Advancing the state of offensive security

Strikes
Custom evaluations for models and agents.
EXPLORE
EXPLORE
Spyglass
Attack AI systems in deployed settings.
EXPLORE
EXPLORE
Crucible
Practice AI red teaming.
EXPLORE
EXPLORE
Objective

Build advanced offensive AI tools used by the best red teams, researchers, and model builders in the world.

ABout DREADNODE
ABout DREADNODE
TRUSTED BY

Our Collaborators

Our solutions are built in close collaboration with government agencies, safety institutes, enterprises, and frontier model companies. We're currently supporting our partners with training; cyber evaluations and synthetic data generation; capability development.

Government

Enterprise

AI Labs

Ecosystem

The Dreadnode Ecosystem

1. CREW
The Dreadnode crew brings rare hands-on experience and perspectives from NVIDIA, Microsoft, Meta, Cohere, NetSPI, and other leading innovators.
2. TECHNOLOGY
We build tools that accelerate and scale offensive security. We’re equipping teams with capabilities to build, deploy, and evaluate domain expertise.
3. Research
Our research focuses on discovering emerging attack vectors, developing novel testing approaches, and creating scalable solutions.
STRIKES
Harbor
Crucible
SPYGLASS
Emerging attack vectors
novel testing approaches
scalability
optimization
STRIKES

Bringing scale to offensive security

Evaluations aren't just about measuring, they're about scaling. With Strikes, you can write custom evaluations, create datasets, train models, and integrate agents.

Explore STRIKES
Explore STRIKES

Create datasets that are informed by custom evaluations and based on domain expertise.

Run experiments to find the right trajectories to scale.

Use hosted environments or custom environments for the tasks you want to evaluate.

SPYGLASS

Evaluate deployed AI systems

Red teaming is a shift-right activity.

Explore SPYGLASS
Explore SPYGLASS

Integrate the latest adversarial research or perform your own using our SDK.

Test any model. The vast majority of deployed models are not LLMs.

Traffic distribution strategies, model fingerprinting, and reporting.

CRUCIBLE

Learn to hack and evaluate AI systems

Advance your AI hacking domain knowledge alongside thousands of offensive security practitioners.

Explore CRUCIBLE
Explore CRUCIBLE

Catch up on the latest models and techniques.

Learn how to attack different types of models and deployments.

Enterprise users can deploy their own models into a evaluation environment.

Explore what’s possible when AI is applied to offense

Contact Us
Contact Us