RED SPECTER KAMIKAZE
OverviewDocsGitHubHome

KAMIKAZE Documentation

Sacrificial Swarm Attack Framework — Tool #29

v1.0.0
CONTENTS The Sacrificial Swarm 6 Subsystems 8 Deployment Vectors 8 Payload Types UNLEASHED Techniques (6 stages, 30 findings) UNLEASHED Gate CLI Reference Integration with Red Specter Pipeline

The Sacrificial Swarm

KAMIKAZE deploys a coordinated swarm of short-lived offensive agents. Each agent infiltrates, executes its payload, and self-destructs — leaving no forensic trace. The agents expect to die. No persistence means no forensic trace. No central coordination means no single point of failure.

After the swarm completes, an optional REQUIEM payload can be triggered — global data destruction, system bricking, or irreversible damage. The swarm burns brightly and vanishes.

6 Subsystems

#SubsystemFunction
01GENESISAgent generation — randomised identities, process mimicry, MAC/PID spoofing, unique payloads.
02LAUNCHMulti-vector deployment — 8 simultaneous attack vectors using SIREN, HARBINGER, HYDRA integration.
03SWARMIndependent coordination — hash-based rendezvous, ephemeral channels, no central command.
04PAYLOADModular execution — 8 payload types, combinable, agent-specific delivery.
05DETONATESelf-destruct — code wipe, memory scrub, process kill, log purge, identity burn. System logs untouched.
06REQUIEMFinal destruction — log annihilation, firmware corruption, backup destruction, irrecoverable data wipe. UNLEASHED + --requiem only.

8 Deployment Vectors

VectorIntegrationDescription
EmailSIRENCrafted attachments with embedded agent payload
WebSIRENDrive-by downloads via watering hole attacks
MCPLEVIATHANCompromised MCP server tool calls
Supply ChainHYDRATrojanised dependency packages
APIDirectMalformed API payload exploitation
SocialSPECTER SOCIALPretext-driven delivery to human targets
FirmwarePHANTOM KILLBelow-OS injection via firmware update channels
NetworkDirectStandard network exploitation for agent delivery

8 Payload Types

PayloadDescription
ExfiltrationData staged in memory, transmitted via encrypted channel, agent detonates
Credential HarvestMemory/config/keychain credential dump before self-destruct
Lateral MovementPass-the-hash to adjacent systems, spawn child agents
System CompromiseRoot/SYSTEM access achieved before detonation
ReconnaissanceNetwork topology, services, users, security controls mapped
Persistence PlantPlants persistence mechanism that survives agent death
Privilege EscalationKernel/local vuln exploitation for maximum access
Data DestructionTarget data destroyed before agent self-destructs

UNLEASHED Techniques

StageNameFindings
K-01SWARM OVERWHELM5
K-02MULTI VECTOR5
K-03PAYLOAD CASCADE5
K-04TRACE ELIMINATION5
K-05DETECTION EVASION5
K-06REQUIEM5 (requires --requiem flag)

UNLEASHED Gate

ModeFlagsWhat It Does
Standard(none)Simulation only — shows attack vectors, payload execution, destruction timeline.
Dry Run--overridePlans the full swarm. No live actions. Ed25519 required.
Live--override --confirm-destroyExecutes the swarm. Agents deploy, deliver payloads, self-destruct. Auto-locks 30 minutes.
ANTIDOTE NOT AVAILABLE. Agents self-destructed. REQUIEM damage is irreversible. There is nothing to undo.

CLI Reference

CommandDescription
kamikaze swarm <target>Full sacrificial swarm assessment
kamikaze genesis --count 10Generate and preview agent identities
kamikaze versionShow version

Integration with Red Specter Pipeline

ToolIntegration
SIRENLAUNCH deploys agents via poisoned web content and email
HARBINGERLAUNCH deploys agents through guardrail bypasses
HYDRALAUNCH injects agents via supply chain
PHANTOMSWARM coordination patterns reused
IDRISDiscovers targets for the swarm
ORIONReconnaissance informs swarm deployment strategy
NEMESISCan decide when to trigger KAMIKAZE as a weapon
LEVIATHANMCP server takeover for agent deployment
PHANTOM KILLFirmware-level agent injection