Skip to content

Instantly share code, notes, and snippets.


Royce Williams roycewilliams

View GitHub Profile
roycewilliams / amazon-terms-GLSBYFE9MGKKQXXM.txt
Last active Jul 20, 2021
View amazon-terms-GLSBYFE9MGKKQXXM.txt
Conditions of Use
Last updated: May 3, 2021
Welcome to Services LLC and/or its affiliates ("Amazon") provide website features and other products and services to you when you visit or shop at, use Amazon products or services, use Amazon applications for mobile, or use software provided by Amazon in connection with any of the foregoing (collectively, "Amazon Services"). By using the Amazon Services, you agree, on behalf of yourself and all members of your household and others who use any Service under your account, to the following conditions.
Please read these conditions carefully.
We offer a wide range of Amazon Services, and sometimes additional terms may apply. When you use an Amazon Service (for example, Your Profile, Gift Cards, Amazon Video, Your Media Library, Amazon devices, or Amazon applications) you also will be subject to the guidelines, terms and agreements applicable to that Amazon Service ("Service Terms"). If these Conditions of Use are inconsistent with th
View mtgox-yubikey.txt
# Mirror of:
Yubikey Prefix Password
======= ====== ========
123456A d2868706da69 32e193d3e932
123456B cf0d9f4b8d2b d4deb686e7bc
720950A 24be0d14cc04 59e6fbe1f79f
720950B 82984359457f d7eeebf6d70d
720951A 45a9e7d14ee2 7ee1b132a11d
720951B 6566d171fd02 cac2cf149d7c
720952A d889e093a02b 0c8ae35471bf
roycewilliams / KPM-char-frequency.txt
Last active Jul 9, 2021
View KPM-char-frequency.txt
# Character frequency of @RealEnderSec's 5-year window (315 million) of
# Kaspersky Password Manager (KPM) passwords.
# Ref:
# Rough graph:
# Frequency order: Q w W q x g X k K G U u 1 V v z Z m M j y ! p ~ Y P J f @
# 2 c o i # O h b $ 0 F I e s % S ^ H d 3 & C * E + - 4 B / { , . D 5 t n T
# N l 6 } L [ a 7 ] ( A 8 : 9 ) r ; R
#!/bin/env python
# Strips attachments from mbox, writes to new mbox.
# Does not load entire old mbox into memory first - useful for very large mboxes.
# Ref:
# Ref:
from __future__ import print_function
from mailbox import mbox, mboxMessage
roycewilliams / hashcat-benchmark_3080ti_v6.2.1_opencl_2021-06-04.txt
Last active Jun 5, 2021
View hashcat-benchmark_3080ti_v6.2.1_opencl_2021-06-04.txt
# From an anoymous contributor - thanks!
hashcat (v6.2.1) starting in benchmark mode...
Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.
roycewilliams /
Created Feb 3, 2021 — forked from gmr/
Convert tinydns zone files to bind
#!/usr/bin/env python
import collections
import datetime
from os import path
import pickle
import sys
if len(sys.argv) < 2:
print('Usage: zonefile')
View security-key-u2f-support.txt
# Based on data from
# Located at:
# Last updated 2020-11-23
name: 1Password u2f: Yes multipleu2f: Yes
name: Amazon Web Services u2f: Yes
name: Authelia u2f: Yes
name: Bitbucket u2f: Yes
name: Bitfinex u2f: Yes
name: bitwarden u2f: Yes multipleu2f: Yes
name: Boxcryptor u2f: Yes
View softpaq-ia-list.txt
# Comparison of my local early Softpaq archive (0000-1500)
# with the Internet Archive's (
$ sdiff -w80 <(grep sp[01]...\- paqs-local.list|egrep -v /unpack/ | lc) <(grep sp[01]...\- paqs-ia.list | lc)
sp0000-0500 | sp0000-0500/
sp0000-0500/0000.txt sp0000-0500/0000.txt
sp0000-0500/ <
sp0000-0500/ <
sp0000-0500/ <
sp0000-0500/ <
View zxcvbn-wordlist.txt
# Dropbox zxcvbn raw word list
# File location:
# Based on:
# As of: 2020-09-06
# Converted with:
# grep 'passwords:' | cut -d\" -f2 | tr ',' '\n'
roycewilliams / pwnedpasswords-v6-top20k.txt
Last active Feb 18, 2021
View pwnedpasswords-v6-top20k.txt
This file has been truncated, but you can view the full file.
# Top 20K hashes from the Troy Hunt / haveibeenpwned Pwned Passwords list v6 (2020-06-19)
# with frequency count and cracked plaintext passwords
# The latest version of this file can be found here:
# The equivalent of this file, but based on v2 of the Pwned Passwords, is here: