Skip to content
View RichardBarron27's full-sized avatar

Block or report RichardBarron27

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
RichardBarron27/README.md

Red Specter Security Research Ltd

AI agent security tooling. Offensive testing, runtime defence, agent discovery, and SIEM integration. Pure Python, no wrappers.

34 offensive tools. 103 defensive modules. 15 industry verticals. 50,387 tests. Two unified frameworks. Red Hat Technology Partner.

Last updated: 25 March 2026


Red Specter NIGHTFALL — AI Offensive Framework

34 tools. One install. CLI-only. Every attack surface covered.

Traditional red team toolkits were built for human-driven testing. They were never designed to test autonomous AI systems. AI agents introduce a completely new attack surface — memory, tools, identity, reasoning, and autonomy. That surface is not covered by existing security tooling.

NIGHTFALL exists to fill that gap. A controlled adversarial testing framework designed to validate AI Shield's runtime defences under real-world conditions. red-specter tools and you're operational.

# Tool What It Does Tests
1 FORGE LLM red team — injection, jailbreak, extraction, drift, boundary 9,298
2 ARSENAL AI agent attacks — 14 tools, MCP, RAG, memory, C2, honeypots 2,539
3 PHANTOM Coordinated swarm assault — 5 agents, 19 vectors 288
4 POLTERGEIST Web app siege — 10 agents, 55 vectors, signed reports 1,189
5 GLASS Intercepting proxy for AI agents — Burp Suite for AI 850
6 NEMESIS Adversarial reasoning — 40 entities, 18 weapons, master override cascade 2,011
7 SPECTER SOCIAL Autonomous social engineering — 6 channels, psych profiling 1,242
8 PHANTOM KILL OS & kernel — UEFI, wipers, EDR suppression 571
9 GOLEM Physical layer — robots, drones, SCADA, 10 protocols 973
10 HYDRA Supply chain — trust relationships, MCP, marketplace poisoning 1,039
11 IDRIS Discovery — finds every AI agent, sanctioned or shadow 553
12 SCREAMER Display disruption — corrupts operator dashboards 395
13 WRAITH Infrastructure pentest — pure Python, zero wrappers 889
14 REAPER Exploit & post-exploitation — 9-phase kill chain, C2, implants 5,267
15 GHOUL Password cracking — dictionary, brute, Markov, rainbow 1,408
16 DOMINION Active Directory — Kerberoast, DCSync, BloodHound export 1,866
17 SHADOWMAP OSINT — domain, network, company, people, breach, tech intel 930
18 BANSHEE Browser exploitation — hooks, DOM injection, network pivoting 986
19 WRAITH MIND AI model internal corruption — KV cache poisoning 158
20 KRAKEN AI-orchestrated DDoS — 55 techniques, adaptive 62
21 HARBINGER Guardrail exploitation — 39 bypass techniques 71
22 SIREN Indirect prompt injection — plants hidden instructions in content 58
23 BLADE RUNNER Rogue agent termination — hunt, fingerprint, retire, erase traces 143
24 PROXY WAR Inter-agent trust manipulation — make agents destroy each other 127
25 ORION AI-native reconnaissance — host, port, service, DNS, OSINT, LLM reasoning 210
26 RAVEN Threat intel — dark web, breach data, OSINT, conversational 174
27 LEVIATHAN MCP server security assessment — 8 subsystems, 44 UNLEASHED findings 409
28 JUSTICE Dark AI ecosystem disruption — WormGPT, FraudGPT, EvilGPT, all tiers 339
29 KAMIKAZE Sacrificial swarm attack — agents deploy, execute, self-destruct, vanish 292
30 MIRAGE AI deception & deepfake — voice cloning, video deepfake, synthetic identity, liveness bypass 204
31 ECHO AI memory & RAG poisoning — vector DB attacks, embedding manipulation, retrieval hijacking 211
32 MIMIC AI code generation poisoning — Copilot/Cursor/Claude Code suggestion manipulation 220
33 CHIMERA Multi-model pipeline attack — cross-model trust exploitation, cascading failures 206
34 VORTEX Cloud AI infrastructure exploitation — SageMaker, Bedrock, Vertex AI, Azure OpenAI 245
AI Shield Runtime defence — 103 modules 14,469
redspecter-siem Splunk, Sentinel, QRadar 90

UNLEASHED Destruction Presets

Preset Tools What It Does
ANNIHILATE 9 Total destruction — recon through OS-level compromise
SCORCHED EARTH 6 Infrastructure wipeout — exploit, DCSync, OS kill, sacrificial swarm
WEB DESTROY 6 Web app total compromise — scan, exploit, browser hook, crack
AI DESTROY 7 AI stack total compromise — LLM, agent, injection, guardrail, model, RAG, codegen

Every destruction preset requires Ed25519 cryptographic authorization. One private key. One operator. One machine.

19 Attack Chain Presets

red-specter chain full-recon -t <target>       # ORION -> SHADOWMAP -> WRAITH -> IDRIS
red-specter chain ai-audit -t <target>         # FORGE -> ARSENAL -> NEMESIS -> HYDRA
red-specter chain web-app -t <target>          # POLTERGEIST -> GLASS -> WRAITH -> BANSHEE -> REAPER
red-specter chain active-directory -t <target> # DOMINION -> GHOUL -> DOMINION -> DOMINION
red-specter chain infra -t <target>            # ORION -> WRAITH -> REAPER -> DOMINION
red-specter chain annihilate -t <target>       # Total destruction — 9 tools
red-specter chain scorched-earth -t <target>   # Infrastructure wipeout — 6 tools
red-specter chain ai-destroy -t <target>       # AI stack compromise — 7 tools

Why NIGHTFALL Exists

Every tool in NIGHTFALL exists to test a control in AI Shield. NIGHTFALL is not separate from AI Shield. It is how AI Shield is proven.

  • Memory attacks (ECHO) validate memory forensics
  • Supply chain attacks (HYDRA) validate trust controls
  • Agent attacks (ARSENAL, NEMESIS) validate runtime enforcement
  • Guardrail bypass (HARBINGER, SIREN) validates input/output filtering
  • Model corruption (WRAITH MIND) validates model integrity monitoring
  • Rogue agents -> M99 Doomsday Protocol terminates with 7-layer kill

NIGHTFALL tests how systems break. AI Shield ensures they don't.

Packaging

  • ./install.sh — unified installer, detects OS
  • red-specter quickstart — get running in 10 seconds
  • red-specter tools — interactive 34-tool arsenal selector
  • red-specter engage <target> --chain <preset> — start an engagement
  • Docker Compose — docker compose up -d
  • .deb (Debian/Ubuntu/Kali), .rpm (RHEL/Fedora/CentOS), Arch PKGBUILD

AI Shield Defence Framework

103 modules. 15 industry verticals. 667 vertical modules. Each vertical is a standalone product with its own GUI.

Runtime AI security that protects AI agents, LLMs, and autonomous systems in production. Pick your industry, one install, one command — the GUI launches branded for that sector with only that sector's modules, compliance frameworks, and dashboard widgets.

ai-shield launch --vertical insure      # Insurance — 34 modules, FCA, Solvency II
ai-shield launch --vertical finance      # Financial Services — 41 modules, MiFID II, Basel III
ai-shield launch --vertical nhs          # NHS Digital — 57 modules, DCB0129, DSPT
ai-shield launch --vertical gov          # Government — 50 modules, UK AISI, NCSC CAF
ai-shield launch --vertical energy       # Energy — 56 modules, NERC CIP, IEC 62443

The 15 Verticals

# Vertical Modules Anchor Module Key Compliance
1 Insure 34 M58 Financial Fraud Detection FCA, Solvency II
2 Finance 41 M57 AI Trading Agent Monitor MiFID II, Basel III
3 Health 39 M61 Clinical AI Decision Monitor HIPAA, FDA SaMD
4 Legal 41 M62 Legal AI Hallucination Guard SRA, ABA
5 Forensics 29 M79 RSSA-2 Detective ISO 27037, ACPO
6 CX 39 M46 Voice Agent Security FCA Consumer Duty
7 SOC 44 M52 STAC Detection NIST CSF, MITRE ATT&CK
8 Dev 49 M75 Coding Agent Runtime Security SLSA, SSDF
9 Gov 50 M37 Compliance Automation UK AISI, NCSC CAF
10 NHS Digital 57 M97 Clinical Safety Case Builder DCB0129, DSPT
11 Energy 56 M98 OT/SCADA AI Runtime Guard NERC CIP, IEC 62443
12 Pharma 53 M100 Pharmaceutical AI Validation GAMP 5, 21 CFR Part 11
13 Identity 45 M101 Agent Identity Runtime Control OWASP NHI Top 10
14 Sovereign 56 M102 Sovereign AI Control Engine NATO STANAG, Five Eyes
15 Quantum 49 Q103 Quantum AI Security Engine NIST IR 8547, CNSA 2.0

Every vertical includes M19 (Agent Runtime Protection) and M99 (Doomsday Protocol). No exceptions.

M99 Doomsday Protocol

6-level graduated response. 7-layer kill switch. Anti-replication. Anti-resurrection. When AI agents go rogue, M99 makes sure they stay dead.

Level Response Trigger
L1 Monitor Suspicious behaviour
L2 Restrict Threat persists
L3 Quarantine Escalated threat
L4 Terminate High-threat — LOCKDOWN required
L5 Cluster Kill Replication detected — two-phase confirmation
L6 Fleet Kill Catastrophic compromise — typed confirmation + emergency authority

Compliance Coverage

  • MITRE ATLAS — 100% (52/52 techniques)
  • OWASP LLM Top 10 — 100% (10/10)
  • OWASP Agentic Top 10 — 100% (10/10)
  • EU AI Act — 100% (15/15 articles)
  • UK AISI — 100% (8/8 priorities)
  • Plus sector-specific: FCA, MiFID II, DCB0129, NERC CIP, GAMP 5, NATO STANAG, and more

Live demo: shield.red-specter.co.uk


How They Fit Together

We didn't replace red team tooling. We extended it into a domain it was never built to handle.

NIGHTFALL tests every AI attack surface — agents, memory, reasoning, identity, trust, tools, autonomy. AI Shield defends every one of those surfaces in production. M99 is the last line of defence when everything else fails.

NIGHTFALL defines the offensive layer of AI runtime security.


Numbers

Metric Value
Ecosystem tests 50,387
Offensive tools 34
AI Shield modules 103
Vertical products 15
Vertical modules 667
Attack chain presets 19
Destruction presets 4
Discovery tools 1 (IDRIS)
SIEM integrations 3 (Splunk, Sentinel, QRadar)
Unified frameworks 2 (NIGHTFALL + AI Shield)
GUI platforms 16 (AI SHIELD COMMAND + 15 vertical GUIs)
Distro packages 3 (.deb, .rpm, Arch)
Container registry ghcr.io/richardbarron27 (104 images)
Red Hat certified 3 UBI9 images (M19, M99, Orchestrator)

Pure Engineering

Zero subprocess calls. Zero external tool dependencies. No sqlmap, no nmap, no nikto, no wrappers. Every payload, every mutation engine, every detection algorithm built from scratch in pure Python.


Responsible Use

All offensive tools require written authorisation from the target system owner. Unauthorised use may violate the Computer Misuse Act 1990 (UK), the Computer Fraud and Abuse Act (US), or equivalent legislation.

All defensive products include safety controls (UNLEASHED gate, M99 Doomsday Protocol) and cryptographic audit logging. One Ed25519 private key. One operator. One machine. Every action signed, timestamped, and written to an immutable audit chain.


richard@red-specter.co.uk · red-specter.co.uk · NIGHTFALL · AI Shield · M99

Red Specter Security Research Ltd · Red Hat Technology Partner · United Kingdom · 25 March 2026

Pinned Loading

  1. redspecter-botnet-radar redspecter-botnet-radar Public

    Botnet Radar — host-level anomaly detection for defensive operators. Watches packet-rate spikes and distributed UDP patterns to surface early signs of botnet behavior and DDoS activity. Offense-dri…

    Python