An agent is a process which can run commands on a target system while under the control of an adversary. Agents beacon into Operator periodically to ask for instructions to run. Each agent is automatically grouped into a range. Agents communicate to this application through one of several communication protocols, such as TCP, UDP, HTTP, or gRPC.

Get Around Defenses

Select from one of our pre-built agents that suits your needs. Written in multiple languages, these agents (or Remote Access Trojans), are designed to not get caught by defenses. Read more about how we develop advanced agents here.

Build Your Own Agent

You can write your own agent in any computer language easily. Follow a simple interface found inside the internal Operator documentation to do so. Note that you will need to encrypt the data object when sending a beacon to Operator and decrypt it when receiving instructions. You can review the Pneuma agent for example code here.


Adversary Emulation

Mimic known threats to your organization by combining threat intelligence and continuous red teaming to emulate attacks.


Defensive Training

Train yourself or your organization on real-world attacks using the first training platform integrated directly into an attack emulation platform. Perform attacks and learn how to stop them.


Desktop Application

Prelude takes care of the complexity behind the scenes and delivers Operator as the first desktop application in autonomous red-teaming. Simple design and free to use, download it here.


Continuously Updating

New TTPs and training content added every week (and sometimes, daily). Stay up-to-date, automatically. Threat intelligence, adversary creation, TTPs and training content all updated within the desktop app.