All local
Examples:
Results will appear here after analysis.
📁
Click to browse or drag & drop any file
Any file type · Processed entirely in your browser
Hashcat
Dictionary Attack (-a 0)
hashcat -m [MODE] -a 0 hashes.txt rockyou.txt
click to copy
Brute-Force (-a 3)
hashcat -m [MODE] -a 3 hashes.txt ?a?a?a?a?a?a?a?a
click to copy
Rule-Based (-a 0 -r)
hashcat -m [MODE] -a 0 hashes.txt rockyou.txt -r rules/best64.rule
click to copy
Show Cracked
hashcat -m [MODE] hashes.txt --show
click to copy
John the Ripper
Wordlist Attack
john --format=[FORMAT] --wordlist=rockyou.txt hashes.txt
click to copy
Incremental (Brute-Force)
john --format=[FORMAT] --incremental hashes.txt
click to copy
Show Cracked
john --show --format=[FORMAT] hashes.txt
click to copy
List All Formats
john --list=formats
click to copy
Hashcat Mask Charset
?l = a–z
?u = A–Z
?d = 0–9
?s = special chars
?a = ?l+?u+?d+?s
?b = 0x00–0xff
?h = 0–9, a–f
?H = 0–9, A–F
Mode & Format Reference
AlgorithmHashcatJtR Format BitsSecurityExample