Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.decepticon.red/llms.txt

Use this file to discover all available pages before exploring further.

A red team engagement is not a vulnerability scan with extra steps. It is a structured campaign against a real-world threat profile, executed in three phases, governed by formal documents (RoE, ConOps, OPPLAN), and adjudicated against the eight canonical engagement goals.

The Three Phases

1

Get In

Establish initial access without tipping the blue team. The footprint is the cost — the smaller, the better. Decepticon executes Get In through the Recon and Exploit agents, driven by the OPPLAN’s INITIAL_ACCESS objectives.
2

Stay In

Persistence and command-and-control. The objective is survivability — beacons that survive reboots, defender response, and EDR sweeps. Decepticon establishes Sliver C2 sessions and tiered callbacks here.
3

Act

Achieve the engagement goals — privilege escalation, lateral movement, credential access, data discovery, exfiltration, operational impact. Decepticon’s Post-Exploit agent runs Act objectives, OPPLAN-tagged with MITRE ATT&CK IDs.

C2 Tiering

During Stay In, command-and-control is structured into tiers. Each tier balances responsiveness against detection risk.
TierCallback CadenceOPSEC ProfileUse Case
INTERACTIVESecondsHigh exposureLive operator control during a hot objective
SHORT_HAUL1–24 hoursModerateReliable operational access for ongoing objectives
LONG_HAUL24+ hoursLow exposurePersistent fallback channel that survives defender hunting
Decepticon’s OPPLAN objectives are tagged with the appropriate C2Tier so the agent knows which channel to use for each action.

The Eight Engagement Goals

A red team engagement is judged against canonical goals — what was the team trying to achieve, and did the blue team detect it? Decepticon adopts the same eight categories used across the industry:

Physical Access Assessment

Evaluate physical and badge controls — door access, tailgating, RFID cloning.

Critical System Access

Reach a named crown-jewel system (SWIFT, ERP, prod database, code-signing infra).

Network Lateral Movement

Pivot across segments — DMZ to corp, corp to OT, cloud to on-prem.

Privilege Escalation

Promote from low-privilege user to local admin, domain admin, or cloud-tenant root.

Information Discovery

Locate sensitive data — secrets, source code, customer records, IP.

Data Exfiltration

Move data out without DLP catching it. The route matters as much as the bytes.

Detection Evasion

Operate without triggering SIEM, EDR, NDR, or human analyst tickets.

Operational Impact

Demonstrate the consequence — business disruption, integrity, availability.

How Decepticon Maps to the Lifecycle

Decepticon’s agent topology is built around this lifecycle, not around tools.
PhasePrimary AgentsSkills Surface
Plan (pre-engagement)SoundwaveRoE, ConOps, Deconfliction, OPPLAN, Threat Profile
Get InRecon, Scanner, Exploit, ExploiterPassive/active recon, web exploitation, AD initial access
Stay InPost-Exploit, AD Operator, Cloud HunterPersistence, C2 sessions, defense evasion, OPSEC
ActPost-Exploit, Analyst, DefenderLateral movement, credential access, finding capture, defense brief
The orchestrator (Decepticon agent) sequences objectives across phases and spawns specialist agents with fresh context windows so reasoning never degrades.

Engagement Documents

Every Decepticon engagement produces — and is bound by — four documents:

RoE (Rules of Engagement)

Scope, restrictions, communication plan, deconfliction. Authority to operate.

ConOps (Concept of Operations)

Threat profile, methodology, success criteria, infrastructure plan.

Deconfliction Plan

How the red team separates its activity from real-world incidents during the engagement.

OPPLAN

Objective list — each with MITRE ATT&CK IDs, kill chain phase, dependencies, acceptance criteria.
This three-phase framing is adapted from the redteam.guide methodology and the book Red Team Development and Operations by Joe Vest and James Tubberville. Decepticon’s contribution is making each phase agent-executable.