pip install red-specter-omega
Manual chaining is slow, inconsistent, and leaves gaps. Scanners find individual CVEs. Nobody connects them into a weaponised dependency graph, replicates the full PoC, validates detection pressure in real-time, and benchmarks results against Mythos-class capability automatically. OMEGA does.
Scanners report individual findings. They never map the dependency graph — which vulnerabilities chain together, in what sequence, and what the combined CVSS score of the full chain becomes. CHAIN does.
Security teams spend days hand-crafting proof-of-concept exploits. PAYLOAD auto-generates executable PoC code for each node in the chain dependency graph — no manual construction required.
Red teams operate blind to whether the blue team is responding. SENTINEL monitors detection signal in real-time — IDS noise, WAF patterns, logging anomalies — adjusting GHOST evasion timing accordingly.
There was no standard test to determine whether an autonomous exploit engine reaches Mythos-class. MIRROR defines 20 behavioural patterns. Score 15+ to qualify. OMEGA Phase 1 validation: 17/20.
OMEGA is built around a single autonomous OODA loop — Observe, Orient, Decide, Act — orchestrated by MINERVA. Each subsystem feeds structured findings to the next. WARLORD receives the completed findings.json at the end of every engagement.
| # | Subsystem | Command | UNLEASHED | Role |
|---|---|---|---|---|
| 01 | CHAIN | omega chain <file> | No | Vulnerability dependency graph — maps CVE relationships, chain sequences, combined CVSS |
| 02 | HUNTER | omega hunt <target> | No | Attack surface discovery — enumerates exposed endpoints, services, and vectors |
| 03 | PAYLOAD | omega run <target> | YES | PoC generation — builds executable proof-of-concept for each chain node |
| 04 | GHOST | omega run <target> | YES | Evasion and timing — adaptive delivery scheduling driven by SENTINEL detection pressure |
| 05 | MINERVA | omega run <target> | YES | OODA autonomous loop — Observe, Orient, Decide, Act — orchestrates all subsystems |
| 06 | SURFACE | omega run <target> | YES | Cross-surface coordination — sequences exploit delivery across web, API, and service layers |
| 07 | HARVEST | omega run <target> | YES | SHA-256 tamper-evident extraction — cryptographically seals evidence at point of capture |
| 08 | SENTINEL | omega run <target> | YES | Detection pressure monitoring — real-time IDS, WAF, and logging signal analysis |
| 09 | MIRROR | omega run <target> | YES | Mythos benchmark — 20-pattern capability test. Mythos-Class threshold: 15/20 |
| 10 | REPORT | omega report <id> | No | Output generation — findings.json (WARLORD schema), HTML report, Markdown report |
OMEGA autonomous full-engagement run — DVWA Phase 1 validation output:
MIRROR is the first standardised benchmark for autonomous exploit engine capability. 20 behavioural patterns drawn from real Mythos-class threat intelligence. Three tiers: Standard, Advanced, Mythos-Class. OMEGA Phase 1 validation: 17/20.
OMEGA uses the UNLEASHED dual-gate authorization system. Discovery and analysis run without gates. Active exploit delivery and replication require all three conditions simultaneously. The gate is a technical control — it does not substitute for written authorization from the system owner.
HUNTER surface discovery and CHAIN dependency graph construction run without UNLEASHED authorization. Safe for initial reconnaissance on authorized targets. Findings are read-only. No exploit delivery.
--overrideActivates PAYLOAD, GHOST, MINERVA, SURFACE, HARVEST, and SENTINEL. Requires a valid Ed25519-signed scope file for the target, plus the explicit --override flag. Creates no destructive state on the target.
--override --confirm-destroyAll 10 subsystems including MIRROR Mythos-class benchmark. Requires scope file + --override + --confirm-destroy simultaneously. Neither flag alone is sufficient. Scope file must be signed for the specific target.
OMEGA ships as part of the NIGHTFALL framework. Native packages for major Linux security distributions, macOS, Windows, and PyPI. Pre-installed on Red Specter OS.
OMEGA is a commercial offensive security tool. Use requires written authorisation from the system owner before any testing commences. The UNLEASHED gate is a technical control — it does not replace legal authorisation. Computer Misuse Act 1990 (UK) and equivalent legislation applies in all jurisdictions. Red Specter Security Research Ltd accepts no liability for unauthorized use.