[submodule "cme/data/invoke-vnc"] path = cme/data/invoke-vnc url = https://github.com/artkond/Invoke-Vnc [submodule "cme/data/mimikittenz"] path = cme/data/mimikittenz url = https://github.com/putterpanda/mimikittenz [submodule "cme/data/powersploit"] path = cme/data/powersploit url = https://github.com/PowerShellMafia/PowerSploit [submodule "cme/data/invoke-obfuscation"] path = cme/data/invoke-obfuscation url = https://github.com/danielbohannon/Invoke-Obfuscation [submodule "cme/data/netripper"] path = cme/data/netripper url = https://github.com/NytroRST/NetRipper [submodule "cme/data/randomps-scripts"] path = cme/data/randomps-scripts url = https://github.com/xorrior/RandomPS-Scripts [submodule "cme/data/cme_powershell_scripts"] path = cme/data/cme_powershell_scripts url = https://github.com/byt3bl33d3r/CME-PowerShell-Scripts [submodule "cme/data/sessiongopher"] path = cme/data/sessiongopher url = https://github.com/fireeye/SessionGopher [submodule "cme/data/mimipenguin"] path = cme/data/mimipenguin url = https://github.com/huntergregal/mimipenguin [submodule "cme/thirdparty/pywerview"] path = cme/thirdparty/pywerview url = https://github.com/mpgn/pywerview [submodule "cme/data/RID-Hijacking"] path = cme/data/RID-Hijacking url = https://github.com/r4wd3r/RID-Hijacking.git