Inferno Lab
Security Testing · Simulation · Education

Three tools.
One platform.

Simulate realistic environments, learn to attack and defend them, and validate security at enterprise scale. Open source. Solo built. AI-augmented.

simulates environment for trains against validates at scale Apparatus Testing & Simulation Lab Chimera Education & Training Crucible Enterprise Validation

Each tool stands alone — together they're a complete security testing, simulation, and education platform.

Apparatus

Simulate everything

A cybersecurity testing and simulation laboratory. 58+ features across 11 protocol servers, chaos engineering, AI-powered deception, red team automation, and full observability — with a React dashboard, terminal UI, and CLI. Everything you need to build, attack, and observe realistic environments.

58+
Features
11
Protocol Servers
3
Interfaces

Multi-Protocol Simulation

HTTP/1.1, HTTP/2, gRPC, WebSocket, Redis, SMTP, MQTT, ICAP, Syslog, TCP/UDP — all running simultaneously with full request reflection and traffic analysis.

AI Red Team Autopilot

Autonomous AI agent that explores targets, selects attack tools, and reports findings. Session-based with configurable iteration limits and tool allowlists.

Deception & Chaos

AI-powered honeypots with fake admin consoles and shell terminals. Tarpit defenses. CPU/memory chaos injection. Supply chain attack simulation. Container escape testing.

Full Observability

React dashboard with real-time SSE, 18-widget terminal UI, Prometheus metrics, PCAP capture, HAR replay, and a CLI with 12 command categories.

apparatus
$ apparatus autopilot start --target http://chimera:8080 --max-iter 20
● Session aps_0012 started | AI agent exploring target...
→ Probing /api/v1/healthcare — IDOR detected on patient records
→ Escalating: JWT none-algorithm bypass on /auth/token
→ Deception engine active: 3 honeypot interactions logged
✓ Session complete | 7 findings | 3 critical | Report: aps_0012.json
View on GitHub

Chimera

Learn to break it

A security education and training platform. The Chimera API provides 450+ vulnerable endpoints across 22 industry verticals. Chimera Portals is a dozen web UIs built on that API — guided exploit tours, a code-level vulnerability inspector, WAF attack visualization, and an LLM kill chain tracker. Not toy CTF puzzles — real attack surfaces with real teaching tools.

450+
API Endpoints
12
Portal UIs
22
Industry Verticals

LEARN Exploit Tours

Step-by-step guided walkthroughs of complete exploit chains. Follow along as attacks unfold across realistic multi-step scenarios.

INSPECT X-Ray Inspector

See exactly where vulnerabilities exist in the code and how to remediate them. Connects attack surface to source with actionable fixes.

DEFEND WAF Visualization

Blue team mode powered by Apparatus integration. Visualize attack flows through the system and see how WAF rules block them in real time.

AI LLM Kill Chain

Track and visualize exploit chains targeting LLMs. Prompt injection, jailbreaking, data exfiltration — mapped and explained.

chimera portals
═══ EXPLOIT TOUR: Healthcare IDOR Chain ═══════════════
Step 1 Enumerate patient IDs via /api/v1/healthcare/patients
Step 2 Access records with tampered ID → 200 OK (should be 403)
⚠ X-Ray: Missing ownership check at patientController.ts:47
Step 3 Escalate: modify role via mass assignment on /users/{id}
✓ Chain complete | 3 vulns demonstrated | Remediation guide attached
View on GitHub

Crucible

Validate at scale

Enterprise-grade attack simulation and compliance engine. Composable scenario chains mapped to MITRE ATT&CK with automated compliance reporting against NIST, CIS, PCI DSS, and HIPAA. Point it at Apparatus + Chimera, or bring your own targets.

1
Discover
2
Attack
3
Analyze
4
Report

Scenario Engine

Composable attack chains: recon → exploit → escalate → exfil. Custom scenarios or built-in playbooks mapped to MITRE ATT&CK.

Compliance Mapping

Map results to NIST 800-53, CIS Controls, PCI DSS, and HIPAA. Generate audit-ready evidence automatically.

Adaptive Testing

AI-driven scenario generation that adapts attack paths based on discovered vulnerabilities. Finds what static scanners miss.

Verdict Reports

Executive summaries, technical deep-dives, and remediation roadmaps. Export as PDF, JSON, or pipe to your SIEM.

crucible — run summary
═══ CRUCIBLE RUN #0047 ═══════════════════════════════
Target: apparatus://enterprise-3tier + chimera://healthcare
Scenarios: 14 executed · 11 passed · 3 critical findings
NIST AC-2 Account Management ........... PASS
NIST AC-6 Least Privilege ............... FAIL
NIST SC-7 Boundary Protection ........... PASS
HIPAA §164.312(a) Access Control ......... FAIL
→ Full report: crucible-report-0047.pdf (47 pages)
View on GitHub

Start with any piece.

Each tool works independently. Use Apparatus as a security simulation lab, Chimera to learn offensive security hands-on, or Crucible for enterprise-grade validation.