Stock Boost Clock: 1733 MHz
CUDA API (CUDA 11.4)
====================
# basic .muttrc for use with Gmail | |
# Change the following six lines to match your Gmail account details | |
set imap_user = "[email protected]" | |
set imap_pass = "" | |
set smtp_url = "smtp://[email protected]:587/" | |
set smtp_pass = "" | |
set from = "[email protected]" | |
set realname = "Firstname Lastname" | |
# |
# Simple No-ip.com Dynamic DNS Updater | |
# | |
# By Nathan Giesbrecht (http://nathangiesbrecht.com) | |
# | |
# 1) Install binary as described in no-ip.com's source file (assuming results in /usr/local/bin) | |
# 2) Run sudo /usr/local/bin/noip2 -C to generate configuration file | |
# 3) Copy this file noip2.service to /etc/systemd/system/ | |
# 4) Execute `sudo systemctl daemon-reload` | |
# 5) Execute `sudo systemctl enable noip2` | |
# 6) Execute `sudo systemctl start noip2` |
<?php | |
/* Split the password into component parts */ | |
$encrypted = "PBKDF1:sha1:1000:gE2lydzFBG8=:+vynLWCYzSCRpdRqjNO3ke67Brw="; | |
$fields = explode( ":", $encrypted ); | |
$iterations = $fields[ 2 ]; | |
$salt = base64_decode( $fields[ 3 ] ); | |
$encrypted = base64_decode( $fields[ 4 ] ); | |
/* This is the password we are verifying */ | |
$password = "wombat!"; |
#====================================# | |
# Extract Wi-Fi Credentials # | |
# greg . foss @ owasp . org # | |
# v0.1 -- July, 2017 # | |
#====================================# | |
# Licensed under the MIT License | |
<# |
# PACK statsgen analysis of Troy Hunt's 320 million pwned password list | |
# (As announced in https://www.troyhunt.com/introducing-306-million-freely-downloadable-pwned-passwords/) | |
# | |
# Major components of this corpus are the antipublic and exploit.in leaks. | |
# Also very likely to contain rockyou and linkedin, at a minimum. | |
# | |
# This analysis includes founds from the hashes included in Hunt's Update 1 from 2017-08-04 | |
# (as downloaded from https://haveibeenpwned.com/Passwords) | |
# This analysis does NOT yet include Update 2 from 2017-08-05 | |
# |
# | |
# The word 'password', hashed with many unsalted hash types, up to 5 iterations deep | |
# Courtesy MDXfind - https://hashes.org/mdxfind.php | |
# (Mirror: https://www.techsolvency.com/pub/bin/mdxfind/) | |
# Source: https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57 | |
# | |
# See also: | |
# https://github.com/roycewilliams/kens-salty-rainbow # Common default descrypt hashes | |
# https://gist.github.com/roycewilliams/794e4d7a81e7840deae29fdc7c03fa10 # 10k rounds MD5 | |
# https://gist.github.com/roycewilliams/1c8044e40ed0716f99a773036a8891ac # 10k rounds SHA1 |
# The first 10,000 rounds of MD5("password") | |
# Courtesy MDXfind - https://hashes.org/mdxfind.php | |
# (Mirror: https://www.techsolvency.com/pub/bin/mdxfind/) | |
# Source: https://gist.github.com/roycewilliams/794e4d7a81e7840deae29fdc7c03fa10 | |
# | |
# See also: https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57 | |
# | |
# Windows: | |
# echo password | mdxfind -h "^MD5$" -z -f NUL -i 10000 stdin | |
# |
#!/bin/bash | |
#----------------------------------------------------------------------- | |
# Created: 2017-10-17 | |
# License: MIT | |
# Author: tychotithonus | |
#----------------------------------------------------------------------- | |
# Get list of algorithms. |
[List.Rules:Try] | |
cAz"[0-9]" | |
cAz"[£!$@#-=_]" | |
cAz"[0-9][0-9]" | |
cAz"[0-9][£!$@#-=_]" | |
cAz"[£!$@#-=_][0-9]" | |
cAz"[0-9][0-9][0-9]" | |
cAz"[0-9][0-9][0-9][0-9]" | |
cA0"[0-9]" | |
cA0"[£!$@#-=_]" |