Skip to main content
Glama

runHashcat

Crack password hashes using multiple attack modes such as brute-force, dictionary, or hybrid techniques. Supports various hash types, wordlists, masks, and incremental modes for efficient password recovery.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
attackModeNoAttack mode: 0=Straight, 1=Combination, 3=Brute-force, 6=Hybrid Wordlist + Mask, 7=Hybrid Mask + Wordlist
customCharset1NoUser-defined charset ?1
customCharset2NoUser-defined charset ?2
customCharset3NoUser-defined charset ?3
customCharset4NoUser-defined charset ?4
deviceTypesNoDevice types: 1=CPU, 2=GPU, 3=FPGA
forceNoIgnore warnings
hashDataYesString containing the password hashes, one per line.
hashTypeNoHash-type, e.g., 0=MD5, 100=SHA1, 1000=NTLM, 1400=SHA2-256, 1800=sha512crypt, 22000=WPA*01/WPA*02
incrementNoEnable incremental mode (start with shorter passwords)
incrementMaxNoMaximum password length for incremental mode
incrementMinNoMinimum password length for incremental mode
loopbackNoAdd new plains to induct directory
markovThresholdNoThreshold X when to stop accepting new Markov-chains
maskNoMask for brute-force attacks (e.g., '?a?a?a?a?a?a?a?a' for 8 chars)
optimizedKernelsNoEnable optimized kernels (-O)
optionsNoAdditional raw hashcat options
outfileNoOutput file for cracked hashes
outfileFormatNoOutput format: 1=hash, 2=plain, 3=hex-plain, etc.
potfilePathNoPath to custom potfile
quietNoSuppress output
restoreNoRestore a previous session
rulesNoRules file to apply to wordlist
runtimeNoAbort session after X seconds
sessionNoSession name for resuming attacks
showProgressNoShow progress every X seconds
wordlistNoPath to wordlist file for dictionary attacks
workloadProfileNoWorkload profile: 1=Low, 2=Default, 3=High, 4=Nightmare

Other Tools

Related Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/DMontgomery40/pentest-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server