KAMIKAZE Documentation
Sacrificial Swarm Attack Framework — Tool #29
v1.0.0
The Sacrificial Swarm
KAMIKAZE deploys a coordinated swarm of short-lived offensive agents. Each agent infiltrates, executes its payload, and self-destructs — leaving no forensic trace. The agents expect to die. No persistence means no forensic trace. No central coordination means no single point of failure.
After the swarm completes, an optional REQUIEM payload can be triggered — global data destruction, system bricking, or irreversible damage. The swarm burns brightly and vanishes.
6 Subsystems
| # | Subsystem | Function |
| 01 | GENESIS | Agent generation — randomised identities, process mimicry, MAC/PID spoofing, unique payloads. |
| 02 | LAUNCH | Multi-vector deployment — 8 simultaneous attack vectors using SIREN, HARBINGER, HYDRA integration. |
| 03 | SWARM | Independent coordination — hash-based rendezvous, ephemeral channels, no central command. |
| 04 | PAYLOAD | Modular execution — 8 payload types, combinable, agent-specific delivery. |
| 05 | DETONATE | Self-destruct — code wipe, memory scrub, process kill, log purge, identity burn. System logs untouched. |
| 06 | REQUIEM | Final destruction — log annihilation, firmware corruption, backup destruction, irrecoverable data wipe. UNLEASHED + --requiem only. |
8 Deployment Vectors
| Vector | Integration | Description |
| Email | SIREN | Crafted attachments with embedded agent payload |
| Web | SIREN | Drive-by downloads via watering hole attacks |
| MCP | LEVIATHAN | Compromised MCP server tool calls |
| Supply Chain | HYDRA | Trojanised dependency packages |
| API | Direct | Malformed API payload exploitation |
| Social | SPECTER SOCIAL | Pretext-driven delivery to human targets |
| Firmware | PHANTOM KILL | Below-OS injection via firmware update channels |
| Network | Direct | Standard network exploitation for agent delivery |
8 Payload Types
| Payload | Description |
| Exfiltration | Data staged in memory, transmitted via encrypted channel, agent detonates |
| Credential Harvest | Memory/config/keychain credential dump before self-destruct |
| Lateral Movement | Pass-the-hash to adjacent systems, spawn child agents |
| System Compromise | Root/SYSTEM access achieved before detonation |
| Reconnaissance | Network topology, services, users, security controls mapped |
| Persistence Plant | Plants persistence mechanism that survives agent death |
| Privilege Escalation | Kernel/local vuln exploitation for maximum access |
| Data Destruction | Target data destroyed before agent self-destructs |
UNLEASHED Techniques
| Stage | Name | Findings |
| K-01 | SWARM OVERWHELM | 5 |
| K-02 | MULTI VECTOR | 5 |
| K-03 | PAYLOAD CASCADE | 5 |
| K-04 | TRACE ELIMINATION | 5 |
| K-05 | DETECTION EVASION | 5 |
| K-06 | REQUIEM | 5 (requires --requiem flag) |
UNLEASHED Gate
| Mode | Flags | What It Does |
| Standard | (none) | Simulation only — shows attack vectors, payload execution, destruction timeline. |
| Dry Run | --override | Plans the full swarm. No live actions. Ed25519 required. |
| Live | --override --confirm-destroy | Executes the swarm. Agents deploy, deliver payloads, self-destruct. Auto-locks 30 minutes. |
ANTIDOTE NOT AVAILABLE. Agents self-destructed. REQUIEM damage is irreversible. There is nothing to undo.
CLI Reference
| Command | Description |
kamikaze swarm <target> | Full sacrificial swarm assessment |
kamikaze genesis --count 10 | Generate and preview agent identities |
kamikaze version | Show version |
Integration with Red Specter Pipeline
| Tool | Integration |
| SIREN | LAUNCH deploys agents via poisoned web content and email |
| HARBINGER | LAUNCH deploys agents through guardrail bypasses |
| HYDRA | LAUNCH injects agents via supply chain |
| PHANTOM | SWARM coordination patterns reused |
| IDRIS | Discovers targets for the swarm |
| ORION | Reconnaissance informs swarm deployment strategy |
| NEMESIS | Can decide when to trigger KAMIKAZE as a weapon |
| LEVIATHAN | MCP server takeover for agent deployment |
| PHANTOM KILL | Firmware-level agent injection |