GHOUL

Pure Python Password Cracking Framework
REAPER harvests the hashes. GHOUL devours them.
8
Modules
1,408
Tests
30+
Hash Types
26
Mutation Rules
pip install red-specter-ghoul
Docs
MD5 | SHA-1 | SHA-256 | SHA-512 | NTLM | BCRYPT | SCRYPT | ARGON2 | DICTIONARY | BRUTE FORCE | MARKOV CHAINS | RAINBOW TABLES | RULE MUTATIONS MD5 | SHA-1 | SHA-256 | SHA-512 | NTLM | BCRYPT | SCRYPT | ARGON2 | DICTIONARY | BRUTE FORCE | MARKOV CHAINS | RAINBOW TABLES | RULE MUTATIONS

Password Crackers Are C Binaries. GHOUL Is Pure Python.

Hashcat and John the Ripper are powerful — but they're compiled C binaries with GPU dependencies, complex build chains, and no native integration with Python security toolkits. GHOUL is a pure Python password cracking framework designed for integration, not isolation.

Binary Dependencies

Hashcat requires GPU drivers, OpenCL runtimes, and compiled binaries. John needs autoconf, make, and platform-specific compilation. GHOUL needs pip install and nothing else.

No Integration

Traditional crackers produce text output that needs manual parsing. GHOUL produces structured JSON that feeds directly into REAPER for lateral movement and NEMESIS for attack chaining.

Hash Identification Gap

Most crackers require you to know the hash type. GHOUL identifies the hash for you — 30+ types with confidence scoring, automatic shadow/SAM/NTDS format detection.

Harvest-to-Crack Disconnect

You extract hashes with one tool and crack them with another. GHOUL imports REAPER harvest files natively — shadow, SAM, NTDS.dit — zero manual conversion.

The GHOUL Armoury

Eight modules. Each one built from scratch in pure Python. No hashcat wrappers. No John integration. Every hash algorithm implemented natively. Every mutation engine hand-built. Every attack mode purpose-engineered. 1,408 tests. 30+ hash types. 26 mutation rules.

Module 01

IDENTIFY

30+ Hash Types

Hash identification engine with confidence scoring. Analyses hash length, character set, prefix, and structure. Auto-detects shadow, SAM, and NTDS.dit formats. Identifies MD5, SHA, NTLM, bcrypt, scrypt, argon2, and 20+ more.

Module 02

DICTIONARY

Wordlist Attacks

Dictionary attack engine with wordlist loading, case mutations, and batch hashing. Ships with 1,000 built-in passwords. Supports custom wordlists of any size. Streaming mode for memory-efficient processing of massive wordlists.

Module 03

RULES

26 Mutation Rules

Rule-based mutation engine with 26 rules including capitalise, reverse, l33t, append digits, prepend symbols, toggle case, duplicate, rotate, and strip. Rule chaining with frequency-ordered application for optimal crack rates.

Module 04

BRUTE

Charset & Mask Attacks

Brute force engine with charset selection, mask attacks (?u?l?d?s patterns), and incremental mode. Supports custom charsets and hybrid dictionary+mask attacks. Configurable length ranges and resume capability.

Module 05

MARKOV

Statistical Generation

Markov chain candidate generation using password frequency statistics. Probability-ordered output for highest crack rates first. Trained on leaked password datasets. Configurable chain length and threshold.

Module 06

CRACK

Core Engine

Core cracking engine with pure Python hash implementations. MD5, SHA-1, SHA-256, SHA-512, NTLM, bcrypt, scrypt, argon2 — all implemented natively. Multi-threaded with configurable worker count. Progress reporting and ETA calculation.

Module 07

RAINBOW

Table Generation & Lookup

Rainbow table generation and lookup for fast cracking of unsalted hashes. Configurable chain length and table size. Pre-computed tables for common hash types. Reduction function optimisation for minimal collision rates.

Module 08

REAPER_IMPORT

Harvest Integration

REAPER integration module for seamless hash import. Parses REAPER harvest JSON, shadow files, SAM databases, and NTDS.dit extractions. Auto-identifies hash types from import context. Zero manual conversion required.

Identify. Attack. Crack. One Tool.

Import REAPER harvest, identify hashes, crack everything:

$ ghoul import --harvest reaper_output.json --crack --rules
[IMPORT] Loading REAPER harvest...
  47 hashes extracted from shadow + SAM + NTDS.dit
[IDENTIFY] Analysing hash types...
  12x SHA-512-crypt | 23x NTLM | 8x bcrypt | 4x MD5-crypt
[DICT] Dictionary attack with 1,000 built-in passwords...
  14 passwords cracked29.8% crack rate
[RULES] Applying 26 mutation rules...
  9 additional passwords cracked48.9% cumulative
[MARKOV] Statistical candidate generation...
  6 additional passwords cracked61.7% cumulative
[BRUTE] Mask attack ?u?l?l?l?d?d?d?d...
  3 additional passwords cracked68.1% cumulative

CRACK COMPLETE | 32/47 cracked | 68.1% success rate | JSON report generated

Pure Python

Every hash algorithm implemented natively. No hashcat. No John. No compiled binaries. No GPU dependencies. Pure Python engineering.

Auto-Identification

Feed GHOUL a hash and it identifies the type. 30+ algorithms recognised. Confidence scoring. No guesswork. No manual mode selection.

REAPER Integration

Import REAPER harvest files directly. Shadow, SAM, NTDS.dit — parsed and cracked automatically. Cracked credentials feed back for lateral movement.

Multi-Attack Pipeline

Dictionary, rules, Markov, brute force, rainbow — chained automatically. Each pass builds on the last. Optimal crack rates without manual orchestration.

30+ Hash Types. Pure Python Implementations.

Every hash algorithm implemented from scratch in Python. No ctypes bindings. No compiled extensions. When GHOUL hashes a candidate, every byte operation is Python code that Red Specter wrote.

MD5
128-bit digest
SHA-1
160-bit digest
SHA-256
256-bit digest
SHA-512
512-bit digest
NTLM
Windows NT hash
LM
LAN Manager hash
bcrypt
Blowfish-based KDF
scrypt
Memory-hard KDF
argon2
PHC winner KDF
MySQL
mysql_native_password
PostgreSQL
MD5 with salt
MD5-crypt
$1$ Unix crypt
SHA-256-crypt
$5$ Unix crypt
SHA-512-crypt
$6$ Unix crypt
DES-crypt
Traditional Unix
yescrypt
Modern Linux default
phpass
WordPress / phpBB
Django
PBKDF2-SHA256
WPA
PBKDF2-SHA1
SSHA
Salted SHA (LDAP)
8
Modules
1,408
Tests
30+
Hash Types
1,000
Built-in Passwords
Unleashed Mode

Standard Mode Cracks Weak Passwords. UNLEASHED Cracks Everything.

Standard mode runs dictionary attacks with the built-in wordlist and basic rules. UNLEASHED removes all limits. Full brute force ranges. All 26 mutation rules chained. Markov generation with maximum depth. Rainbow table generation at scale. Ed25519 key gate required. Two flags must be passed. This is not accidental.

Capability Standard Unleashed
Dictionary size 1,000 built-in Unlimited custom wordlists
Mutation rules Basic 5 rules All 26 rules, full chaining
Brute force 4 characters max Unlimited length, full charset
Markov depth Order 2, 6 chars Order 4, unlimited length
Rainbow tables Lookup only Generate + lookup, full scale
Thread count 4 workers Unlimited, CPU-saturating
Hash types Fast hashes only All 30+ types including KDFs

Ed25519 Gate

UNLEASHED mode requires an Ed25519 private key at ~/.redspecter/override_private.pem and the --override --confirm-destroy flags. Without both, GHOUL operates in standard mode — cracking weak passwords with basic attacks. The gate is cryptographic. There is no bypass. One key. One operator. Founder's machine only.

Find. Exploit. Harvest. Crack. Move.

GHOUL is not a standalone tool. It's the credential engine in a five-stage kill chain. WRAITH finds the infrastructure. REAPER exploits it and harvests the hashes. GHOUL cracks them. REAPER uses the cracked credentials for lateral movement. The chain is seamless. The integration is native.

WRAITH Finds

Stage 1 — Infrastructure Discovery

WRAITH discovers open ports, running services, and vulnerable configurations. It maps the attack surface that REAPER will exploit. Infrastructure enumeration feeds target selection.

REAPER Exploits

Stage 2 — Exploitation & Harvest

REAPER exploits discovered vulnerabilities and harvests credential stores. Shadow files, SAM databases, NTDS.dit extractions — every hash is captured in structured JSON format.

GHOUL Cracks

Stage 3 — Password Cracking

GHOUL imports REAPER harvest files, identifies hash types automatically, and chains dictionary, rules, Markov, and brute force attacks. Cracked credentials are output in structured format.

REAPER Moves Laterally

Stage 4 — Lateral Movement

Cracked credentials feed back into REAPER for lateral movement. SSH, RDP, WinRM, SMB — valid credentials enable access to additional systems across the network.

NEMESIS Chains Everything

Stage 5 — AI-Driven Exploitation

NEMESIS orchestrates the full chain. Traditional infrastructure compromise through WRAITH, credential harvesting through REAPER, password cracking through GHOUL — all coordinated by the Supreme Commander.

Pure Engineering
Zero External Crackers. Zero GPU Dependencies.

Most password cracking tools are compiled C binaries that require GPU drivers, OpenCL runtimes, and platform-specific builds. GHOUL is actual engineering. Every hash algorithm, every mutation rule, every attack mode written from scratch in pure Python. stdlib only. No compiled extensions. No ctypes. No GPU required.

8
Modules
30+
Hash Types
1,408
Tests
700+
Patterns

Fifteen Tools. Every Layer. No Gaps.

GHOUL is Tool 14 in the Red Specter offensive pipeline. It cracks the credentials that REAPER harvests, completing the credential lifecycle from discovery to lateral movement.

Tool 1 — LLM
FORGE
Test the model
Tool 2 — Agent
ARSENAL
Test the AI agent
Tool 3 — Swarm
PHANTOM
Coordinated agent assault
Tool 4 — Web
POLTERGEIST
Test the web layer
Tool 5 — Traffic
GLASS
Watch the wire
Tool 6 — Adversarial
NEMESIS
Think like the attacker
Tool 7 — Human
SPECTER SOCIAL
Target the human
Tool 8 — OS/Kernel
PHANTOM KILL
Own the foundation
Tool 9 — Physical
GOLEM
Attack the physical layer
Tool 10 — Supply Chain
HYDRA
Attack the trust chain
Tool 11 — Operator
SCREAMER
Blind the operator
Tool 12 — Infrastructure
WRAITH
The ghost in the wire
Tool 13 — Post-Exploitation
REAPER
Harvest credentials
Tool 14 — Credentials
GHOUL
Devour the hashes
Tool 15 — Active Directory
DOMINION
Take the crown
Discovery & Governance
IDRIS
Discovery & governance
Defence Layer
AI SHIELD
Defend everything above
SIEM Integration
redspecter-siem
Enterprise SIEM correlation

Security Distros & Package Managers

Kali Linux
.deb package
Parrot OS
.deb package
BlackArch
PKGBUILD
REMnux
.deb package
Tsurugi
.deb package
PyPI
pip install
Docker
docker-compose

REAPER Harvests. GHOUL Devours. Credentials Fall.

Pure Python password cracking with native REAPER integration. 30+ hash types. 26 mutation rules. 8 modules. Zero compiled dependencies.