Skip to content

Instantly share code, notes, and snippets.

View roycewilliams's full-sized avatar
💭
:cheeeeeese:

Royce Williams roycewilliams

💭
:cheeeeeese:
View GitHub Profile
@roycewilliams
roycewilliams / zxcvbn-wordlist.txt
Last active September 6, 2020 22:18
zxcvbn-wordlist.txt
#------------------------------------------------------------------------------
# Dropbox zxcvbn raw word list
# File location:
# https://gist.github.com/roycewilliams/d92b58490eeb52f7f3fa40dc0411d107
#------------------------------------------------------------------------------
# Based on:
# https://github.com/dropbox/zxcvbn/blob/master/src/frequency_lists.coffee
# As of: 2020-09-06
# Converted with:
# grep 'passwords:' frequency_lists.coffee | cut -d\" -f2 | tr ',' '\n'
@roycewilliams
roycewilliams / pwnedpasswords-v6-top20k.txt
Last active February 20, 2026 17:46
pwnedpasswords-v6-top20k.txt
This file has been truncated, but you can view the full file.
#------------------------------------------------------------------------------
# Top 20K hashes from the Troy Hunt / haveibeenpwned Pwned Passwords list v6 (2020-06-19)
# with frequency count and cracked plaintext passwords
#
# The latest version of this file can be found here:
# https://gist.github.com/roycewilliams/226886fd01572964e1431ac8afc999ce
# The equivalent of this file, but based on v2 of the Pwned Passwords, is here:
# https://gist.github.com/roycewilliams/281ce539915a947a23db17137d91aeb7
#------------------------------------------------------------------------------
# Notes and references:
@roycewilliams
roycewilliams / md5-10k-rounds-123456.txt
Created August 18, 2020 05:14
md5-10k-rounds-123456.txt
#
# The first 10,000 rounds of MD5("123456")
# Courtesy MDXfind - https://hashes.org/mdxfind.php
# Source: https://gist.github.com/roycewilliams/3b101d7bd9ea5beac1f828b6eac43858
#
# See also:
# https://github.com/roycewilliams/kens-salty-rainbow
# https://gist.github.com/roycewilliams/794e4d7a81e7840deae29fdc7c03fa10
# https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57
#
@roycewilliams
roycewilliams / mdxfind-allunsalted-123456.txt
Created August 18, 2020 05:05
mdxfind-allunsalted-123456.txt
#
# The string '123456', hashed with many unsalted hash types, up to 5 iterations deep
# Courtesy MDXfind - https://hashes.org/mdxfind.php
# https://gist.github.com/roycewilliams/7e4f892fd610889b9b446dde46402bba
#
# See also:
# https://github.com/roycewilliams/kens-salty-rainbow
# https://gist.github.com/roycewilliams/794e4d7a81e7840deae29fdc7c03fa10
# https://gist.github.com/roycewilliams/1603d23a4c5d3eda44fae348f6e0e954
# https://gist.github.com/roycewilliams/5e8d676ac4fe54fb7b6cb233b0721f57
@roycewilliams
roycewilliams / descrypt-support-allsalts.txt
Created August 13, 2020 15:48
descrypt-support-allsalts.txt
# All possible descrypt hashes of the password "support", using all possible salts.
# From https://github.com/roycewilliams/kens-salty-rainbow
# If you find a device that always uses one of these, let me know.
..dgWexPAozz2
./9NpDH3HAWP.
.0Ag.Z5wZWqqg
.1w5QRFKqb2TQ
.2v94tPBJS6T2
.3fnM3v8Ne6AI
.4KflzuMUYKic
@roycewilliams
roycewilliams / descrypt-user-allsalts.txt
Created August 13, 2020 15:37
descrypt-user-allsalts.txt
# All possible descrypt hashes of the password "user", using all possible salts.
# From https://github.com/roycewilliams/kens-salty-rainbow
# If you find a device that always uses one of these, let me know.
..3Mu2kxrbEl.
./LoKvy9414Cc
.0rKn.kLFqzfc
.1.N4zi5eVgQc
.2hh28DR94IkI
.3Os.QLvwlY2U
.4nmpcNbxpSD.
@roycewilliams
roycewilliams / descrypt-12345-allsalts.txt
Created August 13, 2020 15:36
descrypt-12345-allsalts.txt
# All possible descrypt hashes of the password "12345", using all possible salts.
# From https://github.com/roycewilliams/kens-salty-rainbow
# If you find a device that always uses one of these, let me know.
..snDhyX38WTc
./rR8nrLbhgnc
.0w/m1BycOJP6
.1spFaRyIt6oE
.27J9WO2WE5ng
.3UmO/1CBLSvQ
.4iFN5e1Z/HKc
@roycewilliams
roycewilliams / descrypt-1234-allsalts.txt
Created August 13, 2020 15:34
descrypt-1234-allsalts.txt
# All possible descrypt hashes of the password "1234", using all possible salts.
# From https://github.com/roycewilliams/kens-salty-rainbow
# If you find a device that always uses one of these, let me know.
..XrlQIyEopco
./DyUSqKOUOhI
.0t3va0DXrLyw
.18Ioyx0ZO4aE
.2Yp8ZQtYbcjk
.3MzeMXBu.iUM
.4XFdzXhC4vbA
@roycewilliams
roycewilliams / descrypt-admin-allsalts.txt
Created August 13, 2020 15:33
descrypt-admin-allsalts.txt
# All possible descrypt hashes of the password 'admin', using all possible salts.
# From https://github.com/roycewilliams/kens-salty-rainbow
# If you find a device that always uses one of these, let me know.
..xpoEyRReGzk
./nlIXYriZaB2
.08iPeaCLti3E
.1fH80ykoJAyI
.23PstrXfk7Nw
.37vRhjo4ZP66
.4nTonCOGSWyU
@roycewilliams
roycewilliams / descrypt-letmein-allsalts.txt
Created August 13, 2020 15:32
descrypt-letmein-allsalts.txt
# All possible descrypt hashes of the password "letmein", using all possible salts.
# From https://github.com/roycewilliams/kens-salty-rainbow
# If you find a device that always uses one of these, let me know.
..UJ9ruJ9qjr.
./2ENiGTIs0s.
.0Efts4mB97.I
.1oXsocIRkgBc
.2x.WKkUtPGLA
.32UKUS5ja/ag
.46Jecx58WJYg