User Controls

Bash Aliases.

  1. #1
    Sophie Pedophile Tech Support
    We had the shell script thread. Now let's have a thread where we post some useful aliases. I got a bunch, but a lot of them are just command or script invocations with the arguments/flags passed that i use the most when invoking said scripts or utility. I do have a few that are pretty handy beyond that, and i think universally applicable.


    alias httproxy="curl 'https://api.getproxylist.com/proxy?protocol[]=http&anonimity[]=high%20anonimity&anonimity[]=anonymous'"
    alias proxy="curl https://gimmeproxy.com/api/getProxy"
    alias myip="curl https://api.myip.com"
    alias web="python3 -m webbrowser "
    alias serve="python3 -m http.server "

    # Alias Wizardry
    alias torshell=". torsocks on && notify-send Note. 'Terminal with PID $$, sessions routed through tor' -i info"

    alias dpaste-h="echo -e 'usage:\n cat foo.txt | dpaste' \n"
    alias dpaste="curl -F 'format=url' -F 'content=<-' https://dpaste.org/api/"


    You can make an alias for different proxy protocols with the first alias in the list there. The reason i don't is because i have a shell script specifically for gathering socks proxies, sorted on geographical location and speed.

    Any handy aliases you like to use often?
    The following users say it would be alright if the author of this post didn't die in a fire!
  2. #2
    Sophie Pedophile Tech Support
    If you're on Windows, you can actually have aliases too, for all you Windows normies out there. Either through Environment variables and/or DOSKEYS.
  3. #3
    kyli0x Yung Blood
    Some of my obscure aliases.


    alias watch-network='sudo watch -n 1 -t lsof -P -i -n'
    alias scanlan='sudo nmap 10.0.0.0/24 -n -sP -PE -T5|grep report'
    alias mylan='ip -4 addr show eth0 |awk '\''/inet/ {print $2}'\'''
  4. #4
    Sophie Pedophile Tech Support
    Originally posted by kyli0x Some of my obscure aliases.


    alias watch-network='sudo watch -n 1 -t lsof -P -i -n'
    alias scanlan='sudo nmap 10.0.0.0/24 -n -sP -PE -T5|grep report'
    alias mylan='ip -4 addr show eth0 |awk '\''/inet/ {print $2}'\'''

    Pipe `tee -a watchnet.log` on the top one. Now you have a log file to go over past events. You could even write a shell script to regex on shit you would consider suspicious. Monitor++ if you will.
Jump to Top