List of archive types: https://fileinfo.com/filetypes/compressed

To get as txt list:

curl -s <https://fileinfo.com/filetypes/compressed> | html2text | awk '{print tolower($1)}' | grep "\\." | tee -a compressed_ext.txt
.mint
.zhelp
.b6z
.fzpz
.zst
.apz
.ufs.uzip
.vrpackage
...

Cracking OpenSSL encrypted GZIP files

When cracking OpenSSL encrypted files, there are numerous false positives or complete failure to identify password.

A more reliable approach is to use openssl within a for that attempts to extracts the content directly.

for i in $(cat rockyou.txt);do openssl enc -aes-256-cbc -d -in GZIP.gzip -k $i 2>/dev/null| tar xz;done

Cracking Bitlocker encrypted drives

bitlocker2john can extract 4 hashes:

1 and 2 represent the Bitlocker password

2 others represent the recovery key (48B)

Hashcat associated mode: 22100

Encryption is AES, and take a lot of time to crack

To get the hash:

bitlocker2john -i Backup.vhd > backup.hashes
# Extract the first bitlocker hash (remove some informational content in the file)
grep "bitlocker\\$0" backup.hashes > backup.hash