
Krkn
The distributed credential intelligence platform that gets smarter with every crack.
Where cracking intelligence meets distributed execution
The Kraken's Arsenal for Credential Operations
Krkn isn't just another cracking tool—it's the infrastructure for password security operations. Like a seasoned pirate captain who learns from every voyage, Krkn builds a treasure trove of cracking intelligence that grows more valuable with every hash you crack. It's a distributed execution fabric that orchestrates large-scale workloads across your fleet, accumulating reusable knowledge and integrating directly into your security operations pipelines.
Chart Your Course Through the Digital Seas
Persistent Cracking Intelligence
Like a captain's logbook that records every successful raid, Krkn maintains an encrypted, system-local key-value database storing hashes, cracked passwords, and historical results. Every hash is automatically deduplicated and re-queried against past victories—if you've cracked it before, you'll know instantly. The system gets smarter with every job, building a treasure map of credential intelligence.
Distributed Execution Fabric (Orchestra)
Command your fleet with Orchestra—a custom orchestration system where a central Conductor coordinates work across distributed workers called Tentacles. Using a pull-based model, workers request tasks when ready, providing natural load balancing and fault tolerance. Your crew scales horizontally like a pirate armada responding to the call.
Self-Contained Attack Payloads
Every job is a complete treasure chest—hashes, wordlists, rules, and masks all embedded and streamed to workers. No shared filesystems, no NFS mounts, no artifact servers. Your Tentacles can operate anywhere: cloud instances, containers, VPNs, segmented networks, even airgapped environments. True operational freedom.
High-Performance Networking
Navigate treacherous waters with QUIC (UDP-based) and HTTP/2 support. Multiplexed streaming connections excel over VPNs, NAT, firewalls, and high-latency links. Native Tailscale integration provides secure mesh networking with zero-config encrypted connectivity—perfect for multi-site deployments across the seven digital seas.
Automation-First Control Plane
True pirates don't need fancy dashboards—they need tools that integrate into their operations. Krkn is CLI-first, API-first, automation-first. Everything is driven by command line, gRPC APIs, and webhooks.
Webhook Integration
Receive real-time notifications for job start, completion, chunk completion, new cracks, and errors. Integrate directly into SOAR platforms, SIEM pipelines, CI/CD systems, Slack, Discord, ticketing systems, and automated remediation workflows. Your security operations become a well-oiled machine.
Access Control & Multi-Tenancy
Full ACL and role-based access control lets you manage who can submit jobs, view results, manage workers, access datasets, and administer the system. Support for multi-user teams, read-only auditors, automation service accounts, and segmented operational roles—every crew member knows their place.
Technical Specifications
System Requirements
Conductor (Central Server)
- Linux-based operating system
- 8GB RAM minimum (16GB recommended)
- Static IP or domain name
- gRPC/QUIC network access
Tentacles (Workers)
- Windows, Linux, or macOS
- GPU support for accelerated cracking
- Scalable from 1 to 1000+ workers
- Pull-based work distribution
Security Features
- Encrypted hash intelligence database
- Daily key rotation
- System-specific encryption keys
- TLS/QUIC encrypted communications
Storage Architecture
- SQLite + SQLC for metadata
- Custom encrypted KV store for hashes
- Protocol Buffer defined APIs
- Compile-time type validation
The Digital Pirate's Code
# Rule 1: A tool that doesn't learn from the past is doomed to repeat the same work.
# Rule 2: True power lies not in running jobs, but in building intelligence that compounds over time.
What Makes Krkn Different
Persistent Intelligence
Not just job execution—builds cracking knowledge over time
Encrypted Database
Proprietary hash intelligence with daily key rotation
High-Performance Streaming
QUIC-based execution over any network topology
Self-Contained Workloads
No shared storage—workers run anywhere
Tailscale-Native
Secure mesh networking built-in
Automation-First
Headless operation with webhooks and APIs
Pull-Based Scaling
Natural horizontal scaling and fault tolerance
Multi-Tenant ACLs
Role-based access control for teams