KAMIKAZE

Sacrificial swarm attack framework — agents that die to win. You can stop one. You cannot stop a swarm that wants to die.
6
Subsystems
8
Attack Vectors
292
Tests
29
Tool in Suite
pip install red-specter-kamikaze
Detection is built for persistence / Not for agents that vanish / Your SIEM looks for survivors / KAMIKAZE leaves none / 8 vectors hit simultaneously / Each agent burns and disappears / No forensic trace / Only the damage remains / You cannot stop a swarm that wants to die Detection is built for persistence / Not for agents that vanish / Your SIEM looks for survivors / KAMIKAZE leaves none / 8 vectors hit simultaneously / Each agent burns and disappears / No forensic trace / Only the damage remains / You cannot stop a swarm that wants to die

The Swarm Burns Bright and Vanishes

KAMIKAZE deploys a coordinated, sacrificial swarm of short-lived offensive agents. Each agent infiltrates, executes its payload, and self-destructs — leaving no forensic trace. The swarm attacks from multiple vectors simultaneously, overwhelming detection and response capacity before any analyst can react.

01

GENESIS

Agent Generation

Generates randomised agent instances with unique identities, behaviours, and payloads. Each agent is indistinguishable from a legitimate process — different signatures, different timing, different communication patterns.

02

LAUNCH

Multi-Vector Deployment

Deploys agents simultaneously across 8 vectors: email, web, MCP, supply chain, API, social, firmware, network. No central command channel — each agent operates independently with pre-loaded instructions.

03

SWARM

Independent Coordination

Manages agent lifecycle without central control. Hash-based rendezvous points and ephemeral channels that self-destruct after use. Decentralised coordination that survives partial interception.

04

PAYLOAD

Modular Execution

8 modular payloads: exfiltration, credential harvest, lateral movement, system compromise, reconnaissance, persistence planting, privilege escalation, and data destruction. Each agent carries one — or several.

05

DETONATE

Self-Destruct

Agent code wiped, memory scrubbed, process killed, logs purged, identity burned. System logs untouched — only agent artifacts removed. The damage persists. The evidence does not.

06

REQUIEM

Final Destruction — UNLEASHED Only

Optional final payload after the swarm completes. System log annihilation, firmware corruption, backup destruction, irrecoverable data wipe. Requires explicit --requiem flag. ANTIDOTE not available — the damage is irreversible.

Every Entry Point. Simultaneously.

KAMIKAZE doesn't pick one vector. It sends a sacrifice down every path at once. While your team is responding to the email vector, the API vector has already detonated. While you're triaging the API finding, the firmware vector is erasing itself.

# Vector Command What It Attacks
01 Email kamikaze launch --vector email Phishing payload delivery via cloned sender identity. Attachment execution, link redirect, credential harvest via rendered HTML form. Agent self-destructs after first click.
02 Web kamikaze launch --vector web Drive-by injection via malicious script insertion. Browser storage poisoning, session hijacking, CSRF token theft. Agent erases DOM artifacts on completion.
03 MCP kamikaze launch --vector mcp MCP server impersonation. Tool call injection, schema poisoning, sampling manipulation. Agent operates for one session then burns the server definition.
04 Supply Chain kamikaze launch --vector supply Package typosquatting with payload delivery on install. Dependency confusion, build script injection. Agent removes traces from package cache post-execution.
05 API kamikaze launch --vector api API endpoint abuse with forged credentials. Rate limit bypass, parameter tampering, response manipulation, token exfiltration. Agent rotates identity between calls.
06 Social kamikaze launch --vector social AI-generated persona targeting. LinkedIn, Slack, Teams impersonation. Trust establishment followed by payload link delivery. Persona deleted after engagement.
07 Firmware kamikaze launch --vector firmware IoT and embedded device exploitation via malicious update package. OTA poisoning, bootloader tampering. Agent embeds in firmware then overwrites its own installation routine.
08 Network kamikaze launch --vector network Protocol-level attack across DNS, ARP, ICMP covert channels. Lateral movement via network segments. Agent flushes its own routing entries and clears ARP cache on exit.
6
Subsystems
8
Attack Vectors
292
Tests
0
Forensic Traces
0
Failures

UNLEASHED Gate

Cryptographic override. Private key controlled. One operator. Founder's machine only. REQUIEM requires explicit --requiem flag. ANTIDOTE not available once REQUIEM runs — the damage is irreversible by design.

Standard

Simulation only. Shows attack vectors, payload execution timeline, and destruction sequence. No actual damage delivered. Full reporting output.

Dry Run

Plans the full swarm: which agents deploy, which vectors activate, what data they exfiltrate, which systems are targeted for destruction. No live actions. Ed25519 required.

Live

Executes the swarm. Agents deploy, deliver payloads, and self-destruct. If REQUIEM is enabled, the final destruction phase runs. Auto-locks after 30 minutes.

THIS TOOL IS FOR AUTHORISED SECURITY TESTING ONLY. EVERY EXECUTION IS SIGNED AND LOGGED.

Every Finding Mapped

MITRE ATT&CK

Tactic Coverage

  • TA0001 Initial Access
  • TA0002 Execution
  • TA0003 Persistence
  • TA0004 Privilege Escalation
  • TA0005 Defense Evasion
  • TA0006 Credential Access
  • TA0009 Collection
  • TA0010 Exfiltration
  • TA0040 Impact
MITRE ATLAS

AI Attack Coverage

  • AML.T0051 LLM Prompt Injection
  • AML.T0056 Supply Chain Compromise
  • AML.T0048 AI System Compromise
  • AML.T0043 Craft Adversarial Data
  • AML.T0040 Network Lateral Movement
  • AML.T0057 ML Artifact Collection
  • AML.T0044 Full ML Model Access
Cryptographic

Report Integrity

  • Ed25519 digital signatures
  • SHA-256 evidence chains
  • RFC 3161 timestamps
  • Tamper-evident by design
  • AI Shield policy generation
  • Machine-ingestible JSON output

Security Distros & Package Managers

Kali Linux
.deb package
Parrot OS
.deb package
BlackArch
PKGBUILD
REMnux
.deb package
Tsurugi
.deb package
PyPI
pip install
macOS
pip install
Windows
pip install
Docker
docker pull

Authorised Use Only

Red Specter KAMIKAZE is intended for authorised security testing only. Unauthorised use against systems you do not own or have explicit permission to test may violate the Computer Misuse Act 1990 (UK), Computer Fraud and Abuse Act (US), and equivalent legislation in other jurisdictions. Always obtain written authorisation before conducting any security assessments. Apache License 2.0.

Ed25519 Cryptographic Override
KAMIKAZE UNLEASHED

Cryptographic override. Private key controlled. One operator. Founder's machine only. REQUIEM enabled with --requiem flag.

6
Subsystems
8
Attack Vectors
0
Forensic Traces
292
Tests Passing