Skip to content

Instantly share code, notes, and snippets.

Avatar
💭
:cheeeeeese:

Royce Williams roycewilliams

💭
:cheeeeeese:
View GitHub Profile
@roycewilliams
roycewilliams / mdxfind-empty-hashes.txt
Last active Aug 5, 2022
mdxfind-empty-hashes.txt
View mdxfind-empty-hashes.txt
# A list of hashes for the empty string
#
# Source: https://gist.github.com/roycewilliams/e491f8db6ee388ff0c1ce71d808c191b
#
$ echo '' | mdxfind -h 'ALL' -h '!salt,!user,!crypt,!rev' -z -f /dev/null -i 1 stdin 2>&1 | egrep -v 'hashes found' | sort
Debug output - output all hashes, explore long hash chains
Iterations set to 1
Working on hash types: MD5 MD5UC MD4 MD2 WRL HAV128 SHA0 SHA1 SHA224 SHA256 SHA384 SHA512 GOST HAV256 RMD128 RMD160 TIGER TTH HAS160 EDON256 EDON512 SNE128 SNE256 MD6 MD6256 MD6512 MDC2 MD5RAW SHA224RAW SHA256RAW SHA384RAW SHA512RAW HAV128_4 HAV128_5 HAV160_3 HAV160_4 HAV160_5 HAV192_3 HAV192_4 HAV192_5 HAV224_3 HAV224_4 HAV224_5 HAV256_4 HAV256_5 BLAKE224 BLAKE256 BLAKE384 BLAKE512 BMW224 BMW256 BMW384 BMW512 CUBE224 CUBE256 CUBE384 CUBE512 ECHO224 ECHO256 ECHO384 ECHO512 FUGUE224 FUGUE256 FUGUE384 FUGUE512 GROESTL224 GROESTL256 GROESTL384 GROESTL512 HAMSI224 HAMSI256 HAMSI384 HAMSI512 JH224 JH256 JH384 JH512 SHA3-224 SHA3-256 SHA3-384 SHA3-512 LUFFA224 LUFFA256 LUFFA384 LUFFA512 PANAM
@roycewilliams
roycewilliams / hashmob-topmasks-len1-6.txt
Last active May 12, 2022
Masks from hashmob founds of length 1 through 6
View hashmob-topmasks-len1-6.txt
### ----------------------------------------------------------------------------
### Masks from hashmob 'official' founds (not user-submitted), length 1 through 6
### Source: https://gist.github.com/roycewilliams/cc78a971da935778d5469cdaf54e8980
### As of: 2022-05-12
### Only useful for slow hashes (?a x6 can be exhausted very quickly for fast hashes),
### and so obviously only the first few % of this list will be most useful.
### ----------------------------------------------------------------------------
?l?l?l?l?l?l,10213591
?l?l?l?l?l,8150008
?l?l?l?l?d?d,3485274
@roycewilliams
roycewilliams / i18n.txt
Created May 7, 2022
i18n check - one character per many Unicode areas
View i18n.txt
À à Ā Ġ ŀ Š ƀ Ơ ǀ Ǡ Ȁ Ƞ ɀ ɠ ʀ ʠ ˀ ˠ ̀ ̠ ̀ ͠ ΀ Π π Ϡ Ѐ Р р Ѡ Ҁ Ҡ Ӏ Ӡ Ԁ Ԡ ؠ ـ ٠ ڀ ऀ ठ ी ࿀ Ⴀ Ꭰ ᐀ ᖀ   ᚠ ᛀ ᛠ ᴀ ᴠ ᵀ Ḁ Ḡ Ṁ Ṡ Ẁ Ạ Ề Ỡ ἀ ἠ ὀ ὠ ᾀ ᾠ ῀ ῠ   † ⁀ ⁠ ₀ ₠ ⃀ ⃠ ℀ ℠ ⅀ Ⅰ ↀ ↠ ⇀ ⇠ ∀ ∠ ≀ ≠ ⊀ ⊠ ⋀ ⋠ ⌀ ⌠ ⍀ ⍠ ⎀ ⎠ ⏀ ⏠ ␀ ␠ ⑀ ① ⒀ ⒠ Ⓚ ⓠ ─ ┠ ╀ ╠ ▀ ■ ◀ ◠ ☀ ☠ ♀ ♠ ⚀ ⚠ ✀ ✠ ❀ ❠ ➀ ➠ ⟀ ⟠ ⠀ ⠠ ⡀ ⡠ ⢀ ⢠ ⣀ ⣠ ⤀ ⤠ ⥀ ⥠ ⦀ ⦠ ⧀ ⧠ ⨀ ⨠ ⩀ ⩠ ⪀ ⪠ ⫀ ⫠ ⬀ ⬠ Ⱡ ⺀ ⺠ ⻀ ⻠ ⼀ ⼠ ⽀ ぀ だ ㍠ ㎀ ㎠ ㏀ 僀 僠 ꧠ 가 갠        ff ﬠ ¢ 𝌀 𝔠 𝕀 𝕠 𦤀
@roycewilliams
roycewilliams / sha384-10k-rounds-password.txt
Created Mar 19, 2022
The first 10,000 rounds of SHA384("password")
View sha384-10k-rounds-password.txt
This file has been truncated, but you can view the full file.
# The first 10,000 rounds of SHA384("password")
# Courtesy MDXfind - https://hashes.org/mdxfind.php
# (Mirror: https://www.techsolvency.com/pub/bin/mdxfind/)
# Source: https://gist.github.com/roycewilliams/4dbc164d782e0a544aaa2f12edcda204
#
# See also: https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57
#
$ echo -n 'password' | mdxfind -h '^SHA384$' -z -f /dev/null -i 10000 stdin 2>&1 | fgrep password | sort -tx -n -k 2 | align
@roycewilliams
roycewilliams / sha512-10k-rounds-password.txt
Last active Mar 19, 2022
The first 10,000 rounds of SHA512("password")
View sha512-10k-rounds-password.txt
This file has been truncated, but you can view the full file.
# The first 10,000 rounds of SHA512("password")
# Courtesy MDXfind - https://hashes.org/mdxfind.php
# (Mirror: https://www.techsolvency.com/pub/bin/mdxfind/)
# Source: https://gist.github.com/roycewilliams/9e4e58c4493a21e550b73627e5ee5340
#
# See also: https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57
#
$ echo -n 'password' | mdxfind -h '^SHA512$' -z -f /dev/null -i 10000 stdin 2>&1 | fgrep password | sort -tx -n -k 2 | align
SHA512x01 b109f3bbbc244eb82441917ed06d618b9008dd09b3befd1b5e07394c706a8bb980b1d7785e5976ec049b46df5f1326af5a2ea6d103fd07c95385ffab0cacbc86:password
@roycewilliams
roycewilliams / sha256-10k-rounds-password.txt
Last active Mar 19, 2022
The first 10,000 rounds of SHA256("password")
View sha256-10k-rounds-password.txt
# The first 10,000 rounds of SHA256("password")
# Courtesy MDXfind - https://hashes.org/mdxfind.php
# (Mirror: https://www.techsolvency.com/pub/bin/mdxfind/)
# Source: https://gist.github.com/roycewilliams/56b17c9d8c6937725ee7e6331db79fda
#
# See also: https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57
#
$ echo -n 'password' | mdxfind -h '^SHA256$' -z -f /dev/null -i 10000 stdin 2>&1 | fgrep password | sort -tx -n -k 2 | align
SHA256x01 5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8:password
SHA256x02 113459eb7bb31bddee85ade5230d6ad5d8b2fb52879e00a84ff6ae1067a210d3:password
@roycewilliams
roycewilliams / sha1-10k-rounds-password.txt
Last active Mar 19, 2022
The first 10,000 rounds of SHA1("password")
View sha1-10k-rounds-password.txt
# The first 10,000 rounds of SHA1("password")
# Courtesy MDXfind - https://hashes.org/mdxfind.php
# (Mirror: https://www.techsolvency.com/pub/bin/mdxfind/)
# Source: https://gist.github.com/roycewilliams/1c8044e40ed0716f99a773036a8891ac
#
# See also: https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57
#
$ echo -n 'password' | mdxfind -h '^SHA1$' -z -f /dev/null -i 10000 stdin 2>&1 | fgrep password | sort -tx -n -k 2 | align
SHA1x01 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8:password
SHA1x02 353e8061f2befecb6818ba0c034c632fb0bcae1b:password
@roycewilliams
roycewilliams / sha512crypt_autotune_demo.php
Last active Feb 26, 2022
sha512crypt PHP autotune demo
View sha512crypt_autotune_demo.php
<?php
//------------------------------------------------------------------------
// Name: sha512crypt_autotune_demo.php v1.1
// Purpose: demo of tuning sha512crypt rounds to match platform speed
// Author: Royce Williams - royce@techsolvency.com
// License: MIT
// Source: https://gist.github.com/roycewilliams/09ddd10504d560c02b28049759cd666f
//
// To test, SSH to your system, fetch the file, and then run it as PHP.
@roycewilliams
roycewilliams / malign.pl
Created Jan 18, 2022
malign.pl - align code blocks in context (called from vim)
View malign.pl
# /usr/bin/perl
#-----------------------------------------------------------------------
# $Id: malign,v 1.2 2018/06/16 22:25:40 root Exp root $
# Created: 2010-02-08
# Description: Determine the narrowest left margin in passed text,
# then pad the output of align with this pad (less 1, align's left margin).
#-----------------------------------------------------------------------
use strict;
use warnings;
@roycewilliams
roycewilliams / amazon-terms-GLSBYFE9MGKKQXXM.txt
Last active Jul 20, 2021
amazon-terms-GLSBYFE9MGKKQXXM.txt
View amazon-terms-GLSBYFE9MGKKQXXM.txt
Conditions of Use
Last updated: May 3, 2021
Welcome to Amazon.com. Amazon.com Services LLC and/or its affiliates ("Amazon") provide website features and other products and services to you when you visit or shop at Amazon.com, use Amazon products or services, use Amazon applications for mobile, or use software provided by Amazon in connection with any of the foregoing (collectively, "Amazon Services"). By using the Amazon Services, you agree, on behalf of yourself and all members of your household and others who use any Service under your account, to the following conditions.
Please read these conditions carefully.
We offer a wide range of Amazon Services, and sometimes additional terms may apply. When you use an Amazon Service (for example, Your Profile, Gift Cards, Amazon Video, Your Media Library, Amazon devices, or Amazon applications) you also will be subject to the guidelines, terms and agreements applicable to that Amazon Service ("Service Terms"). If these Conditions of Use are inconsistent with th