π§ Abuse of Google Colab for cracking hashes.
β969Jul 17, 2023Updated 2 years ago
Alternatives and similar repositories for penglab
Users that are interested in penglab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Running Hashcat on Google Colab with session backup and restore.β744Jan 14, 2022Updated 4 years ago
- Zero Infrastructure Password Crackingβ417Aug 22, 2024Updated last year
- Lightshot scraper on steroids with OCR.β264Sep 4, 2022Updated 3 years ago
- π― Give me a web shell, I'll give you a terminal.β197Dec 29, 2021Updated 4 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.β783Jun 20, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Windows Privilege Escalation from User to Domain Admin.β1,455Dec 18, 2022Updated 3 years ago
- large hashcat rulesets generated from real-world compromised passwordsβ397Nov 26, 2020Updated 5 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.β4,656Jul 18, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.β2,879Aug 18, 2023Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.β2,588Dec 31, 2025Updated 3 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and β¦β1,935Sep 23, 2022Updated 3 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)β1,376Sep 22, 2025Updated 6 months ago
- Hashtopolis - distributed password cracking with Hashcatβ1,731Apr 2, 2026Updated last week
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.β1,275Dec 9, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Rule for hashcat or john. Aiming to crack how people generate their passwordβ463Sep 2, 2024Updated last year
- One rule to crack all passwords. or atleast we hope so.β1,612Dec 9, 2021Updated 4 years ago
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure β¦β2,836Apr 2, 2026Updated last week
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.β5,106Apr 5, 2026Updated last week
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policiesβ325Apr 8, 2023Updated 3 years ago
- Monitor linux processes without root permissionsβ5,952Mar 1, 2026Updated last month
- The ultimate WinRM shell for hacking/pentestingβ5,325Mar 10, 2026Updated last month
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,366Sep 30, 2024Updated last year
- Active Directory ACL exploitation with BloodHoundβ760Nov 18, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.β2,248Feb 25, 2023Updated 3 years ago
- Automation for internal Windows Penetrationtest / AD-Securityβ3,653Aug 28, 2025Updated 7 months ago
- A post exploitation framework designed to operate covertly on heavily monitored environmentsβ2,170Sep 29, 2021Updated 4 years ago
- Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)β967Nov 4, 2025Updated 5 months ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificaβ¦β872Mar 20, 2023Updated 3 years ago
- Overlord - Red Teaming Infrastructure Automationβ630May 28, 2024Updated last year
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duriβ¦β305Jun 14, 2024Updated last year
- Extract credentials from lsass remotelyβ2,192Mar 23, 2026Updated 2 weeks ago
- Uncover the full name of a target on Linkedin.β162May 27, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victiβ¦β1,713Oct 26, 2024Updated last year
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLRβ2,335Dec 6, 2023Updated 2 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilitiesβ1,664Nov 28, 2020Updated 5 years ago
- A swiss army knife for pentesting networksβ9,117Dec 6, 2023Updated 2 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivyβs loader does this by β¦β745Aug 18, 2023Updated 2 years ago
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.β1,578Nov 9, 2021Updated 4 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the defaultβ¦β1,637Aug 6, 2022Updated 3 years ago