[submodule "enumeration/Sublist3r"] path = enumeration/Sublist3r url = https://github.com/aboul3la/Sublist3r.git [submodule "enumeration/gobuster"] path = enumeration/gobuster url = https://github.com/OJ/gobuster.git [submodule "enumeration/Checklists"] path = enumeration/Checklists url = https://github.com/netbiosX/Checklists.git [submodule "enumeration/kerbrute"] path = enumeration/kerbrute url = https://github.com/ropnop/kerbrute.git [submodule "enumeration/windows/Windows-Exploit-Suggester"] path = enumeration/windows/Windows-Exploit-Suggester url = https://github.com/AonCyberLabs/Windows-Exploit-Suggester.git [submodule "PayloadsAllTheThings"] path = PayloadsAllTheThings url = https://github.com/swisskyrepo/PayloadsAllTheThings.git [submodule "static-binaries"] path = static-binaries url = https://github.com/andrew-d/static-binaries.git [submodule "PowerSploit"] path = PowerSploit url = https://github.com/PowerShellMafia/PowerSploit.git [submodule "nishang"] path = nishang url = https://github.com/samratashok/nishang.git [submodule "reverse_shells/One-Lin3r"] path = reverse_shells/One-Lin3r url = https://github.com/D4Vinci/One-Lin3r.git [submodule "exploit/web/php/Chankro"] path = exploit/web/php/Chankro url = https://github.com/TarlogicSecurity/Chankro.git [submodule "enumeration/enumeration"] path = enumeration/enumeration url = https://github.com/digininja/CeWL.git [submodule "enumeration/CeWL"] path = enumeration/CeWL url = https://github.com/digininja/CeWL.git [submodule "enumeration/RustScan"] path = enumeration/RustScan url = https://github.com/RustScan/RustScan.git [submodule "post_exploitation/priv_esc/privesc-scripts/linux-exploit-suggester"] path = post_exploitation/priv_esc/privesc-scripts/linux-exploit-suggester url = https://github.com/mzet-/linux-exploit-suggester [submodule "post_exploitation/priv_esc/privesc-scripts/linux-smart-enumeration"] path = post_exploitation/priv_esc/privesc-scripts/linux-smart-enumeration url = https://github.com/diego-treitos/linux-smart-enumeration [submodule "post_exploitation/priv_esc/privesc-scripts/linuxprivchecker"] path = post_exploitation/priv_esc/privesc-scripts/linuxprivchecker url = https://github.com/linted/linuxprivchecker [submodule "exploit/windows/CVE-2021-1675"] path = exploit/windows/CVE-2021-1675 url = https://github.com/calebstewart/CVE-2021-1675 [submodule "enumeration/priv_esc/deepce"] path = enumeration/priv_esc/deepce url = https://github.com/stealthcopter/deepce.git [submodule "misc/PowerSploit"] path = misc/PowerSploit url = https://github.com/PowerShellMafia/PowerSploit.git [submodule "hashes/wordlistctl"] path = hashes/wordlistctl url = https://github.com/BlackArch/wordlistctl.git [submodule "forensics/volatility3"] path = forensics/volatility3 url = https://github.com/volatilityfoundation/volatility3.git [submodule "forensics/volatility"] path = forensics/volatility url = https://github.com/volatilityfoundation/volatility.git [submodule "exploit/web/content_security_policy/JSONBee"] path = exploit/web/content_security_policy/JSONBee url = https://github.com/zigoo0/JSONBee.git [submodule "post_exploitation/firefox_decrypt"] path = post_exploitation/firefox_decrypt url = https://github.com/unode/firefox_decrypt.git [submodule "hashes/password_cracking/colabcat"] path = hashes/password_cracking/colabcat url = https://github.com/someshkar/colabcat.git [submodule "reverse_shells/php-reverse-shell"] path = reverse_shells/php-reverse-shell url = https://github.com/ivan-sincek/php-reverse-shell.git [submodule "post_exploitation/CrackMapExec"] path = post_exploitation/CrackMapExec url = https://github.com/byt3bl33d3r/CrackMapExec.git [submodule "post_exploitation/priv_esc/Seatbelt"] path = post_exploitation/priv_esc/Seatbelt url = https://github.com/GhostPack/Seatbelt [submodule "post_exploitation/Invoke-EDRChecker"] path = post_exploitation/Invoke-EDRChecker url = https://github.com/PwnDexter/Invoke-EDRChecker.git [submodule "reverse_shells/phpreverseshell"] path = reverse_shells/phpreverseshell url = https://github.com/rootkral4/phpreverseshell.git [submodule "exploit/web/xxe/xxeserv"] path = exploit/web/xxe/xxeserv url = https://github.com/staaldraad/xxeserv.git [submodule "reverse_engineering/SCDBG"] path = reverse_engineering/SCDBG url = https://github.com/dzzie/SCDBG.git [submodule "reverse_engineering/java/deobfuscator"] path = reverse_engineering/java/deobfuscator url = https://github.com/java-deobfuscator/deobfuscator.git [submodule "exploit/windows/CrackMapExec"] path = exploit/windows/CrackMapExec url = https://github.com/byt3bl33d3r/CrackMapExec.git [submodule "telecommunications/sipvicious"] path = telecommunications/sipvicious url = https://github.com/EnableSecurity/sipvicious.git [submodule "exploit/windows/PrintNightmare"] path = exploit/windows/PrintNightmare url = https://github.com/ly4k/PrintNightmare.git [submodule "enumeration/containers/deepce"] path = enumeration/containers/deepce url = https://github.com/stealthcopter/deepce.git [submodule "enumeration/Typo3Scan"] path = enumeration/Typo3Scan url = https://github.com/whoot/Typo3Scan.git [submodule "exploit/web/php/phpggc"] path = exploit/web/php/phpggc url = https://github.com/ambionics/phpggc.git [submodule "post_exploitation/priv_esc/sucrack"] path = post_exploitation/priv_esc/sucrack url = https://github.com/hemp3l/sucrack.git [submodule "exploit/java/JNDI-Exploit-Kit"] path = exploit/java/JNDI-Exploit-Kit url = https://github.com/pimps/JNDI-Exploit-Kit.git [submodule "exploit/binaries/buffer_overflow/ropstar"] path = exploit/binaries/buffer_overflow/ropstar url = https://github.com/xct/ropstar.git [submodule "exploit/java/log4j-scan"] path = exploit/java/log4j-scan url = https://github.com/fullhunt/log4j-scan.git [submodule "misc/static-binaries"] path = misc/static-binaries url = https://github.com/andrew-d/static-binaries.git [submodule "stego/stego-toolkit"] path = stego/stego-toolkit url = https://github.com/DominicBreuker/stego-toolkit.git [submodule "exploit/windows/printspoofer"] path = exploit/windows/printspoofer url = https://github.com/dievus/printspoofer.git [submodule "post_exploitation/powershell"] path = post_exploitation/powershell url = https://github.com/puckiestyle/powershell.git [submodule "enumeration/network_scanners/kotlin-port-scanner"] path = enumeration/network_scanners/kotlin-port-scanner url = https://github.com/Hydragyrum/kotlin-port-scanner.git [submodule "exploit/macOS/ds_store_exp"] path = exploit/macOS/ds_store_exp url = https://github.com/lijiejie/ds_store_exp.git [submodule "exploit/macOS/DS_Store_crawler_parser"] path = exploit/macOS/DS_Store_crawler_parser url = https://github.com/anantshri/DS_Store_crawler_parser.git [submodule "exploit/macOS/Python-dsstore"] path = exploit/macOS/Python-dsstore url = https://github.com/gehaxelt/Python-dsstore.git [submodule "post_exploitation/armitage"] path = post_exploitation/armitage url = https://gitlab.com/kalilinux/packages/armitage.git [submodule "exploit/linux/dirty_pipe/CVE-2022-0847-dirty-pipe-exploit"] path = exploit/linux/dirty_pipe/CVE-2022-0847-dirty-pipe-exploit url = https://github.com/cspshivam/CVE-2022-0847-dirty-pipe-exploit.git [submodule "hashes/exrex"] path = hashes/exrex url = https://github.com/asciimoo/exrex.git [submodule "exploit/padding/PadBuster"] path = exploit/padding/PadBuster url = https://github.com/AonCyberLabs/PadBuster.git [submodule "enumeration/Subrake"] path = enumeration/Subrake url = https://github.com/hash3liZer/Subrake.git [submodule "post_exploitation/bc_security/Empire"] path = post_exploitation/bc_security/Empire url = https://github.com/BC-SECURITY/Empire.git [submodule "osint/LeetLinked"] path = osint/LeetLinked url = https://github.com/Sq00ky/LeetLinked.git [submodule "hashes/namely"] path = hashes/namely url = https://github.com/OrielOrielOriel/namely [submodule "misc/level3_hypervisor/kubeletctl"] path = misc/level3_hypervisor/kubeletctl url = https://github.com/cyberark/kubeletctl.git [submodule "misc/bruteforce/patator"] path = misc/bruteforce/patator url = https://github.com/lanjelot/patator.git [submodule "enumeration/enum4linux"] path = enumeration/enum4linux url = https://github.com/CiscoCXSecurity/enum4linux.git [submodule "exploit/samba/smbmap"] path = exploit/samba/smbmap url = https://github.com/ShawnDEvans/smbmap.git