Caution
This tool is strictly for authorized security testing and educational purposes. Always obtain explicit permission before conducting any network assessments.
-
๐ Multiple Attack Modes
- Wordlist attacks
- Rule-based cracking
- Brute-force strategies
- Hybrid attack combinations
-
๐ฅ๏ธ Cross-Platform Compatibility
- Optimized for Linux environments
- Experimental Windows support via WSL
-
๐ Intelligent Interface
- Interactive menu system
- Session restoration
- Comprehensive logging
- Distributions:
- Kali Linux
- Ubuntu
- Debian
- Fedora
- Arch Linux
- Current Status: Experimental
- Recommended Approach:
- Use Windows Subsystem for Linux (WSL)
- Prefer native Linux installation
Warning
Windows support is not fully tested. Strong recommendation to use WSL or a Linux environment for optimal performance.
# Kali/Debian/Ubuntu
sudo apt update && sudo apt install hashcat python3 python3-pip python3-termcolor pipx
# Fedora
sudo dnf install hashcat python3 python3-pip python3-termcolor python3-pipx
# Arch Linux/Manjaro
sudo pacman -S hashcat python python-pip python-termcolor python-pipx- Install Windows Subsystem for Linux (WSL)
- Follow Linux installation instructions within WSL
pipx install hashcrack-toolImportant
Ensure ~/.local/bin is in your PATH variable.
# Run hashCrack with hash file
hashcrack hashfilepipx upgrade hashcrack-toolgit clone https://github.com/ente0/hashcat-defaults
hashcrack_demo.mp4
Tip
Cracking results are automatically stored in ~/.hashCrack/logs/session/status.txt
| Option | Description | Function |
|---|---|---|
| 1 (Mode 0) | Wordlist Crack | Dictionary-based attack |
| 2 (Mode 9) | Rule-based Crack | Advanced dictionary mutations |
| 3 (Mode 3) | Brute-Force Crack | Exhaustive password generation |
| 4 (Mode 6) | Hybrid Crack | Wordlist + mask attack |
| 0 | Clear Potfile | Reset previous cracking results |
| X | OS Menu Switch | Update OS-specific settings |
| Q | Quit | Exit the program |
# Wordlist Attack
hashcat -a 0 -m 400 example400.hash example.dict
# Wordlist with Rules
hashcat -a 0 -m 0 example0.hash example.dict -r best64.rule
# Brute-Force
hashcat -a 3 -m 0 example0.hash ?a?a?a?a?a?a
# Combination Attack
hashcat -a 1 -m 0 example0.hash example.dict example.dict- ๐ SecLists
- ๐ WPA2 Wordlists
- ๐ฎ๐น Parole Italiane
- ๐ง Hashcat Defaults
- ๐ Hashcat Rules
Licensed under the project's original license. See LICENSE file for details.
- ๐ Report Issues
- ๐ง Contact: enteo.dev@protonmail.com
Important
Always use these resources and tools responsibly and ethically. Respect legal and privacy boundaries.
