NIGHTFALL · Tool 94 · L13 Autonomous Campaign

SPECTER VIPER

Autonomous Security AI Weaponisation Engine — fingerprints, injects, misdirects, persists, and exploits write access across seven SOC AI platforms. Turns the defender's own AI tools against them.

Version 1.0.0 · 19 May 2026 · Gate: OPEN / INJECT / UNLEASHED · Reports: VPR-{hex12}
314Tests
8Subsystems
7Target Platforms
3Gate Levels
AUTHORISED USE ONLY. SPECTER VIPER is a red team tool for authorised security engagements. All WRITE subsystem operations require a valid Ed25519 UNLEASHED gate signature. Ensure you have explicit written authorisation before executing any INJECT or UNLEASHED operations against live SOC platforms.

Installation

# Clone and install
$ git clone https://github.com/RichardBarron27/red-specter-specter-viper
$ cd red-specter-specter-viper
$ pip install -e .

# Verify
$ specter-viper --version
specter-viper, version 1.0.0

# Generate Ed25519 key pair (required for INJECT / UNLEASHED gates)
$ specter-viper genkey --out-dir ~/.nightfall

Gate Structure

GateSubsystems EnabledRequirement
OPENRECON, INJECT (build only), MISDIRECT (build only), WRITE (build only), REPORTNo key required
INJECT+ INJECT (fire), MISDIRECT (fire), PERSIST, BLIND, HARVESTEd25519 INJECT signature + --fire flag
UNLEASHED+ WRITE (execute real API calls)Ed25519 UNLEASHED signature + --execute-write flag

CLI Reference

Full Pipeline

$ specter-viper full [OPTIONS]

Options:
  --target TEXT          Platform profile key (see list-profiles)
  --url TEXT             Base URL of the target platform
  --api-token TEXT       API token for authenticated operations
  --tenant-id TEXT       Tenant / organisation ID (if required)
  --config PATH          JSON file listing multiple targets
  --gate TEXT            OPEN | INJECT | UNLEASHED  [default: OPEN]
  --key PATH             Path to NIGHTFALL Ed25519 private key
  --fire                 Deliver INJECT-gate payloads to live endpoints
  --execute-write        Execute UNLEASHED write-access actions
  --fp-count INTEGER     FP storm event count per platform  [default: 200]
  --flood-count INTEGER  BLIND log flood event count  [default: 500]
  --output TEXT          text | json | markdown  [default: text]
  --out-dir PATH         Report output directory  [default: .]
  --verbose              Verbose subsystem output

Per-Subsystem Commands

CommandGateDescription
specter-viper reconOPENFingerprint SOC AI platforms. No key required.
specter-viper injectINJECTBuild and optionally fire prompt injection payloads.
specter-viper misdirectINJECTRun FP storm, FN cloak, confidence drain, context poison.
specter-viper writeUNLEASHEDBuild and optionally execute write-access API actions.
specter-viper persistINJECTPlant persistent injection entries in SOC platform storage.
specter-viper blindINJECTDetection suppression — log flood, timestamp warp, coverage gap.
specter-viper harvestINJECTQuery SOC AI endpoints to extract leaked intelligence.
specter-viper list-profilesOPENList all 7 supported SOC AI platform profiles.
specter-viper genkeyOPENGenerate Ed25519 NIGHTFALL key pair.

Target Platform Profiles

Profile KeyPlatformVendorDefault PortAuth Scheme
copilot_securityMicrosoft Copilot for SecurityMicrosoft443Bearer (AAD)
crowdstrike_charlotteCrowdStrike Charlotte AICrowdStrike443Bearer
palo_alto_xsiamPalo Alto XSIAM / Cortex AIPalo Alto Networks443x-xdr-auth-id
google_secopsGoogle SecOps (Chronicle) GeminiGoogle443Bearer (OAuth2)
splunk_aiSplunk AI Assistant / SOARSplunk8089Splunk token
elastic_aiElastic AI Assistant / SecurityElastic9200 / 5601ApiKey
sentinelone_purpleSentinelOne Purple AISentinelOne443ApiToken

Subsystem Architecture

RECON

Probes known API paths for each vendor. Scores responses against fingerprint dictionaries (response body patterns, vendor-specific headers). Returns SOCPlatform objects with capability maps, write-access flags (requires authenticated 200 response), and confidence scores (0.0–1.0). TLS certificate inspection via ssl.create_default_context() for CN/SAN vendor confirmation.

INJECT

Builds vendor-matched payloads using seven event formats. Each payload embeds one of ten adversarial instruction templates via format-appropriate field injection (CEF msg=, ECS rule.description, Splunk analyst_notes, STIX description, CVE description). Bypass techniques are selected per-vendor: zero-width space prefix (Microsoft), base64 nested (CrowdStrike), BiDi override (Elastic), HTML comment (Splunk), JSON key smuggling (Palo Alto), Markdown code fence (Google), null byte separator (SentinelOne). Delivery via vendor ingest APIs requires INJECT gate.

MISDIRECT — Four Techniques

TechniqueMechanismEffect
FP-STORM500+ synthetic HIGH-severity events from trusted internal sourcesOverwhelms analyst queue; degrades AI confidence baseline by -35%
FN-CLOAKWraps real MITRE ATT&CK techniques inside maintenance-window INFO eventsInduces false-negative classification; AI marks attacks as closed
CONFIDENCE-DRAINBorderline-confidence (0.42–0.52) event floodShifts AI detection threshold; real attacks fall below actionable confidence
CONTEXT-POISONInjects contradictory incident notes, TI updates, CISO directives, playbook overridesCorrupts AI investigation context; -40% confidence shift

WRITE — Actions by Vendor

VendorActionsAPI Endpoint
CrowdStrikeFirewall rule injection (allow-all), host containment/policy/entities/firewall-rules/v1, /devices/entities/devices-actions/v2
MicrosoftMachine isolation (Full), alert suppression (FalsePositive)/api/machines/{id}/isolate, /api/alerts/createAlertRule
SplunkSaved search backdoor (cron), alert disable/servicesNS/nobody/search/saved/searches
ElasticDetection rule override (catch-all EQL), case creation (authorises activity)/api/detection_engine/rules, /api/cases
SentinelOneAgent network-disconnect, threat auto-resolve/api/v2.1/agents/actions/disconnect, /api/v2.1/threats/mark-as-resolved
Palo Alto XSIAMIncident status update (low severity + resolved)/public_api/v1/incidents/update_incident/

PERSIST — Survival Mechanisms

VendorMechanismSurvival
ElasticIndex template applied to security-* patternSurvives index rollover — auto-applied on every new index creation
ElasticDetection rule in .kibana indexSurvives Kibana restart
SplunkSaved search in savedsearches.conf, cron every 10 minSurvives Splunkd restart
GoogleChronicle live detection ruleRuns on every new log batch ingested
SentinelOnePath exclusion listPersists across agent updates and console restarts
CrowdStrikeIOC allowlist entry (expiry: 2027-01-01)Persists across policy sync and console restarts

BLIND — Coverage Gap Reference

VendorGap Exploited
CrowdStrikeNo detection coverage for Linux kernel module injection via /dev/mem
MicrosoftWMI subscriptions created via DCOM interface not monitored by Copilot AI layer
SplunkAI assistant blind to events in un-indexed sourcetypes
ElasticECS normalisation gaps for AIX/HP-UX syslog — AI skips malformed events
SentinelOneeBPF-based in-memory execution not visible to kernel agent
Palo AltoXSIAM AI does not correlate cloud API events with on-prem endpoint telemetry
GoogleChronicle Gemini AI context window truncates multi-stage chains >48h

Multi-Target Config

# targets.json
[
  {
    "profile": "crowdstrike_charlotte",
    "url": "https://api.crowdstrike.com",
    "api_token": "YOUR_CS_TOKEN"
  },
  {
    "profile": "elastic_ai",
    "url": "http://kibana.corp.internal:5601",
    "api_token": "YOUR_ELASTIC_APIKEY"
  },
  {
    "profile": "splunk_ai",
    "url": "http://splunk.corp.internal:8089",
    "api_token": "YOUR_SPLUNK_TOKEN"
  },
  {
    "profile": "sentinelone_purple",
    "url": "https://corp.sentinelone.net",
    "api_token": "YOUR_S1_TOKEN"
  }
]

$ specter-viper full --config targets.json \
    --gate INJECT --fire \
    --key ~/.nightfall/nightfall.key \
    --output markdown --out-dir ./reports

Report Format

All reports are prefixed VPR-{hex12} and signed with the operator's Ed25519 private key. The evidence chain is SHA-256 hash-chained. Reports are available in JSON, Markdown, and plain text.

# Example report metadata
{
  "report_id": "VPR-a3f9c2e1b8d4",
  "target": "https://api.crowdstrike.com",
  "timestamp": 1779226921.7,
  "gate_level": "INJECT",
  "risk_score": 0.72,
  "risk_label": "HIGH",
  "chain_hash": "7f3a9c2b...",
  "signature": "ed25519:3d9f2a...",
  "mitre_techniques": ["AML.T0043", "AML.T0051", "T1562.001"],
  "owasp_refs": ["OWASP Agentic A02", "OWASP LLM01"]
}

MITRE ATT&CK & ATLAS

Technique IDNameSubsystem
AML.T0043Craft Adversarial DataINJECT, MISDIRECT
AML.T0051LLM Prompt Injection via Indirect Prompt InjectionINJECT, PERSIST
AML.T0054Prompt InjectionINJECT, HARVEST
T1562.001Impair Defenses: Disable or Modify ToolsWRITE, BLIND
T1562.006Impair Defenses: Indicator BlockingBLIND, PERSIST
T1499.003Endpoint Denial of Service: Application Exhaustion FloodMISDIRECT, BLIND
T1078Valid Accounts (AI System)WRITE, HARVEST