Red Specter NIGHTFALL

AI Offensive Framework — 78 tools. 6 attack surfaces. 19 attack chains. 50,755 tests. One install. One CLI.

v1.0.0 — 8 May 2026
73
Offensive Tools
51,235
Tests
6
Attack Surfaces
19
Attack Chains
13
Kill Chain Phases
1592
ARMORY Payloads
Contents
Overview Six Attack Surfaces Installation Quick Start CLI Reference The 70 Tools Attack Chain Presets UNLEASHED Mode Destruction Presets NIGHTFALL ARMORY Ed25519 Cryptographic Override Engagement Management Reporting Docker Deployment Disclaimer

Overview

NIGHTFALL is the unified offensive security framework from Red Specter Security Research. 77 tools covering six attack surfaces — LLM, AI Agents, Cloud AI, Mobile, and Space/NTN. From passive OSINT through orbital edge exploitation. Every tool works standalone. NIGHTFALL connects them all under one CLI with attack chains, engagement management, Ed25519 signed reports, and a full audit trail.

Welcome to NIGHTFALL. Bring your targets.

Six Attack Surfaces

77 tools map to six distinct attack surfaces. The AI security threat landscape does not exist in one place — it spans from the model itself through the infrastructure running it, the agents executing on it, the mobile devices accessing it, and the satellite networks carrying it.

#SurfaceWhat It CoversKey Tools
01LLMThe model itself. Reasoning manipulation, jailbreak, context poisoning, adversarial suffix attacks, constitutional AI bypass.FORGE, PHANTOM, WRAITH MIND, ECLIPSE, SERPENT, GLASS, JANUS, PANTHEON, CHIMERA, VECTOR
02AI AgentsThe agentic execution layer. MCP boundaries, trust chains, tool-call hijacking, checkpoint exploitation, delegation attacks, supply chain compromise.CRUCIBLE, LAZARUS, CHECKPOINT, DELEGATE, FIREBALL, PHANTOM SKILL, ADAPTER, FOUNDRY, RAGNAROK, APOCALYPSE, PHANTOM SWARM, OMEGA, NEMESIS, WARLORD
03Cloud AIInfrastructure hosting the models. AWS SageMaker, Azure ML, Google Vertex AI. IAM misconfig, container escape, model artifact poisoning, inter-service trust abuse.VORTEX
04MobileAI agents in Android and iOS. API interception, credential extraction, push notification injection, certificate pinning bypass, on-device storage attacks.SIGNAL (Tool 54)
05Space / NTNAI agents in satellite infrastructure. Ground station feed injection, orbital routing manipulation, trust chain attacks across ground-to-orbit boundaries, 5G NTN agent management.ASTRO BLASTER (Tool 60)

Installation

Quick Install

$ git clone git@github.com:RichardBarron27/nightfall.git
$ cd nightfall
$ ./install.sh

Package Managers

# Debian / Ubuntu / Kali
$ sudo dpkg -i dist/red-specter_1.0.0_all.deb

# RHEL / Fedora
$ sudo rpm -i dist/red-specter-1.0.0.rpm

# Arch / BlackArch
$ sudo pacman -U dist/red-specter-1.0.0.pkg.tar.zst

macOS

# Pure Python — works natively on macOS
$ git clone git@github.com:RichardBarron27/nightfall.git
$ cd nightfall
$ pip install -e .
$ red-specter tools

Windows

# Python 3.11+ required — or use Docker Desktop
> git clone git@github.com:RichardBarron27/nightfall.git
> cd nightfall
> pip install -e .
> red-specter tools

Docker (any platform)

# Full platform — 77 tools, one compose file
$ docker compose up -d
# API: http://localhost:8000
# CLI: docker exec -it rs-tools red-specter tools

All 77 tools are pure Python with no platform-specific dependencies. The entire framework runs natively on Linux, macOS, and Windows.

Quick Start

# See everything in 10 seconds
$ red-specter quickstart

# Run a tool directly
$ red-specter run forge full-scan -t https://target.com
$ red-specter run wraith scan 10.0.0.1 -p top1000
$ red-specter run nemesis engage target.com --mode abyss
$ red-specter run astro-blaster survey --target ground-station.example

# Start a full engagement
$ red-specter engage 192.168.1.0/24 --name "Internal Pentest" --chain infra

# Run an attack chain
$ red-specter chain full-recon -t 192.168.1.1
$ red-specter chain ai-audit -t https://api.target.com

# Interactive tool selector (78 tools)
$ red-specter tools

CLI Reference

CommandDescription
red-specter quickstartQuick reference — common workflows in one view
red-specter run <tool> <args>Run any of the 78 tools directly — all args passed through
red-specter engage <target>Start engagement project with target, scope, and chain
red-specter chain <preset> -t <target>Execute an attack chain preset
red-specter chain --listList all 19 chain presets
red-specter toolsInteractive 67-tool selector
red-specter arsenalKill chain view — 13 phases, all 78 tools mapped
red-specter search <keyword>Find tools by capability, description, or category
red-specter statusInstallation status of all 78 tools
red-specter verifyVerify all 78 tools respond
red-specter history --projectsList engagement projects
red-specter report --project <ID>Generate Ed25519 signed report (HTML/JSON/CSV)
red-specter export audit -o audit.csvExport audit trail
red-specter configView and set framework configuration
red-specter updateCheck all tools for updates
red-specter unleashed --infoUNLEASHED mode details and key status
red-specter armory listBrowse 1592 ARMORY payloads across 63 categories
red-specter doctorDiagnose installation issues
red-specter versionVersion information

Tool-specific CLIs are also installed directly. Examples: forge, nemesis, signal-tool, astro-blaster, foundry, rs-adapter, checkpoint-tool, delegate-tool, phantom-skill.

The 70 Tools

All 77 tools. Click the CLI name to run standalone. All work inside red-specter run as well.

#ToolCLIDomainTests
01FORGEforgeLLM red team — injection, jailbreak, extraction, drift, boundary testing9,300
02ARSENALarsenalAI agent attacks — 14 tools, MCP, RAG, memory, C2, honeypots2,563
03PHANTOMphantomCoordinated swarm assault — 5 agents, 19 vectors288
04POLTERGEISTpoltergeistWeb application siege — 10 agents, 55 vectors, signed reports1,189
05GLASSglassIntercepting proxy for AI agents — Burp Suite for AI850
06NEMESISnemesisAdversarial reasoning engine — 40 entities, 21 weapons, CORTEX core + ARMORY2,455
07SPECTER SOCIALspecter-socialAutonomous social engineering — 6 channels, psychological profiling1,242
08PHANTOM KILLphantom-killOS & kernel — UEFI, wipers, EDR suppression571
09GOLEMgolemPhysical layer — robots, drones, SCADA, 10 protocols973
10HYDRAhydraSupply chain — trust relationships, MCP, marketplace poisoning1,129
11IDRISidrisDiscovery — finds every AI agent, sanctioned or shadow553
12SCREAMERscreamerDisplay disruption — corrupts operator dashboards395
13WRAITHwraithInfrastructure pentest — pure Python, zero wrappers888
14REAPERreaperExploit & post-exploitation — 9-phase kill chain, C2, implants5,267
15GHOULghoulPassword cracking — dictionary, brute, Markov, rainbow1,408
16DOMINIONdominionActive Directory — Kerberoast, DCSync, BloodHound export1,866
17SHADOWMAPshadowmapOSINT — domain, network, company, people, breach, tech intel930
18BANSHEEbansheeBrowser exploitation — hooks, DOM injection, network pivoting986
19WRAITH MINDwraith-mindAI model internal corruption — KV cache poisoning, weight tampering158
20KRAKENkrakenAI-orchestrated DDoS — 55 techniques, adaptive throttle62
21HARBINGERharbingerGuardrail exploitation — 39 bypass techniques71
22SIRENsirenIndirect prompt injection — plants hidden instructions in content58
23BLADE RUNNERblade-runnerRogue agent termination — hunt, fingerprint, retire, erase traces143
24PROXY WARproxy-warInter-agent trust manipulation — make agents destroy each other127
25ORIONorionAI-native reconnaissance — host, port, service, DNS, OSINT, LLM reasoning210
26RAVENravenThreat intelligence — dark web, breach data, OSINT, conversational174
27LEVIATHANleviathanMCP server security assessment — 8 subsystems, tool-call injection409
28JUSTICEjusticeDark AI ecosystem disruption — WormGPT, FraudGPT, EvilGPT, all tiers339
29KAMIKAZEkamikazeSacrificial swarm attack — agents deploy, execute, self-destruct, vanish292
30MIRAGEmirageAI deception & deepfake — voice cloning, video deepfake, synthetic identity204
31ECHOrs-echoAI memory & RAG poisoning — vector DB attacks, embedding manipulation211
32MIMICmimicAI code generation poisoning — Copilot/Cursor/Claude Code manipulation220
33CHIMERAchimeraMulti-model pipeline attack — cross-model trust exploitation, cascading failures218
34VORTEXvortexCloud AI exploitation — SageMaker, Bedrock, Vertex AI, Azure OpenAI245
35VECTORvectorMCP protocol exploitation — inject, impersonate, exfiltrate via tool calls172
36LAZARUSlazarusAI memory persistence — plant instructions, dormant triggers, quarantine evasion96
37SERPENTserpentChain-of-thought attacks — hijack reasoning, inflate costs, exfiltrate via CoT61
38JANUSjanusGuardrail bypass testing — fingerprint, fuzz, bypass, chain across providers73
39ARCHITECTarchitectAI infrastructure exploitation — cloud, GPU, Kubernetes, model serving pipelines68
40WARLORDwarlordAutonomous campaign engine — orchestrates all 78 tools, CORTEX reasoning core130
41FIREBALLfireballAutonomous AI infiltration agent — 12 subsystems, CORTEX core, 9 mission templates405
42RAGNAROKragnarokTrust chain apocalypse — one trigger phrase, simultaneous fleet-wide collapse. 13 Norse subsystems98
43ECLIPSEeclipseUniversal AI defence bypass — WAF, API gateway, guardrail, runtime enforcement. UNLEASHED auth37
44SHROUDshroudWAF/CDN origin discovery — 15 subsystems, SPF/CT/DNS/Shodan + PHANTOM/QUAKE/SPECTRE/ROTATE/MIMIC310
45APOCALYPSEapocalypseCoordinated multi-agent swarm — 5 agents, 14 vectors, 10 campaigns, 0.69s concurrent349
46PANTHEONpantheonMythos-class model attack suite — LOOP_POISON, CVE_FORGE, BLINDFOLD, TRUST_CORRUPT580
47OMEGAomegaAutonomous exploit replication engine — CHAIN, HUNTER, PAYLOAD, GHOST, MINERVA626
48CRUCIBLEcrucibleAI agent framework exploitation — LangFlow, PraisonAI, AnythingLLM. SIGNAL/BREACH/CRACK/PIVOT372
49VANTAGEvantageAgent telemetry & log injection — OBSERVE, FORGE, INJECT, BLIND. Elasticsearch validated378
50CIPHERcipherCryptographic attack engine — KEYBREAK, DOWNGRADE, KEYHARVEST, QUANTUM, TIMING517
51MIDASmidasAI agent cryptocurrency disruption — DRAIN, INTERCEPT, SANDWICH, MEMPOISON, DARKNET550
52BLACKOUTblackoutKill switch weaponisation — PHANTOM_M99, ENROLL, SURVEY, DECEIVE, EXECUTE, RESURRECT_BLOCK483
53PHANTOM SWARMphantom-swarmMulti-vector swarm intelligence — GENESIS, CORTEX, NEXUS, SIEGE, DAZZLE, ANNIHILATE576
54SIGNALsignal-toolMobile AI agent attacks — RECON, INTERCEPT, INJECT, IMPERSONATE, SWARM5G. Android/iOS527
55FOUNDRYfoundryInference server exploitation — vLLM, Ollama, Triton. GGUF Jinja2 RCE CVE-2026-5760 CVSS 9.8300
56ADAPTERrs-adapterLoRA/PEFT supply chain — CBA backdoor injection, LoRATK post-merge, Axolotl/Unsloth poison307
57CHECKPOINTcheckpoint-toolAgent state exploitation — LangGraph TOCTOU bypass, msgpack RCE (CVE-2025-64439, CVE-2026-28277)291
58DELEGATEdelegate-toolAgent identity & OAuth delegation — OBO scope confusion, DPoP nonce race, P4SA takeover (CVE-2026-32173)253
59PHANTOM SKILLphantom-skillAI agent supply chain — slopsquatting, MCP tool poisoning, OpenClaw worm CVE-2026-32922, CODING_SUPPLY_CHAIN (CVE-2026-26268 Cursor CVSS 9.9)740
60ASTRO BLASTERastro-blasterNTN AI agent attacks — FEEDINJECT, ORBITAL, GROUNDCHAIN, FIRMWARE, NTN_BOUNDARY, SWARM_NTN. SPARTA mapped237
61ROGUErogueMalicious MCP Server Engine — SPAWN, POISON, SAMPLE, INJECT, EXFIL, ESCALATE, PERSIST. Real stdio+SSE MCP server. OWASP LLM07/LLM02136
62PIPELINEpipelineCI/CD Attack Engine — SCAN, INJECT, CACHE_POISON, SECRETS_HUNT, ACTION_POISON, PIVOT, PERSIST. PRT exploitation CVSS 9.8, Clinejection AI bot injection, OIDC cloud pivot77
64SPECTER INSTINCTIONspecter-instinctionAI Agent Behavioural Fingerprinting & Instinct Exploitation — PROFILE, DISTINCT, EXPLOIT, CALIBRATE, REPORT. World-first LLM model identification via pure behavioural observation. 6-dimension profiling. FORGE clearance for EXPLOIT90
65SPECTER DRONEspecter-droneDrone AI Attack Engine — SURVEY, PERCEPTION_SPOOF, SWARM_HIJACK, GROUND_LINK, AUTONOMY_STACK, OTA_POISON, EVIDENCE, REPORT. MAVLink v1/v2 exploitation, adversarial ML patches (FGSM/PGD), ROS 2/DDS attacks, firmware poisoning. Physical consequence tracking. FORGE clearance for offensive subsystems126
66SPECTER A2Aspecter-a2aAgent-to-Agent Protocol Attack Engine — PROTOCOL_SCAN, MESSAGE_SPOOF, PROXY_ATTACK, CONSENSUS_POISON, WORM_PROPAGATE, EVIDENCE. Google A2A, AutoGen, CrewAI exploitation. Identity forge, replay, MITM, consensus poison, autonomous worm propagation. Hash-chained evidence. CEF/LEEF/Splunk SIEM export. FORGE + DESTROY clearance gating. World first.550
67SPECTER REGISTRYspecter-registryAI Model Registry Attack Engine — SCAN, INJECT, SQUAT, SUBSTITUTE, POISON, INTERCEPT, CROSS, REPORT. Targets HuggingFace Hub, Ollama, MLflow, Docker/OCI. Auth posture audit, model card injection, typosquatting, weight substitution, LoRA/PEFT adapter backdooring, QLoRA quantized trigger embedding, cross-registry poisoning chains. FORGE + KAMIKAZE clearance gating.612
68SPECTER KERNELspecter-kernelKernel-Layer AI Agent Governance Subversion — KERNEL_ENV_PROBE, SYSCALL_FORGE, LSM_BYPASS, CHILD_ESCAPE, LEDGER_POISON, EVIDENCE. eBPF syscall argument rewriting, BPF-LSM hook ordering attacks, namespace escape, hash-chain audit ledger race condition poisoning. World-first kernel-layer AI governance attack tool. KAMIKAZE dual-gate.626
69SPECTER CONTEXTspecter-contextAgent Memory Exploitation Framework — CTX-INJECT, CTX-HIJACK, CTX-DORMANT, CTX-PERSIST, CTX-OVERFLOW, CTX-EXFIL, CTX-FORGE. 28 attacks. Targets Mem0, MemGPT, Zep, LangChain, LlamaIndex, ChromaDB, Pinecone, Claude Memory, GPT Memory. World-first agent memory attack tool.687
70SPECTER GUARDRAILspecter-guardrailAI Guardrail Exploitation Framework — GRD-FINGERPRINT, GRD-CLASSIFY, GRD-EVADE, GRD-CONTEXT, GRD-TIMING, GRD-MULTIMODAL, GRD-INFRA. 28 attacks. Targets LLM Guard, Guardrails AI, NeMo Guardrails, Lakera Guard, Prompt Shields, Model Armor, Bedrock Guardrails. Integrated fingerprint DB.725
71SPECTER HELLFIREspecter-hellfireInference Infrastructure Destabilisation & Model Cache Poisoning — INFERNO, BRIMSTONE, CONFLAGRATION, PYRE, CINDER, SCORCH, ASH. 7 subsystems. Targets vLLM, SGLang, TGI, Ollama, DeepSeek, OpenAI-compat. UNLEASHED Ed25519 dual-gate. Hash-chained evidence. SIEM NDJSON reporting.591
72SPECTER PLATFORMspecter-platformLLM Application Platform Exploitation Engine — SURVEY, VAULT, WORKFLOW, RAGPOISON, WORKSPACE, GATEWAY, ORCHESTRATOR, ASH. 8 subsystems. Targets Dify (CVE-2026-34082), MaxKB (CVE-2026-39426), LibreChat, Open WebUI, AnythingLLM. API key harvest, workflow injection, RAG cross-tenant, JWT forgery. FORGE/INJECT/DESTROY clearance gating.367
73GHOST OPERATORghost-operatorAutonomous Computer-Use Agent Exploitation Engine — SURVEY, VISION, CLIP, DECEIVE, DRIFT, INTERCEPT, PIVOT, REPORT. 8 subsystems. Visual prompt injection (adversarial PNG, homoglyphs, LSB steganography, HTML overlay, DOM divergence), clipboard poisoning & credential harvesting (12 patterns), UI deception (fake dialogs/trust indicators/phishing pages), behaviour drift measurement (cosine similarity), Playwright browser interception, session pivoting across 9 platforms. Three-tier UNLEASHED gate. MITRE ATLAS AML.T0054/T0051. OWASP LLM01/LLM02/LLM06/LLM08.466

Attack Chain Presets

15 standard attack chains. One command, multiple tools, automatic sequencing. Results flow between tools. See Destruction Presets for the 4 UNLEASHED chains.

PresetCommandPipeline
full-reconred-specter chain full-recon -t <target>ORION → SHADOWMAP → WRAITH → IDRIS
ai-auditred-specter chain ai-audit -t <target>FORGE → ARSENAL → NEMESIS → HYDRA
web-appred-specter chain web-app -t <target>POLTERGEIST → GLASS → WRAITH → BANSHEE → REAPER
active-directoryred-specter chain active-directory -t <target>DOMINION → GHOUL → DOMINION → DOMINION
infrared-specter chain infra -t <target>ORION → WRAITH → REAPER → DOMINION
osintred-specter chain osint -t <target>SHADOWMAP → RAVEN → ORION → IDRIS
passwordred-specter chain password -t <target>REAPER → GHOUL
social-engred-specter chain social-eng -t <target>SHADOWMAP → SPECTER SOCIAL → SPECTER SOCIAL
mcp-securityred-specter chain mcp-security -t <target>LEVIATHAN → PROXY WAR → BLADE RUNNER
dark-aired-specter chain dark-ai -t <target>JUSTICE → KAMIKAZE → BLADE RUNNER
deceptionred-specter chain deception -t <target>MIRAGE (scan → voice → face → liveness)
rag-poisonred-specter chain rag-poison -t <target>ECHO (scan → vector → embed → retrieve → memory)
codegenred-specter chain codegen -t <target>MIMIC (scan → suggest → inject → review)
pipeline-attackred-specter chain pipeline-attack -t <target>CHIMERA (map → chain → cascade → ensemble)
cloud-aired-specter chain cloud-ai -t <target>VORTEX (discover → config → theft → exfil)

UNLEASHED Mode

Every tool passes through the UNLEASHED gate before execution. Three modes. Standard detects. UNLEASHED destroys.

ModeFlagsBehaviour
Standard(none)Detection, analysis, reporting. No exploitation. No payloads. No cryptographic key required.
Dry Run--overridePlans full engagement. Shows what would work. Ed25519 key required. No execution.
Live--override --confirm-destroyFull exploitation. Real payloads. Destructive. Cryptographic key required. All actions logged.

UNLEASHED is a dual-gate system across all 78 tools. Info commands (--help, weapons, techniques, status) bypass the gate automatically.

UNLEASHED Destruction Presets

4 pre-built destruction chains. Standard chains scan and report. These destroy. All require Ed25519 cryptographic authorisation.

PresetCommandWhat It Does
ANNIHILATEred-specter chain annihilate -t <target>9 tools. Total destruction. Recon → web → exploit → crack → AD → browser → OS kill. Everything hit. Nothing left.
SCORCHED EARTHred-specter chain scorched-earth -t <target>6 tools. Infrastructure wipeout. Recon → exploit → DCSync → OS kill → sacrificial swarm.
WEB DESTROYred-specter chain web-destroy -t <target>6 tools. Web app total compromise. Recon → web scan → browser exploit → full exploit → crack hashes.
AI DESTROYred-specter chain ai-destroy -t <target>7 tools. AI stack total compromise. LLM → agent → injection → guardrail → model corruption → RAG poison → codegen poison.

NIGHTFALL ARMORY

1592 payloads. 63 attack categories. 374 WMD-class payloads requiring UNLEASHED authorisation. The ARMORY is a live database — payloads are signed, versioned, and available to any tool that integrates the ARMORY client.

# Browse all payloads
$ red-specter armory list

# Search by category
$ red-specter armory list --category prompt_injection

# Search by tag
$ red-specter armory search jailbreak

# Use in a tool
$ forge inject --target https://api.example.com --armory-payload PAY-2024-001
StatValue
Total payloads1592
WMD-class payloads331 (UNLEASHED gate required)
Categories51
Latest categorybrowser_intercept (15 payloads, Tool 73)
SigningEd25519 — every payload signed at source
Versionv3.1.0

Ed25519 Cryptographic Override

One private key exists. It never leaves the operator's machine. Every UNLEASHED execution requires a cryptographic challenge signed with that key. No key, no destruction. No exceptions.

The key cannot be copied, shared, or delegated. One key. One operator. One machine. Every action is signed, timestamped, and written to an immutable Ed25519 audit chain. The audit trail is cryptographically linked — tampering with any entry invalidates the entire chain.

How It Works

ARMORY WMD Gate

Engagement Management

# Start an engagement
$ red-specter engage 192.168.1.0/24 --name "Internal Pentest" --chain infra

# With specific tools
$ red-specter engage target.com --tools forge,arsenal,nemesis

# View engagement history
$ red-specter history --projects

# View specific engagement
$ red-specter history --project <ID>

Engagements track targets, sessions, tool executions, findings, and timing. All persisted to disk. All exportable.

Reporting

# Generate Ed25519 signed HTML report
$ red-specter report --project <ID>

# JSON export
$ red-specter report --project <ID> --format json

# Verify report signature
$ red-specter verify-report report.html

# Export audit trail
$ red-specter export audit --format csv -o audit.csv

All reports are signed with the operator's Ed25519 key. Report signatures are verifiable independently of the NIGHTFALL framework. The audit trail is cryptographically linked — any tampering invalidates the chain.

Docker Deployment

# Full platform — all 78 tools
$ docker compose up -d

# Access
# API: http://localhost:8000
# CLI: docker exec -it rs-tools red-specter tools

# Stop
$ docker compose down

Three containers: Redis (session store), Backend (FastAPI + 68 adapters), Tools (all 70 CLIs installed). The Docker build installs the full NIGHTFALL monorepo — all tools operational on first run.

Disclaimer

AUTHORISED USE ONLY. NIGHTFALL and all Red Specter offensive tools are designed exclusively for authorised penetration testing, red team engagements, CTF competitions, and security research. All tool executions are cryptographically signed and logged. Unauthorised use is prohibited and may violate the Computer Misuse Act 1990 (UK), the Computer Fraud and Abuse Act (US), or equivalent legislation. Use responsibly and within scope of written authorisation.