What makes this different from CVE Intel: Red Team Intel cross-references every CVE against your org's specific tech stack (set up in Org Profile) and surfaces only what matters to your environment. The ⚡ Exploit button then lets you prove exploitability live — not just flag it.

Accessing Red Team Intelligence

Click the ⚔️ Red Team Intel item in the sidebar under Assessment Surfaces. The page loads immediately using CVE data pre-synced during boot — no waiting for a network fetch.

Time Windows

Use the five time filter tabs at the top of the page to scope your threat view:

No "All Time" option by design. Red Team Intel focuses on actionable threats. Historical CVEs from years ago rarely require immediate red team action — use CVE Intel for historical research.

Summary Dashboard

The eight metric cards at the top give an instant threat posture view for the selected time window:

Filters

Two toggle filters narrow the feed to what matters most:

Recommended starting filter: Enable both — "Org Profile Only" + "Exploit Available". This gives you a short, laser-focused list of CVEs that affect your specific environment AND can be exploited right now.

Three Data Tabs

Expanding a CVE Row

Click any CVE row to expand it and see:

⚡ Exploit Button — Step by Step

The Exploit button appears on CVE rows where exploit_available = true or poc_available = true. It streams a live Nuclei-powered exploit attempt.

Step 1 — Open the Exploit Wizard

Click ⚡ Exploit on any eligible CVE row. A modal opens with two sections: Target Configuration and the live Execution Console.

Step 2 — Configure Target

Step 3 — Launch

Click 🚀 Launch Exploit. The execution console streams live output through 6 stages:

  1. Reachability check — confirms the target URL is accessible before sending payloads
  2. Nuclei scan — runs Nuclei with -id <cve-id> so only the template for this exact CVE is used. Your auth headers are injected as -H flags.
  3. CVE detail lookup — pulls exploit IDs, PoC URLs, and affected product info from the local CVE database
  4. PoC steps build — constructs reproducible curl commands and step-by-step instructions from the finding evidence
  5. Report save — writes a JSON report to data/red_team_reports/ on your machine
  6. Complete — shows verdict (confirmed / not confirmed) with full evidence

Step 4 — Review Results

After execution you see:

Authorization required. Only run the Exploit button against targets you own or have explicit written authorization to test. PhantomYerra logs all exploit attempts locally with timestamps.

Generate Report

The Generate Report button (top right of the page) exports the current filtered view:

The report filename includes the time window and generation timestamp so you can track reports over time.

Setting Up Your Org Profile

Red Team Intel is most powerful when your Org Profile is complete. The CVE matching engine scores relevance by looking for your tech stack terms in CVE descriptions and affected product lists.

  1. Go to Org Profile in the sidebar (🏢 icon)
  2. Add your technology stack — list every framework, library, OS, database, and cloud provider your org uses
  3. Be specific: "nginx 1.24" scores higher matches than just "web server"
  4. Return to Red Team Intel and enable Org Profile Only — your relevant CVEs are now pre-filtered

CVE Data Freshness

PhantomYerra syncs CVE data during the startup boot sequence before the UI opens. The sync pulls from:

Data is cached locally in data/cve_intel.db. If the last sync was more than 24 hours ago, a banner appears offering a manual resync.