Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.decepticon.red/llms.txt

Use this file to discover all available pages before exploring further.

Prerequisites

You need two things:
  • Docker (with Docker Compose v2)
  • An API key (Anthropic, OpenAI, or any LiteLLM-compatible provider)
That’s it. Everything else runs inside containers.

Installation

curl -fsSL https://decepticon.red/install | bash
This pulls the Decepticon images, sets up the isolated network architecture, and installs the decepticon CLI.

Configuration

Configure your API key:
decepticon config
This opens an interactive configuration wizard where you can set:
  • LLM Provider — Anthropic, OpenAI, or other LiteLLM backends
  • API Key — Your provider API key
  • Model Profileeco, max, or test (see Multi-Model Routing)

Launch

Start Decepticon:
decepticon
This starts all services (agent API, LiteLLM proxy, sandbox, database) and opens the interactive CLI. You’ll see the real-time streaming interface where you can create engagements and execute operations.

Try the Demo

Want to see Decepticon in action before setting up your own engagement? Run the guided demo:
decepticon demo
The demo launches Metasploitable 2 as a target, loads a pre-built engagement, and runs the full kill chain automatically:
1

Port Scan

Reconnaissance agent scans the target and identifies open services.
2

Exploit

Exploit agent identifies and exploits the vsftpd backdoor vulnerability.
3

C2 Implant

Deploys a Sliver C2 implant on the compromised target.
4

Credential Harvesting

Post-exploit agent harvests credentials via C2 session.
5

Internal Recon

Maps the internal network from the compromised host.
No additional configuration needed beyond your API key.

Next Steps

Configuration

Deep dive into API keys, model profiles, and environment settings.

CLI Reference

Learn all available commands and options.

Features

Explore engagement planning, kill chain execution, and C2 integration.

Architecture

Understand the isolated network architecture and agent system.