Skip to content

Instantly share code, notes, and snippets.

View roycewilliams's full-sized avatar
💭
:cheeeeeese:

Royce Williams roycewilliams

💭
:cheeeeeese:
View GitHub Profile
@roycewilliams
roycewilliams / hashcat-kwprocessor-typo-rules.txt
Last active August 22, 2025 22:53
hashcat-kwprocessor-typo-rules.txt
--------------------------------------------------------------------------------
# Crude generation of typo rules
# (Using kwprocessor (https://github.com/hashcat/kwprocessor) and hashcat)
#
# Useful for passwords that don't require confirmation (like some cryptocurrency
# wallets, password-protected archive files, etc.)
#
# May also be useful for stacking with other rules.
#
# This approach assumes that you are making the same typo every time
$ hashcat -b -m 3200
hashcat (v4.0.1-95-gce0cee0a+) starting in benchmark mode...
Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.
OpenCL Platform #1: NVIDIA Corporation
======================================
@roycewilliams
roycewilliams / benchmark_hashcat-4.1.0_irongiant_2018-01-30_table.txt
Last active February 2, 2018 05:18
benchmark_hashcat-4.1.0_irongiant_2018-01-30_table.txt
# hashcat benchmark for irongiant (aggregate speed, sorted by speed) - 2018-01-30
# version 4.1.0 (pre-release candidate)
# Format: table (aggregate speed across all devices)
# Devices: 6x NVIDIA 1080 Founders Edition
# Overclock: none
# Power limit: 150W (reduced from default 180W)
# hashcat version: v4.1.0
# OS: Ubuntu 16.04 LTS
# NVIDIA driver: 384.111
@roycewilliams
roycewilliams / benchmark_hashcat-4.1.0_irongiant_2018-01-30.txt
Last active April 1, 2021 18:31
benchmark_hashcat-4.1.0_irongiant_2018-01-30.txt
# hashcat benchmark for irongiant (aggregate speed, sorted by speed) - 2018-01-30
# version 4.1.0 (pre-release candidate)
# Format: default (standard, each device shown separately)
# Devices: 6x NVIDIA 1080 Founders Edition
# Overclock: none
# Power limit: 150W (reduced from default 180W)
# hashcat version: v4.1.0
# OS: Ubuntu 16.04 LTS
# NVIDIA driver: 384.111
@roycewilliams
roycewilliams / security-stackexchange-157017-masks.txt
Last active February 8, 2018 17:21
security-stackexchange-157017-masks.txt
# Generated with:
# policygen --pps=185000 --minlength=8 --maxlength=8 \
# --mindigit=2 --minlower=2 --minupper=2 --maxspecial=0 -o test.masks
?d?d?d?d?l?l?u?u
?d?d?d?d?l?u?l?u
?d?d?d?d?l?u?u?l
?d?d?d?d?u?l?l?u
?d?d?d?d?u?l?u?l
?d?d?d?d?u?u?l?l
?d?d?d?l?d?l?u?u
@roycewilliams
roycewilliams / benchmark_hashcat-4.1.0_irongiant_2018-02-16.txt
Last active February 16, 2018 21:36
benchmark_hashcat-4.1.0_irongiant_2018-02-16.txt
# hashcat benchmark for irongiant (aggregate speed, sorted by speed) - 2018-02-16
# version 4.1.0 (pre-release candidate)
# Format: default (standard, each device shown separately)
# Devices: 6x NVIDIA 1080 Founders Edition
# Overclock: none
# Power limit: 150W (reduced from default 180W)
# hashcat version: v4.1.0 (prerelease candidate)
# OS: Ubuntu 16.04 LTS
# NVIDIA driver: 384.111
@roycewilliams
roycewilliams / benchmark_hashcat-4.1.0_irongiant_2018-02-16_table.txt
Created February 16, 2018 21:36
benchmark_hashcat-4.1.0_irongiant_2018-02-16_table.txt
# hashcat benchmark for irongiant (aggregate speed, sorted by speed) - 2018-02-16
# version 4.1.0 (pre-release candidate)
# Format: table (aggregate speed across all devices)
# Devices: 6x NVIDIA 1080 Founders Edition
# Overclock: none
# Power limit: 150W (reduced from default 180W)
# hashcat version: v4.1.0 (pre-release candidate)
# OS: Ubuntu 16.04 LTS
# NVIDIA driver: 384.111
@roycewilliams
roycewilliams / pwnedpasswords-v2-top20k.txt
Last active August 28, 2025 16:00
pwnedpasswords-v2-top20k.txt
#------------------------------------------------------------------------------
# Top 20K hashes from the Troy Hunt / haveibeenpwned Pwned Passwords list v2 (2018-02-21)
# with frequency count and cracked plaintext passwords
#
# The latest version of this file can be found here:
# https://gist.github.com/roycewilliams/281ce539915a947a23db17137d91aeb7
#
# NOTE: THIS FILE IS DEPRECATED.
# The equivalent of this file, but based on v6 of the Pwned Passwords, is here:
# https://gist.github.com/roycewilliams/226886fd01572964e1431ac8afc999ce
@roycewilliams
roycewilliams / pwnedpasswords-v2-top20k-freq.txt
Last active March 16, 2018 22:05
pwnedpasswords-v2-top20k-freq.txt
This file has been truncated, but you can view the full file.
# Original data is padded with spaces, for no apparent useful purpose
# Plains+freqcount are at https://gist.github.com/roycewilliams/281ce539915a947a23db17137d91aeb7
7C4A8D09CA3762AF61E59520943DC26494F8941B:20760336
F7C3BC1D808E04732ADF679965CCC34CA7AE3441:7016669
B1B3773A05C0ED0176787A4F1574FF0075F7521E:3599486
5BAA61E4C9B93F3F0682250B6CF8331B7EE68FD8:3303003
3D4F2BF07DC1BE38B20CD6E46949A1071F9D0E3D:2900049
7C222FB2927D828AF22F592134E8932480637C0D:2680521
6367C48DD193D56EA7B0BAAD25B19455E529F5EE:2670319
E38AD214943DAAD1D64C102FAEC29DE4AFE9DA3D:2310111
@roycewilliams
roycewilliams / pwned-passwords-range-example.txt
Last active July 6, 2024 23:43
pwned-passwords-range-example.txt
#-----------------------------------------------------------------------------
# Step 1: Compute the SHA1 sum.
# Step 2: Grab the first 5 chars of the hash.
# Step 3: Use API to pull all hashes with that prefix, sort by how often they
# appear, and crack the first few.
#
# (This means that if this query can be intercepted, the attacks has a pretty
# good chance of figuring out your password (if it's non-random or too short).)