Skip to content

Instantly share code, notes, and snippets.

💭
:cheeeeeese:

Royce Williams roycewilliams

💭
:cheeeeeese:
Block or report user

Report or block roycewilliams

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@roycewilliams
roycewilliams / bcrypt-ascending.txt
Last active Jun 1, 2019
bcrypt hashes for 'password', all costs (4 through 31)
View bcrypt-ascending.txt
#-----------------------------------------------------------
# bcrypt hashes for the plain 'password', costs 4 through 31
#-----------------------------------------------------------
#
# htpasswd version matters - this one is from apache2-utils (2.4.18-2ubuntu3.10)
# Note that the official Apache version now stops at bcrypt cost 18:
#
# https://bz.apache.org/bugzilla/show_bug.cgi?id=62078
#
# I am not sure if the Ubuntu version is being modified downstream.
@roycewilliams
roycewilliams / nested-bcrypt-examples.txt
Last active Mar 23, 2019
nested-bcrypt-examples.txt
View nested-bcrypt-examples.txt
------------------------------------------------------------------------------
# Examples of nested bcrypt
# using both binary (expected) and ASCII (naive) forms of each core hash
#
# Last updated 2019-03-23
------------------------------------------------------------------------------
Types most likely to encounter in the wild:
* bcrypt(base64(sha256_bin(password))) - passlib 'bcrypt-sha256' format
@roycewilliams
roycewilliams / benchmark_hashcat-v5.1.0-597-g9b916918_irongiant_2019-02-23.txt
Created Feb 23, 2019
benchmark_hashcat-v5.1.0-597-g9b916918_irongiant_2019-02-23.txt
View benchmark_hashcat-v5.1.0-597-g9b916918_irongiant_2019-02-23.txt
hashcat (v5.1.0-597-g9b916918) starting in benchmark mode...
OpenCL Platform #1: NVIDIA Corporation
======================================
* Device #1: GeForce GTX 1080, 2029/8119 MB allocatable, 20MCU
* Device #2: GeForce GTX 1080, 2029/8119 MB allocatable, 20MCU
* Device #3: GeForce GTX 1080, 2029/8119 MB allocatable, 20MCU
* Device #4: GeForce GTX 1080, 2029/8119 MB allocatable, 20MCU
* Device #5: GeForce GTX 1080, 2029/8119 MB allocatable, 20MCU
* Device #6: GeForce GTX 1080, 2029/8119 MB allocatable, 20MCU
View clientside-software-update-verification-failures.md

Client-side software update verification failures

Exploitable vulnerabilities in client-side software update mechanisms that could have been mitigated by secure transport (TLS). Contributions welcome. All text taken from the vulnerability descriptions themselves, with additional emphasis mine.

And to be clear, I'm a fan of both verification and transport encryption. I feel that each can help mitigate potential issues with the other. Both are necessary, but neither is sufficient.

@roycewilliams
roycewilliams / extension-IDs-from-Somé-INRIA-paper.txt
Last active Jan 23, 2019
Extensions using exploitable APIs mentioned in the 2019 INRIA paper by Somé
View extension-IDs-from-Somé-INRIA-paper.txt
# References:
#
# Cimpanu article: https://www.zdnet.com/article/websites-can-steal-browser-data-via-extensions-apis/
# Testing tool: https://www-sop.inria.fr/members/Doliere.Some/empoweb/extsanalyzer/
# Paper: https://www-sop.inria.fr/members/Doliere.Some/papers/empoweb.pdf
#
abenhehmjmoifipfpjeaejpbeeihnokp
aclhfmpoahihmhhacaekgcbjaeojnifa
aefmgkhgcmdljpfijlohmbhkhflmbmfi
afddmpnodjaifgjibafjcbfaplnoipei
@roycewilliams
roycewilliams / crude-diceware-acceleration.sh
Last active Jan 15, 2019
Crude example of using rules for the fourth word to accelerate performance of hashcat attack of 4-way Diceware (separated by spaces)
View crude-diceware-acceleration.sh
#!/bin/bash
#-----------------------------------------------------------------------
# Crude example of using rules for the fourth word to accelerate
# performance of hashcat attack on a four-word Diceware passphrase,
# separated by spaces
#-----------------------------------------------------------------------
TEST_PLAIN="vine embalm blood micro"
TEST_MD5=$(echo -n ${TEST_PLAIN} | md5sum | awk '{print $1}')
pp64() { /usr/local/bin/pp64.bin $*; }
View firefox-adult-inadjacency-cracked.txt
# Cracks of Firefox's adult/inadjacency list
# https://gist.github.com/roycewilliams/04ed6eb9509b83ce4d85873861c7f7b4
#
# Hash source is base64-encoded binary MD5:
# https://dxr.mozilla.org/mozilla-central/source/browser/components/newtab/lib/FilterAdult.jsm
#
# Converted with: for item in $(cat hashes-base64.list); do echo $item | base64 -d | xxd -p; done
#
# Cracked by @tychotithonus and associates
# Last few tricky ones cracked by @s3inlc
@roycewilliams
roycewilliams / firefox-adult-inadjacency-analysis.txt
Last active Jan 14, 2019
A comparison of Firefox's adult-site/inadjacency blacklist and its sources
View firefox-adult-inadjacency-analysis.txt
# ----------------------------------------------------------------------------------
# Firefox list (base64-encoded binary MD5):
# https://dxr.mozilla.org/mozilla-central/source/browser/components/newtab/lib/FilterAdult.jsm
# Convert with: for item in $(cat hashes-base64.list); do echo $item | base64 -d | xxd -p; done
#
# Firefox inadjacency commit:
# https://hg.mozilla.org/mozilla-central/log/default/browser/base/content/newtab/newTab.inadjacent.json
#
# Ruttley list (apparent original source for the Firefox list):
# https://github.com/matthewruttley/contentfilter/blob/master/sites.json
View dmarc-parser-csv.py
#!/usr/bin/python
# Via: https://github.com/prbinu/dmarc-report-processor/blob/master/bin/dmarc-parser.py
#
# Copyright (c) 2014, Yahoo! Inc.
# Copyrights licensed under the New BSD License. See the
# accompanying LICENSE.txt file for terms.
#
# Author Binu P. Ramakrishnan
# Created 09/12/2014
#
@roycewilliams
roycewilliams / mta-sts_scans-io_dns-any_2018-08-24.txt
Created Sep 16, 2018
MTA-STS hostnames from the scans.io "DNS ANY" dataset as of 2018-08-24
View mta-sts_scans-io_dns-any_2018-08-24.txt
mta-sts.0xdeadbeef600ddecafbad.de,cname,sb33.not-your-server.de
mta-sts.123apps.net,cname,mta-sts.luteijn.email
mta-sts.79p.de,cname,79p.de
mta-sts.abel-battenberg.de,a,78.46.137.164
mta-sts.abel-fkb.de,a,78.46.137.164
mta-sts.adrien-martin.net,cname,adrien-martin.net
mta-sts.akademeia.moe,cname,mta-sts.luteijn.email
mta-sts.akademiaf2p.pl,cname,ha.hetzner.tensquaregames.com
mta-sts.alainwolf.ch,cname,mta-sts.urown.net
mta-sts.alainwolf.net,cname,mta-sts.urown.net
You can’t perform that action at this time.