{"id":"fa9bdbec-3b1e-4eec-92c9-ef5dbb10a6fb","shortId":"9bfyff","kind":"skill","title":"linux-shell-scripting","tagline":"Provide production-ready shell script templates for common Linux system administration tasks including backups, monitoring, user management, log analysis, and automation. These scripts serve as building blocks for security operations and penetration testing environments.","description":"# Linux Production Shell Scripts\n\n## Purpose\n\nProvide production-ready shell script templates for common Linux system administration tasks including backups, monitoring, user management, log analysis, and automation. These scripts serve as building blocks for security operations and penetration testing environments.\n\n## Prerequisites\n\n### Required Environment\n- Linux/Unix system (bash shell)\n- Appropriate permissions for tasks\n- Required utilities installed (rsync, openssl, etc.)\n\n### Required Knowledge\n- Basic bash scripting\n- Linux file system structure\n- System administration concepts\n\n## Outputs and Deliverables\n\n1. **Backup Solutions** - Automated file and database backups\n2. **Monitoring Scripts** - Resource usage tracking\n3. **Automation Tools** - Scheduled task execution\n4. **Security Scripts** - Password management, encryption\n\n## Core Workflow\n\n### Phase 1: File Backup Scripts\n\n**Basic Directory Backup**\n```bash\n#!/bin/bash\nbackup_dir=\"/path/to/backup\"\nsource_dir=\"/path/to/source\"\n\n# Create a timestamped backup of the source directory\ntar -czf \"$backup_dir/backup_$(date +%Y%m%d_%H%M%S).tar.gz\" \"$source_dir\"\necho \"Backup completed: backup_$(date +%Y%m%d_%H%M%S).tar.gz\"\n```\n\n**Remote Server Backup**\n```bash\n#!/bin/bash\nsource_dir=\"/path/to/source\"\nremote_server=\"user@remoteserver:/path/to/backup\"\n\n# Backup files/directories to a remote server using rsync\nrsync -avz --progress \"$source_dir\" \"$remote_server\"\necho \"Files backed up to remote server.\"\n```\n\n**Backup Rotation Script**\n```bash\n#!/bin/bash\nbackup_dir=\"/path/to/backups\"\nmax_backups=5\n\n# Rotate backups by deleting the oldest if more than max_backups\nwhile [ $(ls -1 \"$backup_dir\" | wc -l) -gt \"$max_backups\" ]; do\n    oldest_backup=$(ls -1t \"$backup_dir\" | tail -n 1)\n    rm -r \"$backup_dir/$oldest_backup\"\n    echo \"Removed old backup: $oldest_backup\"\ndone\necho \"Backup rotation completed.\"\n```\n\n**Database Backup Script**\n```bash\n#!/bin/bash\ndatabase_name=\"your_database\"\ndb_user=\"username\"\ndb_pass=\"password\"\noutput_file=\"database_backup_$(date +%Y%m%d).sql\"\n\n# Perform database backup using mysqldump\nmysqldump -u \"$db_user\" -p\"$db_pass\" \"$database_name\" > \"$output_file\"\ngzip \"$output_file\"\necho \"Database backup created: $output_file.gz\"\n```\n\n### Phase 2: System Monitoring Scripts\n\n**CPU Usage Monitor**\n```bash\n#!/bin/bash\nthreshold=90\n\n# Monitor CPU usage and trigger alert if threshold exceeded\ncpu_usage=$(top -bn1 | grep \"Cpu(s)\" | awk '{print $2}' | cut -d. -f1)\n\nif [ \"$cpu_usage\" -gt \"$threshold\" ]; then\n    echo \"ALERT: High CPU usage detected: $cpu_usage%\"\n    # Add notification logic (email, slack, etc.)\n    # mail -s \"CPU Alert\" admin@example.com <<< \"CPU usage: $cpu_usage%\"\nfi\n```\n\n**Disk Space Monitor**\n```bash\n#!/bin/bash\nthreshold=90\npartition=\"/dev/sda1\"\n\n# Monitor disk usage and trigger alert if threshold exceeded\ndisk_usage=$(df -h | grep \"$partition\" | awk '{print $5}' | cut -d% -f1)\n\nif [ \"$disk_usage\" -gt \"$threshold\" ]; then\n    echo \"ALERT: High disk usage detected: $disk_usage%\"\n    # Add alert/notification logic here\nfi\n```\n\n**CPU Usage Logger**\n```bash\n#!/bin/bash\noutput_file=\"cpu_usage_log.txt\"\n\n# Log current CPU usage to a file with timestamp\ntimestamp=$(date '+%Y-%m-%d %H:%M:%S')\ncpu_usage=$(top -bn1 | grep 'Cpu(s)' | awk '{print $2}' | cut -d. -f1)\necho \"$timestamp - CPU Usage: $cpu_usage%\" >> \"$output_file\"\necho \"CPU usage logged.\"\n```\n\n**System Health Check**\n```bash\n#!/bin/bash\noutput_file=\"system_health_check.txt\"\n\n# Perform system health check and save results to a file\n{\n    echo \"System Health Check - $(date)\"\n    echo \"================================\"\n    echo \"\"\n    echo \"Uptime:\"\n    uptime\n    echo \"\"\n    echo \"Load Average:\"\n    cat /proc/loadavg\n    echo \"\"\n    echo \"Memory Usage:\"\n    free -h\n    echo \"\"\n    echo \"Disk Usage:\"\n    df -h\n    echo \"\"\n    echo \"Top Processes:\"\n    ps aux --sort=-%cpu | head -10\n} > \"$output_file\"\n\necho \"System health check saved to $output_file\"\n```\n\n### Phase 3: User Management Scripts\n\n**User Account Creation**\n```bash\n#!/bin/bash\nusername=\"newuser\"\n\n# Check if user exists; if not, create new user\nif id \"$username\" &>/dev/null; then\n    echo \"User $username already exists.\"\nelse\n    useradd -m -s /bin/bash \"$username\"\n    echo \"User $username created.\"\n    \n    # Set password interactively\n    passwd \"$username\"\nfi\n```\n\n**Password Expiry Checker**\n```bash\n#!/bin/bash\noutput_file=\"password_expiry_report.txt\"\n\n# Check password expiry for users with bash shell\necho \"Password Expiry Report - $(date)\" > \"$output_file\"\necho \"=================================\" >> \"$output_file\"\n\nIFS=$'\\n'\nfor user in $(grep \"/bin/bash\" /etc/passwd | cut -d: -f1); do\n    password_expires=$(chage -l \"$user\" 2>/dev/null | grep \"Password expires\" | awk -F: '{print $2}')\n    echo \"User: $user - Password Expires: $password_expires\" >> \"$output_file\"\ndone\nunset IFS\n\necho \"Password expiry report saved to $output_file\"\n```\n\n### Phase 4: Security Scripts\n\n**Password Generator**\n```bash\n#!/bin/bash\nlength=${1:-16}\n\n# Generate a random password\npassword=$(openssl rand -base64 48 | tr -dc 'a-zA-Z0-9!@#$%^&*' | head -c\"$length\")\necho \"Generated password: $password\"\n```\n\n**File Encryption Script**\n```bash\n#!/bin/bash\nfile=\"$1\"\naction=\"${2:-encrypt}\"\n\nif [ -z \"$file\" ]; then\n    echo \"Usage: $0 <file> [encrypt|decrypt]\"\n    exit 1\nfi\n\nif [ \"$action\" == \"encrypt\" ]; then\n    # Encrypt file using AES-256-CBC\n    openssl enc -aes-256-cbc -salt -pbkdf2 -in \"$file\" -out \"$file.enc\"\n    echo \"File encrypted: $file.enc\"\nelif [ \"$action\" == \"decrypt\" ]; then\n    # Decrypt file\n    output_file=\"${file%.enc}\"\n    openssl enc -aes-256-cbc -d -pbkdf2 -in \"$file\" -out \"$output_file\"\n    echo \"File decrypted: $output_file\"\nfi\n```\n\n### Phase 5: Log Analysis Scripts\n\n**Error Log Extractor**\n```bash\n#!/bin/bash\nlogfile=\"${1:-/var/log/syslog}\"\noutput_file=\"error_log_$(date +%Y%m%d).txt\"\n\n# Extract lines with \"ERROR\" from the log file\ngrep -i \"error\\|fail\\|critical\" \"$logfile\" > \"$output_file\"\necho \"Error log created: $output_file\"\necho \"Total errors found: $(wc -l < \"$output_file\")\"\n```\n\n**Web Server Log Analyzer**\n```bash\n#!/bin/bash\nlog_file=\"${1:-/var/log/apache2/access.log}\"\n\necho \"Web Server Log Analysis\"\necho \"========================\"\necho \"\"\necho \"Top 10 IP Addresses:\"\nawk '{print $1}' \"$log_file\" | sort | uniq -c | sort -rn | head -10\necho \"\"\necho \"Top 10 Requested URLs:\"\nawk '{print $7}' \"$log_file\" | sort | uniq -c | sort -rn | head -10\necho \"\"\necho \"HTTP Status Code Distribution:\"\nawk '{print $9}' \"$log_file\" | sort | uniq -c | sort -rn\n```\n\n### Phase 6: Network Scripts\n\n**Network Connectivity Checker**\n```bash\n#!/bin/bash\nhosts=(\"8.8.8.8\" \"1.1.1.1\" \"google.com\")\n\necho \"Network Connectivity Check\"\necho \"==========================\"\n\nfor host in \"${hosts[@]}\"; do\n    if ping -c 1 -W 2 \"$host\" &>/dev/null; then\n        echo \"[UP] $host is reachable\"\n    else\n        echo \"[DOWN] $host is unreachable\"\n    fi\ndone\n```\n\n**Website Uptime Checker**\n```bash\n#!/bin/bash\nwebsites=(\"https://google.com\" \"https://github.com\")\nlog_file=\"uptime_log.txt\"\n\necho \"Website Uptime Check - $(date)\" >> \"$log_file\"\n\nfor website in \"${websites[@]}\"; do\n    if curl --output /dev/null --silent --head --fail --max-time 10 \"$website\"; then\n        echo \"[UP] $website is accessible\" | tee -a \"$log_file\"\n    else\n        echo \"[DOWN] $website is inaccessible\" | tee -a \"$log_file\"\n    fi\ndone\n```\n\n**Network Interface Info**\n```bash\n#!/bin/bash\ninterface=\"${1:-eth0}\"\n\necho \"Network Interface Information: $interface\"\necho \"=========================================\"\nip addr show \"$interface\" 2>/dev/null || ifconfig \"$interface\" 2>/dev/null\necho \"\"\necho \"Routing Table:\"\nip route | grep \"$interface\"\n```\n\n### Phase 7: Automation Scripts\n\n**Automated Package Installation**\n```bash\n#!/bin/bash\npackages=(\"vim\" \"htop\" \"curl\" \"wget\" \"git\")\n\necho \"Installing packages...\"\n\nfor package in \"${packages[@]}\"; do\n    if dpkg -l | grep -q \"^ii  $package\"; then\n        echo \"[SKIP] $package is already installed\"\n    else\n        sudo apt-get install -y \"$package\"\n        echo \"[INSTALLED] $package\"\n    fi\ndone\n\necho \"Package installation completed.\"\n```\n\n**Task Scheduler (Cron Setup)**\n```bash\n#!/bin/bash\nscheduled_task=\"/path/to/your_script.sh\"\nschedule_time=\"0 2 * * *\"  # Run at 2 AM daily\n\n# Add task to crontab\n(crontab -l 2>/dev/null; echo \"$schedule_time $scheduled_task\") | crontab -\necho \"Task scheduled: $schedule_time $scheduled_task\"\n```\n\n**Service Restart Script**\n```bash\n#!/bin/bash\nservice_name=\"${1:-apache2}\"\n\n# Restart a specified service\nif systemctl is-active --quiet \"$service_name\"; then\n    echo \"Restarting $service_name...\"\n    sudo systemctl restart \"$service_name\"\n    echo \"Service $service_name restarted.\"\nelse\n    echo \"Service $service_name is not running. Starting...\"\n    sudo systemctl start \"$service_name\"\n    echo \"Service $service_name started.\"\nfi\n```\n\n### Phase 8: File Operations\n\n**Directory Synchronization**\n```bash\n#!/bin/bash\nsource_dir=\"/path/to/source\"\ndestination_dir=\"/path/to/destination\"\n\n# Synchronize directories using rsync\nrsync -avz --delete \"$source_dir/\" \"$destination_dir/\"\necho \"Directories synchronized successfully.\"\n```\n\n**Data Cleanup Script**\n```bash\n#!/bin/bash\ndirectory=\"${1:-/tmp}\"\ndays=\"${2:-7}\"\n\necho \"Cleaning files older than $days days in $directory\"\n\n# Remove files older than specified days\nfind \"$directory\" -type f -mtime +\"$days\" -exec rm -v {} \\;\necho \"Cleanup completed.\"\n```\n\n**Folder Size Checker**\n```bash\n#!/bin/bash\nfolder_path=\"${1:-.}\"\n\necho \"Folder Size Analysis: $folder_path\"\necho \"====================================\"\n\n# Display sizes of subdirectories sorted by size\ndu -sh \"$folder_path\"/* 2>/dev/null | sort -rh | head -20\necho \"\"\necho \"Total size:\"\ndu -sh \"$folder_path\"\n```\n\n### Phase 9: System Information\n\n**System Info Collector**\n```bash\n#!/bin/bash\noutput_file=\"system_info_$(hostname)_$(date +%Y%m%d).txt\"\n\n{\n    echo \"System Information Report\"\n    echo \"Generated: $(date)\"\n    echo \"=========================\"\n    echo \"\"\n    echo \"Hostname: $(hostname)\"\n    echo \"OS: $(uname -a)\"\n    echo \"\"\n    echo \"CPU Info:\"\n    lscpu | grep -E \"Model name|CPU\\(s\\)|Thread\"\n    echo \"\"\n    echo \"Memory:\"\n    free -h\n    echo \"\"\n    echo \"Disk Space:\"\n    df -h\n    echo \"\"\n    echo \"Network Interfaces:\"\n    ip -br addr\n    echo \"\"\n    echo \"Logged In Users:\"\n    who\n} > \"$output_file\"\n\necho \"System info saved to $output_file\"\n```\n\n### Phase 10: Git and Development\n\n**Git Repository Updater**\n```bash\n#!/bin/bash\ngit_repos=(\"/path/to/repo1\" \"/path/to/repo2\")\n\nfor repo in \"${git_repos[@]}\"; do\n    if [ -d \"$repo/.git\" ]; then\n        echo \"Updating repository: $repo\"\n        cd \"$repo\"\n        git fetch --all\n        git pull origin \"$(git branch --show-current)\"\n        echo \"Updated: $repo\"\n    else\n        echo \"Not a git repository: $repo\"\n    fi\ndone\n\necho \"All repositories updated.\"\n```\n\n**Remote Script Execution**\n```bash\n#!/bin/bash\nremote_server=\"${1:-user@remote-server}\"\nremote_script=\"${2:-/path/to/remote/script.sh}\"\n\n# Execute a script on a remote server via SSH\nssh \"$remote_server\" \"bash -s\" < \"$remote_script\"\necho \"Remote script executed on $remote_server\"\n```\n\n## Quick Reference\n\n### Common Script Patterns\n\n| Pattern | Purpose |\n|---------|---------|\n| `#!/bin/bash` | Shebang for bash |\n| `$(date +%Y%m%d)` | Date formatting |\n| `$((expression))` | Arithmetic |\n| `${var:-default}` | Default value |\n| `\"$@\"` | All arguments |\n\n### Useful Commands\n\n| Command | Purpose |\n|---------|---------|\n| `chmod +x script.sh` | Make executable |\n| `./script.sh` | Run script |\n| `nohup ./script.sh &` | Run in background |\n| `crontab -e` | Edit cron jobs |\n| `source script.sh` | Run in current shell |\n\n### Cron Format\nMinute(0-59) Hour(0-23) Day(1-31) Month(1-12) Weekday(0-7, 0/7=Sun)\n\n## Constraints and Limitations\n\n- Always test scripts in non-production first\n- Use absolute paths to avoid errors\n- Quote variables to handle spaces properly\n- Many scripts require root/sudo privileges\n- Use `bash -x script.sh` for debugging\n\n## When to Use\nThis skill is applicable to execute the workflow or actions described in the overview.","tags":["linux","shell","scripting","antigravity","awesome","skills","sickn33","agent-skills","agentic-skills","ai-agent-skills","ai-agents","ai-coding"],"capabilities":["skill","source-sickn33","skill-linux-shell-scripting","topic-agent-skills","topic-agentic-skills","topic-ai-agent-skills","topic-ai-agents","topic-ai-coding","topic-ai-workflows","topic-antigravity","topic-antigravity-skills","topic-claude-code","topic-claude-code-skills","topic-codex-cli","topic-codex-skills"],"categories":["antigravity-awesome-skills"],"synonyms":[],"warnings":[],"endpointUrl":"https://skills.sh/sickn33/antigravity-awesome-skills/linux-shell-scripting","protocol":"skill","transport":"skills-sh","auth":{"type":"none","details":{"cli":"npx skills add sickn33/antigravity-awesome-skills","source_repo":"https://github.com/sickn33/antigravity-awesome-skills","install_from":"skills.sh"}},"qualityScore":"0.700","qualityRationale":"deterministic score 0.70 from registry signals: · indexed on github topic:agent-skills · 34726 github stars · SKILL.md body (12,148 chars)","verified":false,"liveness":"unknown","lastLivenessCheck":null,"agentReviews":{"count":0,"score_avg":null,"cost_usd_avg":null,"success_rate":null,"latency_p50_ms":null,"narrative_summary":null,"summary_updated_at":null},"enrichmentModel":"deterministic:skill-github:v1","enrichmentVersion":1,"enrichedAt":"2026-04-23T12:51:10.483Z","embedding":null,"createdAt":"2026-04-18T21:40:01.984Z","updatedAt":"2026-04-23T12:51:10.483Z","lastSeenAt":"2026-04-23T12:51:10.483Z","tsv":"'-1':249,261 '-10':551,875,893 '-12':1542 '-16':691 '-20':1291 '-23':1536 '-256':745,750,775 '-31':1539 '-59':1533 '-7':1232,1545 '/bin/bash':149,194,229,289,342,401,450,500,571,597,613,641,688,719,799,847,918,959,1016,1052,1103,1141,1200,1226,1264,1308,1389,1441,1483 '/dev/null':586,653,940,981,1031,1035,1123,1287 '/dev/sda1':405 '/etc/passwd':642 '/path/to/backup':152,202 '/path/to/backups':232 '/path/to/destination':1206 '/path/to/remote/script.sh':1452 '/path/to/repo1':1392 '/path/to/repo2':1393 '/path/to/source':155,197,1203 '/path/to/your_script.sh':1106 '/proc/loadavg':529 '/script.sh':1510,1514 '/tmp':1229 '/var/log/apache2/access.log':851 '/var/log/syslog':802 '0':731,1109,1532,1535,1544 '0/7':1546 '1':112,141,267,690,721,735,801,850,866,936,1018,1144,1228,1267,1444,1538,1541 '1.1.1.1':921 '10':861,879,988,1381 '2':120,334,363,480,652,660,723,938,1030,1034,1110,1113,1122,1231,1286,1451 '3':126,563 '4':132,682 '48':700 '5':235,423,791 '6':911 '7':884,1045 '8':1194 '8.8.8.8':920 '9':707,902,1301 '90':344,403 'a-za-z0':703 'absolut':1560 'access':995 'account':568 'action':722,738,763,1594 'activ':1154 'add':381,441,1116 'addr':1027,1364 'address':863 'admin@example.com':391 'administr':16,56,107 'ae':744,749,774 'alert':350,374,390,411,434 'alert/notification':442 'alreadi':591,1079 'alway':1551 'analysi':24,64,793,856,1271 'analyz':845 'apache2':1145 'applic':1588 'appropri':87 'apt':1084 'apt-get':1083 'argument':1500 'arithmet':1494 'autom':26,66,115,127,1046,1048 'aux':547 'averag':527 'avoid':1563 'avz':212,1212 'awk':361,421,478,657,864,882,900 'back':220 'background':1517 'backup':19,59,113,119,143,147,150,159,166,179,181,192,203,225,230,234,237,246,250,256,259,263,270,273,277,279,282,286,303,311,330 'base64':699 'bash':85,100,148,193,228,288,341,400,449,499,570,612,623,687,718,798,846,917,958,1015,1051,1102,1140,1199,1225,1263,1307,1388,1440,1465,1486,1577 'basic':99,145 'block':32,72 'bn1':357,474 'br':1363 'branch':1417 'build':31,71 'c':709,871,889,907,935 'cat':528 'cbc':746,751,776 'cd':1408 'chage':649 'check':498,507,517,557,574,617,926,969 'checker':611,916,957,1262 'chmod':1505 'clean':1234 'cleanup':1223,1258 'code':898 'collector':1306 'command':1502,1503 'common':13,53,1478 'complet':180,284,1097,1259 'concept':108 'connect':915,925 'constraint':1548 'core':138 'cpu':338,346,354,359,368,376,379,389,392,394,446,456,471,476,486,488,493,549,1337,1344 'cpu_usage_log.txt':453 'creat':156,331,580,602,831 'creation':569 'critic':824 'cron':1100,1521,1529 'crontab':1119,1120,1129,1518 'curl':979,1056 'current':455,1420,1527 'cut':364,424,481,643 'czf':165 'd':171,185,307,365,425,467,482,644,777,810,1317,1401,1490 'daili':1115 'data':1222 'databas':118,285,290,293,302,310,321,329 'date':168,182,304,464,518,629,807,970,1314,1325,1487,1491 'day':1230,1238,1239,1247,1253,1537 'db':294,297,316,319 'dc':702 'debug':1581 'decrypt':733,764,766,786 'default':1496,1497 'delet':239,1213 'deliver':111 'describ':1595 'destin':1204,1216 'detect':378,438 'develop':1384 'df':417,540,1356 'dir':151,154,177,196,215,231,251,264,271,1202,1205,1215,1217 'dir/backup_':167 'directori':146,163,1197,1208,1219,1227,1241,1249 'disk':397,407,415,428,436,439,538,1354 'display':1275 'distribut':899 'done':280,670,954,1011,1093,1432 'dpkg':1068 'du':1282,1296 'e':1341,1519 'echo':178,218,274,281,328,373,433,484,492,514,519,520,521,524,525,530,531,536,537,542,543,554,588,599,625,632,661,673,711,729,758,784,828,834,852,857,858,859,876,877,894,895,923,927,942,948,966,991,1001,1020,1025,1036,1037,1059,1075,1089,1094,1124,1130,1159,1168,1174,1187,1218,1233,1257,1268,1274,1292,1293,1319,1323,1326,1327,1328,1331,1335,1336,1347,1348,1352,1353,1358,1359,1365,1366,1373,1404,1421,1425,1433,1469 'edit':1520 'elif':762 'els':593,947,1000,1081,1173,1424 'email':384 'enc':748,771,773 'encrypt':137,716,724,732,739,741,760 'environ':39,79,82 'error':795,805,815,822,829,836,1564 'etc':96,386 'eth0':1019 'exceed':353,414 'exec':1254 'execut':131,1439,1453,1472,1509,1590 'exist':577,592 'exit':734 'expir':648,656,665,667 'expiri':610,619,627,675 'express':1493 'extract':812 'extractor':797 'f':658,1251 'f1':366,426,483,645 'fail':823,984 'fetch':1411 'fi':396,445,608,736,789,953,1010,1092,1192,1431 'file':103,116,142,219,301,324,327,452,460,491,502,513,553,561,615,631,634,669,680,715,720,727,742,755,759,767,769,770,780,783,785,788,804,819,827,833,841,849,868,886,904,964,972,999,1009,1195,1235,1243,1310,1372,1379 'file.enc':757,761 'files/directories':204 'find':1248 'first':1558 'folder':1260,1265,1269,1272,1284,1298 'format':1492,1530 'found':837 'free':534,1350 'generat':686,692,712,1324 'get':1085 'git':1058,1382,1385,1390,1397,1410,1413,1416,1428 'github.com':962 'google.com':922,961 'grep':358,419,475,640,654,820,1042,1070,1340 'gt':254,370,430 'gzip':325 'h':172,186,418,468,535,541,1351,1357 'handl':1568 'head':550,708,874,892,983,1290 'health':497,506,516,556 'high':375,435 'host':919,929,931,939,944,950 'hostnam':1313,1329,1330 'hour':1534 'htop':1055 'http':896 'id':584 'if':635,672 'ifconfig':1032 'ii':1072 'inaccess':1005 'includ':18,58 'info':1014,1305,1312,1338,1375 'inform':1023,1303,1321 'instal':93,1050,1060,1080,1086,1090,1096 'interact':605 'interfac':1013,1017,1022,1024,1029,1033,1043,1361 'ip':862,1026,1040,1362 'is-act':1152 'job':1522 'knowledg':98 'l':253,650,839,1069,1121 'length':689,710 'limit':1550 'line':813 'linux':2,14,40,54,102 'linux-shell-script':1 'linux/unix':83 'load':526 'log':23,63,454,495,792,796,806,818,830,844,848,855,867,885,903,963,971,998,1008,1367 'logfil':800,825 'logger':448 'logic':383,443 'ls':248,260 'lscpu':1339 'm':170,173,184,187,306,466,469,595,809,1316,1489 'mail':387 'make':1508 'manag':22,62,136,565 'mani':1571 'max':233,245,255,986 'max-tim':985 'memori':532,1349 'minut':1531 'model':1342 'monitor':20,60,121,336,340,345,399,406 'month':1540 'mtime':1252 'mysqldump':313,314 'n':266,636 'name':291,322,1143,1157,1162,1167,1171,1177,1186,1190,1343 'network':912,914,924,1012,1021,1360 'new':581 'newus':573 'nohup':1513 'non':1556 'non-product':1555 'notif':382 'old':276 'older':1236,1244 'oldest':241,258,272,278 'openssl':95,697,747,772 'oper':35,75,1196 'origin':1415 'os':1332 'output':109,300,323,326,451,490,501,552,560,614,630,633,668,679,768,782,787,803,826,832,840,980,1309,1371,1378 'output_file.gz':332 'overview':1598 'p':318 'packag':1049,1053,1061,1063,1065,1073,1077,1088,1091,1095 'partit':404,420 'pass':298,320 'passwd':606 'password':135,299,604,609,618,626,647,655,664,666,674,685,695,696,713,714 'password_expiry_report.txt':616 'path':1266,1273,1285,1299,1561 'pattern':1480,1481 'pbkdf2':753,778 'penetr':37,77 'perform':309,504 'permiss':88 'phase':140,333,562,681,790,910,1044,1193,1300,1380 'ping':934 'prerequisit':80 'print':362,422,479,659,865,883,901 'privileg':1575 'process':545 'product':7,41,47,1557 'production-readi':6,46 'progress':213 'proper':1570 'provid':5,45 'ps':546 'pull':1414 'purpos':44,1482,1504 'q':1071 'quick':1476 'quiet':1155 'quot':1565 'r':269 'rand':698 'random':694 'reachabl':946 'readi':8,48 'refer':1477 'remot':190,198,207,216,223,1437,1442,1447,1449,1458,1463,1467,1470,1474 'remote-serv':1446 'remoteserv':201 'remov':275,1242 'repo':1391,1395,1398,1407,1409,1423,1430 'repo/.git':1402 'report':628,676,1322 'repositori':1386,1406,1429,1435 'request':880 'requir':81,91,97,1573 'resourc':123 'restart':1138,1146,1160,1165,1172 'result':510 'rh':1289 'rm':268,1255 'rn':873,891,909 'root/sudo':1574 'rotat':226,236,283 'rout':1038,1041 'rsync':94,210,211,1210,1211 'run':1111,1180,1511,1515,1525 'salt':752 'save':509,558,677,1376 'schedul':129,1099,1104,1107,1125,1127,1132,1133,1135 'script':4,10,28,43,50,68,101,122,134,144,227,287,337,566,684,717,794,913,1047,1139,1224,1438,1450,1455,1468,1471,1479,1512,1553,1572 'script.sh':1507,1524,1579 'secur':34,74,133,683 'serv':29,69 'server':191,199,208,217,224,843,854,1443,1448,1459,1464,1475 'servic':1137,1142,1149,1156,1161,1166,1169,1170,1175,1176,1185,1188,1189 'set':603 'setup':1101 'sh':1283,1297 'shebang':1484 'shell':3,9,42,49,86,624,1528 'show':1028,1419 'show-curr':1418 'silent':982 'size':1261,1270,1276,1281,1295 'skill':1586 'skill-linux-shell-scripting' 'skip':1076 'slack':385 'solut':114 'sort':548,869,872,887,890,905,908,1279,1288 'sourc':153,162,176,195,214,1201,1214,1523 'source-sickn33' 'space':398,1355,1569 'specifi':1148,1246 'sql':308 'ssh':1461,1462 'start':1181,1184,1191 'status':897 'structur':105 'subdirectori':1278 'success':1221 'sudo':1082,1163,1182 'sun':1547 'synchron':1198,1207,1220 'system':15,55,84,104,106,335,496,505,515,555,1302,1304,1311,1320,1374 'system_health_check.txt':503 'systemctl':1151,1164,1183 'tabl':1039 'tail':265 'tar':164 'tar.gz':175,189 'task':17,57,90,130,1098,1105,1117,1128,1131,1136 'tee':996,1006 'templat':11,51 'test':38,78,1552 'thread':1346 'threshold':343,352,371,402,413,431 'time':987,1108,1126,1134 'timestamp':158,462,463,485 'tool':128 'top':356,473,544,860,878 'topic-agent-skills' 'topic-agentic-skills' 'topic-ai-agent-skills' 'topic-ai-agents' 'topic-ai-coding' 'topic-ai-workflows' 'topic-antigravity' 'topic-antigravity-skills' 'topic-claude-code' 'topic-claude-code-skills' 'topic-codex-cli' 'topic-codex-skills' 'total':835,1294 'tr':701 'track':125 'trigger':349,410 'txt':811,1318 'type':1250 'u':315 'unam':1333 'uniq':870,888,906 'unreach':952 'unset':671 'updat':1387,1405,1422,1436 'uptim':522,523,956,968 'uptime_log.txt':965 'url':881 'usag':124,339,347,355,369,377,380,393,395,408,416,429,437,440,447,457,472,487,489,494,533,539,730 'use':209,312,743,1209,1501,1559,1576,1584 'user':21,61,200,295,317,564,567,576,582,589,600,621,638,651,662,663,1369,1445 'useradd':594 'usernam':296,572,585,590,598,601,607 'util':92 'v':1256 'valu':1498 'var':1495 'variabl':1566 'via':1460 'vim':1054 'w':937 'wc':252,838 'web':842,853 'websit':955,960,967,974,976,989,993,1003 'weekday':1543 'wget':1057 'workflow':139,1592 'x':1506,1578 'y':169,183,305,465,808,1087,1315,1488 'z':726 'z0':706 'za':705","prices":[{"id":"5aa4deb1-03d5-4cc3-ab4d-b1b434d5b951","listingId":"fa9bdbec-3b1e-4eec-92c9-ef5dbb10a6fb","amountUsd":"0","unit":"free","nativeCurrency":null,"nativeAmount":null,"chain":null,"payTo":null,"paymentMethod":"skill-free","isPrimary":true,"details":{"org":"sickn33","category":"antigravity-awesome-skills","install_from":"skills.sh"},"createdAt":"2026-04-18T21:40:01.984Z"}],"sources":[{"listingId":"fa9bdbec-3b1e-4eec-92c9-ef5dbb10a6fb","source":"github","sourceId":"sickn33/antigravity-awesome-skills/linux-shell-scripting","sourceUrl":"https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/linux-shell-scripting","isPrimary":false,"firstSeenAt":"2026-04-18T21:40:01.984Z","lastSeenAt":"2026-04-23T12:51:10.483Z"}],"details":{"listingId":"fa9bdbec-3b1e-4eec-92c9-ef5dbb10a6fb","quickStartSnippet":null,"exampleRequest":null,"exampleResponse":null,"schema":null,"openapiUrl":null,"agentsTxtUrl":null,"citations":[],"useCases":[],"bestFor":[],"notFor":[],"kindDetails":{"org":"sickn33","slug":"linux-shell-scripting","github":{"repo":"sickn33/antigravity-awesome-skills","stars":34726,"topics":["agent-skills","agentic-skills","ai-agent-skills","ai-agents","ai-coding","ai-workflows","antigravity","antigravity-skills","claude-code","claude-code-skills","codex-cli","codex-skills","cursor","cursor-skills","developer-tools","gemini-cli","gemini-skills","kiro","mcp","skill-library"],"license":"mit","html_url":"https://github.com/sickn33/antigravity-awesome-skills","pushed_at":"2026-04-23T06:41:03Z","description":"Installable GitHub library of 1,400+ agentic skills for Claude Code, Cursor, Codex CLI, Gemini CLI, Antigravity, and more. Includes installer CLI, bundles, workflows, and official/community skill collections.","skill_md_sha":"72ffa82066e16c30208a4df8cf542b0e9db3a457","skill_md_path":"skills/linux-shell-scripting/SKILL.md","default_branch":"main","skill_tree_url":"https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/linux-shell-scripting"},"layout":"multi","source":"github","category":"antigravity-awesome-skills","frontmatter":{"name":"linux-shell-scripting","description":"Provide production-ready shell script templates for common Linux system administration tasks including backups, monitoring, user management, log analysis, and automation. These scripts serve as building blocks for security operations and penetration testing environments."},"skills_sh_url":"https://skills.sh/sickn33/antigravity-awesome-skills/linux-shell-scripting"},"updatedAt":"2026-04-23T12:51:10.483Z"}}