Generate vulnerable
infrastructure
as code.
Compose purposely-misconfigured environments for AWS, Azure, and GCP, then download the Terraform or CloudFormation. Apply it in your own isolated account. One-click cloud deploy is on the roadmap.
Three clouds. One interface.
Native primitives for each provider, orchestrated through a single declarative spec.
Curated misconfigurations.
Mapped to MITRE ATT&CK and CWE. Versioned, reproducible, isolated.
Public S3 buckets
Object-level ACLs allowing anonymous read/write.
Over-privileged service account
SA with project-wide owner role attached to a Compute VM.
Exposed RDP / SSH
NSG with 0.0.0.0/0 ingress on port 22 and 3389.
SSRF-prone metadata endpoint
IMDSv1 enabled, role with broad permissions.
Unencrypted blob storage
Containers without CMK or server-side encryption.
Disabled audit logging
Cloud Audit Logs turned off across data services.
From scenario to template in seconds.
Today: download IaC and apply it yourself. Soon: one-click deploy from the console.
Compose environment
Pick scenarios across VM, Data, Identity and Container. Review the vulnerabilities each one introduces.
Generate IaC
Choose Terraform (AWS / Azure / GCP) or CloudFormation (AWS), pick a region, and the template is ready.
Download & apply
Download the .tf or .yaml and run it in your own isolated sub-account or project.
Stop building targets.
Start breaking them.
Free to use. Generate as many templates as you want. Managed cloud deploy is coming soon.