🧨Cracking Tools

Hashcat

Hashes examples list

Installation

Usage

Examples

Rule based attacks πŸ’₯

It is more like a programming language designed for password candidate generation. It has functions that can modify and mutate any given word list with literally anything you can imagine allowing you to have a higher rate of successly cracking a hash.

For more information : https://hashcat.net/wiki/doku.php?id=rule_based_attack

You can locate a handful of hashcat rules available by default on Kali Linux in : /usr/share/hashcat/rules

The following is a list of rules that can be used if the password is not present in a word list chosen. Note : This list is sorted by its complexity, meaning the bottom rule will rule the rest of the rules πŸ˜‰

  • best64.rule

  • rockyou-30000.rule

  • dive.rule

  • OneRuleToRuleThemAll

John the Ripper

Installation

Usage

Last updated

Was this helpful?