killchain-compendium/.gitmodules

70 lines
2.9 KiB
Plaintext
Raw Normal View History

2021-08-27 00:58:41 +02:00
[submodule "enumeration/Sublist3r"]
path = enumeration/Sublist3r
url = https://github.com/aboul3la/Sublist3r.git
2021-08-27 01:02:47 +02:00
[submodule "enumeration/gobuster"]
path = enumeration/gobuster
url = https://github.com/OJ/gobuster.git
[submodule "enumeration/Checklists"]
path = enumeration/Checklists
url = https://github.com/netbiosX/Checklists.git
2021-08-27 01:09:44 +02:00
[submodule "enumeration/kerbrute"]
path = enumeration/kerbrute
url = https://github.com/ropnop/kerbrute.git
2021-08-27 23:50:45 +02:00
[submodule "enumeration/windows/Windows-Exploit-Suggester"]
path = enumeration/windows/Windows-Exploit-Suggester
url = https://github.com/AonCyberLabs/Windows-Exploit-Suggester.git
2021-08-27 23:58:26 +02:00
[submodule "PayloadsAllTheThings"]
path = PayloadsAllTheThings
url = https://github.com/swisskyrepo/PayloadsAllTheThings.git
[submodule "static-binaries"]
path = static-binaries
url = https://github.com/andrew-d/static-binaries.git
[submodule "PowerSploit"]
path = PowerSploit
url = https://github.com/PowerShellMafia/PowerSploit.git
2021-08-28 00:00:56 +02:00
[submodule "nishang"]
path = nishang
url = https://github.com/samratashok/nishang.git
2021-08-29 00:57:14 +02:00
[submodule "reverse_shells/One-Lin3r"]
path = reverse_shells/One-Lin3r
url = https://github.com/D4Vinci/One-Lin3r.git
2021-09-11 16:00:40 +02:00
[submodule "exploit/web/php/Chankro"]
path = exploit/web/php/Chankro
url = https://github.com/TarlogicSecurity/Chankro.git
2021-09-24 00:54:18 +02:00
[submodule "enumeration/enumeration"]
path = enumeration/enumeration
url = https://github.com/digininja/CeWL.git
[submodule "enumeration/CeWL"]
path = enumeration/CeWL
url = https://github.com/digininja/CeWL.git
[submodule "enumeration/RustScan"]
path = enumeration/RustScan
url = https://github.com/RustScan/RustScan.git
2021-10-23 02:03:06 +02:00
[submodule "post_exploitation/priv_esc/privesc-scripts/linux-exploit-suggester"]
path = post_exploitation/priv_esc/privesc-scripts/linux-exploit-suggester
url = https://github.com/mzet-/linux-exploit-suggester
[submodule "post_exploitation/priv_esc/privesc-scripts/linux-smart-enumeration"]
path = post_exploitation/priv_esc/privesc-scripts/linux-smart-enumeration
url = https://github.com/diego-treitos/linux-smart-enumeration
[submodule "post_exploitation/priv_esc/privesc-scripts/linuxprivchecker"]
path = post_exploitation/priv_esc/privesc-scripts/linuxprivchecker
url = https://github.com/linted/linuxprivchecker
2021-10-31 02:43:24 +02:00
[submodule "exploit/windows/CVE-2021-1675"]
path = exploit/windows/CVE-2021-1675
url = https://github.com/calebstewart/CVE-2021-1675
2021-11-04 17:19:58 +01:00
[submodule "enumeration/priv_esc/deepce"]
path = enumeration/priv_esc/deepce
url = https://github.com/stealthcopter/deepce.git
2021-11-04 17:31:15 +01:00
[submodule "misc/PowerSploit"]
path = misc/PowerSploit
url = https://github.com/PowerShellMafia/PowerSploit.git
2021-11-06 23:40:23 +01:00
[submodule "hashes/wordlistctl"]
path = hashes/wordlistctl
url = https://github.com/BlackArch/wordlistctl.git
2021-11-07 02:09:10 +01:00
[submodule "forensics/volatility3"]
path = forensics/volatility3
url = https://github.com/volatilityfoundation/volatility3.git
[submodule "forensics/volatility"]
path = forensics/volatility
url = https://github.com/volatilityfoundation/volatility.git