A system built to orchestrate offensive security workflows across multiple nodes, giving teams control, scalability, and real-time visibility into every operation.
Every serious offsec team eventually hits these walls.
Scanners, enumerators, and runners operate in isolation. You waste hours manually piping output from one tool to another.
Valuable intelligence is locked in local text files. A discovery by one script doesn’t automatically trigger the next step for others.
Managing concurrent operations across hundreds of targets turns into a black box. You don't know what's running, or where.
Ad-hoc scripts and cron jobs are fragile. When a process hangs or a box dies, the entire operation unknowingly stalls.
Crossfyre provides the infrastructure to distribute execution, deploy extension-based workflows, and maintain real-time visibility across all offensive security operations.
Crossfyre unifies your offensive operations into a single platform.
Create and manage jobs, configure workflows, and monitor execution through a web interface or direct API calls.
Central control plane that schedules jobs, coordinates workers, and tracks execution state across the platform.
Backend services responsible for authentication, persistence, messaging, and coordinating communication between components.
Distributed execution unit that pulls jobs, runs assigned extensions, and reports results back to the controller.
Modular execution unit that performs a specific operation as part of a workflow.
The systems, networks, or applications designated for testing or analysis during an operation.
Scale your fuzzing and scanning across thousands of ephemeral nodes instantly. No more bandwidth bottlenecks.
Collaborate on campaigns with shared state. Manage attack infrastructure without the DevOps headache.
Continuous internal/external attack surface monitoring defined by your own custom logic and rules.
Standardize toolsets, enforce scanning policies, and ensure consistent testing across the entire organization.
Built by offensive security engineers who understand the complexity of modern engagements. Crossfyre is designed to be the backbone of your red team operations.
We aren't just developers. We are red teamers who got tired of fragile tooling. Every feature in Crossfyre is forged from real-world engagement pain points.
Implements techniques grounded in active security research and evolving offensive methodologies.
Networks fight back. Crossfyre nodes are built to survive rate limits, WAF bans, and unstable connections without losing your campaign data.
Answers to common questions regarding deployment, capabilities, and licensing.
Red Teams, Security Researchers, and Platform Engineers who need to run offensive workloads at scale.
Right now all components are closed source and usage is invite only, however, we plan to open source key parts of the platform in the future.
Yes. You can deploy the Control Plane and Nodes entirely within your own infrastructure.
Anything. Network scanning, exploitation, data parsing, or custom logic written in python or rust.