View Issue Details

IDProjectCategoryView StatusLast Update
0009588Kali LinuxNew Tool Requestspublic2026-03-20 10:52
ReporterRichardBarron27 Assigned To 
PrioritynormalSeverityminorReproducibilityhave not tried
Status closedResolutionreopened 
Summary0009588: Red-Specter-POLTERGEIST - 10-agent coordinated web application pentesting swarm
Description

[Name] Red Specter POLTERGEIST
[Version] 1.0.0
[Homepage] https://red-specter.co.uk/poltergeist/
[Download] https://red-specter.co.uk/poltergeist/docs/
[Author] Richard Barron / Red Specter Security Research
[Licence] Apache 2.0
[Description] POLTERGEIST is a 10-agent coordinated web application penetration testing swarm. It deploys 10 autonomous agents (Wraith, Specter, Shade, Banshee, Phantom, Ghoul, Lich, Wendigo, Poltergeist, Revenant) across 55 attack vectors with 532 base payloads and a 17-mutator engine. Every finding is triple-mapped to OWASP Web Top 10, OWASP API Top 10, and CWE, scored with CVSS 3.1, and packaged into Ed25519-signed reports with RFC 3161 timestamps.
[Dependencies] None (pure Python)
[Similar tools] Unlike Burp Suite, ZAP, or Nuclei which run sequential checklists, POLTERGEIST coordinates 10 agents in real-time, adapting based on findings. No existing Kali tool provides coordinated multi-agent web application testing.
[Activity] Active development. v1.0.0 released March 2026. 930 tests passing, zero failures.
[How to install] pip install red-specter-poltergeist
[How to use] poltergeist scan https://target.com --campaign full_assault
[Packaged] Yes — Debian package (.deb) available.

Activities

Arszilla

Arszilla

2026-03-13 14:59

reporter   ~0021426

No source code repository. Unless there's one, this will not be packaged by the team or any contributor.

RichardBarron27

RichardBarron27

2026-03-14 08:38

reporter   ~0021430

Hi Arszilla,

Thanks for the feedback. I understand the packaging team needs source access.

The repository is currently private, but I'm happy to grant temporary read access to the Kali maintainer who will be packaging the tool. Please let me know the GitHub username, and I'll add them as a collaborator with read permissions.

I'm happy to grant temporary access to the POLTERGEIST repository. Note that the codebase includes both standard and UNLEASHED components. The UNLEASHED module requires a private key and is not functional without it — it will remain dormant in any standard build. The tool you package will be the full standard POLTERGEIST with all 10 agents and 55 vectors.

Tool details:

Version: v1.0.0 (tagged release)

License: Apache 2.0

Documentation: https://red-specter.co.uk/poltergeist/docs/

Once packaging is complete, you can let me know and I'll remove access.

Let me know if you need anything else.

Arszilla

Arszilla

2026-03-14 08:43

reporter   ~0021431

That’s not how packaging tools work on Linux. Besides being highly suspicious and deemed as “proprietary”, packages need to be monitored for new releases and tags.

As a result, my recommendation for the Kali Team, who has the final decision, is to ditch this and the other packages requested in this “family”, unless they are open-source, non-AI slop etc. tooling that is worth having in Kali.

RichardBarron27

RichardBarron27

2026-03-14 08:56

reporter   ~0021432

Hi Arszilla,

Thank you for the honest feedback and for taking the time to review the submission. I understand and respect Kali's packaging policies and the need for fully open, publicly accessible source code.

For now, we'll be focusing our immediate efforts on other distribution channels that align with our current development and release model. Should our approach to public source availability change in the future, I'll certainly revisit the possibility of submitting to Kali again.

Appreciate your time and consideration.

arnaudr

arnaudr

2026-03-16 16:47

manager   ~0021439

Hello @RichardBarron27,

thank you for your submission, but we'll have to decline.

Broadly speaking, we don't and we can't package every possible infosec tools in Kali. So we prioritize tools that already have a notoriety of some sort, a proven userbase, some kind of maturity, etc. It also helps if the software is developed in the open, so that we can assess what the tool is, what it does, and see what the wider infosec community thinks of it.

Best of luck with your project!

RichardBarron27

RichardBarron27

2026-03-16 16:57

reporter   ~0021440

Hi arnaudr,

Thank you for the response.

Understood on the criteria. For context:

  • 12 tools, 34,473 tests across the ecosystem
  • Full packaging: PyPI, Debian (.deb), BlackArch
    (PKGBUILD), Docker — all complete
  • Gartner vendor briefing confirmed 24 March 2026
  • MITRE ATLAS 100%, OWASP LLM 10/10, EU AI Act 7/7

The tools are private repos by design — offensive
security tooling with cryptographic UNLEASHED gates.
Open sourcing NEMESIS or SPECTER SOCIAL would be
irresponsible. That's a deliberate decision, not a
maturity issue.

red-specter.co.uk

Richard Barron

Issue History

Date Modified Username Field Change
2026-03-11 17:53 RichardBarron27 New Issue
2026-03-12 07:20 daniruiz Summary Red Specter POLTERGEIST - 10-agent coordinated web application pentesting swarm => Red-Specter-POLTERGEIST - 10-agent coordinated web application pentesting swarm
2026-03-13 14:59 Arszilla Note Added: 0021426
2026-03-14 08:38 RichardBarron27 Note Added: 0021430
2026-03-14 08:43 Arszilla Note Added: 0021431
2026-03-14 08:56 RichardBarron27 Note Added: 0021432
2026-03-16 09:39 daniruiz Assigned To => daniruiz
2026-03-16 09:39 daniruiz Status new => closed
2026-03-16 09:39 daniruiz Resolution open => no change required
2026-03-16 16:47 arnaudr Note Added: 0021439
2026-03-16 16:57 RichardBarron27 Status closed => feedback
2026-03-16 16:57 RichardBarron27 Resolution no change required => reopened
2026-03-16 16:57 RichardBarron27 Note Added: 0021440
2026-03-17 07:34 daniruiz Assigned To daniruiz =>
2026-03-17 07:34 daniruiz Status feedback => closed