Supports cracking MySQL database password hashes
Supports cracking PostgreSQL database password hashes
Uses Python 3.8+ as the implementation language for the MCP server
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@Hashcat MCP Serveridentify this hash: 5d41402abc4b2a76b9719d911017c592"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
Hashcat MCP Server 🔥
A powerful Model Context Protocol (MCP) server that provides intelligent hashcat integration for Claude Desktop. Crack hashes, analyze passwords, and perform security assessments directly from your Claude conversations.
✨ Features
Smart Hash Identification - Automatically detect hash types with confidence scoring
Multiple Attack Modes - Dictionary, brute-force, hybrid, and rule-based attacks
Batch Processing - Crack multiple hashes simultaneously
Session Management - Track and monitor cracking progress
GPU Monitoring - Real-time hardware performance metrics
Password Analysis - Analyze cracked passwords for security insights
Auto Attack Strategies - Intelligent attack sequence selection
Security Hardened - Input validation and injection protection
Related MCP server: MCP Memory Server
🎬 Demo

Watch the Hashcat MCP Server in action - from hash identification to successful cracking!
🛡️ RootSec Community
Join our cybersecurity community for the latest in offensive security, AI integration, and advanced penetration testing techniques:
RootSec is a community of security professionals, researchers, and enthusiasts sharing knowledge about:
Advanced penetration testing techniques
AI-powered security tools
Red team methodologies
Security research and development
Industry insights and discussions
🚀 Quick Start
1. Install Dependencies
pip install -r requirements.txt2. Configure Claude Desktop
Edit your Claude Desktop config file:
Windows: %APPDATA%\Claude\claude_desktop_config.json
Mac: ~/Library/Application Support/Claude/claude_desktop_config.json
{
"mcpServers": {
"Hashcat-MCP": {
"command": "python",
"args": [
"C:\\path\\to\\your\\hashcat_mcp_server.py"
],
"env": {
"HASHCAT_PATH": "C:\\path\\to\\hashcat\\hashcat.exe",
"HASHCAT_SAFE_DIRS": "C:\\wordlists"
}
}
}
}Important: Update the paths to match your system:
args[0]- Path to yourhashcat_mcp_server.pyfileHASHCAT_PATH- Path to your hashcat executableHASHCAT_SAFE_DIRS- Comma-separated list of safe directories for wordlists
3. Restart Claude Desktop
Close and reopen Claude Desktop to load the MCP server.
🔧 Configuration
Required Environment Variables
HASHCAT_PATH- Path to hashcat executable (required)
Optional Environment Variables
HASHCAT_SAFE_DIRS- Safe directories for wordlists (recommended)HASHCAT_LOG_LEVEL- Logging level: DEBUG, INFO, WARNING, ERROR (default: DEBUG)
📖 Usage Examples
Basic Hash Identification
Can you identify this hash: 5d41402abc4b2a76b9719d911017c592Crack a Hash
Crack this NTLM hash: 76268997E3979AFB37AC1C653E3ABBDD
Use wordlist: C:\wordlists\rockyou.txtAuto Attack Strategy
Run an automatic attack on this hash: 098f6bcd4621d373cade4e832627b4f6
Give it 30 minutes to try different strategiesBatch Processing
Crack these hashes:
- 5d41402abc4b2a76b9719d911017c592
- 098f6bcd4621d373cade4e832627b4f6
- 76268997E3979AFB37AC1C653E3ABBDD📊 Supported Hash Types
The server supports 400+ hash types including:
Raw Hashes: MD5, SHA1, SHA256, SHA512
Operating Systems: NTLM, bcrypt, sha512crypt, md5crypt
Network Protocols: WPA/WPA2, Kerberos
Applications: MySQL, PostgreSQL, Oracle
And many more...
🔍 Available Functions
smart_identify_hash()- Enhanced hash identificationcrack_hash()- Crack single hash with various attack modescrack_multiple_hashes()- Batch hash crackingauto_attack_strategy()- Intelligent automated attacksbenchmark_hashcat()- Performance benchmarkingget_gpu_status()- Hardware monitoringanalyze_cracked_passwords()- Password security analysisgenerate_smart_masks()- Intelligent brute-force patternsestimate_crack_time()- Time estimation for attacks
⚠️ Disclaimer
This tool is for educational and authorized security testing purposes only. Always ensure you have proper authorization before testing any systems or hashes that don't belong to you.
📄 License
This project is licensed under the MIT License - see the LICENSE file for details.
Happy Hashing! 🔓
This server cannot be installed
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.