simlight

Think You're Secure? Prove It with SimLight

SimLight by Thawd is an advanced Attack Simulation solution designed to deploy in minutes and continuously validate your security controls by simulating realistic attacker behaviors. SimLight provides comprehensive visibility into your organization's security posture, empowering proactive defense against real-world threats.
Simlight image

Reasons to Choose SimLight

icon

Fast & Easy Deployment

Install and start simulating attacks within minutes — no complex setup required.
icon

Aligned with NCA Standards

Built to meet Saudi Arabia’s cybersecurity regulations, including Sigma rule validation and audit policy checks.
icon

Realistic Attack Simulations

Simulates real-world tactics like credential dumping, lateral movement, and data exfiltration using local threat intel.
icon

Continuous & Automated

Runs 24/7 in the background without disrupting operations, providing ongoing validation of your defenses.
icon

Clear, Actionable Reports

Generates MITRE-aligned reports with practical recommendations for closing security gaps.
icon

Enhances SOC Performance

Helps train and measure your security team’s response to realistic threats in a controlled environment.

Attack Scenarios Covered

SimLight tests multiple cyber-attack techniques, including:
scenario icon

Zero-Day Behavior

scenario icon

Privilege Escalation

scenario icon

Lateral Movement

scenario icon

Credential Dumping

scenario icon

Defense Evasion

scenario icon

Persistence

scenario icon

Data Exfiltration

scenario icon

Command & Control

How SimLight Attack Simulation Works?

Step 1

Choose or Customize a Threat

Select a prebuilt threat scenario from the library or create your own custom threat. Review the attack steps and techniques that will be executed during the simulation.
Step 2

Run the Simulation

Launch the simulation and monitor it in real time as each attack step is executed. Watch the simulation unfold live until completion.
Step 3

Review the Results

Access a detailed simulation report, including attack steps, execution status, and validation results. Use these insights to enhance detection, response capabilities, and your overall security posture.

Example of Usage

NCA Compliance & Audit Policy Validation

National entity used SimLight to validate Sigma rules and Windows audit policies automatically.
Outcomes:
check icon
Identified misconfigurations
check icon
Align with NCA standards
check icon
Validates detection rules easily

SOC Readiness Testing

An enterprise simulated real attacks to test their SOC’s detection and response capabilities.
Outcomes:
check icon
Identify and fix critical detection gaps.
check icon
Improve SOC readiness against threats.
check icon
Maximize value from security controls.

EDR & SIEM Validation in an Organization

SimLight continuously tested EDR and SIEM tools using realistic attack behaviors.
Outcomes:
check icon
Identified hidden blind spots
check icon
Proved security control effectiveness
check icon
Validated threat detection coverage across MITRE ATT&CK

Compliance Achieved

national cybersecurity authority logo
saudi central bank

See SimLight In Action

Submit a request and we'll share answers to your top security validation and exposure management questions.
Contact Us
Arrow icon