Hashcat Word lists and Rules

Specific Word lists

Word list from cracked hashes

Locate pot-file

Place the cracked hash passwords into its own word list.

Word list from website scraping

NSA Rules

Github: https://github.com/NSAKEY/nsa-rulesarrow-up-right

OneRuleToRuleThemAllStill

An updated and improved variation of the popular OneRuleToRuleThemAll rule set. This updated rule set should provide the same effective crackrate as OneRule with a reduction in total cracking time.

Blog Post: https://in.security/2023/01/10/oneruletorulethemstill-new-and-improved/arrow-up-right

Github: https://github.com/stealthsploit/OneRuleToRuleThemStillarrow-up-right

Unic0rn28 Hashcat Rules

Github: https://github.com/Unic0rn28/hashcat-rulesarrow-up-right

Brute Force Mask

Reviewing cracked passwords

Hashcat can display credentials in [Username]:[Password] format. Adjust the command below to match the correct method for the hashfile and the --outfile-format value to whichever looks best. For NTLM and Secretsdump the command below should work fine.

Last updated