SudoHopeX 'Krishna Dwivedi' SudoHopeX 🥷🚩

A Ray of Hope in the circuitry, Igniting curiosity.

( Ethical Hacker )

HashStorm 🌪️: Python Tool for Hash Identification and Cracking

calendar Jun 14, 2025 clock 5-10 min read tag Project-documentation


HashStorm

Developed by Krishna Dwivedi

Objective

The Goal of this project is to develope a tool that can:

Project Description

HashStorm is a command-line utility built with Python, designed to identify and crack a wide variety of hash types. It automates the identification process using regular expression patterns from the hashid library and supports cracking through dictionary-based attacks.

The tool is specially valuable in:

NOTE: This tool is intended only for educational purposes, ethical hacking, or penetration testing and ethical use only.

Features ✨

Tech Stack ⚙️



        TECHNOLOGY            PURPOSE
        Python3.13            Core Programming language
        hashid (Lib)          Hash types identification
        sys (Lib)             CLI argument parsing
        File I/O              For reading writing files
        Regex (Lib)           For checking validity of a hash string
        Hashing Libs          For hashing words to crack hash(es)
        Multiprocessing (Lib) For concurrent processing (default disabled due to process creation overhead)
    

Installation 📩

To install HashStorm, follow these steps:

Usages

Run

python3 hashstorm.py --help    //to display below given usage information.

The default icrack mode simplifies workflows by handling both identification and cracking automatically

USAGES:
      python(3) hashstorm.py [Options] [Arguments]
      
OPTIONS:
   > --help                    print tool usages
   > identify                  identify the hash-type of specified hash-value
   > crack                     crack the hash-value (!NOTE: hash-type must be passed)
   > icrack [Default]          automatically identify hash-type and crack the hash-value specified
      
ARGUMENTS:
   > -h <hash-value(s)>        Add one or more hash-value to crack or identify followed by ','
   > -hf <hashes file>         Pass a hash file
   > -H <hash-type(s)>         Pass hash-type to crack
   > -w <wordlist-path>        Specify wordlist to use for cracking hash
   > -o <output-file>          Save result in specified file
   > -v                        Verbose mode ( show detailed info while cracking ) [in update]
   > -g                        Perform a google search if hash not cracked [in update]
   > -brute                    Crack hashes using self defined charset and length [in update]
   > -charset <charset>        Specify character set for bruteforccing like "a-z,0-9" [in update]
   > -length <pass-max-length> Specify hash word's maximum value [in update]

EXAMPLES:
   > python hashstorm.py identify -h 5d41402abc4b2a76b9719d911017c592
   > python hashstorm.py identify -hf hash-file.txt
   > python hashstorm.py identify -h ae3274d5bfa170ca69bb534be5a22467,5d41402abc4b2a76b9719d911017c592
   > python hashstorm.py crack -H MD5 -h 5d41402abc4b2a76b9719d911017c592 -w wordlist.txt -o output.txt
   > python hashstorm.py crack -H MD5,MD5 -h 5d41402abc4b2a76b9719d911017c592,5d41402abc4b2a76b9719d911017c592 -w wordlist.txt
   > python hashstorm.py -h 5d41402abc4b2a76b9719d911017c592 -w wordlist.txt -o output.txt
   
NOTE:
   > Tool usages format must be followed
   > Atleast 'hash-value' OR 'hashes-file' must be passed as argument

Demo 🪧

Identify a single hash 👇

Identify a Single hash

Identify from file 👇

Identify hashes from a file

Crack a known MD5 hash using wordlist 👇

Crack a Known MD5 hash using wordlist

Use default icrack Mode (identification & cracking automation) & save result to a file 👇

Using default icrack Mode (identification & cracking automation) while saving output to a file Viewing content of Output file

Planned Improvements

Contributing

Contributions to HashStorm are encouraged to improve features, fix bugs, or add support for more hash types. To contribute:

License 🪪

This project is licensed under MIT. See LICENSE file for more info.

Acknowledgments 🙏

Further Documentations to Explore
OpenPuff & Wine 32-bit Auto Installer Bash Script 2025 🐧 + ISC2 CC Practice Quiz: Practice & analyze your knowledge to navigate for CC exam + Python Keylogger: A spyware to capture & upload keystrokes to a webserver +
Go to top