76 lines
2.9 KiB
Plaintext
76 lines
2.9 KiB
Plaintext
[submodule "UACME"]
|
|
path = UACME
|
|
url = https://github.com/hfiref0x/UACME.git
|
|
[submodule "mimikatz"]
|
|
path = mimikatz
|
|
url = https://github.com/gentilkiwi/mimikatz
|
|
[submodule "mimikittenz"]
|
|
path = mimikittenz
|
|
url = https://github.com/putterpanda/mimikittenz.git
|
|
[submodule "Potato"]
|
|
path = Potato
|
|
url = https://github.com/foxglovesec/Potato
|
|
[submodule "Pazuzu"]
|
|
path = Pazuzu
|
|
url = https://github.com/BorjaMerino/Pazuzu
|
|
[submodule "Windows-Exploit-Suggester"]
|
|
path = Windows-Exploit-Suggester
|
|
url = https://github.com/GDSSecurity/Windows-Exploit-Suggester
|
|
[submodule "Exploitation"]
|
|
path = Exploitation
|
|
url = https://github.com/hacksysteam/Exploitation
|
|
[submodule "Powershell/Empire"]
|
|
path = Powershell/Empire
|
|
url = https://github.com/PowerShellEmpire/Empire
|
|
[submodule "Powershell/PowerTools"]
|
|
path = Powershell/PowerTools
|
|
url = https://github.com/PowerShellEmpire/PowerTools
|
|
[submodule "Powershell/Generate-Macro"]
|
|
path = Powershell/Generate-Macro
|
|
url = https://github.com/enigma0x3/Generate-Macro
|
|
[submodule "Powershell/Invoke-AltDSBackdoor"]
|
|
path = Powershell/Invoke-AltDSBackdoor
|
|
url = https://github.com/enigma0x3/Invoke-AltDSBackdoor
|
|
[submodule "Powershell/Old-Powershell-payload-Excel-Delivery"]
|
|
path = Powershell/Old-Powershell-payload-Excel-Delivery
|
|
url = https://github.com/enigma0x3/Old-Powershell-payload-Excel-Delivery
|
|
[submodule "Powershell/Powershell-Payload-Excel-Delivery"]
|
|
path = Powershell/Powershell-Payload-Excel-Delivery
|
|
url = https://github.com/enigma0x3/Powershell-Payload-Excel-Delivery
|
|
[submodule "Powershell/Powershell-C2"]
|
|
path = Powershell/Powershell-C2
|
|
url = https://github.com/enigma0x3/Powershell-C2
|
|
[submodule "Misc/Invoke-LoginPrompt"]
|
|
path = Misc/Invoke-LoginPrompt
|
|
url = https://github.com/enigma0x3/Invoke-LoginPrompt
|
|
[submodule "Misc/PowerShellArsenal"]
|
|
path = Misc/PowerShellArsenal
|
|
url = https://github.com/mattifestation/PowerShellArsenal
|
|
[submodule "hacking-team-windows-kernel-lpe"]
|
|
path = hacking-team-windows-kernel-lpe
|
|
url = https://github.com/vlad902/hacking-team-windows-kernel-lpe
|
|
[submodule "Misc/afot"]
|
|
path = Misc/afot
|
|
url = https://github.com/harris21/afot
|
|
[submodule "Misc/Winpayloads"]
|
|
path = Misc/Winpayloads
|
|
url = https://github.com/nccgroup/Winpayloads
|
|
[submodule "Powershell/PSRecon"]
|
|
path = Powershell/PSRecon
|
|
url = https://github.com/gfoss/PSRecon
|
|
[submodule "Powershell/PowerSploit"]
|
|
path = Powershell/PowerSploit
|
|
url = https://github.com/PowerShellMafia/PowerSploit
|
|
[submodule "Powershell/BloodHound"]
|
|
path = Powershell/BloodHound
|
|
url = https://github.com/adaptivethreat/BloodHound
|
|
[submodule "Powershell/PowerShell-Suite"]
|
|
path = Powershell/PowerShell-Suite
|
|
url = https://github.com/FuzzySecurity/PowerShell-Suite
|
|
[submodule "Powershell/mimikittenz"]
|
|
path = Powershell/mimikittenz
|
|
url = https://github.com/putterpanda/mimikittenz
|
|
[submodule "Powershell/p0wnedShell"]
|
|
path = Powershell/p0wnedShell
|
|
url = https://github.com/Cn33liz/p0wnedShell
|