01101011 01110010 01101011 01101110 00100000 01100011 01110010 01100101 01100100 01100101 01101110 01110100 01101001 01100001 01101100 00100000 01101001 01101110 01110100 01100101 01101100 01101100 01101001 01100111 01100101 01101110 01100011 0110010101101011 01110010 01101011 01101110 00100000 01100011 01110010 01100101 01100100 01100101 01101110 01110100 01101001 01100001 01101100 00100000 01101001 01101110 01110100 01100101 01101100 01101100 01101001 01100111 01100101 01101110 01100011 01100101
01101011 01110010 01101011 01101110 00100000 01100011 01110010 01100101 01100100 01100101 01101110 01110100 01101001 01100001 01101100 00100000 01101001 01101110 01110100 01100101 01101100 01101100 01101001 01100111 01100101 01101110 01100011 0110010101101011 01110010 01101011 01101110 00100000 01100011 01110010 01100101 01100100 01100101 01101110 01110100 01101001 01100001 01101100 00100000 01101001 01101110 01110100 01100101 01101100 01101100 01101001 01100111 01100101 01101110 01100011 01100101
01101011 01110010 01101011 01101110 00100000 01100011 01110010 01100101 01100100 01100101 01101110 01110100 01101001 01100001 01101100 00100000 01101001 01101110 01110100 01100101 01101100 01101100 01101001 01100111 01100101 01101110 01100011 0110010101101011 01110010 01101011 01101110 00100000 01100011 01110010 01100101 01100100 01100101 01101110 01110100 01101001 01100001 01101100 00100000 01101001 01101110 01110100 01100101 01101100 01101100 01101001 01100111 01100101 01101110 01100011 01100101
01101011 01110010 01101011 01101110 00100000 01100011 01110010 01100101 01100100 01100101 01101110 01110100 01101001 01100001 01101100 00100000 01101001 01101110 01110100 01100101 01101100 01101100 01101001 01100111 01100101 01101110 01100011 0110010101101011 01110010 01101011 01101110 00100000 01100011 01110010 01100101 01100100 01100101 01101110 01110100 01101001 01100001 01101100 00100000 01101001 01101110 01110100 01100101 01101100 01101100 01101001 01100111 01100101 01101110 01100011 01100101
01101011 01110010 01101011 01101110 00100000 01100011 01110010 01100101 01100100 01100101 01101110 01110100 01101001 01100001 01101100 00100000 01101001 01101110 01110100 01100101 01101100 01101100 01101001 01100111 01100101 01101110 01100011 0110010101101011 01110010 01101011 01101110 00100000 01100011 01110010 01100101 01100100 01100101 01101110 01110100 01101001 01100001 01101100 00100000 01101001 01101110 01110100 01100101 01101100 01101100 01101001 01100111 01100101 01101110 01100011 01100101
01101011 01110010 01101011 01101110 00100000 01100011 01110010 01100101 01100100 01100101 01101110 01110100 01101001 01100001 01101100 00100000 01101001 01101110 01110100 01100101 01101100 01101100 01101001 01100111 01100101 01101110 01100011 0110010101101011 01110010 01101011 01101110 00100000 01100011 01110010 01100101 01100100 01100101 01101110 01110100 01101001 01100001 01101100 00100000 01101001 01101110 01110100 01100101 01101100 01101100 01101001 01100111 01100101 01101110 01100011 01100101
01101011 01110010 01101011 01101110 00100000 01100011 01110010 01100101 01100100 01100101 01101110 01110100 01101001 01100001 01101100 00100000 01101001 01101110 01110100 01100101 01101100 01101100 01101001 01100111 01100101 01101110 01100011 0110010101101011 01110010 01101011 01101110 00100000 01100011 01110010 01100101 01100100 01100101 01101110 01110100 01101001 01100001 01101100 00100000 01101001 01101110 01110100 01100101 01101100 01101100 01101001 01100111 01100101 01101110 01100011 01100101
01101011 01110010 01101011 01101110 00100000 01100011 01110010 01100101 01100100 01100101 01101110 01110100 01101001 01100001 01101100 00100000 01101001 01101110 01110100 01100101 01101100 01101100 01101001 01100111 01100101 01101110 01100011 0110010101101011 01110010 01101011 01101110 00100000 01100011 01110010 01100101 01100100 01100101 01101110 01110100 01101001 01100001 01101100 00100000 01101001 01101110 01110100 01100101 01101100 01101100 01101001 01100111 01100101 01101110 01100011 01100101
01101011 01110010 01101011 01101110 00100000 01100011 01110010 01100101 01100100 01100101 01101110 01110100 01101001 01100001 01101100 00100000 01101001 01101110 01110100 01100101 01101100 01101100 01101001 01100111 01100101 01101110 01100011 0110010101101011 01110010 01101011 01101110 00100000 01100011 01110010 01100101 01100100 01100101 01101110 01110100 01101001 01100001 01101100 00100000 01101001 01101110 01110100 01100101 01101100 01101100 01101001 01100111 01100101 01101110 01100011 01100101
01101011 01110010 01101011 01101110 00100000 01100011 01110010 01100101 01100100 01100101 01101110 01110100 01101001 01100001 01101100 00100000 01101001 01101110 01110100 01100101 01101100 01101100 01101001 01100111 01100101 01101110 01100011 0110010101101011 01110010 01101011 01101110 00100000 01100011 01110010 01100101 01100100 01100101 01101110 01110100 01101001 01100001 01101100 00100000 01101001 01101110 01110100 01100101 01101100 01101100 01101001 01100111 01100101 01101110 01100011 01100101
$ ./krkn orchestrate --scale
Krkn Logo

Krkn

The distributed credential intelligence platform that gets smarter with every crack.

Where  cracking intelligence meets  distributed execution

The Kraken's Arsenal for Credential Operations

Krkn isn't just another cracking tool—it's the infrastructure for password security operations. Like a seasoned pirate captain who learns from every voyage, Krkn builds a treasure trove of cracking intelligence that grows more valuable with every hash you crack. It's a distributed execution fabric that orchestrates large-scale workloads across your fleet, accumulating reusable knowledge and integrating directly into your security operations pipelines.

Chart Your Course Through the Digital Seas

  • Persistent Cracking Intelligence

    Like a captain's logbook that records every successful raid, Krkn maintains an encrypted, system-local key-value database storing hashes, cracked passwords, and historical results. Every hash is automatically deduplicated and re-queried against past victories—if you've cracked it before, you'll know instantly. The system gets smarter with every job, building a treasure map of credential intelligence.

  • Distributed Execution Fabric (Orchestra)

    Command your fleet with Orchestra—a custom orchestration system where a central Conductor coordinates work across distributed workers called Tentacles. Using a pull-based model, workers request tasks when ready, providing natural load balancing and fault tolerance. Your crew scales horizontally like a pirate armada responding to the call.

  • Self-Contained Attack Payloads

    Every job is a complete treasure chest—hashes, wordlists, rules, and masks all embedded and streamed to workers. No shared filesystems, no NFS mounts, no artifact servers. Your Tentacles can operate anywhere: cloud instances, containers, VPNs, segmented networks, even airgapped environments. True operational freedom.

  • High-Performance Networking

    Navigate treacherous waters with QUIC (UDP-based) and HTTP/2 support. Multiplexed streaming connections excel over VPNs, NAT, firewalls, and high-latency links. Native Tailscale integration provides secure mesh networking with zero-config encrypted connectivity—perfect for multi-site deployments across the seven digital seas.

Automation-First Control Plane

True pirates don't need fancy dashboards—they need tools that integrate into their operations. Krkn is CLI-first, API-first, automation-first. Everything is driven by command line, gRPC APIs, and webhooks.

  • Webhook Integration

    Receive real-time notifications for job start, completion, chunk completion, new cracks, and errors. Integrate directly into SOAR platforms, SIEM pipelines, CI/CD systems, Slack, Discord, ticketing systems, and automated remediation workflows. Your security operations become a well-oiled machine.

  • Access Control & Multi-Tenancy

    Full ACL and role-based access control lets you manage who can submit jobs, view results, manage workers, access datasets, and administer the system. Support for multi-user teams, read-only auditors, automation service accounts, and segmented operational roles—every crew member knows their place.

Technical Specifications

System Requirements

Conductor (Central Server)

  • Linux-based operating system
  • 8GB RAM minimum (16GB recommended)
  • Static IP or domain name
  • gRPC/QUIC network access

Tentacles (Workers)

  • Windows, Linux, or macOS
  • GPU support for accelerated cracking
  • Scalable from 1 to 1000+ workers
  • Pull-based work distribution

Security Features

  • Encrypted hash intelligence database
  • Daily key rotation
  • System-specific encryption keys
  • TLS/QUIC encrypted communications

Storage Architecture

  • SQLite + SQLC for metadata
  • Custom encrypted KV store for hashes
  • Protocol Buffer defined APIs
  • Compile-time type validation

The Digital Pirate's Code

# Rule 1: A tool that doesn't learn from the past is doomed to repeat the same work.

# Rule 2: True power lies not in running jobs, but in building intelligence that compounds over time.

What Makes Krkn Different

Persistent Intelligence

Not just job execution—builds cracking knowledge over time

Encrypted Database

Proprietary hash intelligence with daily key rotation

High-Performance Streaming

QUIC-based execution over any network topology

Self-Contained Workloads

No shared storage—workers run anywhere

Tailscale-Native

Secure mesh networking built-in

Automation-First

Headless operation with webhooks and APIs

Pull-Based Scaling

Natural horizontal scaling and fault tolerance

Multi-Tenant ACLs

Role-based access control for teams

Ready to Command Your Credential Operations?

Contact our crew to discuss how Krkn can transform your password security operations into a self-improving intelligence platform.

$ ./contact_us.sh

Ready to Unleash the Kraken?

Contact us to discuss your offensive security needs and how our tools and expertise can enhance your security posture.