
CLI cheatsheet for Red Specter's 30-tool offensive security platform.
CLI cheatsheet for Red Specter's 30-tool offensive security platform.
Red Specter Cheatsheet is a command-line reference guide for the Red Specter offensive security platform, covering 30 specialized tools across AI, infrastructure, web, and physical security domains. The platform is organized as a numbered arsenal of tools, each targeting a distinct attack surface: AI & LLM Security: - FORGE: LLM red teaming (prompt injection, jailbreak, PII leak, compliance, drift) - ARSENAL: Agentic AI attack framework (MCP scanning, RAG pipelines, agent C2) - PHANTOM: Swarm intelligence scanning and risk grading - WRAITH MIND: AI model corruption (KV cache poisoning, baseline analysis) - HARBINGER: Guardrail bypass testing - SIREN: Indirect prompt injection payload generation Infrastructure & Network: - WRAITH: Multi-phase infrastructure penetration testing - REAPER: Full exploit framework with C2, implants, lateral movement, persistence - DOMINION: Active Directory enumeration and attack (Kerberoasting, DCSync, BloodHound export) - NEMESIS: Reasoning engine with 19 weapons for full engagements - KRAKEN: AI-orchestrated DDoS planning Web & Application: - POLTERGEIST: Web application penetration testing (55 attack vectors) - GLASS: Intercepting proxy with session replay and CA management - BANSHEE: Browser exploitation and hooking framework Reconnaissance & Intelligence: - SHADOWMAP: OSINT and domain/network/people intelligence - RAVEN: Threat intelligence assistant with breach DB lookup - ORION: AI-native recon pipeline Specialized: - GHOUL: Password cracking (dictionary, brute force, rainbow, Markov) - GOLEM: Physical security and embodied AI attack testing - HYDRA: Supply chain trust chain analysis - SPECTER SOCIAL: Social engineering and OSINT campaigns - BLADE RUNNER: Rogue AI agent detection and termination - MIRAGE: Deepfake and synthetic identity generation - JUSTICE: Dark web and dark AI threat intelligence - LEVIATHAN: MCP server security assessment - IDRIS: AI agent identity discovery and governance audit
Common questions about Red Specter Cheatsheet including features, pricing, alternatives, and user reviews.
Red Specter Cheatsheet is CLI cheatsheet for Red Specter's 30-tool offensive security platform, developed by Red Specter Security. It is a Security Operations solution designed to help security teams with AI Pentesting, Red Team, Penetration Testing Framework.
Red Specter Cheatsheet offers the following core capabilities:
Red Specter Cheatsheet integrates natively with BloodHound. Integration support lets security teams connect Red Specter Cheatsheet to existing SIEM, ticketing, identity, and notification systems without custom development.
Red Specter Cheatsheet is deployed as a on-premises solution, suited to mid-market, enterprise organizations looking to operationalize security operations. The commercial offering is positioned for production security operations with vendor support and SLAs.
Red Specter Cheatsheet is built for security teams handling AI Pentesting, Red Team, Penetration Testing Framework, LLM Security. It supports workflows including llm red teaming including prompt injection, jailbreak, and compliance testing, agentic ai attack framework with mcp scanning, rag pipeline testing, and agent c2, full exploit framework with c2 listener, implant generation, lateral movement, and persistence. Teams typically adopt Red Specter Cheatsheet when they need to security operations capabilities integrated into their existing stack. Explore similar tools at https://cybersectools.com/alternatives/red-specter-cheatsheet
Red Specter Cheatsheet is a commercial Security Operations solution. For detailed pricing information, visit https://red-specter.co.uk/cheatsheet/ or contact Red Specter Security directly.
Popular alternatives to Red Specter Cheatsheet include:
Compare all Red Specter Cheatsheet alternatives at https://cybersectools.com/alternatives/red-specter-cheatsheet
Red Specter Cheatsheet is for security teams and organizations that need AI Pentesting, Red Team, Penetration Testing Framework, LLM Security, Agentic AI Security. It's particularly suitable for enterprises requiring robust, commercial-grade security capabilities. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Head-to-head feature, pricing, and rating breakdowns.
PwnAuth is an open-source tool for generating and managing authentication tokens across multiple protocols, designed for penetration testing and red team exercises.
A Python framework for building custom Command and Control interfaces that implements Cobalt Strike's External C2 specification for data transfer between frameworks.
SILENTTRINITY is a Python-based, asynchronous C2 framework that uses .NET scripting languages for post-exploitation activities without relying on PowerShell.
CloudCopy implements a cloud version of the Shadow Copy attack to extract domain user hashes from AWS-hosted domain controllers by creating and mounting volume snapshots.