killchain-compendium/.gitmodules

106 lines
4.9 KiB
Plaintext
Raw Normal View History

2021-08-27 23:58:26 +02:00
[submodule "PayloadsAllTheThings"]
path = PayloadsAllTheThings
url = https://github.com/swisskyrepo/PayloadsAllTheThings.git
[submodule "static-binaries"]
path = static-binaries
url = https://github.com/andrew-d/static-binaries.git
[submodule "PowerSploit"]
path = PowerSploit
url = https://github.com/PowerShellMafia/PowerSploit.git
2021-08-28 00:00:56 +02:00
[submodule "nishang"]
path = nishang
url = https://github.com/samratashok/nishang.git
2021-08-29 00:57:14 +02:00
[submodule "reverse_shells/One-Lin3r"]
path = reverse_shells/One-Lin3r
url = https://github.com/D4Vinci/One-Lin3r.git
2021-09-24 00:54:18 +02:00
[submodule "enumeration/enumeration"]
path = enumeration/enumeration
url = https://github.com/digininja/CeWL.git
2021-10-23 02:03:06 +02:00
[submodule "post_exploitation/priv_esc/privesc-scripts/linux-exploit-suggester"]
path = post_exploitation/priv_esc/privesc-scripts/linux-exploit-suggester
url = https://github.com/mzet-/linux-exploit-suggester
[submodule "post_exploitation/priv_esc/privesc-scripts/linux-smart-enumeration"]
path = post_exploitation/priv_esc/privesc-scripts/linux-smart-enumeration
url = https://github.com/diego-treitos/linux-smart-enumeration
[submodule "post_exploitation/priv_esc/privesc-scripts/linuxprivchecker"]
path = post_exploitation/priv_esc/privesc-scripts/linuxprivchecker
url = https://github.com/linted/linuxprivchecker
2021-10-31 02:43:24 +02:00
[submodule "exploit/windows/CVE-2021-1675"]
path = exploit/windows/CVE-2021-1675
url = https://github.com/calebstewart/CVE-2021-1675
2021-11-04 17:19:58 +01:00
[submodule "enumeration/priv_esc/deepce"]
path = enumeration/priv_esc/deepce
url = https://github.com/stealthcopter/deepce.git
2021-11-18 18:05:21 +01:00
[submodule "post_exploitation/firefox_decrypt"]
path = post_exploitation/firefox_decrypt
url = https://github.com/unode/firefox_decrypt.git
2021-12-04 00:26:03 +01:00
[submodule "reverse_shells/php-reverse-shell"]
path = reverse_shells/php-reverse-shell
url = https://github.com/ivan-sincek/php-reverse-shell.git
[submodule "post_exploitation/CrackMapExec"]
path = post_exploitation/CrackMapExec
url = https://github.com/byt3bl33d3r/CrackMapExec.git
[submodule "post_exploitation/priv_esc/Seatbelt"]
path = post_exploitation/priv_esc/Seatbelt
url = https://github.com/GhostPack/Seatbelt
[submodule "post_exploitation/Invoke-EDRChecker"]
path = post_exploitation/Invoke-EDRChecker
url = https://github.com/PwnDexter/Invoke-EDRChecker.git
2021-12-09 01:50:04 +01:00
[submodule "reverse_shells/phpreverseshell"]
path = reverse_shells/phpreverseshell
url = https://github.com/rootkral4/phpreverseshell.git
2021-12-28 00:59:54 +01:00
[submodule "reverse_engineering/SCDBG"]
path = reverse_engineering/SCDBG
url = https://github.com/dzzie/SCDBG.git
[submodule "reverse_engineering/java/deobfuscator"]
path = reverse_engineering/java/deobfuscator
url = https://github.com/java-deobfuscator/deobfuscator.git
2022-01-27 00:43:24 +01:00
[submodule "telecommunications/sipvicious"]
path = telecommunications/sipvicious
url = https://github.com/EnableSecurity/sipvicious.git
2022-01-31 18:30:47 +01:00
[submodule "exploit/windows/PrintNightmare"]
path = exploit/windows/PrintNightmare
url = https://github.com/ly4k/PrintNightmare.git
2022-02-14 23:22:18 +01:00
[submodule "post_exploitation/priv_esc/sucrack"]
path = post_exploitation/priv_esc/sucrack
url = https://github.com/hemp3l/sucrack.git
2022-02-26 01:01:44 +01:00
[submodule "exploit/windows/printspoofer"]
path = exploit/windows/printspoofer
url = https://github.com/dievus/printspoofer.git
2022-03-10 01:31:54 +01:00
[submodule "post_exploitation/powershell"]
path = post_exploitation/powershell
url = https://github.com/puckiestyle/powershell.git
[submodule "post_exploitation/armitage"]
path = post_exploitation/armitage
url = https://gitlab.com/kalilinux/packages/armitage.git
2022-04-14 01:06:16 +02:00
[submodule "post_exploitation/bc_security/Empire"]
path = post_exploitation/bc_security/Empire
url = https://github.com/BC-SECURITY/Empire.git
2022-06-20 00:09:28 +02:00
[submodule "misc/level3_hypervisor/kubeletctl"]
path = misc/level3_hypervisor/kubeletctl
url = https://github.com/cyberark/kubeletctl.git
2022-08-03 00:30:03 +02:00
[submodule "misc/bruteforce/patator"]
path = misc/bruteforce/patator
url = https://github.com/lanjelot/patator.git
2022-08-08 22:43:23 +02:00
[submodule "misc/level3_hypervisor/docker_sec/dive"]
path = misc/level3_hypervisor/docker_sec/dive
url = https://github.com/wagoodman/dive.git
[submodule "post_exploitation/kerberoast"]
path = post_exploitation/kerberoast
url = https://github.com/nidem/kerberoast.git
[submodule "post_exploitation/mimikatz"]
path = post_exploitation/mimikatz
url = https://github.com/gentilkiwi/mimikatz.git
[submodule "post_exploitation/priv_esc/privesc-scripts/LinEnum"]
path = post_exploitation/priv_esc/privesc-scripts/LinEnum
url = https://github.com/rebootuser/LinEnum.git
[submodule "post_exploitation/priv_esc/privesc-scripts/privilege-escalation-awesome-scripts-suite"]
path = post_exploitation/priv_esc/privesc-scripts/privilege-escalation-awesome-scripts-suite
url = https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite.git
[submodule "post_exploitation/bc_security/Starkiller"]
path = post_exploitation/bc_security/Starkiller
url = https://github.com/BC-SECURITY/Starkiller.git
[submodule "reverse_shells/windows/evil-winrm"]
path = reverse_shells/windows/evil-winrm
url = https://github.com/Hackplayers/evil-winrm.git