Overview
Managing and executing offensive security tooling has become increasingly complex. The traditional approach of finding or building tools, installing them locally or on external infrastructure, and wiring them together manually is slow, error prone, and difficult to scale. Trickest addresses these challenges through a workflow-based architecture built on five core concepts:- How you organize work
- How you build automation
- What building blocks you use
- How you store and analyze results
- How you run and scale execution
Why Key Concepts Matter
This section helps you build a clear mental model of the platform. Key Concepts reduce confusion by answering “what is X?” and “how does X relate to Y?” in one place. On this page you will learn the main concepts that power the Trickest platform and how they work together to build and deploy offensive security workflows at scale.Explore Key Concepts
Workspaces & Projects
Organize your work using workspaces and projects to keep workflows, teams, and clients structured.
Workflows
Build automation by connecting nodes in visual workflows that define your security processes.
Building Blocks
Use scripts, tools, and modules as the executable components that power your workflows.
Solutions & Database
Store, query, and analyze results with Solutions and their integrated datasets.
Machines & Fleet
Execute workflows on managed or self-hosted machines and scale across your fleet.