Interface Overview

Mission Dashboard Main interface showing sidebar navigation and mission dashboard

Headquarters

Command center - always available regardless of active engagement.

Assistant

AI-powered assistant that understands your engagement context. Ask questions, get recommendations, or request analysis.

Dashboard

Single engagement metrics and overview. Shows:

  • Engagement status and timeline
  • Target counts and statistics
  • Finding severity breakdown
  • Recent activity
  • Pending gates and blockers

Mission Dashboard Dashboard showing engagement metrics and statistics

Engagements

Manage all red team engagements:

  • Create new engagements
  • View engagement details (scope, ROE, dates, client info)
  • Switch between engagements
  • Archive completed engagements

Engagements List Engagement management interface showing all engagements

Templates

Engagement templates for bootstrapping new engagements with pre-configured:

  • Objectives
  • Checklists
  • Common targets
  • Report templates

Templates Engagement templates for quick setup


Mission

Engagement planning and execution - requires active engagement.

Planning

AI-assisted structured walkthrough for engagement planning:

  • Scope clarification
  • Objective definition
  • Resource planning
  • Risk assessment

Execution

Engagement kickoff and step-by-step monitoring:

  • Start engagement activities
  • Monitor operation progress
  • Approval gates for risky actions
  • Real-time status updates

Execution Monitor Real-time operation monitoring and progress tracking

Objectives

Mission goals to achieve during the engagement:

  • Define success criteria
  • Track completion status
  • Link objectives to findings
  • Detect scope drift

Pivot Chains

Lateral movement paths through infrastructure:

  • Track pivot sequences
  • Visualize attack chains
  • Identify blockers
  • Document compromise paths

Checklists

Verification steps for different engagement types:

  • External pentest methodology
  • Internal network assessment
  • Web application testing
  • Active Directory attack paths

Intelligence

Data collection - requires active engagement.

Targets

Hosts, networks, and services (manual or auto-discovered):

  • Add targets manually
  • Import from reconnaissance
  • Track service information
  • Link to credentials and findings
  • Mark as compromised

Targets List Target systems with service and compromise tracking


Analysis

What you found and mapped - requires active engagement.

Credentials

Harvested credentials:

  • Username/password pairs
  • Password hashes
  • API tokens
  • SSH keys
  • Organize by target

Credentials Manager Credential collection and organization

Evidence

Proof for findings:

  • Screenshots
  • Command output
  • Configuration files
  • Network captures
  • Chain of custody tracking

Evidence Collection Evidence management with chain of custody

Findings

Vulnerabilities and misconfigurations for reports:

  • Document security issues
  • Assign severity (Critical/High/Medium/Low/Info)
  • Link to affected targets
  • Attach evidence
  • Sort by criticality or time
  • Export to reports

Findings List Vulnerability findings with severity and status tracking

Network Topology

Network map showing targets, connections, and pivot chains:

  • Visualize discovered infrastructure
  • Show connections between targets
  • Highlight pivot chains
  • Track compromised vs discovered status

Network Topology Infrastructure visualization with pivot chains


Tracking

Logging what happened - requires active engagement.

Kill Chain

Attack phase progression visualization:

  • Reconnaissance → Discovery → Exploitation → Post-Exploitation
  • Activity counts per phase
  • Collapsible phase timelines
  • Progress indicators

Kill Chain View Attack progression through cyber kill chain phases

Timeline

Chronological event log of major milestones:

  • Significant events
  • Phase transitions
  • Compromises
  • Findings discovered

Timeline View Chronological event tracking and milestones

Audit Log

Detailed action log - every action taken:

  • Complete audit trail
  • Command history
  • Configuration changes
  • User actions

Audit Log Comprehensive audit log showing all system actions

Blockers

Obstacles requiring attention:

  • Technical blockers
  • Approval gates
  • Out-of-scope discoveries
  • Notifications and alerts

Blockers View Blocker tracking interface for obstacles and gates


Reporting

Deliverables - requires active engagement.

Notes

Engagement-wide notes with tagging and linking:

  • General observations
  • Technical notes
  • Link to targets, findings, objectives
  • Tag and filter support

MITRE ATT&CK

Technique mapping for reports:

  • Browse MITRE ATT&CK framework
  • Tag activities with techniques
  • Generate technique coverage reports
  • Map findings to tactics/techniques

Reports

Generated reports from engagement data:

  • Executive summary
  • Technical findings
  • Methodology
  • MITRE ATT&CK coverage
  • PDF export

Toolkit

Operational tools - always available.

Reconnaissance

AI-assisted reconnaissance workflows:

  • Automated discovery
  • OSINT collection
  • Service enumeration
  • Results auto-populate Targets

C2

Command and control infrastructure:

  • Start/stop listeners
  • Manage agents
  • Generate payloads
  • Integration with external frameworks (coming soon)

System

Configuration and diagnostics - always available.

Diagnostics

System health and logs:

  • Application logs
  • System status
  • Update checks
  • Performance metrics

Settings

Application configuration:

  • Database location
  • API keys
  • Preferences
  • Export/import settings

Top Bar

Engagement Selector

Dropdown to select active engagement. When no engagement is selected, engagement-specific views are disabled.

User Menu

Profile, preferences, and logout (when using connector mode).


Common Patterns

Creating Items

Most views have a Create or Add button in the top-right corner.

Filtering and Sorting

Many list views support:

  • Text search
  • Status filters
  • Severity filters
  • Time-based sorting

Linking Items

Related items can be linked:

  • Findings → Targets
  • Findings → Evidence
  • Targets → Credentials
  • Objectives → Findings

Badges

Notification badges appear on sidebar items:

  • Draft findings count
  • Pending approval gates
  • Unresolved blockers

Keyboard Shortcuts

Shortcut Action
Ctrl/Cmd + K Quick command palette
Ctrl/Cmd + N New item (context-aware)
Ctrl/Cmd + S Save current form
Esc Close modal/cancel

Tips

  1. Start with Planning: Use the Planning view to structure your engagement before execution
  2. Set Objectives Early: Define clear objectives to measure success
  3. Link Everything: Connect findings to targets, evidence, and objectives for comprehensive reports
  4. Use Checklists: Follow methodology checklists to avoid missing steps
  5. Tag Activities: Tag activities with MITRE techniques for better reporting
  6. Monitor Kill Chain: Use Kill Chain view to track progression through attack phases