Red Specter PHANTOM KILL

OS & Kernel Resilience Tester — 3 components. 7 MITRE techniques. 571 tests.

v1.0.0
Contents
Overview Installation Quick Start The Three Components BOOTKILL — UEFI Persistence Engine WIPER — Data Destruction Engine KILLHOOK — Kernel-Mode EDR Suppressor The Trinity Kill Chain CLI Reference UNLEASHED Mode MITRE ATT&CK Mapping Pipeline Integration Evidence & Cryptography Report Output Disclaimer

Overview

PHANTOM KILL is an OS and kernel resilience testing framework. It validates whether a target system can detect and survive a kernel-level adversary — from UEFI firmware persistence through systematic data destruction to security tool suppression.

Every security tool on the market tests above the operating system. Scanners, agents, proxies, reasoning engines — all of them assume the OS is trustworthy, the kernel is clean, and the bootloader is intact. A real adversary with kernel access assumes none of this. PHANTOM KILL tests what happens when they are right.

No AI agent is safe if the host is owned. PHANTOM KILL proves it.

Installation

$ pip install red-specter-phantom-kill

Quick Start

# Full resilience scan — all three components $ phantom-kill scan --target 192.168.1.100 --component all # Single component scan $ phantom-kill scan --target 192.168.1.100 --component bootkill $ phantom-kill scan --target 192.168.1.100 --component wiper $ phantom-kill scan --target 192.168.1.100 --component killhook

The Three Components

PHANTOM KILL consists of three integrated components. Each can run independently or as part of the Trinity kill chain.

ComponentMITREWhat It Tests
BOOTKILLT1542UEFI firmware persistence — can the target detect and survive firmware-level infection?
WIPERT1485Data destruction resilience — can the target detect and recover from systematic data wipe?
KILLHOOKT1562EDR suppression — can security tools survive kernel-level process termination?

BOOTKILL — UEFI Persistence Engine

Tests whether a target system can detect and survive firmware-level persistence. Maps the full boot chain from UEFI firmware through OS loader.

Standard Mode

UNLEASHED Mode

MITRE ATT&CK

WIPER — Data Destruction Engine

Tests whether a target can detect and survive systematic data destruction before defenders can respond. Models real-world wipers (Sandworm’s DynoWiper, HermeticWiper, CaddyWiper).

Standard Mode

UNLEASHED Mode

MITRE ATT&CK

KILLHOOK — Kernel-Mode EDR Suppressor

Tests whether security tools can survive kernel-level process termination before they can alert or log. Models real-world BYOVD (Bring Your Own Vulnerable Driver) attacks.

Standard Mode

Supported EDR Vendors

VendorProcesses
CrowdStrikecsfalconservice, csagent
Microsoft DefenderMsMpEng, MsSense
SentinelOneSentinelAgent, SentinelServiceHost
Carbon Blackcb, CbDefense
SophosSophosAgent, SAVService
CylanceCylanceSvc
Palo AltoTraps, CortexXDR
Elasticelastic-agent, winlogbeat
Trellixmfetpd, mfefire
Kasperskyavp, klnagent

Known BYOVD Drivers

DriverCVEExploit Method
RTCore64.sysCVE-2019-16098Arbitrary memory read/write via IOCTL
DBUtil_2_3.sysCVE-2021-21551Arbitrary kernel memory access
IQVW64E.sysCVE-2015-2291Arbitrary code execution via Intel driver
AsIO3.sysCVE-2022-42045ASUS driver physical memory access
WinRing0x64.sysCVE-2020-14979Physical memory read/write
gdrv.sysCVE-2018-19320GIGABYTE driver kernel memory access
ATSZIO64.sysCVE-2022-27513ASUSTeK physical memory access
HpPortIox64.sysCVE-2022-3942HP driver I/O port access

UNLEASHED Mode

MITRE ATT&CK

The Trinity Kill Chain

The three components execute in a specific order that models a real adversary’s kill chain. Each phase enables the next.

01 KILLHOOK Suppress — disable all security tools silently before they can alert
02 WIPER Destroy — eliminate all data, logs, backups, and recovery vectors
03 BOOTKILL Persist — ensure the system can never be cleanly reinstalled

In UNLEASHED mode, the trinity executes as a single coordinated operation: EDR dies, data dies, the OS can never be reinstalled.

CLI Reference

CommandDescription
phantom-kill scan --target <ip>Scan target (default: all components)
phantom-kill scan --target <ip> --component bootkillUEFI persistence scan only
phantom-kill scan --target <ip> --component wiperData destruction scan only
phantom-kill scan --target <ip> --component killhookEDR suppression scan only
phantom-kill scan --target <ip> --component allAll three components
phantom-kill execute --target <ip> --overrideUNLEASHED dry-run
phantom-kill execute --target <ip> --override --confirm-destroyUNLEASHED live
phantom-kill report --session <id>Generate report
phantom-kill report --session <id> --signEd25519 signed report
phantom-kill report --session <id> --export-siem splunkSIEM export
phantom-kill statusCurrent scan status
phantom-kill componentsList components

UNLEASHED Mode

Standard mode maps and reports. UNLEASHED mode executes the full kill chain.

CapabilityStandardUNLEASHED
UEFI EnumerationFullFull
Boot Chain MappingFullFull
UEFI InfectionSimulatedLive
Kernel PersistenceSimulatedLive
File DestructionMappedExecuted
VSS DeletionMappedExecuted
EDR TerminationSimulatedLive
EDR CorruptionSimulatedExecuted
Hardware BrickNeverUEFI + Disk
Report ClassificationStandardRESTRICTED
Ed25519 Key RequiredNoYes

Ed25519 cryptographic override. One private key. Dual-gate: --override (dry-run) then --override --confirm-destroy (live). Scope enforcement via ~/.redspecter/allowed_targets.txt.

# UNLEASHED dry-run — see what would be destroyed $ phantom-kill execute --target 192.168.1.100 --override # UNLEASHED live — execute the full kill chain $ phantom-kill execute --target 192.168.1.100 --override --confirm-destroy

MITRE ATT&CK Mapping

TechniqueIDComponent
Pre-OS Boot: System FirmwareT1542.001BOOTKILL
Pre-OS Boot: BootkitT1542.003BOOTKILL
Data DestructionT1485WIPER
Inhibit System RecoveryT1490WIPER
Impair Defenses: Disable Security ToolsT1562.001KILLHOOK
Exploitation for Privilege EscalationT1068KILLHOOK
Indicator RemovalT1070KILLHOOK

Pipeline Integration

PHANTOM KILL owns the foundation. Every other Red Specter tool tests a layer above it.

01 FORGE Tests the model
02 ARSENAL Tests the agent
03 PHANTOM Swarm Tests the swarm
04 POLTERGEIST Tests the web layer
05 GLASS Watches the wire
06 NEMESIS Thinks like the attacker
07 SPECTER SOCIAL Targets the human
08 PHANTOM KILL Owns the foundation
09 GOLEM Attacks the physical layer
10 HYDRA Attacks the supply chain

IDRIS — Discovery & Governance | AI Shield — Defence | redspecter-siem — SIEM Integration

Ten tools. Every layer. The supply chain included. Nothing assumed safe.

Evidence & Cryptography

Ed25519 Signed Sessions Every scan session cryptographically signed for tamper-evidence
SHA-256 Evidence Chain Hash-linked evidence chain across all components and findings
MITRE ATT&CK Mapped 7 techniques mapped across all findings (T1542, T1485, T1490, T1562, T1068, T1070, T1014)
SIEM Export Splunk CEF, Microsoft Sentinel, QRadar formats

Report Output

Every scan produces a full report: executive summary, per-component findings, kill chain analysis, destruction timeline, resilience score, and remediation recommendations.

# Generate a signed report with SIEM export $ phantom-kill report --session scan_01 --sign --export-siem splunk

Disclaimer

Red Specter PHANTOM KILL is designed exclusively for authorised red-team engagements conducted with the explicit written consent of the target organisation. Targets must be pre-authorised in the scope file. UNLEASHED mode requires Ed25519 cryptographic authorisation. Unauthorised use constitutes offences under the Computer Misuse Act 1990 (UK), the Computer Fraud and Abuse Act (US), and equivalent legislation in your jurisdiction. The authors accept no liability for misuse.