hashcat | World's fastest and most advanced password recovery utility | GPU library

 by   hashcat C Version: v6.2.6 License: No License

kandi X-RAY | hashcat Summary

kandi X-RAY | hashcat Summary

hashcat is a C library typically used in Hardware, GPU applications. hashcat has no bugs, it has no vulnerabilities and it has medium support. You can download it from GitHub.

hashcat is the world's fastest and most advanced password recovery utility, supporting five unique modes of attack for over 300 highly-optimized hashing algorithms. hashcat currently supports CPUs, GPUs, and other hardware accelerators on Linux, Windows, and macOS, and has facilities to help enable distributed password cracking.

            kandi-support Support

              hashcat has a medium active ecosystem.
              It has 17526 star(s) with 2575 fork(s). There are 500 watchers for this library.
              It had no major release in the last 12 months.
              There are 206 open issues and 1678 have been closed. On average issues are closed in 301 days. There are 16 open pull requests and 0 closed requests.
              It has a neutral sentiment in the developer community.
              The latest version of hashcat is v6.2.6

            kandi-Quality Quality

              hashcat has 0 bugs and 0 code smells.

            kandi-Security Security

              hashcat has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
              hashcat code analysis shows 0 unresolved vulnerabilities.
              There are 0 security hotspots that need review.

            kandi-License License

              hashcat does not have a standard license declared.
              Check the repository for any license declaration and review the terms closely.
              Without a license, all rights are reserved, and you cannot use the library in your applications.

            kandi-Reuse Reuse

              hashcat releases are available to install and integrate.
              Installation instructions, examples and code snippets are available.
              It has 1005 lines of code, 15 functions and 17 files.
              It has high code complexity. Code complexity directly impacts maintainability of the code.

            Top functions reviewed by kandi - BETA

            kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
            Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of hashcat
            Get all kandi verified functions for this library.

            hashcat Key Features

            No Key Features are available at this moment for hashcat.

            hashcat Examples and Code Snippets

            No Code Snippets are available at this moment for hashcat.

            Community Discussions


            How to allow user www-data use sudo commands without password
            Asked 2022-Feb-11 at 03:32

            I want to allow run specify command on my website, through PHP exec() function, so i found the way, to add www-data in sudoers.d files to allow run specify commands without asking password.

            I tried next things:

            1. check where is program catalogue whereis hashcat -> hashcat: /usr/bin/hashcat
            2. Add a new file to sudo visudo /etc/sudoers.d/www-data and add next line www-data ALL=(www-data:www-data)NOPASSWD: /user/bin/hashcat
            3. Try to run it through www-data: sudo -u www-data sudo hashcat And then i get this: [sudo] password for www-data:, that means it doesn't seems to work

            What can i do wrong, and what i should do then? And is my decision to do so correct? Is there a better and safer solution?



            Answered 2022-Feb-11 at 03:32

            That problem is solved, by removing the (www-data:www-data) so my "www-data: file in sudoers.d looks like: www-data ALL=NOPASSWD: /usr/bin/hashcat Thanks all for answering and give me a hint to solve this! Especially thanks to @cyberbrain for my carelessness!

            Source https://stackoverflow.com/questions/70882991


            Cracking passwords with DES algorithm given hash and salt
            Asked 2020-Nov-22 at 11:02

            I am given a hash ("1u9Tc6HX") and the salt ("Ff"), and I am told to crack the password knowing that it has been hashed with DES algorithm. Using hashcat, I have known that the password is ("michael") and I am now trying to hash this password in order to compare it with the hash given. However, I have tried using (openssl enc) command but it always asks me for the password used for encryption, what I am not given, so I don't know how to hash ("michael") using DES and salt ("Ff") and get ("1u9Tc6HX"). I am open to change the procedure and try other things in case you think is easier to crack by other way. (I am working with python) Any comment and help is appreciated.

            Pd: Example: Ff1u9Tc6HXxJo Enunciate: The password has been hashed using the DES algorithm. The entry consists in 13 printable ASCII characters, where the two first characters represent the salt. With DES, only the first 8 characters of the password are used.



            Answered 2020-Nov-22 at 11:02

            Passlib is a popular library for password hashing:

            Source https://stackoverflow.com/questions/64953095


            Generate a public key from a private key with OpenCL for secp256k1
            Asked 2020-Nov-20 at 19:50

            I'ld like to calculate a public key from a private key. It must work using OpenCL. It seems hashcat has a nice library but I'm not sure how to use it.

            Other libararies are also possible. secp256k1-cl seems to be very difficult to use https://github.com/hhanh00/secp256k1-cl/blob/master/secp256k1.cl

            See below an example of how it might work based on inc_ecc_secp256k1.cl.

            Should I use parse_public on the known base point G to get the coordinates in a secp256k1_t object? Afterwards use point_mul with my random secret passed via k and the base point G passed via basepoint_precalculated to get the pubkey in r?



            Answered 2020-Nov-20 at 19:50

            I've found a working solution

            Source https://stackoverflow.com/questions/64864778


            Hashcat doesn't recover passwords, though they are present in the dict
            Asked 2020-Nov-18 at 18:43

            I'm trying to do to a test launch of hashcat with these two passwords:



            Answered 2020-Nov-18 at 18:43

            Try echo -n instead of echo otherwise your password will include a trailling \n (newline character), which Hashcat will not try to match.

            Source https://stackoverflow.com/questions/64891621


            Output progress over time in hashcat
            Asked 2020-Apr-14 at 00:15

            I am analysing the amount of hashes cracked over a set period of time. I am looking to save the current status of the crack every 10 seconds.


            Recovered........: 132659/296112 (44.80%) Digests, 0/1 (0.00%) Salts Recovered/Time...: CUR:3636,N/A,N/A AVG:141703,8502198,204052756 (Min,Hour,Day) Progress.........: 15287255040/768199139595 (1.99%)


            I want these 3 lines of the status saved every 10 seconds or so. Is it possible to do this within hashcat or will I need to make a separate script in python?



            Answered 2020-Apr-13 at 22:56
            Getting the status every 10 seconds

            You can enable printing the status with --status and you can set the status to prints every X seconds with --status-timer X. You can see these command line arguments on the hashcat options wiki page, or hashcat --help.

            Example: hashcat -a 0 -m 0 example.hash example.dict --status --status-timer 10

            Saving all the statuses

            I'm assuming that you just want to save everything that gets printed by hashcat while it's running. An easy way to do this is just copy everything from stdout into a file. This is a popular s/o question, so we'll just use this answer.

            To be safe, let's use -a which appends to the file, so we don't accidentally overwrite previous runs. All we need to do is put | tee -a file.txt after our hashcat call.


            Give this a shot, it should save all the statuses (and everything else from stdout) to output.txt:

            Source https://stackoverflow.com/questions/61196480


            hashcat - toggle-case dictionary attack (case sensitive)
            Asked 2020-Mar-28 at 07:31

            I'm new to computer security but I'm trying the same to make a toggle case attack starting from a dictionary password.

            I read there that it's possible to alternate uppercase and lower case word starting from a dictionary to have all combinations (case sensitive).

            I don't know what command to use and 4 now I'm stopped on standard dictionary attack



            Answered 2020-Mar-28 at 07:31
            Short answer:

            Download toggle5.rule from the Hashcat repo on Github and try running this:

            Source https://stackoverflow.com/questions/60860764

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network


            No vulnerabilities reported

            Install hashcat

            Download the latest release and unpack it in the desired location. Please remember to use 7z x when unpacking the archive from the command line to ensure full file paths remain intact.


            Contributions are welcome and encouraged, provided your code is of sufficient quality. Before submitting a pull request, please ensure your code adheres to the following requirements:.
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries

            Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link