[submodule "enumeration/Sublist3r"] path = enumeration/Sublist3r url = https://github.com/aboul3la/Sublist3r.git [submodule "enumeration/gobuster"] path = enumeration/gobuster url = https://github.com/OJ/gobuster.git [submodule "enumeration/Checklists"] path = enumeration/Checklists url = https://github.com/netbiosX/Checklists.git [submodule "enumeration/kerbrute"] path = enumeration/kerbrute url = https://github.com/ropnop/kerbrute.git [submodule "enumeration/windows/Windows-Exploit-Suggester"] path = enumeration/windows/Windows-Exploit-Suggester url = https://github.com/AonCyberLabs/Windows-Exploit-Suggester.git [submodule "PayloadsAllTheThings"] path = PayloadsAllTheThings url = https://github.com/swisskyrepo/PayloadsAllTheThings.git [submodule "static-binaries"] path = static-binaries url = https://github.com/andrew-d/static-binaries.git [submodule "PowerSploit"] path = PowerSploit url = https://github.com/PowerShellMafia/PowerSploit.git [submodule "nishang"] path = nishang url = https://github.com/samratashok/nishang.git [submodule "reverse_shells/One-Lin3r"] path = reverse_shells/One-Lin3r url = https://github.com/D4Vinci/One-Lin3r.git [submodule "exploit/web/php/Chankro"] path = exploit/web/php/Chankro url = https://github.com/TarlogicSecurity/Chankro.git [submodule "enumeration/enumeration"] path = enumeration/enumeration url = https://github.com/digininja/CeWL.git [submodule "enumeration/CeWL"] path = enumeration/CeWL url = https://github.com/digininja/CeWL.git [submodule "enumeration/RustScan"] path = enumeration/RustScan url = https://github.com/RustScan/RustScan.git [submodule "post_exploitation/priv_esc/privesc-scripts/linux-exploit-suggester"] path = post_exploitation/priv_esc/privesc-scripts/linux-exploit-suggester url = https://github.com/mzet-/linux-exploit-suggester [submodule "post_exploitation/priv_esc/privesc-scripts/linux-smart-enumeration"] path = post_exploitation/priv_esc/privesc-scripts/linux-smart-enumeration url = https://github.com/diego-treitos/linux-smart-enumeration [submodule "post_exploitation/priv_esc/privesc-scripts/linuxprivchecker"] path = post_exploitation/priv_esc/privesc-scripts/linuxprivchecker url = https://github.com/linted/linuxprivchecker [submodule "exploit/windows/CVE-2021-1675"] path = exploit/windows/CVE-2021-1675 url = https://github.com/calebstewart/CVE-2021-1675 [submodule "enumeration/priv_esc/deepce"] path = enumeration/priv_esc/deepce url = https://github.com/stealthcopter/deepce.git