forked from mgeeky/Penetration-Testing-Tools
-
Notifications
You must be signed in to change notification settings - Fork 0
/
.gitmodules
63 lines (63 loc) · 2.42 KB
/
.gitmodules
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
[submodule "web/tomcatWarDeployer"]
path = web/tomcatWarDeployer
url = https://github.com/mgeeky/tomcatWarDeployer.git
[submodule "web/burpContextAwareFuzzer"]
path = web/burpContextAwareFuzzer
url = https://github.com/mgeeky/burpContextAwareFuzzer.git
[submodule "web/dirbuster"]
path = web/dirbuster
url = https://github.com/mgeeky/dirbuster.git
[submodule "phishing/RobustPentestMacro"]
path = phishing/RobustPentestMacro
url = https://github.com/mgeeky/RobustPentestMacro
[submodule "phishing/VisualBasicObfuscator"]
path = phishing/VisualBasicObfuscator
url = https://github.com/mgeeky/VisualBasicObfuscator.git
[submodule "phishing/PhishingPost"]
path = phishing/PhishingPost
url = https://github.com/mgeeky/PhishingPost.git
[submodule "web/proxy2"]
path = web/proxy2
url = https://github.com/mgeeky/proxy2
[submodule "red-teaming/Stracciatella"]
path = red-teaming/Stracciatella
url = https://github.com/mgeeky/Stracciatella.git
[submodule "red-teaming/cobalt-arsenal"]
path = red-teaming/cobalt-arsenal
url = https://github.com/mgeeky/cobalt-arsenal.git
[submodule "windows/PE-library"]
path = windows/PE-library
url = https://github.com/mgeeky/PE-library
[submodule "red-teaming/SharpWMI"]
path = red-teaming/SharpWMI
url = https://github.com/mgeeky/SharpWMI
[submodule "windows/UnhookMe"]
path = windows/UnhookMe
url = https://github.com/mgeeky/UnhookMe
[submodule "red-teaming/CobaltSplunk"]
path = red-teaming/CobaltSplunk
url = https://github.com/mgeeky/CobaltSplunk
[submodule "red-teaming/SharpWebServer"]
path = red-teaming/SharpWebServer
url = https://github.com/mgeeky/SharpWebServer
[submodule "red-teaming/RedWarden"]
path = red-teaming/RedWarden
url = https://github.com/mgeeky/RedWarden
[submodule "red-teaming/ElusiveMice"]
path = red-teaming/ElusiveMice
url = https://github.com/mgeeky/ElusiveMice
[submodule "windows/ThreadStackSpoofer"]
path = windows/ThreadStackSpoofer
url = https://github.com/mgeeky/ThreadStackSpoofer
[submodule "windows/ShellcodeFluctuation"]
path = windows/ShellcodeFluctuation
url = https://github.com/mgeeky/ShellcodeFluctuation
[submodule "phishing/decode-spam-headers"]
path = phishing/decode-spam-headers
url = https://github.com/mgeeky/decode-spam-headers
[submodule "clouds/azure/AzureRT"]
path = clouds/azure/AzureRT
url = https://github.com/mgeeky/AzureRT
[submodule "file-formats/PackMyPayload"]
path = file-formats/PackMyPayload
url = https://github.com/mgeeky/PackMyPayload