BlackRainbow
BlackRainbow is a security assurance framework. It automates red team engagements through a plugin architecture, YAML-driven configurations, kill chain sequencing, and AI-powered reasoning.
Think of it as a testing framework for security, not just a scanner. You define what you want to test, BlackRainbow generates attack sequences, executes them, grades the results, and produces actionable reports with remediation guidance.
What It Does
- Generates attack sequences from plugins based on your target and engagement scope
- Executes those sequences against real infrastructure using standard security tools
- Grades results with pass/fail scoring, evidence collection, and MITRE ATT&CK mapping
- Produces reports with findings, artifacts, remediation steps, and detection rules
- Chains attacks through kill chain definitions that link recon to exploitation to post-exploitation
Architecture
┌─────────────┐ ┌───────────────┐ ┌─────────────┐ ┌─────────┐ ┌──────────┐
│ Generate │ → │ Transform │ → │ Execute │ → │ Grade │ → │ Report │
│ (plugins) │ │ (strategies) │ │ (targets) │ │(plugins)│ │(artifacts)│
└─────────────┘ └───────────────┘ └─────────────┘ └─────────┘ └──────────┘
Plugins generate attack sequences. Each plugin is a self-contained module that knows how to test a specific attack surface: network recon, credential attacks, web exploitation, AD compromise, privilege escalation.
Strategies control execution order. Run sequences in order, fan them out in parallel, or let the engine adapt based on what it discovers.
Targets handle execution. Each target type knows how to run tools against its environment: subprocess calls for network hosts, HTTP requests for web apps, LDAP/Kerberos for Active Directory.
Graders evaluate results. The same plugin that generated a sequence knows how to read the output and decide if it worked.
Reports collect everything: what was tried, what worked, what was found, how to fix it, and how to detect it next time.
What Makes It Different
Operator-built. BlackRainbow was built by red team operators, not compliance consultants. The attack sequences, grading logic, and kill chains come from real engagement experience.
AI-powered reasoning. BlackRainbow uses a domain-expert AI model trained on security operations. The model suggests next steps based on discovered services, analyzes tool output, and generates targeted attack sequences. It does not just run scripts; it thinks about what it sees.
Kill chain sequencing. Define multi-stage engagements in YAML. Start from any stage. Let upstream results drive downstream attacks. If recon finds an open SMB share, the credential plugin knows about it.
Artifact collection. Every tool execution captures stdout, stderr, timing, and output files. Nothing is lost. Reports link findings to the raw evidence that supports them.
Remediation suite. Findings are not just "this is broken." Each finding includes: what was exploited, why it was vulnerable, how to fix it, and detection rules to catch it in the future.
MITRE ATT&CK mapped. Every attack sequence maps to ATT&CK techniques. Reports roll up technique coverage across the engagement.
Plugin Categories
| Category | What It Tests |
|---|---|
| Recon | Network enumeration, service discovery, OSINT |
| Credential | Password attacks, hash extraction, token abuse |
| Web Exploit | Injection, authentication bypass, API abuse |
| AD Attack | Domain enumeration, Kerberos attacks, trust abuse |
| Lateral Movement | Pivoting, remote execution, session hijacking |
| Privilege Escalation | Local privesc, kernel exploits, misconfigurations |
Target Types
| Type | Environment |
|---|---|
network-service | Network hosts, infrastructure |
web-application | Web applications, APIs |
active-directory | AD domains, forests |
cloud-service | Cloud provider environments |
ai-system | AI/ML model endpoints |
Next Steps
- Installation -- get BlackRainbow running
- Quickstart -- first engagement in 5 minutes
- Configuration -- full YAML reference
- Plugins -- available attack modules
- Kill Chains -- multi-stage engagements