/passphrase-wordlist

Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords

Primary LanguagePythonMIT LicenseMIT

Overview

People think they are getting smarter by using passphrases. Let's prove them wrong!

This project includes a massive wordlist of phrases (17,737,982) and two hashcat rule files for GPU-based cracking.

The 'passphrases.txt' file is stored in Git Large File Storage (GLFS), so download via this link or use git if you known what you're doing with GLFS.

Use both rules for best results.

Here is an example for NTLMv2 hashes: If you use the -O option, watch out for what the maximum password length is set to - it may be too short.

hashcat64.bin -a 0 -m 5600 hashes.txt passphrases.txt -r rule1.hashcat -r rule2.hashcat -w 3

Sources Used

So far, I've scraped the following:

Cleaning sources

Check out the script cleanup.py to see how I've cleaned the raw sources. I will post a link to the hosted raw sources soon. I had to take them down after the Reddit post killed my quota. :)

Hashcat Rules

Given the phrase take the red pill the first hashcat rule will output the following

take the red pill
take-the-red-pill
take.the.red.pill
take,the,red,pill
take_the_red_pill
taketheredpill
Take the red pill
TAKE THE RED PILL
tAKE THE RED PILL
Taketheredpill
tAKETHEREDPILL
TAKETHEREDPILL
Take The Red Pill
TakeTheRedPill
Take-The-Red-Pill
Take.The.Red.Pill
Take,The,Red,Pill
Take_The_Red_Pill

Adding in the second hashcat rule makes things get a bit more interesting. That will return a huge list per candidate. Here are a couple examples:

T@k3Th3R3dPill!
T@ke-The-Red-Pill
taketheredpill2020!
T0KE THE RED PILL (unintentional humor)

Enjoy!