A collection of password cracking rules and masks for hashcat, generated from analysis of real breached password data.
nsa-rules is a collection of password cracking rules and mask files for the hashcat tool, generated by analyzing passwords from historical data breaches. It provides statistically optimized rule sets designed to improve cracking efficiency over default configurations. The project includes benchmarking results comparing its performance against hashcat's built-in rules.
Security researchers, penetration testers, and red teamers who use hashcat for password recovery and want to leverage data-driven rule sets. It's also useful for those studying password security and common password patterns.
It offers rule sets derived from real breached password data, providing a statistically grounded alternative to hashcat's default rules. The included benchmarking tools and analysis help users understand rule effectiveness and make informed choices for their cracking workflows.
Password cracking rules and masks for hashcat that I generated from cracked passwords.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Rules are statistically optimized using real breached passwords from multiple sources, as detailed in the v1 and v2 dictionary creation process, providing a grounded alternative to default sets.
Includes pwcrack.sh for consistent testing and detailed benchmarks comparing generated rules against hashcat stock sets, with graphs and tables showing performance metrics.
Offers nsa64.rule, a compact set of 64 high-performing rules for quick testing, which cracked 42% of Battlefield Heroes Beta hashes in benchmarks.
READNME thoroughly explains the rule generation process using PACK and breach data, allowing users to understand and replicate the approach.
The author admits hashcat's stock rule sets are very good, and statistical rules alone may not greatly outperform them, requiring hand-tuning for optimal results.
nsa.hcmask includes long masks that are impractical to run fully, as noted with the 'heat death of the universe' warning, necessitating manual pruning and effort.
Based on breach data from around 2015, which may not reflect current password trends, and focused on limited datasets like Battlefield Heroes Beta hashes.