Ranter
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API

From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Comments
-
I'm not sure if you should be so enthusiastic about being able to do that. It has up and downsides
-
endor56197y@nicogramm lol, you're right.
To be fair though, I use(d) a fairly strong base password with an extra addition appended, but I couldn't remember what I had chosen for this key (hence the need to bruteforce by going through all possible combinations).
Now moving to a strong, random, 64 char passwords generated with Keypass2, so no more stupid problems like this in the future -
Erm...couldn't you have used hashcat with CUDA? I think that'd be a million times faster.
-
endor56197y@PrivateGER not worth it, since I only had ~50 combinations to look through (known base bassword + some suffix that I couldn't remember).
Plus, I needed a way to pipe each one into gpg to see if it unlocked the key anyway, so it was just easier that way
FUCK YEAH!
I just managed to bruteforce my GPG key's password :D :D
I fucking love Python!
rant