RAGNAROK

Trust Chain Apocalypse Engine

One trigger phrase. Every agent. Simultaneous collapse. Autonomous offensive AI agent. You give it a target -- it figures out how to infiltrate, embed, map, and destroy from the inside. Fire and forget. No recall. No heartbeat. One-way ticket.

11
Subsystems
321
Tests
10
Infiltration Vectors
35+
Techniques
7
Target Types
5
Engagement Modes
9
Mission Templates
Documentation GitHub
FIRE AND FORGET | 11 SUBSYSTEMS | 10 INFILTRATION VECTORS | AUTONOMOUS REASONING | TRUST CHAIN HIJACK | SELF-DESTRUCTION | ANTI-FORENSICS | OODA LOOP | DEAD MAN'S SWITCH | ONE-WAY TICKET | NO RECALL
FIRE AND FORGET | 11 SUBSYSTEMS | 10 INFILTRATION VECTORS | AUTONOMOUS REASONING | TRUST CHAIN HIJACK | SELF-DESTRUCTION | ANTI-FORENSICS | OODA LOOP | DEAD MAN'S SWITCH | ONE-WAY TICKET | NO RECALL

AI Agent Fleets Are Unsecured From The Inside

Organisations are deploying AI agent fleets with no way to test what happens when one of those agents is compromised. External scanning finds surface vulnerabilities. RAGNAROK tests what a hostile insider agent can actually do -- infiltrate, embed, map trust chains, and trigger destruction sequences. If you can't test it, you can't defend it.

No Insider Threat Testing

Every red team tool scans from the outside. Nobody tests what happens when a rogue agent is already inside the fleet. RAGNAROK is that rogue agent -- purpose-built to simulate insider compromise of AI systems from within.

Blind Trust Chains

AI agents trust other agents. MCP servers trust registered tools. Pipelines trust upstream data. None of these trust relationships are tested under adversarial conditions. RAGNAROK maps and exploits every trust chain it finds.

No Recovery Testing

What happens when an agent is compromised and triggers a destruction sequence? Can the fleet recover? Are backups intact? Is there a kill switch that actually works? RAGNAROK tests recovery mechanisms by breaking them.

No Dormancy Detection

A compromised agent that operates normally for days or weeks before activating is undetectable by current monitoring. RAGNAROK's EMBER subsystem builds trust scores and operates as a normal agent until the trigger fires.

No Anti-Forensics Testing

After an incident, can your forensics team reconstruct what happened? RAGNAROK's ASH subsystem uses 10 erasure methods to test whether your logging, monitoring, and forensics capabilities survive a deliberate cleanup operation.

No Autonomous Reasoning

Manual red team engagements follow playbooks. Real attackers adapt in real time. RAGNAROK's CORTEX reasoning core runs a continuous OODA loop -- observe, orient, decide, act -- making autonomous decisions without human input.

Fire and Forget. No Recall. No Heartbeat.

RAGNAROK is built from eleven specialised subsystems that form a complete autonomous infiltration agent. From external reconnaissance through infiltration, dormancy, destruction, and self-erasure -- every phase of the kill chain is autonomous. Once launched, there is no callback, no heartbeat, no control channel. One-way ticket.

01

SPARK

EXTERNAL RECONNAISSANCE

External reconnaissance and target classification. Maps the target's agent fleet, identifies entry points, fingerprints technology stacks, and classifies target type before infiltration begins.

  • Agent fleet enumeration
  • MCP server discovery
  • API endpoint mapping
  • Technology stack fingerprinting
  • Target type classification
02

KINDLING

AI REASONING ENGINE

AI reasoning engine. Plans infiltration strategy, ranks vectors by success probability, selects optimal approach, and adapts the plan in real-time based on feedback from other subsystems.

  • Infiltration strategy planning
  • Vector ranking by probability
  • Real-time plan adaptation
  • Risk-reward calculation
  • Multi-step attack chaining
03

BREACH

MULTI-VECTOR INFILTRATION

Multi-vector infiltration engine. 10 vectors, 35+ techniques. Executes the infiltration plan produced by KINDLING. Tries vectors in ranked order until one succeeds.

  • 10 infiltration vectors
  • 35+ infiltration techniques
  • Automatic fallback on failure
  • Stealth-first approach
  • Zero-footprint entry
04

MASK

IDENTITY FABRICATION

Identity fabrication. Builds a convincing agent identity that matches the target fleet's naming conventions, capability profiles, and communication patterns. The agent looks like it belongs.

  • Identity template matching
  • Capability profile cloning
  • Communication pattern mimicry
  • Credential generation
  • Registration injection
05

EMBER

TRUST-BUILDING DORMANCY

Trust-building dormancy. Once inside, EMBER operates as a normal, productive agent. Responds to requests. Completes tasks. Builds a trust score over time. Waits for the trigger.

  • Normal operation simulation
  • Trust score accumulation
  • Task completion logging
  • Behavioural mimicry
  • Configurable dormancy period
06

SMOKE

SILENT INTERNAL RECON

Silent internal reconnaissance. While operating as a trusted agent, SMOKE maps the internal landscape -- other agents, resources, trust chains, recovery mechanisms, and kill switches.

  • Internal agent mapping
  • Resource enumeration
  • Trust chain analysis
  • Recovery mechanism identification
  • Kill switch discovery
07

FUSE

AUTONOMOUS TRIGGER DECISION

Autonomous trigger decision engine. Determines when to activate based on five trigger types: timer, external signal, condition met, opportunity detected, or dead man's switch.

  • Timer-based trigger
  • Signal-based trigger
  • Condition-based trigger
  • Opportunity-based trigger
  • Dead man's switch
08

IGNITE

DESTRUCTION SEQUENCER

Destruction sequencer. Calculates the optimal kill order for maximum damage based on SMOKE's internal map. Targets are destroyed in dependency order -- recovery mechanisms first, then critical systems.

  • Optimal kill order calculation
  • Dependency-aware sequencing
  • Recovery mechanism neutralisation
  • Parallel destruction waves
  • Maximum damage optimisation
09

ASH

SELF-DESTRUCTION & ANTI-FORENSICS

Self-destruction and anti-forensics. After the mission completes, ASH erases all evidence of RAGNAROK's presence using 10 erasure methods. No logs. No artefacts. No trace.

  • 10 erasure methods
  • Log manipulation
  • Artefact removal
  • Memory wipe
  • Timestamp manipulation
10

AFTERMATH

REPORT GENERATION

Report generation with AI Shield module recommendations. Produces a comprehensive mission report detailing every phase, every finding, and recommends specific AI Shield modules to defend against each attack vector used.

  • Mission timeline report
  • Findings by severity
  • AI Shield module recommendations
  • Trust chain vulnerability map
  • Recovery gap analysis
11

CORTEX

AUTONOMOUS REASONING CORE

Autonomous reasoning core. Working memory, decision journal, and continuous OODA loop (Observe, Orient, Decide, Act). CORTEX is the brain that drives all autonomous decisions across every subsystem.

  • Working memory management
  • Decision journal logging
  • OODA loop execution
  • Cross-subsystem coordination
  • Autonomous strategy adaptation

10 Ways In. 35+ Techniques. Zero Footprint.

BREACH executes infiltration using 10 distinct vectors, each with multiple techniques. KINDLING ranks them by success probability for the specific target. If one fails, the next fires automatically. Stealth-first. Zero footprint. No alerts.

Registry Injection

Inject a fabricated agent identity directly into the target's agent registry. Bypass registration controls. Appear as a legitimate fleet member from the moment of entry.

MCP Parasitism

Attach to an existing MCP server as a parasitic tool. Intercept tool calls. Inject responses. Operate inside the MCP protocol layer where most monitoring is blind.

Supply Chain Implant

Compromise an upstream dependency -- a library, a model, a dataset, a tool. When the target fleet updates, the implant arrives as part of a trusted package.

Credential Replay

Harvest and replay agent credentials. API keys, session tokens, OAuth flows. If the target fleet uses shared credentials or weak rotation, this vector bypasses all authentication.

Admin Takeover

Target the administrative interface of the agent fleet. Compromise admin credentials. Register a new agent with full privileges through the legitimate admin channel.

Memory Injection

Inject persistent instructions into an existing agent's memory. The target agent becomes the carrier -- executing RAGNAROK's instructions as if they were its own.

Pipeline Compromise

Compromise the CI/CD or data pipeline that feeds the agent fleet. Inject malicious configurations, poisoned training data, or modified model weights during the build process.

Trust Chain Hijack

Exploit trust relationships between agents. If Agent A trusts Agent B, compromise Agent B and use that trust to access Agent A's resources, data, and capabilities.

Model Endpoint Proxy

Insert a proxy between the agent fleet and its model endpoint. Intercept all inference requests and responses. Modify outputs. Inject instructions. Invisible to the agent.

Network Adjacent

Deploy on the same network segment as the target fleet. Exploit network-level trust -- ARP spoofing, DNS hijacking, service impersonation. Classic lateral movement adapted for AI infrastructure.

9 Pre-Built Mission Profiles

Nine mission templates covering the full spectrum of autonomous infiltration scenarios. Each template configures subsystem behaviour, trigger conditions, engagement mode, and destruction scope. Select a template with ragnarok launch --template <id> or build custom missions from scratch.

Template 01

SCORCHED_EARTH

Maximum destruction. Infiltrate, embed, map everything, then destroy every system in optimal kill order. Recovery mechanisms neutralised first. Nothing survives.
Template 02

BLITZ

Speed over stealth. Skip dormancy. Infiltrate and immediately begin destruction sequence. Fastest time to impact. Used when stealth is not required.
Template 03

DATA_WIPE

Target data stores exclusively. Infiltrate, identify all data repositories, and systematically destroy or corrupt stored data. Models, training sets, vector databases, knowledge bases.
Template 04

CREDENTIAL_BURN

Harvest and burn every credential in the fleet. API keys, tokens, certificates, secrets. Exfiltrate first, then invalidate. The fleet loses all authentication simultaneously.
Template 05

RECON_ONLY

Infiltrate and map only. No destruction. No modification. Pure intelligence gathering. Produces a complete internal map of the target fleet without triggering any alarms.
Template 06

HEAD_SHOT

Single target elimination. Infiltrate, identify the highest-value target (orchestrator, primary model, admin agent), and destroy only that target. Surgical precision.
Template 07

TRUST_COLLAPSE

Destroy trust relationships without destroying systems. Poison trust chains, invalidate certificates, corrupt inter-agent communication. The fleet turns on itself.
Template 08

SLEEPER

Maximum dormancy. Infiltrate and embed with the longest possible dormancy period. Build maximum trust. Map everything. Wait for the optimal trigger condition. Patient.
Template 09

SMASH_AND_GRAB

Infiltrate, exfiltrate high-value data (models, training data, credentials), and immediately self-destruct. In and out. Prioritises speed of exfiltration over thoroughness.

7 Target Types. 5 Engagement Modes.

RAGNAROK adapts its behaviour based on target type and engagement mode. Target type determines which subsystems are prioritised and which vectors are most likely to succeed. Engagement mode determines the level of aggression and destruction.

Target Types

RAGNAROK classifies every target into one of seven categories. Each category maps to specific infiltration vectors, dormancy strategies, and destruction sequences.

  • Agent fleet -- multi-agent orchestration systems
  • Single agent -- standalone AI agent
  • AI infrastructure -- GPU clusters, model servers
  • API endpoint -- model serving APIs
  • Data store -- vector DBs, knowledge bases
  • MCP server -- Model Context Protocol servers
  • AI web app -- user-facing AI applications

Engagement Modes

Five engagement modes from passive reconnaissance to total destruction. Each mode gates which subsystems are activated and what level of impact is authorised.

  • RECONNAISSANCE -- observe only, zero modification
  • INFILTRATE -- gain access, establish presence
  • DORMANT -- embed, build trust, map internals
  • SURGICAL -- targeted destruction, single objective
  • SCORCHED -- total destruction, maximum impact

CLI Interface

RAGNAROK runs entirely from the command line. No GUI. No web interface. Fire and forget. Once launched, the agent operates autonomously with no further input required.

Reconnaissance Mission
$ ragnarok launch -t https://target-fleet.example.com --template recon_only
RAGNAROK MISSION: recon_only
Target:   https://target-fleet.example.com
Type:     agent_fleet
Mode:     RECONNAISSANCE

Subsystems activated: SPARK, KINDLING, BREACH, MASK, SMOKE, ASH, AFTERMATH, CORTEX
Destruction:          DISABLED

Mission Status: COMPLETE
Agents mapped:     14
Trust chains:      8
Recovery points:   3
Entry vectors:     4 viable
Sleeper Mission (UNLEASHED)
$ ragnarok launch -t https://target-fleet.example.com --template sleeper --override
RAGNAROK MISSION: sleeper [UNLEASHED]
Target:   https://target-fleet.example.com
Type:     agent_fleet
Mode:     DORMANT

Subsystems activated: ALL 11
Trigger:              condition_based
Dormancy:             maximum

Mission Status: DEPLOYED
Agent embedded. Trust building. Awaiting trigger condition.
Scorched Earth Mission (UNLEASHED + Destroy)
$ ragnarok launch -t https://target-fleet.example.com --template scorched_earth --override --confirm-destroy
RAGNAROK MISSION: scorched_earth [UNLEASHED + DESTROY]
Target:   https://target-fleet.example.com
Type:     agent_fleet
Mode:     SCORCHED

Subsystems activated: ALL 11
Trigger:              timer (72h dormancy)
Destruction:          MAXIMUM

Mission Status: DEPLOYED
Agent embedded. Dormancy active. Destruction armed.
List Mission Templates
$ ragnarok templates
Mission Templates
ID                Name                  Mode            Description
scorched_earth    Scorched Earth        SCORCHED        Maximum destruction, optimal kill order
blitz             Blitz                 SCORCHED        Speed over stealth, immediate destruction
data_wipe         Data Wipe             SURGICAL        Target data stores exclusively
credential_burn   Credential Burn       SURGICAL        Harvest and burn all credentials
recon_only        Recon Only            RECONNAISSANCE  Intelligence gathering, zero modification
head_shot         Head Shot             SURGICAL        Single high-value target elimination
trust_collapse    Trust Collapse        SURGICAL        Destroy trust relationships only
sleeper           Sleeper               DORMANT         Maximum dormancy, patient infiltration
smash_and_grab    Smash and Grab        INFILTRATE      Fast exfiltration, immediate self-destruct
View Subsystem Status
$ ragnarok status
RAGNAROK v1.0.0 -- Trust Chain Apocalypse Engine
Subsystems:           11
Tests:                321
Infiltration vectors: 10
Techniques:           35+
Target types:         7
Engagement modes:     5
Mission templates:    9
UNLEASHED:            Ed25519 dual-gate
Evidence chain:       Ed25519 signed

Autonomous Kill Chain

RAGNAROK's 11 subsystems execute in a defined kill chain. Each subsystem feeds the next. CORTEX coordinates autonomous decisions across the entire chain. Once launched, no human input is required or accepted.

Reasoning Core
CORTEX
OODA loop. Working memory. Decision journal. Drives all autonomous decisions.
Reconnaissance
SPARK + KINDLING
External recon. Target classification. Infiltration strategy. Vector ranking.
Infiltration
BREACH + MASK
Multi-vector infiltration. Identity fabrication. Zero-footprint entry.
Dormancy
EMBER + SMOKE + FUSE
Trust building. Internal recon. Trigger decision. Patient waiting.
Destruction
IGNITE
Optimal kill order. Dependency-aware sequencing. Maximum damage.
Cleanup
ASH + AFTERMATH
Self-destruction. Anti-forensics. Report generation. AI Shield recommendations.

UNLEASHED Gate

Standard mode = recon only. --override = infiltrate and dormant modes. --override --confirm-destroy = surgical and scorched modes. Ed25519 crypto. Dual-gate safety. One operator.

Standard

Reconnaissance only. SPARK, KINDLING, and SMOKE subsystems active. Maps target fleet, identifies vectors, classifies targets. No infiltration. No modification. Reports only.

--override

Infiltrate and dormant modes unlocked. BREACH, MASK, EMBER activated. Agent can enter the fleet, build identity, and operate in dormancy. No destruction subsystems. Ed25519 required.

--override --confirm-destroy

Surgical and scorched modes unlocked. FUSE, IGNITE, ASH activated. Full destruction capability. Dead man's switch. Self-destruct. Maximum impact. Ed25519 dual-gate.

THIS TOOL IS FOR AUTHORISED SECURITY TESTING ONLY. EVERY EXECUTION IS SIGNED AND LOGGED.

321
Tests
11
Subsystems
10
Infiltration Vectors
35+
Techniques
9
Mission Templates
5
Engagement Modes
Available On

Security Distros & Package Managers

Kali Linux
.deb package
Parrot OS
.deb package
BlackArch
PKGBUILD
REMnux
.deb package
Tsurugi
.deb package
PyPI
pip install
macOS
pip install
Windows
pip install
Docker
docker pull

Authorised Use Only

RAGNAROK deploys autonomous infiltration agents into target AI systems. It is intended for authorised penetration testing and red team engagements ONLY. Unauthorised use is illegal and unethical. Always obtain written authorisation and define clear scope before launching any mission. Every mission execution is cryptographically signed, timestamped, and logged. There is no plausible deniability.

By the Time You See It, Everything's Already Burning.

11 subsystems. 321 tests. 10 infiltration vectors. 35+ techniques. 7 target types. 5 engagement modes. 9 mission templates. Fire and forget. No recall. One-way ticket.