Skip to content

Instantly share code, notes, and snippets.

Avatar
💭
:cheeeeeese:

Royce Williams roycewilliams

💭
:cheeeeeese:
View GitHub Profile
@roycewilliams
roycewilliams / bindify.py
Created Feb 3, 2021 — forked from gmr/bindify.py
Convert tinydns zone files to bind
View bindify.py
#!/usr/bin/env python
import collections
import datetime
from os import path
import pickle
import sys
if len(sys.argv) < 2:
print('Usage: bindify.py zonefile')
View security-key-u2f-support.txt
# Based on data from https://www.dongleauth.info/
# Located at: https://gist.github.com/roycewilliams/397c9151b4136b8adb46e0bab2515e97
# Last updated 2020-11-23
name: 1Password u2f: Yes multipleu2f: Yes
name: Amazon Web Services u2f: Yes
name: Authelia u2f: Yes
name: Bitbucket u2f: Yes
name: Bitfinex u2f: Yes
name: bitwarden u2f: Yes multipleu2f: Yes
name: Boxcryptor u2f: Yes
View softpaq-ia-list.txt
# Comparison of my local early Softpaq archive (0000-1500)
# with the Internet Archive's (https://archive.org/download/ftp.compaq.com/2014.06.ftp.compaq.com.tar.txt)
#
$ sdiff -w80 <(grep sp[01]...\- paqs-local.list|egrep -v /unpack/ | lc) <(grep sp[01]...\- paqs-ia.list | lc)
sp0000-0500 | sp0000-0500/
sp0000-0500/0000.txt sp0000-0500/0000.txt
sp0000-0500/sp0001.zip <
sp0000-0500/sp0002.zip <
sp0000-0500/sp0003.zip <
sp0000-0500/sp0004.zip <
View zxcvbn-wordlist.txt
#------------------------------------------------------------------------------
# Dropbox zxcvbn raw word list
# File location:
# https://gist.github.com/roycewilliams/d92b58490eeb52f7f3fa40dc0411d107
#------------------------------------------------------------------------------
# Based on:
# https://github.com/dropbox/zxcvbn/blob/master/src/frequency_lists.coffee
# As of: 2020-09-06
# Converted with:
# grep 'passwords:' frequency_lists.coffee | cut -d\" -f2 | tr ',' '\n'
@roycewilliams
roycewilliams / pwnedpasswords-v6-top20k.txt
Last active Feb 18, 2021
pwnedpasswords-v6-top20k.txt
View pwnedpasswords-v6-top20k.txt
This file has been truncated, but you can view the full file.
#------------------------------------------------------------------------------
# Top 20K hashes from the Troy Hunt / haveibeenpwned Pwned Passwords list v6 (2020-06-19)
# with frequency count and cracked plaintext passwords
#
# The latest version of this file can be found here:
# https://gist.github.com/roycewilliams/226886fd01572964e1431ac8afc999ce
# The equivalent of this file, but based on v2 of the Pwned Passwords, is here:
# https://gist.github.com/roycewilliams/281ce539915a947a23db17137d91aeb7
#------------------------------------------------------------------------------
View md5-10k-rounds-123456.txt
#
# The first 10,000 rounds of MD5("123456")
# Courtesy MDXfind - https://hashes.org/mdxfind.php
# Source: https://gist.github.com/roycewilliams/3b101d7bd9ea5beac1f828b6eac43858
#
# See also:
# https://github.com/roycewilliams/kens-salty-rainbow
# https://gist.github.com/roycewilliams/794e4d7a81e7840deae29fdc7c03fa10
# https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57
#
View mdxfind-allunsalted-123456.txt
#
# The string '123456', hashed with many unsalted hash types, up to 5 iterations deep
# Courtesy MDXfind - https://hashes.org/mdxfind.php
# https://gist.github.com/roycewilliams/7e4f892fd610889b9b446dde46402bba
#
# See also:
# https://github.com/roycewilliams/kens-salty-rainbow
# https://gist.github.com/roycewilliams/794e4d7a81e7840deae29fdc7c03fa10
# https://gist.github.com/roycewilliams/1603d23a4c5d3eda44fae348f6e0e954
# https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57
View descrypt-support-allsalts.txt
# All possible descrypt hashes of the password "support", using all possible salts.
# From https://github.com/roycewilliams/kens-salty-rainbow
# If you find a device that always uses one of these, let me know.
..dgWexPAozz2
./9NpDH3HAWP.
.0Ag.Z5wZWqqg
.1w5QRFKqb2TQ
.2v94tPBJS6T2
.3fnM3v8Ne6AI
.4KflzuMUYKic
View descrypt-user-allsalts.txt
# All possible descrypt hashes of the password "user", using all possible salts.
# From https://github.com/roycewilliams/kens-salty-rainbow
# If you find a device that always uses one of these, let me know.
..3Mu2kxrbEl.
./LoKvy9414Cc
.0rKn.kLFqzfc
.1.N4zi5eVgQc
.2hh28DR94IkI
.3Os.QLvwlY2U
.4nmpcNbxpSD.
View descrypt-12345-allsalts.txt
# All possible descrypt hashes of the password "12345", using all possible salts.
# From https://github.com/roycewilliams/kens-salty-rainbow
# If you find a device that always uses one of these, let me know.
..snDhyX38WTc
./rR8nrLbhgnc
.0w/m1BycOJP6
.1spFaRyIt6oE
.27J9WO2WE5ng
.3UmO/1CBLSvQ
.4iFN5e1Z/HKc