Reworked submodules.

This commit is contained in:
mb 2018-12-18 17:56:40 +01:00
parent 27596f5104
commit 7b0605bff8
5 changed files with 16 additions and 4 deletions

9
.gitmodules vendored
View File

@ -19,3 +19,12 @@
[submodule "web/arachni-launching-script"] [submodule "web/arachni-launching-script"]
path = web/arachni-launching-script path = web/arachni-launching-script
url = git@github.com:mgeeky/arachni-launching-script.git url = git@github.com:mgeeky/arachni-launching-script.git
[submodule "red-teaming/RobustPentestMacro"]
path = red-teaming/RobustPentestMacro
url = https://github.com/mgeeky/RobustPentestMacro
[submodule "red-teaming/VisualBasicObfuscator"]
path = red-teaming/VisualBasicObfuscator
url = git@github.com:mgeeky/VisualBasicObfuscator.git
[submodule "red-teaming/PhishingPost"]
path = red-teaming/PhishingPost
url = git@github.com:mgeeky/PhishingPost.git

@ -0,0 +1 @@
Subproject commit bbb1add73362df40f04860a036926a71b96970c7

View File

@ -20,10 +20,10 @@ IEX (New-Object IO.StreamReader(New-Object IO.Compression.GzipStream($s, [IO.Com
- **`Export-ReconData.ps1`** - Powershell script leveraging [PowerSploit Recon](https://github.com/PowerShellMafia/PowerSploit) module (PowerView) to save output from Reconnaissance cmdlets like `Get-Net*`, `Invoke-*` into _Clixml_ files. Those files can later be extracted from attacked environment and loaded to a new powershell runspace using the same script. Very useful when we want to obtain as many data as possible, then exfiltrate that data, review it in our safe place and then get back to attacked domain for lateral spread. - **`Export-ReconData.ps1`** - Powershell script leveraging [PowerSploit Recon](https://github.com/PowerShellMafia/PowerSploit) module (PowerView) to save output from Reconnaissance cmdlets like `Get-Net*`, `Invoke-*` into _Clixml_ files. Those files can later be extracted from attacked environment and loaded to a new powershell runspace using the same script. Very useful when we want to obtain as many data as possible, then exfiltrate that data, review it in our safe place and then get back to attacked domain for lateral spread.
Exposed functions: Exposed functions:
- `Export-ReconData` - Launches many cmdlets and exports their Clixml outputs. - `Export-ReconData` - Launches many cmdlets and exports their Clixml outputs.
- `Import-ReconData -DirName <DIR>` - Loads Clixml previously exported outputs and stores them in Global variables reachable when script terminates. - `Import-ReconData -DirName <DIR>` - Loads Clixml previously exported outputs and stores them in Global variables reachable when script terminates.
- `Get-ReconData -DirName <DIR>` - Gets names of variables that were created and contains previously imported data. - `Get-ReconData -DirName <DIR>` - Gets names of variables that were created and contains previously imported data.
``` ```
PS E:\PowerSploit\Recon> Load-ReconData -DirName .\PowerView-12-18-2018-08-30-09 PS E:\PowerSploit\Recon> Load-ReconData -DirName .\PowerView-12-18-2018-08-30-09

@ -0,0 +1 @@
Subproject commit 32992adea5369e661eea6fabbbc95b8284cc2959

@ -0,0 +1 @@
Subproject commit 80e7515ed6aff631b3449e654b67988b1f01baa4