Firecracker's logo

Firecracker 0.1 takes your HTTP logs and uses them to map your API flows and to find risky ones.It outputs a map that you can review in your browser and then attacks the API to find all anomalies.

Attacks your API to find all anomalies.

Our Attacker attacks your API just like a malicious user would. It uses advanced techniques to simulate a real use of the application, with added sophistication to try and see how it can trick your API.

🥳 WE’RE PROUD TO INTRODUCE FIRECRACKER V.1 - OUR FIRST EVER RELEASE!

Supports all API specifications.

Thanks to our agnostic algorithm, No matter what specification you use, you can use our service. Simply direct us to your logs and let us do the rest.

4 in 1

  1. Mapper

    Takes in traffic logs and maps the business logic flow of the application, outputs a digest file.
  2. Decider

    Takes in traffic logs and decides whether a certain business logic flow is an anomaly or not.
  3. Attacker

    Takes in the digest file from the mapper and "attacks" the API while using the Decider to determine whether something is an anomaly or not.
  4. Visualizer

    Takes in the digest file from the mapper and visualizes the business logic flow of the application.
    Use the JSON you get from the CLI and put it here to visualize your network now!
Supports all API specifications.

Any Questions? Contact Us!

Supports all API specifications.
Privacy Policy