Pentest MCP

by DMontgomery40
Verified

runJohnTheRipper

Crack password hashes using John the Ripper directly within Pentest MCP. Input hash data and customize options to uncover weak password vulnerabilities during penetration testing.

Input Schema

NameRequiredDescriptionDefault
hashDataYesString containing the password hashes, one per line.
optionsNoArray of command-line options for JtR.

Input Schema (JSON Schema)

{ "$schema": "http://json-schema.org/draft-07/schema#", "additionalProperties": false, "properties": { "hashData": { "description": "String containing the password hashes, one per line.", "type": "string" }, "options": { "description": "Array of command-line options for JtR.", "items": { "type": "string" }, "type": "array" } }, "required": [ "hashData" ], "type": "object" }

You must be authenticated.

Other Tools from Pentest MCP

Related Tools

ID: pfpsbxlin9