An analysis of the user password hashing algorithm used by Citrix NetScaler
☆15Sep 23, 2025Updated 5 months ago
Alternatives and similar repositories for NetScaler-Password-Hash-Type-5
Users that are interested in NetScaler-Password-Hash-Type-5 are comparing it to the libraries listed below
Sorting:
- CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE☆19Apr 17, 2025Updated 11 months ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- Python version of Praeda (Praeda-II) a MFP data harvesting tool☆14Feb 2, 2026Updated last month
- Python port of MailSniper to exfiltrate emails via EWS endpoint☆87Feb 2, 2022Updated 4 years ago
- ☆12Feb 24, 2023Updated 3 years ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Nov 25, 2025Updated 3 months ago
- Modular C2 server to tame your pack of wolves☆22Mar 14, 2026Updated last week
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- Tools for preservation of floppy disks☆15Nov 22, 2025Updated 3 months ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- BlurSPY app is a very useful cell phone tracking application, which features a number of useful functions. If it is installed on the targ…☆11Dec 16, 2021Updated 4 years ago
- ☆23Jun 1, 2023Updated 2 years ago
- OSEP - Offsec Expert Professional☆21Jun 23, 2024Updated last year
- ☆11Dec 22, 2020Updated 5 years ago
- ☆12Dec 23, 2021Updated 4 years ago
- Decrypts locally stored Pentaho Kettle (Spoon) Passwords☆16Jan 18, 2020Updated 6 years ago
- #HackingTogether☆14Jan 23, 2017Updated 9 years ago
- ☆15Jun 27, 2024Updated last year
- Checklists☆16Sep 22, 2016Updated 9 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated last year
- Deletes old email from my Gmail accounts☆15Oct 13, 2017Updated 8 years ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆27Jul 11, 2025Updated 8 months ago
- ARRS documentation☆15Aug 4, 2023Updated 2 years ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface. Implementation of ligolo-ng into sliver☆26Feb 27, 2025Updated last year
- USB armory: open source flash-drive-sized computer☆11Dec 8, 2015Updated 10 years ago
- An extension to supercharge your Codeforces profile with in-depth analytics and training insights.☆16Sep 13, 2025Updated 6 months ago
- a tool that creates permutations of domain names using homographic unicode characters☆21Oct 21, 2022Updated 3 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- ☆27May 6, 2024Updated last year
- Interested in intercepting phone calls or text messages? This application converts your phone into a Stingray/ GSM interceptor/IMSI catch…☆20Feb 23, 2021Updated 5 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Password Guessing for different Web Portals☆29Nov 14, 2018Updated 7 years ago
- Scanner for Zyxel products which are potentially vulnerable due to an undocumented user account (CVE-2020-29583)☆16Jan 4, 2021Updated 5 years ago
- Top hashpwn rules☆20Dec 12, 2025Updated 3 months ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- ☆26Mar 11, 2025Updated last year
- CISOinaBox is a free community framework to organize tools, templates, and resources to help equip new CISOs and set them up for success.…☆31Updated this week
- In 'n Out - See what goes in and comes out of PEs☆35May 12, 2022Updated 3 years ago