Skip to content

Instantly share code, notes, and snippets.

@TheNaterz
TheNaterz / analyze.py
Last active May 19, 2021 05:16
Simple password pattern recognition for Hashcat masks
#!/usr/bin/python3
import sys, subprocess
patterns = {}
# run hashcat with show to spit out cracked hash:password
# should be changed based off of environment
# arg should be file of line seperated hashes
p = subprocess.Popen(['/opt/hashcat/hashcat-3.30/hashcat64.bin', '-m', '1000', sys.argv[1], '--show'], stdout=subprocess.PIPE)