davidculver/jtr-mcp-server
3.2
If you are the rightful owner of jtr-mcp-server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to dayong@mcphub.com.
MCP server that wraps John the Ripper for password cracking.
Tools
6
Resources
0
Prompts
0
JTR MCP Server
MCP server that wraps John the Ripper for password cracking.
Features
- Password cracking with 381+ hash formats
- Combine passwd/shadow files (unshadow)
- Session management for long-running cracks
- Status monitoring
- Docker deployment
- Works with Claude Desktop and other MCP clients
Quick Start
Docker
./scripts/docker_build.sh
./scripts/docker_run.sh
./scripts/docker_test.sh
Local
pip install -r requirements.txt
sudo snap install john-the-ripper
python -m src.jtr_mcp.server
Tools
- crack_passwords - crack hashes with wordlists
- unshadow_files - combine passwd/shadow files
- manage_session - list/delete/info sessions
- check_status - view cracked passwords
- list_hash_formats - show supported formats
- get_jtr_info - john version and config
Usage
STDIO mode
docker run -i jtr-mcp-server:latest
With MCP Inspector
npx @modelcontextprotocol/inspector docker run -i jtr-mcp-server:latest
# opens at http://localhost:6274
Development
pip install -r requirements-dev.txt
pytest
pytest --cov=src/jtr_mcp
MCP Inspector:
npx @modelcontextprotocol/inspector bash ./scripts/run_server.sh
Hash Formats
Supports 381+ formats including:
- Linux: descrypt, md5crypt, sha256crypt, sha512crypt, bcrypt
- Windows: NTLM, NetNTLMv2
- Databases: MySQL, PostgreSQL, Oracle
- Apps: WordPress, Drupal, Django
Wordlists
- small - 17 passwords (for testing)
- medium - 10k passwords
- large - rockyou.txt (14M)
License
MIT
Security Notice
For authorized use only. Intended for pentesting, security research, and password auditing with permission. Unauthorized access is illegal.