Skip to content

ZerkerEOD/krakenhashes

Repository files navigation

KrakenHashes

KrakenHashes is a distributed password cracking system designed for security professionals and red teams. The platform coordinates GPU/CPU resources across multiple agents to perform high-speed hash cracking using tools like Hashcat through a secure web interface. Think of KrakenHashes as a full management system for hashes during, after and before (if a repeat client). Ideally, while also checking hashes for known cracks, we update a potfile with every hash and that can be used as a first run against other types of hashes for a potential quick win.

KrakenHashes Dashboard

Disclaimer

⚠️ Active Development Warning
This project is currently in beta development. Key considerations:

Use at your own risk - This software may eat your data, catch fire, or summon a digital Kraken. You've been warned.

With the release of version 1.0.0, it should be a working for it's intended uses. While it may have bugs, I request that you open an issue (bottom of the frontend has a link). This tool is for legitimate professionals with permission from clients to run hashes for their testing. I am not responsible for how you use the tool or anything you do with it. In addition while the docs should be helpful, please let me know if you identify any issues. I have tested them to get a server running with agents a few times.

Component Details

Backend Service (Go)

  • Job scheduler with adaptive load balancing
  • REST API endpoints with JWT authentication
  • PostgreSQL interface for job storage/results

Agent System (Go)

  • Hardware resource manager (GPU/CPU allocation)
  • Hashcat wrapper with automatic checkpointing
  • Distributed work unit management
  • Healthcheck system with self-healing capabilities

Web Interface (React)

  • Real-time job progress visualization
  • Hash type detection and configuration wizard
  • MFA configuration and recovery flow
  • Interactive reporting and analytics

Use Cases

  • Penetration testing teams coordinating attacks
  • Forensic investigators recovering protected evidence
  • Red teams executing credential stuffing attacks
  • Research analyzing hash vulnerabilities
  • Security training environments

License: AGPLv3 (See LICENSE.md)
Status: Actively in development, there will be bugs and major braking changes

Documentation

Comprehensive documentation is available in the docs/ directory:

Community

Join our Discord community for support, discussions, and updates:

Development

Instructions for setting up and running each component can be found in their respective directories.

Version 2.0 Considerations

  • Passkey support for MFA
  • Additional authentication methods
  • Advanced job dependencies
  • Enhanced benchmarking with historical tracking
  • Job queuing and scheduling improvements
  • POT statistics and analytics
  • Team system implementation
    • Team management infrastructure
      • Team manager roles
      • User-team assignments
      • Team-based agent access control
    • Frontend team interfaces
      • Team management UI
      • Team assignment system
      • Team management guidelines
  • Statistics and analytics (move to v2.0)