Running Hashcat on Google Colab with session backup and restore.
β745Jan 14, 2022Updated 4 years ago
Alternatives and similar repositories for colabcat
Users that are interested in colabcat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π§ Abuse of Google Colab for cracking hashes.β969Jul 17, 2023Updated 2 years ago
- One rule to crack all passwords. or atleast we hope so.β1,619Dec 9, 2021Updated 4 years ago
- Zero Infrastructure Password Crackingβ416Aug 22, 2024Updated last year
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.β5,130Apr 19, 2026Updated last week
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)β1,390Sep 22, 2025Updated 7 months ago
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.β1,824Apr 26, 2026Updated last week
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β5,982Jan 28, 2026Updated 3 months ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensiβ¦β4,556Jan 10, 2025Updated last year
- Covenant is a collaborative .NET C2 framework for red teamers.β4,675Jul 18, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.β2,881Aug 18, 2023Updated 2 years ago
- A mostly-serverless distributed hash cracking platformβ821Apr 6, 2024Updated 2 years ago
- The ultimate WinRM shell for hacking/pentestingβ5,358Mar 10, 2026Updated last month
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to β¦β762Sep 23, 2024Updated last year
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duriβ¦β306Jun 14, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.β9,885Apr 25, 2024Updated 2 years ago
- Fancy reverse and bind shell handlerβ2,885Aug 9, 2024Updated last year
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,372Sep 30, 2024Updated last year
- Monitor linux processes without root permissionsβ5,983Mar 1, 2026Updated 2 months ago
- Privilege Escalation Enumeration Script for Windowsβ3,819Apr 16, 2026Updated 2 weeks ago
- Various *nix tools built as statically-linked binariesβ3,680Aug 21, 2023Updated 2 years ago
- β42Dec 22, 2020Updated 5 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)β19,768Updated this week
- Scripted Local Linux Enumeration & Privilege Escalation Checksβ7,905Sep 6, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CrackQ: A Python Hashcat cracking queue systemβ941Sep 3, 2024Updated last year
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's poβ¦β3,910Jan 24, 2024Updated 2 years ago
- Starkiller is a Frontend for PowerShell Empire.β1,650Apr 5, 2026Updated 3 weeks ago
- Active Directory ACL exploitation with BloodHoundβ761Nov 18, 2021Updated 4 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levelsβ3,893Dec 25, 2023Updated 2 years ago
- Mimikatz implementation in pure Pythonβ3,300Apr 9, 2026Updated 3 weeks ago
- Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.β2,249Feb 25, 2023Updated 3 years ago
- Trying to tame the three-headed dog.β4,988Nov 14, 2025Updated 5 months ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacketβ633Aug 15, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- EagleShell is a high-quality tool that aims to improve your pentest.β77Jan 7, 2021Updated 5 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.β155Dec 22, 2020Updated 5 years ago
- Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)β968Nov 4, 2025Updated 5 months ago
- A tool to perform Kerberos pre-auth bruteforcingβ3,312Aug 20, 2024Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMvβ¦β6,433Jan 26, 2026Updated 3 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.β6,596Jan 18, 2026Updated 3 months ago
- Automation for internal Windows Penetrationtest / AD-Securityβ3,662Aug 28, 2025Updated 8 months ago