no more subprojects
This commit is contained in:
parent
0c98cfe60f
commit
adc7992e16
|
@ -1,105 +0,0 @@
|
|||
[submodule "PayloadsAllTheThings"]
|
||||
path = PayloadsAllTheThings
|
||||
url = https://github.com/swisskyrepo/PayloadsAllTheThings.git
|
||||
[submodule "static-binaries"]
|
||||
path = static-binaries
|
||||
url = https://github.com/andrew-d/static-binaries.git
|
||||
[submodule "PowerSploit"]
|
||||
path = PowerSploit
|
||||
url = https://github.com/PowerShellMafia/PowerSploit.git
|
||||
[submodule "nishang"]
|
||||
path = nishang
|
||||
url = https://github.com/samratashok/nishang.git
|
||||
[submodule "reverse_shells/One-Lin3r"]
|
||||
path = reverse_shells/One-Lin3r
|
||||
url = https://github.com/D4Vinci/One-Lin3r.git
|
||||
[submodule "enumeration/enumeration"]
|
||||
path = enumeration/enumeration
|
||||
url = https://github.com/digininja/CeWL.git
|
||||
[submodule "post_exploitation/priv_esc/privesc-scripts/linux-exploit-suggester"]
|
||||
path = post_exploitation/priv_esc/privesc-scripts/linux-exploit-suggester
|
||||
url = https://github.com/mzet-/linux-exploit-suggester
|
||||
[submodule "post_exploitation/priv_esc/privesc-scripts/linux-smart-enumeration"]
|
||||
path = post_exploitation/priv_esc/privesc-scripts/linux-smart-enumeration
|
||||
url = https://github.com/diego-treitos/linux-smart-enumeration
|
||||
[submodule "post_exploitation/priv_esc/privesc-scripts/linuxprivchecker"]
|
||||
path = post_exploitation/priv_esc/privesc-scripts/linuxprivchecker
|
||||
url = https://github.com/linted/linuxprivchecker
|
||||
[submodule "exploit/windows/CVE-2021-1675"]
|
||||
path = exploit/windows/CVE-2021-1675
|
||||
url = https://github.com/calebstewart/CVE-2021-1675
|
||||
[submodule "enumeration/priv_esc/deepce"]
|
||||
path = enumeration/priv_esc/deepce
|
||||
url = https://github.com/stealthcopter/deepce.git
|
||||
[submodule "post_exploitation/firefox_decrypt"]
|
||||
path = post_exploitation/firefox_decrypt
|
||||
url = https://github.com/unode/firefox_decrypt.git
|
||||
[submodule "reverse_shells/php-reverse-shell"]
|
||||
path = reverse_shells/php-reverse-shell
|
||||
url = https://github.com/ivan-sincek/php-reverse-shell.git
|
||||
[submodule "post_exploitation/CrackMapExec"]
|
||||
path = post_exploitation/CrackMapExec
|
||||
url = https://github.com/byt3bl33d3r/CrackMapExec.git
|
||||
[submodule "post_exploitation/priv_esc/Seatbelt"]
|
||||
path = post_exploitation/priv_esc/Seatbelt
|
||||
url = https://github.com/GhostPack/Seatbelt
|
||||
[submodule "post_exploitation/Invoke-EDRChecker"]
|
||||
path = post_exploitation/Invoke-EDRChecker
|
||||
url = https://github.com/PwnDexter/Invoke-EDRChecker.git
|
||||
[submodule "reverse_shells/phpreverseshell"]
|
||||
path = reverse_shells/phpreverseshell
|
||||
url = https://github.com/rootkral4/phpreverseshell.git
|
||||
[submodule "reverse_engineering/SCDBG"]
|
||||
path = reverse_engineering/SCDBG
|
||||
url = https://github.com/dzzie/SCDBG.git
|
||||
[submodule "reverse_engineering/java/deobfuscator"]
|
||||
path = reverse_engineering/java/deobfuscator
|
||||
url = https://github.com/java-deobfuscator/deobfuscator.git
|
||||
[submodule "telecommunications/sipvicious"]
|
||||
path = telecommunications/sipvicious
|
||||
url = https://github.com/EnableSecurity/sipvicious.git
|
||||
[submodule "exploit/windows/PrintNightmare"]
|
||||
path = exploit/windows/PrintNightmare
|
||||
url = https://github.com/ly4k/PrintNightmare.git
|
||||
[submodule "post_exploitation/priv_esc/sucrack"]
|
||||
path = post_exploitation/priv_esc/sucrack
|
||||
url = https://github.com/hemp3l/sucrack.git
|
||||
[submodule "exploit/windows/printspoofer"]
|
||||
path = exploit/windows/printspoofer
|
||||
url = https://github.com/dievus/printspoofer.git
|
||||
[submodule "post_exploitation/powershell"]
|
||||
path = post_exploitation/powershell
|
||||
url = https://github.com/puckiestyle/powershell.git
|
||||
[submodule "post_exploitation/armitage"]
|
||||
path = post_exploitation/armitage
|
||||
url = https://gitlab.com/kalilinux/packages/armitage.git
|
||||
[submodule "post_exploitation/bc_security/Empire"]
|
||||
path = post_exploitation/bc_security/Empire
|
||||
url = https://github.com/BC-SECURITY/Empire.git
|
||||
[submodule "misc/level3_hypervisor/kubeletctl"]
|
||||
path = misc/level3_hypervisor/kubeletctl
|
||||
url = https://github.com/cyberark/kubeletctl.git
|
||||
[submodule "misc/bruteforce/patator"]
|
||||
path = misc/bruteforce/patator
|
||||
url = https://github.com/lanjelot/patator.git
|
||||
[submodule "misc/level3_hypervisor/docker_sec/dive"]
|
||||
path = misc/level3_hypervisor/docker_sec/dive
|
||||
url = https://github.com/wagoodman/dive.git
|
||||
[submodule "post_exploitation/kerberoast"]
|
||||
path = post_exploitation/kerberoast
|
||||
url = https://github.com/nidem/kerberoast.git
|
||||
[submodule "post_exploitation/mimikatz"]
|
||||
path = post_exploitation/mimikatz
|
||||
url = https://github.com/gentilkiwi/mimikatz.git
|
||||
[submodule "post_exploitation/priv_esc/privesc-scripts/LinEnum"]
|
||||
path = post_exploitation/priv_esc/privesc-scripts/LinEnum
|
||||
url = https://github.com/rebootuser/LinEnum.git
|
||||
[submodule "post_exploitation/priv_esc/privesc-scripts/privilege-escalation-awesome-scripts-suite"]
|
||||
path = post_exploitation/priv_esc/privesc-scripts/privilege-escalation-awesome-scripts-suite
|
||||
url = https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite.git
|
||||
[submodule "post_exploitation/bc_security/Starkiller"]
|
||||
path = post_exploitation/bc_security/Starkiller
|
||||
url = https://github.com/BC-SECURITY/Starkiller.git
|
||||
[submodule "reverse_shells/windows/evil-winrm"]
|
||||
path = reverse_shells/windows/evil-winrm
|
||||
url = https://github.com/Hackplayers/evil-winrm.git
|
Loading…
Reference in New Issue