hashcat
TLDR
Run a dictionary attack on MD5 hashes
SYNOPSIS
hashcat [options] hashfile [dictionary|mask]
hashcat -m hashtype -a attackmode [options] hashfile wordlist
DESCRIPTION
hashcat is a high-performance password recovery tool that uses CPU, GPU, and other hardware accelerators to crack hashed passwords. It supports over 300 hash types including MD5, SHA-family, bcrypt, WPA, and many application-specific formats.
The tool offers multiple attack modes: dictionary attacks use wordlists, brute-force uses masks to generate candidates, combinator joins words from multiple dictionaries, and hybrid modes combine approaches. Rules can transform dictionary words to match common password patterns.
Hashcat maintains a potfile storing cracked hashes to avoid redundant work. Sessions can be paused and restored. The tool automatically optimizes for available hardware and supports distributed cracking across multiple machines.
PARAMETERS
-m, --hash-type NUM
Hash type (0=MD5, 1000=NTLM, 1400=SHA256, 1800=SHA512crypt, 3200=bcrypt)-a, --attack-mode NUM
Attack mode (0=dictionary, 1=combinator, 3=brute-force, 6=hybrid, 7=hybrid)-o, --outfile FILE
Output file for recovered passwords-r, --rules-file FILE
Rule file for word mangling-D, --opencl-device-types NUM
Device types (1=CPU, 2=GPU, 3=FPGA)-w, --workload-profile NUM
Workload profile (1=low, 2=default, 3=high, 4=nightmare)-b, --benchmark
Run benchmark on all hash types--show
Show cracked passwords from potfile--remove
Remove hashes from file once cracked--restore
Restore previous session--session NAME
Name session for restore capability--status
Enable automatic status updates--runtime SECS
Abort after specified seconds-1, -2, -3, -4
Define custom character sets for masks-i, --increment
Enable mask increment mode--increment-min NUM
Start mask length for increment--increment-max NUM
Stop mask length for increment-h, --help
Show help message-V, --version
Show version
MASK CHARSETS
?l
Lowercase letters (a-z)?u
Uppercase letters (A-Z)?d
Digits (0-9)?s
Special characters?a
All printable characters (?l?u?d?s)?b
Binary (0x00-0xff)
CAVEATS
Password cracking is CPU/GPU intensive and generates significant heat. Only use on systems you own or have explicit authorization to test. Large wordlists and complex attacks may run for days or weeks. GPU drivers must be properly installed for hardware acceleration. Some hash types (bcrypt, scrypt) are intentionally slow to crack.
HISTORY
Hashcat was created by Jens Steube (atom) with the first version released in 2009. Originally closed-source, it became open-source in December 2015. The project evolved from CPU-only (hashcat-legacy) to GPU-accelerated (oclHashcat) and eventually unified as hashcat supporting multiple platforms. It became the world's fastest password recovery tool, pioneering techniques like rule-based attacks and optimized GPU kernels.
SEE ALSO
john(1), hydra(1), ophcrack(1), aircrack-ng(1)


