Skip to main content
Glama

runHashcat

Crack password hashes using multiple attack modes (straight, brute-force, hybrid) with customizable parameters like wordlists, masks, and rules. Ideal for penetration testing and security audits.

Input Schema

NameRequiredDescriptionDefault
attackModeNoAttack mode: 0=Straight, 1=Combination, 3=Brute-force, 6=Hybrid Wordlist + Mask, 7=Hybrid Mask + Wordlist
customCharset1NoUser-defined charset ?1
customCharset2NoUser-defined charset ?2
customCharset3NoUser-defined charset ?3
customCharset4NoUser-defined charset ?4
deviceTypesNoDevice types: 1=CPU, 2=GPU, 3=FPGA
forceNoIgnore warnings
hashDataYesString containing the password hashes, one per line.
hashTypeNoHash-type, e.g., 0=MD5, 100=SHA1, 1000=NTLM, 1400=SHA2-256, 1800=sha512crypt, 22000=WPA*01/WPA*02
incrementNoEnable incremental mode (start with shorter passwords)
incrementMaxNoMaximum password length for incremental mode
incrementMinNoMinimum password length for incremental mode
loopbackNoAdd new plains to induct directory
markovThresholdNoThreshold X when to stop accepting new Markov-chains
maskNoMask for brute-force attacks (e.g., '?a?a?a?a?a?a?a?a' for 8 chars)
optimizedKernelsNoEnable optimized kernels (-O)
optionsNoAdditional raw hashcat options
outfileNoOutput file for cracked hashes
outfileFormatNoOutput format: 1=hash, 2=plain, 3=hex-plain, etc.
potfilePathNoPath to custom potfile
quietNoSuppress output
restoreNoRestore a previous session
rulesNoRules file to apply to wordlist
runtimeNoAbort session after X seconds
sessionNoSession name for resuming attacks
showProgressNoShow progress every X seconds
wordlistNoPath to wordlist file for dictionary attacks
workloadProfileNoWorkload profile: 1=Low, 2=Default, 3=High, 4=Nightmare

Input Schema (JSON Schema)

{ "$schema": "http://json-schema.org/draft-07/schema#", "additionalProperties": false, "properties": { "attackMode": { "description": "Attack mode: 0=Straight, 1=Combination, 3=Brute-force, 6=Hybrid Wordlist + Mask, 7=Hybrid Mask + Wordlist", "enum": [ "0", "1", "3", "6", "7" ], "type": "string" }, "customCharset1": { "description": "User-defined charset ?1", "type": "string" }, "customCharset2": { "description": "User-defined charset ?2", "type": "string" }, "customCharset3": { "description": "User-defined charset ?3", "type": "string" }, "customCharset4": { "description": "User-defined charset ?4", "type": "string" }, "deviceTypes": { "description": "Device types: 1=CPU, 2=GPU, 3=FPGA", "items": { "enum": [ "1", "2", "3" ], "type": "string" }, "type": "array" }, "force": { "description": "Ignore warnings", "type": "boolean" }, "hashData": { "description": "String containing the password hashes, one per line.", "type": "string" }, "hashType": { "description": "Hash-type, e.g., 0=MD5, 100=SHA1, 1000=NTLM, 1400=SHA2-256, 1800=sha512crypt, 22000=WPA*01/WPA*02", "type": "string" }, "increment": { "description": "Enable incremental mode (start with shorter passwords)", "type": "boolean" }, "incrementMax": { "description": "Maximum password length for incremental mode", "type": "integer" }, "incrementMin": { "description": "Minimum password length for incremental mode", "type": "integer" }, "loopback": { "description": "Add new plains to induct directory", "type": "boolean" }, "markovThreshold": { "description": "Threshold X when to stop accepting new Markov-chains", "type": "integer" }, "mask": { "description": "Mask for brute-force attacks (e.g., '?a?a?a?a?a?a?a?a' for 8 chars)", "type": "string" }, "optimizedKernels": { "description": "Enable optimized kernels (-O)", "type": "boolean" }, "options": { "description": "Additional raw hashcat options", "items": { "type": "string" }, "type": "array" }, "outfile": { "description": "Output file for cracked hashes", "type": "string" }, "outfileFormat": { "description": "Output format: 1=hash, 2=plain, 3=hex-plain, etc.", "type": "integer" }, "potfilePath": { "description": "Path to custom potfile", "type": "string" }, "quiet": { "description": "Suppress output", "type": "boolean" }, "restore": { "description": "Restore a previous session", "type": "boolean" }, "rules": { "description": "Rules file to apply to wordlist", "type": "string" }, "runtime": { "description": "Abort session after X seconds", "type": "integer" }, "session": { "description": "Session name for resuming attacks", "type": "string" }, "showProgress": { "description": "Show progress every X seconds", "type": "boolean" }, "wordlist": { "description": "Path to wordlist file for dictionary attacks", "type": "string" }, "workloadProfile": { "description": "Workload profile: 1=Low, 2=Default, 3=High, 4=Nightmare", "enum": [ "1", "2", "3", "4" ], "type": "string" } }, "required": [ "hashData" ], "type": "object" }

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/DMontgomery40/pentest-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server