Skip to main content

Overview

Managing and executing offensive security tooling has become increasingly complex. The traditional approach of finding or building tools, installing them locally or on external infrastructure, and wiring them together manually is slow, error prone, and difficult to scale. Trickest addresses these challenges through a workflow-based architecture built on five core concepts:
  • How you organize work
  • How you build automation
  • What building blocks you use
  • How you store and analyze results
  • How you run and scale execution

Why Key Concepts Matter

This section helps you build a clear mental model of the platform. Key Concepts reduce confusion by answering “what is X?” and “how does X relate to Y?” in one place. On this page you will learn the main concepts that power the Trickest platform and how they work together to build and deploy offensive security workflows at scale.

Explore Key Concepts

Workspaces & Projects

Organize your work using workspaces and projects to keep workflows, teams, and clients structured.

Workflows

Build automation by connecting nodes in visual workflows that define your security processes.

Building Blocks

Use scripts, tools, and modules as the executable components that power your workflows.

Solutions & Database

Store, query, and analyze results with Solutions and their integrated datasets.

Machines & Fleet

Execute workflows on managed or self-hosted machines and scale across your fleet.

Next Steps

How-to Guides

Step-by-step guides for workflows, database, users, and more.

Navigating the Editor

Learn the workflow editor layout and how to inspect runs.

Building and Debugging a Workflow

Add nodes, configure them, and run workflows.