Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.decepticon.red/llms.txt

Use this file to discover all available pages before exploring further.

To fully grasp Decepticon’s identity as an Autonomous Hacking Agent, it is essential to understand the fundamental differences between Vulnerability Assessment, Penetration Testing, and Red Team Engagement. Decepticon explicitly targets the methodology of the last — and adds a fourth, machine-speed mode on top.

The Three Disciplines

The security testing landscape forms an inverted pyramid: vulnerability assessments at the wide base (broad, shallow), penetration tests in the middle (targeted, deeper), and red team engagements at the apex (scenario-driven, full-organization).

Vulnerability Assessment

Identify technical flaws across a wide attack surface. Output: a list.

Penetration Test

Exploit those flaws to prove attack paths within a targeted scope.

Red Team Engagement

Train and measure the defenders by emulating a real adversary end-to-end.

Side-by-Side Comparison

The following framing is adapted from the canonical comparison published by redteam.guide — extended with a fourth column for the autonomous-agent mode Decepticon enables.
AspectVulnerability AssessmentPenetration TestRed Team EngagementAutonomous Red Team (Decepticon)
GoalIdentify technical flawsExploit flaws to prove attack pathsTrain and measure blue team effectivenessContinuously rehearse the blue team against an AI adversary
ScopeWide, shallowTargeted systemsFull organizationFull organization, programmatically expandable
FocusTechnologyTechnologyPeople, processes, and technologyPeople, processes, technology — driven by an OPPLAN
DurationDays1–2 weeks2–6 weeksHours to continuous (machine-speed loops)
Threat ModelCVE-basedAttack surfaceAdversary emulationAdversary emulation, dynamic per engagement
Risk MeasurementAttack-surface reductionTechnical exploit impactSecurity operations assessmentOperations assessment + regression coverage over time
OutputVulnerability listExploit evidence and attack pathsSecurity operations assessmentOPPLAN-tagged findings, attack graph, remediation patches
The fourth column is not a replacement for human red teams — it is the same discipline, scaled. Humans set the Rules of Engagement, define objectives, and adjudicate findings; Decepticon executes the kill chain inside that envelope.

The Limitation of Traditional Pentesting

Traditional penetration testing focuses on evaluating security in silos — web, mobile, or external networks individually.
  • Siloed Evaluation: Pentesting might find SQL injection in a single web app, but it doesn’t test if defenders can detect an attacker using that web app as a proxy to pivot into the internal network.
  • The Soccer Analogy: Pentesting is like practicing shooting, passing, and dribbling individually. These are essential skills, but practicing them in isolation for four years won’t prepare a team for the World Cup if they never play an 11-vs-11 match.
  • The Real Limitation: Pentests fail to test how the organization’s overall security controls, blue team, and processes work together organically during a real, multi-stage attack.

Red Team Testing: The “Real Match”

Red Teaming is the actual 11-vs-11 practice match — a comprehensive adversarial simulation designed to test an organization’s holistic defense capabilities over an extended period (typically 4–8 weeks).

Core Attributes of Red Teaming

  1. Holistic & Multi-Domain — Real attackers don’t attack just the web app and stop. They chain cloud, mobile, internal networks, and even physical or social engineering vectors. Red Teaming mirrors this.
  2. Stealth & Persistence — The primary goal is to remain undetected by the blue team. Red teamers operate quietly, evading SIEMs and EDRs, and maintain access (persistence) over long periods.
  3. Realistic Objectives — Instead of listing CVEs, the goal is practical: Can we access the SWIFT infrastructure? Can we exfiltrate dummy customer data without the blue team noticing?
  4. Threat Gets a Vote — Engagements are grounded in what real threats actually do, not just what defenders plan for. The threat profile drives the TTPs.
  5. Assumed Breach — If initial access (e.g., phishing) is blocked, red teamers shift to an “assumed breach” scenario: a beacon is planted internally to evaluate post-breach response, lateral-movement detection, and internal recon.

The Engagement Lifecycle: Get In, Stay In, Act

A red team engagement follows three phases — a model used widely across the industry and codified in the redteam.guide methodology:
1

Get In

Initial access via the threat profile’s preferred vectors — phishing, exposed services, supply chain, social engineering. The objective is footprint, not noise.
2

Stay In

Establish persistence and command-and-control. Tier C2 channels (interactive / short-haul / long-haul). Maintain OPSEC. Survive defender response.
3

Act

Execute the engagement objectives — privilege escalation, lateral movement, credential access, data discovery, exfiltration, operational impact — while remaining on-mission and within the Rules of Engagement.

Why Decepticon Is an Autonomous Hacking Agent

Decepticon automates the Red Teaming mindset, not the pentest checklist. It does not blast a network with automated scanners — that would alert the blue team instantly. Instead, it reads the context of the environment. It maintains stealth, performs internal reconnaissance, executes lateral movement, and simulates assumed-breach scenarios autonomously. The kill chain is driven by an OPPLAN — a structured operations plan the agent generates from the operator’s RoE and ConOps before a single packet leaves the wire. By taking on the role of a relentless, AI-driven red team, Decepticon provides infinite offensive feedback. It is the Offensive Vaccine — training defense systems against the organic, stealthy realities of modern cyber threats rather than handing them a checklist of outdated software.

Engagement Lifecycle

Get In, Stay In, Act — the three-phase lifecycle, mapped to Decepticon’s agents.

MITRE ATT&CK Integration

Tactics, Techniques, and Procedures — the shared vocabulary between threats and Decepticon.

Threat Emulation

How Decepticon turns a threat profile into an executable engagement.

Roles & Cells

Red Cell, Blue Cell, White Cell, Trusted Agent — and where Decepticon fits.