If you're using windows, create a .txt file which will include all the stated attacks above. Rename .txt to .bat then doubleclick the .bat to run all attacks.
If the password is found within ANY of the previous attacks it will be added to the potfile and then skipped the remainder of the attacks to not warrant wasting time/resources. If it wasn't found you will have all the details within your cmd window showing time spent on the attacks.
Code:
Filename : Attack with 8 rules.bat
hashcat -m 0 -a 0 hash.txt passwords.txt -r rules/d3ad0ne.rule
hashcat -m 0 -a 0 hash.txt passwords.txt -r rules/2.rule
hashcat -m 0 -a 0 hash.txt passwords.txt -r rules/3.rule
hashcat -m 0 -a 0 hash.txt passwords.txt -r rules/4.rule
hashcat -m 0 -a 0 hash.txt passwords.txt -r rules/5.rule
hashcat -m 0 -a 0 hash.txt passwords.txt -r rules/6.rule
hashcat -m 0 -a 0 hash.txt passwords.txt -r rules/7.rule
pause
If the password is found within ANY of the previous attacks it will be added to the potfile and then skipped the remainder of the attacks to not warrant wasting time/resources. If it wasn't found you will have all the details within your cmd window showing time spent on the attacks.