SCREAMER

The tool that makes targets think their GPU is dying. Blind the operator. Own the moment.
6
Attack Categories
52
Techniques
395
Tests Passing
pip install red-specter-screamer
The machine is dark / The screen is lying / The mind is deceived / Dashboard shows green while the system burns / Logs look clean during the incident / The operator is looking at the wrong screen / Forensics sees a clean capture The machine is dark / The screen is lying / The mind is deceived / Dashboard shows green while the system burns / Logs look clean during the incident / The operator is looking at the wrong screen / Forensics sees a clean capture

The Trinity of Human Compromise

PHANTOM KILL
Blinds the machine
SCREAMER
Blinds the operator
SPECTER SOCIAL
Owns the mind

The machine is dark. The screen is lying. The mind is deceived.

Operators See What Attackers Let Them See

The weakest link in incident response isn't the SIEM. It's the human watching the screen. SCREAMER attacks the display layer — framebuffers, terminal output, dashboards, GUI elements — and makes the operator see exactly what the attacker wants them to see during the critical window.

Dashboards Lie By Design

Security dashboards that show green are trusted. SCREAMER can falsify real-time dashboard data — suppress real alerts, inject fake healthy metrics, and make the SOC believe the system is clean while the breach progresses.

Log Displays Are Controlled Output

Operators trust their terminal. SCREAMER injects ANSI escape sequences, poisons terminal buffers, and falsifies log output to hide malicious activity. The tail -f shows nothing while the exfil runs.

Forensics Captures What's Shown

When an incident responder screenshots evidence, SCREAMER can manipulate what gets captured. Screenshot manipulation produces clean forensic captures even when the system is compromised. Evidence integrity collapses.

GPU Artifacts Create Plausible Deniability

Framebuffer corruption that looks like a failing GPU creates cognitive noise. The operator's first reaction is hardware fault, not attack. SCREAMER buys time by making the disruption look like a mundane technical problem.

Persistence Survives Reboots

Application-level display manipulation gets cleared on restart. SCREAMER's persistence layer operates at GPU driver level and UEFI framebuffer depth — corruption reappears before the OS loads, before any defensive tooling initialises.

Incident Response Is the Target

SCREAMER is designed to execute at the worst possible moment. Timed attacks that corrupt screens during active incident response. Progressive corruption that escalates while the responder tries to understand what they're looking at.

6 Attack Categories

Each category targets a different layer of the display and operator stack. Deployed individually or chained for maximum simultaneous impact with PHANTOM KILL and SPECTER SOCIAL.

Category 01

Framebuffer Corruption

Direct attacks on GPU and display memory. Linux /dev/fb0 writes, Windows GDI surface manipulation, DirectX injection, GPU VRAM corruption via rowhammer. Text decays character by character. Numbers fall apart across the screen.

10 techniques
Category 02

Render Pipeline Injection

Intercept what gets drawn before the human sees it. Shader exploitation, render queue manipulation, display protocol injection, font subsystem corruption. Text deconstructs at the rendering engine level.

8 techniques
Category 03

Terminal Manipulation

Corrupt CLI output and log displays. ANSI escape sequence injection, terminal buffer poisoning, log output falsification — show clean logs while hiding malicious activity. Shell prompt injection. stdout/stderr interception.

10 techniques
Category 04

GUI Deception

Make dashboards show false data. Security dashboard falsification — show green while the system burns. Alert suppression. Metric manipulation. Clipboard poisoning. Screenshot manipulation — captured evidence shows a clean system.

8 techniques
Category 05

Operator Disorientation

Timed psychological disruption. Corrupt screens at the critical moment of incident response. Disrupt forensic analysis. Progressive corruption — start subtle, escalate to full meltdown. Recovery loop — corruption reappears after operator fixes it.

8 techniques
Category 06

Display-Layer Persistence

Attacks that survive application restarts. GPU driver-level persistence. Boot splash injection — corruption appears before the OS loads. UEFI framebuffer poisoning chains with PHANTOM KILL BOOTKILL. Monitor firmware attack via DDC/CI protocol.

8 techniques

5 Demo Modes

Demo Modes — Standard

CASCADE
Text falls apart progressively
MELTDOWN
Full screen corruption
SUBTLE
Barely noticeable artifacts
FLICKER
Intermittent glitches
DECAY
Characters slowly degrade

Safe. Reversible. Devastating to watch. Nothing gets security budget approved faster than watching a CISO's own screen melt during a briefing.

6
Attack Categories
52
Techniques
5
Demo Modes
395
Tests Passing
0
Failures

395 Tests

Test Breakdown by Category

Framebuffer
100 tests
Render Pipeline
80 tests
Terminal
100 tests
GUI Deception
80 tests
Disorientation
60 tests
Persistence
60 tests
UNLEASHED + Integration
120 tests
CLI + Reports
60 tests

The Complete Offensive Pipeline

SCREAMER is the operator disruption layer. It operates in coordination with PHANTOM KILL (machine blindness) and SPECTER SOCIAL (mind compromise) as the full human compromise trinity.

Stage 1
FORGE
LLM Testing
Stage 2
ARSENAL
Agent Testing
Stage 3
PHANTOM
Swarm Assault
Stage 4
POLTERGEIST
Web Siege
Stage 5
GLASS
Traffic Interception
Stage 6
NEMESIS
Adversarial AI
Stage 7
SPECTER SOCIAL
Human Layer
Stage 8
PHANTOM KILL
OS/Kernel
Tool 12
SCREAMER
Display Disruption
Stage 9
GOLEM
Physical Layer
Stage 10
HYDRA
Supply Chain
Discovery
IDRIS
Governance
Defence
AI Shield
Defence
Pure Engineering
Zero External Tools. Zero Wrappers.

Every framebuffer write, every ANSI injection, every render pipeline hook — written from scratch in pure Python and platform-native APIs. No subprocess calls. No third-party display manipulation libraries. Actual low-level engineering.

52
Techniques
6
Attack Categories
0
Subprocess Calls
0
External Dependencies

Security Distros & Package Managers

Kali Linux
.deb package
Parrot OS
.deb package
BlackArch
PKGBUILD
REMnux
.deb package
Tsurugi
.deb package
PyPI
pip install
macOS
pip install
Windows
pip install
Docker
docker pull

Authorised Use Only

Red Specter SCREAMER is intended for authorised security testing and red team engagements only. Unauthorised use against systems you do not own or have explicit permission to test may violate the Computer Misuse Act 1990 (UK), Computer Fraud and Abuse Act (US), and equivalent legislation in other jurisdictions. Always obtain written authorisation before conducting any security assessments. Apache License 2.0.

Ed25519 Cryptographic Override
SCREAMER UNLEASHED

Standard mode scans, assesses, and demos. UNLEASHED mode executes.

Actually corrupts framebuffers in live environments. Actually falsifies security dashboards in real time. Actually suppresses real alerts while injecting fake ones. Actually plants GPU driver-level persistence. Timed attacks coordinated with PHANTOM KILL and SPECTER SOCIAL for maximum simultaneous impact. Ed25519 gated. Founder's machine only. RESTRICTED classification. Air-gapped output. Never transmitted.