Skip to content

Instantly share code, notes, and snippets.

View evilmog's full-sized avatar

Dustin Heywood evilmog

View GitHub Profile
{
"$schema": "https://raw.githubusercontent.com/jsonresume/resume-schema/v1.0.0/schema.json",
"basics": {
"name": "Dustin Heywood",
"label": "Leader, Hacker, Password Specialist, EvilMog from Team Hashcat, Network Ninja, Conference Speaker, Researcher. Hacker Jeopardy World Champion.",
"email": "dustin.heywood@gmail.com",
"phone": "403-850-0550",
"url": "https://www.linkedin.com/in/evilmog/",
"summary": "Dustin Heywood, also known as Evil Mog in the cyber-security industry, is a highly skilled and experienced cybersecurity professional specializing in penetration testing, red teaming, vulnerability analysis, and password security research. With a solid background in security research, exploit development, and system administration across both Linux and Windows platforms, Dustin excels at identifying and mitigating potential threats to ensure the safety of critical systems and networks. Holding notable certifications such as CISSP, ISP, OSCP, and OSCE, EvilMog is also an active memb
@evilmog
evilmog / netntlmv1.py
Last active April 25, 2017 16:27
netntlmv1 prototype
import platform
import subprocess
import os
hash_input = raw_input("Please enter hash: ")
if not hash_input:
hash_input="johndoe::test-domain:1FA1B9C4ED8E570200000000000000000000000000000000:1B91B89CC1A7417DF9CFAC47CCDED2B77D01513435B36DCA:1122334455667788"
h_user, h_blank, h_domain, h_hash1, h_hash2, h_challenge = hash_input.split(':')

Keybase proof

I hereby claim:

  • I am evilmog on github.
  • I am evilmog (https://keybase.io/evilmog) on keybase.
  • I have a public key whose fingerprint is 7EE7 5AA3 0007 60B0 D1AD A488 B166 2C90 DB7C 04C5

To claim this, I am signing this object: