PRODUCTS

Threat Magnet

Threat Magnet is a new generation honeypot system based on the methodology of enemy misinformation. If an attacker wants to take over critical data or systems - Threat Magnet will allow him to do it, or being more accurately, to gain the illusion that his goal has been achieved. Access to the company's fake important resources will require to break many systems' protections, infiltrate employees, and even perform the necessary offensive activities that are at risk. In fact, all of these activities are only to provoke the attacker to make a mistake. A mistake that will allow an organization to:

  • alert the security department to attack the organization,
  • direct the attack into the evil from the aggressor's perspective direction,
  • gain valuable time for defensive activities,
  • find out how much knowledge has the attacker, what resources he has, how much he is determined to accomplish his goal, and what risk he is able to take to succeed.

Determined aggressors can also fall into traps aimed at physically capturing people involved in the attack.

Want to know more? Contact us!

Threat Provider

Threat Provider is a tool dedicated to perform phishing simulations and analyze their effectiveness and impact. Threat Provider helps to measure important aspects like:

  • how many employees clicked on link in email,
  • how many employees entered domain credentials into fake, malicious form,
  • how many of them downloaded and executed malicious document/software etc.

Threat Provider has modern webbased user interface dedicated for desktops and mobile devices. There is also offensive module that is able to infect employees with a code that emulates malicious software. This malware connects to Threat Provider Command and Control module and allows operator to simulate hostile operations on employees desktops, for example stealing files, grabbing screenshots and much, much more – activities which real hackers do. The purpose of these activities is analysis of user awareness, their reactions and incident handling procedures.

Want to know more? Contact us!

Cyber Security Aware Employee

Cyber Security Aware Employee (CSAE) is an online training along with certification created by hackers, aiming to raise the awareness of employees about current cyber threats.


The training has been divided into ten modules:

  • Who and why are we attacking?
  • Technical aspects of attacks.
  • Social engineering in attacks on organizations.
  • Data protection issues.
  • Detecting security incidents.
  • Responding to security incidents.
  • Common mistakes made by users.
  • How to safely use a computer at home?
  • Times of terrorism, how to behave in a crisis situation?
  • Scenarios of attacks that really happened.
  • Slaughter additionally covers issues related to the protection of personal data as well as the principle of safe use of the Internet at home.

Want to know more? Contact us!