diff --git a/.gitmodules b/.gitmodules index 99ba82d..4f2b2cc 100644 --- a/.gitmodules +++ b/.gitmodules @@ -19,3 +19,12 @@ [submodule "web/arachni-launching-script"] path = web/arachni-launching-script url = git@github.com:mgeeky/arachni-launching-script.git +[submodule "red-teaming/RobustPentestMacro"] + path = red-teaming/RobustPentestMacro + url = https://github.com/mgeeky/RobustPentestMacro +[submodule "red-teaming/VisualBasicObfuscator"] + path = red-teaming/VisualBasicObfuscator + url = git@github.com:mgeeky/VisualBasicObfuscator.git +[submodule "red-teaming/PhishingPost"] + path = red-teaming/PhishingPost + url = git@github.com:mgeeky/PhishingPost.git diff --git a/red-teaming/PhishingPost b/red-teaming/PhishingPost new file mode 160000 index 0000000..bbb1add --- /dev/null +++ b/red-teaming/PhishingPost @@ -0,0 +1 @@ +Subproject commit bbb1add73362df40f04860a036926a71b96970c7 diff --git a/red-teaming/README.md b/red-teaming/README.md index 4c564c5..f8a120b 100644 --- a/red-teaming/README.md +++ b/red-teaming/README.md @@ -20,10 +20,10 @@ IEX (New-Object IO.StreamReader(New-Object IO.Compression.GzipStream($s, [IO.Com - **`Export-ReconData.ps1`** - Powershell script leveraging [PowerSploit Recon](https://github.com/PowerShellMafia/PowerSploit) module (PowerView) to save output from Reconnaissance cmdlets like `Get-Net*`, `Invoke-*` into _Clixml_ files. Those files can later be extracted from attacked environment and loaded to a new powershell runspace using the same script. Very useful when we want to obtain as many data as possible, then exfiltrate that data, review it in our safe place and then get back to attacked domain for lateral spread. -Exposed functions: -- `Export-ReconData` - Launches many cmdlets and exports their Clixml outputs. -- `Import-ReconData -DirName