[submodule "enumeration/Sublist3r"] path = enumeration/Sublist3r url = https://github.com/aboul3la/Sublist3r.git [submodule "enumeration/gobuster"] path = enumeration/gobuster url = https://github.com/OJ/gobuster.git [submodule "enumeration/Checklists"] path = enumeration/Checklists url = https://github.com/netbiosX/Checklists.git [submodule "enumeration/kerbrute"] path = enumeration/kerbrute url = https://github.com/ropnop/kerbrute.git [submodule "enumeration/windows/Windows-Exploit-Suggester"] path = enumeration/windows/Windows-Exploit-Suggester url = https://github.com/AonCyberLabs/Windows-Exploit-Suggester.git [submodule "PayloadsAllTheThings"] path = PayloadsAllTheThings url = https://github.com/swisskyrepo/PayloadsAllTheThings.git [submodule "static-binaries"] path = static-binaries url = https://github.com/andrew-d/static-binaries.git [submodule "PowerSploit"] path = PowerSploit url = https://github.com/PowerShellMafia/PowerSploit.git [submodule "nishang"] path = nishang url = https://github.com/samratashok/nishang.git [submodule "reverse_shells/One-Lin3r"] path = reverse_shells/One-Lin3r url = https://github.com/D4Vinci/One-Lin3r.git [submodule "exploit/web/php/Chankro"] path = exploit/web/php/Chankro url = https://github.com/TarlogicSecurity/Chankro.git [submodule "enumeration/enumeration"] path = enumeration/enumeration url = https://github.com/digininja/CeWL.git [submodule "enumeration/CeWL"] path = enumeration/CeWL url = https://github.com/digininja/CeWL.git [submodule "enumeration/RustScan"] path = enumeration/RustScan url = https://github.com/RustScan/RustScan.git [submodule "post_exploitation/priv_esc/privesc-scripts/linux-exploit-suggester"] path = post_exploitation/priv_esc/privesc-scripts/linux-exploit-suggester url = https://github.com/mzet-/linux-exploit-suggester [submodule "post_exploitation/priv_esc/privesc-scripts/linux-smart-enumeration"] path = post_exploitation/priv_esc/privesc-scripts/linux-smart-enumeration url = https://github.com/diego-treitos/linux-smart-enumeration [submodule "post_exploitation/priv_esc/privesc-scripts/linuxprivchecker"] path = post_exploitation/priv_esc/privesc-scripts/linuxprivchecker url = https://github.com/linted/linuxprivchecker [submodule "exploit/windows/CVE-2021-1675"] path = exploit/windows/CVE-2021-1675 url = https://github.com/calebstewart/CVE-2021-1675 [submodule "enumeration/priv_esc/deepce"] path = enumeration/priv_esc/deepce url = https://github.com/stealthcopter/deepce.git [submodule "misc/PowerSploit"] path = misc/PowerSploit url = https://github.com/PowerShellMafia/PowerSploit.git [submodule "hashes/wordlistctl"] path = hashes/wordlistctl url = https://github.com/BlackArch/wordlistctl.git [submodule "forensics/volatility3"] path = forensics/volatility3 url = https://github.com/volatilityfoundation/volatility3.git [submodule "forensics/volatility"] path = forensics/volatility url = https://github.com/volatilityfoundation/volatility.git [submodule "exploit/web/content_security_policy/JSONBee"] path = exploit/web/content_security_policy/JSONBee url = https://github.com/zigoo0/JSONBee.git [submodule "post_exploitation/firefox_decrypt"] path = post_exploitation/firefox_decrypt url = https://github.com/unode/firefox_decrypt.git [submodule "hashes/password_cracking/colabcat"] path = hashes/password_cracking/colabcat url = https://github.com/someshkar/colabcat.git [submodule "reverse_shells/php-reverse-shell"] path = reverse_shells/php-reverse-shell url = https://github.com/ivan-sincek/php-reverse-shell.git [submodule "post_exploitation/CrackMapExec"] path = post_exploitation/CrackMapExec url = https://github.com/byt3bl33d3r/CrackMapExec.git [submodule "post_exploitation/priv_esc/Seatbelt"] path = post_exploitation/priv_esc/Seatbelt url = https://github.com/GhostPack/Seatbelt [submodule "post_exploitation/Invoke-EDRChecker"] path = post_exploitation/Invoke-EDRChecker url = https://github.com/PwnDexter/Invoke-EDRChecker.git [submodule "reverse_shells/phpreverseshell"] path = reverse_shells/phpreverseshell url = https://github.com/rootkral4/phpreverseshell.git [submodule "exploit/web/xxe/xxeserv"] path = exploit/web/xxe/xxeserv url = https://github.com/staaldraad/xxeserv.git [submodule "reverse_engineering/SCDBG"] path = reverse_engineering/SCDBG url = https://github.com/dzzie/SCDBG.git [submodule "reverse_engineering/java/deobfuscator"] path = reverse_engineering/java/deobfuscator url = https://github.com/java-deobfuscator/deobfuscator.git [submodule "exploit/windows/CrackMapExec"] path = exploit/windows/CrackMapExec url = https://github.com/byt3bl33d3r/CrackMapExec.git [submodule "telecommunications/sipvicious"] path = telecommunications/sipvicious url = https://github.com/EnableSecurity/sipvicious.git