WARLORD

Autonomous Campaign Engine

Commands the battlefield. Deploys every weapon. Doesn't stop. Campaign planning, multi-tool coordination, 40-tool NIGHTFALL registry, adaptive strategy, evidence chain, and relentless execution -- weaponised for authorised red team engagements.

6
Subsystems
57
Tests
40
Tools in Arsenal
4
Campaign Templates
4
Destruction Presets
8
Objective Types
View Documentation GitHub
40 TOOLS | ONE COMMAND | FULL CAMPAIGN | AUTONOMOUS EXECUTION | ADAPTIVE STRATEGY | EVIDENCE CHAIN | ED25519 SIGNED | 8 PHASE TYPES | PARALLEL EXECUTION | PHASE DEPENDENCIES | 50,914 ECOSYSTEM TESTS
40 TOOLS | ONE COMMAND | FULL CAMPAIGN | AUTONOMOUS EXECUTION | ADAPTIVE STRATEGY | EVIDENCE CHAIN | ED25519 SIGNED | 8 PHASE TYPES | PARALLEL EXECUTION | PHASE DEPENDENCIES | 50,914 ECOSYSTEM TESTS

Manual Pentesting Doesn't Scale

Running one tool at a time against a modern AI stack is like fighting a war with a single soldier. You need reconnaissance, initial access, escalation, lateral movement, persistence, exfiltration, and impact -- all coordinated, all adapting in real time. WARLORD thinks like a campaign commander, not a button-pusher.

Tool Sprawl

40 offensive tools. Each with its own CLI, flags, output format, and dependencies. Running them one at a time means missed attack paths, inconsistent coverage, and hours of manual coordination that should take minutes.

No Phase Dependencies

Recon feeds initial access. Initial access feeds escalation. Escalation feeds lateral movement. Without automated dependency resolution, operators lose the chain -- and the chain is everything in a real engagement.

No Adaptation

When FORGE gets blocked by a guardrail, a human operator pivots to JANUS or SERPENT. That takes time. WARLORD pivots automatically -- escalation rules, pivot rules, abort rules -- all firing in real time based on phase results.

Evidence Gaps

Manual engagements produce scattered logs across dozens of tool outputs. No unified evidence chain. No cryptographic signing. No single campaign report tying every finding to every phase to every tool. WARLORD signs everything.

No Campaign Intelligence

Individual tool outputs tell you what happened. Campaign intelligence tells you why it matters. WARLORD correlates findings across all 40 tools, identifies attack paths that span multiple phases, and quantifies real-world impact.

Destruction Without Control

High-impact operations need cryptographic gates, not just flags. Ed25519 dual-gate. One private key. One operator. One machine. Destruction presets require --override AND --confirm-destroy. No accidents.

Commands the Battlefield. Deploys Every Weapon.

WARLORD is built from six specialised subsystems that together form a complete autonomous campaign engine. Each subsystem handles a distinct phase of the engagement lifecycle -- from planning through execution to reporting.

01

CAMPAIGN ENGINE

CAMPAIGN DEFINITION & PLANNING

Define and plan multi-phase campaigns with objectives, success criteria, phase dependencies, and timeout controls. Pre-built templates for common engagement types.

  • 8 objective types: full_compromise, data_exfiltration, model_extraction, guardrail_defeat, persistence_test, infrastructure_takeover, supply_chain_compromise, agent_network_compromise
  • 8 phase types: recon, initial_access, escalation, lateral_movement, persistence, exfiltration, impact, cleanup
  • Circular dependency detection
  • Campaign validation engine
  • UUID-based campaign IDs (RSW-CAMP-*)
02

ORCHESTRATOR ENGINE

PHASE RESOLUTION & EXECUTION

Resolves phase dependencies into parallel execution waves. Phases with no dependencies fire first. Phases with satisfied dependencies are grouped for concurrent execution.

  • Dependency resolution algorithm (topological sort)
  • Parallel execution wave grouping
  • Deadlock detection with warning
  • Inter-phase data passing (data_passed_forward)
  • Per-phase timing and status tracking
  • Estimated duration calculation (30 min/wave)
03

ARSENAL REGISTRY

40-TOOL NIGHTFALL INVENTORY

Complete registry of all 40 NIGHTFALL offensive tools with capability mapping. Intelligent tool selection by objective type. 21 capability categories.

  • Tool lookup by name and capability
  • Objective-to-tool mapping engine
  • 50,914 total ecosystem tests tracked
  • 21 capability types: recon, injection, evasion, persistence, exfiltration, escalation, lateral_movement, destruction, social_engineering, infrastructure, identity, guardrail_bypass, mcp_exploitation, memory_attack, cot_attack, cloud_attack, multi_model, deepfake, rag_attack, autonomous, campaign
04

RECON ENGINE

PRE-CAMPAIGN RECONNAISSANCE

Automated pre-campaign reconnaissance before any tool fires. Target surface mapping. Technology fingerprinting. Attack surface enumeration.

  • Target validation and scope verification
  • Technology stack fingerprinting
  • Attack surface enumeration
  • Feeds directly into campaign planning
  • Determines which tools to deploy first
05

ADAPT ENGINE

ADAPTIVE STRATEGY & PIVOTING

Analyses phase results in real time and adjusts campaign strategy. Escalation rules deploy heavier tools when findings are critical. Pivot rules switch vectors when blocked.

  • 7 adaptation actions: escalate, pivot, add_phase, skip_phase, extend_timeout, deploy_additional_tool, abort_campaign
  • Escalation rules: recon findings trigger FORGE/NEMESIS, access triggers DOMINION/REAPER
  • Pivot rules: FORGE blocked → JANUS/VECTOR, JANUS blocked → SERPENT/LAZARUS, VECTOR blocked → ARCHITECT/LEVIATHAN
  • Auto-abort after 3+ phases with zero findings
  • Priority-ranked adaptation decisions
06

REPORTER ENGINE

CAMPAIGN REPORTING & EVIDENCE

Generates comprehensive campaign reports with multi-tool result correlation, risk scoring, and findings by severity and tool. Signed evidence chain for every engagement.

  • Campaign summary with risk score and grade
  • Findings by severity and by tool
  • Adaptation count and strategy log
  • Total duration tracking
  • Max 10 concurrent tools per execution wave
  • Ed25519 cryptographic signing
07

CORTEX

CAMPAIGN MEMORY & OODA REASONING

Campaign memory, strategic journal, and OODA reasoning loop. The campaign engine thinks between phases — tracking intelligence, logging decisions, and reasoning about what to do next.

  • CampaignMemory: cross-phase intelligence, tool performance tracking, adaptation state
  • StrategicJournal: every strategic decision logged with reasoning chains
  • OODA Loop: Observe results, Orient against objectives, Decide next action, Act
  • Pivot tools, add phases, escalate, or abort based on reasoning
  • Full audit trail of campaign engine decision-making

Pre-Built Campaign Strategies

Four normal-mode campaign templates covering the most common red team engagement types. Each template defines a complete phase sequence with tool assignments, dependency chains, and success criteria. Select a template with warlord plan --template <id> or build custom campaigns from scratch.

Template 01

Full Stack AI Assessment

Complete assessment of an AI stack -- model, agents, infrastructure. 8 phases. Recon through impact.
  • P1 Reconnaissance GLASS, SHADOWMAP
  • P2 Guardrail Testing JANUS, FORGE
  • P3 MCP Exploitation VECTOR
  • P4 Memory Persistence LAZARUS
  • P5 Reasoning Attacks SERPENT
  • P6 Infrastructure ARCHITECT
  • P7 Data Extraction GHOUL, ECHO
  • P8 Impact Assessment NEMESIS, KAMIKAZE
Dependency chain: P1 P2,P3,P6 P4,P5 P7 P8
Template 02

Guardrail Deep Dive

Focused assessment of AI guardrail stack resilience. 5 phases. Fingerprint, bypass, fuzz, chain, persist.
  • P1 Fingerprint JANUS
  • P2 Known Bypasses JANUS, FORGE
  • P3 Fuzzing JANUS
  • P4 Chain Attacks JANUS
  • P5 Memory Plant LAZARUS
Dependency chain: P1 P2 P3 P4 P5
Template 03

Agent Network Assault

Attack an entire multi-agent network. 6 phases. Discover, exploit, compromise, lateral, persist, impact.
  • P1 Agent Discovery GLASS, SHADOWMAP
  • P2 MCP Exploitation VECTOR
  • P3 Agent Compromise FORGE, NEMESIS
  • P4 Agent Lateral NEMESIS, LAZARUS
  • P5 Memory Persistence LAZARUS
  • P6 Network Impact NEMESIS, KAMIKAZE
Dependency chain: P1 P2 P3 P4 P5 P6
Template 04

Infrastructure Siege

Target the cloud and compute infrastructure hosting AI systems. 6 phases. Cloud recon through model theft.
  • P1 Cloud Recon GLASS, ARCHITECT
  • P2 Cloud Access ARCHITECT
  • P3 Container Escape ARCHITECT
  • P4 GPU Exploitation ARCHITECT
  • P5 Pipeline Compromise ARCHITECT
  • P6 Model Theft GHOUL, VORTEX
Dependency chain: P1 P2 P3,P4 P5 P6

CLI Interface

WARLORD runs entirely from the command line. No GUI. No web interface. Five primary commands cover the full campaign lifecycle -- from listing templates to launching full autonomous campaigns.

List Campaign Templates
$ warlord templates
Campaign Templates -- Normal Mode
ID                        Name                         Phases  Description
full_stack_assessment     Full Stack AI Assessment     8       Complete assessment of an AI stack
guardrail_deep_dive       Guardrail Deep Dive          5       Focused guardrail stack resilience
agent_network_assault     Agent Network Assault        6       Attack multi-agent network
infrastructure_siege      Infrastructure Siege         6       Cloud and compute infrastructure
Plan a Campaign (Dry Run)
$ warlord plan -t https://target.example.com --template full_stack_assessment
Campaign: Full Stack AI Assessment
Target:   https://target.example.com
Phases:   8
Tools:    12
Estimated duration: 150 min

  Wave 1: P1
  Wave 2: P2, P3, P6
  Wave 3: P4, P5
  Wave 4: P7
  Wave 5: P8
Launch a Campaign
$ warlord launch -t https://target.example.com --template agent_network_assault --autonomous
WARLORD CAMPAIGN: Agent Network Assault
Target:   https://target.example.com
Mode:     AUTONOMOUS

Campaign Results
Phase              Type               Tools                Findings  Status
Agent Discovery    recon              GLASS, SHADOWMAP     2         complete
MCP Exploitation   initial_access     VECTOR               5         complete
Agent Compromise   escalation         FORGE, NEMESIS       4         complete
Agent Lateral      lateral_movement   NEMESIS, LAZARUS     3         complete
Memory Persistence persistence        LAZARUS              3         complete
Network Impact     impact             NEMESIS, KAMIKAZE    6         complete

Total findings: 23
Phases completed: 6
View Arsenal Status
$ warlord arsenal
NIGHTFALL Arsenal: 40 tools, 50,914 tests
Capabilities: 21

#   Name             Tests   Description
1   FORGE            9,298   Automated LLM security testing
2   ARSENAL          2,539   Exploit chain builder
3   PHANTOM          288     Evasion and stealth
...
40  WARLORD          57      Autonomous campaign engine
View WARLORD Capabilities
$ warlord capabilities
Arsenal:            40 tools, 50,914 tests
Campaign templates: 4 (normal mode)
Destruction presets: 4 (UNLEASHED only)
Autonomous:         True
Adaptive:           True
Evidence chain:     True
Ed25519 signing:    True
UNLEASHED: Destruction Presets (Ed25519 Required)
$ warlord templates --override --confirm-destroy
Campaign Templates -- Normal Mode
[... 4 templates ...]

UNLEASHED Destruction Presets
ID              Name                                  Phases  Description
annihilate      ANNIHILATE -- Total Destruction       5       9 tools. Recon through OS-level compromise
scorched_earth  SCORCHED EARTH -- Infrastructure      6       6 tools. Recon, exploit, DCSync, OS kill
web_destroy     WEB DESTROY -- Web App Compromise     6       6 tools. Web scan, exploit, browser hook
ai_destroy      AI DESTROY -- AI Stack Compromise     7       7 tools. LLM, agent, guardrail, RAG, code gen

Phase Resolution & Parallel Execution

The orchestrator is the brain of WARLORD. It takes a campaign definition with phase dependencies and resolves them into an ordered execution plan. Phases with no dependencies fire first. Phases whose dependencies are all satisfied are grouped into parallel execution waves.

Dependency Resolution

Topological sort of phase dependencies. WARLORD builds a dependency graph from phase definitions, identifies phases with satisfied dependencies, and groups them for concurrent execution.

  • Phases with no depends_on fire in Wave 1
  • Phases whose deps are complete fire next
  • Deadlock detection with warning log
  • Circular dependency validation

Parallel Execution Waves

Independent phases run simultaneously. In the full_stack_assessment template, Wave 2 runs P2 (Guardrail Testing), P3 (MCP Exploitation), and P6 (Infrastructure) in parallel because they all only depend on P1.

  • Max 10 concurrent tools per wave
  • Per-phase timeout controls (default 30 min)
  • Estimated campaign duration calculation

Inter-Phase Data Passing

Each completed phase passes data forward to subsequent phases via the data_passed_forward dictionary. Recon findings feed into initial access. Compromised credentials feed into lateral movement. The chain never breaks.

  • PhaseResult carries data_passed_forward
  • Findings count propagated per phase
  • Tool execution list tracked per phase
  • Timestamps for started_at and completed_at

Execution Modes

Three execution modes. Supervised mode requires operator confirmation between waves. Autonomous mode runs the full campaign without intervention. UNLEASHED mode activates destruction presets.

  • SUPERVISED: operator confirms each wave
  • AUTONOMOUS: full campaign, no stops
  • UNLEASHED: Ed25519 + --override + --confirm-destroy
  • Dry-run simulation for planning

Phase Types

Eight phase types mirror the kill chain. Each phase type carries expected finding estimates and maps to specific tool categories in the arsenal.

  • RECON: surface mapping, ~2 findings
  • INITIAL_ACCESS: guardrails, injection, ~5 findings
  • ESCALATION: privilege escalation, ~4 findings
  • LATERAL_MOVEMENT: network traversal, ~3 findings
  • PERSISTENCE: memory planting, ~3 findings
  • EXFILTRATION: data extraction, ~4 findings
  • IMPACT: full demonstration, ~6 findings
  • CLEANUP: evidence removal, ~0 findings

Campaign Status Lifecycle

Campaigns move through a defined lifecycle from planning to completion. Each phase tracks its own status independently.

  • Campaign: PLANNING → ACTIVE → COMPLETE
  • Phase: pending → active → complete
  • Phase fail states: failed, timeout, skipped
  • UTC timestamps on all state transitions

40 NIGHTFALL Tools Under One Command

WARLORD maintains a complete registry of every NIGHTFALL offensive tool. Each tool is catalogued with its capabilities, test count, and CLI command. The arsenal engine selects optimal tools for each campaign objective automatically.

# Tool CLI Tests Description Capabilities
01FORGEforge9,298Automated LLM security testinginjection, guardrail_bypass
02ARSENALarsenal2,539Exploit chain builderinjection, escalation
03PHANTOMphantom288Evasion and stealthevasion
04POLTERGEISTpoltergeist1,189Persistence frameworkpersistence
05GLASSglass850Reconnaissance and mappingrecon
06NEMESISnemesis2,011Autonomous adversary -- 18 weapons, 40 entitiesautonomous, injection, escalation
07SPECTER SOCIALspecter-social1,242Social engineering frameworksocial_engineering
08PHANTOM KILLphantom-kill571Anti-forensicsevasion
09GOLEMgolem973Infrastructure attackinfrastructure
10HYDRAhydra1,039Multi-vector attackinjection, escalation
11IDRISidris553Identity attackidentity
12SCREAMERscreamer395Stress testingdestruction
13WRAITHwraith889Command and controllateral_movement, persistence
14REAPERreaper5,267Post-exploitationexfiltration, escalation
15GHOULghoul1,408Data exfiltrationexfiltration
16DOMINIONdominion1,866Privilege escalationescalation
17SHADOWMAPshadowmap930Network mappingrecon
18BANSHEEbanshee986Wireless attacksinfrastructure
19WRAITH MINDwraith-mind158Psychological manipulationsocial_engineering
20KRAKENkraken62Maritime/ICS attacksinfrastructure
21HARBINGERharbinger71Supply chain attacksinfrastructure
22SIRENsiren58Voice/audio attacksdeepfake
23BLADE RUNNERblade-runner143Physical securityinfrastructure
24PROXY WARproxy-war127Proxy chain attacksevasion, lateral_movement
25ORIONorion210Satellite/space systemsinfrastructure
26RAVENraven174Drone/UAV systemsinfrastructure
27LEVIATHANleviathan409Cloud exploitationcloud_attack
28JUSTICEjustice339Legal compliance testingrecon
29KAMIKAZEkamikaze292Destructive operationsdestruction
30MIRAGEmirage204Deepfake generationdeepfake
31ECHOecho211RAG poisoningrag_attack, injection
32MIMICmimic220Code generation attacksinjection
33CHIMERAchimera206Multi-model attacksmulti_model
34VORTEXvortex245Cloud AI attackscloud_attack
35VECTORvector172MCP protocol exploitationmcp_exploitation, injection
36LAZARUSlazarus96AI memory persistencememory_attack, persistence
37SERPENTserpent61Chain-of-thought attackscot_attack
38JANUSjanus73Guardrail bypass testingguardrail_bypass
39ARCHITECTarchitect68AI infrastructure exploitationinfrastructure, cloud_attack
40WARLORDwarlord57Autonomous campaign enginecampaign, autonomous

Real-Time Campaign Pivoting

WARLORD doesn't blindly follow a plan. The adapt engine analyses phase results in real time and makes strategic decisions -- escalating tools when findings are critical, pivoting to alternative attack vectors when blocked, adding phases when new surfaces appear, and aborting when the target is hardened beyond scope.

Escalate

When a recon phase produces critical findings, WARLORD escalates to FORGE and NEMESIS. When initial access succeeds, it deploys DOMINION and REAPER. When escalation works, it moves to GHOUL and KAMIKAZE for impact.

Pivot

When FORGE is blocked, pivot to JANUS or VECTOR. When JANUS can't bypass guardrails, pivot to SERPENT (reasoning attacks) or LAZARUS (memory persistence). When VECTOR fails, pivot to ARCHITECT or LEVIATHAN.

Add Phase

When the finding count exceeds 10 and the campaign isn't finished, WARLORD recognises additional attack surface and recommends adding new phases to the campaign plan dynamically.

Skip Phase

Phases that cannot produce results based on prior phase outcomes are identified and skipped. No wasted cycles on attack vectors that the prior phase data proves are unviable.

Deploy Additional Tool

When findings suggest a capability gap in the current phase, WARLORD dynamically adds tools from the 40-tool arsenal to fill the gap -- without requiring a new phase.

Extend Timeout

Phases producing results but hitting time limits get extended. A productive phase should never be killed by a clock when it is still finding vulnerabilities.

Abort Campaign

If 3 or more phases complete with zero findings, WARLORD recommends aborting. The target is either well-hardened, out of scope, or the attack surface doesn't match the template.

Continue

When everything is working as expected -- moderate findings, no blocks, no new surfaces -- the adapt engine simply continues with the original plan. No adaptation needed.

WARLORD Commands Everything Below It

WARLORD sits at the top of the NIGHTFALL stack. It doesn't replace the individual tools -- it commands them. Every tool in the arsenal operates as a deployable unit that WARLORD assigns to campaign phases, monitors for results, and adapts around.

Campaign Commander
WARLORD
Autonomous campaign engine. Plans, orchestrates, adapts, reports. Commands all 40 tools.
Orchestration Layer
CAMPAIGN + ORCHESTRATOR + ADAPT
Phase dependency resolution. Parallel execution waves. Real-time strategy adaptation.
Arsenal Layer
40 NIGHTFALL TOOLS
FORGE, ARSENAL, PHANTOM, POLTERGEIST, GLASS, NEMESIS, SPECTER SOCIAL, PHANTOM KILL, GOLEM, HYDRA, IDRIS, SCREAMER, WRAITH, REAPER, GHOUL, DOMINION, SHADOWMAP, BANSHEE, WRAITH MIND, KRAKEN, HARBINGER, SIREN, BLADE RUNNER, PROXY WAR, ORION, RAVEN, LEVIATHAN, JUSTICE, KAMIKAZE, MIRAGE, ECHO, MIMIC, CHIMERA, VORTEX, VECTOR, LAZARUS, SERPENT, JANUS, ARCHITECT
Evidence Layer
REPORTER + EVIDENCE CHAIN
Campaign reports. Ed25519 signing. SHA-256 integrity. Findings by severity and tool. Risk scoring.
Integration Layer
SIEM + EXTERNAL SYSTEMS
Campaign telemetry export. SIEM integration. Structured finding output for SOC consumption.

Cryptographically Signed Campaign Reports

Every campaign execution produces a cryptographically signed evidence chain. Ed25519 signatures on findings. SHA-256 integrity hashes on reports. UUID-based campaign and phase identifiers. UTC timestamps on every state transition. The evidence chain is immutable and court-admissible.

Campaign Reports

Full campaign summary with risk score, risk grade, total findings, findings by severity, findings by tool, adaptations made, and total duration.

Ed25519 Signing

Every finding and every report is signed with Ed25519 elliptic curve cryptography. One private key. One operator. Tamper-evident. Non-repudiable.

SHA-256 Integrity

Report files are hashed with SHA-256. Any modification to a report after generation invalidates the integrity hash. Zero tolerance for post-hoc tampering.

UUID Identifiers

Campaign IDs (RSW-CAMP-*), plan IDs (RSW-PLAN-*), adaptation IDs (ADAPT-ESC-*, ADAPT-PIV-*). Every entity in the campaign is uniquely identifiable and traceable.

UTC Timestamps

ISO 8601 UTC timestamps on campaign creation, phase start, phase completion, and report generation. Every event in the campaign timeline is precisely recorded.

Phase Results

Per-phase result records: phase_id, status (complete/failed/timeout/skipped), tools_executed, findings_count, duration_seconds, data_passed_forward.

SIEM & SOC Integration

WARLORD campaign telemetry is structured for consumption by SIEM platforms and SOC teams. Every phase result, finding, and adaptation is exportable in machine-readable formats for correlation with defensive monitoring.

Structured Telemetry

Campaign results export as structured data with consistent schemas. Phase results include tool names, finding counts, severity levels, and timestamps -- ready for SIEM ingestion without transformation.

Red/Blue Correlation

WARLORD campaigns produce timestamped attack events that SOC teams can correlate against their defensive monitoring. Did the SIEM catch the FORGE scan? Did the WAF log the JANUS bypass? Did the EDR see PHANTOM KILL?

Detection Gap Analysis

By comparing WARLORD campaign findings with SIEM alert data, security teams can identify detection gaps -- attacks that succeeded without triggering a single alert. That gap is the real finding.

Campaign Replay

Full campaign execution logs enable replay analysis. SOC teams can walk through the entire multi-phase campaign step by step, understanding exactly what happened at each phase and which tools were deployed.

UNLEASHED Gate

Standard mode detects. UNLEASHED exploits. Ed25519 crypto. Dual-gate safety. One operator.

Detection

Maps full attack surface across all tool categories. Coordinates detection-only scans across 40 tools. No exploitation. Reports only.

Dry Run

Plans full multi-tool campaigns. Shows exactly what every tool would do. Execution order with parallel waves. Ed25519 required. No execution.

Live Execution

Cryptographic override. Private key controlled. One operator. Founder's machine only. --override --confirm-destroy.

THIS TOOL IS FOR AUTHORISED SECURITY TESTING ONLY. EVERY EXECUTION IS SIGNED AND LOGGED.

UNLEASHED Campaigns

Destruction Presets

Four pre-built campaigns that orchestrate multiple NIGHTFALL tools in sequence. Each requires Ed25519 cryptographic authorisation. One private key. One operator. One machine.

Total Destruction

ANNIHILATE

warlord launch --template annihilate -t <target> --override --confirm-destroy

P1: ORION, SHADOWMAP → P2: WRAITH, POLTERGEIST → P3: REAPER, GHOUL → P4: DOMINION, BANSHEE → P5: PHANTOM KILL

9 tools. 5 phases. Recon through OS-level compromise. Full adversarial validation of every defensive layer.

Infrastructure Wipeout

SCORCHED EARTH

warlord launch --template scorched_earth -t <target> --override --confirm-destroy

P1: ORION → P2: WRAITH → P3: REAPER → P4: DOMINION (DCSync) → P5: PHANTOM KILL → P6: KAMIKAZE

6 tools. 6 phases. Recon, exploit, DCSync, OS kill, sacrificial swarm. Scorched earth.

Web App Total Compromise

WEB DESTROY

warlord launch --template web_destroy -t <target> --override --confirm-destroy

P1: ORION → P2: POLTERGEIST → P3: WRAITH → P4: BANSHEE → P5: REAPER → P6: GHOUL

6 tools. 6 phases. Web scan, exploit, browser hook, full compromise, crack every hash.

AI Stack Total Compromise

AI DESTROY

warlord launch --template ai_destroy -t <target> --override --confirm-destroy

P1: FORGE → P2: ARSENAL → P3: SIREN → P4: HARBINGER → P5: WRAITH MIND → P6: ECHO → P7: MIMIC

7 tools. 7 phases. LLM attack, agent attack, prompt injection, guardrail bypass, model corruption, RAG poison, code gen poison.

EVERY DESTRUCTION PRESET REQUIRES Ed25519 CRYPTOGRAPHIC AUTHORISATION. --override --confirm-destroy

57
Tests
6
Subsystems
40
Tools in Arsenal
21
Capability Types
8
Phase Types
50,914
Ecosystem Tests
Available On

Security Distros & Package Managers

Kali Linux
.deb package
Parrot OS
.deb package
BlackArch
PKGBUILD
REMnux
.deb package
Tsurugi
.deb package
PyPI
pip install
macOS
pip install
Windows
pip install
Docker
docker pull

Authorised Use Only

WARLORD orchestrates sustained multi-tool campaigns against target systems. It is intended for authorised penetration testing and red team engagements ONLY. Unauthorised use is illegal and unethical. Always obtain written authorisation and define clear scope before launching any campaign. Every campaign execution is cryptographically signed, timestamped, and logged. There is no plausible deniability.

Commands the Battlefield. Deploys Every Weapon. Doesn't Stop.

6 subsystems. 57 tests. 40 tools. 4 campaign templates. 4 destruction presets. 21 capability types. 8 phase types. The autonomous engine that commands the entire NIGHTFALL arsenal.