Apparatus is the simulation infrastructure that makes Atlas Crew Security's testing realistic. 11 protocol servers, AI red team autopilot, chaos engineering, deception infrastructure, and supply-chain attack simulation — used by Synapse for traffic generation, by Chimera for protocol fuzzing, by Crucible for adversary scenarios, and by Bridge for fault injection across the integrated stack. All four flagship products lean on it.
Real attack surfaces are noisy. Real defenders need to see noisy traffic, malformed protocol behavior, and unexpected failure modes — not lab-clean toy requests. Apparatus generates the noise on demand: 11 protocol servers running simultaneously with full request reflection, AI-powered honeypots, fault injection, and red team automation. Pair it with the rest of the platform and the trio sees the kind of traffic it would face in production.
HTTP/1.1, HTTP/2, gRPC, WebSocket, Redis, SMTP, MQTT, ICAP, Syslog, TCP/UDP — all running simultaneously with full request reflection. Test how your defender handles non-HTTP attack surfaces, not just web traffic.
Autonomous AI agent that explores targets, selects attack tools, and reports findings. Session-based with configurable iteration limits. Useful for unattended overnight runs against new build artifacts.
CPU and memory chaos, network partition simulation, latency injection, packet loss, supply-chain attack patterns, container escape testing. Shake the system and see what falls out.
Honeypots with fake consoles and shell terminals that produce believable, AI-generated responses. Tarpits that waste attacker time. Useful for measuring whether your defender's response to suspected attackers slows them down or just blocks them.
Apparatus has three interfaces: a React dashboard with real-time SSE, an 18-widget terminal UI, and a CLI with 12 command categories. The CLI is the path of least resistance for CI integration, scripted overnight runs, and reproducible scenarios.
Unlike the flagship trio, Apparatus doesn't have a single role in the closed loop. It's used by Synapse for high-volume traffic generation against rule sets, by Chimera for protocol fuzzing across vertical APIs, by Crucible for realistic adversary scenarios, and by Bridge for fault injection across the integrated stack. Standalone for general security research; integrated for the platform.
See the platform →