Skip to content

Instantly share code, notes, and snippets.

View roycewilliams's full-sized avatar
💭
:cheeeeeese:

Royce Williams roycewilliams

💭
:cheeeeeese:
View GitHub Profile
@roycewilliams
roycewilliams / md5-puzzle_2017-05-11.txt
Last active May 11, 2017 15:27
md5-puzzle_2017-05-11.txt
03c7c0ace395d80182db07ae2c30f034
115bf421f0c3c35ea85ce15c194a17b4
12e801779b516dd3e98ca13d4a972c37
1f65e69434baef8671ac6d1e9ca905fd
202cb962ac59075b964b07152d234b70
269bdc1fb1aadcc5b575a68220158602
26d7d6b4074df1a7b4f314c574bd5dbf
2821675caefbcebfba42d74a66495db4
3949b762c9c8890f39a7d2e0a2c24794
3dd6b9265ff18f31dc30df59304b0ca7
@roycewilliams
roycewilliams / rapid7-fdns-any_caa_20170519.txt
Created May 30, 2017 17:34
rapid7-fdns-any_caa_20170519.txt
$ fgrep '"caa"' 20170519-fdns.json.caa | cut -d\" -f16 | sed 's/^www\.//g' | sort -u
00wbf.com
0700beauty24.de
0bock.com
0x01.eu
0x4a42.net
0x54434d.net
0xc.de
1000nightsofsummer.com
1agb.de
@roycewilliams
roycewilliams / covfefe-typos.txt
Created May 31, 2017 05:49
covfefe-typos.txt
codgers
coffees
coffers
covered
coverts
differs
digests
diggers
diverge
diverts
@roycewilliams
roycewilliams / troyhunt-320M-SHA1-PACK-analysis.txt
Last active November 29, 2020 22:22
troyhunt-320M-SHA1-PACK-analysis.txt
# PACK statsgen analysis of Troy Hunt's 320 million pwned password list
# (As announced in https://www.troyhunt.com/introducing-306-million-freely-downloadable-pwned-passwords/)
#
# Major components of this corpus are the antipublic and exploit.in leaks.
# Also very likely to contain rockyou and linkedin, at a minimum.
#
# This analysis includes founds from the hashes included in Hunt's Update 1 from 2017-08-04
# (as downloaded from https://haveibeenpwned.com/Passwords)
# This analysis does NOT yet include Update 2 from 2017-08-05
#
@roycewilliams
roycewilliams / troyhunt-320M-SHA1-PACK-masks.txt
Last active August 9, 2017 14:46
troyhunt-320M-SHA1-PACK-masks.txt
# Top 1000 masks from plains found from Troy Hunt's 320 million leaked passwords
# (Context: https://gist.github.com/roycewilliams/b1de2afbfe5cb71bea16c94042b9bbfc)
#
?l?l?l?l?l?l?l?l,47846002
?l?l?l?l?l?l?d?d,7011835
?d?d?d?d?d?d?d?d,6212778
?l?l?l?l?l?l?l?l?l?l,6035813
?l?l?l?l?l?l?l?l?l,5388770
?l?l?l?l?l?l?l?d?d,5181360
?l?l?l?l?l?l?l?l?d?d,5138760
@roycewilliams
roycewilliams / pinyin-simple.txt
Created August 12, 2017 00:21
pinyin-simple.txt
a
ai
an
ang
ao
b
ba
bai
ban
bang
@roycewilliams
roycewilliams / hexception
Last active June 19, 2020 05:53
hexception
#!/usr/bin/env perl
# Created: 2017-08-13
# Author: Royce Williams / tychotithonus
# License: public domain
while (<>) {
chomp;
# Convert input to $HEX[] notation
@roycewilliams
roycewilliams / mdxfind-is-awesome.txt
Last active April 18, 2026 01:08
mdxfind-is-awesome.txt
#
# The word 'password', hashed with many unsalted hash types, up to 5 iterations deep
# Courtesy MDXfind - https://www.techsolvency.com/pub/bin/mdxfind/
# Source: https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57
#
# See also:
# https://github.com/roycewilliams/kens-salty-rainbow # Common default descrypt hashes
# https://gist.github.com/roycewilliams/794e4d7a81e7840deae29fdc7c03fa10 # 10k rounds MD5
# https://gist.github.com/roycewilliams/1c8044e40ed0716f99a773036a8891ac # 10k rounds SHA1
# https://gist.github.com/roycewilliams/56b17c9d8c6937725ee7e6331db79fda # 10K rounds SHA256
@roycewilliams
roycewilliams / md5-10k-rounds-password.txt
Last active August 17, 2025 03:51
The first 10,000 rounds of MD5("password")
# The first 10,000 rounds of MD5("password")
# Courtesy MDXfind - https://www.techsolvency.com/pub/bin/mdxfind/
# Source: https://gist.github.com/roycewilliams/794e4d7a81e7840deae29fdc7c03fa10
#
# See also: https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57
#
# Windows:
# echo password | mdxfind -h "^MD5$" -z -f NUL -i 10000 stdin
#
# Linux:
# For use with RuraPenthe's multibyte bruteforce method
# http://blog.bitcrack.net/2013/09/cracking-hashes-with-other-language.html
#
# Adjust "group" to include multiple strings to taste, depending on your target languages' encodings.
#
# for group in c2c3c4c5; do
# ${HASHCAT_BIN} -m ${HASHMODE} -a 3 --hex-charset -1 $group -2 808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebf ${HASHLIST} utf8.hcmask.6char.min1ascii
# done
#
?a?a?a?a?a?1?2