminal on port 21cache -d # Export cache to filecache -x # Clear all cached systemsiwlist
Section titled “iwlist”View local WiFi networks.
Usage: iwlist
Features:
- Scan all WiFi networks in range
- Display ESSID, BSSID details
- Show signal strength
- Encryption type information
- Channel information
- Local wireless adapter scanning
Examples:
iwlist # Display all WiFi networksiwlist # Check encryption typesiwlist # Find weak security networksHide or modify root file system visibility.
Usage: hide -s (-c [CHAR]) (-n [NUMBER]) | -f FILE | -t
Options:
-s (-c [CHAR]) (-n [NUMBER])- Hide/unhide root file system directories-c- Specify custom character display-n- Number of character repetitions
-f FILE- Hide or unhide individual file (toggles visibility)-t- Hide or unhide .Trash folder (toggles)
Features:
- Manipulate root file system visibility
- Custom character display patterns
- Individual file hiding
- Trash folder visibility control
- Obfuscation for concealment
Examples:
hide -s # Show: ./bin, ./boot, ./etc...hide -s -n 10 -c _ # Show: __________/bin...hide -s -n 10 -c .- # Show: .-.-.-.-.-.-.-.-.-.-/bin...hide -f /root/exploit.src # Hide exploit scripthide -t # Toggle .Trash visibilityhide -s -n 5 -c XX # Create XXXXXXXXXX patternSystem file corruption and log clearing.
Usage: wipe -x | -c | -m | -lx | -lc | -lt | -l | -b [-y] | -s [-y] | -t | -a | --deploy [SECONDS]
Options:
-x- Wipe x framework traces-c- Wipe x config files-m- Wipe proxy chain logs (Map.conf)-lx- Wipe local log with X graphic-lc- Wipe log with custom ASCII (from /payload/data/ascii)-lt- Wipe log with custom text-l- Wipe local log file (standard)-b (-y)- Wipe boot system, clear system.log if possible (optional -y for auto-confirm)-s (-y)- Wipe entire file system (DESTRUCTIVE, optional -y for auto-confirm)-t- Wipe user Trash folder-a- Wipe bank transaction log--deploy [.01-300 SECONDS]- Deploy delayed log wiper
Features:
- System wiping tool
- Log clearing (with custom ASCII)
- Boot folder removal
- File system corruption
- X framework trace removal
- Delayed log wiper deployment
Examples:
wipe -l # Standard log wipewipe -lx # Wipe with X graphicwipe -lc # Custom ASCII artwipe -x # Remove x traceswipe -b # Remove boot folderwipe -b -y # Auto-confirm boot wipewipe --deploy 5 # 5 second delayed wipeSee Also: clean, rm, logwatcher
Advanced bash script interpreter with full programming features.
Usage: @script | run script|path | run -e [NAME] | run --list | run -n [NAME] | run -o | run --FILE FILE SCRIPT | run --DEBUG script | run --ALLOWABS script
Control Flow:
if/elif/else/endif- Conditional branching with operators (==, !=, <, >, <=, >=, and, or, not)switch/case/default/endswitch- Pattern matchingwhile/endwhile- Condition-based loopsuntil/enduntil- Loop until condition truefor/endfor- Iteration over lists, ranges, or variablesbreak- Exit loopcontinue- Skip to next iteration
Functions:
func name(param1,param2) / endfunc- Define functions with parametersreturn_value expression- Return value with arithmeticreturn- Exit script/function (optionally execute command first)- Recursion depth: 10 levels with true local scope
Variables & Arithmetic:
set_var(name,value)- Set variable (strings, numbers, lists)get_var(name)- Retrieve variable (auto-substituted)- Operators: +, -, *, /, %, ** (power)
- List literals:
set_var(items,[apple,banana,cherry])
Array Operations:
push_var list value- Add to endpop_var list- Remove from endpull_var list- Remove from startlen_var name- Get lengthin_var list value- Check existence
Built-in Functions:
- String: len(), upper(), lower(), substr(), concat(), contains(), replace()
- Math: floor(), ceil(), abs(), round(), min(), max(), random(), timestamp(), date()
- Array: join(list,delim), split_str(), trim_str()
- File: file_exists(), is_folder(), is_binary(), file_read()
- Permissions: get_permissions(), can_write(), can_execute()
- Context: get_user(), get_home(), get_shell_type(), get_computer_lan_ip(), get_computer_public_ip(), get_root()
- Type: typeof_val(), get_type(val)
- Layer: get_layer()
- Boolean: to_yesno(), to_truefalse()
Typed Input Prompts:
get_string- Prompt for stringget_integer- Prompt for integerget_decimal- Prompt for decimalget_any- Prompt for any value (unlimited use)get_yesno- Prompt for yes/no (returns 1 or 0)
Other Commands:
bash_print- Print with variable substitution and colorbash_read- Read file contentbash_view- Display file contentbash_write- Write content to filebash_find- Search for filesbash_put- Upload file (shell only)bash_get- Download file (shell only)bash_home- Safe bash-script-friendly alternative to homebash_whoami- Get current usernamebash_whatami- Get execution context typebash_pwd- Print working directory
Network Reconnaissance:
bash_scanner- Scan router for portsbash_router_info- Display router infobash_lan_devices- List LAN devicesbash_device_ports- Show device portsbash_firewall_rules- Display firewall rulesbash_random- Generate random public IP
Script Management:
run script- Run script from bash folder@script- Shorthand invocationrun -e [NAME]- Edit scriptrun --list- List all scriptsrun -n [NAME]- Create new scriptrun -o- Open bash folderrun --FILE FILE SCRIPT- Execute with file parametersrun --DEBUG script- Enable debug moderun --ALLOWABS script- Allow absolute paths
Flags:
--DEBUG- Show execution details--SIGBREAK- Break on warnings--SIGCONT- Continue after errors--ALLOWABS- Allow absolute paths--ONERROR cmd- Execute command on error
Features:
- Full programming language
- 10-level recursion
- Typed input prompts
- 20+ built-in functions
- Network reconnaissance
- Context-aware execution
- Script parameters ($1, $2, etc.)
Examples:
run myscript.src # Run script@myscript # Shorthandrun script.src 192.168.1.1 # With parametersrun -e myscript.src # Edit scriptrun --list # List all scriptsrun --DEBUG script.src # Debug mode
# Conditionalif get_var(age) >= 18 bash_print Access grantedelse bash_print Access deniedendif
# Loopfor ip in [192.168.1.1,192.168.1.2] bash_print Scanning get_var(ip) scan --c get_var(ip) routerendfor
# Functionfunc calculate(a,b) return_value get_var(a)*get_var(b)endfuncset_var(answer,calculate(6,7))See Also: bash, script, automation
Manage favorite and trusted IP addresses.
Usage: favs | favs -i IP NICKNAME | favs -r INDEX | favs -e
Options:
favs- List all favorite and trusted IPs-i IP NICKNAME- Add new favorite or trusted IP with nickname-r INDEX- Remove favorite by index number-e- Edit existing favorites
Features:
- Favorite IP management
- Trusted system list
- Quick access for automated operations
- RShell server integration (nickname ‘rshell’)
- Passwordless X launch on trusted IPs
Examples:
favs # View all saved IPsfavs -i 222.222.222.222 rshell # Add rshell serverfavs -i 198.51.100.42 homebase # Add home serverfavs -r 0 # Remove first entryfavs -e # Interactive edit modershell -s # Auto-connects to rshell favoriteSee Also: rshell, cache, shadow
shadow
Section titled “shadow”Root password cache system.
Usage: shadow -a [IP] ([PASSWORD]) | -l | -r [FILE] | -w [-d] | -x [-q]
Options:
-a [IP] ([PASSWORD])- Add new IP and password to cache-l- List all cached shadow passwords-r [FILE]- Read shadow file into cache (supports encrypted/plaintext)-w [-d]- Write cache to shadow file (use -d for decrypted plaintext)-x [-q]- Clear all shadow passwords (use -q for quiet mode)
File Format:
ip:passwordip:password...Features:
- Cache IP/root password combinations
- Speed up r00ted system logins
- Auto-populated by dict -l and dict lp
- [R] status indicator when password cached
- Encrypted or plaintext storage
- NOT compatible with file objects (-w flag)
Examples:
shadow -a # Add with promptsshadow -a target.host r00tpass123shadow -l # List all cached passwordsshadow -r /home/user/backup.shadowshadow -w # Export encryptedshadow -w -d # Export decrypted plaintextshadow -x # Clear cache with confirmationdict -l # Dictionary attack populates shadowSee Also: dict, brute, rainbow
Toggle streaming mode on or off.
Usage: anon
Features:
- Only hides passwords
- Use streaming mode for more comprehensive hiding
Examples:
anon # Toggle streaming moderainbow
Section titled “rainbow”Rainbow table password management.
Usage: rainbow -l | -r | -n | -q | -m OPTIONS [LENGTH] QUANTITY | -x
Options:
-l- Load rainbow tables into memory (auto-loads)-r- Rebuild rainbow tables from lists-n- Initialize tables from lists (prompts for location)-q- Quick add temporary files (cleared on restart)-m OPTIONS [LENGTH] QUANTITY- Generate passwords in memory (temporary)-x- Clear all rainbow tables
Generation Options (-m):
u- Include uppercase lettersl- Include lowercase lettersn- Include numberss- Include special charactersR- Use random lengths
Features:
- Rainbow table management
- Precomputed password databases
- Hash cracking acceleration
- In-memory password generation
- All files must start with ‘list’ prefix
Examples:
rainbow -n # Create tables from listsrainbow -r # Rebuild from modified listsrainbow -m ulnR 15 100000 # Generate 100k passwordsrainbow -m uln 8 50000 # Generate 50k 8-char passwordsrainbow -q # Add temporary password filesrainbow -x # Clear all tablesSee Also: addpass, hashcat, decipher
File and system modification utilities.
Usage: set -a | -n [MESSAGE] | -b OPTIONS | -l | -t [USER] [PASSWORD] | -u | -e | -f [PASSWORD] | -z | -s | -x | -o|-g|-c OPTIONS | -i | -p | -q | -rn [PATH] [LENGTH]
Options:
-a- Unlock all files-n ([MESSAGE])- Leave note in directory-b -d ([COUNT]) ([LENGTH]) ([PATH])- File bomb with defaults-b -n ([NAME]) ([COUNT]) ([LENGTH]) ([PATH])- File bomb custom name-b -m ([MESSAGE]) ([COUNT]) ([LENGTH]) ([PATH])- File bomb custom message-l- Toggle system logging-t ([USER]) ([PASSWORD])- Create ghost account (default: tux / h4ck)-u- Edit users-e- Email user settings-f ([PASSWORD])- Password-protected archive-z- Zip archive from text-s- Scriptkiddy website (create website.html)-x- Hard lock system (WARNING: DESTRUCTIVE - DO NOT RUN ON HOME SYSTEM)-o -f- Change file owner-o -d- Change directory owner-g -f- Change file group-g -d- Change directory group-c -f- Change file permissions (chmod)-c -d- Change directory permissions-i- Set different LAN IP-p- Chmod payload directory (guest access)-q- Create apt sources.txt (set to default)-rn ([PATH]) ([LENGTH])- Rename all files randomly (default: current dir, length 20)
Features:
- Comprehensive file modification toolkit
- File bombing capabilities
- Ghost account creation
- Permission management
- Archive creation
- System locking (destructive)
Examples:
set -a # Unlock all filesset -n # Leave default noteset -n "Hacked by x" # Custom note messageset -b -d 100 30 /var # 100 files, 30 char namesset -t # Create tux ghost accountset -t admin p4ssw0rd # Custom ghost accountset -o -f # Change file ownerset -l # Toggle loggingset -rn /var 25 # Randomize filenamesclear (clr, cls)
Section titled “clear (clr, cls)”Clear the screen of all characters.
Usage: clear
Aliases: clr, cls
Examples:
clear # Clear screenclr # Aliascls # AliasSee Also: terminal
Bitwise operation.
Usage: bit & NUMBER NUMBER | bit | NUMBER NUMBER | bit ^ NUMBER NUMBER | bit << NUMBER NUMBER | bit >> NUMBER NUMBER | bit >>> NUMBER NUMBER
Options:
bit & NUMBER NUMBER- Bitwise ANDbit | NUMBER NUMBER- Bitwise ORbit ^ NUMBER NUMBER- Bitwise XORbit << NUMBER NUMBER- Left Shiftbit >> NUMBER NUMBER- Right Shiftbit >>> NUMBER NUMBER- Unsigned Right Shift
Examples:
bit & 12 10 # AND: 8bit | 12 10 # OR: 14bit ^ 12 10 # XOR: 6bit << 5 2 # Left shift: 20bit >> 20 2 # Right shift: 5System information and vulnerability scanner.
Usage: list -l [PATH] | -h [-d] [-b] | -x | -t | -p | -z | -m | -n | -i | -c | -f | -d | -a | -s [OPTIONS]
Options:
-l ([PATH])- List library versions (default: /lib)-h- Scan for special files (pdf, txt, jpg, log, chat, exe)-h (-d)- Detailed file information-h (-b)- Include /bin in search-x- Scan for special files (same as -h)-t- Print text files-p- Print passwd file-z- Print hidden files-m- View Map.conf-n- List local networks-i- View all text file contents-c- View Config folders-f- Scan for vulnerable files-d- Scan for vulnerable directories-a- List all directories and files-s- List accounts and hashes-s -b (-B | -D)- List Bank accounts (with dictionary or decipher)-s -p (-B | -D)- List passwd accounts (with dictionary or decipher)-s -e (-B | -D)- List Mail accounts (with dictionary or decipher)
Features:
- Comprehensive system info gathering
- Vulnerability scanning
- File and directory discovery
- Account enumeration
- Network topology viewing
- Integrated cracking (dictionary or decipher)
Examples:
list -h # Scan for special fileslist -h -d # Detailed file infolist -p # View passwd filelist -m # View Map.conflist -f # Scan vulnerable fileslist -s # List all accountslist -spD # Decipher passwd accountslist -s -b -B # Dictionary bank accountsBrute force password cracking.
Usage: brute -l (-u [USER]) | -i | -c COIN [USER] | -e [USER] | -s IP [PORT] | -f IP [PORT]
Options:
-l- Local brute force attack (optional -u for specific user)-i- Insert cracked root password to cache-c COIN [USER]- Cryptocurrency wallet attack-e [USER]- Email account attack-s IP [PORT]- SSH brute force-f IP [PORT]- FTP brute force
Features:
- Exhaustive password trying
- Local and remote attacks
- Email and cryptocurrency support
- SSH and FTP service targeting
- More thorough but slower than dictionary
Examples:
brute -l # Brute all local usersbrute -l -u root # Target specific userbrute -i # Crack and cache root passwordbrute -c btc admin # Crack Bitcoin walletbrute -e user@mail.com # Crack email accountbrute -s 203.0.113.50 22 # SSH brute forcebrute -f 198.51.100.10 21 # FTP brute forceSee Also: dict, hashcat, decipher
Dictionary attack password cracking.
Usage: dict -l (-u [USER]) | -lp | -i | -e [OPTIONS] [USER] | -e -u [USER] --file | -c [OPTIONS] COIN [USER] | -s [OPTIONS] IP [PORT] | -f [OPTIONS] IP [PORT]
Options:
-l- Local dictionary attack (optional -u for specific user)-lp- Print cracked root password-i- Insert root password to cache-e [USER]- Email account attack (use —start/—stop for partial dictionary)-e -u [USER] --file- Email attack from file-c COIN [USER]- Cryptocurrency wallet attack-s IP [PORT]- SSH dictionary attack (optional -u for specific user)-f IP [PORT]- FTP dictionary attack
Partial Dictionary:
--start [INDEX]- Start from dictionary index--stop [INDEX]- Stop at dictionary index
Features:
- Rainbow table-based cracking
- Faster than brute force
- Partial dictionary ranges
- Email, crypto, SSH, FTP support
- Shadow cache population
Examples:
dict -l # Dictionary all usersdict -l -u admin # Target specific userdict -lp # Print root passworddict -i # Cache root passworddict -e --start 0 --stop 1000 user@mail.comdict -s 203.0.113.50 22 # SSH dictionary attackdict -s -u root 198.51.100.10 22dict -f 203.0.113.75 21 # FTP dictionary attackSee Also: brute, hashcat, rainbow
hostname
Section titled “hostname”Display the host name.
Usage: hostname
Examples:
hostname # Display host nameSmall notepad to jot down notes and items of interest for later viewing.
Usage: notes
Features:
- Simple notepad interface
- Quick note taking
- View saved notes
Examples:
notes # Open notepadEmail client and mail management.
Usage: email -c | -v | -o ID | -l [USER] [PASSWORD] | -s | -n | -b RECIPIENT SUBJECT [MESSAGE] [COUNT] | -r ID | -x | -m ACCOUNT [PASSWORD] REFRESH
Options:
-c- Open email client interface-v- View inbox messages-o ID- Open specific email by ID-l [USER] ([PASSWORD])- Login to email account-s- Setup new email account configuration-n- Compose new email message-b RECIPIENT SUBJECT [MESSAGE] [COUNT]- Email bomb attack-r ID- Remove email by ID-x- Clear all emails from inbox-m ACCOUNT [PASSWORD] REFRESH- Monitor account with auto-refresh
Limitation: One email account per session
Features:
- Command-line email client
- Inbox monitoring
- Email bombing capabilities
- Account login and management
- Message composition
Examples:
email -s # Setup new accountemail -l user@mail.com # Login with password promptemail -c # Open email client GUIemail -v # View all messagesemail -o 5 # Open email ID 5email -n # Compose new messageemail -b target@victim.com Spam Test 100email -r 12 # Delete email ID 12email -x # Clear entire inboxemail -m user@mail.com pass123 30System backup and recovery utility.
Usage: rec -b | -r
Options:
-b- Backup essential files (Main and Shell objects only)-r- Restore from backup (Main, Shell, and Computer objects)
Features:
- Framework backup and restore
- Disaster recovery
- Essential file snapshots
- Configuration preservation
Examples:
rec -b # Backup current system staterec -r # Restore from backuprec -b # Create pre-attack backupscan -l # Perform operationsrec -r # Recover if neededSee Also: backup, restore, system
Network packet capture and analysis.
Usage: sniff (--save|--deploy)
Options:
sniff- Launch integrated packet sniffer (real-time)sniff --save- Capture packets to filesniff --deploy- Deploy standalone sniffer (background)
Features:
- Network packet analyzer
- Traffic monitoring and capture
- Credential harvesting
- Traffic analysis
- Network reconnaissance
- Only one flag at a time
Examples:
sniff # Start live packet capturesniff --save # Capture and save packetssniff --deploy # Deploy persistent sniffersniff # Monitor for plaintext credentialsSee Also: tcpdump, wireshark, scan
randix
Section titled “randix”Custom math function for binary operations.
Usage: randix -b NUMBER | randix -n BINNUMBER
Options:
randix -b NUMBER- Get binary representation of numberrandix -n BINNUMBER- Get number representation of binary
Examples:
randix -b 42 # Convert to binaryrandix -n 101010 # Convert from binaryInitiate local dictionary attack.
Usage: jack [NICKNAME]
Features:
- Local dictionary attack
- Root password insertion to cache
- Optional nickname parameter
- Cache population
Examples:
jack # Basic attackjack homebase # With nicknameGenerate passwords.
Usage: pwgen | pwgen -s | pwgen -l NUMBER
Options:
pwgen- Generate password (15 chars)pwgen -s- Generate hard password (20 chars)pwgen -l NUMBER- Generate password with NUMBER chars
Examples:
pwgen # 15-char passwordpwgen -s # 20-char hard passwordpwgen -l 25 # 25-char passwordAlias to [-x] commands/flags for clearing caches and files.
Usage: drop -m | -a | -p | -f | -w | -c | -d | -v | -l | -s
Options:
-m- Clear /lib except init.so and net.so-a- Clear all passwords and virtual/hard files [shadow] [cache] [dirty] [vfile] [share] [libs]-p- Clear all passwords [shadow] [cache]-f- Clear all files [vfile] [share] [libs]-w- Clear shadow file [shadow]-c- Clear cache [cache]-d- Clear dirty file [dirty]-v- Clear vfile file cache [vfile]-l- Clear shared libs folder [libs]-s- Clear share folder [share]
Examples:
drop -m # Clear /lib librariesdrop -a # Clear everythingdrop -p # Clear all passwordsdrop -c # Clear cachedrop -w # Clear shadow filelinklibs
Section titled “linklibs”Remote library linking for performance.
Usage: linklibs | linklibs -a | -m | -c | -u
Options:
linklibs- Toggle all libraries (links both if none active, unlinks all if any linked)-a- Link all libraries (metaxploit and crypto)-m- Link metaxploit only (for exploit scanning)-c- Link crypto only (for hash deciphering)-u- Unlink all libraries (return to local processing)
Features:
- Remote hardware acceleration
- Exploit scanning enhancement
- Hash cracking performance boost
- Ideal for router operations
- Low-powered device support
Examples:
linklibs -a # Link both librarieslinklibs -m # Link metaxploit for scanninglinklibs -c # Link crypto for crackinglinklibs # Auto link if none activelinklibs -u # Unlink all librariesSee Also: library, decipher, scan
addpass
Section titled “addpass”Add password to rainbow tables.
Usage: addpass [PASSWORD]
Features:
- Add custom password to rainbow tables
- Duplicate check before insertion
- Improve cracking success rates
- Support for common passwords and discovered credentials
Examples:
addpass password123 # Add weak passwordaddpass SecureP@ss987 # Add cracked passwordaddpass CompanyName123 # Add organization-specificaddpass Welcome2024 # Add seasonal passwordSee Also: rainbow, pass, hashcat
Advanced Features
Section titled “Advanced Features”Chain commands with | for data flow:
cat file.txt | grep "error" | wc -l # Count errorsls -l | awk '{print $1}' # Extract permissionsfind -a "*.log" | wc -l # Count log filesps | grep "ssh" | wc -l # Count SSH processesRedirects
Section titled “Redirects”Redirect output to files:
ls > files.txt # Overwriteecho "log" >> log.txt # Appendgrep "error" log.txt > errors.txtUse wildcards for file patterns:
rm *.tmp # All .tmp filescat test*.txt # All test*.txtchmod +x *.sh # All .sh filesCommand Chaining
Section titled “Command Chaining”Execute multiple commands:
mkdir test && cd test && touch file.txtls ; pwd ; whoamiPiping System
Section titled “Piping System”Unix-style command chaining with output redirection.
Usage: command1 | command2 | command3 or command > file or command >> file
Operators:
|- Pipe output from one command to next>- Redirect output to file (overwrite)>>- Append output to file
Supported Pipe Commands:
awk, bc, cat, cut, decipher, echo, find, grep, join, ps, rev, sed, sort, split, tr, trim, uniq, wc, xclip, nslookup
Features:
- Multi-command chains
- File output redirection
- Default filename: pipe_out.txt
- Redirects must be at END of chain
- Cannot redirect in middle of pipes
Output Redirection:
command > file # Overwrite filecommand >> file # Append to filecommand > # Save to pipe_out.txtcommand >> # Append to pipe_out.txtCommon Patterns:
# Text processingcat file.txt | grep "error" | wc -l # Count errorsps | grep sshd | awk '{print $2}' # Extract PIDs
# Character transformationecho "HELLO" | tr A-Z a-z # Lowercasecat data.txt | tr -d 0-9 # Remove digitsecho "hello world" | tr -s ' ' # Squeeze spaces
# Field extractioncat /etc/passwd | cut -d: -f1 # Extract usernamesps | awk '{print $1,$5}' # Print user and command
# Sorting and deduplicationcat names.txt | sort | uniq # Sort and dedupels | sort -r # Reverse sort
# Pattern matchingcat log.txt | grep "failed" | wc -l # Count failuresfind /etc -name "*.conf" | grep ssh # Find SSH configs
# Hash crackingcat hashes.txt | decipher # Crack MD5 hashes
# Calculationsecho "5*3+2" | bc # Calculate: 17cat numbers.txt | bc sum # Sum numbers
# Output to filesps | grep bash > processes.txt # Save to filecat log.txt | grep error >> errors.txt # Append errorsawk Examples:
# Field extractionps | awk '{print $1}' # Print field 1cat /etc/passwd | awk -F: '{print $1}' # Custom delimiterecho "a b c" | awk '{print $2}' # Print "b"
# Last fieldecho "one two three" | awk '{print $NF}' # Print "three"
# Field countecho "a b c d" | awk '{print NF}' # Print 4sed Examples:
# Find and replaceecho "hello world" | sed 's/world/universe/'cat file.txt | sed 's/old/new/g' > updated.txtecho "abc123def" | sed 's/[0-9]//g' # Remove digitscut Examples:
# Character rangesecho "hello" | cut -c 1-3 # "hel"echo "world" | cut -c 2- # "orld"
# Field extractionecho "a:b:c" | cut -d: -f2 # "b"echo "1,2,3" | cut -d, -f1,3 # "1,3"sort Examples:
cat names.txt | sort # Alphabeticalcat numbers.txt | sort -n # Numericalls | sort -r # ReverseNotes:
- Pipe chains can be arbitrarily long
- Output is passed as text between commands
- Each command processes input and sends to next
- Extremely powerful for data processing workflows
- See pipe.md for complete reference
See Also: grep, awk, sed, tr, cut, sort, wc
See Also
Section titled “See Also”- BASH_FEATURES.md - Bash scripting system
- pipe.md - Pipe command details
- X.md - Core architecture
- STYLE_GUIDE.md - Code conventions
- GREYSCRIPT_REFERENCE.md - Language reference
Additional Commands from Man4
Section titled “Additional Commands from Man4”iploop
Section titled “iploop”Automated exploit loop attack.
Usage: iploop IP [PARAM] | iploop -l | iploop -x
Arguments:
IP- Target IP for automated exploitation[PARAM]- Optional attack parameter
Flags:
-l- List captured objects from watchlist-x- Clear watchlist results
Features:
- Automated exploit cycling
- Continuous attack until watchlist fills
- All active exploits attempted
- Ideal for periodic target monitoring
- Use bang (!) to re-execute quickly
Examples:
iploop 10.0.0.5 # Loop all exploitsiploop 192.168.1.100 root # Target root accessiploop -l # View capturesiploop -x # Clear resultsSee Also: exploits, scan, attack
Temporary data store for unique entries.
Usage: temp -a STRING | temp -l | temp -c | temp -r | temp -w
Flags:
-a STRING- Add item to store (rejects duplicates)-l- List all stored items-c- Clear all items-r- Read from file-w- Write to temp.lst file
Features:
- Unique-only storage (auto-reject duplicates)
- In-memory collection
- IP address tracking
- Target management
- File import/export
Examples:
temp -a 10.0.0.5 # Store IPtemp -a 192.168.1.100 # Add targettemp -l # List alltemp -r targets.txt # Import listtemp -w # Export to temp.lsttemp -c # Clear allRemote reconnaissance and data gathering.
Usage: recon [--extreme] [OPTIONS] IP
Flags:
-a IP- Extended recon with admin email attack-s IP- Search for specific files (use -f, -p)--file PATH- Process IP list from file--filter- Filter discovered emails (use with -u)--extreme- Maximum network addressing-i LAN_IP- Specify LAN IP for bounce
Features:
- Public information gathering
- Email address collection
- Social engineering data
- Network intelligence
- Requires router LAN bounce for efficiency
- Filter datasets with -u and —filter
Examples:
recon 203.0.113.50 # Basic reconrecon -a 198.51.100.10 # Attack admin emailrecon --extreme 198.51.100.25 # Max addressingrecon -s -f passwords.txt 203.0.113.100 # File searchrecon --file targets.txt # Batch reconAutomated root shell and framework pivot.
Usage: pRoot [y]
Arguments:
[y]- Skip confirmation prompts
Features:
- Automated privilege escalation
- Automatic framework pivot to user home
- Shell objects only
- Streamlined post-exploitation
- Confirmation bypass for scripting
Examples:
pRoot # Get root with promptspRoot y # Skip confirmationsscan -l && pRoot # Exploit then escalateSystem type detection (NPC vs player).
Usage: probe
Features:
- System fingerprinting
- NPC vs player classification
- Preliminary checks
- Most effective on workstations
- Less reliable on servers
Examples:
probe # Check system typeDiscrete exploit scanning.
Usage: es IP|DOMAIN PORT [ARGUMENT] | es LIBRARY [ARGUMENT] | es -l | es -u INDEX | es -x [INDEX]
Flags:
-l- List captured objects-u INDEX- Use captured object by index-x INDEX- Clear objects (supports ranges: 1-5)
Features:
- Most discrete scanning method
- Minimal network detection
- Specific service targeting
- Local library scanning (accepts partial names)
- May find newer exploits than local libs
Examples:
es apt # Scan APT libraryes ssh # Scan SSH libraryes 180.94.158.132 80 # Scan web servicees 203.0.113.50 22 # Scan SSH servicees -l # List resultses -u 0 # Use first exploites -x 2-5 # Clear rangeSee Also: scan, exploits, nmap
config
Section titled “config”Framework configuration management.
Usage: config [OPTION]
Options:
-c- Create/recreate config file-a- Toggle auto solve PObjects-k- Toggle PObject solver debug-m- Toggle metaxploit update on launch-e- Toggle auto clear exploit scan buffer-p- Toggle load passwords on launch-d- Toggle load exploit database on launch-o- Toggle load library database on launch-s- Toggle auto-add sessions-i- Toggle dirty router IP logging-l- Toggle dynamic LAN IP tracking-y- Toggle proxy log for crash recovery-w- Toggle Run_While monitor-h- Toggle short home path-z- Toggle check dsession before scan-r- Toggle use rshell shell objects-b- Toggle clear shadow cache on startup-v [NAME]- Set vulnerable library for auto missions-x [INDEX]- Set exploit index from vulnerable librarystats- View current settingsrun- Interactive config prompton- Enable all settingsoff- Disable all settings--reset- Reset to defaults (requires relaunch)
Features:
- Framework behavior control
- Once exists, stops self-removal on exit
- Auto-recreates on corruption
- All settings disabled by default
- Compile Run_While with
make -t runwhile
Examples:
config -c # Create configconfig stats # View settingsconfig on # Enable allconfig off # Disable allconfig run # Interactive setupconfig -d # Toggle exploit db loadconfig -v libssh.so # Set lib for missionsconfig -x 3 # Use exploit index 3config --reset # Reset defaultsExecute batch command file.
Usage: batch FILE
Arguments:
FILE- File containing commands (one per line)
Features:
- Batch script executor
- Automate command sequences
- Framework and bash script support
- Repeatable operations
Examples:
batch commands.txt # Run batch filebatch /root/auto.bat # Execute automationFile Format Example:
mark@auto 105.145.194.135 192.168.9.2markLibrary Management System framework.
Usage: lms [OPTIONS]
Features:
- Comprehensive database management
- Library version tracking
- Dependency resolution
- Service integration
- Advanced library operations
Examples:
lms # Open LMSPack or repack libraries and routers for portable deployment.
Usage: pack -a|-m|-c|-r|-s|-t|--check [-y] [-i IP]
Flags:
-a- Pack all (crypto, metaxploit, router)-m [-y]- Pack metaxploit.so (skip removal confirmation with -y)-c [-y]- Pack crypto.so (skip removal confirmation with -y)-r [-i IP]- Pack router (optionally specify IP)-s- Pack smart appliance libraries-t- Pack traffic management libraries--check- List all currently packed items
Features:
- Library packaging for deployment
- Crypto encryption/decryption (requires root)
- Router packaging
- Appliance library packaging
- Portable library management
- Stored in /payload/data folder
Notes:
- X automatically manages metaxploit.so and crypto.so in data
- Other libraries require manual placement
- Target system libraries take precedence over packed versions
- Crypto operations require root access
Examples:
# Pack all librariespack -a # Pack crypto, metaxploit, router
# Pack individual itemspack -m # Pack metaxploit with confirmationpack -m -y # Pack metaxploit skip confirmationpack -c -y # Pack crypto skip confirmationpack -r # Pack current routerpack -r -i 192.168.1.1 # Pack specific routerpack -s # Pack appliance librariespack -t # Pack traffic libraries
# Check packed itemspack --check # List all packed itemsSee Also: lms, libs, 0day
Router network crawler and reconnaissance.
Usage: dig [OPTIONS]
Flags:
--extreme- Maximum network enumeration--lwipe- Wipe logs during crawl
Features:
- Extensive router reconnaissance
- Network topology mapping
- Multi-hop crawling
- Log wiping capabilities
- Deep network intelligence
Examples:
dig # Standard crawldig --extreme # Maximum enumerationdig --lwipe # Crawl and wipe logsSmart appliance interface.
Usage: app [OPTIONS]
Features:
- Smart appliance control
- Power management
- Temperature control
- Device interface
Examples:
app # Open appliance interfaceCamera surveillance system.
Usage: cam [OPTIONS]
Features:
- Camera surveillance
- Vehicle tracking
- Remote monitoring
- Capture management
Examples:
cam # Open camera systemscanlan
Section titled “scanlan”Graphical LAN topology scanner.
Usage: scanlan
Features:
- Graphical LAN scanner
- Network topology visualization
- Device discovery
- Interactive mapping
Examples:
scanlan # Launch graphical scannerArchive creator, unpacker, and viewer.
Usage: zip [OPTIONS] FILE
Features:
- Create archives
- Unpack archives
- View archive contents
- Compression utility
Examples:
zip files.zip # Create archivezip -x files.zip # Extract archivezip -l files.zip # List contentsFile and folder archiver (tarballs).
Usage: tar -c|-x|-v|-m|-u [options] <file>
Flags:
-c <file>- Create archive from folder-n <name>- Custom tarball name-s <path>- Save path-r- Remove source after creation
-x <tarfile>- Extract archive-e <path>- Extract to specific path-r- Remove tarball after extraction
-v <--memory|tarfile>- View contents-m <file>- Store tarball in memory-r- Remove source after storing
-u- Retrieve tarball from memory-r- Clear memory after extraction
Features:
- Folder archiving to text files
- File and folder structure preservation
- Memory storage support
- Multi-file extraction
- NOT for binary files
- Use on small files only (RAM issues with large files)
File Object Limitation: File objects can only use -m flag
Examples:
# Create archivestar -c /home/user/folder # Create tarballtar -c -r -n backup /home/data # Named tarball, remove sourcetar -c -s /home/tux/docs myproject # Create in specific location
# Extract archivestar -x backup.tar # Extract to current dirtar -x -e /home/restore backup.tar # Extract to pathtar -x -r data.tar # Extract and remove tarball
# View and memorytar -v backup.tar # List files in tarballtar -m /home/user/folder # Store in memorytar -u # Retrieve from memoryWarning: Not for binary files. Large files cause RAM issues.
See Also: zip, gzip, pack
active
Section titled “active”Show active network interface.
Usage: active
Features:
- Display active interface
- Network status
- Connection info
Examples:
active # Show active interfaceClear X internal cache and shell cache.
Usage: reset
Features:
- Clear framework cache
- Reset shell cache
- Memory cleanup
- Fresh state
Examples:
reset # Clear all cachesDownload remote log files.
Usage: grab [OPTIONS]
Flags:
-w- Wipe logs after download
Features:
- Remote log download
- Optional log wiping
- Evidence collection
- Forensic cleanup
Examples:
grab # Download logsgrab -w # Download and wipeBank heist automation helper.
Usage: heist [OPTIONS]
Features:
- Bank heist automation
- Transaction manipulation
- Financial operations
- Cryptocurrency integration
Examples:
heist # Launch heist helperRefresh network interface.
Usage: rnet
Features:
- Refresh network interface
- Reconnect to network
- Reset connection
- Network recovery
Examples:
rnet # Refresh interfaceLock configuration files to prevent saves.
Usage: lock [FILE]
Features:
- Lock config files
- Prevent modifications
- Configuration protection
- Write protection
Examples:
lock config.conf # Lock configAll-purpose disk management.
Usage: disk [OPTIONS]
Features:
- Comprehensive disk management
- Extensive sorting and filtering
- Partition management
- Storage analysis
- Multiple operations
Examples:
disk # Open disk managerHints and tricks command.
Usage: x [TOPIC]
Features:
- Framework hints and tips
- Init file explanations
- Search features guide
- Quick reference
- Help system
Examples:
x # Show all hintsx init # Init file helpx search # Search featureswhoami
Section titled “whoami”Display current user information.
Usage: whoami
Features:
- Show current username
- User identification
- Context verification
Examples:
whoami # Display current userSee Also: hostname, uname, groups
whatami
Section titled “whatami”Display current object type.
Usage: whatami
Features:
- Show execution context type
- Object type identification
- Context awareness
- Shell vs Computer vs File detection
Examples:
whatami # Display object type