π§ Abuse of Google Colab for cracking hashes.
β969Jul 17, 2023Updated 2 years ago
Alternatives and similar repositories for penglab
Users that are interested in penglab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Running Hashcat on Google Colab with session backup and restore.β745Jan 14, 2022Updated 4 years ago
- Zero Infrastructure Password Crackingβ416Aug 22, 2024Updated last year
- Lightshot scraper on steroids with OCR.β263Sep 4, 2022Updated 3 years ago
- π― Give me a web shell, I'll give you a terminal.β197Dec 29, 2021Updated 4 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.β782Jun 20, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Windows Privilege Escalation from User to Domain Admin.β1,456Dec 18, 2022Updated 3 years ago
- large hashcat rulesets generated from real-world compromised passwordsβ399Nov 26, 2020Updated 5 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.β4,675Jul 18, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.β2,881Aug 18, 2023Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.β2,600Dec 31, 2025Updated 4 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and β¦β1,940Sep 23, 2022Updated 3 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)β1,390Sep 22, 2025Updated 7 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.β1,278Apr 23, 2026Updated last week
- Hashtopolis - distributed password cracking with Hashcatβ1,739Updated this week
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Rule for hashcat or john. Aiming to crack how people generate their passwordβ463Sep 2, 2024Updated last year
- One rule to crack all passwords. or atleast we hope so.β1,619Dec 9, 2021Updated 4 years ago
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure β¦β2,863Apr 23, 2026Updated last week
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.β5,130Apr 19, 2026Updated last week
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policiesβ325Apr 8, 2023Updated 3 years ago
- Monitor linux processes without root permissionsβ5,983Mar 1, 2026Updated 2 months ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,372Sep 30, 2024Updated last year
- The ultimate WinRM shell for hacking/pentestingβ5,358Mar 10, 2026Updated last month
- Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.β2,249Feb 25, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Automation for internal Windows Penetrationtest / AD-Securityβ3,662Aug 28, 2025Updated 8 months ago
- A post exploitation framework designed to operate covertly on heavily monitored environmentsβ2,173Sep 29, 2021Updated 4 years ago
- Active Directory ACL exploitation with BloodHoundβ761Nov 18, 2021Updated 4 years ago
- Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)β968Nov 4, 2025Updated 5 months ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificaβ¦β874Mar 20, 2023Updated 3 years ago
- Overlord - Red Teaming Infrastructure Automationβ632May 28, 2024Updated last year
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duriβ¦β306Jun 14, 2024Updated last year
- Extract credentials from lsass remotelyβ2,200Mar 23, 2026Updated last month
- Uncover the full name of a target on Linkedin.β162May 27, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victiβ¦β1,716Oct 26, 2024Updated last year
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilitiesβ1,671Nov 28, 2020Updated 5 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLRβ2,337Dec 6, 2023Updated 2 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivyβs loader does this by β¦β744Aug 18, 2023Updated 2 years ago
- A swiss army knife for pentesting networksβ9,129Dec 6, 2023Updated 2 years ago
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.β1,578Nov 9, 2021Updated 4 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the defaultβ¦β1,642Aug 6, 2022Updated 3 years ago