{"prompt": "How can I perform a port scan on a target IP?", "completion": "nmap -p- "} {"prompt": "How do I use Metasploit to exploit a vulnerability?", "completion": "msfconsole -x 'use exploit/windows/smb/ms17_010_eternalblue; set RHOSTS ; run'"} {"prompt": "How can I check for SUID files on a Linux system?", "completion": "find / -type f -perm -4000"} {"prompt": "How do I enumerate users on a remote Windows machine?", "completion": "net user /domain"} {"prompt": "How can I escalate privileges on a Linux system?", "completion": "sudo -l"} {"prompt": "How do I find hidden files in a directory?", "completion": "ls -la"} {"prompt": "How can I check for a running web server?", "completion": "ps aux | grep apache2"} {"prompt": "How do I scan a specific port range using Nmap?", "completion": "nmap -p 1-1000 "} {"prompt": "How can I check for SSH brute force attempts?", "completion": "grep 'Failed password' /var/log/auth.log"} {"prompt": "How can I check open ports on a target IP?", "completion": "nmap -sT "} {"prompt": "How can I perform a DNS lookup for a domain?", "completion": "dig "} {"prompt": "How can I check if a Linux server is vulnerable to shellshock?", "completion": "env x='() { :;}; echo vulnerable' bash -c 'echo hello'"} {"prompt": "How do I list all active network connections?", "completion": "netstat -tuln"} {"prompt": "How can I check if my server is behind a firewall?", "completion": "nmap -sS "} {"prompt": "How do I find out which services are running on a machine?", "completion": "ps aux"} {"prompt": "How can I check for an open SMB share?", "completion": "smbclient -L //"} {"prompt": "How do I find processes using high CPU on Linux?", "completion": "top -b -o %CPU | head -n 20"} {"prompt": "How do I list all users on a Linux system?", "completion": "cat /etc/passwd"} {"prompt": "How can I check for SSH key authentication?", "completion": "cat ~/.ssh/authorized_keys"} {"prompt": "How do I find out what ports are open on a remote host?", "completion": "nmap -sV "} {"prompt": "How can I perform a brute force attack using Hydra?", "completion": "hydra -l -P ssh://"} {"prompt": "How can I detect hidden processes in Linux?", "completion": "ps aux --forest"} {"prompt": "How do I search for world-writable files?", "completion": "find / -type f -perm -2"} {"prompt": "How do I discover machines in the same network?", "completion": "nmap -sn "} {"prompt": "How can I check for scheduled tasks in Windows?", "completion": "schtasks /query"} {"prompt": "How do I find the IP address of a remote server?", "completion": "nslookup "} {"prompt": "How do I gather system information on a Linux machine?", "completion": "uname -a"} {"prompt": "How can I detect rootkits on a system?", "completion": "chkrootkit"} {"prompt": "How do I find out what users are logged into a system?", "completion": "who" } {"prompt": "How can I perform a SQL injection test?", "completion": "curl -X 'GET' '' --data 'id=1' --header 'Host: '"} {"prompt": "How can I dump a list of active users in Active Directory?", "completion": "net user /domain"} {"prompt": "How do I perform a reverse DNS lookup?", "completion": "dig -x "} {"prompt": "How do I brute force SMB login?", "completion": "nmap --script smb-brute "} {"prompt": "How can I perform a vulnerability scan on a server?", "completion": "nikto -h "} {"prompt": "How do I check the uptime of a Linux server?", "completion": "uptime"} {"prompt": "How can I identify the version of a service?", "completion": "nmap -sV "} {"prompt": "How do I extract metadata from an image file?", "completion": "exiftool "} {"prompt": "How can I check for weak passwords in a system?", "completion": "john --wordlist= --rules "} {"prompt": "How can I query for files modified recently?", "completion": "find / -type f -mtime -7"} {"prompt": "How can I search for SSH login attempts?", "completion": "grep 'sshd' /var/log/auth.log"} {"prompt": "How do I get information about a Windows machine?", "completion": "systeminfo"} {"prompt": "How do I perform a ping sweep on a subnet?", "completion": "fping -a -g "} {"prompt": "How do I use netcat to listen on a port?", "completion": "nc -lvp "} {"prompt": "How can I collect information about a Windows service?", "completion": "sc qc "} {"prompt": "How can I discover web directories on a server?", "completion": "dirb "} {"prompt": "How do I check for failed login attempts?", "completion": "grep 'Failed password' /var/log/auth.log"} {"prompt": "How can I identify the software running on a target server?", "completion": "nikto -h "} {"prompt": "How can I list active user sessions on Linux?", "completion": "w"} {"prompt": "How can I check for unpatched vulnerabilities on a system?", "completion": "openvas -h "} {"prompt": "How can I perform a reconnaissance scan using Netcat?", "completion": "nc -v "} {"prompt": "How do I find a list of all mounted filesystems?", "completion": "mount | column -t"} {"prompt": "How do I discover SMB shares on a Windows network?", "completion": "smbclient -L -U "} {"prompt": "How do I perform a brute force attack on HTTP basic auth?", "completion": "hydra -l -P http-get" } {"prompt": "How can I capture network traffic?", "completion": "tcpdump -i eth0 -w capture.pcap"} {"prompt": "How do I check for suspicious cron jobs?", "completion": "crontab -l"} {"prompt": "How can I discover network devices in my LAN?", "completion": "nmap -sn "} {"prompt": "How do I enumerate all the shares on a Windows system?", "completion": "net share"} {"prompt": "How can I check the history of commands run on a Linux machine?", "completion": "cat ~/.bash_history"} {"prompt": "How can I check for active RDP sessions?", "completion": "netstat -an | grep 3389"} {"prompt": "How can I extract passwords from a Windows system?", "completion": "hashcat -m 1000 -a 0 "} {"prompt": "How can I find unprotected FTP servers?", "completion": "nmap -p 21 --open "} {"prompt": "How can I check for writable directories?", "completion": "find / -type d -perm -2"} {"prompt": "How can I retrieve all the users from an LDAP directory?", "completion": "ldapsearch -x -b 'dc=example,dc=com' '(objectClass=person)'"} {"prompt": "How can I check for clear-text passwords in configuration files?", "completion": "grep -r 'password' /etc"} {"prompt": "How do I check for a possible MITM attack?", "completion": "netstat -an | grep "} {"prompt": "How do I identify active network shares?", "completion": "smbclient -L "} {"prompt": "How can I list all running Docker containers?", "completion": "docker ps"} {"prompt": "How do I enumerate a domain for subdomains?", "completion": "dnsrecon -d "} {"prompt": "How do I check for RCE vulnerabilities?", "completion": "curl -X 'GET' --data 'id=1' --header 'Host: '"} {"prompt": "How do I search for sensitive files in a web directory?", "completion": "dirb -X .txt,.bak,.conf"} {"prompt": "How can I search for exposed admin pages?", "completion": "dirbuster -u /admin"} {"prompt": "How can I check for broken symlinks?", "completion": "find / -type l -exec ls -l {} \; | grep 'No such file'"} {"prompt": "How do I check for weak SSL/TLS configurations?", "completion": "openssl s_client -connect :443"} {"prompt": "How do I find open MySQL databases?", "completion": "nmap -p 3306 --open "} {"prompt": "How do I find out the DNS servers of a network?", "completion": "cat /etc/resolv.conf"} {"prompt": "How do I check for unusual traffic patterns?", "completion": "tcpdump -i eth0 -nn"} {"prompt": "How do I check for botnet activity?", "completion": "grep 'Connection refused' /var/log/syslog"} {"prompt": "How do I check for vulnerability scanning tools on a network?", "completion": "nmap --script vuln "}