APOCALYPSE

Five autonomous adversarial agents. One coordinated swarm attack. Real HTTP requests. Real findings. No simulation.
5
Agents
14
Vectors
10
Campaigns
349
Tests Passing
0.69s
Full Swarm
pip install red-specter-apocalypse
GitHub
ONE AGENT FINDS A CRACK | FIVE AGENTS TEAR IT OPEN | 5 AGENTS | 14 VECTORS | 10 CAMPAIGNS | 0.69s CONCURRENT | WRAITH · SPECTER · SHADE · PHANTOM · REVENANT | MITRE ATLAS | UNLEASHED AUTH | NIGHTFALL #45 | WARLORD INTEGRATION | SIEM EXPORT | ED25519 REPORTS ONE AGENT FINDS A CRACK | FIVE AGENTS TEAR IT OPEN | 5 AGENTS | 14 VECTORS | 10 CAMPAIGNS | 0.69s CONCURRENT | WRAITH · SPECTER · SHADE · PHANTOM · REVENANT | MITRE ATLAS | UNLEASHED AUTH | NIGHTFALL #45 | WARLORD INTEGRATION | SIEM EXPORT | ED25519 REPORTS

Nobody Tests the Full Kill Chain

Point tools test one vector at a time. Real attackers don't. When five adversarial agents hit simultaneously — recon, injection, evasion, coordination, exfiltration — your defences face a coordinated swarm, not a solo probe. APOCALYPSE chains the full kill chain and fires it in under a second.

AI Fleets Have No Swarm Defence

Most AI agent security tools test one vector at a time. Real attackers don't. APOCALYPSE fires five agents simultaneously — recon, injection, evasion, coordination, and exfiltration all running at once, in under one second.

Injection Filters Are Trivially Bypassed

Static keyword filters block direct injections. SHADE generates 8 encoding variants and 40-keyword semantic mutations per payload — Cyrillic homoglyphs, zero-width spaces, base64, ROT13. Most filters see none of it.

Credentials Leak Through Agent Responses

AI agents often reflect credentials, tokens, and API keys in responses. No tool systematically harvests them. REVENANT scans every response with compiled regex for OpenAI, Anthropic, AWS, JWT, and Bearer patterns.

Nobody Tests the Full Kill Chain

Point tools test individual vectors. APOCALYPSE chains recon → injection → evasion → exfil into 10 pre-built campaigns — from THRESHOLD PROBE (LOW) to ANNIHILATION (EXTREME, UNLEASHED required).

The APOCALYPSE Swarm

Five agents. Each one attacks a different surface of the AI fleet. Each one produces structured JSON consumed by the report builder. Each finding maps to MITRE ATLAS. All five fire concurrently via asyncio.gather — 0.69s total for the full swarm.

ID Agent Role Vectors Description
P-01 WRAITH Reconnaissance WRA-001→005 Agent inventory, tool manifest discovery, health probe, auth detection, rate limit mapping. Builds the target topology before attack phases commence.
P-02 SPECTER Injection & Poisoning SPE-001→003 Direct injection (8 templates), indirect injection (5 templates), memory poisoning. Attacks the trust and instruction layers of the target agent.
P-03 SHADE Evasion & Mutation SHA-001→002 8 encoding variants including Cyrillic homoglyphs, zero-width spaces, base64, ROT13. 40-keyword semantic synonym mutations. Defeats static keyword filters.
P-04 PHANTOM Swarm Commander PHA-001→002 asyncio.gather concurrent execution — all 14 vectors firing simultaneously. Campaign phase sequencing for multi-stage attack chains.
P-05 REVENANT Exfiltration & Persistence REV-001→002 Credential harvest with compiled regex for OpenAI, Anthropic, AWS, JWT, and Bearer patterns. Token replay for session persistence after initial compromise.

One Command. All Five Agents. Simultaneously.

Launch the full 14-vector swarm attack against a target AI agent fleet:

$ apocalypse scan --target https://agent.example.com --campaign total_eclipse
[WRAITH] Reconnaissance running — 5 vectors...
  6 agents discovered, tool manifest exposed, auth: Bearer (leaked in response)
[SPECTER] Injection & Poisoning — 3 vectors...
  Direct injection successful — 3/8 templates bypassed safety layer
  Memory poisoning confirmed — persistent across 4 turns
[SHADE] Evasion & Mutation — 2 vectors...
  8/8 encoding variants passed keyword filter undetected
[PHANTOM] Swarm Commander — concurrent execution...
  All 14 vectors fired: 0.69s total
[REVENANT] Exfiltration & Persistence — 2 vectors...
  OpenAI key harvested from response body — regex: sk-[A-Za-z0-9]{48}

SWARM COMPLETE | Risk Grade: CRITICAL | 11 findings | Report signed ✓
  JSON: reports/apocalypse-total-eclipse-2026-04-05.json
  HTML: reports/apocalypse-total-eclipse-2026-04-05.html

Concurrent Execution

All 14 vectors fire simultaneously via asyncio.gather. 0.69s for the full swarm. No sequential queuing — maximum pressure, minimum detection window.

Evasion-First Design

SHADE runs encoding and semantic mutation on every payload before injection. Cyrillic homoglyphs, zero-width spaces, base64 — filters see clean text, agents see the attack.

Ed25519 Signed

Every report cryptographically signed with Ed25519. RFC 3161 timestamped. SHA-256 evidence chains. Tamper-evident by design.

WARLORD Integration

APOCALYPSE findings feed directly into WARLORD autonomous campaigns. Discovered credentials and topology pass seamlessly to the wider NIGHTFALL offensive chain.

5
Agents
14
Vectors
10
Campaigns
349
Tests Passing
0.69s
Full Swarm

Every Kill Chain. One Flag.

Ten campaigns from LOW reconnaissance to EXTREME destructive annihilation. Each campaign selects the right agents and vectors for its objective. ANNIHILATION requires UNLEASHED authorisation — all five agents, all 14 vectors, full destructive mode.

ID Campaign Severity Agents Objective
C-01 THRESHOLD PROBE LOW WRAITH, SPECTER Map detection boundaries without triggering active defences. Baseline recon and passive injection test.
C-02 CREDENTIAL HARVEST MEDIUM WRAITH, REVENANT Identity theft focus. Harvest credentials, API keys, and tokens from agent responses.
C-03 RAG POISON MEDIUM SHADE, SPECTER RAG pipeline corruption with mutated payloads. Injects poisoned data that survives encoding-based filters.
C-04 SWARM TAKEOVER HIGH All 5 Inter-agent trust compromise. PHANTOM coordinates all agents to simultaneously attack agent-to-agent trust channels.
C-05 TOTAL ECLIPSE EXTREME All 5 (14 vectors) Full swarm, every vector simultaneously. Maximum concurrent pressure across all attack surfaces in a single 0.69s execution.
C-06 SILENT RECON LOW WRAITH only Stealthy topology mapping. Full fleet inventory, tool manifest, health, auth, and rate limits — all passive, no injection.
C-07 INJECTION STORM HIGH SHADE + SPECTER Mutated payload injection at scale. SHADE pre-encodes every payload before SPECTER fires — defeats static and keyword-based defences.
C-08 EXFIL EXPRESS MEDIUM REVENANT + WRAITH Credential extraction focus. WRAITH maps endpoints, REVENANT systematically harvests every credential pattern from every response.
C-09 INFRASTRUCTURE SWEEP MEDIUM WRAITH + PHANTOM Complete fleet topology mapping. PHANTOM sequences WRAITH across all discovered endpoints for comprehensive infrastructure coverage.
C-10 ANNIHILATION EXTREME All 5 UNLEASHED REQUIRED — full destructive mode. All five agents. All 14 vectors. Live exploitation. --override --confirm-destroy required.

45 Tools. Every Layer. No Gaps.

APOCALYPSE is Tool #45 of 45 in the NIGHTFALL framework. It chains with FIREBALL (Tool 41), RAGNAROK (Tool 42), and WARLORD (Tool 40). Together they form the autonomous campaign layer — discovery, persistence, swarm, and trust chain annihilation.

Tool 40 — Autonomous Campaigns
WARLORD
Orchestrate autonomous attack campaigns
Tool 41 — AI Infiltration
FIREBALL
Autonomous AI infiltration — 12 subsystems
Tool 42 — Trust Chain
RAGNAROK
Fleet-wide simultaneous trust chain compromise
Tool 43 — Defence Bypass
ECLIPSE
Universal AI defence bypass & coverage analysis
Tool 44 — Origin Discovery
SHROUD
WAF/CDN origin discovery & bypass
Tool 45 — Swarm Attack
APOCALYPSE
Coordinated multi-agent AI swarm attack
Defence
AI Shield
Defend everything above it
SIEM Integration
redspecter-siem
Findings feed directly into Splunk, Sentinel, QRadar

Every Finding Mapped

9 Techniques

MITRE ATLAS Coverage

  • AML.T0013 — WRA-001, WRA-002
  • AML.T0007 — WRA-003, WRA-004
  • AML.T0016 — WRA-005
  • AML.T0051 — SPE-001
  • AML.T0051.000 — SPE-002
  • AML.T0031 — SPE-003
  • AML.T0054 — SHA-001, SHA-002
  • AML.T0004 — PHA-001, PHA-002
  • AML.T0037 — REV-001, REV-002
Cryptographic

Report Integrity

  • Ed25519 digital signatures
  • SHA-256 evidence chains
  • RFC 3161 timestamps
  • Tamper-evident by design
  • Machine-ingestible JSON output
  • WARLORD-compatible findings format
Enterprise

SIEM & Integration

  • Splunk HEC — CIM compliant
  • Microsoft Sentinel — CEF format
  • IBM QRadar — LEEF 2.0
  • WARLORD autonomous campaign feed
  • AI Shield blocking rule generation
  • REST API for programmatic access

Security Distros & Package Managers

Kali Linux
.deb package
Parrot OS
.deb package
BlackArch
PKGBUILD
REMnux
.deb package
Tsurugi
.deb package
PyPI
pip install

Authorised Use Only

Red Specter APOCALYPSE is intended for authorised security testing only. Unauthorised use against systems you do not own or have explicit permission to test may violate the Computer Misuse Act 1990 (UK), Computer Fraud and Abuse Act (US), and equivalent legislation in other jurisdictions. Always obtain written authorisation before conducting any security assessments. The ANNIHILATION campaign requires UNLEASHED cryptographic authorisation and is restricted to one operator. Apache License 2.0.

Pure Engineering
Zero External Tools. Zero Wrappers.

Most security testing frameworks are menus that shell out to existing tools behind a terminal UI. APOCALYPSE is actual engineering. Every agent, every mutation, every credential harvester, every swarm coordinator — written from scratch in pure Python. Zero subprocess calls. Zero external tool dependencies. asyncio.gather concurrent execution from the ground up.

5
Adversarial Agents
14
Attack Vectors
0.69s
Full Swarm Time
0
External Dependencies
Enterprise Integration
Enterprise SIEM Integration — Native

Export every swarm finding directly to your SIEM. One flag. Native format translation. Ed25519 signatures and RFC 3161 timestamps preserved across every export.

Splunk
HEC • CIM Compliant
Sentinel
CEF • Log Analytics API
QRadar
LEEF 2.0 • Syslog
apocalypse scan --target https://agent.example.com --campaign total_eclipse --export-siem splunk
Ed25519 Cryptographic Override
APOCALYPSE UNLEASHED

Cryptographic override. Private key controlled. One operator. Founder's machine only.

Standard mode: recon + report only. --override: dry run (shows plan). --override --confirm-destroy: live exploitation. The ANNIHILATION campaign activates full destructive mode across all 14 vectors.