mirror of
https://github.com/mgeeky/Penetration-Testing-Tools.git
synced 2024-11-21 18:11:37 +01:00
76 lines
2.9 KiB
Plaintext
76 lines
2.9 KiB
Plaintext
[submodule "web/tomcatWarDeployer"]
|
|
path = web/tomcatWarDeployer
|
|
url = https://github.com/mgeeky/tomcatWarDeployer.git
|
|
[submodule "web/burpContextAwareFuzzer"]
|
|
path = web/burpContextAwareFuzzer
|
|
url = https://github.com/mgeeky/burpContextAwareFuzzer.git
|
|
[submodule "web/dirbuster"]
|
|
path = web/dirbuster
|
|
url = https://github.com/mgeeky/dirbuster.git
|
|
[submodule "phishing/RobustPentestMacro"]
|
|
path = phishing/RobustPentestMacro
|
|
url = https://github.com/mgeeky/RobustPentestMacro
|
|
[submodule "phishing/VisualBasicObfuscator"]
|
|
path = phishing/VisualBasicObfuscator
|
|
url = https://github.com/mgeeky/VisualBasicObfuscator.git
|
|
[submodule "phishing/PhishingPost"]
|
|
path = phishing/PhishingPost
|
|
url = https://github.com/mgeeky/PhishingPost.git
|
|
[submodule "web/proxy2"]
|
|
path = web/proxy2
|
|
url = https://github.com/mgeeky/proxy2
|
|
[submodule "red-teaming/Stracciatella"]
|
|
path = red-teaming/Stracciatella
|
|
url = https://github.com/mgeeky/Stracciatella.git
|
|
[submodule "red-teaming/cobalt-arsenal"]
|
|
path = red-teaming/cobalt-arsenal
|
|
url = https://github.com/mgeeky/cobalt-arsenal.git
|
|
[submodule "windows/PE-library"]
|
|
path = windows/PE-library
|
|
url = https://github.com/mgeeky/PE-library
|
|
[submodule "red-teaming/SharpWMI"]
|
|
path = red-teaming/SharpWMI
|
|
url = https://github.com/mgeeky/SharpWMI
|
|
[submodule "windows/UnhookMe"]
|
|
path = windows/UnhookMe
|
|
url = https://github.com/mgeeky/UnhookMe
|
|
[submodule "red-teaming/CobaltSplunk"]
|
|
path = red-teaming/CobaltSplunk
|
|
url = https://github.com/mgeeky/CobaltSplunk
|
|
[submodule "red-teaming/SharpWebServer"]
|
|
path = red-teaming/SharpWebServer
|
|
url = https://github.com/mgeeky/SharpWebServer
|
|
[submodule "red-teaming/RedWarden"]
|
|
path = red-teaming/RedWarden
|
|
url = https://github.com/mgeeky/RedWarden
|
|
[submodule "red-teaming/ElusiveMice"]
|
|
path = red-teaming/ElusiveMice
|
|
url = https://github.com/mgeeky/ElusiveMice
|
|
[submodule "windows/ThreadStackSpoofer"]
|
|
path = windows/ThreadStackSpoofer
|
|
url = https://github.com/mgeeky/ThreadStackSpoofer
|
|
[submodule "windows/ShellcodeFluctuation"]
|
|
path = windows/ShellcodeFluctuation
|
|
url = https://github.com/mgeeky/ShellcodeFluctuation
|
|
[submodule "phishing/decode-spam-headers"]
|
|
path = phishing/decode-spam-headers
|
|
url = https://github.com/mgeeky/decode-spam-headers
|
|
[submodule "clouds/azure/AzureRT"]
|
|
path = clouds/azure/AzureRT
|
|
url = https://github.com/mgeeky/AzureRT
|
|
[submodule "file-formats/PackMyPayload"]
|
|
path = file-formats/PackMyPayload
|
|
url = https://github.com/mgeeky/PackMyPayload
|
|
[submodule "red-teaming/OfficePurge"]
|
|
path = red-teaming/OfficePurge
|
|
url = https://github.com/mgeeky/OfficePurge
|
|
[submodule "red-teaming/EvilClippy"]
|
|
path = red-teaming/EvilClippy
|
|
url = https://github.com/mgeeky/EvilClippy
|
|
[submodule "phishing/CustomXMLPart"]
|
|
path = phishing/CustomXMLPart
|
|
url = https://github.com/mgeeky/CustomXMLPart
|
|
[submodule "file-formats/msi-shenanigans"]
|
|
path = file-formats/msi-shenanigans
|
|
url = https://github.com/mgeeky/msi-shenanigans
|