usage:
hashcat -m 0 -a 0 hash.txt /usr/share/seclists/Passwords/Common-Credentials/100k-most-used-passwords-NCSC.txt
-m sets the hash mode. 0 here is MD5 in this case
-a sets the attack mode
0 is straight mode. uses a wordlist
1 is combination mode. uses two wordlists
2 is brute force. uses masks
3 is a hybrid of straight and bruteforce. uses masks AND wordlists.
hash.txt is the file storing the hashes. can be the hash itself as well
/usr/share/wordlists/rockyou.txt is the wordlist you wanna use
-D selects the device to do the hash cracking with. a gpu is preferred
- do
-I to check devices and select the device in the command like -D 1