π§ Abuse of Google Colab for cracking hashes.
β967Jul 17, 2023Updated 2 years ago
Alternatives and similar repositories for penglab
Users that are interested in penglab are comparing it to the libraries listed below
Sorting:
- Running Hashcat on Google Colab with session backup and restore.β743Jan 14, 2022Updated 4 years ago
- Zero Infrastructure Password Crackingβ416Aug 22, 2024Updated last year
- Lightshot scraper on steroids with OCR.β264Sep 4, 2022Updated 3 years ago
- π― Give me a web shell, I'll give you a terminal.β197Dec 29, 2021Updated 4 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.β782Jun 20, 2020Updated 5 years ago
- Windows Privilege Escalation from User to Domain Admin.β1,452Dec 18, 2022Updated 3 years ago
- large hashcat rulesets generated from real-world compromised passwordsβ400Nov 26, 2020Updated 5 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.β4,641Jul 18, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.β2,880Aug 18, 2023Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.β2,587Dec 31, 2025Updated 2 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and β¦β1,932Sep 23, 2022Updated 3 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)β1,362Sep 22, 2025Updated 6 months ago
- Hashtopolis - distributed password cracking with Hashcatβ1,725Updated this week
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.β1,273Dec 9, 2025Updated 3 months ago
- Rule for hashcat or john. Aiming to crack how people generate their passwordβ460Sep 2, 2024Updated last year
- One rule to crack all passwords. or atleast we hope so.β1,610Dec 9, 2021Updated 4 years ago
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure β¦β2,805Mar 16, 2026Updated last week
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.β5,085Feb 25, 2026Updated 3 weeks ago
- Monitor linux processes without root permissionsβ5,927Mar 1, 2026Updated 3 weeks ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policiesβ325Apr 8, 2023Updated 2 years ago
- Active Directory ACL exploitation with BloodHoundβ756Nov 18, 2021Updated 4 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,363Sep 30, 2024Updated last year
- Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.β2,243Feb 25, 2023Updated 3 years ago
- Automation for internal Windows Penetrationtest / AD-Securityβ3,650Aug 28, 2025Updated 6 months ago
- A post exploitation framework designed to operate covertly on heavily monitored environmentsβ2,168Sep 29, 2021Updated 4 years ago
- Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)β967Nov 4, 2025Updated 4 months ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certificaβ¦β867Mar 20, 2023Updated 3 years ago
- Overlord - Red Teaming Infrastructure Automationβ630May 28, 2024Updated last year
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duriβ¦β305Jun 14, 2024Updated last year
- Extract credentials from lsass remotelyβ2,184Dec 24, 2025Updated 2 months ago
- Uncover the full name of a target on Linkedin.β164May 27, 2022Updated 3 years ago
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victiβ¦β1,701Oct 26, 2024Updated last year
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLRβ2,329Dec 6, 2023Updated 2 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilitiesβ1,662Nov 28, 2020Updated 5 years ago
- A swiss army knife for pentesting networksβ9,100Dec 6, 2023Updated 2 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivyβs loader does this by β¦β744Aug 18, 2023Updated 2 years ago
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.β1,575Nov 9, 2021Updated 4 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the defaultβ¦β1,634Aug 6, 2022Updated 3 years ago
- A collaborative, multi-platform, red teaming frameworkβ4,358Mar 12, 2026Updated last week