TechEarl

NVIDIA GeForce GTX 1080 Ti Hashcat Benchmarks (152 Hash Modes)

Hashcat benchmark numbers for the NVIDIA GeForce GTX 1080 Ti across 152 hash modes, with a modern context: how the 1080 Ti compares to the RTX 3090, 4090, and 5090, and when it's still worth using in 2026.

Ishan KarunaratneIshan Karunaratne⏱️ 13 min readUpdated
Hashcat benchmark numbers for the NVIDIA GeForce GTX 1080 Ti across 152 hash modes, with a modern context: how the 1080 Ti compares to the RTX 3090, 4090, and 5090, and when it's still worth using in 2026.

These are the hashcat benchmark numbers I captured on a single GeForce GTX 1080 Ti Founders Edition card across all 152 hash modes hashcat supported at the time. The card was top-tier when this benchmark was taken (January 2018), held its own through 2020, and now in 2026 it sits squarely in the "budget password-cracking rig" tier where used 1080 Ti cards trade for under $250 each. Below: the original full benchmark table, a comparison with the current generation cards (RTX 3090, 4090, 5090), the cases where a 1080 Ti is still the right call in 2026, and the hashcat version / driver caveats that matter when running this card on a modern Linux box.

How fast is a GTX 1080 Ti for hashcat?

A single NVIDIA GeForce GTX 1080 Ti achieves roughly 34 GH/s on raw MD5, 57 GH/s on NTLM, *20 kH/s on bcrypt $2$ (5 cost)**, 577 kH/s on scrypt, and 533 kH/s on WPA/WPA2 under hashcat 4.0.1 in 2018 benchmark mode. Performance on hashcat 6.x and 7.x is broadly similar on the same hardware (driver and OpenCL stack matter more than hashcat version). Compared to a current-generation RTX 4090, the 1080 Ti is roughly 4-5x slower on most fast hashes (MD5, NTLM, SHA-1) and 8-10x slower on the modern slow hashes (bcrypt, argon2, scrypt) due to the 4090's larger memory bandwidth and tensor-core acceleration. The 1080 Ti remains useful in 2026 for low-budget multi-card rigs, learning, and forensic recovery on hashes that aren't deliberately slow.

Jump to:

Test setup

ComponentValue
GPU1 × NVIDIA GeForce GTX 1080 Ti Founders Edition (FE), 11 GB GDDR5X
CPUAMD Ryzen Threadripper 1950X (16-core, 32-thread)
RAM64 GB DDR4
OSWindows 10 Professional
DriverNVIDIA 388.71 (January 2018)
Hashcatv4.0.1 (December 2017 release)
Benchmark window25 minutes (started 18:43, finished 19:08)

The Founders Edition (reference) card was deliberate: the blower-style cooler exhausts hot air out the back of the case, which matters when you stack multiple GPUs in an enclosed chassis. Aftermarket "open-air" cards dump heat back into the case and need either an open mining-rig frame or strong intake/exhaust fans to keep stable at sustained 100% utilization.

For comparison, modern rigs in 2026 usually run open frames or dedicated thermal chambers for similar reasons.

How the benchmark was run

The full benchmark mode in hashcat:

bash
hashcat -b

Output preamble:

text
hashcat (v4.0.1) starting in benchmark mode...

OpenCL Platform #1: NVIDIA Corporation
======================================
* Device #1: GeForce GTX 1080 Ti, 2816/11264 MB allocatable, 28MCU

Started: Thu Jan 25 18:43:07 2018
Stopped: Thu Jan 25 19:08:29 2018

The numbers below are the optimal-case rates hashcat reports — single-hash, no salt variance, no rules. Real-world cracking speeds drop as the candidate space and salt count grow (especially for salted hashes where every new salt is effectively a separate keyspace).

Full benchmark table (152 hash modes)

Hash mode — typeHash rate
900 - MD460834.7 MH/s
0 - MD534026.4 MH/s
5100 - Half MD521255.7 MH/s
100 - SHA111402.8 MH/s
1400 - SHA-2564300.1 MH/s
10800 - SHA-3841255.9 MH/s
1700 - SHA-5121272.1 MH/s
5000 - SHA-3 (Keccak)1122.4 MH/s
10100 - SipHash40097.7 MH/s
14900 - Skip32 (PT = $salt, key = $pass)6758.6 MH/s
6000 - RIPEMD-1606676.2 MH/s
6100 - Whirlpool295.6 MH/s
6900 - GOST R 34.11-94345.5 MH/s
11700 - GOST R 34.11-2012 (Streebog) 256-bit64046.5 kH/s
11800 - GOST R 34.11-2012 (Streebog) 512-bit63941.8 kH/s
14000 - DES (PT = $salt, key = $pass)24734.1 MH/s
14100 - 3DES (PT = $salt, key = $pass)1634.5 MH/s
400 - phpass, WordPress (MD5), phpBB3 (MD5), Joomla (MD5)9287.8 kH/s
8900 - scrypt577.0 kH/s
11900 - PBKDF2-HMAC-MD510127.8 kH/s
12000 - PBKDF2-HMAC-SHA14286.6 kH/s
10900 - PBKDF2-HMAC-SHA2561471.9 kH/s
12100 - PBKDF2-HMAC-SHA512477.7 kH/s
23 - Skype17812.1 MH/s
2500 - WPA/WPA2533.6 kH/s
2501 - WPA/WPA2 PMK179.8 MH/s
5300 - IKE-PSK MD52489.9 MH/s
5400 - IKE-PSK SHA1924.3 MH/s
5500 - NetNTLMv1 / NetNTLMv1+ESS29492.8 MH/s
5600 - NetNTLMv22269.9 MH/s
7300 - IPMI2 RAKP HMAC-SHA11946.3 MH/s
7500 - Kerberos 5 AS-REQ Pre-Auth etype 23410.1 MH/s
13100 - Kerberos 5 TGS-REP etype 23407.4 MH/s
8300 - DNSSEC (NSEC3)4301.8 MH/s
11100 - PostgreSQL CRAM (MD5)8829.9 MH/s
11200 - MySQL CRAM (SHA1)2954.9 MH/s
11400 - SIP digest authentication (MD5)4287.8 MH/s
121 - SMF (Simple Machines Forum) > v1.18868.1 MH/s
2611 - vBulletin < v3.8.59241.6 MH/s
2711 - vBulletin >= v3.8.56247.4 MH/s
2811 - IPB2+ (Invision Power Board), MyBB 1.2+6697.2 MH/s
8400 - WBB3 (Woltlab Burning Board)1527.1 MH/s
13900 - OpenCart2645.7 MH/s
11 - Joomla < 2.5.1833238.1 MH/s
2612 - PHPS8988.0 MH/s
7900 - Drupal769900 H/s
21 - osCommerce, xt:Commerce17337.4 MH/s
11000 - PrestaShop11073.4 MH/s
124 - Django (SHA-1)8866.1 MH/s
10000 - Django (PBKDF2-SHA256)74382 H/s
3711 - MediaWiki B type8396.9 MH/s
4521 - Redmine3912.2 MH/s
4522 - PunBB3886.9 MH/s
12 - PostgreSQL33132.4 MH/s
131 - MSSQL (2000)11382.1 MH/s
132 - MSSQL (2005)11375.4 MH/s
1731 - MSSQL (2012, 2014)1223.9 MH/s
200 - MySQL32369043.4 MH/s
300 - MySQL4.1/MySQL54897.4 MH/s
3100 - Oracle H: Type (Oracle 7+)1270.6 MH/s
112 - Oracle S: Type (Oracle 11+)11080.0 MH/s
12300 - Oracle T: Type (Oracle 12+)111.3 kH/s
8000 - Sybase ASE419.2 MH/s
141 - Episerver 6.x < .NET 48853.5 MH/s
1441 - Episerver 6.x >= .NET 43638.1 MH/s
1600 - Apache $apr1$ MD5, md5apr1, MD5 (APR)13753.3 kH/s
12600 - ColdFusion 10+2353.2 MH/s
1421 - hMailServer3634.4 MH/s
101 - nsldap, SHA-1(Base64), Netscape LDAP SHA11144.5 MH/s
111 - nsldaps, SSHA-1(Base64), Netscape LDAP SSHA11162.7 MH/s
1411 - SSHA-256(Base64), LDAP {SSHA256}4216.2 MH/s
1711 - SSHA-512(Base64), LDAP {SSHA512}1241.1 MH/s
3000 - LM22639.3 MH/s
1000 - NTLM56636.3 MH/s
1100 - Domain Cached Credentials (DCC), MS Cache14824.1 MH/s
2100 - Domain Cached Credentials 2 (DCC2), MS Cache 2434.4 kH/s
15300 - DPAPI masterkey file v190252 H/s
15900 - DPAPI masterkey file v257086 H/s
12800 - MS-AzureSync PBKDF2-HMAC-SHA25611703.7 kH/s
1500 - descrypt, DES (Unix), Traditional DES1292.7 MH/s
12400 - BSDi Crypt, Extended DES2218.4 kH/s
500 - md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5)13711.0 kH/s
3200 - bcrypt $2*$, Blowfish (Unix)19571 H/s
7400 - sha256crypt $5$, SHA256 (Unix)529.7 kH/s
1800 - sha512crypt $6$, SHA512 (Unix)201.2 kH/s
122 - macOS v10.4, macOS v10.5, MacOS v10.68868.8 MH/s
1722 - macOS v10.71208.7 MH/s
7100 - macOS v10.8+ (PBKDF2-SHA512)13737 H/s
6300 - AIX {smd5}13717.1 kH/s
6700 - AIX {ssha1}53183.5 kH/s
6400 - AIX {ssha256}21835.8 kH/s
6500 - AIX {ssha512}6442.8 kH/s
2400 - Cisco-PIX MD522345.1 MH/s
2410 - Cisco-ASA MD524184.7 MH/s
5700 - Cisco-IOS type 4 (SHA256)4212.9 MH/s
9200 - Cisco-IOS $8$ (PBKDF2-SHA256)74908 H/s
9300 - Cisco-IOS $9$ (scrypt)29973 H/s
22 - Juniper NetScreen/SSG (ScreenOS)17701.8 MH/s
501 - Juniper IVE13802.5 kH/s
5800 - Samsung Android Password/PIN7423.9 kH/s
8100 - Citrix NetScaler9460.3 MH/s
8500 - RACF3606.9 MH/s
7200 - GRUB 248184 H/s
9900 - Radmin211380.6 MH/s
7700 - SAP CODVN B (BCODE)1778.9 MH/s
7800 - SAP CODVN F/G (PASSCODE)1144.4 MH/s
10300 - SAP CODVN H (PWDSALTEDHASH) iSSHA-17564.5 kH/s
8600 - Lotus Notes/Domino 5307.2 MH/s
8700 - Lotus Notes/Domino 6101.3 MH/s
9100 - Lotus Notes/Domino 8877.8 kH/s
133 - PeopleSoft11392.6 MH/s
13500 - PeopleSoft PS_TOKEN4071.9 MH/s
11600 - 7-Zip10506 H/s
13600 - WinZip1422.9 kH/s
12500 - RAR3-hp39246 H/s
13000 - RAR545544 H/s
13200 - AxCrypt163.3 kH/s
13300 - AxCrypt in-memory SHA110495.2 MH/s
6211 - TrueCrypt PBKDF2-HMAC-RIPEMD160 + XTS 512 bit372.1 kH/s
6221 - TrueCrypt PBKDF2-HMAC-SHA512 + XTS 512 bit443.5 kH/s
6231 - TrueCrypt PBKDF2-HMAC-Whirlpool + XTS 512 bit48103 H/s
6241 - TrueCrypt PBKDF2-HMAC-RIPEMD160 + XTS 512 bit + boot-mode691.2 kH/s
13711 - VeraCrypt PBKDF2-HMAC-RIPEMD160 + XTS 512 bit1208 H/s
13721 - VeraCrypt PBKDF2-HMAC-SHA512 + XTS 512 bit965 H/s
13731 - VeraCrypt PBKDF2-HMAC-Whirlpool + XTS 512 bit93 H/s
13741 - VeraCrypt PBKDF2-HMAC-RIPEMD160 + XTS 512 bit + boot-mode2404 H/s
13751 - VeraCrypt PBKDF2-HMAC-SHA256 + XTS 512 bit1396 H/s
13761 - VeraCrypt PBKDF2-HMAC-SHA256 + XTS 512 bit + boot-mode3520 H/s
8800 - Android FDE <= 4.31070.4 kH/s
12900 - Android FDE (Samsung DEK)364.1 kH/s
12200 - eCryptfs17796 H/s
9700 - MS Office <= 2003 $0/$1, MD5 + RC4361.7 MH/s
9710 - MS Office <= 2003 $0/$1, MD5 + RC4, collider #1450.6 MH/s
9800 - MS Office <= 2003 $3/$4, SHA1 + RC4433.0 MH/s
9810 - MS Office <= 2003 $3, SHA1 + RC4, collider #1483.5 MH/s
9400 - MS Office 2007181.2 kH/s
9500 - MS Office 201090840 H/s
9600 - MS Office 201311739 H/s
10400 - PDF 1.1 - 1.3 (Acrobat 2 - 4)493.2 MH/s
10410 - PDF 1.1 - 1.3 (Acrobat 2 - 4), collider #1543.7 MH/s
10500 - PDF 1.4 - 1.6 (Acrobat 5 - 8)23007.8 kH/s
10600 - PDF 1.7 Level 3 (Acrobat 9)4237.8 MH/s
10700 - PDF 1.7 Level 8 (Acrobat 10 - 11)43772 H/s
9000 - Password Safe v2454.4 kH/s
5200 - Password Safe v31670.0 kH/s
6800 - LastPass + LastPass sniffed3040.1 kH/s
6600 - 1Password, agilekeychain4223.6 kH/s
8200 - 1Password, cloudkeychain11506 H/s
11300 - Bitcoin/Litecoin wallet.dat5846 H/s
12700 - Blockchain, My Wallet65134.5 kH/s
15200 - Blockchain, My Wallet, V2433.2 kH/s
13400 - KeePass 1 (AES/Twofish) and KeePass 2 (AES)190.5 kH/s
15500 - JKS Java Key Store Private Keys (SHA1)10714.6 MH/s
15600 - Ethereum Wallet, PBKDF2-HMAC-SHA2565692 H/s
125 - ArubaOS8888.8 MH/s
15400 - ChaCha205905.7 MH/s

GTX 1080 Ti vs RTX 3090, 4090, 5090

Approximate single-card rates from public benchmarks (hashcat.net forums, github, hashes.com community benchmarks). Real numbers vary by driver, OpenCL/CUDA stack, hashcat version, ambient temperature, and power-limit configuration — treat these as order-of-magnitude:

ModeGTX 1080 Ti (2018)RTX 3090 (2020)RTX 4090 (2022)RTX 5090 (2025)
0 — MD534 GH/s65 GH/s165 GH/s250+ GH/s
100 — SHA-111.4 GH/s22 GH/s60 GH/s100+ GH/s
1000 — NTLM56.6 GH/s100 GH/s290 GH/s450+ GH/s
1400 — SHA-2564.3 GH/s8.7 GH/s22 GH/s38+ GH/s
2500 — WPA/WPA2533 kH/s1.6 MH/s4.5 MH/s7+ MH/s
3200 — bcrypt $2*$19.6 kH/s60 kH/s184 kH/s300+ kH/s
8900 — scrypt577 kH/s1.4 MH/s4.8 MH/s8+ MH/s
14000 — DES24.7 GH/s50 GH/s138 GH/s220+ GH/s
22000 — WPA-PBKDF2 (newer)533 kH/s1.5 MH/s4.3 MH/s7+ MH/s

Pattern: the 1080 Ti is ~5x slower than a 4090 on fast hashes and 8-10x slower on slow hashes. For a heavy multi-GPU rig the comparison is more useful per-dollar than per-card — a used 1080 Ti at $200 vs a new 4090 at ~$1,800 is closer to 1.2x more H/$ on the 1080 Ti for MD5-class fast hashes, but the 4090 wins decisively on slow hashes per dollar due to its memory-bandwidth advantage.

Power draw matters at scale: 1080 Ti is rated 250W TDP, the 4090 is 450W, the 5090 is 575W. For a 24/7 cracking rig in a region where electricity costs $0.30/kWh, the per-month power cost of one card running flat-out is roughly $54 (1080 Ti), $97 (4090), or $124 (5090). The hash-per-watt math usually still favors the newer cards on slow hashes; the older cards win on the cheapest fast hashes.

When the 1080 Ti is still the right call in 2026

  • You bought one used for under $250. The card was discontinued in 2019, NVIDIA stopped publishing new game-ready drivers in 2022. Used inventory is plentiful and prices are at the floor.
  • You're learning hashcat / building a pentesting lab. The 1080 Ti runs every hashcat mode that the latest cards do, just slower. Same skills transfer; no need to spend $2k on a learning rig.
  • You're targeting fast hashes that aren't deliberately slow. MD5 / SHA-1 / NTLM in 2026 are usually only seen in legacy systems and CTF challenges. For these, the 1080 Ti is fine — keyspaces small enough to crack on this hardware finish quickly enough that the modern-card speed advantage doesn't matter.
  • You need a multi-card rig with cheap parts. Stacking 4-8 used 1080 Ti cards on a mining-frame motherboard gives ~136-272 GH/s on MD5 for the price of a single 4090. The downside is the rack power draw (1-2 kW continuous) and cooling.
  • You're recovering your own forgotten password from a personal file (1Password, KeePass, encrypted PDF, etc.) and you have the card already. No need to upgrade hardware for a single recovery job.

Running this benchmark on hashcat 7.x today

The benchmark in this article was captured on hashcat 4.0.1. Hashcat 7.x (current as of 2026) added many new hash modes — the table above represents the modes that existed in 2018, not the full current set of 400+ modes.

To re-run the full current benchmark on your own 1080 Ti:

bash
# Install or upgrade hashcat
brew install hashcat        # macOS
sudo apt install hashcat    # Debian/Ubuntu

# Run full benchmark, output to file
hashcat -b -O > my-1080-ti-benchmark.txt 2>&1

The -O flag enables "optimized kernels" (a smaller candidate space per kernel launch, faster) and is the default for hashcat -b since v6.x. Drop -O for slower-but-more-thorough numbers if you want apples-to-apples comparison with rigorous published benchmarks.

For specific modes only:

bash
hashcat -b -m 0       # MD5
hashcat -b -m 1000    # NTLM
hashcat -b -m 22000   # WPA-PBKDF2 (modern)
hashcat -b -m 3200    # bcrypt

Mode numbers stayed stable across hashcat 4.x → 7.x; the 152 modes in the table above all still exist in hashcat 7, plus ~250 new ones for newer applications (Bitwarden, BitLocker recent variants, RAR5, Argon2, etc.).

Driver and compatibility notes for 2026

  • Last NVIDIA Game Ready Driver for Pascal cards (1080 Ti generation) was 472.12 (December 2021). Pascal moved to the "legacy" Production Branch — security and bug fixes until October 2024, then no new updates.
  • For Linux, the NVIDIA 535.xx legacy driver branch supports Pascal through 2026. Use the open kernel module or the proprietary one; both work for hashcat.
  • On Windows 10/11 in 2026, you may need to manually pin the 472.12 or 528.xx driver if newer auto-updates roll back card compatibility. The "Studio Driver" channel is more stable than "Game Ready" for hashcat workloads.
  • macOS dropped Pascal support in 10.14; the 1080 Ti has not been usable on Mac since Mojave EOL. Pure-CPU hashcat on macOS works but is dramatically slower.
  • CUDA 12.x still supports compute capability 6.1 (Pascal). CUDA 13.x (if and when released) is expected to drop Pascal — at which point hashcat OpenCL is the only path forward.

Password cracking with hashcat is legitimate for:

  • Penetration testing with explicit written authorization (scope-of-work signed).
  • Forensic recovery of your own data (encrypted personal files, forgotten passwords on hardware you own).
  • Security research in CTF / lab environments.
  • Auditing your organization's password policy against your own user database.

It is NOT legitimate for cracking hashes that belong to anyone else without authorization. The Computer Fraud and Abuse Act (US), the Computer Misuse Act 1990 (UK), the EU NIS2 Directive, and equivalent legislation in most jurisdictions treat unauthorized cracking as a crime regardless of how the hashes were obtained.

For the WordPress-specific password-hash work many readers come here for, the legitimate flow is:

What to do next

For the broader security cluster:

For the broader DevOps cluster:

  • How to SSH into an EC2 Instance — for hosting a cracking rig in the cloud (note: AWS, GCP, and Azure all prohibit password-cracking workloads on shared infrastructure; this is for self-hosted or pentesting-licensed compute only).

External references:

FAQ

Tagshashcatpassword crackingNVIDIAGTX 1080 TiGPU benchmarksMD5bcryptNTLM
Share
Ishan Karunaratne

Ishan Karunaratne

Tech Architect · Software Engineer · AI/DevOps

Tech architect and software engineer with 20+ years building software, Linux systems, and DevOps infrastructure, and lately working AI into the stack. Currently Chief Technology Officer at a healthcare tech startup, which is where most of these field notes come from.

Keep reading

Related posts

Using regex in Apache .htaccess with mod_rewrite: RewriteRule and RewriteCond pattern syntax, rewrite flags, and copy-paste rules for HTTPS redirects, www normalization, trailing slashes, 301 redirects, clean URLs, and blocking by user-agent or IP.

How to Use Regex in .htaccess (Apache mod_rewrite)

Use regex in .htaccess with Apache mod_rewrite: how RewriteRule and RewriteCond patterns work, the per-directory quirk that breaks everyone, and copy-paste rules for HTTPS, www, trailing slashes, 301s, clean URLs, and access blocking.