JUHE API Marketplace
MorDavid avatar
MCP Server

Hashcat MCP Server

A Model Context Protocol server that provides intelligent hashcat integration for Claude Desktop, allowing users to crack hashes, analyze passwords, and perform security assessments directly from Claude conversations.

8
GitHub Stars
8/23/2025
Last Updated
MCP Server Configuration
1{
2 "name": "Hashcat-MCP",
3 "command": "python",
4 "args": [
5 "C:\\path\\to\\your\\hashcat_mcp_server.py"
6 ],
7 "env": {
8 "HASHCAT_PATH": "C:\\path\\to\\hashcat\\hashcat.exe",
9 "HASHCAT_SAFE_DIRS": "C:\\wordlists"
10 }
11}
JSON11 lines

README Documentation

Hashcat MCP Server 🔥

A powerful Model Context Protocol (MCP) server that provides intelligent hashcat integration for Claude Desktop. Crack hashes, analyze passwords, and perform security assessments directly from your Claude conversations.

✨ Features

  • Smart Hash Identification - Automatically detect hash types with confidence scoring
  • Multiple Attack Modes - Dictionary, brute-force, hybrid, and rule-based attacks
  • Batch Processing - Crack multiple hashes simultaneously
  • Session Management - Track and monitor cracking progress
  • GPU Monitoring - Real-time hardware performance metrics
  • Password Analysis - Analyze cracked passwords for security insights
  • Auto Attack Strategies - Intelligent attack sequence selection
  • Security Hardened - Input validation and injection protection

🎬 Demo

Hashcat MCP Server Demo

Watch the Hashcat MCP Server in action - from hash identification to successful cracking!

🛡️ RootSec Community

Join our cybersecurity community for the latest in offensive security, AI integration, and advanced penetration testing techniques:

🔗 t.me/root_sec

RootSec is a community of security professionals, researchers, and enthusiasts sharing knowledge about:

  • Advanced penetration testing techniques
  • AI-powered security tools
  • Red team methodologies
  • Security research and development
  • Industry insights and discussions

🚀 Quick Start

1. Install Dependencies

pip install -r requirements.txt

2. Configure Claude Desktop

Edit your Claude Desktop config file:

Windows: %APPDATA%\Claude\claude_desktop_config.json Mac: ~/Library/Application Support/Claude/claude_desktop_config.json

{
    "mcpServers": {
        "Hashcat-MCP": {
            "command": "python",
            "args": [
                "C:\\path\\to\\your\\hashcat_mcp_server.py"
            ],
            "env": {
                "HASHCAT_PATH": "C:\\path\\to\\hashcat\\hashcat.exe",
                "HASHCAT_SAFE_DIRS": "C:\\wordlists"
            }
        }
    }
}

Important: Update the paths to match your system:

  • args[0] - Path to your hashcat_mcp_server.py file
  • HASHCAT_PATH - Path to your hashcat executable
  • HASHCAT_SAFE_DIRS - Comma-separated list of safe directories for wordlists

3. Restart Claude Desktop

Close and reopen Claude Desktop to load the MCP server.

🔧 Configuration

Required Environment Variables

  • HASHCAT_PATH - Path to hashcat executable (required)

Optional Environment Variables

  • HASHCAT_SAFE_DIRS - Safe directories for wordlists (recommended)
  • HASHCAT_LOG_LEVEL - Logging level: DEBUG, INFO, WARNING, ERROR (default: DEBUG)

📖 Usage Examples

Basic Hash Identification

Can you identify this hash: 5d41402abc4b2a76b9719d911017c592

Crack a Hash

Crack this NTLM hash: 76268997E3979AFB37AC1C653E3ABBDD
Use wordlist: C:\wordlists\rockyou.txt

Auto Attack Strategy

Run an automatic attack on this hash: 098f6bcd4621d373cade4e832627b4f6
Give it 30 minutes to try different strategies

Batch Processing

Crack these hashes:
- 5d41402abc4b2a76b9719d911017c592
- 098f6bcd4621d373cade4e832627b4f6
- 76268997E3979AFB37AC1C653E3ABBDD

📊 Supported Hash Types

The server supports 400+ hash types including:

  • Raw Hashes: MD5, SHA1, SHA256, SHA512
  • Operating Systems: NTLM, bcrypt, sha512crypt, md5crypt
  • Network Protocols: WPA/WPA2, Kerberos
  • Applications: MySQL, PostgreSQL, Oracle
  • And many more...

🔍 Available Functions

  • smart_identify_hash() - Enhanced hash identification
  • crack_hash() - Crack single hash with various attack modes
  • crack_multiple_hashes() - Batch hash cracking
  • auto_attack_strategy() - Intelligent automated attacks
  • benchmark_hashcat() - Performance benchmarking
  • get_gpu_status() - Hardware monitoring
  • analyze_cracked_passwords() - Password security analysis
  • generate_smart_masks() - Intelligent brute-force patterns
  • estimate_crack_time() - Time estimation for attacks

⚠️ Disclaimer

This tool is for educational and authorized security testing purposes only. Always ensure you have proper authorization before testing any systems or hashes that don't belong to you.

📄 License

This project is licensed under the MIT License - see the LICENSE file for details.


Happy Hashing! 🔓

Quick Install

Quick Actions

Key Features

Model Context Protocol
Secure Communication
Real-time Updates
Open Source