Note

The app for independent voices

Eating from street food stalls is the most overrated travel thing. The food is almost always disgusting and far better versions of the dishes can be found in sit down restaurants with better hygiene, less spoiled oils, and a far more pleasant atmosphere, that doesn’t cost much more.

The notable exception is from established venues in traditional markets — and these are not really stalls, and more like Limited hour restaurants.

I almost stopped writing because no one was engaging.

Then someone told me, “I’ve been reading everything you post.”

That’s when I realized: silent readers exist—and they matter.

So I kept writing, even when it felt like no one was watching.

Your words are reaching more people than you think.

Look Up.

This is what a great ceiling looks like.

St. Mary's Basilica in Kraków, Poland (1347)

You made it, you own it

You always own your intellectual property, mailing list, and subscriber payments. With full editorial control and no gatekeepers, you can do the work you most believe in.

Mothering, a mess, and a life’s ambition

I do not know why the White House Correspondents Dinner is still a thing.

It had a good run.

Time for it to end.

Great discussions

Join the most interesting and insightful discussions.

Can Japan hang onto its ‘nice things’?

This week’s post, possibly of interest to

, , , and .

Bin Lorries and the Fraying of Japan's Social Contract

I recently put together a script that might be useful for those working on password list generation.

The idea behind it is simple: many businesses include words in their websites (like parts of phone numbers, addresses, or other common terms associated with the business) that can be used to build a targeted password cracking list.

What the Script Does:

  • Crawls a Website: Starts at a given URL and recursively crawls internal pages, up to a user-specified depth.

  • Extracts Text: Extracts all words from the site, with special handling for phone numbers. It breaks down phone numbers into components (area code, prefix, line number) since these fragments are often used in passwords.

  • Filters Stop Words (Optional): Removes common stop words (or custom ones you provide) to focus on more relevant data.

  • Generates a Ready-to-Use Wordlist: Sorts the words by frequency and lets you choose how many of the top words to include (or include all). The final wordlist is saved as "wordlist.txt", ready for use with tools like Hashcat.

For example:

A coffee shop's WiFi password might be "Coffee2025" (using "coffee", a commonly used word on their site, and the current year), or "123MainStreet" (their address), or even "515-222-1234" (their phone number). Including words relevant to the company in your list increases the likelihood of matching actual passwords.

I built this script because I noticed that many businesses use industry specific words and/or location specific (phone, address) in their password choices. If you're interested in using or tweaking the script, feel free to ask questions or share your thoughts.

Ethical Use:

This script is intended for ethical security testing and research. Use it only on websites where you have permission to test or as part of an authorized security audit. Its purpose is to help identify weak password choices and improve security—not for illegal access.

6 Likes
5 Replies
1 Restack
Feb 25
at
2:50 AM