Introduction
ProjectAchilles is a continuous security validation platform that turns threat intelligence into measurable defense readiness. Deploy lightweight agents to your endpoints, execute security tests on demand or on schedule, and quantify whether your defenses detect, prevent, or miss each technique — all from one unified interface.
You don't need a red team certification to use it. You don't need to write exploit code. You need to know what threats matter to your organization, and whether you're defended against them.
Why ProjectAchilles?
Most organizations invest heavily in security tools but struggle to answer a simple question: are our defenses actually working?
Threat intelligence reports pile up unread. Compliance checklists are checked once and forgotten. Security teams deploy EDR, SIEM, and endpoint hardening — then hope for the best. When a breach happens, the post-mortem reveals gaps that were always there but never measured.
ProjectAchilles exists to close this loop. The platform operationalizes threat intelligence through three core components:
-
AI-Powered Test Development — An agentic pipeline transforms threat intelligence articles into complete, deployable security test packages — source code, detection rules, hardening scripts, and documentation — without manual test development.
-
Execution Framework — A lightweight Go agent deployed to endpoints (Windows, Linux, macOS) executes security tests on demand or on schedule, reports results with cryptographic integrity, and self-updates without downtime.
-
Analytics & Measurement — An Elasticsearch-backed dashboard quantifies defense readiness with scores, heatmaps, trend analysis, and MITRE ATT&CK coverage matrices — turning raw test results into actionable intelligence for security teams and leadership.
What It Measures
- Defense Readiness — For each threat technique, did your endpoint defenses detect it, block it, or miss it entirely?
- Controls Compliance — Are your security configurations (endpoint hardening, identity policies, cloud settings) actually in place?
- Security ROI — Which investments are driving measurable protection, and where are the gaps that still need funding?
Two Modes of Operation
| Mode | Purpose | Input | Output |
|---|---|---|---|
| Threat-Informed Validation | Test defenses against real-world attack techniques | Threat intel mapped to MITRE ATT&CK | Per-technique defense score with detection/prevention evidence |
| Controls Compliance | Verify security baselines across your fleet | Standards-based control frameworks | Per-control compliance status with remediation guidance |
Who Is This For?
| Role | How You Use ProjectAchilles |
|---|---|
| Security Team Leads | Schedule validation campaigns, track defense scores over time, identify where to focus hardening efforts |
| Security Engineers | Browse and execute tests, review detection gaps, integrate with Elasticsearch and Defender |
| GRC / Compliance | Verify controls compliance across the fleet, track risk acceptance decisions, generate evidence for audits |
| CISOs / Security Managers | Review trend analytics, measure security ROI, make data-driven investment decisions |
Platform Highlights
- AI-Generated Test Packages — ~19 artifacts per test including binaries, detection rules (KQL, YARA, Sigma, Elastic EQL, LimaCharlie), hardening scripts, and kill chain diagrams
- Cross-Platform Agent — Lightweight Go agent with enrollment, heartbeat monitoring, self-updating, and encrypted credentials across Windows, Linux, and macOS
- 30+ Analytics Endpoints — Defense scores, heatmaps, treemaps, error rate trends, and MITRE ATT&CK coverage matrices
- Build & Sign From UI — Cross-compile test binaries and sign with Authenticode (Windows) or ad-hoc signing (macOS)
- Microsoft Defender Integration — Sync Secure Score, alerts, and control profiles with cross-correlation analytics
- Trend Alerting — Threshold-based Slack and email notifications with in-app notification bell
- 5 Deployment Targets — Docker Compose, Railway, Render, Fly.io, and Vercel (serverless)
- Risk Acceptance — Accept risk for individual controls with audit tracking

What's Next?
- Features Overview — Detailed walkthrough of every platform capability
- Architecture — System design, tech stack, and data flow
- Quick Start — Local Dev — Get running in under 5 minutes
- Quick Start — Docker — One-command deployment with Docker Compose