Skip to main content
Glama

Hashcat MCP Server

by MorDavid
README.md5.03 kB
# Hashcat MCP Server 🔥 ![Hashcat MCP](https://img.shields.io/badge/Hashcat-MCP%20Server-red?style=for-the-badge&logo=security&logoColor=white) ![Python](https://img.shields.io/badge/Python-3.8+-blue?style=for-the-badge&logo=python&logoColor=white) ![Claude Desktop](https://img.shields.io/badge/Claude-Desktop-purple?style=for-the-badge&logo=anthropic&logoColor=white) ![AI Powered](https://img.shields.io/badge/AI-Enhanced-green?style=for-the-badge&logo=openai&logoColor=white) ![License](https://img.shields.io/badge/License-MIT-orange?style=for-the-badge) A powerful Model Context Protocol (MCP) server that provides intelligent hashcat integration for Claude Desktop. Crack hashes, analyze passwords, and perform security assessments directly from your Claude conversations. ## ✨ Features - **Smart Hash Identification** - Automatically detect hash types with confidence scoring - **Multiple Attack Modes** - Dictionary, brute-force, hybrid, and rule-based attacks - **Batch Processing** - Crack multiple hashes simultaneously - **Session Management** - Track and monitor cracking progress - **GPU Monitoring** - Real-time hardware performance metrics - **Password Analysis** - Analyze cracked passwords for security insights - **Auto Attack Strategies** - Intelligent attack sequence selection - **Security Hardened** - Input validation and injection protection ## 🎬 Demo ![Hashcat MCP Server Demo](demo.gif) *Watch the Hashcat MCP Server in action - from hash identification to successful cracking!* ## 🛡️ RootSec Community Join our cybersecurity community for the latest in offensive security, AI integration, and advanced penetration testing techniques: **🔗 [t.me/root_sec](https://t.me/root_sec)** RootSec is a community of security professionals, researchers, and enthusiasts sharing knowledge about: - Advanced penetration testing techniques - AI-powered security tools - Red team methodologies - Security research and development - Industry insights and discussions ## 🚀 Quick Start ### 1. Install Dependencies ```bash pip install -r requirements.txt ``` ### 2. Configure Claude Desktop Edit your Claude Desktop config file: **Windows:** `%APPDATA%\Claude\claude_desktop_config.json` **Mac:** `~/Library/Application Support/Claude/claude_desktop_config.json` ```json { "mcpServers": { "Hashcat-MCP": { "command": "python", "args": [ "C:\\path\\to\\your\\hashcat_mcp_server.py" ], "env": { "HASHCAT_PATH": "C:\\path\\to\\hashcat\\hashcat.exe", "HASHCAT_SAFE_DIRS": "C:\\wordlists" } } } } ``` **Important:** Update the paths to match your system: - `args[0]` - Path to your `hashcat_mcp_server.py` file - `HASHCAT_PATH` - Path to your hashcat executable - `HASHCAT_SAFE_DIRS` - Comma-separated list of safe directories for wordlists ### 3. Restart Claude Desktop Close and reopen Claude Desktop to load the MCP server. ## 🔧 Configuration ### Required Environment Variables - `HASHCAT_PATH` - Path to hashcat executable (required) ### Optional Environment Variables - `HASHCAT_SAFE_DIRS` - Safe directories for wordlists (recommended) - `HASHCAT_LOG_LEVEL` - Logging level: DEBUG, INFO, WARNING, ERROR (default: DEBUG) ## 📖 Usage Examples ### Basic Hash Identification ``` Can you identify this hash: 5d41402abc4b2a76b9719d911017c592 ``` ### Crack a Hash ``` Crack this NTLM hash: 76268997E3979AFB37AC1C653E3ABBDD Use wordlist: C:\wordlists\rockyou.txt ``` ### Auto Attack Strategy ``` Run an automatic attack on this hash: 098f6bcd4621d373cade4e832627b4f6 Give it 30 minutes to try different strategies ``` ### Batch Processing ``` Crack these hashes: - 5d41402abc4b2a76b9719d911017c592 - 098f6bcd4621d373cade4e832627b4f6 - 76268997E3979AFB37AC1C653E3ABBDD ``` ## 📊 Supported Hash Types The server supports 400+ hash types including: - **Raw Hashes:** MD5, SHA1, SHA256, SHA512 - **Operating Systems:** NTLM, bcrypt, sha512crypt, md5crypt - **Network Protocols:** WPA/WPA2, Kerberos - **Applications:** MySQL, PostgreSQL, Oracle - **And many more...** ## 🔍 Available Functions - `smart_identify_hash()` - Enhanced hash identification - `crack_hash()` - Crack single hash with various attack modes - `crack_multiple_hashes()` - Batch hash cracking - `auto_attack_strategy()` - Intelligent automated attacks - `benchmark_hashcat()` - Performance benchmarking - `get_gpu_status()` - Hardware monitoring - `analyze_cracked_passwords()` - Password security analysis - `generate_smart_masks()` - Intelligent brute-force patterns - `estimate_crack_time()` - Time estimation for attacks ## ⚠️ Disclaimer This tool is for educational and authorized security testing purposes only. Always ensure you have proper authorization before testing any systems or hashes that don't belong to you. ## 📄 License This project is licensed under the MIT License - see the LICENSE file for details. --- **Happy Hashing! 🔓**

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/MorDavid/Hashcat-MCP'

If you have feedback or need assistance with the MCP directory API, please join our Discord server