AI-POWERED CYBER RANGE PLATFORM
tess3rAI

The cyber range
that trains on reality.

Model any infrastructure: corporate networks, OT systems, SCADA architectures, physical hardware in the loop. tess3rAI rebuilds your environment as a fully interactive, AI-powered hybrid cyber range where simulated nodes, live containers and hardware devices coexist in a single scenario. Train your team on exactly what they will face. Zero exposure to production.

Beyond virtualization.
Simulate any environment.

Every existing cyber range works the same way: virtualization. Spin up VMs, replicate operating systems, map the network. It works. Until you leave standard IT behind.

tess3rAI is built on a different principle. Rather than emulating hardware, we simulate behavior, using AI that understands how systems respond, command by command, protocol by protocol. Combine that with hybrid core nodes running live containers for compute-critical operations, and Layer 3 topology enforcement that mirrors your actual network segmentation, and something becomes possible that traditional platforms cannot offer: simulation of environments that have no standard OS image to clone.

OT networks and SCADA systems. Industrial PLCs and field controllers. Naval command-and-control architectures, civil and military. Unmanned aerial and ground platforms. Satellite ground segments and link management systems. If the behavior can be described and the network can be mapped, tess3rAI can simulate it. At Layer 3 fidelity, across the full tesseract of real, virtual and AI planes.

A handful of profiled assets is all it takes. Profile three servers, a PLC and a firewall and tess3rAI will let you compose hundreds of distinct scenarios from that library, each with its own topology, CVE set and entry point configuration. No additional hardware. No re-profiling. Infinite permutations.

Scenario Builder · PLC Radio Station
tess3r^AI Scenario Builder — visual network topology editor with CVE assignment
Node Manager · plc-cp-01
tess3r^AI Node Manager — real hardware profile of a ControlOS 3.4.7 PLC node
01  /  REAL

Physical fidelity

Profile any server with Specter, our read-only scanner. Import real users, processes, filesystems and services. The simulation knows your actual infrastructure.

02  /  VIRTUAL

Live execution

Hybrid core nodes run real Docker containers. Commands like top, ps and ping execute against live processes, not fabricated output.

03  /  SIMULATED

Infinite coverage

The AI layer fills every gap. Every edge case, every obscure command, answered convincingly, contextually, without limits.

Specter — SSH scan and node import dialog tess3r^AI Model Manager — node profile detail (plc-cp-01)

Meet Specter.
Model any environment.

Specter is a read-only profiler that scans any system: servers, workstations, PLCs, SCADA nodes, industrial controllers and OT devices. It generates a structured snapshot. Import it into tess3rAI and that asset comes alive as a fully interactive training node. Model your entire infrastructure, IT and OT alike. No manual configuration. No guesswork. Launch it directly from the platform UI, or run the native scripts (Bash for Linux and macOS, PowerShell for Windows) on any system you can reach, and the profile lands automatically.

Read-only · zero side effects Linux · macOS · Windows SSH or local stdlib only · no dependencies Servers · PLCs · OT devices
See how it fits in  →

From real to ready.

Profile

Launch Specter from the platform interface against any server, workstation, PLC or network device. It performs a read-only SSH scan and builds a complete structured snapshot: users, processes, services, filesystem, hardware. The node is imported automatically, ready to use.

Compose

Open the visual editor and connect your nodes into a scenario. Define Layer 3 topology, assign CVEs, set entry points and configure routing between simulated nodes and real ones. Hybrid nodes bridge directly into physical infrastructure: traffic reaches actual hardware, real industrial buses and live devices as if the simulated network were the production network.

Operate

Teams use the environment exactly as they would use the real thing: from the browser terminal or via standard SSH with any tool they choose. Commands, lateral movements and privilege escalations behave identically whether the target is a simulated node or a physical device on the other side of a hybrid bridge. Full audit trail. Zero risk to production.

Network-native.
From the ground up.

tess3rAI enforces real network topology at Layer 3. Connectivity, routing and access are not simulated: they are the simulation.

Topology Enforcement

SSH pivot is only possible between adjacent nodes. Unreachable hosts stay unreachable, exactly like the real world.

SSH Pivot Chain

Teams can chain pivots across the network exactly as they would in a live engagement. No shortcuts, no free paths.

Scenario Builder

Visual drag-and-drop editor. Build, connect and save complex multi-node scenarios in minutes. No YAML, no scripting.

CVE Emulation

Attach real CVEs to nodes. The AI exposes the right vulnerabilities in the right context and guards everything else.

Hybrid Core Nodes

Certain nodes run live Docker containers. Real processes, real outputs, indistinguishable from physical hardware.

Audit & Replay

Every command, every pivot, every escalation. Logged with full context. Replay any session. Trace any path.

Every action. Logged.
Every session. Replayable.

tess3rAI captures every command, every lateral movement and every privilege escalation with full context: hostname, user, routing path, timestamp. Instructors and red team leads get a complete picture of what happened, in what order, and why. No black boxes.

Audit Log · 79 events
● live
tess3r^AI Audit Log — full command history with routing badges and session replay

Every command, pivot and escalation logged with hostname, user, routing path and timestamp. Click any row to open a full session replay ordered chronologically. Filter by scenario, session ID, event type or hostname.

Metrics · Prometheus counters
tess3r^AI Metrics dashboard — command routing distribution, sessions, escalations, rate limiting

Real-time counters by routing path (builtin, cache, LLM, Docker core), SSH pivots, escalations and rate-limit events. Raw /metrics endpoint for Grafana or any Prometheus scraper.

Web Terminal · wise710a1-cc42 · root
tess3r^AI Web Terminal — interactive root shell on simulated wise710a1-cc42 node

Access any node directly from the browser. No client, no VPN. Or connect via standard SSH from your own tools: every node exposes a real TCP port. Commands are routed transparently across builtin handlers, Redis cache and the LLM layer. Token usage tracked live in the footer.

Ready to Tesser?

See tess3rAI
in action.

We want to work with a select number of organizations. If you operate in environments where failure is not an option, we want to work with you.

Request Access  →

A tesseract /ˈtɛs.ə.rækt/ folds three-dimensional space into a fourth dimension.
tess3rAI folds your real infrastructure into a training dimension you can break safely.