Skip to main content
Glama

Hashcat MCP Server 🔥

Hashcat MCP Python Claude Desktop AI Powered License

A powerful Model Context Protocol (MCP) server that provides intelligent hashcat integration for Claude Desktop. Crack hashes, analyze passwords, and perform security assessments directly from your Claude conversations.

✨ Features

  • Smart Hash Identification - Automatically detect hash types with confidence scoring

  • Multiple Attack Modes - Dictionary, brute-force, hybrid, and rule-based attacks

  • Batch Processing - Crack multiple hashes simultaneously

  • Session Management - Track and monitor cracking progress

  • GPU Monitoring - Real-time hardware performance metrics

  • Password Analysis - Analyze cracked passwords for security insights

  • Auto Attack Strategies - Intelligent attack sequence selection

  • Security Hardened - Input validation and injection protection

Related MCP server: MCP Memory Server

🎬 Demo

Hashcat MCP Server Demo

Watch the Hashcat MCP Server in action - from hash identification to successful cracking!

🛡️ RootSec Community

Join our cybersecurity community for the latest in offensive security, AI integration, and advanced penetration testing techniques:

🔗

RootSec is a community of security professionals, researchers, and enthusiasts sharing knowledge about:

  • Advanced penetration testing techniques

  • AI-powered security tools

  • Red team methodologies

  • Security research and development

  • Industry insights and discussions

🚀 Quick Start

1. Install Dependencies

pip install -r requirements.txt

2. Configure Claude Desktop

Edit your Claude Desktop config file:

Windows: %APPDATA%\Claude\claude_desktop_config.json Mac: ~/Library/Application Support/Claude/claude_desktop_config.json

{ "mcpServers": { "Hashcat-MCP": { "command": "python", "args": [ "C:\\path\\to\\your\\hashcat_mcp_server.py" ], "env": { "HASHCAT_PATH": "C:\\path\\to\\hashcat\\hashcat.exe", "HASHCAT_SAFE_DIRS": "C:\\wordlists" } } } }

Important: Update the paths to match your system:

  • args[0] - Path to your hashcat_mcp_server.py file

  • HASHCAT_PATH - Path to your hashcat executable

  • HASHCAT_SAFE_DIRS - Comma-separated list of safe directories for wordlists

3. Restart Claude Desktop

Close and reopen Claude Desktop to load the MCP server.

🔧 Configuration

Required Environment Variables

  • HASHCAT_PATH - Path to hashcat executable (required)

Optional Environment Variables

  • HASHCAT_SAFE_DIRS - Safe directories for wordlists (recommended)

  • HASHCAT_LOG_LEVEL - Logging level: DEBUG, INFO, WARNING, ERROR (default: DEBUG)

📖 Usage Examples

Basic Hash Identification

Can you identify this hash: 5d41402abc4b2a76b9719d911017c592

Crack a Hash

Crack this NTLM hash: 76268997E3979AFB37AC1C653E3ABBDD Use wordlist: C:\wordlists\rockyou.txt

Auto Attack Strategy

Run an automatic attack on this hash: 098f6bcd4621d373cade4e832627b4f6 Give it 30 minutes to try different strategies

Batch Processing

Crack these hashes: - 5d41402abc4b2a76b9719d911017c592 - 098f6bcd4621d373cade4e832627b4f6 - 76268997E3979AFB37AC1C653E3ABBDD

📊 Supported Hash Types

The server supports 400+ hash types including:

  • Raw Hashes: MD5, SHA1, SHA256, SHA512

  • Operating Systems: NTLM, bcrypt, sha512crypt, md5crypt

  • Network Protocols: WPA/WPA2, Kerberos

  • Applications: MySQL, PostgreSQL, Oracle

  • And many more...

🔍 Available Functions

  • smart_identify_hash() - Enhanced hash identification

  • crack_hash() - Crack single hash with various attack modes

  • crack_multiple_hashes() - Batch hash cracking

  • auto_attack_strategy() - Intelligent automated attacks

  • benchmark_hashcat() - Performance benchmarking

  • get_gpu_status() - Hardware monitoring

  • analyze_cracked_passwords() - Password security analysis

  • generate_smart_masks() - Intelligent brute-force patterns

  • estimate_crack_time() - Time estimation for attacks

⚠️ Disclaimer

This tool is for educational and authorized security testing purposes only. Always ensure you have proper authorization before testing any systems or hashes that don't belong to you.

📄 License

This project is licensed under the MIT License - see the LICENSE file for details.


Happy Hashing! 🔓

-
security - not tested
F
license - not found
-
quality - not tested

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/MorDavid/Hashcat-MCP'

If you have feedback or need assistance with the MCP directory API, please join our Discord server