runHashcat
Crack password hashes using multiple attack modes (straight, brute-force, hybrid) with customizable parameters like wordlists, masks, and rules. Ideal for penetration testing and security audits.
Input Schema
Name | Required | Description | Default |
---|---|---|---|
attackMode | No | Attack mode: 0=Straight, 1=Combination, 3=Brute-force, 6=Hybrid Wordlist + Mask, 7=Hybrid Mask + Wordlist | |
customCharset1 | No | User-defined charset ?1 | |
customCharset2 | No | User-defined charset ?2 | |
customCharset3 | No | User-defined charset ?3 | |
customCharset4 | No | User-defined charset ?4 | |
deviceTypes | No | Device types: 1=CPU, 2=GPU, 3=FPGA | |
force | No | Ignore warnings | |
hashData | Yes | String containing the password hashes, one per line. | |
hashType | No | Hash-type, e.g., 0=MD5, 100=SHA1, 1000=NTLM, 1400=SHA2-256, 1800=sha512crypt, 22000=WPA*01/WPA*02 | |
increment | No | Enable incremental mode (start with shorter passwords) | |
incrementMax | No | Maximum password length for incremental mode | |
incrementMin | No | Minimum password length for incremental mode | |
loopback | No | Add new plains to induct directory | |
markovThreshold | No | Threshold X when to stop accepting new Markov-chains | |
mask | No | Mask for brute-force attacks (e.g., '?a?a?a?a?a?a?a?a' for 8 chars) | |
optimizedKernels | No | Enable optimized kernels (-O) | |
options | No | Additional raw hashcat options | |
outfile | No | Output file for cracked hashes | |
outfileFormat | No | Output format: 1=hash, 2=plain, 3=hex-plain, etc. | |
potfilePath | No | Path to custom potfile | |
quiet | No | Suppress output | |
restore | No | Restore a previous session | |
rules | No | Rules file to apply to wordlist | |
runtime | No | Abort session after X seconds | |
session | No | Session name for resuming attacks | |
showProgress | No | Show progress every X seconds | |
wordlist | No | Path to wordlist file for dictionary attacks | |
workloadProfile | No | Workload profile: 1=Low, 2=Default, 3=High, 4=Nightmare |