___. __ ___.
\_ |_________ __ ___/ |_ ____ ________________ \_ |__ ___________
| __ \_ __ \ | \ __\/ __ \_/ ___\_ __ \__ \ | __ \_/ __ \_ __ \
| \_\ \ | \/ | /| | \ ___/\ \___| | \// __ \| \_\ \ ___/| | \/
|___ /__| |____/ |__| \___ >\___ >__| (____ /___ /\___ >__|
\/ \/ \/ \/ \/ \/
A blazing-fast, multithreaded hash cracker built with Rust.
Crack hashes using wordlist-based dictionary attacks. Powered by rayon for parallel processing across all CPU cores.
Features · Installation · Usage · Supported Hashes · Contributing
- Fast — Multithreaded by default. Uses all your CPU cores out of the box.
- Simple — One command. No config files. No setup.
- Smart — Auto-detects hash types. Just point it at a file and go.
- 20 modes — Hex, Base64, Salted, Bcrypt, NTLM, SHA3-256 and SHA3-512 support.
v0.8.1 introduces SIMD optimizations and chunked parallel processing:
- 20-60% faster multi-threaded cracking
- SIMD-accelerated hex decoding
- Hardware SHA instructions on supported CPUs (SHA-NI)
Run --benchmark to measure performance on your hardware.
| Feature | Description |
|---|---|
| Multithreading | Parallel cracking with rayon — scales with your CPU |
| Auto-detection | No need to specify hash type, BruteCraber figures it out |
| Hex hashes | MD5, SHA1, SHA256, SHA512 |
| Bcrypt | Bcrypt hash verification ($2b$, $2y$) |
| Base64 hashes | Base64-encoded versions of all hash types |
| Salted hashes | Support for salt:hash format |
| Colored output | Clear, readable terminal output |
cargo install brutecrabergit clone https://github.com/erikgavs/brutecraber.git
cd brutecraber
cargo build --releaseThe binary will be at ./target/release/brutecraber.
./brutecraber -f <hashes_file> -w <wordlist> [-t <hash_type>]# Auto-detect hash type
./brutecraber -f hashes.txt -w rockyou.txt
# Specify hash type manually
./brutecraber -f hashes.txt -w rockyou.txt -t sha256
# Crack salted hashes
./brutecraber -f salted.txt -w rockyou.txt -t md5-salt
# Crack bcrypt hashes
./brutecraber -f bcrypt_hashes.txt -w rockyou.txt -t bcrypt
# Crack NTLM hashes (Windows)
./brutecraber -f ntlm_hashes.txt -w rockyou.txt -t ntlm| Flag | Description | Default |
|---|---|---|
-f |
Path to file containing hashes (one per line) | required |
-w |
Path to wordlist file | required |
-t |
Hash type (see table below) | auto |
-r / --rules |
Enable rule-based transformations | false |
--benchmark |
Run benchmark mode (measures H/s) | false |
-h |
Show help | — |
-V |
Show version | — |
[*] hash cracked 5f4dcc3b5aa765d61d8327deb882cf99 -> password
[*] hash cracked 21232f297a57a5a743894a0e4a801fc3 -> admin
[*] hash cracked [salt:x7k2] 86f75bc83edcd705c834c436f6b64fdc -> password
[*] cracked 3/3 hashes
| Algorithm | Hex | Base64 | Salted |
|---|---|---|---|
| MD5 | md5 |
md5-base64 |
md5-salt |
| SHA1 | sha1 |
sha1-base64 |
sha1-salt |
| SHA256 | sha256 |
sha256-base64 |
sha256-salt |
| SHA512 | sha512 |
sha512-base64 |
sha512-salt |
| SHA3-256 | sha3-256 |
sha3-256-base64 |
sha3-256-salt |
| SHA3-512 | sha3-512 |
sha3-512-base64 |
sha3-512-salt |
| Bcrypt | bcrypt |
— | — |
| NTLM | ntlm |
— | — |
Salted hashes use the format
salt:hash(one per line). Bcrypt hashes include their own salt internally ($2y$10$...).
brutecraber/
├── src/
│ ├── main.rs # CLI, banner, entry point
│ ├── cracker.rs # Core cracking logic (multithreaded)
│ ├── detector.rs # Auto-detection by hash length
│ ├── rules.rs # Rule-based word transformations
│ ├── benchmark.rs # Benchmark mode (H/s measurements)
│ └── hashes/
│ ├── mod.rs # Module exports
│ ├── md5.rs # MD5 hashing
│ ├── sha1_hash.rs # SHA1 hashing
│ ├── sha256.rs # SHA256 hashing
│ ├── sha512.rs # SHA512 hashing
│ ├── sha3_256.rs # SHA3-256 hashing
│ ├── sha3_512.rs # SHA3-512 hashing
│ ├── bcrypt.rs # Bcrypt verification
│ └── ntlm.rs # NTLM hashing (Windows)
├── tests/ # Test hashes and wordlists
├── Cargo.toml
├── CHANGELOG.md
└── LICENSE
- Progress bar with
indicatif - Bcrypt support
- NTLM hash support
- Benchmark mode (
--benchmark) - Rule-based transformations (leet speak, capitalize, append numbers)
- SIMD optimizations & chunked parallel processing
- Output results to file (
-o) - CI/CD pipeline (cargo test, clippy, rustfmt)
- Argon2 support (modern password hashing)
- scrypt support (crypto wallets, passwords)
- PBKDF2 support (enterprise standard, WiFi WPA)
- Realistic benchmark mode (wordlist simulation)
- GPU acceleration (OpenCL/CUDA)
- Base64 & salt decoding optimization
- SIMD multi-buffer hashing (hash 4-8 passwords simultaneously)
Contributions are welcome! Check out the CONTRIBUTING.md for guidelines on how to get started.
This tool is intended for ethical hacking, penetration testing, and educational purposes only. You are solely responsible for your actions. Using this tool against targets without prior consent is a violation of applicable laws. Use at your own risk.
Made with Rust by erikgavs
If you find this useful, consider giving it a star!