Simple script to check if a password is in Troy Hunts Pwned Password List as fast as possible
https://haveibeenpwned.com/Passwords
First the file must be processed.
awk -FS="" 'BEGIN{FS="";OFS="\n"}{fn=$1$2$3; print > fn}' hashfile.txt
Simple script to check if a password is in Troy Hunts Pwned Password List as fast as possible
https://haveibeenpwned.com/Passwords
First the file must be processed.
awk -FS="" 'BEGIN{FS="";OFS="\n"}{fn=$1$2$3; print > fn}' hashfile.txt
# Simple Script that identifies which hashcat mode a pkzip2 hash is | |
# zip2john.c: https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/src/zip2john.c | |
# Hashcat PKZIP support: https://github.com/hashcat/hashcat/pull/1962 | |
from sys import argv | |
def get_mode(hash): | |
kek = hash.split('$pkzip2$')[1].split('*$/pkzip2$')[0].split('*') | |
if kek[0] == '1': # single hash | |
if kek[-5] == '0': # uncompressed | |
return 17210 |
# script to run a lot of search terms / regexes against a file | |
# or turn a list of terms into a regex | |
# this is faster than grep or sift's -f option as of October 2020 | |
# python input.txt searchfile.txt | |
import re | |
def add_to_dict(word, the_dict): | |
if len(word) == 0: | |
return |
#!/usr/bin/python | |
# coding: utf-8 | |
# Original source from https://blog.stayontarget.org/2019/03/decoding-mixed-case-usb-keystrokes-from.html | |
# Modified to add support for more keys and support for alt modifier. Could be improved upon more... | |
from __future__ import print_function | |
import sys,os | |
lcasekey = {} | |
ucasekey = {} |
Some info taken from these guides although parts are not quite right so I'm saving this for the next time I need to install. https://gist.github.com/huntrar/e42aee630bee3295b2c671d098c81268 https://gist.github.com/mattiaslundberg/8620837
iwctl
# CVE-2014-8684 testing | |
# it was not successful on my target so did not do work past the bare testing stage | |
# network variance was more than the timing difference in length | |
import requests | |
import time | |
# Can't use elapsed from requests as it stops as soon as first byte of response is received not when response is complete | |
r = requests.get("https://example.com/login") |