Indeed.
The closest easy tool that understands both salted and unsalted variants is 'getpass' from the Cynosure Prime GitHub distro of 'rling':
https://github.com/Cynosureprime/rling
The one quirk is that it will skip files ending in '.txt' because in Waffle's world, .txt is reserved for specific password-cracking inputs/outputs. You can override this with the '-n' flag.
And yes, it's definitely worth doing. See also --loopback, which does the same thing (feed cracks back into the existing attack), but just for that specific run.
The closest easy tool that understands both salted and unsalted variants is 'getpass' from the Cynosure Prime GitHub distro of 'rling':
https://github.com/Cynosureprime/rling
The one quirk is that it will skip files ending in '.txt' because in Waffle's world, .txt is reserved for specific password-cracking inputs/outputs. You can override this with the '-n' flag.
And yes, it's definitely worth doing. See also --loopback, which does the same thing (feed cracks back into the existing attack), but just for that specific run.
~