[submodule "PayloadsAllTheThings"] path = PayloadsAllTheThings url = https://github.com/swisskyrepo/PayloadsAllTheThings.git [submodule "static-binaries"] path = static-binaries url = https://github.com/andrew-d/static-binaries.git [submodule "PowerSploit"] path = PowerSploit url = https://github.com/PowerShellMafia/PowerSploit.git [submodule "nishang"] path = nishang url = https://github.com/samratashok/nishang.git [submodule "reverse_shells/One-Lin3r"] path = reverse_shells/One-Lin3r url = https://github.com/D4Vinci/One-Lin3r.git [submodule "enumeration/enumeration"] path = enumeration/enumeration url = https://github.com/digininja/CeWL.git [submodule "post_exploitation/priv_esc/privesc-scripts/linux-exploit-suggester"] path = post_exploitation/priv_esc/privesc-scripts/linux-exploit-suggester url = https://github.com/mzet-/linux-exploit-suggester [submodule "post_exploitation/priv_esc/privesc-scripts/linux-smart-enumeration"] path = post_exploitation/priv_esc/privesc-scripts/linux-smart-enumeration url = https://github.com/diego-treitos/linux-smart-enumeration [submodule "post_exploitation/priv_esc/privesc-scripts/linuxprivchecker"] path = post_exploitation/priv_esc/privesc-scripts/linuxprivchecker url = https://github.com/linted/linuxprivchecker [submodule "exploit/windows/CVE-2021-1675"] path = exploit/windows/CVE-2021-1675 url = https://github.com/calebstewart/CVE-2021-1675 [submodule "enumeration/priv_esc/deepce"] path = enumeration/priv_esc/deepce url = https://github.com/stealthcopter/deepce.git [submodule "post_exploitation/firefox_decrypt"] path = post_exploitation/firefox_decrypt url = https://github.com/unode/firefox_decrypt.git [submodule "reverse_shells/php-reverse-shell"] path = reverse_shells/php-reverse-shell url = https://github.com/ivan-sincek/php-reverse-shell.git [submodule "post_exploitation/CrackMapExec"] path = post_exploitation/CrackMapExec url = https://github.com/byt3bl33d3r/CrackMapExec.git [submodule "post_exploitation/priv_esc/Seatbelt"] path = post_exploitation/priv_esc/Seatbelt url = https://github.com/GhostPack/Seatbelt [submodule "post_exploitation/Invoke-EDRChecker"] path = post_exploitation/Invoke-EDRChecker url = https://github.com/PwnDexter/Invoke-EDRChecker.git [submodule "reverse_shells/phpreverseshell"] path = reverse_shells/phpreverseshell url = https://github.com/rootkral4/phpreverseshell.git [submodule "reverse_engineering/SCDBG"] path = reverse_engineering/SCDBG url = https://github.com/dzzie/SCDBG.git [submodule "reverse_engineering/java/deobfuscator"] path = reverse_engineering/java/deobfuscator url = https://github.com/java-deobfuscator/deobfuscator.git [submodule "telecommunications/sipvicious"] path = telecommunications/sipvicious url = https://github.com/EnableSecurity/sipvicious.git [submodule "exploit/windows/PrintNightmare"] path = exploit/windows/PrintNightmare url = https://github.com/ly4k/PrintNightmare.git [submodule "post_exploitation/priv_esc/sucrack"] path = post_exploitation/priv_esc/sucrack url = https://github.com/hemp3l/sucrack.git [submodule "exploit/windows/printspoofer"] path = exploit/windows/printspoofer url = https://github.com/dievus/printspoofer.git [submodule "post_exploitation/powershell"] path = post_exploitation/powershell url = https://github.com/puckiestyle/powershell.git [submodule "post_exploitation/armitage"] path = post_exploitation/armitage url = https://gitlab.com/kalilinux/packages/armitage.git [submodule "post_exploitation/bc_security/Empire"] path = post_exploitation/bc_security/Empire url = https://github.com/BC-SECURITY/Empire.git [submodule "misc/level3_hypervisor/kubeletctl"] path = misc/level3_hypervisor/kubeletctl url = https://github.com/cyberark/kubeletctl.git [submodule "misc/bruteforce/patator"] path = misc/bruteforce/patator url = https://github.com/lanjelot/patator.git [submodule "misc/level3_hypervisor/docker_sec/dive"] path = misc/level3_hypervisor/docker_sec/dive url = https://github.com/wagoodman/dive.git [submodule "post_exploitation/kerberoast"] path = post_exploitation/kerberoast url = https://github.com/nidem/kerberoast.git [submodule "post_exploitation/mimikatz"] path = post_exploitation/mimikatz url = https://github.com/gentilkiwi/mimikatz.git [submodule "post_exploitation/priv_esc/privesc-scripts/LinEnum"] path = post_exploitation/priv_esc/privesc-scripts/LinEnum url = https://github.com/rebootuser/LinEnum.git [submodule "post_exploitation/priv_esc/privesc-scripts/privilege-escalation-awesome-scripts-suite"] path = post_exploitation/priv_esc/privesc-scripts/privilege-escalation-awesome-scripts-suite url = https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite.git [submodule "post_exploitation/bc_security/Starkiller"] path = post_exploitation/bc_security/Starkiller url = https://github.com/BC-SECURITY/Starkiller.git [submodule "reverse_shells/windows/evil-winrm"] path = reverse_shells/windows/evil-winrm url = https://github.com/Hackplayers/evil-winrm.git