Skip to content
View roycewilliams's full-sized avatar
💭
:cheeeeeese:
💭
:cheeeeeese:

Organizations

@hashcat @ALPCA-org

Block or report roycewilliams

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
roycewilliams/README.md

Hi there 👋

I'm Royce Williams. Information security by day, security research as Tech Solvency after hours. I live in Anchorage, Alaska with my family.

I am a public-interest technologist at heart. I believe that the keepers and operators of technology and data should first do no harm (though second-order effects mean trade-offs - for example, a surgeon does some "harm" cutting into a patient, for the patient's own good).

Most of my GitHub work centers around password cracking, including some feature requests, docs, UX, and minor housekeeping work on hashcat. I have been a member of Team Hashcat (hashcat's password-cracking competition group) since 2016. I also collaborate with other teams and groups.

A more thorough bio with links to projects and research is here.

And a special shout-out to my Alaskan security colleague ak_hepcat! Lots of fun stuff in his repos.

Pinned Loading

  1. kens-salty-rainbow kens-salty-rainbow Public

    An archive of descrypt hashes for common non-personal passwords

    Shell 26 7

  2. roycewilliams-github-starred.md roycewilliams-github-starred.md
    1
    # roycewilliams / tychotithonus GitHub starred
    2
    ## https://gist.github.com/roycewilliams/b17feea61f39a96d75031930180ef6a6
    3
    ## Last updated: 2024-10-07
    4
    ## NOTE: gists sometimes disappear; also see commit history.
    5
    * https://github.com/003random/003Recon
  3. pwnedpasswords-v2-top20k.txt pwnedpasswords-v2-top20k.txt
    1
    #------------------------------------------------------------------------------
    2
    # Top 20K hashes from the Troy Hunt / haveibeenpwned Pwned Passwords list v2 (2018-02-21)
    3
    #    with frequency count and cracked plaintext passwords
    4
    #
    5
    # The latest version of this file can be found here:
  4. Exploitable vulnerabilities in clien... Exploitable vulnerabilities in client-side software update mechanisms that could have been mitigated by secure transport (TLS).
    1
    # Client-side software update verification failures
    2
    Exploitable vulnerabilities in client-side software update mechanisms that could have been mitigated by secure transport (TLS). 
    3
    
                  
    4
    Contributions welcome. All text taken from the vulnerability descriptions themselves, with additional emphasis mine. 
    5
    
                  
  5. iana-whois-conf iana-whois-conf Public

    Crude scripts for building modern WHOIS configs (whois.conf, jwhois.conf ...) using IANA TLD info, with data snapshots.

    HTML 21 4

  6. bcrypt hashes for 'password', all po... bcrypt hashes for 'password', all possible work factors / costs (cost 4 through cost 31)
    1
    #-----------------------------------------------------------------------------
    2
    # bcrypt hashes for the plain 'password', costs 4 through 31, and how much 
    3
    # time it took to generate the hash on a reference system (CPU).
    4
    #-----------------------------------------------------------------------------
    5
    #