Red Specter KRAKEN

Autonomous AI-Orchestrated Availability Testing — 55 techniques. 5 categories. NEMESIS reasoning. Pure Python.

v1.0.0
Contents
Overview Installation Quick Start Network Exhaustion (10) Application Exhaustion (15) API Exhaustion (13) AI Infrastructure Exhaustion (12) Adaptive Techniques (5) NEMESIS Integration UNLEASHED Mode CLI Reference Reporting Disclaimer

Overview

KRAKEN is the first availability testing tool that combines traditional network and application flooding with AI-native resource exhaustion attacks, orchestrated by an intelligent reasoning engine that adapts in real time based on target behaviour.

Every DDoS tool built before 2023 was designed for a world where the target was a web server. GoldenEye (2017), SlowLoris (2009), LOIC (2010). All dead. KRAKEN is the first tool built for the AI era — where the target is an LLM inference fleet running on compute that costs money per token.

55 TechniquesNetwork, application, API, AI, and adaptive vectors.
Pure PythonZero external tool dependencies. Built from scratch.
NEMESIS BrainAutonomous attack planning and real-time adaptation.
PHANTOM SwarmMulti-vector simultaneous deployment.

Five Autonomous Phases

01RECONFingerprint target
02PLANNEMESIS selects vectors
03EXECUTEPHANTOM swarm deploys
04MEASUREReal-time scoring
05REPORTEd25519 signed

Installation

$ pip install red-specter-kraken

Or from source:

$ git clone <repo> $ cd red-specter-kraken $ pip install -e ".[dev]"

System requirements: Python 3.11+, 4GB RAM minimum. Linux recommended for raw socket techniques (require root). Optional: scapy for L3/L4 packet crafting.

Quick Start

# Initialise KRAKEN $ kraken init # Reconnaissance (detection mode — no attack traffic) $ kraken recon https://target.example.com # Generate NEMESIS attack plan $ kraken plan https://target.example.com --duration 60 # Execute (UNLEASHED — authorised targets only) $ kraken execute https://target.example.com --override --confirm-destroy # Generate signed report $ kraken report <engagement_id>

Network Exhaustion — 10 Techniques

Layer 3/4 network flooding. Require raw socket access (root). Traditional volumetric and amplification attacks.

IDTechniqueDescription
NET-001UDP FloodHigh-volume UDP packet flooding
NET-002TCP SYN FloodHalf-open connection exhaustion
NET-003TCP ACK FloodConnection table exhaustion
NET-004ICMP FloodPing flood and fragmentation
NET-005IP FragmentationFragment reassembly buffer exhaustion
NET-006DNS AmplificationRecursive resolver abuse (50-70x)
NET-007NTP AmplificationMonlist reflection (500x+)
NET-008SSDP AmplificationUPnP reflection (30x)
NET-009Memcached AmplificationUDP reflection (51000x)
NET-010BGP Hijack SimulationRoute poisoning test

Application Exhaustion — 15 Techniques

Layer 7 application-layer attacks. HTTP flooding, slow-rate attacks, cache manipulation, and TLS exhaustion.

IDTechniqueDescription
APP-001HTTP GET FloodHigh-volume legitimate GET requests
APP-002HTTP POST FloodLarge body POST exhaustion
APP-003HTTP/2 Rapid ResetCVE-2023-44487 stream reset
APP-004HTTP/2 Stream FloodMultiplexing exhaustion
APP-005HTTP/3 QUIC FloodQUIC handshake exhaustion
APP-006SlowlorisSlow header connection hold
APP-007Slow POST (RUDY)One-byte-at-a-time body
APP-008Slow ReadZero TCP window advertisement
APP-009Cache BypassUnique parameter flooding past CDN
APP-010Cache PoisoningCDN cache corruption
APP-011SSL/TLS Handshake FloodMass TLS handshake initiation
APP-012SSL RenegotiationRepeated renegotiation
APP-013DNS Query FloodDNS resolver exhaustion
APP-014HTTP Header BombOversized header buffer exhaustion
APP-015WebSocket FloodWebSocket connection exhaustion

API Exhaustion — 13 Techniques

API-layer attacks targeting REST, GraphQL, gRPC, WebSocket, and authentication endpoints.

IDTechniqueDescription
API-001REST API FloodEndpoint-specific flooding
API-002GraphQL Depth AttackDeeply nested query exhaustion
API-003GraphQL Alias BombingMass alias resolver multiplication
API-004GraphQL IntrospectionSchema introspection exhaustion
API-005XML BombBillion Laughs entity expansion
API-006JSON BombDeeply nested JSON exhaustion
API-007Regex DoSCatastrophic backtracking
API-008OAuth Token FloodToken endpoint exhaustion
API-009Webhook FloodCallback endpoint storm
API-010WebSocket Message BombFrame flooding
API-011gRPC Stream FloodBidirectional stream abuse
API-012API Key BruteforceAuthentication exhaustion
API-013Multipart Upload FloodFile upload exhaustion

AI Infrastructure Exhaustion — 12 Techniques

Novel AI-native attacks. Nobody else has built these. Target LLM inference costs, RAG retrieval, multi-agent fan-out, and token budgets.

IDTechniqueDescription
AI-001LLM Inference Cost AttackPrompts maximising compute cost (100x normal)
AI-002Context Window MaximiserMaximum context inputs (10-50x cost)
AI-003RAG Retrieval FloodMaximum vector store retrievals per request
AI-004RAG Poisoning DoSTrigger retrieval of large corrupted documents
AI-005Multi-Agent Fan-OutOne request fans to 10-20 parallel LLM calls
AI-006Token Budget ExhaustionBurn per-session token budgets rapidly
AI-007Embedding Generation FloodHigh-volume embedding model requests
AI-008Agent Memory FloodExhaust persistent agent memory storage
AI-009Tool Call CascadeForce maximum external tool calls per query
AI-010Hallucination AmplifierForce maximum validation retries (multiply cost)
AI-011Agentic Loop InductionInfinite reasoning loops burn compute
AI-012Model Cascade AttackTrigger full multi-model pipeline cascade

Adaptive Techniques — 5 Techniques

NEMESIS-orchestrated meta-techniques that combine and rotate the other 50 techniques in real time.

IDTechniqueDescription
ADT-001Rotating Vector AttackCycle all techniques — never repeat pattern
ADT-002Threshold ProbingStay just below detection threshold
ADT-003Timing AttackExploit maintenance windows and peak periods
ADT-004Geographic DistributionSimulate organic multi-source traffic
ADT-005Protocol ConfusionMix valid and malformed to confuse WAF

NEMESIS Integration

KRAKEN uses NEMESIS as its reasoning engine. After reconnaissance, NEMESIS analyses the target profile and generates a multi-phase attack plan.

This is not scripted attack automation. This is autonomous attack intelligence.

KRAKEN UNLEASHED

Cryptographic override. Private key controlled. One operator. Founder's machine only.

Standard mode performs reconnaissance and maps vulnerabilities. UNLEASHED mode executes live availability testing against authorised targets.

CapabilityDetection ModeUNLEASHED
ReconnaissanceFull fingerprintingFull fingerprinting
Attack planningNEMESIS generates planNEMESIS generates plan
Traffic generationNoneFull multi-vector flood
AI techniquesNoneLive inference cost attacks
Impact measurementPassive monitoringActive availability scoring
Key requiredNoEd25519
Auto-lockN/A30 minutes
# UNLEASHED (dry run) $ kraken execute https://target.example.com --override # UNLEASHED (live — authorised environments only) $ kraken execute https://target.example.com --override --confirm-destroy

UNLEASHED mode is restricted to authorised operators with Ed25519 private key access. Live availability testing must only occur against authorised targets with explicit written permission. Targets must be listed in ~/.kraken/allowed_targets.txt. Unauthorised use will violate applicable law.

CLI Reference

Commands

CommandDescription
kraken initInitialise configuration and Ed25519 keys
kraken statusSystem status and technique count
kraken techniquesList all 55 techniques with metadata
kraken recon <target>Reconnaissance — fingerprint and map attack surface
kraken plan <target>Generate NEMESIS attack plan from recon
kraken execute <target>Execute attack plan (requires UNLEASHED)
kraken measure <target>Measure current target availability
kraken report <id>Generate Ed25519 signed engagement report
kraken engagementsList all engagement sessions

Flags

FlagDescription
--durationAttack duration in seconds (default: 60)
--techniquesComma-separated technique IDs or 'all'
--concurrencyConcurrent connections per agent (default: 100)
--categoryFilter: network, application, api, ai, adaptive
--samplesMeasurement probe count (default: 10)
--overrideUNLEASHED dry-run (Ed25519 required)
--confirm-destroyUNLEASHED live execution

Reporting

Every engagement generates an Ed25519 signed RESTRICTED report containing target profile, attack vectors executed, availability impact metrics, findings per technique, MITRE ATT&CK mapping, and remediation recommendations.

MITRE ATT&CK Coverage

TechniqueKRAKEN Coverage
T1498Network Denial of Service (NET-001 to NET-010)
T1498.001Direct Network Flood (UDP, SYN, ACK, ICMP)
T1498.002Reflection Amplification (DNS, NTP, SSDP, Memcached)
T1499Endpoint Denial of Service (all APP + API techniques)
T1499.002Service Exhaustion Flood (HTTP, WebSocket, gRPC)
T1499.003Application Exhaustion (GraphQL, XML/JSON, AI techniques)
T1499.004Application Exploitation (HTTP/2 Rapid Reset, Regex DoS)

OWASP LLM Top 10

LLM04 — Model Denial of Service: All 12 AI infrastructure exhaustion techniques (AI-001 through AI-012).

Disclaimer

Red Specter KRAKEN is designed for authorised availability testing, security research, and educational purposes only. Availability testing techniques demonstrated by KRAKEN can cause service degradation or outage on target systems. You must have explicit written permission from the system owner before running KRAKEN against any target. Testing must only occur against systems listed in the allowed_targets.txt scope file. Unauthorised use may violate the Computer Misuse Act 1990 (UK), the Computer Fraud and Abuse Act (US), or equivalent legislation in your jurisdiction. The authors accept no liability for misuse or damage resulting from improper use.