The Spectrum
BlackRainbow organizes all security knowledge into 11 color domains. Every training pair, every plugin, and every model filter maps to one or more colors.
Color Taxonomy
Red #dc2626
Offensive operations, exploitation, initial access.
The core attack color. Exploitation techniques, payload delivery, initial foothold establishment. Covers MITRE ATT&CK Initial Access (TA0001), Execution (TA0002), and portions of Lateral Movement (TA0008).
Examples: buffer overflows, deserialization attacks, RCE chains, exploit development, shellcode.
Orange #ea580c
Reconnaissance, enumeration, OSINT.
Everything before the first shell. Network scanning, service enumeration, subdomain discovery, open-source intelligence gathering. Maps to MITRE ATT&CK Reconnaissance (TA0043) and Discovery (TA0007).
Examples: nmap, DNS enumeration, directory brute-forcing, certificate transparency, WHOIS, Shodan queries.
Yellow #ca8a04
Credential access, password attacks.
Credential harvesting, cracking, spraying, and replay. Covers MITRE ATT&CK Credential Access (TA0006).
Examples: hashcat rules, Kerberoasting output analysis, password spray patterns, credential stuffing, NTLM relay, hash extraction.
Green #059669
Infrastructure, networking, protocols.
The plumbing. Network protocols, routing, DNS, firewall rules, VPN tunneling, pivoting infrastructure. Foundational knowledge that every other color depends on.
Examples: TCP/IP internals, SSH tunneling, SOCKS proxies, port forwarding, network segmentation, protocol analysis.
Blue #2563eb
Defensive operations, detection engineering.
The other side of the blade. Detection rules, log analysis, SIEM queries, incident response procedures, threat hunting. Maps to MITRE ATT&CK mitigations and detection guidance.
Examples: Sigma rules, Splunk queries, EDR bypass indicators, YARA signatures, forensic artifact analysis, Windows event log correlation.
Indigo #7c3aed
Privilege escalation, persistence, post-exploitation.
Everything after the initial foothold and before the objective. Privilege escalation vectors, persistence mechanisms, lateral movement techniques. Covers MITRE ATT&CK Privilege Escalation (TA0004), Persistence (TA0003), and Defense Evasion (TA0005).
Examples: kernel exploits, SUID abuse, scheduled tasks, DLL hijacking, token manipulation, registry persistence.
Violet #a855f7
Web application security.
Application-layer attacks. SQL injection, XSS, SSRF, authentication bypass, API abuse, deserialization in web contexts. Overlaps with Red for exploitation but scoped to web application attack surface.
Examples: SQLi payloads, XXE exploitation, JWT manipulation, OAuth flows, IDOR chains, GraphQL introspection abuse.
Grey #6b7280
Governance, compliance, methodology.
Frameworks, methodologies, reporting standards, rules of engagement. The operational wrapper around technical work.
Examples: PTES methodology, OWASP testing guides, report writing, scope definitions, rules of engagement templates, compliance mappings.
Gold #d97706
Active Directory / Kerberos, identity attacks.
The crown jewels of enterprise environments. AD enumeration, Kerberos attacks, trust abuse, Group Policy exploitation. A specialized sub-domain of Yellow and Indigo that earns its own color due to depth and importance.
Examples: BloodHound queries, Kerberoasting, AS-REP roasting, DCSync, Golden/Silver tickets, trust hopping, GPO abuse, ADCS attacks.
Cyan #0891b2
AI/ML security, adversarial ML.
Attacks against machine learning systems. Prompt injection, model poisoning, adversarial examples, ML pipeline exploitation. The newest color, growing rapidly.
Examples: prompt injection chains, training data poisoning, model extraction, adversarial image generation, LLM jailbreaks, ML supply chain attacks.
Pink #db2777
Social engineering, phishing.
Human-layer attacks. Phishing campaign design, pretexting, vishing scripts, physical social engineering. Maps to MITRE ATT&CK Phishing (T1566) and related techniques.
Examples: phishing templates, pretext development, payload delivery via social channels, callback phishing, QR code attacks.
Color Mapping in Practice
Training Data
Every pair in the corpus carries a colors array:
{
"instruction": "...",
"output": "...",
"colors": ["red", "indigo"]
}
Plugins
Plugins declare their color affinity as a class attribute:
class ReconPlugin(PluginBase):
colors = ["orange", "red", "green"]
Model Filtering
The model hierarchy uses color filters to build specialized models from the same corpus:
| Model | Colors |
|---|---|
| BlackRainbow | All 11 |
| Shinobit | Red, Orange, Yellow |
| Onibit | Blue, Grey |
| Immortal Blade | Red + Blue (combined) |
See Model Hierarchy for details on each model variant.