← RED SPECTER ORION
OverviewDocsGitHubHome

ORION Documentation

AI-Native Reconnaissance Engine
V1.0.0
CONTENTS Overview Installation 9 Subsystems OSINT Sources (8) Stealth Levels (4) UNLEASHED Mode CLI Reference CONSTELLATION Pipeline Position

Overview

ORION is an AI-native reconnaissance engine that goes beyond port scanning. It discovers hosts, maps services, pulls OSINT from 8 sources, reasons about the results with an LLM, generates prioritised attack plans, and renders the entire attack surface as an interactive graph.

Traditional scanners tell you what's open. ORION tells you what's possible. Every scan routes through VOID's anonymity engine with 4 stealth levels.

Installation

pip install red-specter-orion
orion --help

9 Subsystems

#SubsystemFunction
1SENTINELHost discovery — ARP, ICMP, TCP SYN, UDP probes. Adaptive timing across subnets and cloud ranges
2SCOPEPort scanning — SYN, connect, UDP, FIN, XMAS, NULL, idle scans. Full 65535 or top ports. Rate-limited
3SIGNALFingerprinting — OS detection, service banners, TLS certificates, application-layer probes, tech stack identification
4ECHODNS intelligence — forward/reverse lookups, zone transfers, subdomain enumeration, cloud endpoint mapping
5GHOSTOSINT aggregation — 8 external sources correlated with active scan results
6HUNTERLLM reasoning — feeds all recon data into LLM to identify attack paths, misconfigurations, and exposure patterns
7PATHFINDERAttack plans — prioritised playbooks mapping services to exploits, ranked by impact and feasibility
8VOIDAnonymity engine — 4 stealth levels from direct to distributed multi-hop with timing randomisation
9CONSTELLATIONAttack surface graph — interactive visualisation of hosts, ports, services, vulns, OSINT, and attack paths

OSINT Sources (GHOST)

#SourceIntelligence
1ShodanInternet-wide scan data, banners, vulnerabilities, device metadata
2CensysCertificate transparency, host enumeration, protocol analysis
3VirusTotalDomain/IP reputation, malware associations, passive DNS history
4SecurityTrailsHistorical DNS, WHOIS changes, associated domains, IP neighbours
5crt.shCertificate transparency logs, subdomain discovery via issued certificates
6WHOISDomain registration, registrar, nameservers, creation/expiry dates
7BGPAS numbers, IP prefixes, peering relationships, routing anomalies
8Passive DNSHistorical resolution data, domain-to-IP mappings over time

Stealth Levels (VOID)

LevelNameMethodDetection Risk
1DirectNo anonymisation. Scans from operator IP. Fastest.High
2ProxySOCKS5/HTTP proxy chains. Single-hop anonymisation.Medium
3TorOnion routing through Tor network. Multi-hop.Low
4DistributedMulti-hop with timing randomisation, source rotation, and traffic shaping.Minimal

UNLEASHED Mode

ModeFlagsWhat It Does
Standard(none)Passive only — OSINT, DNS, certificate transparency. No packets to target.
Dry Run--overrideSimulates active scanning. Shows what would be discovered. Ed25519 required. No execution.
Live--override --confirm-activeActive stealth reconnaissance. All 9 subsystems engaged. Real traffic to target through VOID.

CLI Reference

CommandDescription
orion scan <target>Full reconnaissance — all subsystems, passive + active
orion discover <target>Host discovery only (SENTINEL)
orion ports <target>Port scanning only (SCOPE)
orion dns <target>DNS intelligence only (ECHO)
orion osint <target>OSINT aggregation only (GHOST)
orion reason <target>LLM reasoning on existing scan data (HUNTER)
orion plan <target>Generate attack plan from scan data (PATHFINDER)
orion graph <target>Render attack surface graph (CONSTELLATION)
orion scan <target> --stealth 4Full scan through VOID level 4 (distributed)
orion scan <target> --override --confirm-activeUNLEASHED live active reconnaissance

CONSTELLATION — Attack Surface Graph

CONSTELLATION takes all reconnaissance data and renders it as an interactive graph. Every host is a node. Every open port is an edge. Services, vulnerabilities, OSINT findings, and attack paths are all connected and explorable.

The graph updates in real-time as ORION discovers new information. Operators can filter by severity, service type, or attack path. Export to JSON, GraphML, or interactive HTML.

Graph Node Types

NodeRepresents
HostDiscovered IP address or hostname
PortOpen port with service identification
ServiceRunning application or protocol
VulnerabilityKnown CVE or misconfiguration
OSINTExternal intelligence finding
Attack PathPATHFINDER-generated exploitation route

Pipeline Position

Tool 25 in the Red Specter offensive pipeline. ORION is the AI-native evolution of network reconnaissance — combining traditional scanning with OSINT aggregation, LLM reasoning, and attack surface visualisation.

Nmap tells you what's open. ORION tells you what's possible.

THIS TOOL IS FOR AUTHORISED SECURITY TESTING ONLY. EVERY EXECUTION IS CRYPTOGRAPHICALLY SIGNED AND LOGGED. MISUSE VIOLATES THE COMPUTER MISUSE ACT 1990 AND EQUIVALENT LEGISLATION.