-
Notifications
You must be signed in to change notification settings - Fork 7
/
Copy path.gitmodules
147 lines (147 loc) · 4.67 KB
/
.gitmodules
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
[submodule "p/empire"]
path = p/empire
url = https://github.com/PowerShellEmpire/Empire
[submodule "p/rtl8188eu"]
path = p/rtl8188eu
url = https://github.com/lwfinger/rtl8188eu
[submodule "b/ve"]
path = b/ve
url = https://github.com/hvqzao/ve
[submodule "p/jdwp-shellifier"]
path = p/jdwp-shellifier
url = https://github.com/IOActive/jdwp-shellifier
[submodule "p/net-creds"]
path = p/net-creds
url = https://github.com/DanMcInerney/net-creds.git
[submodule "p/nosqlmap"]
path = p/nosqlmap
url = https://github.com/tcstool/NoSQLMap.git
[submodule "p/seclists"]
path = p/seclists
url = https://github.com/danielmiessler/SecLists.git
[submodule "p/praedasploit"]
path = p/praedasploit
url = https://github.com/MooseDojo/praedasploit
[submodule "p/sqlmap"]
path = p/sqlmap
url = https://github.com/sqlmapproject/sqlmap
[submodule "p/responder"]
path = p/responder
url = https://github.com/SpiderLabs/Responder.git
[submodule "p/rdp-sec-check"]
path = p/rdp-sec-check
url = https://github.com/portcullislabs/rdp-sec-check
[submodule "p/xxei"]
path = p/xxei
url = https://github.com/enjoiz/XXEinjector
[submodule "p/gwt-toolset"]
path = p/gwt-toolset
url = https://github.com/GDSSecurity/GWT-Penetration-Testing-Toolset.git
[submodule "p/the-backdoor-factory"]
path = p/the-backdoor-factory
url = https://github.com/secretsquirrel/the-backdoor-factory
[submodule "p/windows-exploit-suggester"]
path = p/windows-exploit-suggester
url = https://github.com/GDSSecurity/Windows-Exploit-Suggester.git
[submodule "p/vpnbook/thsosrtl"]
path = p/vpnbook/thsosrtl
url = https://github.com/Top-Hat-Sec/thsosrtl
[submodule "p/ipport"]
path = p/ipport
url = https://github.com/hvqzao/ipport
[submodule "p/udp-proto-scanner"]
path = p/udp-proto-scanner
url = https://github.com/portcullislabs/udp-proto-scanner
[submodule "p/nishang"]
path = p/nishang
url = https://github.com/samratashok/nishang
[submodule "p/ysoserial/src"]
path = p/ysoserial/src
url = https://github.com/frohoff/ysoserial
[submodule "p/discover"]
path = p/discover
url = https://github.com/leebaird/discover.git
[submodule "p/wifiphisher"]
path = p/wifiphisher
url = https://github.com/sophron/wifiphisher
[submodule "p/hqlmap"]
path = p/hqlmap
url = https://github.com/PaulSec/HQLmap
[submodule "p/burp/unofficial/super-serial"]
path = p/burp/unofficial/super-serial
url = https://github.com/DirectDefense/SuperSerial
[submodule "p/burp/unofficial/flow"]
path = p/burp/unofficial/flow
url = https://github.com/hvqzao/burp-flow
[submodule "p/burp/unofficial/wildcard"]
path = p/burp/unofficial/wildcard
url = https://github.com/hvqzao/burp-wildcard
[submodule "p/bsql-injector"]
path = p/bsql-injector
url = https://github.com/enjoiz/BSQLinjector
[submodule "p/liffy"]
path = p/liffy
url = https://github.com/hvqzao/liffy
[submodule "p/sublistbrute"]
path = p/sublistbrute
url = https://github.com/aboul3la/Sublist3r
[submodule "b/endec"]
path = b/endec
url = https://github.com/hvqzao/endec
[submodule "p/fuzzdb"]
path = p/fuzzdb
url = https://github.com/fuzzdb-project/fuzzdb
[submodule "p/ciphr"]
path = p/ciphr
url = https://github.com/frohoff/ciphr
[submodule "p/blns"]
path = p/blns
url = https://github.com/minimaxir/big-list-of-naughty-strings
[submodule "p/odat"]
path = p/odat
url = https://github.com/quentinhardy/odat
[submodule "p/get-docroots"]
path = p/get-docroots
url = https://github.com/ewilded/get_docroots
[submodule "p/java-unserialize-exploits-foxglove"]
path = p/java-unserialize-exploits-foxglove
url = https://github.com/foxglovesec/JavaUnserializeExploits
[submodule "p/clusterd"]
path = p/clusterd
url = https://github.com/hatRiot/clusterd
[submodule "p/sniper"]
path = p/sniper
url = https://github.com/1N3/Sn1per
[submodule "p/powersploit"]
path = p/powersploit
url = https://github.com/PowerShellMafia/PowerSploit
[submodule "p/wfuzz"]
path = p/wfuzz
url = https://github.com/xmendez/wfuzz
[submodule "p/wifi-pumpkin"]
path = p/wifi-pumpkin
url = https://github.com/P0cL4bs/WiFi-Pumpkin
[submodule "p/eyewitness"]
path = p/eyewitness
url = https://github.com/ChrisTruncer/EyeWitness
[submodule "p/pret"]
path = p/pret
url = https://github.com/RUB-NDS/PRET
[submodule "p/ptdl"]
path = p/ptdl
url = https://github.com/enjoiz/ptdl
[submodule "p/vulscan"]
path = p/vulscan
url = https://github.com/scipag/vulscan
[submodule "p/jexboss"]
path = p/jexboss
url = https://github.com/joaomatosf/jexboss
[submodule "p/ldapper"]
path = p/ldapper
url = https://github.com/shellster/LDAPPER
[submodule "p/payloads"]
path = p/payloads
url = https://github.com/swisskyrepo/PayloadsAllTheThings
[submodule "p/serialkiller"]
path = p/serialkiller
url = https://github.com/pwntester/SerialKillerBypassGadgetCollection