ShellSpells
  • 🧙‍♂️Welcome!
    • ShellSpells
    • FAQs
    • License & Disclaimer
  • 🐧Linux
    • System Ops
      • Transcripts
      • Help
      • System Info
        • Date/Time
        • System Details
        • Patches & Updates
        • Init System Identification
        • Hostname / Host ID
        • Variables
        • Hardware & Resources
      • Filesystem
        • Traverse & Enumerate
        • Drives & Partitions
        • Shares
        • Packages
        • Connected Devices
        • Kernel Modules (Drivers)
      • Users & Groups
        • Enumerate
        • Modify
      • Network
        • Enumerate
        • Modify
      • Scheduled Jobs
        • Enumerate
        • Modify
      • Processes
        • Enumerate
        • Modify
        • Custom Script and Shared Object
        • Process I/O Redirection
      • Services
        • Enumerate
        • Modify
        • Create a Service
      • Startup/Boot Scripts
        • Enumerate
        • Modify
      • Security
        • Antivirus
        • Firewall
        • SSH Keys
      • History & Logs
        • History
        • Logs
    • File Ops
      • Search
        • Filename
        • Content
        • Users (Owners)
        • Time
        • Size
        • Permission
        • Hidden Files
        • Inode
        • Find + Exec
        • Notes
      • Enumerate Metadata
      • Modify Metadata
      • Read Content
      • Modify Content
      • Extract Content
      • Sort / Compare / Count
      • Move
      • Copy
      • Execute
      • Hash
      • Encode/Decode
      • Compress/Decompress
      • Working With Weird Filenames
    • Terminal Ops
      • Keyboard Shortcuts
      • Tmux Shortcuts
  • 🪟Windows
    • System Ops
      • Transcripts
      • Help
      • System Info
        • One-liners
        • Date/Time
        • System Details
        • Hotfixes
        • Domain or Workgroup
        • Data Execution Prevention
        • Variables
        • Hardware & Resources
      • Filesystem
        • Traverse & Enumerate
        • Drives & Partitions
        • Installed Software
        • Drivers
        • Shares
      • Registry
        • Enumerate
        • Modify
        • Forensically Relevant Keys
      • Users & Groups
        • Enumerate
        • Modify
      • Network
        • Enumerate
        • Modify
      • Scheduled Tasks
      • Processes
        • Enumerate
        • Modify
      • Services
        • Enumerate
        • Modify
      • Autorun / Startup
        • Enumerate
        • Modify
      • Security
        • Permissions
          • Enumerate
          • Page
        • Antivirus
        • Firewall
          • Enumerate
          • Modify
        • Audit Policies
        • Remoting
          • Enumerate
          • Modify
          • Registry Locations
        • Stored Credentials
      • Remote Command Execution
      • Active Directory
        • Enumerate
        • Modify
      • History & Logs
        • History
        • Logs
      • PowerShell Config
      • Scripting
      • WMIC Notes
    • File Ops
      • Search
        • Filename
        • Time
        • Size
        • Permissions
        • Attributes
        • Wildcarding
      • Enumerate Metadata
        • One Liners
        • Users (Owners)
        • Timestamps
        • Size
        • Permissions
        • Attributes
      • Modify Metadata
        • Change Owner
        • Timestamps
        • Size
        • Attributes
      • Read Content
      • Modify Content
        • Overwrite
        • Insert
        • Append
        • Replace / Remove
        • Convert Case
        • Alternate Data Streams
      • Extract Content
      • Sort / Compare / Count
        • Sort
        • Count
        • Compare
      • Move
      • Copy
      • Execute
      • Hash
      • Encode/Decode
      • Compress/Decompress
      • Working With Weird Filenames
      • Output Formatting / Filtering
      • File Formatting
      • Operators
  • ⛓️Network
    • Traffic Manipulation
      • iptables
        • Option List
        • General Commands
        • Filter Tables
        • NAT
        • Mangle
        • Filter for SSH Traffic (Example)
      • nftables
    • Packet Capture
      • Syntax
      • TCPDump Examples
    • Packet Analysis
      • Wireshark
  • 🚗Maneuver
    • SSH
    • Control Sockets
    • RDP
    • Windows Port Proxy
  • 🛩️Data Transfer
    • SCP
    • FTP
    • Netcat
      • Netcat Relays
    • Server Interactions
    • Alternate Methods
  • 🪄REGEX
    • Examples
Powered by GitBook
On this page
  • What is ShellSpells?
  • ShellSpells was created for three reasons:
  • Why Categorize Commands by Intended Action?
  • What Pitfalls?
  • Work in Progress
  • Copyright

Was this helpful?

  1. Welcome!

ShellSpells

NextFAQs

Last updated 1 year ago

Was this helpful?

What is ShellSpells?

ShellSpells was created for three reasons:

  • A command-line toolkit for Linux, Windows, Networking, and more, that categorizes commands by their intended action, rather than by specific commands.

  • A note repository for cybersecurity beginners and professionals to start with, or expand on, while avoiding common pitfalls when it comes to taking notes ().

  • I wanted to share this resource for free with the community.

ShellSpells consists of mostly system administration commands, but does lean a little towards penetration testing and security in some areas. However, this resource is useful to anyone working in the IT/cybersecurity industry.

If you are specifically looking for pentesting techniques and exploits, make sure to check out .

Why Categorize Commands by Intended Action?

When you are in the middle of doing a task, it is easier to search through your notes based on the desired outcome/intended action rather than trying to remember all the available commands and their various switches.

Think of all the different commands to enumerate a process. How many different sections of your notes would you have to search through if they were categorized by command? ShellSpells provides a different method.

Workflow Example: If you want to enumerate a process on Windows, you would go to Windows -> System Ops -> Processes -> Enumerate At a glance you now have a plethora of commands to accomplish the task, to include CMD, PowerShell, and wmic commands. All in one place, in an easy-to-read format, and easy to locate. On top of that, you will see other options you can use.

  • It is efficient.

  • It takes seconds rather than minutes to find what you are looking for.

  • It helps stay on task.

Ultimately, you can spend more brain cycles on developing an effective solution to your problem/task, rather than trying to remember or locate commands.

What Pitfalls?

In summary, these are the pitfalls I see in this industry.

  • Taking separate notes for each class (and never moving them to a central note repository)

  • Taking notes in a multiple applications (and never moving them to a central note repository)

  • Taking command line notes categorized by commands rather than by intended action.

  • Taking very verbose notes on everything.

Throughout my career, I personally tested each one of these pitfalls...

By the time I realized my mistakes and started to move my notes to a central location, it took a long time for me to gather everything together. It took longer for me to re-organize my notes in to an effective format.

I created this resource to help others avoid the mistakes that I made while also providing a useful command line toolkit and note repository to the community.

If you are new to the cyber career field, then I believe this resource is a head start. If I had this when I was first getting started it would have been a game-changer. I encourage you to fork it and build on it as you grow your skills. Understand the importance of taking effective, organized notes. It is one of those things that separates the pros from the average joes.

Work in Progress

ShellSpells always has been, and always will be a work in progress.

I'll continue to add new things to this resource as I learn them. I'll continue to make corrections as I find them. If you want to add or correct something, please submit a pull-request on my GitHub:

Copyright

© ShellSpells 2024. Except where otherwise specified.

🧙‍♂️
more on that below
HackTricks
https://github.com/3DFleezy/ShellSpells