Skip to content

Instantly share code, notes, and snippets.

Avatar
💭
:cheeeeeese:

Royce Williams roycewilliams

💭
:cheeeeeese:
View GitHub Profile
@roycewilliams
roycewilliams / pwnedpasswords-v2-top20k.txt
Last active Oct 18, 2020
pwnedpasswords-v2-top20k.txt
View pwnedpasswords-v2-top20k.txt
#------------------------------------------------------------------------------
# Top 20K hashes from the Troy Hunt / haveibeenpwned Pwned Passwords list v2 (2018-02-21)
# with frequency count and cracked plaintext passwords
#
# The latest version of this file can be found here:
# https://gist.github.com/roycewilliams/281ce539915a947a23db17137d91aeb7
# The equivalent of this file, but based on v6 of the Pwned Passwords, is here:
# https://gist.github.com/roycewilliams/226886fd01572964e1431ac8afc999ce
#------------------------------------------------------------------------------
# Notes and references:
@roycewilliams
roycewilliams / pwnedpasswords-v6-top20k.txt
Last active Oct 10, 2020
pwnedpasswords-v6-top20k.txt
View pwnedpasswords-v6-top20k.txt
This file has been truncated, but you can view the full file.
#------------------------------------------------------------------------------
# Top 20K hashes from the Troy Hunt / haveibeenpwned Pwned Passwords list v6 (2020-06-19)
# with frequency count and cracked plaintext passwords
#
# The latest version of this file can be found here:
# https://gist.github.com/roycewilliams/226886fd01572964e1431ac8afc999ce
# The equivalent of this file, but based on v2 of the Pwned Passwords, is here:
# https://gist.github.com/roycewilliams/281ce539915a947a23db17137d91aeb7
#------------------------------------------------------------------------------
@roycewilliams
roycewilliams / corp-season-unsalted-password-hashes.txt
Last active Sep 23, 2020
corp-season-unsalted-password-hashes.txt
View corp-season-unsalted-password-hashes.txt
# Common season-based passwords in unsalted hashes
# Source: https://gist.github.com/roycewilliams/1603d23a4c5d3eda44fae348f6e0e954
#
# See also:
# https://github.com/roycewilliams/kens-salty-rainbow
# https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57
# https://gist.github.com/roycewilliams/794e4d7a81e7840deae29fdc7c03fa10
# --- bash ---
View softpaq-ia-list.txt
# Comparison of my local early Softpaq archive (0000-1500)
# with the Internet Archive's (https://archive.org/download/ftp.compaq.com/2014.06.ftp.compaq.com.tar.txt)
#
$ sdiff -w80 <(grep sp[01]...\- paqs-local.list|egrep -v /unpack/ | lc) <(grep sp[01]...\- paqs-ia.list | lc)
sp0000-0500 | sp0000-0500/
sp0000-0500/0000.txt sp0000-0500/0000.txt
sp0000-0500/sp0001.zip <
sp0000-0500/sp0002.zip <
sp0000-0500/sp0003.zip <
sp0000-0500/sp0004.zip <
View badrabbit-info.txt
Rough summary of developing BadRabbit info
------------------------------------------
BadRabbit is locally-self-propagating ransomware (ransom: 0.05 BTC), spreading via SMB once inside.
Requires user interaction.
Mostly targeting Russia and Ukraine so far, with a few others (Germany, Turkey, Bulgaria, Montenegro ...)
Not globally self-propagating, but could be inflicted on selected targets on purpose.
May be part of same group targeting Ukraine generally (BACKSWING) (per FireEye)
Confirmed to use ETERNALROMANCE exploit, and same source code and build chain as NotPetya (per Talos)
Mitigations are similar to Petya/NotPetya resistance. An inoculation is also available (see below).
View zxcvbn-wordlist.txt
#------------------------------------------------------------------------------
# Dropbox zxcvbn raw word list
# File location:
# https://gist.github.com/roycewilliams/d92b58490eeb52f7f3fa40dc0411d107
#------------------------------------------------------------------------------
# Based on:
# https://github.com/dropbox/zxcvbn/blob/master/src/frequency_lists.coffee
# As of: 2020-09-06
# Converted with:
# grep 'passwords:' frequency_lists.coffee | cut -d\" -f2 | tr ',' '\n'
@roycewilliams
roycewilliams / hashcat-markov-ends.txt
Last active Aug 28, 2020
A survey of the last string tried by hashcat's Markov for standard masks
View hashcat-markov-ends.txt
$ cat hashcat-markov-ends.sh
#!/bin/bash
# Ref: https://github.com/hashcat/hashcat/issues/1058
echo "# A survey of the last string tried by hashcat's Markov for standard masks"
echo -n '# hashcat version: '
hashcat --version
[ -f hashcat-markov-ends.list ] && rm hashcat-markov-ends.list
View bcrypt-example
$ cat ~/bcrypt.hash
$2a$05$LhayLxezLhK1LhWvKxCyLOj0j1u.Kj0jZ0pEmm134uzrQlFvQJLF6
$ cat ~/bcrypt.dict
hashcat
$ ./hashcat64.bin -a 0 -m 3200 ~/bcrypt.hash ~/bcrypt.dict
hashcat (v3.10-143-g7f59a82) starting...
OpenCL Platform #1: NVIDIA Corporation
View CAA-adoption-notes.md
You can’t perform that action at this time.