Penglab : Abuse Of Google Colab For Cracking Hashes

Penglab is a ready-to-install setup on Google Colab for cracking hashes with an incredible power, really useful for CTFs. 

It installs by default :

  • Hashcat
  • John
  • Hydra
  • SSH (with ngrok)

And now, it can also :

  • Launch an integrated shell
  • Download the wordlists Rockyou and HashesOrg2019 quickly !

You only need a Google Account to use Google Colab, and to use ngrok for SSH.

How To Use It ?

What Is Google Colab ?

Google Colab is a free cloud service, based on Jupyter Notebooks for machine-learning education and research. It provides a runtime fully configured for deep learning and free-of-charge access to a robust GPU.

Benchmarks

Hashcat Benchmark

Device #1: Tesla P100-PCIE-16GB, 16017/16280 MB, 56MCU
OpenCL API (OpenCL 1.2 CUDA 10.1.152) – Platform #1 [NVIDIA Corporation]
Device #2: Tesla P100-PCIE-16GB, skipped
Benchmark relevant options:
–optimized-kernel-enable
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 55
Hashmode: 0 – MD5
Speed.#1………: 27008.0 MH/s (69.17ms) @ Accel:64 Loops:512 Thr:1024 Vec:8
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 55
Hashmode: 100 – SHA1
Speed.#1………: 9590.3 MH/s (48.61ms) @ Accel:8 Loops:1024 Thr:1024 Vec:1
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 55

Speedtest

Testing from Google Cloud (35.203.136.151)…
Retrieving speedtest.net server list…
Selecting best server based on ping…
Hosted by KamaTera INC (Santa Clara, CA) [11.95 km]: 28.346 ms
Testing download speed……………………………………………………………………..
Download: 2196.68 Mbit/s
Testing upload speed…………………………………………………………………………………………
Upload: 3.87 Mbit/s

R K

Recent Posts

Best Endpoint Monitoring Tools for 2026

Introduction In today’s cyber threat landscape, protecting endpoints such as computers, smartphones, and tablets from…

14 hours ago

Best 9 Incident Response Automation Tools

Introduction In today's fast-paced cybersecurity landscape, incident response is critical to protecting businesses from cyberattacks.…

14 hours ago

How AI Puts Data Security at Risk

Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…

2 months ago

The Evolution of Cloud Technology: Where We Started and Where We’re Headed

Image credit:pexels.com If you think back to the early days of personal computing, you probably…

2 months ago

The Evolution of Online Finance Tools In a Tech-Driven World

In an era defined by technological innovation, the way people handle and understand money has…

2 months ago

A Complete Guide to Lenso.ai and Its Reverse Image Search Capabilities

The online world becomes more visually driven with every passing year. Images spread across websites,…

3 months ago