Skip to content

Instantly share code, notes, and snippets.


Royce Williams roycewilliams

Block or report user

Report or block roycewilliams

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
atoponce /
Last active Jul 19, 2019
Magic Hashes

Magic Hashes


Calculating magic hashes for These strings should probably be put into a blacklist preventing users from using them as passwords to mitigate PHP evaluating hashes starting with "0e" as floats.


View Jetson_Nano.Benchmark
This is a benchmark of the BETA CUDA branch of Hashcat, designed to run with both CUDA and OpenCL devices.
The Jetson Nano Dev Kit is an ARM SBC with a Jetson Nano (Maxwell 128 CUDA core) module attached.
Some modes failed due to the limitations of such a lower power GPU.
Access to the Jetson Nano was provided by Gridcoin( Community member sodom89.
hashcat (v5.1.0-1029-g523e0f71) starting in benchmark mode...
lizthegrey / attributes.rb
Last active Jul 13, 2019
Hardening SSH with 2fa
View attributes.rb
default['sshd']['sshd_config']['AuthenticationMethods'] = 'publickey,keyboard-interactive:pam'
default['sshd']['sshd_config']['ChallengeResponseAuthentication'] = 'yes'
default['sshd']['sshd_config']['PasswordAuthentication'] = 'no'
Neo23x0 /
Last active May 19, 2019
Search Engine Shortcuts

Search Engine Shortcuts

Use Manage Search Engines in your browser to add these search engines. You can then use the 'keyword' in the URL bar to do a quick lookup. Find more details about managing your search engines in Chrome here.

e.g. Type

v dad8ebcbb5fa6721ccad45b81874e22c
Chick3nman / Titan_RTX.Benchmark
Created Mar 18, 2019
Hashcat benchmarks on the Nvidia Titan RTX
View Titan_RTX.Benchmark
Nvidia Driver Version: 419.35
Fans were set to 100% for duration of the benchmark.
hashcat (v5.1.0-749-g5ecbcde9+) starting in benchmark mode...
OpenCL Platform #1: NVIDIA Corporation
* Device #1: TITAN RTX, 6144/24576 MB allocatable, 72MCU
gnusosa / yubikey-get-oath.el
Last active Mar 15, 2019
Get Yubikey OATH token from ykman with Ivy - Emacs
View yubikey-get-oath.el
(defcustom ykman-path "/usr/local/bin/ykman"
"Set this to the path of the command line ykman client for your OS.")
(defun yubikey-get-oath ()
"Copy a OATH token to your kill-ring"
(let ((ivy-hash (make-hash-table :test 'equal))
(cb (lambda (choice)
mattifestation / SimpleTCGLogParser.ps1
Last active Apr 14, 2019
If you have the HgsDiagnostics PowerShell module, then you can parse TCG logs.
View SimpleTCGLogParser.ps1
Import-Module HgsDiagnostics
$GetHgsTrace = Get-Command Get-HgsTrace
$RemoteAttestationCoreReference = $GetHgsTrace.ImplementingType.Assembly.GetReferencedAssemblies() | Where-Object { $_.Name -eq 'Microsoft.Windows.RemoteAttestation.Core' }
Add-Type -AssemblyName $RemoteAttestationCoreReference.FullName
$MostRecentTCGLog = Get-ChildItem C:\Windows\Logs\MeasuredBoot | Sort-Object -Property LastWriteTime -Descending | Select-Object -First 1 | Select-Object -ExpandProperty FullName
$LogBytes = [IO.File]::ReadAllBytes($MostRecentTCGLog)
$ParsedTCGLog = [Microsoft.Windows.RemoteAttestation.Core.TcgEventLog]::Parse($LogBytes)
$ParsedTCGLog.TcgData.Children | Sort-Object -Property PcrIndex | Group-Object -Property PcrIndex
0xhexmex / Get-KerberosKeytab.ps1
Created Feb 14, 2019 — forked from raandree/Get-KerberosKeytab.ps1
Parses Kerberos Keytab files
View Get-KerberosKeytab.ps1
#Created by
#Got keytab structure from
# keytab {



The goal of this API is to make it easy to use and misuse resistant. The bulk of the code using this API can be reused. With the only difference being the start() call and getting the server secret at the end when registering. When registering, the server passes a null/empty secret to start() since it doesn't have one yet. Also start() might not return a message. This is fine. It just means the other party sends the first message.

Pseudocode API

3xocyte /
Last active Jun 26, 2019
get /etc/hosts entries from ADIDNS
#!/usr/bin/env python
import argparse
import sys
import binascii
import socket
import re
from ldap3 import Server, Connection, NTLM, ALL, SUBTREE, ALL_ATTRIBUTES
# get /etc/hosts entries for domain-joined computers from A and AAAA records (via LDAP/ADIDNS) (@3xocyte)
You can’t perform that action at this time.