253 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
			
		
		
	
	
			253 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
[submodule "enumeration/Sublist3r"]
 | 
						|
	path = enumeration/Sublist3r
 | 
						|
	url = https://github.com/aboul3la/Sublist3r.git
 | 
						|
[submodule "enumeration/gobuster"]
 | 
						|
	path = enumeration/gobuster
 | 
						|
	url = https://github.com/OJ/gobuster.git
 | 
						|
[submodule "enumeration/Checklists"]
 | 
						|
	path = enumeration/Checklists
 | 
						|
	url = https://github.com/netbiosX/Checklists.git
 | 
						|
[submodule "enumeration/kerbrute"]
 | 
						|
	path = enumeration/kerbrute
 | 
						|
	url = https://github.com/ropnop/kerbrute.git
 | 
						|
[submodule "enumeration/windows/Windows-Exploit-Suggester"]
 | 
						|
	path = enumeration/windows/Windows-Exploit-Suggester
 | 
						|
	url = https://github.com/AonCyberLabs/Windows-Exploit-Suggester.git
 | 
						|
[submodule "PayloadsAllTheThings"]
 | 
						|
	path = PayloadsAllTheThings
 | 
						|
	url = https://github.com/swisskyrepo/PayloadsAllTheThings.git
 | 
						|
[submodule "static-binaries"]
 | 
						|
	path = static-binaries
 | 
						|
	url = https://github.com/andrew-d/static-binaries.git
 | 
						|
[submodule "PowerSploit"]
 | 
						|
	path = PowerSploit
 | 
						|
	url = https://github.com/PowerShellMafia/PowerSploit.git
 | 
						|
[submodule "nishang"]
 | 
						|
	path = nishang
 | 
						|
	url = https://github.com/samratashok/nishang.git
 | 
						|
[submodule "reverse_shells/One-Lin3r"]
 | 
						|
	path = reverse_shells/One-Lin3r
 | 
						|
	url = https://github.com/D4Vinci/One-Lin3r.git
 | 
						|
[submodule "exploit/web/php/Chankro"]
 | 
						|
	path = exploit/web/php/Chankro
 | 
						|
	url = https://github.com/TarlogicSecurity/Chankro.git
 | 
						|
[submodule "enumeration/enumeration"]
 | 
						|
	path = enumeration/enumeration
 | 
						|
	url = https://github.com/digininja/CeWL.git
 | 
						|
[submodule "enumeration/CeWL"]
 | 
						|
	path = enumeration/CeWL
 | 
						|
	url = https://github.com/digininja/CeWL.git
 | 
						|
[submodule "enumeration/RustScan"]
 | 
						|
	path = enumeration/RustScan
 | 
						|
	url = https://github.com/RustScan/RustScan.git
 | 
						|
[submodule "post_exploitation/priv_esc/privesc-scripts/linux-exploit-suggester"]
 | 
						|
	path = post_exploitation/priv_esc/privesc-scripts/linux-exploit-suggester
 | 
						|
	url = https://github.com/mzet-/linux-exploit-suggester
 | 
						|
[submodule "post_exploitation/priv_esc/privesc-scripts/linux-smart-enumeration"]
 | 
						|
	path = post_exploitation/priv_esc/privesc-scripts/linux-smart-enumeration
 | 
						|
	url = https://github.com/diego-treitos/linux-smart-enumeration
 | 
						|
[submodule "post_exploitation/priv_esc/privesc-scripts/linuxprivchecker"]
 | 
						|
	path = post_exploitation/priv_esc/privesc-scripts/linuxprivchecker
 | 
						|
	url = https://github.com/linted/linuxprivchecker
 | 
						|
[submodule "exploit/windows/CVE-2021-1675"]
 | 
						|
	path = exploit/windows/CVE-2021-1675
 | 
						|
	url = https://github.com/calebstewart/CVE-2021-1675
 | 
						|
[submodule "enumeration/priv_esc/deepce"]
 | 
						|
	path = enumeration/priv_esc/deepce
 | 
						|
	url = https://github.com/stealthcopter/deepce.git
 | 
						|
[submodule "misc/PowerSploit"]
 | 
						|
	path = misc/PowerSploit
 | 
						|
	url = https://github.com/PowerShellMafia/PowerSploit.git
 | 
						|
[submodule "hashes/wordlistctl"]
 | 
						|
	path = hashes/wordlistctl
 | 
						|
	url = https://github.com/BlackArch/wordlistctl.git
 | 
						|
[submodule "forensics/volatility3"]
 | 
						|
	path = forensics/volatility3
 | 
						|
	url = https://github.com/volatilityfoundation/volatility3.git
 | 
						|
[submodule "forensics/volatility"]
 | 
						|
	path = forensics/volatility
 | 
						|
	url = https://github.com/volatilityfoundation/volatility.git
 | 
						|
[submodule "exploit/web/content_security_policy/JSONBee"]
 | 
						|
	path = exploit/web/content_security_policy/JSONBee
 | 
						|
	url = https://github.com/zigoo0/JSONBee.git
 | 
						|
[submodule "post_exploitation/firefox_decrypt"]
 | 
						|
	path = post_exploitation/firefox_decrypt
 | 
						|
	url = https://github.com/unode/firefox_decrypt.git
 | 
						|
[submodule "hashes/password_cracking/colabcat"]
 | 
						|
	path = hashes/password_cracking/colabcat
 | 
						|
	url = https://github.com/someshkar/colabcat.git
 | 
						|
[submodule "reverse_shells/php-reverse-shell"]
 | 
						|
	path = reverse_shells/php-reverse-shell
 | 
						|
	url = https://github.com/ivan-sincek/php-reverse-shell.git
 | 
						|
[submodule "post_exploitation/CrackMapExec"]
 | 
						|
	path = post_exploitation/CrackMapExec
 | 
						|
	url = https://github.com/byt3bl33d3r/CrackMapExec.git
 | 
						|
[submodule "post_exploitation/priv_esc/Seatbelt"]
 | 
						|
	path = post_exploitation/priv_esc/Seatbelt
 | 
						|
	url = https://github.com/GhostPack/Seatbelt
 | 
						|
[submodule "post_exploitation/Invoke-EDRChecker"]
 | 
						|
	path = post_exploitation/Invoke-EDRChecker
 | 
						|
	url = https://github.com/PwnDexter/Invoke-EDRChecker.git
 | 
						|
[submodule "reverse_shells/phpreverseshell"]
 | 
						|
	path = reverse_shells/phpreverseshell
 | 
						|
	url = https://github.com/rootkral4/phpreverseshell.git
 | 
						|
[submodule "exploit/web/xxe/xxeserv"]
 | 
						|
	path = exploit/web/xxe/xxeserv
 | 
						|
	url = https://github.com/staaldraad/xxeserv.git
 | 
						|
[submodule "reverse_engineering/SCDBG"]
 | 
						|
	path = reverse_engineering/SCDBG
 | 
						|
	url = https://github.com/dzzie/SCDBG.git
 | 
						|
[submodule "reverse_engineering/java/deobfuscator"]
 | 
						|
	path = reverse_engineering/java/deobfuscator
 | 
						|
	url = https://github.com/java-deobfuscator/deobfuscator.git
 | 
						|
[submodule "exploit/windows/CrackMapExec"]
 | 
						|
	path = exploit/windows/CrackMapExec
 | 
						|
	url = https://github.com/byt3bl33d3r/CrackMapExec.git
 | 
						|
[submodule "telecommunications/sipvicious"]
 | 
						|
	path = telecommunications/sipvicious
 | 
						|
	url = https://github.com/EnableSecurity/sipvicious.git
 | 
						|
[submodule "exploit/windows/PrintNightmare"]
 | 
						|
	path = exploit/windows/PrintNightmare
 | 
						|
	url = https://github.com/ly4k/PrintNightmare.git
 | 
						|
[submodule "enumeration/containers/deepce"]
 | 
						|
	path = enumeration/containers/deepce
 | 
						|
	url = https://github.com/stealthcopter/deepce.git
 | 
						|
[submodule "enumeration/Typo3Scan"]
 | 
						|
	path = enumeration/Typo3Scan
 | 
						|
	url = https://github.com/whoot/Typo3Scan.git
 | 
						|
[submodule "exploit/web/php/phpggc"]
 | 
						|
	path = exploit/web/php/phpggc
 | 
						|
	url = https://github.com/ambionics/phpggc.git
 | 
						|
[submodule "post_exploitation/priv_esc/sucrack"]
 | 
						|
	path = post_exploitation/priv_esc/sucrack
 | 
						|
	url = https://github.com/hemp3l/sucrack.git
 | 
						|
[submodule "exploit/java/JNDI-Exploit-Kit"]
 | 
						|
	path = exploit/java/JNDI-Exploit-Kit
 | 
						|
	url = https://github.com/pimps/JNDI-Exploit-Kit.git
 | 
						|
[submodule "exploit/binaries/buffer_overflow/ropstar"]
 | 
						|
	path = exploit/binaries/buffer_overflow/ropstar
 | 
						|
	url = https://github.com/xct/ropstar.git
 | 
						|
[submodule "exploit/java/log4j-scan"]
 | 
						|
	path = exploit/java/log4j-scan
 | 
						|
	url = https://github.com/fullhunt/log4j-scan.git
 | 
						|
[submodule "misc/static-binaries"]
 | 
						|
	path = misc/static-binaries
 | 
						|
	url = https://github.com/andrew-d/static-binaries.git
 | 
						|
[submodule "stego/stego-toolkit"]
 | 
						|
	path = stego/stego-toolkit
 | 
						|
	url = https://github.com/DominicBreuker/stego-toolkit.git
 | 
						|
[submodule "exploit/windows/printspoofer"]
 | 
						|
	path = exploit/windows/printspoofer
 | 
						|
	url = https://github.com/dievus/printspoofer.git
 | 
						|
[submodule "post_exploitation/powershell"]
 | 
						|
	path = post_exploitation/powershell
 | 
						|
	url = https://github.com/puckiestyle/powershell.git
 | 
						|
[submodule "enumeration/network_scanners/kotlin-port-scanner"]
 | 
						|
	path = enumeration/network_scanners/kotlin-port-scanner
 | 
						|
	url = https://github.com/Hydragyrum/kotlin-port-scanner.git
 | 
						|
[submodule "exploit/macOS/ds_store_exp"]
 | 
						|
	path = exploit/macOS/ds_store_exp
 | 
						|
	url = https://github.com/lijiejie/ds_store_exp.git
 | 
						|
[submodule "exploit/macOS/DS_Store_crawler_parser"]
 | 
						|
	path = exploit/macOS/DS_Store_crawler_parser
 | 
						|
	url = https://github.com/anantshri/DS_Store_crawler_parser.git
 | 
						|
[submodule "exploit/macOS/Python-dsstore"]
 | 
						|
	path = exploit/macOS/Python-dsstore
 | 
						|
	url = https://github.com/gehaxelt/Python-dsstore.git
 | 
						|
[submodule "post_exploitation/armitage"]
 | 
						|
	path = post_exploitation/armitage
 | 
						|
	url = https://gitlab.com/kalilinux/packages/armitage.git
 | 
						|
[submodule "exploit/linux/dirty_pipe/CVE-2022-0847-dirty-pipe-exploit"]
 | 
						|
	path = exploit/linux/dirty_pipe/CVE-2022-0847-dirty-pipe-exploit
 | 
						|
	url = https://github.com/cspshivam/CVE-2022-0847-dirty-pipe-exploit.git
 | 
						|
[submodule "hashes/exrex"]
 | 
						|
	path = hashes/exrex
 | 
						|
	url = https://github.com/asciimoo/exrex.git
 | 
						|
[submodule "exploit/padding/PadBuster"]
 | 
						|
	path = exploit/padding/PadBuster
 | 
						|
	url = https://github.com/AonCyberLabs/PadBuster.git
 | 
						|
[submodule "enumeration/Subrake"]
 | 
						|
	path = enumeration/Subrake
 | 
						|
	url = https://github.com/hash3liZer/Subrake.git
 | 
						|
[submodule "post_exploitation/bc_security/Empire"]
 | 
						|
	path = post_exploitation/bc_security/Empire
 | 
						|
	url = https://github.com/BC-SECURITY/Empire.git
 | 
						|
[submodule "osint/LeetLinked"]
 | 
						|
	path = osint/LeetLinked
 | 
						|
	url = https://github.com/Sq00ky/LeetLinked.git
 | 
						|
[submodule "hashes/namely"]
 | 
						|
	path = hashes/namely
 | 
						|
	url = https://github.com/OrielOrielOriel/namely
 | 
						|
[submodule "misc/level3_hypervisor/kubeletctl"]
 | 
						|
	path = misc/level3_hypervisor/kubeletctl
 | 
						|
	url = https://github.com/cyberark/kubeletctl.git
 | 
						|
[submodule "misc/bruteforce/patator"]
 | 
						|
	path = misc/bruteforce/patator
 | 
						|
	url = https://github.com/lanjelot/patator.git
 | 
						|
[submodule "enumeration/enum4linux"]
 | 
						|
	path = enumeration/enum4linux
 | 
						|
	url = https://github.com/CiscoCXSecurity/enum4linux.git
 | 
						|
[submodule "exploit/samba/smbmap"]
 | 
						|
	path = exploit/samba/smbmap
 | 
						|
	url = https://github.com/ShawnDEvans/smbmap.git
 | 
						|
[submodule "exploit/web/beef"]
 | 
						|
	path = exploit/web/beef
 | 
						|
	url = https://github.com/beefproject/beef.git
 | 
						|
[submodule "exploit/web/jwt/jwt-cracker"]
 | 
						|
	path = exploit/web/jwt/jwt-cracker
 | 
						|
	url = https://github.com/lmammino/jwt-cracker.git
 | 
						|
[submodule "exploit/web/jwt/jwt_tool"]
 | 
						|
	path = exploit/web/jwt/jwt_tool
 | 
						|
	url = https://github.com/ticarpi/jwt_tool.git
 | 
						|
[submodule "exploit/web/ssti/tplmap"]
 | 
						|
	path = exploit/web/ssti/tplmap
 | 
						|
	url = https://github.com/epinna/tplmap.git
 | 
						|
[submodule "exploit/windows/impacket"]
 | 
						|
	path = exploit/windows/impacket
 | 
						|
	url = https://github.com/SecureAuthCorp/impacket.git
 | 
						|
[submodule "exploit/windows/windows-kernel-exploits"]
 | 
						|
	path = exploit/windows/windows-kernel-exploits
 | 
						|
	url = https://github.com/SecWiki/windows-kernel-exploits.git
 | 
						|
[submodule "exploit/PayloadsAllTheThings"]
 | 
						|
	path = exploit/PayloadsAllTheThings
 | 
						|
	url = https://github.com/swisskyrepo/PayloadsAllTheThings.git
 | 
						|
[submodule "exploit/GitTools"]
 | 
						|
	path = exploit/GitTools
 | 
						|
	url = https://github.com/internetwache/GitTools
 | 
						|
[submodule "misc/nishang"]
 | 
						|
	path = misc/nishang
 | 
						|
	url = https://github.com/samratashok/nishang.git
 | 
						|
[submodule "misc/printer_hacking/PRET"]
 | 
						|
	path = misc/printer_hacking/PRET
 | 
						|
	url = https://github.com/RUB-NDS/PRET.git
 | 
						|
[submodule "misc/level3_hypervisor/docker_sec/dive"]
 | 
						|
	path = misc/level3_hypervisor/docker_sec/dive
 | 
						|
	url = https://github.com/wagoodman/dive.git
 | 
						|
[submodule "post_exploitation/kerberoast"]
 | 
						|
	path = post_exploitation/kerberoast
 | 
						|
	url = https://github.com/nidem/kerberoast.git
 | 
						|
[submodule "post_exploitation/mimikatz"]
 | 
						|
	path = post_exploitation/mimikatz
 | 
						|
	url = https://github.com/gentilkiwi/mimikatz.git
 | 
						|
[submodule "post_exploitation/priv_esc/privesc-scripts/LinEnum"]
 | 
						|
	path = post_exploitation/priv_esc/privesc-scripts/LinEnum
 | 
						|
	url = https://github.com/rebootuser/LinEnum.git
 | 
						|
[submodule "post_exploitation/priv_esc/privesc-scripts/privilege-escalation-awesome-scripts-suite"]
 | 
						|
	path = post_exploitation/priv_esc/privesc-scripts/privilege-escalation-awesome-scripts-suite
 | 
						|
	url = https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite.git
 | 
						|
[submodule "post_exploitation/bc_security/Starkiller"]
 | 
						|
	path = post_exploitation/bc_security/Starkiller
 | 
						|
	url = https://github.com/BC-SECURITY/Starkiller.git
 | 
						|
[submodule "reverse_shells/windows/evil-winrm"]
 | 
						|
	path = reverse_shells/windows/evil-winrm
 | 
						|
	url = https://github.com/Hackplayers/evil-winrm.git
 | 
						|
[submodule "exploit/level3_hypervisor/docker_sec/dive"]
 | 
						|
	path = exploit/level3_hypervisor/docker_sec/dive
 | 
						|
	url = https://github.com/wagoodman/dive.git
 | 
						|
[submodule "exploit/level3_hypervisor/kubeletctl"]
 | 
						|
	path = exploit/level3_hypervisor/kubeletctl
 | 
						|
	url = https://github.com/cyberark/kubeletctl.git
 | 
						|
[submodule "hashes/bruteforce/patator"]
 | 
						|
	path = hashes/bruteforce/patator
 | 
						|
	url = https://github.com/lanjelot/patator.git
 |