Reworked submodules.

This commit is contained in:
mb
2018-12-18 17:56:40 +01:00
parent 27596f5104
commit 7b0605bff8
5 changed files with 16 additions and 4 deletions

9
.gitmodules vendored
View File

@ -19,3 +19,12 @@
[submodule "web/arachni-launching-script"] [submodule "web/arachni-launching-script"]
path = web/arachni-launching-script path = web/arachni-launching-script
url = git@github.com:mgeeky/arachni-launching-script.git url = git@github.com:mgeeky/arachni-launching-script.git
[submodule "red-teaming/RobustPentestMacro"]
path = red-teaming/RobustPentestMacro
url = https://github.com/mgeeky/RobustPentestMacro
[submodule "red-teaming/VisualBasicObfuscator"]
path = red-teaming/VisualBasicObfuscator
url = git@github.com:mgeeky/VisualBasicObfuscator.git
[submodule "red-teaming/PhishingPost"]
path = red-teaming/PhishingPost
url = git@github.com:mgeeky/PhishingPost.git

View File

@ -20,10 +20,10 @@ IEX (New-Object IO.StreamReader(New-Object IO.Compression.GzipStream($s, [IO.Com
- **`Export-ReconData.ps1`** - Powershell script leveraging [PowerSploit Recon](https://github.com/PowerShellMafia/PowerSploit) module (PowerView) to save output from Reconnaissance cmdlets like `Get-Net*`, `Invoke-*` into _Clixml_ files. Those files can later be extracted from attacked environment and loaded to a new powershell runspace using the same script. Very useful when we want to obtain as many data as possible, then exfiltrate that data, review it in our safe place and then get back to attacked domain for lateral spread. - **`Export-ReconData.ps1`** - Powershell script leveraging [PowerSploit Recon](https://github.com/PowerShellMafia/PowerSploit) module (PowerView) to save output from Reconnaissance cmdlets like `Get-Net*`, `Invoke-*` into _Clixml_ files. Those files can later be extracted from attacked environment and loaded to a new powershell runspace using the same script. Very useful when we want to obtain as many data as possible, then exfiltrate that data, review it in our safe place and then get back to attacked domain for lateral spread.
Exposed functions: Exposed functions:
- `Export-ReconData` - Launches many cmdlets and exports their Clixml outputs. - `Export-ReconData` - Launches many cmdlets and exports their Clixml outputs.
- `Import-ReconData -DirName <DIR>` - Loads Clixml previously exported outputs and stores them in Global variables reachable when script terminates. - `Import-ReconData -DirName <DIR>` - Loads Clixml previously exported outputs and stores them in Global variables reachable when script terminates.
- `Get-ReconData -DirName <DIR>` - Gets names of variables that were created and contains previously imported data. - `Get-ReconData -DirName <DIR>` - Gets names of variables that were created and contains previously imported data.
``` ```
PS E:\PowerSploit\Recon> Load-ReconData -DirName .\PowerView-12-18-2018-08-30-09 PS E:\PowerSploit\Recon> Load-ReconData -DirName .\PowerView-12-18-2018-08-30-09