Skip to content

Instantly share code, notes, and snippets.

Avatar
💭
:cheeeeeese:

Royce Williams roycewilliams

💭
:cheeeeeese:
View GitHub Profile
@roycewilliams
roycewilliams / hashmob-topmasks-len1-6.txt
Last active May 12, 2022
Masks from hashmob founds of length 1 through 6
View hashmob-topmasks-len1-6.txt
### ----------------------------------------------------------------------------
### Masks from hashmob 'official' founds (not user-submitted), length 1 through 6
### Source: https://gist.github.com/roycewilliams/cc78a971da935778d5469cdaf54e8980
### As of: 2022-05-12
### Only useful for slow hashes (?a x6 can be exhausted very quickly for fast hashes),
### and so obviously only the first few % of this list will be most useful.
### ----------------------------------------------------------------------------
?l?l?l?l?l?l,10213591
?l?l?l?l?l,8150008
?l?l?l?l?d?d,3485274
@roycewilliams
roycewilliams / i18n.txt
Created May 7, 2022
i18n check - one character per many Unicode areas
View i18n.txt
À à Ā Ġ ŀ Š ƀ Ơ ǀ Ǡ Ȁ Ƞ ɀ ɠ ʀ ʠ ˀ ˠ ̀ ̠ ̀ ͠ ΀ Π π Ϡ Ѐ Р р Ѡ Ҁ Ҡ Ӏ Ӡ Ԁ Ԡ ؠ ـ ٠ ڀ ऀ ठ ी ࿀ Ⴀ Ꭰ ᐀ ᖀ   ᚠ ᛀ ᛠ ᴀ ᴠ ᵀ Ḁ Ḡ Ṁ Ṡ Ẁ Ạ Ề Ỡ ἀ ἠ ὀ ὠ ᾀ ᾠ ῀ ῠ   † ⁀ ⁠ ₀ ₠ ⃀ ⃠ ℀ ℠ ⅀ Ⅰ ↀ ↠ ⇀ ⇠ ∀ ∠ ≀ ≠ ⊀ ⊠ ⋀ ⋠ ⌀ ⌠ ⍀ ⍠ ⎀ ⎠ ⏀ ⏠ ␀ ␠ ⑀ ① ⒀ ⒠ Ⓚ ⓠ ─ ┠ ╀ ╠ ▀ ■ ◀ ◠ ☀ ☠ ♀ ♠ ⚀ ⚠ ✀ ✠ ❀ ❠ ➀ ➠ ⟀ ⟠ ⠀ ⠠ ⡀ ⡠ ⢀ ⢠ ⣀ ⣠ ⤀ ⤠ ⥀ ⥠ ⦀ ⦠ ⧀ ⧠ ⨀ ⨠ ⩀ ⩠ ⪀ ⪠ ⫀ ⫠ ⬀ ⬠ Ⱡ ⺀ ⺠ ⻀ ⻠ ⼀ ⼠ ⽀ ぀ だ ㍠ ㎀ ㎠ ㏀ 僀 僠 ꧠ 가 갠        ff ﬠ ¢ 𝌀 𝔠 𝕀 𝕠 𦤀
@roycewilliams
roycewilliams / sha384-10k-rounds-password.txt
Created Mar 19, 2022
The first 10,000 rounds of SHA384("password")
View sha384-10k-rounds-password.txt
This file has been truncated, but you can view the full file.
# The first 10,000 rounds of SHA384("password")
# Courtesy MDXfind - https://hashes.org/mdxfind.php
# (Mirror: https://www.techsolvency.com/pub/bin/mdxfind/)
# Source: https://gist.github.com/roycewilliams/4dbc164d782e0a544aaa2f12edcda204
#
# See also: https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57
#
$ echo -n 'password' | mdxfind -h '^SHA384$' -z -f /dev/null -i 10000 stdin 2>&1 | fgrep password | sort -tx -n -k 2 | align
@roycewilliams
roycewilliams / sha512-10k-rounds-password.txt
Last active Mar 19, 2022
The first 10,000 rounds of SHA512("password")
View sha512-10k-rounds-password.txt
This file has been truncated, but you can view the full file.
# The first 10,000 rounds of SHA512("password")
# Courtesy MDXfind - https://hashes.org/mdxfind.php
# (Mirror: https://www.techsolvency.com/pub/bin/mdxfind/)
# Source: https://gist.github.com/roycewilliams/9e4e58c4493a21e550b73627e5ee5340
#
# See also: https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57
#
$ echo -n 'password' | mdxfind -h '^SHA512$' -z -f /dev/null -i 10000 stdin 2>&1 | fgrep password | sort -tx -n -k 2 | align
SHA512x01 b109f3bbbc244eb82441917ed06d618b9008dd09b3befd1b5e07394c706a8bb980b1d7785e5976ec049b46df5f1326af5a2ea6d103fd07c95385ffab0cacbc86:password
@roycewilliams
roycewilliams / sha256-10k-rounds-password.txt
Last active Mar 19, 2022
The first 10,000 rounds of SHA256("password")
View sha256-10k-rounds-password.txt
# The first 10,000 rounds of SHA256("password")
# Courtesy MDXfind - https://hashes.org/mdxfind.php
# (Mirror: https://www.techsolvency.com/pub/bin/mdxfind/)
# Source: https://gist.github.com/roycewilliams/56b17c9d8c6937725ee7e6331db79fda
#
# See also: https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57
#
$ echo -n 'password' | mdxfind -h '^SHA256$' -z -f /dev/null -i 10000 stdin 2>&1 | fgrep password | sort -tx -n -k 2 | align
SHA256x01 5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8:password
SHA256x02 113459eb7bb31bddee85ade5230d6ad5d8b2fb52879e00a84ff6ae1067a210d3:password
@roycewilliams
roycewilliams / sha1-10k-rounds-password.txt
Last active Mar 19, 2022
The first 10,000 rounds of SHA1("password")
View sha1-10k-rounds-password.txt
# The first 10,000 rounds of SHA1("password")
# Courtesy MDXfind - https://hashes.org/mdxfind.php
# (Mirror: https://www.techsolvency.com/pub/bin/mdxfind/)
# Source: https://gist.github.com/roycewilliams/1c8044e40ed0716f99a773036a8891ac
#
# See also: https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57
#
$ echo -n 'password' | mdxfind -h '^SHA1$' -z -f /dev/null -i 10000 stdin 2>&1 | fgrep password | sort -tx -n -k 2 | align
SHA1x01 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8:password
SHA1x02 353e8061f2befecb6818ba0c034c632fb0bcae1b:password
@roycewilliams
roycewilliams / sha512crypt_autotune_demo.php
Last active Feb 26, 2022
sha512crypt PHP autotune demo
View sha512crypt_autotune_demo.php
<?php
//------------------------------------------------------------------------
// Name: sha512crypt_autotune_demo.php v1.1
// Purpose: demo of tuning sha512crypt rounds to match platform speed
// Author: Royce Williams - royce@techsolvency.com
// License: MIT
// Source: https://gist.github.com/roycewilliams/09ddd10504d560c02b28049759cd666f
//
// To test, SSH to your system, fetch the file, and then run it as PHP.
@roycewilliams
roycewilliams / malign.pl
Created Jan 18, 2022
malign.pl - align code blocks in context (called from vim)
View malign.pl
# /usr/bin/perl
#-----------------------------------------------------------------------
# $Id: malign,v 1.2 2018/06/16 22:25:40 root Exp root $
# Created: 2010-02-08
# Description: Determine the narrowest left margin in passed text,
# then pad the output of align with this pad (less 1, align's left margin).
#-----------------------------------------------------------------------
use strict;
use warnings;
@roycewilliams
roycewilliams / amazon-terms-GLSBYFE9MGKKQXXM.txt
Last active Jul 20, 2021
amazon-terms-GLSBYFE9MGKKQXXM.txt
View amazon-terms-GLSBYFE9MGKKQXXM.txt
Conditions of Use
Last updated: May 3, 2021
Welcome to Amazon.com. Amazon.com Services LLC and/or its affiliates ("Amazon") provide website features and other products and services to you when you visit or shop at Amazon.com, use Amazon products or services, use Amazon applications for mobile, or use software provided by Amazon in connection with any of the foregoing (collectively, "Amazon Services"). By using the Amazon Services, you agree, on behalf of yourself and all members of your household and others who use any Service under your account, to the following conditions.
Please read these conditions carefully.
We offer a wide range of Amazon Services, and sometimes additional terms may apply. When you use an Amazon Service (for example, Your Profile, Gift Cards, Amazon Video, Your Media Library, Amazon devices, or Amazon applications) you also will be subject to the guidelines, terms and agreements applicable to that Amazon Service ("Service Terms"). If these Conditions of Use are inconsistent with th
View mtgox-yubikey.txt
# Mirror of: https://jenda.hrach.eu/f2/mtgox-yubikey.txt
#
# If you have a Mt Gox YubiKey and are looking to turn it into a generic YubiKey ... don't!
# I am motivated to trade you two standard modern YubiKeys of your choosing for an unaltered
# Mt Gox YubiKey for my lab/collection - contact me at royce@techsolvency.com. Thanks!
#
Yubikey Prefix Password
======= ====== ========
123456A d2868706da69 32e193d3e932
123456B cf0d9f4b8d2b d4deb686e7bc