Skip to main content
Glama
MIT License
13
77
  • Linux
  • Apple

runJohnTheRipper

Crack password hashes using John the Ripper on Pentest MCP. Input hash data and specify command-line options to perform brute-force or dictionary attacks for penetration testing.

Input Schema

NameRequiredDescriptionDefault
hashDataYesString containing the password hashes, one per line.
optionsNoArray of command-line options for JtR.

Input Schema (JSON Schema)

{ "$schema": "http://json-schema.org/draft-07/schema#", "additionalProperties": false, "properties": { "hashData": { "description": "String containing the password hashes, one per line.", "type": "string" }, "options": { "description": "Array of command-line options for JtR.", "items": { "type": "string" }, "type": "array" } }, "required": [ "hashData" ], "type": "object" }

Other Tools from Pentest MCP

Related Tools

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/DMontgomery40/pentest-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server