An analysis of the user password hashing algorithm used by Citrix NetScaler
☆15Sep 23, 2025Updated 7 months ago
Alternatives and similar repositories for NetScaler-Password-Hash-Type-5
Users that are interested in NetScaler-Password-Hash-Type-5 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE☆19Apr 17, 2025Updated last year
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- Python version of Praeda (Praeda-II) a MFP data harvesting tool☆14Feb 2, 2026Updated 2 months ago
- Python port of MailSniper to exfiltrate emails via EWS endpoint☆87Feb 2, 2022Updated 4 years ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 6 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Modular C2 server to tame your pack of wolves☆27Updated this week
- Tools for preservation of floppy disks☆15Mar 25, 2026Updated last month
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆37Nov 25, 2025Updated 5 months ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- BlurSPY app is a very useful cell phone tracking application, which features a number of useful functions. If it is installed on the targ…☆11Dec 16, 2021Updated 4 years ago
- ☆23Jun 1, 2023Updated 2 years ago
- OSEP - Offsec Expert Professional☆21Jun 23, 2024Updated last year
- ☆11Dec 22, 2020Updated 5 years ago
- ☆12Dec 23, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Decrypts locally stored Pentaho Kettle (Spoon) Passwords☆16Jan 18, 2020Updated 6 years ago
- #HackingTogether☆14Jan 23, 2017Updated 9 years ago
- ☆15Jun 27, 2024Updated last year
- Checklists☆16Sep 22, 2016Updated 9 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated 2 years ago
- Deletes old email from my Gmail accounts☆15Oct 13, 2017Updated 8 years ago
- ARRS documentation☆15Aug 4, 2023Updated 2 years ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆30Jul 11, 2025Updated 9 months ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface. Implementation of ligolo-ng into sliver☆30Feb 27, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- USB armory: open source flash-drive-sized computer☆11Dec 8, 2015Updated 10 years ago
- An extension to supercharge your Codeforces profile with in-depth analytics and training insights.☆16Sep 13, 2025Updated 7 months ago
- a tool that creates permutations of domain names using homographic unicode characters☆21Oct 21, 2022Updated 3 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- ☆27May 6, 2024Updated last year
- Interested in intercepting phone calls or text messages? This application converts your phone into a Stingray/ GSM interceptor/IMSI catch…☆21Feb 23, 2021Updated 5 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Password Guessing for different Web Portals☆29Nov 14, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Scanner for Zyxel products which are potentially vulnerable due to an undocumented user account (CVE-2020-29583)☆15Jan 4, 2021Updated 5 years ago
- Top hashpwn rules☆20Dec 12, 2025Updated 4 months ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- ☆26Mar 11, 2025Updated last year
- CISOinaBox is a free community framework to organize tools, templates, and resources to help equip new CISOs and set them up for success.…☆34Apr 22, 2026Updated last week
- In 'n Out - See what goes in and comes out of PEs☆35May 12, 2022Updated 3 years ago
- An attempt to simplify the process to check iPhones for the Pegasus spyware.☆18Sep 5, 2021Updated 4 years ago