Skip to main content
Glama

john_the_ripper

Crack password hashes by testing combinations from wordlists against specified hash formats to identify weak credentials during security assessments.

Instructions

cracking hashes using john based on format and a wordlist

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
hashfileYes
formatYes
wordlistNo/usr/share/wordlists/rockyou.txt

Implementation Reference

  • The handler function for the 'john_the_ripper' tool. It executes John the Ripper to crack hashes using the provided hashfile, format, and wordlist by calling the run_command helper.
    async def john_the_ripper(hashfile:str,format:str,wordlist:str="/usr/share/wordlists/rockyou.txt"): return run_command(["john",f"--format={format}",hashfile,f"--wordlist={wordlist}"])
  • MCP tool registration decorator for 'john_the_ripper', specifying the tool name and description.
    @mcp.tool(name="john_the_ripper",description="cracking hashes using john based on format and a wordlist")

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/YoussefSahnoun/PentestMCP'

If you have feedback or need assistance with the MCP directory API, please join our Discord server