a bundle of *nix utilities

Main site: BusyBox

busybox is a single execcutable for the most commonly used *nix executables, intended for embedded systems and are minimal implementations. Check the options

Links in /bin or /usr/bin point to the busybox executable. It uses the invoking name to determine which applet to execute.

It is compile time configurable to include only specific modules.

This is an attempt to document the ones included in the omega distribution for the Onion.io

This list was created by listing /bin and /usr/bin and editing it with respect to the links to busybox Not all are busybox.

/bin : 

204             board_detect
9481             config_generate
1550             ipcalc.sh
91768             opkg
                rbash, bash
12328             ubus
12328             uclient-fetch
       wget, uclient-fetch
       ash,cat, chgrp, chmod, chown,
       cp, date, dd, df, dmesg, echo, egrep, false, fgrep, fsync, grep, gunzip, gzip,
       kill, ln, lock, login, ls, mkdir, mknod, mktemp, mount, mv, netmsg, netstat, nice,
       pidof, ping, ping6, ps, pwd,
       rm, rmdir, sed, sh, sleep, sync, tar, touch, true,
       umount, uname, vi, zcat

/usr/bin > 
[, [[, awk, basename, bunzip2, bzcat, clear, cmp, crontab, cut, dirname, du, env, expr, find, free, head, tail, less, hexdump, id, 
killall, logger, md5sum, mkfifo, nc, nslookup, passwd, pgrep, printf, readlink, reset, 
seq, sha256sum, sort, tee, test, time, top, tr, traceroute, traceroute6, uniq, uptime, wc, which, xargs, yes, 

    212 aps
   6327 console-install-tool
    16 dbclient    -> ../sbin/dropbear
    16 dropbearkey -> ../sbin/dropbear
   1527 expled              8232 fwtool             4120 getrandom              4120 gpioctl
     26 ia                 12423 iwinfo             8232 jshn                  16504 jsonfilter
        ldd -> ../../lib/libc.so
   2102 node-red-install-tool                          28 nr                    8267 omega2-ctrl
   2341 onion-cloud        7862 oupgrade
 237976 rsync
    16 scp -> ../sbin/dropbear
     5 signify -> usign
   8360 spi-config          4216 spi-pipe
    16 ssh -> ../sbin/dropbear
    552 updateHostname     24600 usign           352072 vim                      23 vn
     24 vw
     8 wget -> wget-ssl
 361496 wget-ssl         11553 wifimanager     20759 wifisetup 

These are the ones found on the Verizon Fios-G1100 router as of 7/25/20.

BusyBox v1.28.3 (2019-05-28 02:46:45 UTC)
/bin : ash bash curl date dnsdomainname egrep fgrep grep gunzip gzip ls pwd sh tar zcat
/usr/bin: [ [[ cksum head less md5sum mkpasswd nslookup sha1sum sha256sum sha512sum sum tail
/sbin: poweroff reboot


syslogd [-nSLD] -o file][-l l,][-s kb][-b n][-C kb] [-R remoteHost[:port]]

System logging utilies

        -R HOST[:PORT]  Log to IP or hostname on PORT (default PORT=514/UDP)
        -n              Run in foreground, useful for debugging.
        -O FILE         Log to given file (default:/var/log/messages)
        -l n            Set local log level
        -S              Smaller logging output
        -s SIZE         Max size (KB) before rotate (default:200KB, 0=off)
        -b NUM          Number of rotated logs to keep (default:1, max=99, 0=purge)
        -L              Log locally and via network (default is network only if -R)
        -D              Drop duplicates
        -C[size(KiB)]   Log to shared mem buffer (read it using logread)
Note that this version of syslogd ignores /etc/syslog.conf.

Used by crond, ftpd, ifplugd, modprobe, nameif (local0),

logread [-f] Show messages in syslogd's circular buffer, with -f Output data as log grows

How to get SYSLOG host from DHCP?


Network Cat open a connection and listen or converse with ANY port/protocol

nc [OPTIONS] HOST PORT # connect
nc [OPTIONS] -l -p PORT [HOST] [PORT] # listen
 -u       UDP mode                                     -v       Verbose
 -l       Listen mode, for inbound connects             -n       Don't do DNS resolution
 -e PROG  Run PROG after connect (must be last)
 -s ADDR  Local address                                -p PORT  Local port
 -w SEC   Timeout for connects and final net reads  -i SEC   Delay interval for lines sent
 -o FILE  Hex dump traffic
 -z       Zero-I/O mode (scanning)
Data to STDIN is sent to the host and the response is output to stdout.