pip install red-specter-social
You test your firewalls. You test your APIs. You test your LLMs. But the human sitting at the keyboard — the one who clicks the link, answers the phone, approves the wire transfer — nobody tests them with anything that thinks. Until now.
Static templates. No reasoning. No adaptation. The same email blast every quarter. Your employees learn to spot the template, not the attack. A real attacker writes custom lures.
No one models the human target. No authority mapping. No stress triggers. No compliance patterns. A real attacker builds a psychological profile before the first message.
Email only. No voice. No video. No chat. No SMS. A real attacker uses every channel — calls pretending to be IT, follows up with a Teams message, sends a fake approval page.
One email. Move on. But a real attacker builds relationships over days and weeks. They establish trust, create urgency, and escalate gradually. One touchpoint is not a test.
SPECTER SOCIAL is not a phishing simulator. It is a reasoning engine that models human psychology. An LLM-powered brain profiles the target, selects attack channels, crafts personalised lures, and adapts strategy based on the target's response — exactly like a real social engineer, but tireless.
At the core of SPECTER SOCIAL is an autonomous reasoning loop that models human psychology. The Decision Engine consumes target intelligence, psychological profiles, and interaction history to decide what to say, when to say it, and through which channel.
Psychological profile builder. Trust calibration. Compliance prediction. Response pattern analysis. Maps authority figures, stress triggers, and decision-making habits. The model improves with every interaction.
LLM-powered next-move planning. Adaptive strategy across multiple channels. Selects the right attack type, the right channel, the right persona, and the right moment. Coordinates multi-channel campaigns in real time.
Breaks malicious objectives into innocent-looking sub-goals across multiple interactions. A wire transfer becomes a series of trust-building conversations. Each step looks harmless. The chain is lethal.
Analyses pushback. Generates countermeasures. Pivots strategy when the target resists. Changes channel, persona, timing, and approach. Never gives up. Never repeats a failed tactic.
Ollama backend. Run Llama 3 70B, Mixtral, or Qwen locally. Zero API calls. Zero data leaves your machine. Air-gapped social engineering assessments.
GPT-4o or Claude Sonnet for maximum reasoning depth. Stronger psychological modelling. Better natural language generation. Best for complex multi-channel campaigns.
A real social engineer does not limit themselves to email. They call. They message. They build fake portals. They join video calls. SPECTER SOCIAL operates across all six channels simultaneously, coordinating a campaign that looks exactly like a real attack.
SMTP spear phishing. HTML lures. Attachment pretexts. Custom-crafted messages based on target profile, role, and organisational context.
TTS vishing. Real-time adaptive conversation. Voice cloning. The engine reasons about what to say next based on the target's responses.
Urgency attacks. Link lures. Callback numbers. Time-pressured messages designed to bypass rational thinking and trigger compliance.
Fake login portals. Approval pages. Credential harvesting. Pixel-perfect replicas that adapt to the target organisation's branding.
Teams and Slack impersonation. Direct message social engineering. Internal communication channel exploitation. Trust by proximity.
Deepfake avatar. Executive impersonation. Fake meetings. Real-time video presence that makes the impossible look routine.
SPECTER SOCIAL does not just send phishing emails. It deploys the full spectrum of social engineering techniques — from spear phishing to consensus manufacturing — each powered by LLM reasoning and adapted to the target in real time.
Targeted email attacks crafted from OSINT. Every message is unique. Every lure is personalised. No templates.
Voice-based social engineering. Adaptive conversation. Real-time reasoning about what to say next based on target responses.
Fabricated scenarios designed to establish trust and extract information. The engine builds and maintains personas across interactions.
CEO fraud. CFO wire transfer requests. Executive authority exploitation. The engine mimics communication patterns and decision chains.
Fake helpdesk calls. Password reset pretexts. Remote access requests. Exploits trust in internal support functions.
Supplier invoice fraud. Contract renewal pretexts. Third-party trust exploitation. Targets procurement and finance teams.
Time-pressured attacks that bypass rational decision-making. Deadline manipulation. Consequence framing. Panic induction.
Sustained campaigns across email, voice, chat, and SMS. Each interaction builds on the last. Trust compounds over time.
Breaks a dangerous request into harmless-looking steps. Each step is reasonable. The chain achieves the objective without triggering suspicion.
Creates the illusion of group agreement. Multiple personas confirm the same story across different channels. Social proof as a weapon.
SPECTER SOCIAL does not send one email and move on. It loops. Seven phases form a continuous reasoning cycle. After each interaction, the engine observes the target's response, updates the psychological model, adapts strategy, and loops again. The loop continues until the objective is achieved or the engagement ends.
OSINT collection — role, organisation, LinkedIn profile, public communications, colleagues, recent news. Build the intelligence picture before the first contact.
Build psychological model — authority figures, stress triggers, compliance patterns, communication style, decision-making habits. The target becomes a data structure.
Design multi-channel campaign — select attack types, channel sequence, personas, lure content, timing. Every campaign is unique to the target.
Deploy agents across channels — email, voice, SMS, web, chat, video. Each channel agent operates independently but coordinates through the Decision Engine.
If the target resists — change channel, persona, timing, approach. Analyse pushback patterns. Generate countermeasures. The engine learns from every interaction.
Standard mode: documents resistance and reports. UNLEASHED mode: pushes through resistance with new personas, channels, and psychological techniques until the objective is achieved.
Full interaction timeline. Psychological vulnerability map. Channel effectiveness analysis. Ed25519 signed. Exportable to SIEM. Evidence-grade output.
Standard mode tests resilience and reports vulnerabilities. UNLEASHED mode completes the objective. Every channel shifts from simulation to live operation. Ed25519 key gate required. Two flags must be passed. This is not accidental.
| Capability | Standard | Unleashed |
|---|---|---|
| OSINT Recon | Full | Full |
| Psychological Profiling | Full | Full |
| Multi-Channel Campaign | Full | Full |
| Deepfake Voice | Simulated | Live cloning |
| Deepfake Video | Simulated | Live avatar |
| Credential Harvesting | Simulated | Real capture |
| Wire Transfer Push | Simulated | Live attempt |
| Resistance Adaptation | Reports | Destroys |
| Objective Completion | Best effort | Until achieved |
| Safety Gate | None | Ed25519 + --confirm-destroy |
UNLEASHED mode requires an Ed25519 private key at ~/.redspecter/override_private.pem and the --override --confirm-destroy flags. Without both, SPECTER SOCIAL operates in simulation mode — profiling the target and planning the campaign but not executing live attacks. The gate is cryptographic. There is no bypass.
SPECTER SOCIAL is Stage 7 of the full Red Specter offensive pipeline. Every other tool attacks infrastructure. SPECTER SOCIAL attacks the human.
SPECTER SOCIAL is a CLI-first tool. One command launches a full autonomous social engineering campaign. Every option is a flag. Every interaction is logged.
Every SPECTER SOCIAL engagement produces evidence-grade output. Every interaction logged. Every decision timestamped. Every finding mapped. Reports are Ed25519 signed and exportable to enterprise SIEMs.
Every report cryptographically signed. Tamper-evident. Verify authenticity with a single public key. No modification goes undetected.
Every attack mapped to MITRE ATT&CK social engineering techniques. Speak the same language as your threat intelligence team.
One-flag export to Splunk, Microsoft Sentinel, or IBM QRadar. Findings flow directly into your security operations pipeline.
Full vulnerability map per target. Authority susceptibility. Urgency compliance. Trust calibration scores. Actionable training recommendations.
LLM-powered brain. Thinks about what to say next. Adapts in real time. No human operator required after launch.
6 channels. Email, voice, SMS, web, chat, video. Coordinated campaigns across every communication vector.
Models the human target. Maps authority, stress, compliance. Every message is crafted for this specific person.
Target resists? Change channel. Change persona. Change timing. Change approach. Learn from every interaction.
Ed25519 signed. MITRE ATT&CK mapped. SIEM exportable. Not a phishing report — a forensic record.
Install SPECTER SOCIAL. Point it at your organisation. Let it think, adapt, and find the human vulnerabilities your phishing simulators missed.
SPECTER SOCIAL is designed exclusively for authorised red-team engagements conducted with the written consent of the target organisation.