Hashcat is capable of reading passwords from compressed archives such as gz and zip. This repository contains a list of zip compressed passwords from https://github.com/danielmiessler/SecLists. It's useful if you use a cloud based cracking rig and need to save storage space on the instance.
All the compressed passwords are in the Passwords directory. Follow these steps if you want to rebuild them:
- Make sure zip is installed.
- Clone the https://github.com/danielmiessler/SecLists/ repository.
- Run
build.sh
and pass it the location of the Passwords directory in your SecLists cloned repository. - Profit.