mirror of
				https://github.com/mgeeky/Penetration-Testing-Tools.git
				synced 2025-11-04 04:55:26 +01:00 
			
		
		
		
	Reworked submodules.
This commit is contained in:
		
							
								
								
									
										9
									
								
								.gitmodules
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										9
									
								
								.gitmodules
									
									
									
									
										vendored
									
									
								
							@@ -19,3 +19,12 @@
 | 
			
		||||
[submodule "web/arachni-launching-script"]
 | 
			
		||||
	path = web/arachni-launching-script
 | 
			
		||||
	url = git@github.com:mgeeky/arachni-launching-script.git
 | 
			
		||||
[submodule "red-teaming/RobustPentestMacro"]
 | 
			
		||||
	path = red-teaming/RobustPentestMacro
 | 
			
		||||
	url = https://github.com/mgeeky/RobustPentestMacro
 | 
			
		||||
[submodule "red-teaming/VisualBasicObfuscator"]
 | 
			
		||||
	path = red-teaming/VisualBasicObfuscator
 | 
			
		||||
	url = git@github.com:mgeeky/VisualBasicObfuscator.git
 | 
			
		||||
[submodule "red-teaming/PhishingPost"]
 | 
			
		||||
	path = red-teaming/PhishingPost
 | 
			
		||||
	url = git@github.com:mgeeky/PhishingPost.git
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										1
									
								
								red-teaming/PhishingPost
									
									
									
									
									
										Submodule
									
								
							
							
								
								
								
								
								
							
						
						
									
										1
									
								
								red-teaming/PhishingPost
									
									
									
									
									
										Submodule
									
								
							 Submodule red-teaming/PhishingPost added at bbb1add733
									
								
							@@ -20,10 +20,10 @@ IEX (New-Object IO.StreamReader(New-Object IO.Compression.GzipStream($s, [IO.Com
 | 
			
		||||
 | 
			
		||||
- **`Export-ReconData.ps1`** - Powershell script leveraging [PowerSploit Recon](https://github.com/PowerShellMafia/PowerSploit) module (PowerView) to save output from Reconnaissance cmdlets like `Get-Net*`, `Invoke-*` into _Clixml_ files. Those files can later be extracted from attacked environment and loaded to a new powershell runspace using the same script. Very useful when we want to obtain as many data as possible, then exfiltrate that data, review it in our safe place and then get back to attacked domain for lateral spread.
 | 
			
		||||
 | 
			
		||||
Exposed functions:
 | 
			
		||||
- `Export-ReconData` - Launches many cmdlets and exports their Clixml outputs.
 | 
			
		||||
- `Import-ReconData -DirName <DIR>` - Loads Clixml previously exported outputs and stores them in Global variables reachable when script terminates.
 | 
			
		||||
- `Get-ReconData -DirName <DIR>` - Gets names of variables that were created and contains previously imported data.
 | 
			
		||||
    Exposed functions:
 | 
			
		||||
    - `Export-ReconData` - Launches many cmdlets and exports their Clixml outputs.
 | 
			
		||||
    - `Import-ReconData -DirName <DIR>` - Loads Clixml previously exported outputs and stores them in Global variables reachable when script terminates.
 | 
			
		||||
    - `Get-ReconData -DirName <DIR>` - Gets names of variables that were created and contains previously imported data.
 | 
			
		||||
 | 
			
		||||
```
 | 
			
		||||
PS E:\PowerSploit\Recon> Load-ReconData -DirName .\PowerView-12-18-2018-08-30-09
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										1
									
								
								red-teaming/RobustPentestMacro
									
									
									
									
									
										Submodule
									
								
							
							
								
								
								
								
								
							
						
						
									
										1
									
								
								red-teaming/RobustPentestMacro
									
									
									
									
									
										Submodule
									
								
							 Submodule red-teaming/RobustPentestMacro added at 32992adea5
									
								
							
							
								
								
									
										1
									
								
								red-teaming/VisualBasicObfuscator
									
									
									
									
									
										Submodule
									
								
							
							
								
								
								
								
								
							
						
						
									
										1
									
								
								red-teaming/VisualBasicObfuscator
									
									
									
									
									
										Submodule
									
								
							 Submodule red-teaming/VisualBasicObfuscator added at 80e7515ed6
									
								
							
		Reference in New Issue
	
	Block a user