Documentation
Debug: No exact match found
Debug: Found parent match: Linux
Linux/Programs/VIM
🔍
        • Backups
        • Hardening
        • Signing
      • Podman
      • Code Signing
      • Github Actions
      • Open Policy Agent
      • Teraform
      • Teraform-AWS
      • Terragrunt
      • Vercel
      • index
        • Cisco_IOS
        • Onsense
        • RouterOS
        • VyOS
        • Wifi
      • BGP
      • DNS
      • Networks
      • ATProto
      • Anonymity
      • Distributed IDenity
      • Privacy
      • Backups
      • SSO
      • Smart Home
      • Throttling
      • Active Directory
      • Anti Virus
      • Making a Lab
      • System Admistration
      • Windows Hardning
    • Containers
    • DNS
    • GPG
    • Hardening Linux
    • Hardening macOS
    • IDS
    • Reverse Proxy
    • Secure Boot
    • Self Hosted
    • Speed Test
    • Systems Design
    • Threat Modeling
    • VPN
    • Wireguard
      • CircleCI
      • Github Actions
      • Gitlab
      • Jenkins
      • TravisCI
      • Checkmarx
      • CodeQL
      • Fortify
      • Semgrep
      • Docker
      • Nginx
      • Teraform
      • Git
      • Vulnerability Classifications
    • Bash
    • C
    • Dart
    • Falsehoods
    • Flash
    • Go
    • JS
    • Java
    • Jira
    • Nodejs
    • Numbers
    • Objective C
    • PHP
    • Perl
    • Python
    • Ruby
    • Rust
    • Scanning Code
    • Setup
    • Smart Contracts
    • Swift
    • Vulnerabilites
        • Montgomery Curves
        • Short Weierstrass Curves
        • Twisted Edwards Curves
      • ECC
      • ElGamal
      • GGH
      • Hamming Quasi-Cyclic (HQC)
      • RSA
        • Commands
        • ERC
        • EVM
        • Ethereum
        • Ethernaut
        • Name Service
        • Storage
        • Testing
        • Addresses
        • Fuzzing
        • NFT
        • Smart Contract Scanning
        • Solidity Vulnerabilities
      • Avalanche
      • Bitcoin
      • Botting
      • Contracts
      • DeFi
      • Index
      • Keys
      • Solana
      • Trading
      • BCrypt
      • Blake
      • Blake2
      • Blake3
      • GHASH
      • Gimli
      • Hash Extention
      • MD2
      • MD4
      • MD5
      • RIPEMD
      • Rumba20
      • SHA1
      • SHA2
      • SHA3
      • Whirlpool
      • Argon2
      • Double Ratchet
      • Feldman’s Verifiable Secret Sharing
      • HKDF
      • PBKDF1
      • PBKDF2
      • Scrypt
      • Shamir's Secret Sharing
        • CPace
        • Dragonfly
        • JPAKE
        • OPAQUE
        • PAKE
        • SIGMA
        • Secure Remote Password Protocol
      • CECPQ1
      • CECPQ2
      • Diffie-Hellman
      • Elliptic Curve Diffie Hellman
      • Elliptic-Curve Menezes-Qu-Vanstone
      • Fully Hashed Menezes-Qu-Vanstone
      • HQC
      • Kyber
      • PQXDH
      • RSA-KEM
      • Superingular Isgeny Diffie-Hellman.md
      • X3DH
      • CBC-MAC
      • GMAC
      • HMAC
      • KMAC
      • OMAC
      • Poly1305
      • SipHash
      • UMAC
      • VMAC
      • cmac
      • Key Rotation
      • MLS Protocol
      • Blum Blum Shub
      • COMP128
      • Dual_EC_DRBG
      • LSFR
      • Linear Congruential Generator
      • Mersenne Twister
      • Yarrow
      • Blind Signatures
      • DKIM
      • DSA
      • Dilithium
      • ECDSA
      • EdDSA
      • FALCON
      • Multi Party Computation
      • Picnic
      • RSA
      • SPHINCS+
      • Schorr Signature
      • Unbalanced Oil and Vinegar
      • XEdDSA
        • CBC
        • CCM
        • CFB
        • CTR
        • ECB
        • GCM
        • GCM-SIV
        • OCB
        • OFB
        • SIV
        • XTS
      • AES
      • Block Ciphers
      • Blowfish
      • Camellia
      • DES
      • IDEA
      • RC4
      • RC6
      • Salsa_ChaCha
      • Serpent
      • TEA
      • Twofish
      • HVZK
      • Multi-party Computation
      • Schnorr’s identification protocol
    • CRC
    • Certificates
    • Crypto
    • Crypto_ASD
    • HSM
    • Hashes
    • Homomorphic Encryption
    • Lattices
    • Math
    • OTP
    • Padding
    • Passwords
    • Post Quantum
    • Programing
    • Secure Messaging
    • Yubikey
    • Zero Knowledge Proofs
    • Zip Plaintext Attack
      • CPU Cache
      • Cross Talk
      • Spectre
      • CVE-2019-5736
      • CVE-2020-1350 SIGRed
      • CVE-2021-22555
      • CVE-2021-38001
      • CVE-2021–34527 (PrintNightmare)
      • CVE-2022-21894
      • CVE-2022-34918
      • CVE-2024-20017
      • Creating Exploits
      • Integer Overflows
      • Malware
      • Return Address Spoofing
      • Windows
      • Windows Process Injection
      • AFL
      • honggfuzz
      • libfuzzer
      • CTmalloc
      • Double Free
      • Heap Exploitation
      • Heap Grooming
      • Jemalloc
      • Magazine Malloc
      • Ptmalloc
      • Tcmalloc
      • Use After Free
      • dlmalloc
      • 32bit
      • 64bit
      • ASLR
      • Memory Corruption
      • Virtual Addresses
      • BufferOverflows
      • Cookie
      • Ret2Libc
      • Return2
      • Stack
    • ARM
    • Cars
    • Consoles
    • Exploits
    • Fuzzing
    • GDB
    • Javascript_Exploits
    • LLDB
    • Malware
    • Reverse_Shells
    • Rootkits
    • Routers
    • Smart Contract Hacks
    • UEFI
      • Components
      • Control Pins
      • Filters
      • Gates
      • Motors
      • PCB Design
      • Power Supply
      • Telecommunication
      • Transistor
      • ESP32
      • Fault Injection
      • Glitching
      • Bootloader
      • ESP32
      • Microcontrollers
        • RasPi
      • 1-Wire
      • I2C
      • ICSP
      • JTAG
      • SPI
      • SWD
      • UART
        • ASK CST
        • Calypso
        • CryptoRF
        • EMV
        • FeliCa
        • HID iClass
        • ICODE
        • Legic Prime
        • MIFARE Classic
        • MIFARE DESFire
        • MIFARE Plus
        • MIFARE Ultralight
        • MIFARE Ultralight C
        • NFC
        • NXP
        • PIV
        • Tagit
        • Topaz
        • EM
        • HID
        • HITAG
        • Q5B
        • T5557
        • T5577
        • TK5551
        • EM4100 Protocol
        • HDX Animal Identification Protocol
        • ISO14443
        • ISO15693
        • Reader&Writer
        • Transcore
        • UHF Cards
      • Active Types
      • HID
      • Hardware
      • Passive Types
      • Passport
      • Protocols
      • Proxmark
      • Airport Signals
      • Communication Signals
      • GPS
      • Satellite
    • Antennas
    • Batteries
    • BusPirate
    • CPUs
    • Firmware
    • FlipperZero
    • Hardware
    • LimeSDR
    • Memory_types
    • Over the Air Updates
    • PSVita
    • Projects
    • Protocols
    • Raspberry Pi
    • SDR
    • Security
    • Side Channel Anaylsis
    • Solar Pannels
      • Debugging
      • From Scratch
      • IO Uring
      • SECCOMP
      • SysRq
      • 7z
      • Alacritty
      • Ansible
      • Bash
      • Docker
      • FFMpeg
      • GCC
      • GPG
      • Goaccess
      • Grep
      • Haproxy
      • Journalctl
      • KExec
      • Kubernetes
      • Network
      • Nginx
      • OBS
      • OpenSSL
      • Pacman
      • Qemu
      • Rsync
      • SED
      • SSH
      • Strings
      • Tmux
      • Trace
      • VIM
      • VSCode
      • Valgrind
      • Xargs
      • ZFS
      • binwalk
      • fwupd
      • git
      • keepassxc
      • Cryptenroll
      • Cryptsetup
      • NSpawn
      • Podman
      • Services
      • Timers
      • udev
    • Aliases
    • ArchLinux
    • Booting
    • Customization
    • Distros
    • Install Arch
    • Internals
    • KVM
    • Kernel
    • NixOS
    • Shadow File
    • TOCTOU
    • Tunneling
    • Window Managers
      • APKs
      • Android
      • Android Platform
      • Application Components
      • Build form Source
      • Certificate Pinning
      • Emulator
      • Flashing Image
      • Flutter
      • Frida
      • Objection
      • Rooting
      • Safety Net
      • Storage
      • TrustZone
      • WebViews
      • Work Mode
      • Xamarin
      • Xposed
        • Insecure Data Storage
      • Corellium
      • IPA
      • Jailbreaking
      • Kernel
      • Runtime Hooking
      • Setting up Devices
      • Swift
      • Tools
      • Virtualization
      • iOS
      • iOS Hooking
    • Android_Findings
    • Android_TestCases
    • Container_Checklist
    • Container_Findings
    • Findings
    • Programs
    • Sim
    • Third Parties
    • iOS_Findings
    • iOS_TestCases
      • Colima
    • Airdrop
    • Airtag
    • Command Line
    • Internals
    • Kernel Debugging
    • Keychain
    • M1
    • Programs
    • XNU Training
    • iMessage
      • Bloom Filter
      • Garbage Collection
      • LZSS
      • Linear interpolation
      • Skip list
    • Algorithms
    • Assembly
    • Bash Programing
    • C
    • CSS
    • Databases
    • Excel
    • Foundery
    • Frontend
    • Game Development
    • Go Lang
    • Javascript
    • Networking
    • Notes on Tak AI
    • Programing
    • Python
    • Rust
    • TypeScript
    • Web Assembly
      • Electron Applications
      • MSFVenom
      • Metasploit
      • Ports and Exploits
      • Sliver
      • Keys
      • Locks
      • Containers
      • Data Exfiltration
      • Exfiltration
      • Linux
      • Linux_privexc
      • Mac
      • Memory Analysis
      • Post Exploitation
      • Privlege Esclation
      • Sensitive Files
      • Windows
        • DNS Recon
        • DoH
        • Domain Squatting
        • Hostile Subdomain Takeover
        • Emails
        • History
        • IP
        • Misc
        • Money
        • Phisical
        • Photos
        • Social Media
      • Dumps
      • Recon
      • Brute Forcing
      • IPV6
      • Scanning
      • Databases
      • Office 365 and Outlook
      • SIP
      • SMB
      • SMTP
      • SSH
        • WPA
        • WPA2
        • WPA3
      • 802.11
      • 802.11ah
      • Airgeddon
      • OWE
      • OpenWrt
      • PPSK
      • SAE
      • WEP
      • WPA Enterprise
      • WPS
      • Wifi
      • Wifi Attacks
    • Internal Penetration Testing Guide
    • Nat Punching
    • OSCP
    • OSI
    • Phishing
    • Physical Security
    • Proxying
    • Red teaming
    • Responder
    • SMB
    • TCPDump
    • VLAN Hopping
      • Binary Ninja
      • Games
      • Ghidra
      • Go Lang
      • IDA Pro
      • WinDbg
      • r2
      • Audio
      • BSON
      • BZIP2
      • C++
      • Certificates
      • DRM
      • Date and Time
      • Dot Net
      • ELF
      • EXT4
      • Emails
      • Flash
      • Fonts
      • G Code
      • Ghidra
      • GoLang
      • Java
      • Java Classes
      • PNG
      • PRG
      • Pkpass
      • Radare2
      • Rosetta 2
      • Sqlite DB
      • Windows PE
      • openssl
        • 4G LTE mobile hotspot
        • ESP32
        • HDD
        • Starlink
        • USB Mouse
        • hi3815 IP Camera
      • Automotive
      • Braudcom
      • Canon Camera
      • D-Link DIR3060
      • Emulating
      • Intel Hex
      • Motorola S-Record
      • NVRAM
      • RAW Nand Flash
      • STM32s
      • Samsung S10 TEEGRIS
      • TP-Link HS110
      • UEFI
      • Unknown Microcontrollers
      • ti-txt
      • BGP
      • Bittorrent
      • CAN Bus
      • DHCP
      • DNS
      • Discord
      • GPS
      • Garage Doors
      • IrDA
      • Mdns
      • Misc
      • NTMLSSP
      • Network
      • Noise Protocol
      • Protobuf
      • RLPx Transport Protocol
      • Rolling Codes
      • SS7
      • TURN Protocol
      • WWV
      • WhatsApp
      • Mag Stripe
      • NFC
      • RFID Gen2
      • RFID Gen2v2
        • Bluetooth
        • Bluetooth Low Energy
        • Govee_lights
        • ble_ctf
      • 802.15.4
      • Display Port
      • Falcon 9
      • GNURadio
      • IQ
      • IR
      • LORA
      • RF Time Sync
      • SDQ
      • SigFox
      • Signals
      • TETRA
      • Telecommunication
      • USB
      • Zigbee
    • ARM
    • Assembly
    • Bar Codes
    • Disassembly
    • Dynamic Analysis
    • File
    • File Formats
    • Firmware
    • Game Hacking
    • JavaScript
    • Malware Analysis
    • MicroControlers
    • Patch Analysis
    • QRCodes
    • RISC-V
    • Stenography
    • x86
      • 2FA
      • Auth
      • CWT
      • FIDO
      • JWT
      • OAuth
      • Oauth2
      • OpenID
      • OpenID Connect
      • SAML
      • SOAP
      • WebAuthn
      • Drupal
      • WAF Bypass
      • Wordpress
          • EC2
          • ECS
          • EKS
          • Elastic Beanstalk
          • Fargate
          • Lambda
          • Lightsail
          • DynamoDB
          • Kinesis
          • RDS
          • Gateways
          • ACM
          • Cloud HSM
          • IAM
          • KMS
          • Secrets Manager
          • EBS
          • ECR
          • EFS
          • S3
        • AWS
        • CloudTrail
        • Nitro Enclave
        • SES
        • SNS
        • SQS
        • Azure
        • GCP
        • Secrets
        • Storage Bucket
      • AWS
      • Cloud
      • Cloudflare
      • Privlage Escaltion
      • C# Deserialization
      • Java Deserialization
      • Node JS Deseralization
      • PHP Deseralziation
      • Python Deseralization
      • Ruby Deserialization
      • View State
      • Images
      • PDF
      • Php
          • MongoDB
          • Redis
        • GraphQL
        • Hibernation
        • LDAP
        • Memcache
        • MongoDB
        • MySQL
        • Neo4j
        • NoSQL
        • Oracle Database
        • Postgres
        • SQL_Injection
        • ESI
        • External Entity XML Injection
        • Internal Entity XML Injection
        • XSLT Injection
        • XSS
        • YAML
      • Command Injection
      • Header_Injection
      • Injection
      • JSON
      • Object-Graph Navigation Language Injection
      • Pickle
      • Request Smuggling
      • SSI
      • Template Injection
      • View State
      • XPATH
      • Reverse Proxy
      • Testing Proxies
      • SSRF
      • cloud-metadata
      • CSRF
      • Content Security Policy
      • Cookies
      • Server-Sent-Events
      • Web Hooks
      • Web Sockets
      • WebRTC
      • WebTransport
      • Well-known
      • postMessage
    • API Testing
    • Automated Web Scanning
    • Botting
    • Browser Exploits
    • Cache
    • DoS
    • Exploits
    • File Upload
    • HTTP Headers
    • Javascript
    • Local File Inclusion
    • PHP htaccess
    • Parameter Exploits
    • Race Conditions
    • SSL
    • Web Scanning
      • Dumping Passwords
      • Hash Types
      • Kerberos
      • Tokens
      • Debugging
      • Drivers
      • Exploitation
      • Hyper-V Security
      • Logs
      • Memory
      • Named Pipes
      • Processes
      • Bypass the PowerShell Execution Policy
      • CMD Commands
      • Powershell Commands
      • Powersploit
      • Photoshop
      • Remote Connections
    • Active Directory
    • AntiVirus Bypass
    • Applock Bypass
    • Autorun Locations
    • Bitlocker
    • Empire
    • Native Binary Tricks
    • Registry
    • UAC Bypass
    • Windows
  • Hacking Pratice
  • index
  • test

Link to this headingVIM

Link to this headingVim

Vim Plugins:
Hyperfocus-writing in Vim.
Markdown Vim Mode

Link to this headingText manipulation

Sort:

:sort

Uniq:

:sort u

Replace all trailing slashes:

:%s,/$,,g

Link to this headingNVIM

neovim

Plugins:
Neovim as a Cursor AI IDE
Is a highly extendable fuzzy finder over lists.

On this page

  • VIM
  • Vim
  • Text manipulation
  • NVIM
Last modified: 12 hours ago