explainshell | match command-line arguments to their help text | Command Line Interface library
kandi X-RAY | explainshell Summary
kandi X-RAY | explainshell Summary
To setup a working environment that lets you run the web interface locally, you'll need to:.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- Extract options from paragraph
- Match option
- Extract options from a string
- Return the position of the given string
- Return the flags of a string
- Tag a source
- Convert value to true
- Post classification
- Iterate through the available fixers
- Count the number of lines in a paragraph
- Extract the first line from a paragraph
- Add a bash script
- Post - option extraction
- Pre - add man page
- Add a list of words to the COMPOUNDSER environment
- Pre - classification
- Post - parse man page
- Pre - parse man page
- Pre - get man page
- Return the length of the first line in paragraph
explainshell Key Features
explainshell Examples and Code Snippets
$ ch() { whatis $1; man $1 | sed -n "/^\s*$2/,/^$/p" ; }
$ ch grep -l
grep (1) - print lines matching a pattern
-l, --files-with-matches
Suppress normal output; instead print the name of each input file from which ou
Community Discussions
Trending Discussions on explainshell
QUESTION
When you type a shell command in https://explainshell.com/ , you get an explanation of each part of the command and what the command does.
Is there a place where I could type in a bunch of x86 bytecode, and have it paresed byte by byte (and perhaps bit by bit for certain bytes) and explained similarly?
...ANSWER
Answered 2020-Apr-16 at 19:07Disassemblers will decode whole instructions back into asm. Some will group the bytes into prefixes, opcode, and later stuff. e.g. a 4-byte immediate or displacement in an addressing mode might be grouped without spaces, but separated from the opcode by a space.
Agner Fog's objconv disassembler does that. https://www.agner.org/optimize/#objconv
e.g. on a random .o
file I had lying around from a recent SO question about x87 flags. Note that it's a .o
so the addresses are based at 0
in each section.
More importantly, not how fld dword [value1]
's machine code is show as D9
(the opcode), 05
(the ModRM byte that encodes the addressing mode and in this case signals that there's a 4-byte displacement), and the 00000000
with a (d) note showing the 4-byte disp32
.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install explainshell
You can use explainshell like any standard Python library. You will need to make sure that you have a development environment consisting of a Python distribution including header files, a compiler, pip, and git installed. Make sure that your pip, setuptools, and wheel are up to date. When using pip it is generally recommended to install packages in a virtual environment to avoid changes to the system.
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page