[submodule "enumeration/Sublist3r"]
	path = enumeration/Sublist3r
	url = https://github.com/aboul3la/Sublist3r.git
[submodule "enumeration/gobuster"]
	path = enumeration/gobuster
	url = https://github.com/OJ/gobuster.git
[submodule "enumeration/Checklists"]
	path = enumeration/Checklists
	url = https://github.com/netbiosX/Checklists.git
[submodule "enumeration/kerbrute"]
	path = enumeration/kerbrute
	url = https://github.com/ropnop/kerbrute.git
[submodule "enumeration/windows/Windows-Exploit-Suggester"]
	path = enumeration/windows/Windows-Exploit-Suggester
	url = https://github.com/AonCyberLabs/Windows-Exploit-Suggester.git
[submodule "PayloadsAllTheThings"]
	path = PayloadsAllTheThings
	url = https://github.com/swisskyrepo/PayloadsAllTheThings.git
[submodule "static-binaries"]
	path = static-binaries
	url = https://github.com/andrew-d/static-binaries.git
[submodule "PowerSploit"]
	path = PowerSploit
	url = https://github.com/PowerShellMafia/PowerSploit.git
[submodule "nishang"]
	path = nishang
	url = https://github.com/samratashok/nishang.git
[submodule "reverse_shells/One-Lin3r"]
	path = reverse_shells/One-Lin3r
	url = https://github.com/D4Vinci/One-Lin3r.git
[submodule "exploit/web/php/Chankro"]
	path = exploit/web/php/Chankro
	url = https://github.com/TarlogicSecurity/Chankro.git
[submodule "enumeration/enumeration"]
	path = enumeration/enumeration
	url = https://github.com/digininja/CeWL.git
[submodule "enumeration/CeWL"]
	path = enumeration/CeWL
	url = https://github.com/digininja/CeWL.git
[submodule "enumeration/RustScan"]
	path = enumeration/RustScan
	url = https://github.com/RustScan/RustScan.git
[submodule "post_exploitation/priv_esc/privesc-scripts/linux-exploit-suggester"]
	path = post_exploitation/priv_esc/privesc-scripts/linux-exploit-suggester
	url = https://github.com/mzet-/linux-exploit-suggester
[submodule "post_exploitation/priv_esc/privesc-scripts/linux-smart-enumeration"]
	path = post_exploitation/priv_esc/privesc-scripts/linux-smart-enumeration
	url = https://github.com/diego-treitos/linux-smart-enumeration
[submodule "post_exploitation/priv_esc/privesc-scripts/linuxprivchecker"]
	path = post_exploitation/priv_esc/privesc-scripts/linuxprivchecker
	url = https://github.com/linted/linuxprivchecker
[submodule "exploit/windows/CVE-2021-1675"]
	path = exploit/windows/CVE-2021-1675
	url = https://github.com/calebstewart/CVE-2021-1675
[submodule "enumeration/priv_esc/deepce"]
	path = enumeration/priv_esc/deepce
	url = https://github.com/stealthcopter/deepce.git
[submodule "misc/PowerSploit"]
	path = misc/PowerSploit
	url = https://github.com/PowerShellMafia/PowerSploit.git
[submodule "hashes/wordlistctl"]
	path = hashes/wordlistctl
	url = https://github.com/BlackArch/wordlistctl.git
[submodule "forensics/volatility3"]
	path = forensics/volatility3
	url = https://github.com/volatilityfoundation/volatility3.git
[submodule "forensics/volatility"]
	path = forensics/volatility
	url = https://github.com/volatilityfoundation/volatility.git
[submodule "exploit/web/content_security_policy/JSONBee"]
	path = exploit/web/content_security_policy/JSONBee
	url = https://github.com/zigoo0/JSONBee.git
[submodule "post_exploitation/firefox_decrypt"]
	path = post_exploitation/firefox_decrypt
	url = https://github.com/unode/firefox_decrypt.git
[submodule "hashes/password_cracking/colabcat"]
	path = hashes/password_cracking/colabcat
	url = https://github.com/someshkar/colabcat.git
[submodule "reverse_shells/php-reverse-shell"]
	path = reverse_shells/php-reverse-shell
	url = https://github.com/ivan-sincek/php-reverse-shell.git
[submodule "post_exploitation/CrackMapExec"]
	path = post_exploitation/CrackMapExec
	url = https://github.com/byt3bl33d3r/CrackMapExec.git
[submodule "post_exploitation/priv_esc/Seatbelt"]
	path = post_exploitation/priv_esc/Seatbelt
	url = https://github.com/GhostPack/Seatbelt
[submodule "post_exploitation/Invoke-EDRChecker"]
	path = post_exploitation/Invoke-EDRChecker
	url = https://github.com/PwnDexter/Invoke-EDRChecker.git
[submodule "reverse_shells/phpreverseshell"]
	path = reverse_shells/phpreverseshell
	url = https://github.com/rootkral4/phpreverseshell.git
[submodule "exploit/web/xxe/xxeserv"]
	path = exploit/web/xxe/xxeserv
	url = https://github.com/staaldraad/xxeserv.git
[submodule "reverse_engineering/SCDBG"]
	path = reverse_engineering/SCDBG
	url = https://github.com/dzzie/SCDBG.git
[submodule "reverse_engineering/java/deobfuscator"]
	path = reverse_engineering/java/deobfuscator
	url = https://github.com/java-deobfuscator/deobfuscator.git
[submodule "exploit/windows/CrackMapExec"]
	path = exploit/windows/CrackMapExec
	url = https://github.com/byt3bl33d3r/CrackMapExec.git