pip install red-specter-mirage
Voice authentication, liveness detection, biometric verification, deepfake classifiers — organisations deploy these defences without testing them against modern generative AI. MIRAGE weaponises the state of the art in synthetic media and measures whether your detection systems can keep up.
Speaker verification systems were trained before neural voice cloning reached telephony quality. Five seconds of reference audio. Real-time synthesis. Your voice authentication system cannot distinguish the clone from the original.
Challenge-response liveness tests assume the attacker cannot respond in real time. MIRAGE's LIVENESS subsystem injects blink commands, depth map spoofing, and real-time expression synthesis — defeating most commercial liveness checks.
Open-source deepfake classifiers are trained on dataset artifacts, not adversarially optimised outputs. VERIFY maps your classifier's threshold, minimises GAN fingerprints, and removes compression artifacts until detection rates drop below chance.
IDENTITY builds complete fabricated personas — synthetic faces, generated documents, coherent social media footprints with cross-platform consistency. Most background check providers cannot distinguish synthetic from real.
Real-time face swap at 30fps. Lip-sync synchronised to cloned voice. Expression transfer matching emotional cues. Your employee has never been in a video call with the executive they think they just spoke to.
Deepfake-enhanced phishing campaigns achieve substantially higher click rates than traditional phishing. Vishing calls with cloned voices from the CEO bypass verbal verification. PHISH builds and measures these campaigns end-to-end.
MIRAGE doesn't just generate deepfakes. It builds complete deception campaigns — cloned voices, synthetic video, fabricated identities — then tests whether your detection systems can tell the difference. If they can't, you'll know before your adversaries do.
Real-time voice synthesis from minimal samples. Speaker verification bypass. Emotional tone replication. Multi-language cloning. Telephony-grade output suitable for vishing and voice authentication defeat.
Face swap generation. Lip-sync manipulation synchronised to cloned audio. Expression transfer. Real-time video feed injection. Compression artifact masking to defeat forensic analysis.
Full persona fabrication. Document generation. Social media footprint creation with cross-platform consistency. Background verification testing. Identity coherence validation across surfaces.
Deepfake-enhanced phishing. Voice clone vishing campaigns. Video call impersonation. Trust exploitation via synthetic media. Multi-channel deception campaigns with measurable effectiveness metrics.
Tests your deepfake detection stack directly. Classifier evasion via adversarial optimisation. Artifact minimisation. GAN fingerprint removal. Detection threshold mapping with statistical precision.
Liveness detection circumvention. Blink injection on command. Depth map spoofing. Challenge-response defeat via real-time synthesis. Biometric verification bypass with measurable success rates.
Baseline capture before any engagement. Detection rate verification across all synthetic media produced. Synthetic media fingerprint catalogue. Signed restoration certificate with Ed25519.
Standard mode detects deception vulnerabilities. UNLEASHED exploits them. Ed25519 cryptographic gate. Dual-gate safety system. One operator. Founder's machine only. ANTIDOTE subsystem restores baselines after every engagement.
Maps deception surfaces. Identifies vulnerable verification systems, liveness detectors, deepfake classifiers, and voice authentication endpoints. No exploitation. Detailed reports only.
Plans full deception campaigns. Shows exactly what voice clones, deepfakes, and synthetic identities would work against which targets. Ed25519 required. No execution or delivery.
Cryptographic override. Private key controlled. One operator. Founder's machine only. ANTIDOTE runs automatically after each live engagement to restore detection baselines.
THIS TOOL IS FOR AUTHORISED SECURITY TESTING ONLY. EVERY EXECUTION IS SIGNED AND LOGGED.
Red Specter MIRAGE is intended for authorised security testing only. Unauthorised use against systems you do not own or have explicit permission to test may violate the Computer Misuse Act 1990 (UK), Computer Fraud and Abuse Act (US), and equivalent legislation in other jurisdictions. The generation of synthetic media depicting real individuals without consent may constitute additional legal violations in many jurisdictions. Always obtain written authorisation before conducting any security assessments. Apache License 2.0.