A Mask-Attack using hashcat based on the rockyou leak
Go to file
2020-12-08 05:23:13 +01:00
.github/workflows Create codeql-analysis.yml 2020-12-06 21:42:21 +01:00
LICENSE Create LICENSE 2020-12-06 21:40:50 +01:00
mask.txt Add files via upload 2020-08-04 13:38:35 +02:00
README.md Update README.md 2020-12-08 05:23:13 +01:00
RockyouMask.py Update RockyouMask.py 2020-09-21 14:23:18 +02:00

RockyouMask

A Mask-Attack using hashcat based on the rockyou leak

python:

hashcat:

On Windows put your hashes in a text file (one hash per line) in the hashcat directory

On Linux put your hashes in a text file where you excecute the script

cracked hashes:

  • Linux: hashcat yourhashfilehere --show
  • Windows: in the commandline navigate to the hashcat directory - .\hashcat64.exe yourhashfilehere --show

Running a Radeon RX 570 this script can bruit-force 70% of passwords in rockyou in about half a day, 60% in about half an hour