Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/stealthsploit/OneRuleToRuleThemStill
A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule
https://github.com/stealthsploit/OneRuleToRuleThemStill
Last synced: 6 days ago
JSON representation
A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule
- Host: GitHub
- URL: https://github.com/stealthsploit/OneRuleToRuleThemStill
- Owner: stealthsploit
- Created: 2023-01-10T11:35:50.000Z (almost 2 years ago)
- Default Branch: main
- Last Pushed: 2024-10-16T10:35:59.000Z (24 days ago)
- Last Synced: 2024-10-18T00:02:50.486Z (22 days ago)
- Homepage: https://in.security/2023/01/10/oneruletorulethemstill-new-and-improved/
- Size: 1.19 MB
- Stars: 357
- Watchers: 5
- Forks: 40
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Changelog: Changelog
Awesome Lists containing this project
- awesome-password-cracking - OneRuleToRuleThemStill - "A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule." (Hashcat / Rules)
README
# OneRuleToRuleThemStill
An revamped and optimised version of [OneRuleToRuleThemAll](https://github.com/stealthsploit/Optimised-hashcat-Rule).
OneRuleToRuleThemStill now has a ~~5%~~ ~6.9% reduction in rules (52,000 down to ~~49,465~~ 48,414) with 0% performance loss against the Lifeboat and LastFM data breaches.
Updates:
- De-duplication of resulting candidate generation (previously literal strings only)
- Added LastFM breach dataset (~21m unique hashes) for larger/better modelling
- Common non-matching rules removed (Lifeboat and LastFM)
- Ordered by frequency against LastFMMore detail can be found in the blog: https://in.security/2023/01/10/oneruletorulethemstill-new-and-improved/
Free Training
[![alt text](https://in.security/wp-content/uploads/2024/10/pw101logo.jpg)](https://in.security/technical-training/password-cracking/)
I developed **Password Cracking 101+1**, freely available on our website at https://in.security/technical-training/password-cracking/
- 4 hours of video content split into 15 parts with hands-on challenges
- Covers basic/traditional attack techniques as well as deeper, more creative attacks (such as delimited passphrases, foreign language, emojis, non-deterministic attacks etc)
- VM to download pre-built with training challenges and answers (VirtualBox OVA format)
- Password Cracking 101+1 training channel in our Discord server to chat
[![Discord Banner 3](https://discord.com/api/guilds/752813804491898910/widget.png?style=banner2)](https://discord.gg/5VpwE9YJ9R)
Credits
As well as several default hashcat rules (including generated2 by https://github.com/evilmog), the following non-default rule sets were used in testing to create the original rule:- https://github.com/praetorian-inc/Hob0Rules (d3adhob0.rule, hob064.rule)
- http://contest-2010.korelogic.com/rules-hashcat.html (KoreLogicRulesPrependRockYou50000)
- https://github.com/NSAKEY/nsa-rules (__NSAKEY.v2.dive.rule_)The tool https://github.com/mhasbini/duprule assisted during development.
Many thanks to https://github.com/hashcat/hashcat and it's team for their continual great work.
License
Individual rules used will use their respective licenses if present. Additional custom rules are MIT licensed.