Have you heard of Revo?

  • Empower your red team

    Our knowledge on the implants (software in the MITRE ATT&CK language) derives from an extensive reverse-engineering activity on sample spotted on the wild. We reproduce with high fidelity all the different phases of the attack chain against each step of the kill-chain: Loading, Injection, Communication protocols, Obfuscation steps.

  • Implant-agnostic threat emulation platform

    Code your implant or extend our basic agent to potentially an implant of any threat actor

  • Code your scenarios

    Code server-side scripts to run any threat scenario.