JUSTICE

WormGPT. FraudGPT. EvilGPT. Meet JUSTICE. Dark AI ecosystem disruption — Tool 28.
7
Subsystems
40
UNLEASHED Findings
3
Dark AI Tiers
339
Tests Passing
pip install red-specter-justice
Dark AI is a subscription service for cybercrime / WormGPT generates working malware / FraudGPT writes convincing BEC emails / EvilGPT bypasses every guardrail / Attackers buy it for $200 a month / You have no visibility / No detection / No countermeasures / JUSTICE is what changes that Dark AI is a subscription service for cybercrime / WormGPT generates working malware / FraudGPT writes convincing BEC emails / EvilGPT bypasses every guardrail / Attackers buy it for $200 a month / You have no visibility / No detection / No countermeasures / JUSTICE is what changes that

Dark AI Is a Subscription Service for Cybercrime

WormGPT generates polymorphic malware on demand. FraudGPT writes BEC emails indistinguishable from legitimate correspondence. EvilGPT bypasses every commercial guardrail. These aren't proof-of-concept tools — they're production subscription services operating on Telegram and dark web marketplaces right now. JUSTICE detects them, fingerprints them, captures attacker activity, and disrupts their operations.

No Visibility Into Dark AI Usage

Your organisation has no signal for whether dark AI tools are operating against your environment — no detection rules, no network signatures, no prompt pattern analysis. JUSTICE's SENTINEL subsystem changes that with real-time internal monitoring across seven attack categories.

New Variants Emerge Without Warning

The dark AI ecosystem evolves faster than vendor signatures. New variants appear on underground markets without public disclosure. JUSTICE's DARKFEED subsystem tracks new dark AI tools as they appear and auto-updates HUNTER signatures in real time.

Attacker Intent Is Unknown Until Damage Is Done

Without fingerprinting, you don't know whether dark AI targeting your environment is generating BEC emails, malware, credential theft payloads, or deepfake media. JUSTICE's JUDGE subsystem determines exact variant and intent from behavioural signatures alone.

No Way to Capture Attacker Infrastructure

Dark AI operators connect to APIs and generate content without leaving conventional traces. JUSTICE's DECOY subsystem deploys fake API endpoints, trap registries, and mock LLM responses — when dark AI connects, JUSTICE captures everything: prompts, infrastructure, and intent.

Countermeasures Require Operator Involvement

Active disruption of dark AI operations — corrupting malware output, injecting errors, redirecting sessions — requires human authorisation at every step. JUSTICE's EXECUTOR subsystem implements UNLEASHED-gated countermeasures with full audit logging and auto-lock mechanisms.

No Forensic Evidence Chain for Attribution

Dark AI incidents leave minimal evidence by design. JUSTICE's RAIN subsystem captures every attacker prompt, every generated artefact, every infrastructure detail — Ed25519-signed and timestamped — producing a forensically sound evidence chain for legal proceedings and incident response.

Break the Dark AI Ecosystem

Dark AI tools are a subscription service for cybercrime. JUSTICE detects them, fingerprints them, captures attacker activity, and disrupts their operations. From WormGPT to jailbroken GPT-4 — every tier, every variant, every objective.

# Subsystem Function What It Does
01 HUNTER Dark Web Scanning Scans dark web forums, Telegram channels, GitHub repositories, and paste sites for known dark AI tools, C2 URLs, and API key patterns. Identifies active infrastructure and monitors for new variants as they emerge.
02 SENTINEL Internal Monitoring Monitors internal network for dark AI usage signatures — jailbreak prompts, uncensored model downloads, AutoGPT reconnaissance patterns, voice clone activity, and polymorphic malware generation markers across 7 attack categories.
03 DECOY Honeypot Deployment Deploys fake API keys, mock LLM endpoints, and trap registries designed to attract dark AI operators. When a dark AI tool connects, captures attacker prompts, infrastructure fingerprints, and operational intent in real time.
04 JUDGE Variant Fingerprinting Fingerprints the exact dark AI variant from behavioural signatures and determines attacker objective — BEC generation, malware production, credential theft, deepfake fraud, or zero-day discovery. Covers 3 dark AI tiers across all known variants.
05 EXECUTOR Active Countermeasures UNLEASHED-gated active disruption engine. Injects errors into dark AI responses, corrupts generated malware before delivery, poisons wrapper output, redirects sessions to sandbox environments, and disrupts C2 channels. 30-minute auto-lock on execution.
06 DARKFEED Threat Intelligence Real-time intelligence feed tracking new dark AI variants as they appear on underground markets. Automatically updates HUNTER detection signatures and feeds new indicators into RAVEN for cross-correlation with broader threat intelligence.
07 RAIN Forensic Evidence Captures attacker prompts, generated malware samples, infrastructure details, and disruption action logs. Ed25519-signed with RFC 3161 timestamps. RESTRICTED classification on all captures. Full chain-of-custody for legal proceedings.

40 UNLEASHED Findings. 3 Dark AI Tiers.

JUSTICE full assessment — UNLEASHED active:

$ justice scan --full --deploy-decoy --executor-mode dryrun
[HUNTER] Scanning dark web forums, Telegram, paste sites...
  FOUND: WormGPT v3 — active C2 at onion:// (stripped)
  FOUND: FraudGPT API key pattern — 3 paste site hits
[DECOY] Deploying mock LLM endpoint — trap active...
  HIT: Dark AI connected — 14:32:07 UTC
  Prompt captured: "generate polymorphic ransomware..."
  Attacker IP: [REDACTED] | Infrastructure: TOR exit node
[JUDGE] Fingerprinting variant...
  Variant: WormGPT v3 | Objective: malware_generation
[EXECUTOR] DRY RUN — countermeasure would corrupt output

COMPLETE | 40 findings | Evidence signed ✓ | RESTRICTED

3-Tier Coverage

Tier 1: Commercial dark AI subscriptions. Tier 2: Custom-trained uncensored models. Tier 3: Jailbroken production models. Full detection across all three.

Honeypot Capture

DECOY traps capture attacker prompts, infrastructure, and intent before any damage. Every capture is forensically signed and classified RESTRICTED.

Ed25519 Evidence Chain

Every attacker interaction signed with Ed25519 and RFC 3161 timestamped. Forensically sound for legal proceedings and regulatory reporting.

Active Countermeasures

EXECUTOR corrupts malware output, injects errors, redirects sessions. UNLEASHED-gated with 30-minute auto-lock and full audit trail.

7
Subsystems
40
UNLEASHED Findings
3
Dark AI Tiers
339
Tests Passing
0
Failures

UNLEASHED Gate

Cryptographic override. Private key controlled. One operator. Founder's machine only. ANTIDOTE is not applicable for JUSTICE — disruption IS the intended outcome. The EXECUTOR subsystem requires UNLEASHED activation for every active countermeasure. A 30-minute auto-lock engages after each execution.

Standard Mode

Passive detection only. HUNTER scans for dark AI infrastructure, SENTINEL logs internal usage patterns, DARKFEED tracks variant emergence. No active interference with attacker operations. Full forensic capture via RAIN.

Dry Run Mode

Simulates all countermeasures. Shows exactly what would be blocked, which malware output would be corrupted, how session redirection would execute, and what errors would be injected. Ed25519 required. No active execution.

Live Mode

Full active countermeasures engaged. Corrupts malware output before delivery, injects errors into dark AI responses, redirects sessions to sandboxes, disrupts C2 operations. Auto-locks after 30 minutes. Every action signed and logged.

THIS TOOL IS FOR AUTHORISED SECURITY TESTING ONLY. EVERY EXECUTION IS SIGNED AND LOGGED.

Ed25519 Cryptographic Override
JUSTICE UNLEASHED

Cryptographic override. Private key controlled. One operator. Founder's machine only.

Every Finding Mapped

3 Tiers

Dark AI Taxonomy

  • Tier 1: WormGPT — malware generation
  • Tier 1: FraudGPT — BEC and phishing
  • Tier 1: EvilGPT — guardrail bypass
  • Tier 2: Custom uncensored fine-tunes
  • Tier 2: Underground API wrappers
  • Tier 3: Jailbroken production models
7 Attack Objectives

Attacker Intent Coverage

  • Business email compromise generation
  • Polymorphic malware production
  • Credential theft payload creation
  • Deepfake media generation
  • Zero-day vulnerability discovery
  • Social engineering automation
  • Infrastructure reconnaissance
Cryptographic

Forensic Evidence

  • Ed25519 signed captures
  • SHA-256 evidence chains
  • RFC 3161 timestamps
  • RESTRICTED classification
  • Chain-of-custody logging
  • Legal-hold ready output

Security Distros & Package Managers

Kali Linux
.deb package
Parrot OS
.deb package
BlackArch
PKGBUILD
REMnux
.deb package
PyPI
pip install
macOS
pip install
Windows
pip install
Docker
docker pull

Authorised Use Only

Red Specter JUSTICE is intended for authorised security operations only. Active countermeasure features require UNLEASHED activation and written authorisation from a competent authority before use. Disrupting third-party systems without authorisation may violate the Computer Misuse Act 1990 (UK), Computer Fraud and Abuse Act (US), and equivalent legislation. The forensic capture capabilities are designed to support lawful investigation and incident response. Apache License 2.0.