Skip to content

Instantly share code, notes, and snippets.

💭
:cheeeeeese:

Royce Williams roycewilliams

💭
:cheeeeeese:
Block or report user

Report or block roycewilliams

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@atoponce
atoponce / 0-README.md
Last active Jul 19, 2019
Magic Hashes
View 0-README.md

Magic Hashes

Motivations

Calculating magic hashes for https://www.whitehatsec.com/blog/magic-hashes/. These strings should probably be put into a blacklist preventing users from using them as passwords to mitigate PHP evaluating hashes starting with "0e" as floats.

Probabilities

View Jetson_Nano.Benchmark
This is a benchmark of the BETA CUDA branch of Hashcat, designed to run with both CUDA and OpenCL devices.
The Jetson Nano Dev Kit is an ARM SBC with a Jetson Nano (Maxwell 128 CUDA core) module attached.
Some modes failed due to the limitations of such a lower power GPU.
Access to the Jetson Nano was provided by Gridcoin(https://gridcoin.us/) Community member sodom89.
hashcat (v5.1.0-1029-g523e0f71) starting in benchmark mode...
@lizthegrey
lizthegrey / attributes.rb
Last active Jul 13, 2019
Hardening SSH with 2fa
View attributes.rb
default['sshd']['sshd_config']['AuthenticationMethods'] = 'publickey,keyboard-interactive:pam'
default['sshd']['sshd_config']['ChallengeResponseAuthentication'] = 'yes'
default['sshd']['sshd_config']['PasswordAuthentication'] = 'no'
@Neo23x0
Neo23x0 / TI-Search-Shortcuts.md
Last active May 19, 2019
Search Engine Shortcuts
View TI-Search-Shortcuts.md

Search Engine Shortcuts

Use Manage Search Engines in your browser to add these search engines. You can then use the 'keyword' in the URL bar to do a quick lookup. Find more details about managing your search engines in Chrome here.

e.g. Type

v dad8ebcbb5fa6721ccad45b81874e22c
@Chick3nman
Chick3nman / Titan_RTX.Benchmark
Created Mar 18, 2019
Hashcat benchmarks on the Nvidia Titan RTX
View Titan_RTX.Benchmark
Nvidia Driver Version: 419.35
Fans were set to 100% for duration of the benchmark.
hashcat (v5.1.0-749-g5ecbcde9+) starting in benchmark mode...
OpenCL Platform #1: NVIDIA Corporation
======================================
* Device #1: TITAN RTX, 6144/24576 MB allocatable, 72MCU
@gnusosa
gnusosa / yubikey-get-oath.el
Last active Mar 15, 2019
Get Yubikey OATH token from ykman with Ivy - Emacs
View yubikey-get-oath.el
(defcustom ykman-path "/usr/local/bin/ykman"
"Set this to the path of the command line ykman client for your OS.")
(defun yubikey-get-oath ()
"Copy a OATH token to your kill-ring"
(interactive)
(let ((ivy-hash (make-hash-table :test 'equal))
(cb (lambda (choice)
(with-temp-buffer
@mattifestation
mattifestation / SimpleTCGLogParser.ps1
Last active Apr 14, 2019
If you have the HgsDiagnostics PowerShell module, then you can parse TCG logs.
View SimpleTCGLogParser.ps1
Import-Module HgsDiagnostics
$GetHgsTrace = Get-Command Get-HgsTrace
$RemoteAttestationCoreReference = $GetHgsTrace.ImplementingType.Assembly.GetReferencedAssemblies() | Where-Object { $_.Name -eq 'Microsoft.Windows.RemoteAttestation.Core' }
Add-Type -AssemblyName $RemoteAttestationCoreReference.FullName
$MostRecentTCGLog = Get-ChildItem C:\Windows\Logs\MeasuredBoot | Sort-Object -Property LastWriteTime -Descending | Select-Object -First 1 | Select-Object -ExpandProperty FullName
$LogBytes = [IO.File]::ReadAllBytes($MostRecentTCGLog)
$ParsedTCGLog = [Microsoft.Windows.RemoteAttestation.Core.TcgEventLog]::Parse($LogBytes)
$ParsedTCGLog.TcgData.Children | Sort-Object -Property PcrIndex | Group-Object -Property PcrIndex
@0xhexmex
0xhexmex / Get-KerberosKeytab.ps1
Created Feb 14, 2019 — forked from raandree/Get-KerberosKeytab.ps1
Parses Kerberos Keytab files
View Get-KerberosKeytab.ps1
param(
[Parameter(Mandatory)]
[string]$Path
)
#Created by Pierre.Audonnet@microsoft.com
#
#Got keytab structure from http://www.ioplex.com/utilities/keytab.txt
#
# keytab {
View pake-api.md

PAKE API

Goal

The goal of this API is to make it easy to use and misuse resistant. The bulk of the code using this API can be reused. With the only difference being the start() call and getting the server secret at the end when registering. When registering, the server passes a null/empty secret to start() since it doesn't have one yet. Also start() might not return a message. This is fine. It just means the other party sends the first message.

Pseudocode API

PAKE_USER_CLIENT
PAKE_USER_SERVER
PAKE_USER_A
@3xocyte
3xocyte / adidns_records.py
Last active Jun 26, 2019
get /etc/hosts entries from ADIDNS
View adidns_records.py
#!/usr/bin/env python
import argparse
import sys
import binascii
import socket
import re
from ldap3 import Server, Connection, NTLM, ALL, SUBTREE, ALL_ATTRIBUTES
# get /etc/hosts entries for domain-joined computers from A and AAAA records (via LDAP/ADIDNS) (@3xocyte)
You can’t perform that action at this time.