A collection of sorted wordlists, hashcat masks, and advanced rules for password cracking based on analysis of billions of real passwords.
Kaonashi is a project that provides sorted wordlists, hashcat masks, and advanced rules for password cracking, based on the analysis of billions of real passwords from leaks. It helps security researchers and ethical hackers understand common password patterns and improve password cracking techniques through data-driven insights. The project aims to demonstrate insecure password behaviors to enhance overall password security.
Security researchers, penetration testers, and ethical hackers who need effective tools for password security testing and analysis. It's also useful for cybersecurity educators teaching password strength evaluation.
It offers pre-sorted, frequency-based wordlists and optimized hashcat tools derived from large-scale real password analysis, saving time and increasing efficiency in password cracking exercises. Unlike generic wordlists, it provides masks and rules specifically designed from statistical and behavioral password patterns.
Wordlist, rules and masks from Kaonashi project (RootedCON 2019)
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Wordlists are extracted from real password leaks and sorted by occurrence frequency, allowing users to create custom lists by taking the top N most common passwords, as explicitly described in the README.
Provides pre-sorted masks and advanced rules specifically designed for hashcat, derived from behavioral and statistical analysis to improve password cracking efficiency, as highlighted in the Key Features.
Built from the analysis of billions of passwords using neural networks and advanced techniques, offering credible insights into common user behaviors, which enhances the reliability of security testing.
Designed for lawful, ethical security testing to demonstrate insecure password patterns and improve overall password security, as emphasized in the disclaimer and philosophy sections.
Based on 2019 analysis with version 20190803, the wordlists and patterns may not reflect recent password trends or new leaks, limiting current effectiveness in dynamic security environments.
Primarily supports hashcat with masks and rules; lacks built-in integration with other password cracking tools or frameworks, which could restrict usability in diverse workflows.
The README is minimal, focusing on download links and slides without detailed usage guides, examples, or setup instructions, making it less accessible for newcomers or quick reference.