Steal user data on all company machines
October 2025: New features in M&NTIS Platform
This new release enhance training with quizz, improve visibility on attack indicators, and introduce a brand-new attack scenario.
A curated catalog of attack procedures classified according to MITRE ATT&CK.
A logical sequence of unit attacks. Understand and prepare for potential threats and vulnerabilities with complex and multi-stage attacks scenarios.
A collection of data (logs, pcaps, etc) specifically prepared to be used for defense testing, analysis, research, or training.
Steal user data on all company machines
Steal data by spoofing a legitimate Windows update
Theft of secret company data
Theft of a developer’s company secrets
Exploit wordpress to compromise and ransom a web server
Delete all data from a company’s information system
Ransom all the company’s machines using the domain controller
Simulate attacks in real time to analyze your SOC’s detection and reaction capabilities. M&NTIS Platform enables you to validate the effectiveness of the rules and processes put in place across your environment, and to identify possible security gaps including the latest attack models.
Evaluate the effectiveness of a rule set, of a complete detection chain or of a product, thanks to our catalog of unitary attacks. Assess your protection by identifying your future actions, thanks to continuous test validation.
Train your SOC and CERT team members by immersing them in a simulated environment, facing complete and realistic attack scenarios.
on November 7, 2025
This new release enhance training with quizz, improve visibility on attack indicators, and introduce a brand-new attack scenario.
on September 12, 2025
This new release enhanced hands-on lab experience for blue team training, allowing them to sharpen their skills in realistic, high-pressure scenarios.
on August 25, 2025
This is a step by step SOC training guide to learn how to prepare your Azure Arc and Sentinel environment to generate training incidents.
on July 22, 2025
Learn how to create an attack stimuli to assess NIDS signature efficiency, with Suricata as example