A Mask-Attack using hashcat based on the rockyou leak
Go to file
2022-07-03 11:35:53 +02:00
.github/workflows Create codeql-analysis.yml 2020-12-06 21:42:21 +01:00
LICENSE Create LICENSE 2020-12-06 21:40:50 +01:00
mask.txt Add files via upload 2020-08-04 13:38:35 +02:00
README.md Update README.md 2021-08-07 08:22:41 +02:00
RockyouMask.py Fixed =! in line 314 2022-07-03 11:35:53 +02:00

RockyouMask

A Mask-Attack using hashcat based on the rockyou leak

I am not developing this project anymore. The code is not complex so don't be afraid to take a peek and modify it yourself. If you want to know how I generated the maks feel free to contact me and I may be able to remember how I did it.

I've collected the most effective masks to use to crack passwords and put it all together so you have to do as little manual labor as possible to achieve (sub) optimal results.
Suboptimal because knowing your target and using that information for a custom mask goes a lot further than even the best password cracking algotithm based on the average person

python:

hashcat:

On Windows put your hashes in a text file (one hash per line) in the hashcat directory

On Linux put your hashes in a text file where you excecute the script

cracked hashes:

  • Linux: hashcat yourhashfilehere --show
  • Windows: in the commandline navigate to the hashcat directory - .\hashcat64.exe yourhashfilehere --show

Running a Radeon RX 570 this script can brute-force 70% of passwords in rockyou in about half a day, 60% in about half an hour