From 7b0605bff801a5d2bd7877ee3fee2160e07611f3 Mon Sep 17 00:00:00 2001 From: mb Date: Tue, 18 Dec 2018 17:56:40 +0100 Subject: [PATCH] Reworked submodules. --- .gitmodules | 9 +++++++++ red-teaming/PhishingPost | 1 + red-teaming/README.md | 8 ++++---- red-teaming/RobustPentestMacro | 1 + red-teaming/VisualBasicObfuscator | 1 + 5 files changed, 16 insertions(+), 4 deletions(-) create mode 160000 red-teaming/PhishingPost create mode 160000 red-teaming/RobustPentestMacro create mode 160000 red-teaming/VisualBasicObfuscator diff --git a/.gitmodules b/.gitmodules index 99ba82d..4f2b2cc 100644 --- a/.gitmodules +++ b/.gitmodules @@ -19,3 +19,12 @@ [submodule "web/arachni-launching-script"] path = web/arachni-launching-script url = git@github.com:mgeeky/arachni-launching-script.git +[submodule "red-teaming/RobustPentestMacro"] + path = red-teaming/RobustPentestMacro + url = https://github.com/mgeeky/RobustPentestMacro +[submodule "red-teaming/VisualBasicObfuscator"] + path = red-teaming/VisualBasicObfuscator + url = git@github.com:mgeeky/VisualBasicObfuscator.git +[submodule "red-teaming/PhishingPost"] + path = red-teaming/PhishingPost + url = git@github.com:mgeeky/PhishingPost.git diff --git a/red-teaming/PhishingPost b/red-teaming/PhishingPost new file mode 160000 index 0000000..bbb1add --- /dev/null +++ b/red-teaming/PhishingPost @@ -0,0 +1 @@ +Subproject commit bbb1add73362df40f04860a036926a71b96970c7 diff --git a/red-teaming/README.md b/red-teaming/README.md index 4c564c5..f8a120b 100644 --- a/red-teaming/README.md +++ b/red-teaming/README.md @@ -20,10 +20,10 @@ IEX (New-Object IO.StreamReader(New-Object IO.Compression.GzipStream($s, [IO.Com - **`Export-ReconData.ps1`** - Powershell script leveraging [PowerSploit Recon](https://github.com/PowerShellMafia/PowerSploit) module (PowerView) to save output from Reconnaissance cmdlets like `Get-Net*`, `Invoke-*` into _Clixml_ files. Those files can later be extracted from attacked environment and loaded to a new powershell runspace using the same script. Very useful when we want to obtain as many data as possible, then exfiltrate that data, review it in our safe place and then get back to attacked domain for lateral spread. -Exposed functions: -- `Export-ReconData` - Launches many cmdlets and exports their Clixml outputs. -- `Import-ReconData -DirName ` - Loads Clixml previously exported outputs and stores them in Global variables reachable when script terminates. -- `Get-ReconData -DirName ` - Gets names of variables that were created and contains previously imported data. + Exposed functions: + - `Export-ReconData` - Launches many cmdlets and exports their Clixml outputs. + - `Import-ReconData -DirName ` - Loads Clixml previously exported outputs and stores them in Global variables reachable when script terminates. + - `Get-ReconData -DirName ` - Gets names of variables that were created and contains previously imported data. ``` PS E:\PowerSploit\Recon> Load-ReconData -DirName .\PowerView-12-18-2018-08-30-09 diff --git a/red-teaming/RobustPentestMacro b/red-teaming/RobustPentestMacro new file mode 160000 index 0000000..32992ad --- /dev/null +++ b/red-teaming/RobustPentestMacro @@ -0,0 +1 @@ +Subproject commit 32992adea5369e661eea6fabbbc95b8284cc2959 diff --git a/red-teaming/VisualBasicObfuscator b/red-teaming/VisualBasicObfuscator new file mode 160000 index 0000000..80e7515 --- /dev/null +++ b/red-teaming/VisualBasicObfuscator @@ -0,0 +1 @@ +Subproject commit 80e7515ed6aff631b3449e654b67988b1f01baa4