Caution
This tool is strictly for authorized security testing and educational purposes. Always obtain explicit permission before conducting any network assessments.
-
๐ Multiple Attack Modes
- Wordlist attacks
- Rule-based cracking
- Brute-force strategies
- Hybrid attack combinations
-
๐ฅ๏ธ Cross-Platform Compatibility
- Optimized for Linux environments
- Experimental Windows support via WSL
-
๐ Intelligent Interface
- Interactive menu system
- Session restoration
- Comprehensive logging
- Distributions:
- Kali Linux
- Ubuntu
- Debian
- Fedora
- Arch Linux
- Current Status: Experimental
- Recommended Approach:
- Use Windows Subsystem for Linux (WSL)
- Prefer native Linux installation
Warning
Windows support is not fully tested. Strong recommendation to use WSL or a Linux environment for optimal performance.
# Kali/Debian/Ubuntu
sudo apt update && sudo apt install hashcat python3 python3-pip python3-termcolor pipx
# Fedora
sudo dnf install hashcat python3 python3-pip python3-termcolor python3-pipx
# Arch Linux/Manjaro
sudo pacman -S hashcat python python-pip python-termcolor python-pipx
- Install Windows Subsystem for Linux (WSL)
- Follow Linux installation instructions within WSL
pipx install hashcrack-tool
Important
Ensure ~/.local/bin
is in your PATH variable.
# Run hashCrack with hash file
hashcrack hashfile
pipx upgrade hashcrack-tool
git clone https://github.com/ente0/hashcat-defaults
hashcrack_demo.mp4
Tip
Cracking results are automatically stored in ~/.hashCrack/logs/session/status.txt
Option | Description | Function |
---|---|---|
1 (Mode 0) | Wordlist Crack | Dictionary-based attack |
2 (Mode 9) | Rule-based Crack | Advanced dictionary mutations |
3 (Mode 3) | Brute-Force Crack | Exhaustive password generation |
4 (Mode 6) | Hybrid Crack | Wordlist + mask attack |
0 | Clear Potfile | Reset previous cracking results |
X | OS Menu Switch | Update OS-specific settings |
Q | Quit | Exit the program |
# Wordlist Attack
hashcat -a 0 -m 400 example400.hash example.dict
# Wordlist with Rules
hashcat -a 0 -m 0 example0.hash example.dict -r best64.rule
# Brute-Force
hashcat -a 3 -m 0 example0.hash ?a?a?a?a?a?a
# Combination Attack
hashcat -a 1 -m 0 example0.hash example.dict example.dict
- ๐ SecLists
- ๐ WPA2 Wordlists
- ๐ฎ๐น Parole Italiane
- ๐ง Hashcat Defaults
- ๐ Hashcat Rules
Licensed under the project's original license. See LICENSE file for details.
- ๐ Report Issues
- ๐ง Contact: [email protected]
Important
Always use these resources and tools responsibly and ethically. Respect legal and privacy boundaries.