Capabilities
Full Spectrum Cyber
Our team develops full spectrum cyber solutions for the Department of Defense and others. We have developed tools, architected technology, and performed Vulnerability Research and Reverse Engineering to exploit a wide variety of platforms.
Vulnerability Research and Reverse Engineering
Emulation Technologies
Digital Twins
Modeling and Simulation
Vulnerability Research Tools
Reverse Engineering Aid
Cyber Operations
CNO Development
Advanced Technology and Research
Cromulence believes in making an impact to our customer's missions. We excel at taking fundamental breakthroughs and turning them into applied, practical solutions in our areas of expertise.
Programs we have innovated on include:
DARPA
Cyber Competitions
Our team has a rich history founded in our company’s origin in designing, developing, and supporting cyber competitions, including Capture the Flag competitions. Our heritage stems from our roots as members of Legitimate Business Syndicate, previous organizers of DEF CON Capture the Flag, where we hosted annual competitions, inviting the world’s best to compete in our contest. Today we support the DoD and commercial entities in building out state of the art cyber competitions to educate, evaluate, and inspire white-hat hackers around the world.
End to end capability
Design
Environment
Content
Logistics
Hosting
Examples
Hack-A-Sat
Cyber Grand Challenge
DEF CON Capture the Flag
Engineering Services
Cyber Tool Development
With dozens of successful developments under our belts, we understand the unique requirements for cyber capabilities.
Reverse Engineering and Vulnerability Research
Our cadre of Vulnerability Researchers are highly skilled in reverse engineering applications and operating systems for desktop, servers, and cyber physical systems. In addition to industry standard tools such as IDA Pro, Binary Ninja, and Ghidra, we utilize our own Hog emulation platform to gain insight into the operation and behavior of these systems during analysis and exploit development.
Cyber Red Teaming
Going beyond the commercial scanners and compliance checking of traditional penetration testing, we bring our offensive cyber mindset and years of experience in finding unique vulnerabilities to our customers’ red teaming needs.