Skip to content

Instantly share code, notes, and snippets.

Avatar
💭
:cheeeeeese:

Royce Williams roycewilliams

💭
:cheeeeeese:
View GitHub Profile
View md5-10k-rounds-123456.txt
#
# The first 10,000 rounds of MD5("123456")
# Courtesy MDXfind - https://hashes.org/mdxfind.php
# Source: https://gist.github.com/roycewilliams/3b101d7bd9ea5beac1f828b6eac43858
#
# See also:
# https://github.com/roycewilliams/kens-salty-rainbow
# https://gist.github.com/roycewilliams/794e4d7a81e7840deae29fdc7c03fa10
# https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57
#
View mdxfind-allunsalted-123456.txt
#
# The string '123456', hashed with many unsalted hash types, up to 5 iterations deep
# Courtesy MDXfind - https://hashes.org/mdxfind.php
# https://gist.github.com/roycewilliams/7e4f892fd610889b9b446dde46402bba
#
# See also:
# https://github.com/roycewilliams/kens-salty-rainbow
# https://gist.github.com/roycewilliams/794e4d7a81e7840deae29fdc7c03fa10
# https://gist.github.com/roycewilliams/1603d23a4c5d3eda44fae348f6e0e954
# https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57
View descrypt-support-allsalts.txt
# All possible descrypt hashes of the password "support", using all possible salts.
# From https://github.com/roycewilliams/kens-salty-rainbow
# If you find a device that always uses one of these, let me know.
..dgWexPAozz2
./9NpDH3HAWP.
.0Ag.Z5wZWqqg
.1w5QRFKqb2TQ
.2v94tPBJS6T2
.3fnM3v8Ne6AI
.4KflzuMUYKic
View descrypt-user-allsalts.txt
# All possible descrypt hashes of the password "user", using all possible salts.
# From https://github.com/roycewilliams/kens-salty-rainbow
# If you find a device that always uses one of these, let me know.
..3Mu2kxrbEl.
./LoKvy9414Cc
.0rKn.kLFqzfc
.1.N4zi5eVgQc
.2hh28DR94IkI
.3Os.QLvwlY2U
.4nmpcNbxpSD.
View descrypt-12345-allsalts.txt
# All possible descrypt hashes of the password "12345", using all possible salts.
# From https://github.com/roycewilliams/kens-salty-rainbow
# If you find a device that always uses one of these, let me know.
..snDhyX38WTc
./rR8nrLbhgnc
.0w/m1BycOJP6
.1spFaRyIt6oE
.27J9WO2WE5ng
.3UmO/1CBLSvQ
.4iFN5e1Z/HKc
View descrypt-1234-allsalts.txt
# All possible descrypt hashes of the password "1234", using all possible salts.
# From https://github.com/roycewilliams/kens-salty-rainbow
# If you find a device that always uses one of these, let me know.
..XrlQIyEopco
./DyUSqKOUOhI
.0t3va0DXrLyw
.18Ioyx0ZO4aE
.2Yp8ZQtYbcjk
.3MzeMXBu.iUM
.4XFdzXhC4vbA
View descrypt-admin-allsalts.txt
# All possible descrypt hashes of the password 'admin', using all possible salts.
# From https://github.com/roycewilliams/kens-salty-rainbow
# If you find a device that always uses one of these, let me know.
..xpoEyRReGzk
./nlIXYriZaB2
.08iPeaCLti3E
.1fH80ykoJAyI
.23PstrXfk7Nw
.37vRhjo4ZP66
.4nTonCOGSWyU
View descrypt-letmein-allsalts.txt
# All possible descrypt hashes of the password "letmein", using all possible salts.
# From https://github.com/roycewilliams/kens-salty-rainbow
# If you find a device that always uses one of these, let me know.
..UJ9ruJ9qjr.
./2ENiGTIs0s.
.0Efts4mB97.I
.1oXsocIRkgBc
.2x.WKkUtPGLA
.32UKUS5ja/ag
.46Jecx58WJYg
@roycewilliams
roycewilliams / corp-season-unsalted-password-hashes.txt
Last active Sep 23, 2020
corp-season-unsalted-password-hashes.txt
View corp-season-unsalted-password-hashes.txt
# Common season-based passwords in unsalted hashes
# Source: https://gist.github.com/roycewilliams/1603d23a4c5d3eda44fae348f6e0e954
#
# See also:
# https://github.com/roycewilliams/kens-salty-rainbow
# https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57
# https://gist.github.com/roycewilliams/794e4d7a81e7840deae29fdc7c03fa10
# --- bash ---
@roycewilliams
roycewilliams / hashcat-benchmark_rtx-2070-super_6.0.0-release_2020-06-29.txt
Last active Jun 30, 2020
hashcat-benchmark_rtx-2070-super_6.0.0-release_2020-06-29.txt
View hashcat-benchmark_rtx-2070-super_6.0.0-release_2020-06-29.txt
# Anonymous submission 2020-06-29
# Submitter reports that these cards are also very stable with 100MHz overclock
hashcat (v6.0.0) starting in benchmark mode...
Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.