A curated list of awesome Penetration Testing Tools ported to Google Colab to make faster and easier to execute and test.
☆38Oct 31, 2024Updated last year
Alternatives and similar repositories for awesome-pentest-tools-in-colab
Users that are interested in awesome-pentest-tools-in-colab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆49Mar 25, 2022Updated 4 years ago
- ☆27Jun 18, 2024Updated last year
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Dec 4, 2021Updated 4 years ago
- ☆12Feb 10, 2020Updated 6 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Reconflow is all in one tool for gathering reconnaissance information about a target in a penetration test☆14Jul 18, 2021Updated 4 years ago
- Some of my presentations and published articles in different conferences☆18Sep 27, 2021Updated 4 years ago
- ☆29Mar 31, 2026Updated last week
- Rubidea - Bind XSS Server to Steal cookies.☆14May 2, 2020Updated 5 years ago
- Simple mind maps for IoT security attack surfaces and methodologies☆17Aug 12, 2019Updated 6 years ago
- ☆17Jan 17, 2025Updated last year
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 4 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆20Oct 17, 2021Updated 4 years ago
- ☆15Apr 13, 2021Updated 4 years ago
- DevSecOps Pipeline using SAST + DAST and SCA tools☆73Sep 26, 2025Updated 6 months ago
- ☆19Feb 11, 2026Updated last month
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 5 years ago
- software asset scanning orchestration system☆35Updated this week
- AWS Security Tool☆29Jan 1, 2024Updated 2 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters☆17Aug 1, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Supertruder but better☆31Mar 10, 2023Updated 3 years ago
- ☆25Nov 16, 2023Updated 2 years ago
- A collection of custom built scripts to exploit known vulnerability chains☆25Jul 23, 2021Updated 4 years ago
- ☆43Jun 18, 2025Updated 9 months ago
- Yet Another SCA tool☆13Nov 10, 2022Updated 3 years ago
- ☆18Apr 26, 2021Updated 4 years ago
- SecretBench is a dataset consisting of different secret types collected from public open-source repositories.☆52Jun 13, 2024Updated last year
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Apr 25, 2021Updated 4 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆59Sep 6, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆17May 7, 2021Updated 4 years ago
- Using Google translate as WebProxy☆13May 22, 2023Updated 2 years ago
- OpenVAS plugin for GLPi☆13Mar 22, 2022Updated 4 years ago
- Tools to help work with bulk data when using Microsoft Purview☆14Mar 26, 2026Updated 2 weeks ago
- Regex patterns for manual application source code review☆33Dec 14, 2020Updated 5 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago