Skip to content
View roycewilliams's full-sized avatar
💭
:cheeeeeese:
💭
:cheeeeeese:

Organizations

@hashcat @ALPCA-org

Block or report roycewilliams

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
roycewilliams/README.md

Hi there 👋

I'm Royce Williams. Information security by day, security research as Tech Solvency after hours. I live in Anchorage, Alaska with my family.

I am a public-interest technologist at heart. I believe that the keepers and operators of technology and data should first do no harm (though second-order effects mean trade-offs - for example, a surgeon does some "harm" cutting into a patient, for the patient's own good).

Most of my GitHub work centers around password cracking, including some feature requests, docs, UX, and minor housekeeping work on hashcat. I have been a member of Team Hashcat (hashcat's password-cracking competition group) since 2016. I also collaborate with other teams and groups.

A more thorough bio with links to projects and research is here.

And a special shout-out to my Alaskan security colleague ak_hepcat! Lots of fun stuff in his repos.

Pinned Loading

  1. kens-salty-rainbow kens-salty-rainbow Public

    An archive of descrypt hashes for common non-personal passwords

    Shell 27 7

  2. roycewilliams-github-starred.md roycewilliams-github-starred.md
    1
    # roycewilliams / tychotithonus GitHub starred
    2
    ## https://gist.github.com/roycewilliams/b17feea61f39a96d75031930180ef6a6
    3
    ## Last updated: 2024-10-07
    4
    ## NOTE: gists sometimes disappear; also see commit history.
    5
    * https://github.com/003random/003Recon
  3. pwnedpasswords-v2-top20k.txt pwnedpasswords-v2-top20k.txt
    1
    #------------------------------------------------------------------------------
    2
    # Top 20K hashes from the Troy Hunt / haveibeenpwned Pwned Passwords list v2 (2018-02-21)
    3
    #    with frequency count and cracked plaintext passwords
    4
    #
    5
    # The latest version of this file can be found here:
  4. Exploitable vulnerabilities in clien... Exploitable vulnerabilities in client-side software update mechanisms that could have been mitigated by secure transport (TLS).
    1
    # Client-side software update verification failures
    2
    Exploitable vulnerabilities in client-side software update mechanisms that could have been mitigated by secure transport (TLS). 
    3
    
                  
    4
    Contributions welcome. All text taken from the vulnerability descriptions themselves, with additional emphasis mine. 
    5
    
                  
  5. iana-whois-conf iana-whois-conf Public

    Crude scripts for building modern WHOIS configs (whois.conf, jwhois.conf ...) using IANA TLD info, with data snapshots.

    HTML 23 6

  6. bcrypt hashes for 'password', all po... bcrypt hashes for 'password', all possible work factors / costs (cost 4 through cost 31)
    1
    #-----------------------------------------------------------------------------
    2
    # bcrypt hashes for the plain 'password', costs 4 through 31, and how much 
    3
    # time it took to generate the hash on a reference system (CPU).
    4
    #-----------------------------------------------------------------------------
    5
    #