Skip to content

Instantly share code, notes, and snippets.

View rarecoil's full-sized avatar
💭
<|endoftext|>

レアコイル rarecoil

💭
<|endoftext|>
View GitHub Profile
@rarecoil
rarecoil / ArchWSL_alarm_distcc.md
Last active May 1, 2019 20:22
Windows 10 LTSC as an Arch Linux ARM Build Slave for RPi 3

Windows 10 LTSC as an Arch Linux ARM RPi 3 Build Slave

Your SBC (in my case a Raspberry Pi 3) is likely not the fastest machine in your collection. Thankfully, if you have a laptop or desktop you normally use, you can recruit it to assist your Raspberry Pi in compiling Arch Linux packages for itself. It is fairly easy to do with another Arch Linux machine, but a little tougher if you don't have one running that.

I have two laptops, a ThinkPad X250 running Windows 10 Enterprise LTSC and an Apple MacBook. The X250's i7-5600U has a substantial amount more power than my MacBook, but runs Windows. This is not a big deal with the Windows Subsystem for Linux and distcc, a distributed C compiler infrastructure.

For this to work, both computers must be on the same network and they must be able to talk to each other.

@rarecoil
rarecoil / maskify.py
Last active November 30, 2021 19:49
Multithreaded script to analyze & create hashcat-esque unique password masks from large password lists.
#!/usr/bin/env python3
"""
maskify.py
Creates password categorization masks from big password lists
in a multithreaded fashion. Note that it assumes you have enough
RAM to hold the unique mask dict in memory. Used to analyze a 300M+
unique password list for types and occurrences.
On an ODROID-C2, runs at about 50-52K passwords/sec.
@rarecoil
rarecoil / maskify.go
Created May 20, 2019 02:07
Generate hashcat masks from a password list. Much faster than maskify.py
package main
import (
"bufio"
"fmt"
"log"
"os"
"strings"
"time"
)
@rarecoil
rarecoil / emdeefive.py
Created June 4, 2019 05:22
Emdee five for life (HackTheBox Web Challenge)
import requests
import hashlib
URI = "http://docker.hackthebox.eu:35596"
PROXIES = {} # {'http':'http://127.0.0.1:8080'}
def get_and_hash(ret):
begin = ret.find("<h3 align='center'>") + 19
end = ret.find("</h3>")
md5_string = ret[begin:end].encode('utf-8')
@rarecoil
rarecoil / webpack_source_reconstruct.py
Created June 12, 2019 00:49
Reconstruct source files from a webpack-made sourceMap
#!/usr/bin/env python3
import json
import os
import sys
def main():
if len(sys.argv) != 2:
print("Usage: webpack_source_reconstruct.py /path/to/source.map")
sys.exit(1)
### Keybase proof
I hereby claim:
* I am rarecoil on github.
* I am rarecoil (https://keybase.io/rarecoil) on keybase.
* I have a public key ASDSt6Q-Z4zQW-9MrmJfpHfSBAI2gIEH4hwI7yZTE8BGEAo
To claim this, I am signing this object:
@rarecoil
rarecoil / rx5700xt-bench.txt
Created September 16, 2019 19:12
AMD Radeon RX 5700 XT Reference Card - hashcat 5.1.0 benchmark
hashcat (v5.1.0-1397-g7f4df9eb) starting in benchmark mode...
Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.
/sys/bus/pci/devices/0000:23:00.0/hwmon/hwmon0/temp1_input: unexpected data.
OpenCL API (OpenCL 2.1 AMD-APP (2906.7)) - Platform #1 [Advanced Micro Devices, Inc.]
@rarecoil
rarecoil / wx3200-bench-optimised.txt
Created September 21, 2019 03:11
AMD Radeon Pro WX 3200 hashcat Benchmark (Windows 10)
hashcat (v5.1.0) starting in benchmark mode...
Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.
OpenCL Platform #1: Advanced Micro Devices, Inc.
================================================
* Device #1: gfx804, 3264/4096 MB allocatable, 10MCU
@rarecoil
rarecoil / rulegen.py3
Created September 21, 2019 06:18
iphelix/PACK hashcat rulegen for Python 3
#!/usr/bin/env python3
# Rulegen.py - Advanced automated password rule and wordlist generator for the
# Hashcat password cracker using the Levenshtein Reverse Path
# algorithm and Enchant spell checking library.
#
# This tool is part of PACK (Password Analysis and Cracking Kit)
#
# VERSION 0.0.3
#
# Copyright (C) 2013 Peter Kacherginsky
@rarecoil
rarecoil / plaidbench-rx5700-xt.txt
Last active December 9, 2019 14:16
AMD Radeon RX 5700 XT (Navi) PlaidML - plaidbench deep learning benchmarks
Running 1024 examples with mobilenet, batch size 1, on backend plaid
INFO:plaidml:Opening device "opencl_amd_gfx1010.0"
Compiling network... Warming up... Running...
Example finished, elapsed: 6.513s (compile), 7.912s (execution)
-----------------------------------------------------------------------------------------
Network Name Inference Latency Time / FPS
-----------------------------------------------------------------------------------------
mobilenet 7.73 ms 1.67 ms / 599.91 fps
Correctness: PASS, max_error: 7.314303729799576e-06, max_abs_error: 6.407499313354492e-07, fail_ratio: 0.0