View allbench.sh
#!/bin/bash
#-----------------------------------------------------------------------
# Created: 2017-10-17
# License: MIT
# Author: tychotithonus
#-----------------------------------------------------------------------
# Get list of algorithms.
View github-gists-roycewilliams-index.md
View benchmark_hashcat~v4.0.0rc4_irongiant_2017-10-13.txt
# hashcat benchmark for irongiant - 2017-10-13
# Format: default (each device shown separately)
# Devices: 6x NVIDIA 1080 Founders Edition
# Overclock: none
# Power limit: 150W (reduced from default 180W)
# hashcat version: v4.0.0rc4
# OS: Ubuntu 16.04 LTS
# NVIDIA driver: 375.66
View benchmark_hashcat~v4.0.0rc4_irongiant_2017-10-13_table.txt
# hashcat benchmark for irongiant - 2017-10-13
# Format: aggregate table (sum of all devices)
# Devices: 6x NVIDIA 1080 Founders Edition
# Overclock: none
# Power limit: 150W (reduced from default 180W)
# hashcat version: v4.0.0rc4
# OS: Ubuntu 16.04 LTS
# NVIDIA driver: 375.66
View min1ascii.hcmask
# For use with RuraPenthe's multibyte bruteforce method
# http://blog.bitcrack.net/2013/09/cracking-hashes-with-other-language.html
#
# Adjust "group" to include multiple strings to taste, depending on your target languages' encodings.
#
# for group in c2c3c4c5; do
# ${HASHCAT_BIN} -m ${HASHMODE} -a 3 --hex-charset -1 $group -2 808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebf ${HASHLIST} utf8.hcmask.6char.min1ascii
# done
#
?a?a?a?a?a?1?2
View md5-10k-rounds-password.txt
#
# Courtesy MDXfind - https://hashes.org/mdxfind.php
#
$ echo -n 'password' | mdxfind -h '^MD5$' -z -f /dev/null -i 10000 stdin 2>&1 | fgrep password | sort -tx -n -k 2 | align
MD5x01 5f4dcc3b5aa765d61d8327deb882cf99:password
MD5x02 696d29e0940a4957748fe3fc9efd22a3:password
MD5x03 5a22e6c339c96c9c0513a46e44c39683:password
MD5x04 e777a29bee9227c8a6a86e0bad61fc40:password
MD5x05 7b3b4de00794a247cf8df8e6fbfe19bf:password
MD5x06 20ffe80a69fbe8ce4d848eef461b3e39:password
View mdxfind-is-awesome.txt
#
# The word 'password', hashed with many unsalted hash types, up to 5 iterations deep
# Courtesy MDXfind - https://hashes.org/mdxfind.php
#
$ echo -n 'password' | mdxfind -h ALL -h '!salt,!user' -z -f /dev/null -i 5 stdin 2>&1| fgrep password | sort
BLAKE224x01 22203351651fef303ceb8adcfbfdd90a773ea6c0f388ce2441f380d9:password
BLAKE224x02 16dc83c641636911098c1981ce16a540abd77b3b995d122ec010bfbe:password
BLAKE224x03 8077f5d701e755474cd8fab0d9a5fab019ff8046c020f0c3802c8c17:password
BLAKE224x04 30f749a577f685801423e9434ab95610c8c8c5464d8865c62d379bc6:password
BLAKE224x05 e34ed3bdce2557bc6246f9a3cc50bbf6c78bdcefa5a8960f9cba8f04:password
View hexception
#!/usr/bin/env perl
# Created: 2017-08-13
# Author: Royce Williams / tychotithonus
# License: public domain
while (<>) {
chomp;
# Convert input to $HEX[] notation
View pinyin-simple.txt
a
ai
an
ang
ao
b
ba
bai
ban
bang
View troyhunt-320M-SHA1-PACK-masks.txt
# Top 1000 masks from plains found from Troy Hunt's 320 million leaked passwords
# (Context: https://gist.github.com/roycewilliams/b1de2afbfe5cb71bea16c94042b9bbfc)
#
?l?l?l?l?l?l?l?l,47846002
?l?l?l?l?l?l?d?d,7011835
?d?d?d?d?d?d?d?d,6212778
?l?l?l?l?l?l?l?l?l?l,6035813
?l?l?l?l?l?l?l?l?l,5388770
?l?l?l?l?l?l?l?d?d,5181360
?l?l?l?l?l?l?l?l?d?d,5138760