You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
There is no rule that tells hashcat to not to try to crack a hash with a candidate with repeated characters. imho, it would shorten a lot some attacks.
pd: sorry if this isn't the best place to tell this but i dont know how to pull a request
The text was updated successfully, but these errors were encountered:
It's not possible because the final keyspace is unknown. So this will work only in stdin mode. I recommend using maskprocessor using -r and then pipe this to hashcat.
There is no rule that tells hashcat to not to try to crack a hash with a candidate with repeated characters. imho, it would shorten a lot some attacks.
pd: sorry if this isn't the best place to tell this but i dont know how to pull a request
The text was updated successfully, but these errors were encountered: