Skip to content

Instantly share code, notes, and snippets.

Avatar
💭
:cheeeeeese:

Royce Williams roycewilliams

💭
:cheeeeeese:
View GitHub Profile
View softpaq-ia-list.txt
# Comparison of my local early Softpaq archive (0000-1500)
# with the Internet Archive's (https://archive.org/download/ftp.compaq.com/2014.06.ftp.compaq.com.tar.txt)
#
$ sdiff -w80 <(grep sp[01]...\- paqs-local.list|egrep -v /unpack/ | lc) <(grep sp[01]...\- paqs-ia.list | lc)
sp0000-0500 | sp0000-0500/
sp0000-0500/0000.txt sp0000-0500/0000.txt
sp0000-0500/sp0001.zip <
sp0000-0500/sp0002.zip <
sp0000-0500/sp0003.zip <
sp0000-0500/sp0004.zip <
View zxcvbn-wordlist.txt
#------------------------------------------------------------------------------
# Dropbox zxcvbn raw word list
# File location:
# https://gist.github.com/roycewilliams/d92b58490eeb52f7f3fa40dc0411d107
#------------------------------------------------------------------------------
# Based on:
# https://github.com/dropbox/zxcvbn/blob/master/src/frequency_lists.coffee
# As of: 2020-09-06
# Converted with:
# grep 'passwords:' frequency_lists.coffee | cut -d\" -f2 | tr ',' '\n'
@roycewilliams
roycewilliams / pwnedpasswords-v6-top20k.txt
Last active Sep 6, 2020
pwnedpasswords-v6-top20k.txt
View pwnedpasswords-v6-top20k.txt
This file has been truncated, but you can view the full file.
#------------------------------------------------------------------------------
# Top 20K hashes from the Troy Hunt / haveibeenpwned Pwned Passwords list v6 (2020-06-19)
# with frequency count and cracked plaintext passwords
#
# The latest version of this file can be found here:
# https://gist.github.com/roycewilliams/226886fd01572964e1431ac8afc999ce
# The equivalent of this file, but based on v2 of the Pwned Passwords, is here:
# https://gist.github.com/roycewilliams/281ce539915a947a23db17137d91aeb7
#------------------------------------------------------------------------------
View md5-10k-rounds-123456.txt
#
# The first 10,000 rounds of MD5("123456")
# Courtesy MDXfind - https://hashes.org/mdxfind.php
# Source: https://gist.github.com/roycewilliams/3b101d7bd9ea5beac1f828b6eac43858
#
# See also:
# https://github.com/roycewilliams/kens-salty-rainbow
# https://gist.github.com/roycewilliams/794e4d7a81e7840deae29fdc7c03fa10
# https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57
#
View mdxfind-allunsalted-123456.txt
#
# The string '123456', hashed with many unsalted hash types, up to 5 iterations deep
# Courtesy MDXfind - https://hashes.org/mdxfind.php
# https://gist.github.com/roycewilliams/7e4f892fd610889b9b446dde46402bba
#
# See also:
# https://github.com/roycewilliams/kens-salty-rainbow
# https://gist.github.com/roycewilliams/794e4d7a81e7840deae29fdc7c03fa10
# https://gist.github.com/roycewilliams/1603d23a4c5d3eda44fae348f6e0e954
# https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57
View descrypt-support-allsalts.txt
# All possible descrypt hashes of the password "support", using all possible salts.
# From https://github.com/roycewilliams/kens-salty-rainbow
# If you find a device that always uses one of these, let me know.
..dgWexPAozz2
./9NpDH3HAWP.
.0Ag.Z5wZWqqg
.1w5QRFKqb2TQ
.2v94tPBJS6T2
.3fnM3v8Ne6AI
.4KflzuMUYKic
View descrypt-user-allsalts.txt
# All possible descrypt hashes of the password "user", using all possible salts.
# From https://github.com/roycewilliams/kens-salty-rainbow
# If you find a device that always uses one of these, let me know.
..3Mu2kxrbEl.
./LoKvy9414Cc
.0rKn.kLFqzfc
.1.N4zi5eVgQc
.2hh28DR94IkI
.3Os.QLvwlY2U
.4nmpcNbxpSD.
View descrypt-12345-allsalts.txt
# All possible descrypt hashes of the password "12345", using all possible salts.
# From https://github.com/roycewilliams/kens-salty-rainbow
# If you find a device that always uses one of these, let me know.
..snDhyX38WTc
./rR8nrLbhgnc
.0w/m1BycOJP6
.1spFaRyIt6oE
.27J9WO2WE5ng
.3UmO/1CBLSvQ
.4iFN5e1Z/HKc
View descrypt-1234-allsalts.txt
# All possible descrypt hashes of the password "1234", using all possible salts.
# From https://github.com/roycewilliams/kens-salty-rainbow
# If you find a device that always uses one of these, let me know.
..XrlQIyEopco
./DyUSqKOUOhI
.0t3va0DXrLyw
.18Ioyx0ZO4aE
.2Yp8ZQtYbcjk
.3MzeMXBu.iUM
.4XFdzXhC4vbA
View descrypt-admin-allsalts.txt
# All possible descrypt hashes of the password 'admin', using all possible salts.
# From https://github.com/roycewilliams/kens-salty-rainbow
# If you find a device that always uses one of these, let me know.
..xpoEyRReGzk
./nlIXYriZaB2
.08iPeaCLti3E
.1fH80ykoJAyI
.23PstrXfk7Nw
.37vRhjo4ZP66
.4nTonCOGSWyU
You can’t perform that action at this time.