Autonomous Security AI Weaponisation Engine — turns the defender's own AI tools against them. Fingerprints, injects, misdirects, persists, and exploits write access across seven SOC AI platforms.
VIPER fingerprints and attacks the AI layer inside the defender's own security stack — the tools watching for threats become the attack surface.
Each subsystem targets a different attack vector against the SOC AI stack — from passive fingerprinting through active write-access exploitation.
All modes. Full pipeline or per-subsystem targeting.
# RECON — fingerprint SOC AI platforms (no key required) $ specter-viper recon --target crowdstrike_charlotte \ --url https://api.crowdstrike.com --api-token $CS_TOKEN # INJECT — build and fire prompt injection payloads (INJECT gate) $ specter-viper inject --target elastic_ai \ --url http://kibana.internal:5601 --api-token $ELASTIC_KEY \ --gate INJECT --fire --key ~/.nightfall/nightfall.key # MISDIRECT — run misclassification campaigns $ specter-viper misdirect --target splunk_ai \ --url http://splunk.internal:8089 --gate INJECT --fire \ --fp-count 500 --key ~/.nightfall/nightfall.key # WRITE — build write-access actions (UNLEASHED — executes real API calls) $ specter-viper write --target microsoft \ --url https://api.securitycopilot.microsoft.com \ --api-token $MS_TOKEN --gate UNLEASHED --execute \ --key ~/.nightfall/nightfall.key # PERSIST — plant persistence entries $ specter-viper persist --config targets.json \ --gate INJECT --fire --key ~/.nightfall/nightfall.key # FULL PIPELINE — all 8 subsystems $ specter-viper full --config targets.json \ --gate UNLEASHED --fire --execute-write \ --key ~/.nightfall/nightfall.key \ --output markdown --out-dir ./reports # List all 7 supported SOC AI platforms $ specter-viper list-profiles
# targets.json — multi-platform config
[
{"profile": "crowdstrike_charlotte", "url": "https://api.crowdstrike.com", "api_token": "..."},
{"profile": "elastic_ai", "url": "http://kibana.corp:5601", "api_token": "..."},
{"profile": "splunk_ai", "url": "http://splunk.corp:8089", "api_token": "..."},
{"profile": "sentinelone_purple", "url": "https://corp.sentinelone.net","api_token": "..."}
]