Running Hashcat on Google Colab with session backup and restore.
β745Jan 14, 2022Updated 4 years ago
Alternatives and similar repositories for colabcat
Users that are interested in colabcat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π§ Abuse of Google Colab for cracking hashes.β968Jul 17, 2023Updated 2 years ago
- One rule to crack all passwords. or atleast we hope so.β1,618Dec 9, 2021Updated 4 years ago
- Zero Infrastructure Password Crackingβ419Aug 22, 2024Updated last year
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.β5,152May 15, 2026Updated last week
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)β1,409Sep 22, 2025Updated 8 months ago
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.β1,828May 5, 2026Updated 2 weeks ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β5,995Jan 28, 2026Updated 3 months ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensiβ¦β4,575Jan 10, 2025Updated last year
- Covenant is a collaborative .NET C2 framework for red teamers.β4,687Jul 18, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.β2,881Aug 18, 2023Updated 2 years ago
- A mostly-serverless distributed hash cracking platformβ821Apr 6, 2024Updated 2 years ago
- The ultimate WinRM shell for hacking/pentestingβ5,378Mar 10, 2026Updated 2 months ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to β¦β763Sep 23, 2024Updated last year
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duriβ¦β308Jun 14, 2024Updated last year
- End-to-end encrypted email - Proton Mail β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.β9,917Apr 25, 2024Updated 2 years ago
- Fancy reverse and bind shell handlerβ2,889Aug 9, 2024Updated last year
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,377Sep 30, 2024Updated last year
- Monitor linux processes without root permissionsβ6,018Mar 1, 2026Updated 2 months ago
- Privilege Escalation Enumeration Script for Windowsβ3,834Apr 29, 2026Updated 3 weeks ago
- Various *nix tools built as statically-linked binariesβ3,692Aug 21, 2023Updated 2 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)β19,848May 15, 2026Updated last week
- CrackQ: A Python Hashcat cracking queue systemβ943Sep 3, 2024Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checksβ7,920Sep 6, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's poβ¦β3,912Jan 24, 2024Updated 2 years ago
- Starkiller is a Frontend for PowerShell Empire.β1,650May 15, 2026Updated last week
- Active Directory ACL exploitation with BloodHoundβ762Nov 18, 2021Updated 4 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levelsβ3,908May 3, 2026Updated 2 weeks ago
- Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.β2,255Feb 25, 2023Updated 3 years ago
- Mimikatz implementation in pure Pythonβ3,310Apr 9, 2026Updated last month
- Trying to tame the three-headed dog.β5,007Nov 14, 2025Updated 6 months ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacketβ638Aug 15, 2025Updated 9 months ago
- EagleShell is a high-quality tool that aims to improve your pentest.β76Jan 7, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.β155Dec 22, 2020Updated 5 years ago
- Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)β970Nov 4, 2025Updated 6 months ago
- A tool to perform Kerberos pre-auth bruteforcingβ3,333Aug 20, 2024Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMvβ¦β6,458Updated this week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.β6,618Jan 18, 2026Updated 4 months ago
- Automation for internal Windows Penetrationtest / AD-Securityβ3,664Aug 28, 2025Updated 8 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and β¦β1,943Sep 23, 2022Updated 3 years ago