Full Spectrum Cyber

Our team is experienced in developing Full Spectrum Cyber solutions for the Intelligence Community and Department of Defense. We have deployed quick reaction capability (QRC) efforts and tools, architected and integrated frameworks and capabilities, and performed vulnerability research to exploit and attack a wide range of platforms — including military hardware, Internet of Things (IoT) devices, mobile devices, and commercial off-the-shelf (COTS) systems.

Reverse Engineering

BlackHorse reverse engineers target hardware and software from embedded to enterprise systems. Our team develops target-specific approaches to analysis to provide a thorough assessment of potential vulnerabilities, exploits, and mitigations.

Vulnerability Research

BlackHorse vulnerability research experts have state of the art experience in finding, developing, and weaponizing exploits against desktop, mobile, and embedded systems and devices.

CNO Development

BlackHorse CNO developers have extensive capabilities developing, testing, and evaluating CNO Toolsets for operational readiness. We work alongside operators to ensure features are tailored to their mission requirements and preferences.

Tailored End-to-End Solutions

The BlackHorse Cyber Development team provides end-to-end solutions: from access to command and control integration, we ensure that the solution provides value to your mission. Our team leverages isolated development and test environments to ensure limited access to solutions prior to deployment. Our experience comes from a diverse background of engineering expertise lending to solutions with polished user experiences and well-designed, secure baselines.

BlackHorse engineers leverage leading-edge techniques to develop:

  • Command and Control Systems
  • Secure Communications Mechanisms
  • CNO Tools
  • Reverse Engineering Tools
  • Digital Force Protection Devices

Proactive Cyber Defense Services

BlackHorse Solutions delivers a proactive and persistent cyber defense approach that ensures you and your organization are protected against ever-present cyber threats. These services are tailored for your unique concerns and technical requirements to mitigate organizational risks to digital infrastructure and networks. Real-world scenario-based engagements and hands-on support ensure you are confident in your cyber security posture. Our team will work to support both your company’s IT security requirements and business objectives. The primary services in this solution include Risk and Vulnerability Assessment, Cyber Threat Hunting, Incident Response, and Penetration Testing.

Our Proactive Cyber Defense Services can be purchased via the GSA IT Schedule 70.

Learn more »

Risk and Vulnerability Assessment

  • Overall Threat Level Assessment​
  • Network Mapping​
  • Phishing Assessment​
  • Vulnerability Scanning​
  • Wireless Assessment​
  • Database Assessment

Cyber Threat Hunting

  • Identification of Key Threats​
  • Isolation of Advanced Attacks​
  • Iterative Approach to Improving Security Practices​
  • Highlight Emerging Threats​
  • Risk Mitigation Techniques for Advanced Attacks

Penetration Testing

  • Persistent Testing and Evaluation of Security Posture​s
  • Emulate Real-World Attacks​
  • Attempt to Circumvent Security​
  • Stress Test Applications, Systems, and Networks​
  • Advanced Testing Technique

Incident Response

  • On-Demand IT Support​
  • Determine Extent of Incident​​
  • Removal of Adversary from Systems
  • ​Restore Networks to Secure State​​
  • After-Action Reports​
  • Recommend Appropriate Training and Security Procedures

Innovative Research & Development

BlackHorse invests into research & development to enable our engineers to explore new challenges, ideas, and opportunities. Our cyber innovation lab is designed to rapidly take an idea to proof-of-concept and accelerate to long-term research and development effort. We leverage and investigate emerging technologies to create a variety of capabilities including:

Offensive Tools & Capabilities:

  • Platform Access Mechanisms
  • Stealth and Persistence Techniques
  • Survey Tools

Defensive Tools & Capabilities:

  • Risk and Vulnerability Assessment
  • Cyber Threat Hunting & Incident Response
  • Attribution Management


HAVOC is a research and development capability developed by BlackHorse, currently at a TRL 6 prototype level. It provides digital force protection to SOF and LEO by surveying 802.11 for situational awareness and enabling an operator to disrupt specifically targeted wireless Access Points (APs). HAVOC causes temporary disruption against target wireless networks without any 2nd or 3rd order effects.

Contact Us »