JUHE API Marketplace
MorDavid avatar
MCP Server

Hashcat MCP Server

A Model Context Protocol server that provides intelligent hashcat integration for Claude Desktop, allowing users to crack hashes, analyze passwords, and perform security assessments directly from Claude conversations.

13
GitHub Stars
10/7/2025
Last Updated
MCP Server Configuration
1{
2 "name": "Hashcat-MCP",
3 "command": "python",
4 "args": [
5 "C:\\path\\to\\your\\hashcat_mcp_server.py"
6 ],
7 "env": {
8 "HASHCAT_PATH": "C:\\path\\to\\hashcat\\hashcat.exe",
9 "HASHCAT_SAFE_DIRS": "C:\\wordlists"
10 }
11}
JSON11 lines

README Documentation

Hashcat MCP Server 🔥

A powerful Model Context Protocol (MCP) server that provides intelligent hashcat integration for Claude Desktop. Crack hashes, analyze passwords, and perform security assessments directly from your Claude conversations.

✨ Features

  • Smart Hash Identification - Automatically detect hash types with confidence scoring
  • Multiple Attack Modes - Dictionary, brute-force, hybrid, and rule-based attacks
  • Batch Processing - Crack multiple hashes simultaneously
  • Session Management - Track and monitor cracking progress
  • GPU Monitoring - Real-time hardware performance metrics
  • Password Analysis - Analyze cracked passwords for security insights
  • Auto Attack Strategies - Intelligent attack sequence selection
  • Security Hardened - Input validation and injection protection

🎬 Demo

Hashcat MCP Server Demo

Watch the Hashcat MCP Server in action - from hash identification to successful cracking!

🛡️ RootSec Community

Join our cybersecurity community for the latest in offensive security, AI integration, and advanced penetration testing techniques:

🔗 t.me/root_sec

RootSec is a community of security professionals, researchers, and enthusiasts sharing knowledge about:

  • Advanced penetration testing techniques
  • AI-powered security tools
  • Red team methodologies
  • Security research and development
  • Industry insights and discussions

🚀 Quick Start

1. Install Dependencies

pip install -r requirements.txt

2. Configure Claude Desktop

Edit your Claude Desktop config file:

Windows: %APPDATA%\Claude\claude_desktop_config.json Mac: ~/Library/Application Support/Claude/claude_desktop_config.json

{
    "mcpServers": {
        "Hashcat-MCP": {
            "command": "python",
            "args": [
                "C:\\path\\to\\your\\hashcat_mcp_server.py"
            ],
            "env": {
                "HASHCAT_PATH": "C:\\path\\to\\hashcat\\hashcat.exe",
                "HASHCAT_SAFE_DIRS": "C:\\wordlists"
            }
        }
    }
}

Important: Update the paths to match your system:

  • args[0] - Path to your hashcat_mcp_server.py file
  • HASHCAT_PATH - Path to your hashcat executable
  • HASHCAT_SAFE_DIRS - Comma-separated list of safe directories for wordlists

3. Restart Claude Desktop

Close and reopen Claude Desktop to load the MCP server.

🔧 Configuration

Required Environment Variables

  • HASHCAT_PATH - Path to hashcat executable (required)

Optional Environment Variables

  • HASHCAT_SAFE_DIRS - Safe directories for wordlists (recommended)
  • HASHCAT_LOG_LEVEL - Logging level: DEBUG, INFO, WARNING, ERROR (default: DEBUG)

📖 Usage Examples

Basic Hash Identification

Can you identify this hash: 5d41402abc4b2a76b9719d911017c592

Crack a Hash

Crack this NTLM hash: 76268997E3979AFB37AC1C653E3ABBDD
Use wordlist: C:\wordlists\rockyou.txt

Auto Attack Strategy

Run an automatic attack on this hash: 098f6bcd4621d373cade4e832627b4f6
Give it 30 minutes to try different strategies

Batch Processing

Crack these hashes:
- 5d41402abc4b2a76b9719d911017c592
- 098f6bcd4621d373cade4e832627b4f6
- 76268997E3979AFB37AC1C653E3ABBDD

📊 Supported Hash Types

The server supports 400+ hash types including:

  • Raw Hashes: MD5, SHA1, SHA256, SHA512
  • Operating Systems: NTLM, bcrypt, sha512crypt, md5crypt
  • Network Protocols: WPA/WPA2, Kerberos
  • Applications: MySQL, PostgreSQL, Oracle
  • And many more...

🔍 Available Functions

  • smart_identify_hash() - Enhanced hash identification
  • crack_hash() - Crack single hash with various attack modes
  • crack_multiple_hashes() - Batch hash cracking
  • auto_attack_strategy() - Intelligent automated attacks
  • benchmark_hashcat() - Performance benchmarking
  • get_gpu_status() - Hardware monitoring
  • analyze_cracked_passwords() - Password security analysis
  • generate_smart_masks() - Intelligent brute-force patterns
  • estimate_crack_time() - Time estimation for attacks

⚠️ Disclaimer

This tool is for educational and authorized security testing purposes only. Always ensure you have proper authorization before testing any systems or hashes that don't belong to you.

📄 License

This project is licensed under the MIT License - see the LICENSE file for details.


Happy Hashing! 🔓

Quick Install

Quick Actions

Key Features

Model Context Protocol
Secure Communication
Real-time Updates
Open Source

Boost your projects with Wisdom Gate LLM API

Supporting GPT-5, Claude-4, DeepSeek v3, Gemini and more.

Enjoy a free trial and save 20%+ compared to official pricing.