-
Notifications
You must be signed in to change notification settings - Fork 0
Home
github-actions[bot] edited this page Aug 28, 2025
·
4 revisions
A modern, declarative and compositional password pattern engine for building targeted wordlists.
HashSmith lets you build password patterns using simple composition operators:
from hashsmith.patterns import P, Transform
# Generate: word + number + optional symbol
pattern = (
P(["admin", "user"]).expand(Transform.CAPITALIZE) &
P(["123", "456"]) &
P(["", "!", "$"])
)For API documentation, examples, and development guides, see the main repository's /docs directory.
This wiki is automatically synced by .github/workflows/sync-wiki.yml
Install from PyPI:
pip install hashsmithPyPI page: pypi.org/project/hashsmith
HashSmith ships with a lightweight Hashcat orchestrator to help you run attacks using the wordlists you generate.
from hashsmith.core import HashcatRunner
# Point to your hashcat binary
runner = HashcatRunner("/usr/bin/hashcat")
# Example: show cracked passwords for a previous run
runner.run([
"/usr/bin/hashcat",
"--session", "my_session",
"-m", "0", # MD5
"-a", "0", # straight/dictionary
"hashes.txt",
"custom_wordlist.txt",
])See README.md for a full example integrating DictionaryAttack and HashcatRunner.