This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# | |
# The word 'password', hashed with many unsalted hash types, up to 5 iterations deep | |
# Courtesy MDXfind - https://hashes.org/mdxfind.php | |
# (Mirror: https://www.techsolvency.com/pub/bin/mdxfind/) | |
# Source: https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57 | |
# | |
# See also: | |
# https://github.com/roycewilliams/kens-salty-rainbow # Common default descrypt hashes | |
# https://gist.github.com/roycewilliams/794e4d7a81e7840deae29fdc7c03fa10 # 10k rounds MD5 | |
# https://gist.github.com/roycewilliams/1c8044e40ed0716f99a773036a8891ac # 10k rounds SHA1 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# PACK statsgen analysis of Troy Hunt's 320 million pwned password list | |
# (As announced in https://www.troyhunt.com/introducing-306-million-freely-downloadable-pwned-passwords/) | |
# | |
# Major components of this corpus are the antipublic and exploit.in leaks. | |
# Also very likely to contain rockyou and linkedin, at a minimum. | |
# | |
# This analysis includes founds from the hashes included in Hunt's Update 1 from 2017-08-04 | |
# (as downloaded from https://haveibeenpwned.com/Passwords) | |
# This analysis does NOT yet include Update 2 from 2017-08-05 | |
# |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#====================================# | |
# Extract Wi-Fi Credentials # | |
# greg . foss @ owasp . org # | |
# v0.1 -- July, 2017 # | |
#====================================# | |
# Licensed under the MIT License | |
<# |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
/* Split the password into component parts */ | |
$encrypted = "PBKDF1:sha1:1000:gE2lydzFBG8=:+vynLWCYzSCRpdRqjNO3ke67Brw="; | |
$fields = explode( ":", $encrypted ); | |
$iterations = $fields[ 2 ]; | |
$salt = base64_decode( $fields[ 3 ] ); | |
$encrypted = base64_decode( $fields[ 4 ] ); | |
/* This is the password we are verifying */ | |
$password = "wombat!"; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Simple No-ip.com Dynamic DNS Updater | |
# | |
# By Nathan Giesbrecht (http://nathangiesbrecht.com) | |
# | |
# 1) Install binary as described in no-ip.com's source file (assuming results in /usr/local/bin) | |
# 2) Run sudo /usr/local/bin/noip2 -C to generate configuration file | |
# 3) Copy this file noip2.service to /etc/systemd/system/ | |
# 4) Execute `sudo systemctl daemon-reload` | |
# 5) Execute `sudo systemctl enable noip2` | |
# 6) Execute `sudo systemctl start noip2` |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# basic .muttrc for use with Gmail | |
# Change the following six lines to match your Gmail account details | |
set imap_user = "[email protected]" | |
set imap_pass = "" | |
set smtp_url = "smtp://[email protected]:587/" | |
set smtp_pass = "" | |
set from = "[email protected]" | |
set realname = "Firstname Lastname" | |
# |
NewerOlder