Red Team vs Blue Team — AI Cybersecurity Battles
Everything you need to test, train, and benchmark AI models in adversarial cybersecurity scenarios.
83 techniques mapped across 14 tactics with kill chain visualization
Elo-rated tournaments with single elimination and round-robin brackets
From OWASP Top 10 to critical infrastructure, IoT, and blockchain
CTF-style training modules with objectives and achievements
ATT&CK heatmaps, model comparison, and trend analysis
Live battle simulation with kill chain progression tracking
Choose from 26 scenarios spanning web, network, cloud, IoT, and custom environments.
NGINX web server with a backend API. Red Team probes for injection, traversal, and misconfig. Blue Team monitors logs and hardens config.
REST + GraphQL API behind an API gateway. Red Team attempts auth bypass, rate limit abuse, and data exfiltration. Blue Team applies WAF rules.
Backend for a mobile banking app with OAuth2, push notifications, and a CDN. Red Team targets token theft, API abuse, and session hijacking.
Full-stack e-commerce platform with payment processing, inventory management, and customer data. Red Team targets payment flows and PII.
Simulated enterprise network with Active Directory, file shares, and email. Red Team attempts lateral movement. Blue Team monitors and segments.
Remote access VPN with split tunneling, MFA, and certificate-based auth. Red Team attempts credential theft and tunnel hijacking.