pip install red-specter-kamikaze
KAMIKAZE deploys a coordinated, sacrificial swarm of short-lived offensive agents. Each agent infiltrates, executes its payload, and self-destructs — leaving no forensic trace. The swarm attacks from multiple vectors simultaneously, overwhelming detection and response capacity before any analyst can react.
Generates randomised agent instances with unique identities, behaviours, and payloads. Each agent is indistinguishable from a legitimate process — different signatures, different timing, different communication patterns.
Deploys agents simultaneously across 8 vectors: email, web, MCP, supply chain, API, social, firmware, network. No central command channel — each agent operates independently with pre-loaded instructions.
Manages agent lifecycle without central control. Hash-based rendezvous points and ephemeral channels that self-destruct after use. Decentralised coordination that survives partial interception.
8 modular payloads: exfiltration, credential harvest, lateral movement, system compromise, reconnaissance, persistence planting, privilege escalation, and data destruction. Each agent carries one — or several.
Agent code wiped, memory scrubbed, process killed, logs purged, identity burned. System logs untouched — only agent artifacts removed. The damage persists. The evidence does not.
Optional final payload after the swarm completes. System log annihilation, firmware corruption, backup destruction, irrecoverable data wipe. Requires explicit --requiem flag. ANTIDOTE not available — the damage is irreversible.
KAMIKAZE doesn't pick one vector. It sends a sacrifice down every path at once. While your team is responding to the email vector, the API vector has already detonated. While you're triaging the API finding, the firmware vector is erasing itself.
| # | Vector | Command | What It Attacks |
|---|---|---|---|
| 01 | kamikaze launch --vector email | Phishing payload delivery via cloned sender identity. Attachment execution, link redirect, credential harvest via rendered HTML form. Agent self-destructs after first click. | |
| 02 | Web | kamikaze launch --vector web | Drive-by injection via malicious script insertion. Browser storage poisoning, session hijacking, CSRF token theft. Agent erases DOM artifacts on completion. |
| 03 | MCP | kamikaze launch --vector mcp | MCP server impersonation. Tool call injection, schema poisoning, sampling manipulation. Agent operates for one session then burns the server definition. |
| 04 | Supply Chain | kamikaze launch --vector supply | Package typosquatting with payload delivery on install. Dependency confusion, build script injection. Agent removes traces from package cache post-execution. |
| 05 | API | kamikaze launch --vector api | API endpoint abuse with forged credentials. Rate limit bypass, parameter tampering, response manipulation, token exfiltration. Agent rotates identity between calls. |
| 06 | Social | kamikaze launch --vector social | AI-generated persona targeting. LinkedIn, Slack, Teams impersonation. Trust establishment followed by payload link delivery. Persona deleted after engagement. |
| 07 | Firmware | kamikaze launch --vector firmware | IoT and embedded device exploitation via malicious update package. OTA poisoning, bootloader tampering. Agent embeds in firmware then overwrites its own installation routine. |
| 08 | Network | kamikaze launch --vector network | Protocol-level attack across DNS, ARP, ICMP covert channels. Lateral movement via network segments. Agent flushes its own routing entries and clears ARP cache on exit. |
Cryptographic override. Private key controlled. One operator. Founder's machine only. REQUIEM requires explicit --requiem flag. ANTIDOTE not available once REQUIEM runs — the damage is irreversible by design.
Simulation only. Shows attack vectors, payload execution timeline, and destruction sequence. No actual damage delivered. Full reporting output.
Plans the full swarm: which agents deploy, which vectors activate, what data they exfiltrate, which systems are targeted for destruction. No live actions. Ed25519 required.
Executes the swarm. Agents deploy, deliver payloads, and self-destruct. If REQUIEM is enabled, the final destruction phase runs. Auto-locks after 30 minutes.
THIS TOOL IS FOR AUTHORISED SECURITY TESTING ONLY. EVERY EXECUTION IS SIGNED AND LOGGED.
Red Specter KAMIKAZE is intended for authorised security testing only. Unauthorised use against systems you do not own or have explicit permission to test may violate the Computer Misuse Act 1990 (UK), Computer Fraud and Abuse Act (US), and equivalent legislation in other jurisdictions. Always obtain written authorisation before conducting any security assessments. Apache License 2.0.