61 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
			
		
		
	
	
			61 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
[submodule "enumeration/Sublist3r"]
 | 
						|
	path = enumeration/Sublist3r
 | 
						|
	url = https://github.com/aboul3la/Sublist3r.git
 | 
						|
[submodule "enumeration/gobuster"]
 | 
						|
	path = enumeration/gobuster
 | 
						|
	url = https://github.com/OJ/gobuster.git
 | 
						|
[submodule "enumeration/Checklists"]
 | 
						|
	path = enumeration/Checklists
 | 
						|
	url = https://github.com/netbiosX/Checklists.git
 | 
						|
[submodule "enumeration/kerbrute"]
 | 
						|
	path = enumeration/kerbrute
 | 
						|
	url = https://github.com/ropnop/kerbrute.git
 | 
						|
[submodule "enumeration/windows/Windows-Exploit-Suggester"]
 | 
						|
	path = enumeration/windows/Windows-Exploit-Suggester
 | 
						|
	url = https://github.com/AonCyberLabs/Windows-Exploit-Suggester.git
 | 
						|
[submodule "PayloadsAllTheThings"]
 | 
						|
	path = PayloadsAllTheThings
 | 
						|
	url = https://github.com/swisskyrepo/PayloadsAllTheThings.git
 | 
						|
[submodule "static-binaries"]
 | 
						|
	path = static-binaries
 | 
						|
	url = https://github.com/andrew-d/static-binaries.git
 | 
						|
[submodule "PowerSploit"]
 | 
						|
	path = PowerSploit
 | 
						|
	url = https://github.com/PowerShellMafia/PowerSploit.git
 | 
						|
[submodule "nishang"]
 | 
						|
	path = nishang
 | 
						|
	url = https://github.com/samratashok/nishang.git
 | 
						|
[submodule "reverse_shells/One-Lin3r"]
 | 
						|
	path = reverse_shells/One-Lin3r
 | 
						|
	url = https://github.com/D4Vinci/One-Lin3r.git
 | 
						|
[submodule "exploit/web/php/Chankro"]
 | 
						|
	path = exploit/web/php/Chankro
 | 
						|
	url = https://github.com/TarlogicSecurity/Chankro.git
 | 
						|
[submodule "enumeration/enumeration"]
 | 
						|
	path = enumeration/enumeration
 | 
						|
	url = https://github.com/digininja/CeWL.git
 | 
						|
[submodule "enumeration/CeWL"]
 | 
						|
	path = enumeration/CeWL
 | 
						|
	url = https://github.com/digininja/CeWL.git
 | 
						|
[submodule "enumeration/RustScan"]
 | 
						|
	path = enumeration/RustScan
 | 
						|
	url = https://github.com/RustScan/RustScan.git
 | 
						|
[submodule "post_exploitation/priv_esc/privesc-scripts/linux-exploit-suggester"]
 | 
						|
	path = post_exploitation/priv_esc/privesc-scripts/linux-exploit-suggester
 | 
						|
	url = https://github.com/mzet-/linux-exploit-suggester
 | 
						|
[submodule "post_exploitation/priv_esc/privesc-scripts/linux-smart-enumeration"]
 | 
						|
	path = post_exploitation/priv_esc/privesc-scripts/linux-smart-enumeration
 | 
						|
	url = https://github.com/diego-treitos/linux-smart-enumeration
 | 
						|
[submodule "post_exploitation/priv_esc/privesc-scripts/linuxprivchecker"]
 | 
						|
	path = post_exploitation/priv_esc/privesc-scripts/linuxprivchecker
 | 
						|
	url = https://github.com/linted/linuxprivchecker
 | 
						|
[submodule "exploit/windows/CVE-2021-1675"]
 | 
						|
	path = exploit/windows/CVE-2021-1675
 | 
						|
	url = https://github.com/calebstewart/CVE-2021-1675
 | 
						|
[submodule "enumeration/priv_esc/deepce"]
 | 
						|
	path = enumeration/priv_esc/deepce
 | 
						|
	url = https://github.com/stealthcopter/deepce.git
 | 
						|
[submodule "misc/PowerSploit"]
 | 
						|
	path = misc/PowerSploit
 | 
						|
	url = https://github.com/PowerShellMafia/PowerSploit.git
 |