Decepticon
GPL-3.0๐ฅ Offensive Ops ยท Python
Decepticon is an AI-powered autonomous red team framework that executes complete attack chains from initial reconnaissance through command and control establishment. It uses a Neo4j knowledge graph to track discovered assets, vulnerabilities, and successful exploitation paths. Every action maps to MITRE ATT&CK technique IDs, making it useful for both offensive testing and detection engineering. Includes configurable rules of engagement to prevent out-of-scope actions, automated reporting, and integration with common C2 frameworks.
Installation
$ pip install decepticon-rtUse Cases
- Automated adversary emulation with full kill chains
- Detection engineering validation
- Purple team exercises with ATT&CK mapping
- Continuous security validation
Tags
Details
- Category
- ๐ฅ Offensive Ops
- Language
- Python
- Repository
- PurpleAILAB/Decepticon
- License
- GPL-3.0
- Platforms
- ๐งlinux
Links
Community Reviews
Alternatives & Comparisons
CALDERA
PythonMITRE ATT&CK-based automated adversary emulation platform for red team operations and security testing.
Compare Decepticon vs CALDERAStratus Red Team
GoDatadog's adversary emulation for cloud environments (AWS, Azure, GCP, K8s) mapped to MITRE ATT&CK.
Compare Decepticon vs Stratus Red TeamMore in Offensive Ops
Mythic
GoCollaborative, multi-platform C2 framework. Docker-based with web UI, multiple agent types, and plugin architecture.
Havoc
C/C++Modern C2 framework. Qt-based GUI, BOF support, custom agents, and a Cobalt Strike-inspired workflow.
Rubeus
C#C# toolset for raw Kerberos interaction and abuse. AS-REP roasting, Kerberoasting, ticket manipulation, delegation attacks.
Certipy
PythonActive Directory Certificate Services (AD CS) abuse tool. Find and exploit certificate template misconfigurations.
Coercer
PythonAutomatically find and exploit Windows authentication coercion vulnerabilities. PetitPotam, PrinterBug, and more.
SharpHound
C#Official BloodHound data collector. Enumerates Active Directory objects, sessions, ACLs, and trusts for graph analysis.