runJohnTheRipper
Crack password hashes using John the Ripper directly within Pentest MCP. Input hash data and customize options to uncover weak password vulnerabilities during penetration testing.
Input Schema
Name | Required | Description | Default |
---|---|---|---|
hashData | Yes | String containing the password hashes, one per line. | |
options | No | Array of command-line options for JtR. |
Input Schema (JSON Schema)
You must be authenticated.
Other Tools from Pentest MCP
Related Tools
- @DMontgomery40/pentest-mcp
- @DMontgomery40/pentest-mcp
- @DMontgomery40/pentest-mcp
- @9olidity/MCP-Server-Pentest
- @1595901624/crypto-mcp