Royce Williams
Royce Williams
When input is UTF-8, cutting on _character_ count - even when it is not aligned with byte count - would be useful. This could be added to cutb as a...
Hey, good writeup - just want to try to stamp out gratuitous use of `--force`. All the other switches will work fine without it, and it's almost never necessary for...
Would be good for the README to have an install section - handy for noobs, busy folks, etc.
Please provide some reference hashes and plaintext for password-storage use. Do you have a suggested '$$'-style hash format, such as `$bscrypt$[workfactors]$[salt]$[hash]` ?
As we start 2024, it might be useful to add a few years to nyxgeek-dates.txt for future-proofing.
Long term, the best ecosystem play is to enable per-hash annotation of what hashtype each hash was. Mixed potfile cleanup / parsing / management is a regular FAQ item. Instead,...
Version: v6.2.6-439-g9b9664967 (and others) These combinator attack commands that use a single `-j` rule that appends a space: `hashcat -a 1 /path/to/file1 /path/to/file2 -j '$ ' --outfile /otherfilename` [etc] `hashcat...
OSPFv2 MD5 digest auth mode as specified in RFC2328, section D.4.3 (p231) https://www.ietf.org/rfc/rfc2328.txt Because the OSPF data itself is used in the hashing, a valid captured OSPF packet is needed....
The concept of *length* trade-offs in optimized vs pure kernels is relatively well-revealed in the hashcat interface. But some kernels have other trade-offs that are implemented for speed. For example,...
Assuming that checks are hostname-based, but also assuming that IP address is already available to the extension, could checks be skipped entirely if the IP addresss of the hostname is...