Windows/.gitmodules

76 lines
2.9 KiB
Plaintext
Raw Normal View History

2016-07-26 17:19:49 +02:00
[submodule "UACME"]
path = UACME
url = https://github.com/hfiref0x/UACME.git
2016-07-26 17:22:54 +02:00
[submodule "mimikatz"]
path = mimikatz
url = https://github.com/gentilkiwi/mimikatz
2016-07-26 17:25:18 +02:00
[submodule "mimikittenz"]
path = mimikittenz
url = https://github.com/putterpanda/mimikittenz.git
2016-07-26 17:41:20 +02:00
[submodule "Potato"]
path = Potato
url = https://github.com/foxglovesec/Potato
2016-07-26 17:46:40 +02:00
[submodule "Pazuzu"]
path = Pazuzu
url = https://github.com/BorjaMerino/Pazuzu
2016-07-26 17:53:39 +02:00
[submodule "Windows-Exploit-Suggester"]
path = Windows-Exploit-Suggester
url = https://github.com/GDSSecurity/Windows-Exploit-Suggester
2016-07-26 17:55:02 +02:00
[submodule "Exploitation"]
path = Exploitation
url = https://github.com/hacksysteam/Exploitation
2016-07-27 02:36:45 +02:00
[submodule "Powershell/Empire"]
path = Powershell/Empire
url = https://github.com/PowerShellEmpire/Empire
[submodule "Powershell/PowerTools"]
path = Powershell/PowerTools
url = https://github.com/PowerShellEmpire/PowerTools
2016-07-27 02:54:25 +02:00
[submodule "Powershell/Generate-Macro"]
path = Powershell/Generate-Macro
url = https://github.com/enigma0x3/Generate-Macro
[submodule "Powershell/Invoke-AltDSBackdoor"]
path = Powershell/Invoke-AltDSBackdoor
url = https://github.com/enigma0x3/Invoke-AltDSBackdoor
[submodule "Powershell/Old-Powershell-payload-Excel-Delivery"]
path = Powershell/Old-Powershell-payload-Excel-Delivery
url = https://github.com/enigma0x3/Old-Powershell-payload-Excel-Delivery
[submodule "Powershell/Powershell-Payload-Excel-Delivery"]
path = Powershell/Powershell-Payload-Excel-Delivery
url = https://github.com/enigma0x3/Powershell-Payload-Excel-Delivery
[submodule "Powershell/Powershell-C2"]
path = Powershell/Powershell-C2
url = https://github.com/enigma0x3/Powershell-C2
[submodule "Misc/Invoke-LoginPrompt"]
path = Misc/Invoke-LoginPrompt
url = https://github.com/enigma0x3/Invoke-LoginPrompt
[submodule "Misc/PowerShellArsenal"]
path = Misc/PowerShellArsenal
url = https://github.com/mattifestation/PowerShellArsenal
2016-07-27 17:21:35 +02:00
[submodule "hacking-team-windows-kernel-lpe"]
path = hacking-team-windows-kernel-lpe
url = https://github.com/vlad902/hacking-team-windows-kernel-lpe
2016-07-29 05:13:12 +02:00
[submodule "Misc/afot"]
path = Misc/afot
url = https://github.com/harris21/afot
2016-08-03 11:33:34 +02:00
[submodule "Misc/Winpayloads"]
path = Misc/Winpayloads
url = https://github.com/nccgroup/Winpayloads
2016-08-12 10:28:38 +02:00
[submodule "Powershell/PSRecon"]
path = Powershell/PSRecon
url = https://github.com/gfoss/PSRecon
2016-09-01 09:26:26 +02:00
[submodule "Powershell/PowerSploit"]
path = Powershell/PowerSploit
url = https://github.com/PowerShellMafia/PowerSploit
2016-09-19 04:04:40 +02:00
[submodule "Powershell/BloodHound"]
path = Powershell/BloodHound
url = https://github.com/adaptivethreat/BloodHound
2016-09-19 18:31:18 +02:00
[submodule "Powershell/PowerShell-Suite"]
path = Powershell/PowerShell-Suite
url = https://github.com/FuzzySecurity/PowerShell-Suite
2016-09-19 18:37:08 +02:00
[submodule "Powershell/mimikittenz"]
path = Powershell/mimikittenz
url = https://github.com/putterpanda/mimikittenz
2016-10-25 04:06:09 +02:00
[submodule "Powershell/p0wnedShell"]
path = Powershell/p0wnedShell
url = https://github.com/Cn33liz/p0wnedShell