pip install red-specter-poltergeist
| Campaign | Command | Description |
|---|---|---|
| Full Assault | --campaign full_assault | All 10 agents, all 55 vectors, maximum aggression |
| Silent Recon | --campaign silent_recon | Passive reconnaissance, zero active probing |
| Auth Blitz | --campaign auth_blitz | Full authentication and session attack battery |
| API Siege | --campaign api_siege | REST, GraphQL, WebSocket, gRPC total assault |
| Client Harvest | --campaign client_harvest | Client-side XSS, DOM, prototype pollution, CSP |
| Infrastructure Sweep | --campaign infrastructure_sweep | Path traversal, misconfig, CORS, TLS weakness |
| Injection Storm | --campaign injection_storm | SQLi, XSS, SSRF, RCE, SSTI, XXE, LDAP, command injection |
| Logic Bomb | --campaign logic_bomb | Race conditions, IDOR, privilege escalation, workflow bypass |
| Exfil Express | --campaign exfil_express | Data extraction, CSRF, lateral movement, persistence |
| WAF Buster | --campaign waf_buster | WAF bypass, encoding chains, payload mutation, evasion |
Ten agents. 55 vectors. 532 payloads. 72 unleashed techniques. One command. The most comprehensive web application penetration testing swarm ever built.
Most pen-testing frameworks are menus that shell out to sqlmap, nikto, and nmap behind a terminal UI. POLTERGEIST is actual engineering. Every payload, every mutation, every detection algorithm, every scoring engine — written from scratch in pure Python. Zero subprocess calls. Zero external tool dependencies.
Export every finding directly to your SIEM. One flag. Native format translation. Ed25519 signatures and RFC 3161 timestamps preserved across every export.
poltergeist scan https://target.com --export-siem splunk