Huntress Acquires Inside Agent: A New Era for Identity ProtectionFree Trial
Menu
InvestorsCareersBlogAboutAcademySupportContact
LoginSign up
OFFENSIVE SECURITY OPERATIONS · ADVERSARY EMULATION · RED OPS

Emulate real-world adversariesbefore they exploit you.Attack-driven. Intelligence-led. Unmatched.

Spakto simulates modern attacker tradecraft across your infrastructure — validating detection, response, and control effectiveness through controlled, intelligence-driven adversary emulation before real threat actors get the chance.

Offensive Security Operations · Assume Compromise

Real adversaries don't
follow a checklist.

73% of initial access attempts in our red team engagements go undetected by existing controls. 48% of full kill-chain simulations reach crown jewel systems without triggering a single alert. We find what your defences miss — before real threat actors do.

Coverage MatrixMITRE v14
TA0001Initial Access
9/9
9 techniques0 detected
TA0002Execution
13/14
13 techniques2 detected
TA0003Persistence
17/19
17 techniques1 detected
TA0004Priv. Escalation
12/13
12 techniques3 detected
TA0005Defense Evasion
38/42
38 techniques0 detected
TA0006Cred. Access
16/17
16 techniques1 detected
TOTAL SIMULATED105 / 114 · 7 detected
SIMULATED OP · ALPHA-COBALT-24 · LIVE
target: CORP-PROD · 192.168.0.0/16
[09:15:44]T1021.006Lateral MovementWinRM pivot to PROD-DC-01 establishedUNDETECTED
[09:16:03]T1003.001Cred. AccessLSASS dump — 47 NTLM hashes capturedBYPASSED
[09:16:29]T1005CollectionCrown jewel data staged in C:\Temp\.sysSILENT
[09:16:47]T1048.003ExfiltrationHTTPS beacon to 185.220.x.x — 2.1 GB exfilUNDETECTED
[09:17:12]T1562.001Defense EvasionDefender real-time protection disabledBYPASSED
[09:17:55]T1136.002PersistenceDomain admin created: svc_backup2$SILENT
[09:18:11]T1070.004Defense EvasionEvent log cleared on 3 endpointsUNDETECTED
[09:14:22]T1566.001Initial AccessSpearphishing lure bypassed gatewayUNDETECTED
SESSION 00:04:4910 TTPs executed8 SILENT · 2 detectedbeacon-v4 · rt_alpha
Gap Intelligence47 orgs · 2024
Initial access undetected
73%CRITICAL GAP
Lateral movement undetected
61%HIGH GAP
Crown jewel access undetected
48%HIGH GAP
EDR bypass success rate
82%CRITICAL GAP
Phishing campaign click rate
34%MED GAP
Domain admin escalated
89%CRITICAL GAP
47
Engagements
6wk
Avg duration
91%
Crown jewels hit
INITIAL ACCESS
0%
Initial access undetected
per engagement cohort
MTTD INDUSTRY
0d
Industry avg. MTTD breach
IBM X-Force 2024
ATTACK COVERAGE
0+
Attack scenarios catalogued
MITRE ATT&CK mapped
EDR EVASION
0%
EDR bypass rate
custom payload tooling
Attack Kill Chain · Intelligence-Led Execution

Seven phases.
Full kill chain. No shortcuts.

Our operators execute the complete adversary kill chain — from OSINT reconnaissance to crown jewel access — using the same tools and tradecraft as the threat actors targeting your organisation.

PHASE 01 / 07 · LOCKHEED KILL CHAIN

Reconnaissance

01
OSINT: LinkedIn, GitHub, DNS
Certificate transparency scraping
ASN / IP range mapping
Credential breach correlation (HIBP)
Primary tooling
MaltegoShodantheHarvesterDNSx
auto-advance · 4s
01
Reconnaissance
02
Weaponisation
03
Initial Access
04
Establish Foothold
05
Privilege Escalation
06
Lateral Movement
07
Actions on Objective
Threat Group Emulation · TIBER-EU · Named Actor TTPs

We emulate the adversaries
targeting your sector.

Threat-intelligence-led engagements emulate the specific TTPs of adversary groups known to target your industry — so your team trains against realistic, not hypothetical, attack patterns.

Russia · SVR

APT29 / Cozy Bear

47 TECHNIQUES12 CAMPAIGNS EMULATED
Primary targets
GovernmentDefenceThink TanksEnergy
Signature TTPs
Phishing:LNKX
Golden Ticket
ADFS abuse
SUNBURST-style supply chain
EMULATION APPROACH

We replicate the specific initial access vectors, C2 infrastructure patterns, and post-exploitation tools used by APT29 / Cozy Bear — executing against your production defences in a controlled, safety-wrapped simulation.

Techniques Emulated
47
MITRE ATT&CK techniques
Other groups we emulate
Lazarus Group
DPRK · RGB
FIN7 / Carbanak
Criminal / RU
LockBit 3.0
Criminal / RaaS
Emulation scope
Custom threat intelligence brief
Named actor TTP mapping
Real tooling simulation
C2 infrastructure matching
Full kill chain execution
Engagement Types · Methodology · Deliverables

Four engagement models.
One adversary mindset.

Penetration Testing

Scope-defined vulnerability identification
Investment range
£8K–£35K
1–3 weeks
Engagement phases
1
Scoping & rules of engagement
2
Automated + manual discovery
3
Exploitation & chaining
4
Reporting + remediation guidance
5
Retest included
Target coverage
External network
Internal network
Web application
Mobile application
API / GraphQL
Cloud configuration
PRIMARY DELIVERABLE

Technical report + executive summary + CVSS-scored finding list

Penetration Testing
1–3 weeks · £8K–£35K
Red Team Assessment
4–12 weeks · £40K–£120K
Purple Team Exercise
2–5 days · £15K–£45K
Breach & Attack Sim.
Continuous · £20K–£60K / yr
Always included
Rules of engagement & scoping
Evidence-backed findings
Executive + technical reports
Retest slot
ATT&CK coverage heatmap
MITRE ATT&CK Enterprise · All 14 Tactics · Coverage Heatmap

2,400+ techniques.
Every tactic covered.

TA0043
Reconnaissance
9/1090%
TA0042
Resource Dev.
7/888%
TA0001
Initial Access
9/9100%
TA0002
Execution
13/1493%
TA0003
Persistence
17/1989%
TA0004
Priv. Escalation
12/1392%
TA0005
Defense Evasion
38/4290%
TA0006
Cred. Access
16/1794%
TA0007
Discovery
28/3190%
TA0008
Lateral Movement
9/9100%
TA0009
Collection
15/1788%
TA0011
C2
14/1688%
TA0010
Exfiltration
8/989%
TA0040
Impact
11/1385%
Overall coverage — enterprise matrix
14
Total tactics
206
Techniques covered
400+
Sub-techniques

Every engagement produces a post-operation ATT&CK heatmap showing which techniques were used, which were detected, and which bypassed your defences — giving your SOC a precise roadmap for detection coverage improvements.

CVE intelligence — 2024 exploits
CVE-2024-3094CVSS 10.0External
XZ Utils supply chain backdoor
CVE-2024-21762CVSS 9.6External
Fortinet FortiOS OOB write — RCE
CVE-2023-46604CVSS 10.0Internal
Apache ActiveMQ RCE — broker protocol
CVE-2023-44487CVSS 7.5External
HTTP/2 Rapid Reset DDoS — 200K RPS
CVE-2023-20198CVSS 10.0External
Cisco IOS XE privilege escalation
External Attack Surface Management · EASM · Continuous Recon

You can't defend
what you can't see.

Before any technical attack begins, our operators map your complete external attack surface — discovering exposed assets, shadow IT, and forgotten infrastructure that internal teams are unaware of.

Exposed web applications / APIsavg 147 per orgHIGH
Forgotten cloud storage bucketsavg 23 per orgCRIT
Leaked credentials (HIBP/Dehashed)avg 1,840/orgCRIT
Misconfigured email (DMARC gaps)avg 12 per orgHIGH
Expired / rogue TLS certificatesavg 34 per orgMED
Open SSH / RDP ports (internet)avg 8 per orgCRIT
Reconnaissance tool stack
Passive OSINT
ShodanCensysVirusTotalSecurityTrails
DNS / Certificate
DNSxsubfinderamasscert.sh
Active Scanning
Nucleinmaphttpxmasscan
Credential OSINT
HIBPIntelXDehashedFlare.io
< 48h
Full recon cycle
Zero
Detection footprint
OSCP+
Operator certifications
OPSEC
Strict rules of engagement
Detection & Response Validation · MTTD / MTTR · SOC Assessment

Does your SOC actually
detect what matters?

Perimeter controls give a false sense of security. The real test is whether your SIEM, EDR, and analysts detect and respond when an attacker is already inside — which our red team operations systematically expose.

207 days
Median MTTD — enterprise environments
industry average
14 days
MTTD after Spakto red team engagement
post-remediation baseline
73%
Initial access undetected rate
of engagements
61%
Lateral movement undetected rate
of engagements
48%
Crown jewel access undetected
of red team engagements
82%
EDR bypass success rate
custom payloads
DETECTION LAYER EFFICACY — TYPICAL ENTERPRISE (SPAKTO 2024 COHORT)
LAYER
TECHNIQUE
DETECTION RATE
BYPASS
STATUS
Email Gateway
Spear-phishing with LNKX payload
28%
72%
CRITICAL GAP
EDR / AV
Custom shellcode (no sig.)
18%
82%
CRITICAL GAP
SIEM
Lateral movement via WMI
41%
59%
HIGH GAP
NDR / IDS
DNS tunnelling C2 exfil
33%
67%
HIGH GAP
DLP
Staged cloud exfil (OneDrive/GDrive)
22%
78%
CRITICAL GAP
PAM
Pass-the-Hash / Kerberoast
55%
45%
MED GAP
Operator Arsenal · Custom Tooling · OPSEC-First Tradecraft

No commodity tools.
No off-the-shelf signatures.

Our operators build, maintain, and evolve a private toolset compiled fresh per engagement. Every payload is tested against the target's specific security stack before execution — achieving 94%+ EDR bypass rates without relying on known-bad signatures or public exploit frameworks.

Category Description

Memory-resident shellcode loaders built from scratch — no default signatures. Compiled per-engagement with LLVM obfuscation passes and in-memory execution.

Tool Inventory · Detection Bypass Rate

Havoc FrameworkC2 + implant generation
94%
Custom ShellcodePosition-independent LLVM payload
97%
Donut LoaderPE→shellcode in-memory converter
88%
NimplantNim-based lightweight stager
91%

OPSEC Procedures

No disk writes during operation
HTTPS beacon on port 443/80 only
JA3 TLS fingerprint spoofing
PPID parent process spoofing
EDR bypass rate94%
AV signature evaded97%
Memory-only execution100%
23+
Tools in active rotation
40+
Custom implants per yr
91%
Avg. EDR bypass rate
N-Day
Zero-day capabilities
AMSI / ETW Bypass
BYOVD Exploitation
Process Injection
Kerberos Abuse Suite
ADCS Exploitation
Cloud Privilege Abuse
Engagement Chronicle · Full Kill-Chain Walkthrough · Real-World Engagement Log

From first OSINT query
to full domain compromise.

A chronological walkthrough of a real red team engagement — from day one recon through to silent crown jewel access. Zero SIEM alerts. Zero EDR blocks. 847 user accounts compromised. Detection posture rebuilt from 0% to 74% coverage in the purple team debrief.

Threat Model & OSINT
Weaponisation
Initial Access
Lateral Movement
Crown Jewel Access
Purple Team Debrief
01

Threat Model & OSINT

Day 1–2 · 08:00–17:00

CRITICAL

OBJECTIVE: Map target attack surface and build adversary profile

Operator Log

LinkedIn: 847 employees identified, 23 engineers with tool exposure
GitHub: 3 repos containing AWS keys in commit history (live)
Shodan: 14 internet-facing assets, 3 running end-of-life software
HIBP: 1,240 corporate email addresses in breach datasets

Key Finding

2 live AWS access keys discovered in public repository

Tools:MaltegotheHarvesterShodanGitLeaks

Engagement Outcome Metrics

SIEM alerts triggered

of 14 MITRE techniques

0

EDR payloads blocked

across full kill-chain

0

Time to Domain Admin

from initial access

4h 22m

Crown jewels reached

all objectives achieved

6/6

Detection post-debrief

coverage after tuning

74%

Engagement duration

recon through debrief

12 days

Active Operator

recon_lead

Threat Model & OSINT · Phase 01/06

Blast Radius Analysis · Post-Compromise Impact · Crown Jewel Mapping

What can an attacker reach
once they're inside your network?

Blast radius analysis quantifies the total business impact of a single compromised credential or endpoint. Every engagement produces an impact map — showing what systems, data, and controls fall within reach of the initial access vector before a single defensive control fires.

Impact Targets

Active Directory

Entry point reached: Domain Controller — DCSync

98%
blast risk score

Reachable Systems & Data

All 847 user accounts + password hashes
47 privileged service accounts
16 servers reachable via WMI/SMB
3 domain trusts (cross-forest compromise)

Attack Technique

ADCS ESC1 → DA cert → DCSync

Time to Reach

4h 22m

from initial access

Post-Compromise Risk

Avg. time to crown jewel6.9h
Systems in blast radius16+
Data records at risk2.4M
Cloud accounts reachable100%
Backup integrity at risk76%
OT/SCADA adjacencyYes

MITRE Impact Tactics

Data DestructionT1485 · 45%
Data Encrypted (Ransom)T1486 · 68%
ExfiltrationT1041 · 89%
Account ManipulationT1098 · 94%
Service StopT1489 · 72%
Our Advantage · Why Spakto

We attack like the
adversary targeting you.

Most penetration testers run automated scanners and call it a red team. Our operators are former threat intelligence analysts, malware reverse engineers, and nation-state-tracked incident responders — bringing real adversary tradecraft, not vendor templates.

Threat-model driven
01

Intelligence-Led

Every engagement starts with a custom threat model — mapping your industry, adversary groups, and crown jewels before a single packet is sent.

Regulatory framework
02

TIBER-EU / CBEST

Spakto delivers TIBER-EU and CBEST-aligned red team assessments for financial institutions requiring regulatory-mandated adversary simulation.

Tool-agnostic operators
03

Zero Vendor Bias

Our operators write custom implants, bypasses, and tooling. We never rely on single-vendor frameworks — making our simulations authentic, not scripted.

Purple team debrief always
04

Blue Team Enabled

Every red team engagement includes a structured purple team debrief — transferring TTP knowledge to defenders and validating detection improvements.

Attack story + evidence
05

Narrative Reporting

Our reports tell the story of the attack — not just a finding list. Executive readers understand business risk; technical teams get PoC evidence and detection logic.

Validation cycle built-in
06

Retest Included

Every engagement includes a retest slot. We don't just find vulnerabilities — we validate that your team closed them correctly before the engagement closes.

READY TO TEST YOUR DEFENCES?

Assume compromise.
Validate your response.

Schedule a scoping call to define your threat model, select the right engagement type, and kick off an intelligence-led adversary simulation that tells you exactly where your defences would fail.

Offensive Security FAQs

Frequently asked
questions.

Still have questions?
Our security engineers answer within one business day.
Ask a question