Red Specter GHOUL
Pure Python Password Cracking Framework — 8 modules. 1,408 tests. 30+ hash types. Zero compiled dependencies.
Overview
GHOUL is a pure Python password cracking framework. Zero compiled dependencies. Every hash algorithm implemented natively using Python's hashlib, struct, and hmac modules. No hashcat. No John the Ripper. No GPU drivers. No OpenCL runtimes. Pure engineering.
Eight modules. 1,408 tests. GHOUL identifies hash types automatically, runs multi-stage attacks (dictionary, rules, Markov, brute force, rainbow), and integrates natively with REAPER for seamless hash import and credential reuse.
Installation
Also available as .deb and PKGBUILD (BlackArch).
Or from source:
Quick Start
IDENTIFY — Hash Identification
Automatic hash type identification. Analyses length, character set, prefix patterns, and structural signatures. Supports 30+ hash types with confidence scoring.
- 30+ hash types identified by length, charset, prefix, and structure
- Confidence scoring — 0.0–1.0 per candidate type
- Auto-detect formats: shadow ($6$...), SAM (LM:NTLM), NTDS.dit, htpasswd
- Batch identification from file input
- Returns: hash_type, confidence, algorithm, salt_detected, format
DICTIONARY — Wordlist Attacks
Dictionary attack engine with built-in wordlist and custom wordlist support. Streaming mode for memory-efficient processing of massive wordlists.
- 1,000 built-in passwords — most common passwords from breach datasets
- Custom wordlist support — any size, streaming mode for large files
- Case mutations — lowercase, uppercase, capitalise, toggle
- Batch hashing — multiple hashes cracked in a single pass
- Progress reporting with ETA and speed metrics
RULES — Mutation Engine
26 mutation rules applied to dictionary candidates. Rule chaining with frequency-ordered application optimises crack rates. Each rule generates multiple candidates per base word.
- Capitalise — first letter uppercase
- Uppercase / Lowercase — full case conversion
- Toggle case — swap upper/lower per character
- Reverse — reverse the string
- L33t speak — a→4, e→3, i→1, o→0, s→5, t→7
- Append digits — 0-9, 00-99, common years
- Prepend symbols — !, @, #, $, %, common prefixes
- Duplicate — password→passwordpassword
- Rotate — shift characters left/right
- Strip vowels / consonants
- Rule chaining — capitalise + append digit + l33t
- Frequency ordering — most effective rules first
BRUTE — Brute Force & Mask Attacks
Full brute force and mask attack engine. Charset selection, mask patterns (?u?l?d?s), incremental mode, and resume capability.
- Charset selection: lowercase, uppercase, digits, symbols, custom
- Mask attacks: ?u (upper), ?l (lower), ?d (digit), ?s (symbol)
- Incremental mode — 1 character to max length
- Resume capability — save and restore progress
- Hybrid mode — dictionary + mask (e.g., password?d?d?d?d)
MARKOV — Statistical Attacks
Markov chain candidate generation using password frequency statistics. Generates candidates in probability order for highest crack rates first.
- Markov chain generation from password frequency datasets
- Probability-ordered output — highest probability candidates first
- Configurable chain length — order 2 (standard), order 3-4 (UNLEASHED)
- Configurable threshold — minimum probability cutoff
- Custom training — train on domain-specific password lists
CRACK — Core Engine
Core cracking engine with pure Python hash implementations. Multi-threaded with configurable worker count. Orchestrates all attack modes in optimal sequence.
- Pure Python hash implementations — MD5, SHA-1, SHA-256, SHA-512, NTLM, bcrypt, scrypt, argon2
- Multi-threaded — configurable worker count (default 4, UNLEASHED unlimited)
- Full pipeline mode — dictionary → rules → markov → brute force
- Progress reporting — speed (H/s), progress %, ETA
- Session management — save/restore cracking sessions
RAINBOW — Table Generation & Lookup
Rainbow table generation and lookup for fast cracking of unsalted hashes. Configurable chain length and table size.
- Table generation for MD5, SHA-1, NTLM, LM
- Configurable chain length and table size
- Lookup mode — crack hashes against generated tables
- Reduction function optimisation for minimal collision rates
- Standard mode: lookup only. UNLEASHED: generate + lookup at scale.
REAPER_IMPORT — Harvest Integration
Native REAPER integration. Import harvest JSON files, shadow files, SAM databases, and NTDS.dit extractions. Auto-identifies hash types from import context.
- REAPER harvest JSON — structured hash import with metadata
- Shadow file parser — /etc/shadow format with user mapping
- SAM database parser — Windows SAM with LM:NTLM split
- NTDS.dit parser — Active Directory hash extraction
- Auto hash type detection from import context
- Direct crack mode — import and crack in one command
GHOUL UNLEASHED
Cryptographic override. Private key controlled. One operator. Founder's machine only.
Standard mode runs basic attacks with limited parameters. UNLEASHED removes all limits. Full brute force ranges. All 26 mutation rules chained. Maximum Markov depth. Rainbow table generation. Unlimited threads.
| Capability | Standard | UNLEASHED |
|---|---|---|
| Dictionary size | 1,000 built-in | Unlimited custom |
| Mutation rules | Basic 5 | All 26, full chaining |
| Brute force length | 4 characters | Unlimited |
| Markov depth | Order 2, 6 chars | Order 4, unlimited |
| Rainbow tables | Lookup only | Generate + lookup |
| Thread count | 4 workers | Unlimited |
| Hash types | Fast hashes | All 30+ including KDFs |
| Key required | No | Ed25519 |
UNLEASHED mode is restricted to authorised operators with Ed25519 private key access.
The key must be present at ~/.redspecter/override_private.pem.
Both --override and --confirm-destroy flags are required.
The gate is cryptographic. There is no bypass.
CLI Reference
Commands
| Command | Description |
|---|---|
| ghoul identify <hash> | Identify hash type with confidence scoring |
| ghoul dictionary | Dictionary attack with built-in or custom wordlist |
| ghoul rules | Rule-based mutation attack |
| ghoul brute | Brute force with charset selection |
| ghoul mask | Mask attack with ?u?l?d?s patterns |
| ghoul markov | Markov chain statistical attack |
| ghoul crack | Core engine — orchestrates attack pipeline |
| ghoul rainbow | Rainbow table lookup and generation |
| ghoul import | Import REAPER harvest / shadow / SAM / NTDS |
| ghoul benchmark | Benchmark hash speed by type |
Options
| Flag | Description |
|---|---|
| --hash | Single hash value to crack |
| --hashfile | File containing hashes (one per line) |
| --type | Hash type (md5, sha256, ntlm, bcrypt, etc.) |
| --wordlist | Custom wordlist file |
| --rules | Enable rule mutations (or specify rules) |
| --mask | Mask pattern (?u?l?d?s) |
| --threads | Worker thread count |
| --full | Run full attack pipeline |
| --override | UNLEASHED dry-run |
| --confirm-destroy | UNLEASHED live execution |
| --output | Output directory for results |
| --session | Session name for save/restore |
Kill Chain Integration
GHOUL operates as part of the Red Specter kill chain. WRAITH finds infrastructure. REAPER exploits and harvests. GHOUL cracks. REAPER uses cracked credentials for lateral movement. DOMINION leverages credentials for Active Directory compromise.
API Reference
GHOUL exposes a Python API for programmatic integration.
Disclaimer
Red Specter GHOUL is designed for authorised security testing, research, and educational purposes only. You must have explicit written permission from the system owner before using GHOUL against any credential stores. Password cracking activities must only be performed on systems you are authorised to test. Unauthorised use may violate the Computer Misuse Act 1990 (UK), the Computer Fraud and Abuse Act (US), or equivalent legislation in your jurisdiction. The authors accept no liability for misuse or damage resulting from improper use.