Crackq is an online distributed GPU-accelerated password cracker designed to help penetration testers and network auditors check for weak passwords. It supports a number of hash types and we are actively adding new algorithms.

This service must be used for legal purposes only. We are not liable for any loss or damage caused as a result of using this service.

Public queue utilisation: 0/10

This is a standard FIFO queue with a maximum size of 10 submissions.

To submit your hashes, download the crackqcli python script. You will need your API key which can be found on the "user details" page once you login. The results will be emailed to your registered email address. For more details, refer to the FAQ page.

For example, the following command can be used to submit the md5 hash 06aa3b7d55df43e7d7fa4aef94811e4a:

$ git clone && cd Crackq
$ ./ -t md5 06aa3b7d55df43e7d7fa4aef94811e4a

The currently supported algorithms along with their time to completion (TTC) are shown below. Note that we are actively adding new dictionary files, GPU nodes, custom rules, etc. This may affect the completion times shown below.

  • NTLM (~6 min)
  • MD5 (~11 min)
  • WPA/WPA2 (~8 min)



  1. 13/01/2015: Fixed issues related to requests with hashes that have already been cracked
  2. 07/01/2015: The WPA/WPA2 queue now adds 8-digit brute-force support to its hybrid dictionary attacks which brings TTC to ~8 min
  3. 03/01/2015: Crackq is now distributed (using Open MPI)
  4. 24/12/2014: The GPU overheating issues causing premature termination should now be fixed