Get list of network interfaces:

> tshark -D

Listen on multiple network interfaces:

> tshark -i ethl -i eth2 -i eth3

Save to pcap and disable name resolution:

> tshark -nn -w <FILE NAME>,pcap

Get absolute date and time stamp:

> tshark -t a

Get arp or icmp traffic:

> tshark arp or icmp

Capture traffic between to [hosts] and/or [nets]:

> tshark "host <HOST l> && host <HOST 2>"
> tshark -n "net <NET 1> && net <NET 2>"

Filter just host and IPs (or not your IP):

> tshark -r <FILE NAME>,pcap -q -z hosts,ipv4
> tshark not host <YOUR IP ADDRESS>

Not ARP and not UDP:

> tshark not arp and not (udp.port -- 53)

Replay a pcap file:

> tshark -r <FILE NAME>.pcap

Replay a pcap and just grab hosts and IPs:

> tshark -r <FILE NAME>.pcap -q -z hosts