find . -name '*.txt' | sed 's/.*/mv & &/' | sed 's/\.txt$/.tec/'
echo $(( $RANDOM % 100))
cat lista.txt | sed -n 3p
([0-9]{1,3}(\.[0-9]{1,3}){3})
([a-f0-9]{1,4}(:[a-f0-9]{1,4}){7})
for X in *.ppk; do puttygen $X -L > ~/.ssh/$(echo $X | sed 's,./,,' | sed 's/.ppk//g').pub; puttygen $X -O private-openssh -o ~/.ssh/$(echo $X | sed 's,./,,' | sed 's/.ppk//g').pvk; done;
sed 's/$/\/32/'
sed 's/^/set address office365-/' | sed 's/\./-/g' | sed 's/$/\--32/'
sed '/\//d'
ex.:
192.178.10.20/23
sed 's:\/:--:g' FILE.txt | sed 's:\.:-:g'
'/^\[\[:space:\]\]*$/d'
'/^\s*$/d'
'/^$/d'
-n '/^\s*$/!p'
-v '^$'
-v '^\s*$'
-v '^\[\[:space:\]\]*$'
/./
'NF'
'length'
'/^[ \t]*$/ {next;} {print}'
'!/^\[ \t\]*$/'
Ex: "carlos.jose"
sed -n '/\./p' usuario | uniq
:%s/,/\r/g
change (,) to next line.
sample.
teste1,teste2,teste3,teste4,teste5
to:
teste1
teste2
teste3
teste4
teste5
the other way around.
:%s/\n/\,/g
teste1
teste2
teste3
.
.
.
to
teste1,teste2,teste3 ...
:start line,last line/^/#
Sample:
:4,10s/^/something
[^\x00-\x7F]+\ *(?:[^\x00-\x7F]| )*.exe
[(http(s)?):\/\/(www\.)?a-zA-Z0-9@:%._\+~#=]{2,256}\.[a-z]{2,6}\b([-a-zA-Z0-9@:%_\+.~#?&//=]*)
\b(?:(?:2(?:[0-4][0-9]|5[0-5])|[0-1]?[0-9]?[0-9])\.){3}(?:(?:2([0-4][0-9]|5[0-5])|[0-1]?[0-9]?[0-9]))\b
^((([0-1]?[0-9])|([2][0-3])):)?(([0-5][0-9]):)?([0-5][0-9])(\.\d{1,3})?$|^\d+(\.\d{1,3})?$
(\.\+w|.js|.exe|.doc|.txt|.rar|.tar|.pdf|.img|.xlsx$)
(.ttp[s]?\:.*(.php|.zip|.bat|.exe|.src|.run\$))
([^Received:]\s+(.*from\s).*)(\.sebraego.com.br)
((.*From.*[\n+].*)google\.com.*)
.*\.(ly|cn|kp|ira|fy|af|ss|cu|iq|il|ye|ir|ru).*
(.*tps?:\/\/.*(\.exe|\.vbs|\.php|\.sh|\.jar|\.zip|\.bat|\.js|\.cmd|\.src$))
(.*tps?:\/\/.*(\.php|\.sh|\.cmd|\.exe|\.bat|\.vbs|\.jar|\.js|\.src|\.aspx).*)
(.*tps?:\/\/.*(\.exe|\.vbs|\.php|\.sh|\.jar|\.zip|\.bat|\.js$))
(.*www-data@.*)|(.*@localhost.*)
(.*[\d]@.*)
(.*tps?:\/\/)(.*[Cc]lique?.*aqui|.*[Cc]lique$)
([0-9]{3}\.[0-9]{3}\.[0-9]{3}\-[0-9]{2})
(\w+.?[\$]) ou (\w+[\$])
\w+[\$]|((SRV)\w+)|((srv)\w+)
SRVLAV$ or $SRVLAB or SRVLAB or srvLaB
(\w+[$]|[$]+\w+)
sed 's/,/\n/g'
cat malware | grep -Ev "micros|google|sebrae|linke|skype|portaldoem|facebook|gov.br|icloud|footprintdns"
curl --request GET --url 'https://www.virustotal.com/vtapi/v2/ip-address/report apikey=1e73f5e9573b8a85a9f4118b39071a9d3f89849ab98f935bc611e5b457bf8e9f&ip=209.99.40.222'
{"last_resolved": "2015-09-18 00:00:00", "hostname": "019582.yihedu.com"}
cat file1 | sed 's/,/\n/g' | grep hostname | awk '{print $2}' | sed 's/\"}//' | sed 's/\"//'
cat file1 | sed 's/,/\n/g' | grep url | awk '{print $2}' | sed 's/\"//' | sed 's/http\:\/\///' | sed 's/\/.*//' | sort -u
sed 's/^#*/*/'
sed 's/$/*/'
cat file.txt | sed '/^$/d'
curl --request GET --url 'https://www.virustotal.com/vtapi/v2/ip-address/report?apikey=1e73f5e9573b8a85a9f4118b39071a9d3f89849ab98f935bc611e5b457bf8e9f&ip=209.99.40.222' | sed 's/},/\n/g' | grep url | awk '{print $2}' | sed 's/\"//' | sed 's/http\:\/\///' | sed 's/\/.*//' | sort -u | sed 's/^#*/*/' | sed 's/$/*/'
sed -e "s/\r//g" file > newfile
ou
dos2unix script
cat file.txt | tr '[:upper:]' '[:lower:]'
(^DWM|^DicomServer|^DefaultAppPool|^schedule.tasks|^AppVPublishing|^Symantec|^postgres|^Classic|^synapseae|^altaperformance|^.NET\s)|(\w+[$])
lynx --source https://ransomwaretracker.abuse.ch/ip/209.99.40.222/ | awk {'print $3}' | sed 's/href\=\"host\///' | sed 's/\/\"//'