2016-07-26 17:19:49 +02:00
|
|
|
[submodule "UACME"]
|
|
|
|
path = UACME
|
|
|
|
url = https://github.com/hfiref0x/UACME.git
|
2016-07-26 17:22:54 +02:00
|
|
|
[submodule "mimikatz"]
|
|
|
|
path = mimikatz
|
|
|
|
url = https://github.com/gentilkiwi/mimikatz
|
2016-07-26 17:25:18 +02:00
|
|
|
[submodule "mimikittenz"]
|
|
|
|
path = mimikittenz
|
|
|
|
url = https://github.com/putterpanda/mimikittenz.git
|
2016-07-26 17:41:20 +02:00
|
|
|
[submodule "Potato"]
|
|
|
|
path = Potato
|
|
|
|
url = https://github.com/foxglovesec/Potato
|
2016-07-26 17:46:40 +02:00
|
|
|
[submodule "Pazuzu"]
|
|
|
|
path = Pazuzu
|
|
|
|
url = https://github.com/BorjaMerino/Pazuzu
|
2016-07-26 17:53:39 +02:00
|
|
|
[submodule "Windows-Exploit-Suggester"]
|
|
|
|
path = Windows-Exploit-Suggester
|
|
|
|
url = https://github.com/GDSSecurity/Windows-Exploit-Suggester
|
2016-07-26 17:55:02 +02:00
|
|
|
[submodule "Exploitation"]
|
|
|
|
path = Exploitation
|
|
|
|
url = https://github.com/hacksysteam/Exploitation
|
2016-07-27 02:36:45 +02:00
|
|
|
[submodule "Powershell/Empire"]
|
|
|
|
path = Powershell/Empire
|
|
|
|
url = https://github.com/PowerShellEmpire/Empire
|
|
|
|
[submodule "Powershell/PowerTools"]
|
|
|
|
path = Powershell/PowerTools
|
|
|
|
url = https://github.com/PowerShellEmpire/PowerTools
|
2016-07-27 02:54:25 +02:00
|
|
|
[submodule "Powershell/Generate-Macro"]
|
|
|
|
path = Powershell/Generate-Macro
|
|
|
|
url = https://github.com/enigma0x3/Generate-Macro
|
|
|
|
[submodule "Powershell/Invoke-AltDSBackdoor"]
|
|
|
|
path = Powershell/Invoke-AltDSBackdoor
|
|
|
|
url = https://github.com/enigma0x3/Invoke-AltDSBackdoor
|
|
|
|
[submodule "Powershell/Old-Powershell-payload-Excel-Delivery"]
|
|
|
|
path = Powershell/Old-Powershell-payload-Excel-Delivery
|
|
|
|
url = https://github.com/enigma0x3/Old-Powershell-payload-Excel-Delivery
|
|
|
|
[submodule "Powershell/Powershell-Payload-Excel-Delivery"]
|
|
|
|
path = Powershell/Powershell-Payload-Excel-Delivery
|
|
|
|
url = https://github.com/enigma0x3/Powershell-Payload-Excel-Delivery
|
|
|
|
[submodule "Powershell/Powershell-C2"]
|
|
|
|
path = Powershell/Powershell-C2
|
|
|
|
url = https://github.com/enigma0x3/Powershell-C2
|
|
|
|
[submodule "Misc/Invoke-LoginPrompt"]
|
|
|
|
path = Misc/Invoke-LoginPrompt
|
|
|
|
url = https://github.com/enigma0x3/Invoke-LoginPrompt
|
2016-07-27 02:57:43 +02:00
|
|
|
[submodule "Misc/PowerShellArsenal"]
|
|
|
|
path = Misc/PowerShellArsenal
|
|
|
|
url = https://github.com/mattifestation/PowerShellArsenal
|
2016-07-27 17:21:35 +02:00
|
|
|
[submodule "hacking-team-windows-kernel-lpe"]
|
|
|
|
path = hacking-team-windows-kernel-lpe
|
|
|
|
url = https://github.com/vlad902/hacking-team-windows-kernel-lpe
|
2016-07-29 05:13:12 +02:00
|
|
|
[submodule "Misc/afot"]
|
|
|
|
path = Misc/afot
|
|
|
|
url = https://github.com/harris21/afot
|
2016-08-03 11:33:34 +02:00
|
|
|
[submodule "Misc/Winpayloads"]
|
|
|
|
path = Misc/Winpayloads
|
|
|
|
url = https://github.com/nccgroup/Winpayloads
|
2016-08-12 10:28:38 +02:00
|
|
|
[submodule "Powershell/PSRecon"]
|
|
|
|
path = Powershell/PSRecon
|
|
|
|
url = https://github.com/gfoss/PSRecon
|
2016-09-01 09:26:26 +02:00
|
|
|
[submodule "Powershell/PowerSploit"]
|
|
|
|
path = Powershell/PowerSploit
|
|
|
|
url = https://github.com/PowerShellMafia/PowerSploit
|
2016-09-19 04:04:40 +02:00
|
|
|
[submodule "Powershell/BloodHound"]
|
|
|
|
path = Powershell/BloodHound
|
|
|
|
url = https://github.com/adaptivethreat/BloodHound
|
2016-09-19 18:31:18 +02:00
|
|
|
[submodule "Powershell/PowerShell-Suite"]
|
|
|
|
path = Powershell/PowerShell-Suite
|
|
|
|
url = https://github.com/FuzzySecurity/PowerShell-Suite
|
2016-09-19 18:37:08 +02:00
|
|
|
[submodule "Powershell/mimikittenz"]
|
|
|
|
path = Powershell/mimikittenz
|
|
|
|
url = https://github.com/putterpanda/mimikittenz
|
2016-10-25 04:06:09 +02:00
|
|
|
[submodule "Powershell/p0wnedShell"]
|
|
|
|
path = Powershell/p0wnedShell
|
|
|
|
url = https://github.com/Cn33liz/p0wnedShell
|