Skip to main content
The Myrmex Endpoint Agent is not a static security product; it is a dynamic execution interface that gives the platform’s AI agents (Perseus and Centurion) deep visibility and control over the operating system. Think of the binary as the Eyes and Hands of the AI. It provides the raw sensory data needed for understanding and the mechanical tools required for action. With access to Kernel, User Mode, and system terminals, it enables 100% operational coverage.

Capabilities Matrix

The agent provides a rich set of primitives that Perseus and Hydra use to orchestrate security and operations.
Capability LayerPrimitiveDescription
Visibility (Eyes)Kernel SyscallsReal-time interception of file, network, and process operations at the lowest level.
Process TelemetryDeep inspection of process trees, memory injection attempts, and parent-child relationships.
File System WatcherMonitoring of file creation, modification, and deletion in microseconds.
Network InspectionAnalysis of every packet and connection request (DNS, TCP, UDP, HTTP).
Execution (Hands)Command ExecutionAbility to run shell/terminal commands (PowerShell, Bash, Zsh) as SYSTEM or root.
Process ControlImmediate termination or suspension of any running process or thread.
IsolationNetwork segregation of the device, allowing communication only with the Myrmex Platform.
File OperationsSurgical deletion, quarantine, or restoration of specific files.
Gateway (Bridge)Log Ingestion(Collector Mode) Acting as a syslog receiver for third-party devices.
API Proxy(Collector Mode) Forwarding authenticated requests from Hydra to external cloud APIs.
SSH Proxy(Collector Mode) Establishing secure, interactive SSH sessions for Hydra to manage network devices (Switches, Routers).

Supported Environments

The binary is designed to provide these primitives across a wide range of operating systems, abstracting the complexity so Centurion can orchestrate uniformly.
Feature SupportXP/2003WindowsLinuxMacOS
Core Visibility✔️✔️✔️✔️
Kernel InterceptionLegacy Mode✔️✔️✔️
Command Execution✔️✔️✔️✔️
Network Isolation✔️✔️✔️✔️
Collector capabilities✔️✔️
Legacy Support: We maintain specialized support for legacy systems (Windows XP/2003) to ensure full visibility even in older operational technology (OT) environments.