A curated list of awesome Penetration Testing Tools ported to Google Colab to make faster and easier to execute and test.
☆39Oct 31, 2024Updated last year
Alternatives and similar repositories for awesome-pentest-tools-in-colab
Users that are interested in awesome-pentest-tools-in-colab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆49Mar 25, 2022Updated 4 years ago
- ☆27Jun 18, 2024Updated last year
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Dec 4, 2021Updated 4 years ago
- Payloads for Web Application Security Testing☆15Dec 1, 2025Updated 5 months ago
- ☆12Feb 10, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- Reconflow is all in one tool for gathering reconnaissance information about a target in a penetration test☆14Jul 18, 2021Updated 4 years ago
- ☆32May 13, 2026Updated last week
- Rubidea - Bind XSS Server to Steal cookies.☆14May 2, 2020Updated 6 years ago
- Simple mind maps for IoT security attack surfaces and methodologies☆17Aug 12, 2019Updated 6 years ago
- ☆17Jan 17, 2025Updated last year
- A curated list of amazingly libraries, services and resources to work with PDF files☆17Apr 13, 2026Updated last month
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- ☆21Oct 17, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆15Apr 13, 2021Updated 5 years ago
- DevSecOps Pipeline using SAST + DAST and SCA tools☆73Sep 26, 2025Updated 7 months ago
- ☆19Feb 11, 2026Updated 3 months ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆40Apr 17, 2020Updated 6 years ago
- software asset scanning orchestration system☆37Updated this week
- AWS Security Tool☆29Jan 1, 2024Updated 2 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters☆17Aug 1, 2020Updated 5 years ago
- Supertruder but better☆31Mar 10, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A collection of custom built scripts to exploit known vulnerability chains☆27Jul 23, 2021Updated 4 years ago
- Yet Another SCA tool☆13Nov 10, 2022Updated 3 years ago
- ☆44Jun 18, 2025Updated 11 months ago
- ☆25Nov 16, 2023Updated 2 years ago
- ☆18Apr 26, 2021Updated 5 years ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Apr 25, 2021Updated 5 years ago
- workshop about cloud-native security☆70Apr 14, 2022Updated 4 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆59Sep 6, 2021Updated 4 years ago
- ☆17May 7, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Using Google translate as WebProxy☆13May 22, 2023Updated 2 years ago
- OpenVAS plugin for GLPi☆13Mar 22, 2022Updated 4 years ago
- Opinionated Guard Extensions for .NET☆13Sep 16, 2021Updated 4 years ago
- Regex patterns for manual application source code review☆33Dec 14, 2020Updated 5 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- ☆10Oct 15, 2023Updated 2 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago