How it works
Pick a stack.
Get an environment.
Destroy it when done.
01
Describe your stack
Select tools from a catalogue of 18 production-grade open-source modules. n8n, Elastic, Caldera, Wazuh, OpenCTI — mix and match. The platform resolves dependencies, estimates cost, and generates a plan.
02
Approve and provision
One click deploys the full environment. OpenTofu provisions VPC, gateway, and all tool VMs in parallel. Wiring runs automatically — Caddyfile, DNS, credentials, seed data. No configuration required.
03
Access and run
Every tool at its own subdomain, protected by Google SSO. Pre-loaded with realistic data so you run workflows immediately, not setup wizards. TTL auto-destroys on schedule — no cleanup, no bill surprise.
Tools
18 modules.
Every module is a production-grade open-source tool, deployed and wired automatically. No configuration. No version mismatches.
What it actually means
Real infrastructure.
No setup tax.
Minutes, not days
A full security stack used to take a team days to stand up. Aithroyz does it in under 10 minutes — fully automated, no IaC knowledge required. When you're done, it's gone.
Real isolation
Each environment gets its own VPC, wildcard subdomain, and scoped credentials. No shared state. No cross-tenant anything. When it auto-destroys, there's nothing left.
Realistic by default
Environments come pre-loaded with synthetic data: SOC events in Elastic, demo workflows in n8n, Grafana dashboards, sample cases in TheHive. You run workflows, not setup wizards.
Cost is first-class
Every plan shows a cost estimate before you commit. TTL auto-destroy is mandatory. There are no orphaned instances, no surprise billing, no runaway cloud spend.
FAQ
Common questions.
GCP today. AWS and Azure coming in the next wave. Deploy into your own account or let us manage it.
$2–8/hour depending on the tools selected. Every plan shows a cost estimate before you approve. TTL auto-destroy makes that a ceiling, not a starting point.
Under 10 minutes for a full stack. Simple setups (n8n + Grafana) in under 3 minutes. We've measured it.
Yes. Each tenant gets its own VPC, dedicated subdomains, and isolated auth. There is no shared data layer. When it destroys, it destroys cleanly.
All tools are browser-accessible via Google SSO — no VPN, no per-tool login setup. One auth-proxy per environment, wildcard DNS, Caddy forward_auth.
Email us or use the request form. Private beta, onboarding enterprise teams and security practitioners now.