To answer that, Hashcat and oclHashcat went open source in order to allow penetration testers and forensic scientists alike to not only add, but to modify algorithms without compromising any sensitive information, which is obviously being passwords. Previously, Hashcast was not present for Apple’s OS X and was only supported by OpenCL (AMD processors) and CUDA (NVIDIA processors) and was available for Linux and Windows platforms. Apple does not allow offline compiling of kernel code, but now that the project has gone open source, users will be able to compile the GPU kernels and use oclHashcat on OS X without breaking a sweat. Kaspersky Lab, who’s antivirus programs has grown quite popular amongst the masses, had very positive things to say about the program, which has been stated below, according to a source: The source code for Hashcat and oclHashcat is available on GitHub (click on the links for more information). As stated earlier, since MIT has licensed the program, security researchers will be able to modify such protocols without risking the sensitive information of thousands of password holders out there. However, there is no such thing as an entity being uncrackable these days and knowing this, you can be sure that there could be severe repercussions if the program starts being used for malicious activities.