βββ βββ ββββββ βββββββββββ βββ ββββββββββββββ ββββββ ββββββββββ ββββββββββββββββββ
βββ ββββββββββββββββββββββ ββββββββββββββββββββββββββββββββββββββ ββββββββββββββββββββ
βββββββββββββββββββββββββββββββββββ βββββββββββββββββββ βββββββ ββββββ ββββββββ
βββββββββββββββββββββββββββββββββββ βββββββββββββββββββ βββββββ ββββββ ββββββββ
βββ ββββββ ββββββββββββββ ββββββββββββββ ββββββ ββββββββββββββ ββββββββββββββ βββ
βββ ββββββ ββββββββββββββ βββ ββββββββββ ββββββ βββ ββββββββββ ββββββββββββββ βββMulti-threaded hash cracking tool with dictionary, brute-force, and rule-based mutation attacks.
This is a quick overview β security theory, architecture, and full walkthroughs are in the learn modules.
- Crack MD5, SHA1, SHA256, and SHA512 hashes with auto-detection from hash length
- Dictionary attacks using memory-mapped wordlists for zero-copy large file handling
- Brute-force attacks with configurable character sets and keyspace partitioning
- Rule-based mutations (capitalize, leet speak, digit append, reverse, toggle case)
- Multi-threaded with zero-contention work partitioning across all CPU cores
- Salt support with prepend/append positioning
- Rich terminal progress display with speed, ETA, and progress bar
./install.sh
hashcracker --hash 5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8 \
--wordlist wordlists/10k-most-common.txt
# β CRACKED: passwordTip
This project uses just as a command runner. Type just to see all available commands.
Install: curl -sSf https://just.systems/install.sh | bash -s -- --to ~/.local/bin
Try these β all crack instantly against the included wordlist:
| Hash | Type | Plaintext |
|---|---|---|
5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8 |
SHA256 | password |
8621ffdbc5698829397d97767ac13db3 |
MD5 | dragon |
ed9d3d832af899035363a69fd53cd3be8f71501c |
SHA1 | shadow |
hashcracker --hash 8621ffdbc5698829397d97767ac13db3 --wordlist wordlists/10k-most-common.txt
hashcracker --hash ed9d3d832af899035363a69fd53cd3be8f71501c --wordlist wordlists/10k-most-common.txt --rules
hashcracker --hash 5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8 --bruteforce --charset lower --max-length 8This project includes step-by-step learning materials covering security theory, architecture, and implementation.
| Module | Topic |
|---|---|
| 00 - Overview | Prerequisites and quick start |
| 01 - Concepts | Security theory and real-world breaches |
| 02 - Architecture | System design and data flow |
| 03 - Implementation | Code walkthrough |
| 04 - Challenges | Extension ideas and exercises |
AGPL 3.0