Commands

How to use the command 'nvme' (with examples)

How to use the command 'nvme' (with examples)

The NVMe command line interface (CLI) tool is a highly versatile user-space utility designed specifically for managing Non-Volatile Memory Express (NVMe) devices.

Read More
How to Use the Command 'nvram' (with Examples)

How to Use the Command 'nvram' (with Examples)

The nvram command is a powerful tool that enables users to manage firmware variables stored in the non-volatile random-access memory (NVRAM) of Apple computers.

Read More
How to use the command 'nx' (with examples)

How to use the command 'nx' (with examples)

Nx is a powerful command-line interface used to manage workspaces efficiently within monorepos.

Read More
How to use the command 'nxc ftp' (with examples)

How to use the command 'nxc ftp' (with examples)

The nxc ftp command is a powerful tool designed for penetration testing and exploiting FTP (File Transfer Protocol) servers.

Read More
How to Use the Command 'nxc ldap' (with Examples)

How to Use the Command 'nxc ldap' (with Examples)

The nxc ldap command is a powerful and versatile tool used for pentesting and exploiting Windows Active Directory Domains via the Lightweight Directory Access Protocol (LDAP).

Read More
How to Use the Command 'nxc mssql' (with Examples)

How to Use the Command 'nxc mssql' (with Examples)

The nxc mssql command is a versatile utility designed to perform penetration testing and exploit Microsoft SQL servers.

Read More
How to Use the Command 'nxc nfs' (with Examples)

How to Use the Command 'nxc nfs' (with Examples)

The ’nxc nfs’ command is a versatile tool designed for pentesting and exploiting NFS (Network File System) servers.

Read More
How to Use the Command 'nxc smb' (with Examples)

How to Use the Command 'nxc smb' (with Examples)

The nxc smb command is a robust tool designed for penetration testing and exploiting SMB (Server Message Block) servers.

Read More
How to Use the Command 'nxc vnc' (with Examples)

How to Use the Command 'nxc vnc' (with Examples)

The ’nxc vnc’ command is a powerful tool designed for penetration testing and exploiting VNC (Virtual Network Computing) servers.

Read More
How to use the command 'nxc wmi' (with examples)

How to use the command 'nxc wmi' (with examples)

The nxc wmi command is a versatile utility used in penetration testing and exploiting the Windows Management Instrumentation (WMI) protocol.

Read More
How to use the command 'nxcdb' (with examples)

How to use the command 'nxcdb' (with examples)

The nxcdb command is a utility designed for interacting with the NetExec database, a versatile and robust system for managing various database tasks efficiently.

Read More
How to use the command 'oathtool' (with examples)

How to use the command 'oathtool' (with examples)

Oathtool is a utility that forms part of the OATH Toolkit—a robust assortment of tools, libraries, and documentation that supports the OATH (Initiatives for Open Authentication) algorithms like HOTP (HMAC-based One-time Password) and TOTP (Time-based One-time Password).

Read More