Running Hashcat on Google Colab with session backup and restore.
β744Jan 14, 2022Updated 4 years ago
Alternatives and similar repositories for colabcat
Users that are interested in colabcat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π§ Abuse of Google Colab for cracking hashes.β969Jul 17, 2023Updated 2 years ago
- One rule to crack all passwords. or atleast we hope so.β1,612Dec 9, 2021Updated 4 years ago
- Zero Infrastructure Password Crackingβ417Aug 22, 2024Updated last year
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.β5,106Apr 5, 2026Updated last week
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)β1,376Sep 22, 2025Updated 6 months ago
- End-to-end encrypted cloud storage - Proton Drive β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.β1,818Updated this week
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β5,964Jan 28, 2026Updated 2 months ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensiβ¦β4,538Jan 10, 2025Updated last year
- Covenant is a collaborative .NET C2 framework for red teamers.β4,656Jul 18, 2024Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.β2,879Aug 18, 2023Updated 2 years ago
- A mostly-serverless distributed hash cracking platformβ823Apr 6, 2024Updated 2 years ago
- The ultimate WinRM shell for hacking/pentestingβ5,325Mar 10, 2026Updated last month
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to β¦β762Sep 23, 2024Updated last year
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duriβ¦β305Jun 14, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Fancy reverse and bind shell handlerβ2,877Aug 9, 2024Updated last year
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.β9,851Apr 25, 2024Updated last year
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,366Sep 30, 2024Updated last year
- Various *nix tools built as statically-linked binariesβ3,664Aug 21, 2023Updated 2 years ago
- Monitor linux processes without root permissionsβ5,952Mar 1, 2026Updated last month
- Privilege Escalation Enumeration Script for Windowsβ3,806Updated this week
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's poβ¦β3,907Jan 24, 2024Updated 2 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)β19,649Updated this week
- β42Dec 22, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Scripted Local Linux Enumeration & Privilege Escalation Checksβ7,889Sep 6, 2023Updated 2 years ago
- Active Directory ACL exploitation with BloodHoundβ760Nov 18, 2021Updated 4 years ago
- CrackQ: A Python Hashcat cracking queue systemβ939Sep 3, 2024Updated last year
- Starkiller is a Frontend for PowerShell Empire.β1,649Apr 5, 2026Updated last week
- Mimikatz implementation in pure Pythonβ3,276Updated this week
- Linux enumeration tool for pentesting and CTFs with verbosity levelsβ3,881Dec 25, 2023Updated 2 years ago
- Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.β2,246Feb 25, 2023Updated 3 years ago
- Trying to tame the three-headed dog.β4,960Nov 14, 2025Updated 4 months ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacketβ624Aug 15, 2025Updated 7 months ago
- End-to-end encrypted cloud storage - Proton Drive β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- EagleShell is a high-quality tool that aims to improve your pentest.β77Jan 7, 2021Updated 5 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.β155Dec 22, 2020Updated 5 years ago
- Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)β967Nov 4, 2025Updated 5 months ago
- A tool to perform Kerberos pre-auth bruteforcingβ3,296Aug 20, 2024Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMvβ¦β6,413Jan 26, 2026Updated 2 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.β6,565Jan 18, 2026Updated 2 months ago
- Automation for internal Windows Penetrationtest / AD-Securityβ3,653Aug 28, 2025Updated 7 months ago