From adc7992e1697d1fbafc380f084c11438569bfa2d Mon Sep 17 00:00:00 2001 From: whx Date: Sun, 13 Nov 2022 22:53:28 +0100 Subject: [PATCH] no more subprojects --- .gitmodules | 105 ---------------------------------------------------- 1 file changed, 105 deletions(-) delete mode 100644 .gitmodules diff --git a/.gitmodules b/.gitmodules deleted file mode 100644 index e3facca..0000000 --- a/.gitmodules +++ /dev/null @@ -1,105 +0,0 @@ -[submodule "PayloadsAllTheThings"] - path = PayloadsAllTheThings - url = https://github.com/swisskyrepo/PayloadsAllTheThings.git -[submodule "static-binaries"] - path = static-binaries - url = https://github.com/andrew-d/static-binaries.git -[submodule "PowerSploit"] - path = PowerSploit - url = https://github.com/PowerShellMafia/PowerSploit.git -[submodule "nishang"] - path = nishang - url = https://github.com/samratashok/nishang.git -[submodule "reverse_shells/One-Lin3r"] - path = reverse_shells/One-Lin3r - url = https://github.com/D4Vinci/One-Lin3r.git -[submodule "enumeration/enumeration"] - path = enumeration/enumeration - url = https://github.com/digininja/CeWL.git -[submodule "post_exploitation/priv_esc/privesc-scripts/linux-exploit-suggester"] - path = post_exploitation/priv_esc/privesc-scripts/linux-exploit-suggester - url = https://github.com/mzet-/linux-exploit-suggester -[submodule "post_exploitation/priv_esc/privesc-scripts/linux-smart-enumeration"] - path = post_exploitation/priv_esc/privesc-scripts/linux-smart-enumeration - url = https://github.com/diego-treitos/linux-smart-enumeration -[submodule "post_exploitation/priv_esc/privesc-scripts/linuxprivchecker"] - path = post_exploitation/priv_esc/privesc-scripts/linuxprivchecker - url = https://github.com/linted/linuxprivchecker -[submodule "exploit/windows/CVE-2021-1675"] - path = exploit/windows/CVE-2021-1675 - url = https://github.com/calebstewart/CVE-2021-1675 -[submodule "enumeration/priv_esc/deepce"] - path = enumeration/priv_esc/deepce - url = https://github.com/stealthcopter/deepce.git -[submodule "post_exploitation/firefox_decrypt"] - path = post_exploitation/firefox_decrypt - url = https://github.com/unode/firefox_decrypt.git -[submodule "reverse_shells/php-reverse-shell"] - path = reverse_shells/php-reverse-shell - url = https://github.com/ivan-sincek/php-reverse-shell.git -[submodule "post_exploitation/CrackMapExec"] - path = post_exploitation/CrackMapExec - url = https://github.com/byt3bl33d3r/CrackMapExec.git -[submodule "post_exploitation/priv_esc/Seatbelt"] - path = post_exploitation/priv_esc/Seatbelt - url = https://github.com/GhostPack/Seatbelt -[submodule "post_exploitation/Invoke-EDRChecker"] - path = post_exploitation/Invoke-EDRChecker - url = https://github.com/PwnDexter/Invoke-EDRChecker.git -[submodule "reverse_shells/phpreverseshell"] - path = reverse_shells/phpreverseshell - url = https://github.com/rootkral4/phpreverseshell.git -[submodule "reverse_engineering/SCDBG"] - path = reverse_engineering/SCDBG - url = https://github.com/dzzie/SCDBG.git -[submodule "reverse_engineering/java/deobfuscator"] - path = reverse_engineering/java/deobfuscator - url = https://github.com/java-deobfuscator/deobfuscator.git -[submodule "telecommunications/sipvicious"] - path = telecommunications/sipvicious - url = https://github.com/EnableSecurity/sipvicious.git -[submodule "exploit/windows/PrintNightmare"] - path = exploit/windows/PrintNightmare - url = https://github.com/ly4k/PrintNightmare.git -[submodule "post_exploitation/priv_esc/sucrack"] - path = post_exploitation/priv_esc/sucrack - url = https://github.com/hemp3l/sucrack.git -[submodule "exploit/windows/printspoofer"] - path = exploit/windows/printspoofer - url = https://github.com/dievus/printspoofer.git -[submodule "post_exploitation/powershell"] - path = post_exploitation/powershell - url = https://github.com/puckiestyle/powershell.git -[submodule "post_exploitation/armitage"] - path = post_exploitation/armitage - url = https://gitlab.com/kalilinux/packages/armitage.git -[submodule "post_exploitation/bc_security/Empire"] - path = post_exploitation/bc_security/Empire - url = https://github.com/BC-SECURITY/Empire.git -[submodule "misc/level3_hypervisor/kubeletctl"] - path = misc/level3_hypervisor/kubeletctl - url = https://github.com/cyberark/kubeletctl.git -[submodule "misc/bruteforce/patator"] - path = misc/bruteforce/patator - url = https://github.com/lanjelot/patator.git -[submodule "misc/level3_hypervisor/docker_sec/dive"] - path = misc/level3_hypervisor/docker_sec/dive - url = https://github.com/wagoodman/dive.git -[submodule "post_exploitation/kerberoast"] - path = post_exploitation/kerberoast - url = https://github.com/nidem/kerberoast.git -[submodule "post_exploitation/mimikatz"] - path = post_exploitation/mimikatz - url = https://github.com/gentilkiwi/mimikatz.git -[submodule "post_exploitation/priv_esc/privesc-scripts/LinEnum"] - path = post_exploitation/priv_esc/privesc-scripts/LinEnum - url = https://github.com/rebootuser/LinEnum.git -[submodule "post_exploitation/priv_esc/privesc-scripts/privilege-escalation-awesome-scripts-suite"] - path = post_exploitation/priv_esc/privesc-scripts/privilege-escalation-awesome-scripts-suite - url = https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite.git -[submodule "post_exploitation/bc_security/Starkiller"] - path = post_exploitation/bc_security/Starkiller - url = https://github.com/BC-SECURITY/Starkiller.git -[submodule "reverse_shells/windows/evil-winrm"] - path = reverse_shells/windows/evil-winrm - url = https://github.com/Hackplayers/evil-winrm.git