π§ Abuse of Google Colab for cracking hashes.
β967Jul 17, 2023Updated 2 years ago
Alternatives and similar repositories for penglab
Users that are interested in penglab are comparing it to the libraries listed below
Sorting:
- Running Hashcat on Google Colab with session backup and restore.β743Jan 14, 2022Updated 4 years ago
- Zero Infrastructure Password Crackingβ416Aug 22, 2024Updated last year
- Credentials gathering tool automating remote procdump and parse of lsass process.β782Jun 20, 2020Updated 5 years ago
- Windows Privilege Escalation from User to Domain Admin.β1,439Dec 18, 2022Updated 3 years ago
- large hashcat rulesets generated from real-world compromised passwordsβ400Nov 26, 2020Updated 5 years ago
- Lightshot scraper on steroids with OCR.β263Sep 4, 2022Updated 3 years ago
- Overlord - Red Teaming Infrastructure Automationβ627May 28, 2024Updated last year
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)β1,350Sep 22, 2025Updated 5 months ago
- Identifies the bytes that Microsoft Defender flags on.β2,582Dec 31, 2025Updated 2 months ago
- Hashtopolis - distributed password cracking with Hashcatβ1,716Feb 20, 2026Updated last week
- ScareCrow - Payload creation framework designed around EDR bypass.β2,874Aug 18, 2023Updated 2 years ago
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duriβ¦β305Jun 14, 2024Updated last year
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policiesβ325Apr 8, 2023Updated 2 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and β¦β1,932Sep 23, 2022Updated 3 years ago
- Rule for hashcat or john. Aiming to crack how people generate their passwordβ460Sep 2, 2024Updated last year
- Active Directory ACL exploitation with BloodHoundβ755Nov 18, 2021Updated 4 years ago
- π― Give me a web shell, I'll give you a terminal.β199Dec 29, 2021Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.β4,620Jul 18, 2024Updated last year
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure β¦β2,779Feb 18, 2026Updated last week
- A post exploitation framework designed to operate covertly on heavily monitored environmentsβ2,167Sep 29, 2021Updated 4 years ago
- Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)β965Nov 4, 2025Updated 3 months ago
- Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.β2,236Feb 25, 2023Updated 3 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificaβ¦β864Mar 20, 2023Updated 2 years ago
- Automation for internal Windows Penetrationtest / AD-Securityβ3,644Aug 28, 2025Updated 6 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.β1,263Dec 9, 2025Updated 2 months ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been seβ¦β170Aug 10, 2020Updated 5 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,350Sep 30, 2024Updated last year
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.β380Aug 13, 2021Updated 4 years ago
- The ultimate WinRM shell for hacking/pentestingβ5,260Feb 20, 2026Updated last week
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.β1,569Nov 9, 2021Updated 4 years ago
- One rule to crack all passwords. or atleast we hope so.β1,606Dec 9, 2021Updated 4 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentestingβ191May 26, 2020Updated 5 years ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.β5,054Updated this week
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivyβs loader does this by β¦β745Aug 18, 2023Updated 2 years ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttlingβ1,258Mar 19, 2025Updated 11 months ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )β2,737Feb 2, 2026Updated last month
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLRβ2,322Dec 6, 2023Updated 2 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.β1,803Updated this week
- Extract credentials from lsass remotelyβ2,178Dec 24, 2025Updated 2 months ago