-
Notifications
You must be signed in to change notification settings - Fork 52
Expand file tree
/
Copy path.gitmodules
More file actions
81 lines (81 loc) · 3.15 KB
/
.gitmodules
File metadata and controls
81 lines (81 loc) · 3.15 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
[submodule "averagesecurityguy"]
path = averagesecurityguy
url = https://github.com/averagesecurityguy/scripts
[submodule "NessusParser-Excel"]
path = NessusParser-Excel
url = https://github.com/TerminalFi/NessusParser-Excel
[submodule "nse/vulscan"]
path = nse/vulscan
url = https://github.com/scipag/vulscan
[submodule "powershell/adaudit"]
path = powershell/adaudit
url = https://github.com/phillips321/adaudit
[submodule "powershell/ADInspect"]
path = powershell/ADInspect
url = https://github.com/soteria-security/ADInspect
[submodule "powershell/ADRecon"]
path = powershell/ADRecon
url = https://github.com/adrecon/ADRecon
[submodule "powershell/AzureADRecon"]
path = powershell/AzureADRecon
url = https://github.com/adrecon/AzureADRecon
[submodule "powershell/DomainPasswordSpray"]
path = powershell/DomainPasswordSpray
url = https://github.com/dafthack/DomainPasswordSpray
[submodule "powershell/Grouper"]
path = powershell/Grouper
url = https://github.com/l0ss/Grouper
[submodule "powershell/Invoke-Obfuscation"]
path = powershell/Invoke-Obfuscation
url = https://github.com/danielbohannon/Invoke-Obfuscation
[submodule "powershell/Invoke-Vnc"]
path = powershell/Invoke-Vnc
url = https://github.com/klsecservices/Invoke-Vnc
[submodule "powershell/MailSniper"]
path = powershell/MailSniper
url = https://github.com/dafthack/MailSniper
[submodule "powershell/mimikittenz"]
path = powershell/mimikittenz
url = https://github.com/orlyjamie/mimikittenz
[submodule "powershell/nishang"]
path = powershell/nishang
url = https://github.com/samratashok/nishang
[submodule "powershell/O365HTMLReport"]
path = powershell/O365HTMLReport
url = https://github.com/bwya77/O365HTMLReport
[submodule "powershell/MSOLSpray"]
path = powershell/MSOLSpray
url = https://github.com/dafthack/MSOLSpray
[submodule "powershell/PSHTML-AD-Report"]
path = powershell/PSHTML-AD-Report
url = https://github.com/bwya77/PSHTML-AD-Report
[submodule "powershell/SessionGopher"]
path = powershell/SessionGopher
url = https://github.com/Arvanaghi/SessionGopher
[submodule "powershell/Windows-Workstation-and-Server-Audit"]
path = powershell/Windows-Workstation-and-Server-Audit
url = https://github.com/alanrenouf/Windows-Workstation-and-Server-Audit
[submodule "powershell/WINspect"]
path = powershell/WINspect
url = https://github.com/A-mIn3/WINspect
[submodule "powershell/Office-365-Extractor"]
path = powershell/Office-365-Extractor
url = https://github.com/PwC-IR/Office-365-Extractor
[submodule "powershell/365BlueTeamKit"]
path = powershell/365BlueTeamKit
url = https://github.com/chaimblack/365BlueTeamKit
[submodule "powershell/hawk"]
path = powershell/hawk
url = https://github.com/T0pCyber/hawk
[submodule "powershell/DFIR-O365RC"]
path = powershell/DFIR-O365RC
url = https://github.com/ANSSI-FR/DFIR-O365RC
[submodule "powershell/365Inspect"]
path = powershell/365Inspect
url = https://github.com/soteria-security/365Inspect
[submodule "powershell/MIA-MailItemsAccessed-"]
path = powershell/MIA-MailItemsAccessed-
url = https://github.com/PwC-IR/MIA-MailItemsAccessed-
[submodule "powershell/Invoke-DCSync"]
path = powershell/Invoke-DCSync
url = https://github.com/Al1ex/Invoke-DCSync