You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When creating solutions developers have no shortage of tools to create rich and smart user interfaces.
36
33
System administrators have long been duct taping together brittle workflows based on a menagerie of simple command line tools created by strangers on github and the guy down the hall.
37
34
Unfortunately, when CLIs become significantly complex the ease of command discoverability tends to fade quickly.
@@ -42,15 +39,13 @@ The price we pay for beautifully colored displays is complexity required to aggr
42
39
The `cmd2` framework provides a great mixture of both worlds. Application designers can easily create complex applications and rely on the cmd2 library to offer effortless user facing help and extensive tab completion.
43
40
When users become comfortable with functionality, cmd2 turns into a feature rich library enabling a smooth transition to full automation. If designed with enough forethought, a well implemented cmd2 application can serve as a boutique workflow tool. `cmd2` pulls off this flexibility based on two pillars of philosophy:
44
41
45
-
* Tab Completion
46
-
* Automation Transition
42
+
- Tab Completion
43
+
- Automation Transition
47
44
48
-
Philosophy
49
-
-------------
45
+
## Philosophy
50
46
51
47
<ahref="https://imgflip.com/i/63h03x"><imgsrc="https://i.imgflip.com/63h03x.jpg"title="made at imgflip.com"width="70%"height="%70"/></a>
52
48
53
-
54
49
Deep extensive tab completion and help text generation based on the argparse library create the first pillar of 'ease of command discovery'. The following is a list of features in this category.
55
50
56
51
- Great tab completion of commands, subcommands, file system paths, and shell commands.
@@ -69,9 +64,8 @@ cmd2 creates the second pillar of 'ease of transition to automation' through ali
69
64
- Powerful and flexible built-in Python scripting of your application using the `run_pyscript` command
70
65
- Transcripts for use with built-in regression can be automatically generated from `history -t` or `run_script -t`
71
66
67
+
## Installation
72
68
73
-
Installation
74
-
------------
75
69
On all operating systems, the latest stable version of `cmd2` can be installed using pip:
76
70
77
71
```bash
@@ -84,31 +78,26 @@ For information on other installation options, see
84
78
[Installation Instructions](https://cmd2.readthedocs.io/en/latest/overview/installation.html) in the cmd2
85
79
documentation.
86
80
81
+
## Documentation
87
82
88
-
Documentation
89
-
-------------
90
83
The latest documentation for cmd2 can be read online here: https://cmd2.readthedocs.io/en/latest/
91
84
92
85
It is available in HTML, PDF, and ePub formats.
93
86
94
-
95
87
The best way to learn the cmd2 api is to delve into the example applications located in source under examples.
If you think you've found a bug, please first read through the open [Issues](https://github.com/python-cmd2/cmd2/issues). If you're confident it's a new bug, go ahead and create a new GitHub issue. Be sure to include as much information as possible so we can reproduce the bug. At a minimum, please state the following:
137
-
138
-
*``cmd2`` version
139
-
* Python version
140
-
* OS name and version
141
-
* What you did to cause the bug to occur
142
-
* Include any traceback or error message associated with the bug
|[Jok3r](http://www.jok3r-framework.com)| Network & Web Pentest Automation Framework ||
151
-
|[CephFS Shell](https://github.com/ceph/ceph)|[Ceph](https://ceph.com/) is a distributed object, block, and file storage platform||
152
-
|[psiTurk](https://psiturk.org)| An open platform for science on Amazon Mechanical Turk||
153
-
|[Poseidon](https://github.com/CyberReboot/poseidon)| Leverages software-defined networks (SDNs) to acquire and then feed network traffic to a number of machine learning techniques. ||
154
-
|[Unipacker](https://github.com/unipacker/unipacker)| Automatic and platform-independent unpacker for Windows binaries based on emulation||
155
-
|[tomcatmanager](https://github.com/tomcatmanager/tomcatmanager)| A command line tool and python library for managing a tomcat server||
156
-
|[Expliot](https://gitlab.com/expliot_framework/expliot)| Internet of Things (IoT) exploitation framework ||
157
-
|[mptcpanalyzer]()| Tool to help analyze mptcp pcaps ||
158
-
|[clanvas](https://github.com/marklalor/clanvas)| Command-line client for Canvas by Instructure||
159
-
121
+
## Found a bug?
122
+
123
+
If you think you've found a bug, please first read through the open [Issues](https://github.com/python-cmd2/cmd2/issues). If you're confident it's a new bug, go ahead and create a new GitHub issue. Be sure to include as much information as possible so we can reproduce the bug. At a minimum, please state the following:
124
+
125
+
-`cmd2` version
126
+
- Python version
127
+
- OS name and version
128
+
- What you did to cause the bug to occur
129
+
- Include any traceback or error message associated with the bug
130
+
131
+
## Projects using cmd2
132
+
133
+
| Application Name | Description | Organization or Author |
|[CephFS Shell](https://github.com/ceph/ceph)| The Ceph File System, or CephFS, is a POSIX-compliant file system built on top of Ceph’s distributed object store |[ceph](https://ceph.com/)|
136
+
|[garak](https://github.com/NVIDIA/garak)| LLM vulnerability scanner that checks if an LLM can be made to fail in a way we don't want |[NVIDIA](https://github.com/NVIDIA)|
137
+
|[medusa](https://github.com/Ch0pin/medusa)| Binary instrumentation framework that that automates processes for the dynamic analysis of Android and iOS Applications|[Ch0pin](https://github.com/Ch0pin)|
138
+
|[InternalBlue](https://github.com/seemoo-lab/internalblue)| Bluetooth experimentation framework for Broadcom and Cypress chips |[Secure Mobile Networking Lab](https://github.com/seemoo-lab)|
139
+
|[SCCMHunter](https://github.com/garrettfoster13/sccmhunter)| A post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain|[Garret Foster](https://github.com/garrettfoster13)|
140
+
|[Unipacker](https://github.com/unipacker/unipacker)| Automatic and platform-independent unpacker for Windows binaries based on emulation |[unipacker](https://github.com/unipacker)|
141
+
|[Frankenstein](https://github.com/seemoo-lab/frankenstein)| Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging|[Secure Mobile Networking Lab](https://github.com/seemoo-lab)|
142
+
|[Poseidon](https://github.com/faucetsdn/poseidon)| Leverages software-defined networks (SDNs) to acquire and then feed network traffic to a number of machine learning techniques. |[Faucet SDN](https://github.com/faucetsdn)|
143
+
|[DFTimewolf](https://github.com/log2timeline/dftimewolf)| A framework for orchestrating forensic collection, processing and data export |[log2timeline](https://github.com/log2timeline)|
|[REW Sploit](https://github.com/REW-sploit/REW-sploit)| Emulate and Dissect Metasploit Framework (MSF) and other attacks|[REW-sploit](https://github.com/REW-sploit)|
146
+
|[tomcatmanager](https://github.com/tomcatmanager/tomcatmanager)| A command line tool and python library for managing a tomcat server|[tomcatmanager](https://github.com/tomcatmanager)|
147
+
|[Falcon Toolkit](https://github.com/CrowdStrike/Falcon-Toolkit)| Unleash the power of the CrowdStrike Falcon Platform at the CLI|[CrowdStrike](https://github.com/CrowdStrike)|
148
+
|[EXPLIoT](https://gitlab.com/expliot_framework/expliot)| Internet of Things Security Testing and Exploitation framework |[expliot_framework](https://gitlab.com/expliot_framework/)|
|[SatanSword](https://github.com/Lucifer1993/SatanSword) (in Chinese) | Comprehensive Penetration Framework for Red Teaming |[Lucifer1993](https://github.com/Lucifer1993)|
156
+
|[Jok3r](http://www.jok3r-framework.com)| Network & Web Pentest Automation Framework |[Koutto](https://github.com/koutto)|
157
+
|[Counterfit](https://github.com/Azure/counterfit)| a CLI that provides a generic automation layer for assessing the security of ML models |[Microsoft Azure](https://github.com/Azure)|
158
+
|[Overlord](https://github.com/qsecure-labs/overlord)| Red Teaming Infrastructure Automation |[QSecure Labs](https://github.com/qsecure-labs)|
159
+
|[Automated Reconnaissance Pipeline](https://github.com/epi052/recon-pipeline)| An automated target reconnaissance pipeline |[epi052](https://github.com/epi052)|
160
+
|[JSShell](https://github.com/Den1al/JSShell)| An interactive multi-user web JavaScript (JS) shell |[Den1al](https://github.com/Den1al)|
161
+
|[RedShell](https://github.com/Verizon/redshell)| An interactive command prompt for red teaming and pentesting |[Verizon](https://github.com/Verizon)|
162
+
|[FLASHMINGO](https://github.com/mandiant/flashmingo)| Automatic analysis of SWF files based on some heuristics. Extensible via plugins. |[Mandiant](https://github.com/mandiant)|
163
+
|[psiTurk](https://github.com/NYUCCL/psiTurk)| An open platform for science on Amazon Mechanical Turk |[NYU Computation and Cognition Lab](https://github.com/NYUCCL)|
164
+
165
+
Note: If you have created an application based on `cmd2` that you would like us to mention here, please get in touch.
0 commit comments