Crack Mate is a high-speed hash cracking tool written in Python that uses a dictionary attack to uncover plain text passwords from hashed values. It supports multiple algorithms including MD5, SHA1, SHA256, and more. Ideal for CTFs, pentesters, and ethical hackers.
- ✅ Supports all major hash algorithms (MD5, SHA1, SHA256, etc.)
- 🧠 Fast multithreaded execution
- 🧰 Custom wordlist support
- 📜 Clean banner and colorful output with
huepyandpyfiglet - ⚡ Prints cracking duration
To get started with CrackMate, clone this repository to your local machine:
git clone https://github.com/0xHawkEye/CrackMate.git
cd CrackMateYou can install the required dependencies using the following command:
pip install -r requirements.txtTo run DirRaptor, use the following command:
python CrackMate.py -hs <Hash> -a <Encoding> -w <wordlist>-h, --help show this help message and exit
-hs, --hash HASH Hash value to crack
-a, --algorithm ALGORITHM
Hash algorithm (e.g., md5, sha1)
-w, --wordlist WORDLIST
Path to the wordlist file
Default: rockyou1.txt
-all Print all available hash algorithmspython CrackMate.py -hs 5ebddb1d6c422cd74b696e3a0e674c91 -a md5 -w rockyou1.txtCrackMate is intended for educational and authorized penetration testing purposes only.
By using this tool, you agree to the following:
✅ You must not use Crack Mate to crack or reverse-engineer hashes belonging to any user, system, or organization without explicit authorization from the rightful owner.
✅ You are solely responsible for any misuse or unauthorized activity performed using this tool.
✅ The developer is not liable for any damage, legal consequences, or misuse resulting from the use of this tool.
❗ Crack Mate is intended for educational and authorized security research purposes only. Do not use this tool on systems without explicit permission. Unauthorized cracking is illegal under most cybercrime laws (e.g., CFAA, IT Act).
This tool is intended for educational and authorized testing purposes only.
This project is licensed under the MIT License.
- Use in lab environments, CTFs, bug bounty, or client-approved pentests.
- Respect all terms of service and network usage policies.
Contributions are welcome! Feel free to submit pull requests or open issues to enhance the tool. Your feedback and contributions help improve DirRaptor.
Developed by: Ayush Kumar
Linkedin: https://www.linkedin.com/in/ayushkr4422