Skip to content

Instantly share code, notes, and snippets.

View freeroute's full-sized avatar

freeroute freeroute

  • Merrit, British Columbia
View GitHub Profile
@jaysonrowe
jaysonrowe / .muttrc
Created May 6, 2012 23:10
Mutt Configuration
# basic .muttrc for use with Gmail
# Change the following six lines to match your Gmail account details
set imap_user = "[email protected]"
set imap_pass = ""
set smtp_url = "smtp://[email protected]:587/"
set smtp_pass = ""
set from = "[email protected]"
set realname = "Firstname Lastname"
#
@NathanGiesbrecht
NathanGiesbrecht / noip2.service
Last active March 18, 2025 13:47
Systemd Service file for no-ip.com dynamic ip updater
# Simple No-ip.com Dynamic DNS Updater
#
# By Nathan Giesbrecht (http://nathangiesbrecht.com)
#
# 1) Install binary as described in no-ip.com's source file (assuming results in /usr/local/bin)
# 2) Run sudo /usr/local/bin/noip2 -C to generate configuration file
# 3) Copy this file noip2.service to /etc/systemd/system/
# 4) Execute `sudo systemctl daemon-reload`
# 5) Execute `sudo systemctl enable noip2`
# 6) Execute `sudo systemctl start noip2`
@steveosoule
steveosoule / miva-hash-plain-text-password-to-match-encrypted-customer-password.php
Last active June 16, 2018 18:47
Miva - Hash Plain-Text Password to Match Encrypted Customer Password
<?php
/* Split the password into component parts */
$encrypted = "PBKDF1:sha1:1000:gE2lydzFBG8=:+vynLWCYzSCRpdRqjNO3ke67Brw=";
$fields = explode( ":", $encrypted );
$iterations = $fields[ 2 ];
$salt = base64_decode( $fields[ 3 ] );
$encrypted = base64_decode( $fields[ 4 ] );
/* This is the password we are verifying */
$password = "wombat!";
@gfoss
gfoss / Extract-WiFi-Creds.ps1
Last active October 21, 2024 17:03
Simple script to extract locally-stored Wi-Fi Credentials
#====================================#
# Extract Wi-Fi Credentials #
# greg . foss @ owasp . org #
# v0.1 -- July, 2017 #
#====================================#
# Licensed under the MIT License
<#
@roycewilliams
roycewilliams / troyhunt-320M-SHA1-PACK-analysis.txt
Last active November 29, 2020 22:22
troyhunt-320M-SHA1-PACK-analysis.txt
# PACK statsgen analysis of Troy Hunt's 320 million pwned password list
# (As announced in https://www.troyhunt.com/introducing-306-million-freely-downloadable-pwned-passwords/)
#
# Major components of this corpus are the antipublic and exploit.in leaks.
# Also very likely to contain rockyou and linkedin, at a minimum.
#
# This analysis includes founds from the hashes included in Hunt's Update 1 from 2017-08-04
# (as downloaded from https://haveibeenpwned.com/Passwords)
# This analysis does NOT yet include Update 2 from 2017-08-05
#
@roycewilliams
roycewilliams / mdxfind-is-awesome.txt
Last active October 17, 2022 21:43
mdxfind-is-awesome.txt
#
# The word 'password', hashed with many unsalted hash types, up to 5 iterations deep
# Courtesy MDXfind - https://hashes.org/mdxfind.php
# (Mirror: https://www.techsolvency.com/pub/bin/mdxfind/)
# Source: https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57
#
# See also:
# https://github.com/roycewilliams/kens-salty-rainbow # Common default descrypt hashes
# https://gist.github.com/roycewilliams/794e4d7a81e7840deae29fdc7c03fa10 # 10k rounds MD5
# https://gist.github.com/roycewilliams/1c8044e40ed0716f99a773036a8891ac # 10k rounds SHA1
@roycewilliams
roycewilliams / md5-10k-rounds-password.txt
Last active March 19, 2022 19:54
The first 10,000 rounds of MD5("password")
# The first 10,000 rounds of MD5("password")
# Courtesy MDXfind - https://hashes.org/mdxfind.php
# (Mirror: https://www.techsolvency.com/pub/bin/mdxfind/)
# Source: https://gist.github.com/roycewilliams/794e4d7a81e7840deae29fdc7c03fa10
#
# See also: https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57
#
# Windows:
# echo password | mdxfind -h "^MD5$" -z -f NUL -i 10000 stdin
#
@roycewilliams
roycewilliams / allbench.sh
Last active August 26, 2022 13:48
allbench.sh - run hashcat benchmarks one at a time
#!/bin/bash
#-----------------------------------------------------------------------
# Created: 2017-10-17
# License: MIT
# Author: tychotithonus
#-----------------------------------------------------------------------
# Get list of algorithms.
[List.Rules:Try]
cAz"[0-9]"
cAz"[£!$@#-=_]"
cAz"[0-9][0-9]"
cAz"[0-9][£!$@#-=_]"
cAz"[£!$@#-=_][0-9]"
cAz"[0-9][0-9][0-9]"
cAz"[0-9][0-9][0-9][0-9]"
cA0"[0-9]"
cA0"[£!$@#-=_]"
@soxrok2212
soxrok2212 / Nvidia GeForce GTX 1080 Founder's Edition 8GB (9001G4132500001) - Hashcat Benchmark.md
Last active November 17, 2021 03:55
Nvidia GeForce GTX 1080 Founder's Edition 8GB (9001G4132500001) - Hashcat Benchmark

Nvidia GeForce GTX 1080 Founder's Edition 8GB (9001G4132500001) - Hashcat Benchmark

Driver: 470.57.02
CUDA Version: 11.4
Hashcat Version: 6.2.3

Stock Boost Clock: 1733 MHz

CUDA API (CUDA 11.4)
====================