
Hashcat MCP Server
A Model Context Protocol server that provides intelligent hashcat integration for Claude Desktop, allowing users to crack hashes, analyze passwords, and perform security assessments directly from Claude conversations.
README
Hashcat MCP Server 🔥
A powerful Model Context Protocol (MCP) server that provides intelligent hashcat integration for Claude Desktop. Crack hashes, analyze passwords, and perform security assessments directly from your Claude conversations.
✨ Features
- Smart Hash Identification - Automatically detect hash types with confidence scoring
- Multiple Attack Modes - Dictionary, brute-force, hybrid, and rule-based attacks
- Batch Processing - Crack multiple hashes simultaneously
- Session Management - Track and monitor cracking progress
- GPU Monitoring - Real-time hardware performance metrics
- Password Analysis - Analyze cracked passwords for security insights
- Auto Attack Strategies - Intelligent attack sequence selection
- Security Hardened - Input validation and injection protection
🎬 Demo
Watch the Hashcat MCP Server in action - from hash identification to successful cracking!
🛡️ RootSec Community
Join our cybersecurity community for the latest in offensive security, AI integration, and advanced penetration testing techniques:
RootSec is a community of security professionals, researchers, and enthusiasts sharing knowledge about:
- Advanced penetration testing techniques
- AI-powered security tools
- Red team methodologies
- Security research and development
- Industry insights and discussions
🚀 Quick Start
1. Install Dependencies
pip install -r requirements.txt
2. Configure Claude Desktop
Edit your Claude Desktop config file:
Windows: %APPDATA%\Claude\claude_desktop_config.json
Mac: ~/Library/Application Support/Claude/claude_desktop_config.json
{
"mcpServers": {
"Hashcat-MCP": {
"command": "python",
"args": [
"C:\\path\\to\\your\\hashcat_mcp_server.py"
],
"env": {
"HASHCAT_PATH": "C:\\path\\to\\hashcat\\hashcat.exe",
"HASHCAT_SAFE_DIRS": "C:\\wordlists"
}
}
}
}
Important: Update the paths to match your system:
args[0]
- Path to yourhashcat_mcp_server.py
fileHASHCAT_PATH
- Path to your hashcat executableHASHCAT_SAFE_DIRS
- Comma-separated list of safe directories for wordlists
3. Restart Claude Desktop
Close and reopen Claude Desktop to load the MCP server.
🔧 Configuration
Required Environment Variables
HASHCAT_PATH
- Path to hashcat executable (required)
Optional Environment Variables
HASHCAT_SAFE_DIRS
- Safe directories for wordlists (recommended)HASHCAT_LOG_LEVEL
- Logging level: DEBUG, INFO, WARNING, ERROR (default: DEBUG)
📖 Usage Examples
Basic Hash Identification
Can you identify this hash: 5d41402abc4b2a76b9719d911017c592
Crack a Hash
Crack this NTLM hash: 76268997E3979AFB37AC1C653E3ABBDD
Use wordlist: C:\wordlists\rockyou.txt
Auto Attack Strategy
Run an automatic attack on this hash: 098f6bcd4621d373cade4e832627b4f6
Give it 30 minutes to try different strategies
Batch Processing
Crack these hashes:
- 5d41402abc4b2a76b9719d911017c592
- 098f6bcd4621d373cade4e832627b4f6
- 76268997E3979AFB37AC1C653E3ABBDD
📊 Supported Hash Types
The server supports 400+ hash types including:
- Raw Hashes: MD5, SHA1, SHA256, SHA512
- Operating Systems: NTLM, bcrypt, sha512crypt, md5crypt
- Network Protocols: WPA/WPA2, Kerberos
- Applications: MySQL, PostgreSQL, Oracle
- And many more...
🔍 Available Functions
smart_identify_hash()
- Enhanced hash identificationcrack_hash()
- Crack single hash with various attack modescrack_multiple_hashes()
- Batch hash crackingauto_attack_strategy()
- Intelligent automated attacksbenchmark_hashcat()
- Performance benchmarkingget_gpu_status()
- Hardware monitoringanalyze_cracked_passwords()
- Password security analysisgenerate_smart_masks()
- Intelligent brute-force patternsestimate_crack_time()
- Time estimation for attacks
⚠️ Disclaimer
This tool is for educational and authorized security testing purposes only. Always ensure you have proper authorization before testing any systems or hashes that don't belong to you.
📄 License
This project is licensed under the MIT License - see the LICENSE file for details.
Happy Hashing! 🔓
Recommended Servers
playwright-mcp
A Model Context Protocol server that enables LLMs to interact with web pages through structured accessibility snapshots without requiring vision models or screenshots.
Magic Component Platform (MCP)
An AI-powered tool that generates modern UI components from natural language descriptions, integrating with popular IDEs to streamline UI development workflow.
Audiense Insights MCP Server
Enables interaction with Audiense Insights accounts via the Model Context Protocol, facilitating the extraction and analysis of marketing insights and audience data including demographics, behavior, and influencer engagement.

VeyraX MCP
Single MCP tool to connect all your favorite tools: Gmail, Calendar and 40 more.
graphlit-mcp-server
The Model Context Protocol (MCP) Server enables integration between MCP clients and the Graphlit service. Ingest anything from Slack to Gmail to podcast feeds, in addition to web crawling, into a Graphlit project - and then retrieve relevant contents from the MCP client.
Kagi MCP Server
An MCP server that integrates Kagi search capabilities with Claude AI, enabling Claude to perform real-time web searches when answering questions that require up-to-date information.

E2B
Using MCP to run code via e2b.
Neon Database
MCP server for interacting with Neon Management API and databases
Exa Search
A Model Context Protocol (MCP) server lets AI assistants like Claude use the Exa AI Search API for web searches. This setup allows AI models to get real-time web information in a safe and controlled way.
Qdrant Server
This repository is an example of how to create a MCP server for Qdrant, a vector search engine.