Use Cases

From red teams to researchers—WAR-EYE adapts to your mission.

⚔️

Red Team Ops

Internal Security Teams → Autonomous adversarial testing

Augment your red team with tireless, autonomous API assault. WAR-EYE runs 24/7, finding vulnerabilities your manual testers might miss.

  • Continuous attack simulation against production APIs
  • Pre-engagement reconnaissance automation
  • Vulnerability discovery for pentest reports
  • Training exercises with real-world attack patterns
$ wareye campaign start \
    --target internal-api.corp.local \
    --mode stealth \
    --duration 72h

[REDTEAM] Stealth mode active
  ├─ Rate limiting: adaptive
  ├─ Fingerprint: randomized
  └─ Logging: minimal

Campaign running...
🔄

AppSec CI/CD

SecOps / DevSecOps → Campaigns run on every PR

Shift-left security at scale. Integrate WAR-EYE into your pipeline and catch API vulnerabilities before they hit production.

  • Automated fuzzing on pull requests
  • Baseline security checks in staging
  • Regression testing for known vulnerabilities
  • Security gates for deployment approval
# .github/workflows/security.yml
name: API Security
on: [pull_request]

jobs:
  wareye:
    runs-on: ubuntu-latest
    steps:
      - uses: wareye/action@v1
        with:
          target: ${{ env.API_URL }}
          fail_on: critical
🏢

MSSP Consulting

Security Consultancies → Drop-in recon + fuzzer for engagements

Elevate your service offering with industrial-grade API security testing. Impress clients with comprehensive, automated assessments.

  • Rapid client API assessments
  • White-label security reports
  • Scalable multi-tenant testing
  • Competitive differentiation
$ wareye report \
    --campaign wry-client-abc \
    --format pdf \
    --branding custom

[REPORT] Generating...
  ├─ Findings: 12
  ├─ Critical: 2
  ├─ High: 4
  └─ PoCs included

✓ Report exported
🔬

Fuzz Labs

Security Researchers → Advanced campaign control & replay harnesses

For the hackers who push boundaries. Full control over fuzzing campaigns, corpus management, and harness generation.

  • Custom corpus development
  • Zero-day research campaigns
  • Crash minimization and analysis
  • Academic security research
$ wareye corpus manage \
    --minimize \
    --coverage-map ./cov.bin

[CORPUS] Analyzing...
  ├─ Inputs: 50,000 → 847
  ├─ Unique edges: 12,456
  └─ Minimized: 98.3%

$ wareye harness export \
    --crash CRASH-001 \
    --format standalone

Choose Your Deployment

Use Case Deployment Integration Recommended Plan
Red Team Ops On-prem / Air-gapped Standalone CLI Team
AppSec CI/CD Cloud / Container GitHub Actions Team
MSSP Consulting Multi-tenant MCP API Enterprise
Fuzz Labs Bare metal SDK / CLI Starter

Find Your Fit

Tell us about your use case and we'll tailor a demo.

Request Access