Skip to content

Instantly share code, notes, and snippets.

Avatar
💭
:cheeeeeese:

Royce Williams roycewilliams

💭
:cheeeeeese:
View GitHub Profile
View mtgox-yubikey.txt
# Mirror of: https://jenda.hrach.eu/f2/mtgox-yubikey.txt
#
# If you have a Mt Gox YubiKey and are looking to turn it into a generic YubiKey ... don't!
# I am motivated to trade you two standard modern YubiKeys of your choosing for an unaltered
# Mt Gox YubiKey for my lab/collection - contact me at royce@techsolvency.com. Thanks!
#
Yubikey Prefix Password
======= ====== ========
123456A d2868706da69 32e193d3e932
123456B cf0d9f4b8d2b d4deb686e7bc
@roycewilliams
roycewilliams / KPM-char-frequency.txt
Last active Jul 9, 2021
KPM-char-frequency.txt
View KPM-char-frequency.txt
#------------------------------------------------------------------------------
# Character frequency of @RealEnderSec's 5-year window (315 million) of
# Kaspersky Password Manager (KPM) passwords.
# Ref: https://twitter.com/RealEnderSec/status/1412796282188484617
# Rough graph: https://twitter.com/TychoTithonus/status/1413305845924864006
#
# Frequency order: Q w W q x g X k K G U u 1 V v z Z m M j y ! p ~ Y P J f @
# 2 c o i # O h b $ 0 F I e s % S ^ H d 3 & C * E + - 4 B / { , . D 5 t n T
# N l 6 } L [ a 7 ] ( A 8 : 9 ) r ; R
#------------------------------------------------------------------------------
View strip-mbox-attachments.py
#!/bin/env python
# Strips attachments from mbox, writes to new mbox.
# Does not load entire old mbox into memory first - useful for very large mboxes.
# Ref: https://ask.slashdot.org/story/11/12/04/1754257/ask-slashdot-handling-and-cleaning-up-a-large-personal-email-archive
# Ref: https://ask.slashdot.org/comments.pl?sid=2557794&cid=38260428
from __future__ import print_function
from mailbox import mbox, mboxMessage
@roycewilliams
roycewilliams / hashcat-benchmark_3080ti_v6.2.1_opencl_2021-06-04.txt
Last active Jun 5, 2021
hashcat-benchmark_3080ti_v6.2.1_2021-06-04.txt
View hashcat-benchmark_3080ti_v6.2.1_opencl_2021-06-04.txt
#
# From an anoymous contributor - thanks!
#
hashcat (v6.2.1) starting in benchmark mode...
Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.
@roycewilliams
roycewilliams / bindify.py
Created Feb 3, 2021 — forked from gmr/bindify.py
Convert tinydns zone files to bind
View bindify.py
#!/usr/bin/env python
import collections
import datetime
from os import path
import pickle
import sys
if len(sys.argv) < 2:
print('Usage: bindify.py zonefile')
View security-key-u2f-support.txt
# Based on data from https://www.dongleauth.info/
# Located at: https://gist.github.com/roycewilliams/397c9151b4136b8adb46e0bab2515e97
# Last updated 2020-11-23
name: 1Password u2f: Yes multipleu2f: Yes
name: Amazon Web Services u2f: Yes
name: Authelia u2f: Yes
name: Bitbucket u2f: Yes
name: Bitfinex u2f: Yes
name: bitwarden u2f: Yes multipleu2f: Yes
name: Boxcryptor u2f: Yes
View softpaq-ia-list.txt
# Comparison of my local early Softpaq archive (0000-1500)
# with the Internet Archive's (https://archive.org/download/ftp.compaq.com/2014.06.ftp.compaq.com.tar.txt)
#
$ sdiff -w80 <(grep sp[01]...\- paqs-local.list|egrep -v /unpack/ | lc) <(grep sp[01]...\- paqs-ia.list | lc)
sp0000-0500 | sp0000-0500/
sp0000-0500/0000.txt sp0000-0500/0000.txt
sp0000-0500/sp0001.zip <
sp0000-0500/sp0002.zip <
sp0000-0500/sp0003.zip <
sp0000-0500/sp0004.zip <
View zxcvbn-wordlist.txt
#------------------------------------------------------------------------------
# Dropbox zxcvbn raw word list
# File location:
# https://gist.github.com/roycewilliams/d92b58490eeb52f7f3fa40dc0411d107
#------------------------------------------------------------------------------
# Based on:
# https://github.com/dropbox/zxcvbn/blob/master/src/frequency_lists.coffee
# As of: 2020-09-06
# Converted with:
# grep 'passwords:' frequency_lists.coffee | cut -d\" -f2 | tr ',' '\n'
@roycewilliams
roycewilliams / pwnedpasswords-v6-top20k.txt
Last active Mar 9, 2022
pwnedpasswords-v6-top20k.txt
View pwnedpasswords-v6-top20k.txt
This file has been truncated, but you can view the full file.
#------------------------------------------------------------------------------
# Top 20K hashes from the Troy Hunt / haveibeenpwned Pwned Passwords list v6 (2020-06-19)
# with frequency count and cracked plaintext passwords
#
# The latest version of this file can be found here:
# https://gist.github.com/roycewilliams/226886fd01572964e1431ac8afc999ce
# The equivalent of this file, but based on v2 of the Pwned Passwords, is here:
# https://gist.github.com/roycewilliams/281ce539915a947a23db17137d91aeb7
#------------------------------------------------------------------------------
View md5-10k-rounds-123456.txt
#
# The first 10,000 rounds of MD5("123456")
# Courtesy MDXfind - https://hashes.org/mdxfind.php
# Source: https://gist.github.com/roycewilliams/3b101d7bd9ea5beac1f828b6eac43858
#
# See also:
# https://github.com/roycewilliams/kens-salty-rainbow
# https://gist.github.com/roycewilliams/794e4d7a81e7840deae29fdc7c03fa10
# https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57
#