Hashcat MCP Server

Hashcat MCP Server

A Model Context Protocol server that provides intelligent hashcat integration for Claude Desktop, allowing users to crack hashes, analyze passwords, and perform security assessments directly from Claude conversations.

Category
Visit Server

README

Hashcat MCP Server 🔥

Hashcat MCP Python Claude Desktop AI Powered License

A powerful Model Context Protocol (MCP) server that provides intelligent hashcat integration for Claude Desktop. Crack hashes, analyze passwords, and perform security assessments directly from your Claude conversations.

✨ Features

  • Smart Hash Identification - Automatically detect hash types with confidence scoring
  • Multiple Attack Modes - Dictionary, brute-force, hybrid, and rule-based attacks
  • Batch Processing - Crack multiple hashes simultaneously
  • Session Management - Track and monitor cracking progress
  • GPU Monitoring - Real-time hardware performance metrics
  • Password Analysis - Analyze cracked passwords for security insights
  • Auto Attack Strategies - Intelligent attack sequence selection
  • Security Hardened - Input validation and injection protection

🎬 Demo

Hashcat MCP Server Demo

Watch the Hashcat MCP Server in action - from hash identification to successful cracking!

🛡️ RootSec Community

Join our cybersecurity community for the latest in offensive security, AI integration, and advanced penetration testing techniques:

🔗 t.me/root_sec

RootSec is a community of security professionals, researchers, and enthusiasts sharing knowledge about:

  • Advanced penetration testing techniques
  • AI-powered security tools
  • Red team methodologies
  • Security research and development
  • Industry insights and discussions

🚀 Quick Start

1. Install Dependencies

pip install -r requirements.txt

2. Configure Claude Desktop

Edit your Claude Desktop config file:

Windows: %APPDATA%\Claude\claude_desktop_config.json Mac: ~/Library/Application Support/Claude/claude_desktop_config.json

{
    "mcpServers": {
        "Hashcat-MCP": {
            "command": "python",
            "args": [
                "C:\\path\\to\\your\\hashcat_mcp_server.py"
            ],
            "env": {
                "HASHCAT_PATH": "C:\\path\\to\\hashcat\\hashcat.exe",
                "HASHCAT_SAFE_DIRS": "C:\\wordlists"
            }
        }
    }
}

Important: Update the paths to match your system:

  • args[0] - Path to your hashcat_mcp_server.py file
  • HASHCAT_PATH - Path to your hashcat executable
  • HASHCAT_SAFE_DIRS - Comma-separated list of safe directories for wordlists

3. Restart Claude Desktop

Close and reopen Claude Desktop to load the MCP server.

🔧 Configuration

Required Environment Variables

  • HASHCAT_PATH - Path to hashcat executable (required)

Optional Environment Variables

  • HASHCAT_SAFE_DIRS - Safe directories for wordlists (recommended)
  • HASHCAT_LOG_LEVEL - Logging level: DEBUG, INFO, WARNING, ERROR (default: DEBUG)

📖 Usage Examples

Basic Hash Identification

Can you identify this hash: 5d41402abc4b2a76b9719d911017c592

Crack a Hash

Crack this NTLM hash: 76268997E3979AFB37AC1C653E3ABBDD
Use wordlist: C:\wordlists\rockyou.txt

Auto Attack Strategy

Run an automatic attack on this hash: 098f6bcd4621d373cade4e832627b4f6
Give it 30 minutes to try different strategies

Batch Processing

Crack these hashes:
- 5d41402abc4b2a76b9719d911017c592
- 098f6bcd4621d373cade4e832627b4f6
- 76268997E3979AFB37AC1C653E3ABBDD

📊 Supported Hash Types

The server supports 400+ hash types including:

  • Raw Hashes: MD5, SHA1, SHA256, SHA512
  • Operating Systems: NTLM, bcrypt, sha512crypt, md5crypt
  • Network Protocols: WPA/WPA2, Kerberos
  • Applications: MySQL, PostgreSQL, Oracle
  • And many more...

🔍 Available Functions

  • smart_identify_hash() - Enhanced hash identification
  • crack_hash() - Crack single hash with various attack modes
  • crack_multiple_hashes() - Batch hash cracking
  • auto_attack_strategy() - Intelligent automated attacks
  • benchmark_hashcat() - Performance benchmarking
  • get_gpu_status() - Hardware monitoring
  • analyze_cracked_passwords() - Password security analysis
  • generate_smart_masks() - Intelligent brute-force patterns
  • estimate_crack_time() - Time estimation for attacks

⚠️ Disclaimer

This tool is for educational and authorized security testing purposes only. Always ensure you have proper authorization before testing any systems or hashes that don't belong to you.

📄 License

This project is licensed under the MIT License - see the LICENSE file for details.


Happy Hashing! 🔓

Recommended Servers

playwright-mcp

playwright-mcp

A Model Context Protocol server that enables LLMs to interact with web pages through structured accessibility snapshots without requiring vision models or screenshots.

Official
Featured
TypeScript
Magic Component Platform (MCP)

Magic Component Platform (MCP)

An AI-powered tool that generates modern UI components from natural language descriptions, integrating with popular IDEs to streamline UI development workflow.

Official
Featured
Local
TypeScript
Audiense Insights MCP Server

Audiense Insights MCP Server

Enables interaction with Audiense Insights accounts via the Model Context Protocol, facilitating the extraction and analysis of marketing insights and audience data including demographics, behavior, and influencer engagement.

Official
Featured
Local
TypeScript
VeyraX MCP

VeyraX MCP

Single MCP tool to connect all your favorite tools: Gmail, Calendar and 40 more.

Official
Featured
Local
graphlit-mcp-server

graphlit-mcp-server

The Model Context Protocol (MCP) Server enables integration between MCP clients and the Graphlit service. Ingest anything from Slack to Gmail to podcast feeds, in addition to web crawling, into a Graphlit project - and then retrieve relevant contents from the MCP client.

Official
Featured
TypeScript
Kagi MCP Server

Kagi MCP Server

An MCP server that integrates Kagi search capabilities with Claude AI, enabling Claude to perform real-time web searches when answering questions that require up-to-date information.

Official
Featured
Python
E2B

E2B

Using MCP to run code via e2b.

Official
Featured
Neon Database

Neon Database

MCP server for interacting with Neon Management API and databases

Official
Featured
Exa Search

Exa Search

A Model Context Protocol (MCP) server lets AI assistants like Claude use the Exa AI Search API for web searches. This setup allows AI models to get real-time web information in a safe and controlled way.

Official
Featured
Qdrant Server

Qdrant Server

This repository is an example of how to create a MCP server for Qdrant, a vector search engine.

Official
Featured