hashCrack is a user-friendly Python wrapper for Hashcat that simplifies password cracking tasks. With support for various attack methods and an intuitive menu interface, it streamlines the process while ensuring compliance with legal standards. Ideal for penetration testing in authorized environments.
hashCrack is an innovative Python-based wrapper for Hashcat, designed to streamline the password cracking process with a user-friendly interface. This powerful tool allows users to utilize various attack methodologies, including wordlists, rules, brute-force, and hybrid attacks, all accessible via an intuitive guided menu system.
With hashCrack, you can easily manage your password cracking tasks using different modes, making it suitable for penetration testing and security assessments in authorized environments.
Key Features
- Multiple Attack Modes: Leverage several strategies including wordlists, rules, brute-force, and hybrid methods.
- Interactive Menu: Navigate through a simple and clear interface for selecting and customizing cracking options.
- Session Restoration: Resume interrupted sessions without losing progress, improving efficiency during lengthy cracking endeavors.
- Cross-Platform Compatibility: Works seamlessly across both Linux and Windows operating systems, enhancing accessibility for users.
Attack Modes Supported
hashCrack supports an extensive list of attack modes:
# | Mode | Description |
---|---|---|
0 | Straight | Directly uses a wordlist for password attempts. |
1 | Combination | Merges two dictionaries to create potential passwords. |
3 | Brute-force | Tests every conceivable password combination within a specified character set. |
6 | Hybrid Wordlist + Mask | Combines a wordlist with a mask to generate diverse variations. |
7 | Hybrid Mask + Wordlist | Utilizes a mask alongside a wordlist to craft candidate passwords. |
9 | Association | Tailored for particular hash types that incorporate known data with brute-force approaches. |
Menu Options
The main menu simplifies access to various cracking techniques:
Option | Description | Script |
---|---|---|
1 (Mode 0) | Crack with Wordlist | Executes wordlist-based cracking |
2 (Mode 9) | Crack with Rules | Executes rule-based cracking |
3 (Mode 3) | Crack with Brute-Force | Executes brute-force cracking |
4 (Mode 6) | Crack with Combinator | Executes hybrid wordlist + mask cracking |
0 | Clear Hashcat Potfile | Resets previous hash results |
X | Switch Current OS Menu | Refreshes menu options based on the OS |
Q | Quit | Exits the tool |
Example Commands
To illustrate the capabilities of hashCrack, here are a few example commands:
hashcat -a 0 -m 400 example400.hash example.dict # Wordlist
hashcat -a 0 -m 0 example0.hash example.dict -r best64.rule # Wordlist + Rules
hashcat -a 3 -m 0 example0.hash ?a?a?a?a?a?a # Brute-Force
hashcat -a 1 -m 0 example0.hash example.dict example.dict # Combination
hashcat -a 9 -m 500 example500.hash 1word.dict -r best64.rule # Association
Disclaimer
hashCrack is provided "as-is" and is intended solely for authorized penetration testing. Users are advised to obtain proper authorization before executing any security evaluations and to comply fully with all applicable laws.
No comments yet.
Sign in to be the first to comment.