// ABOUT
One agent. Two layers. Open by default.
ThreatCrush is a Continuous Threat Exposure Management (CTEM) platform with SIEM, EDR, and SOC capabilities folded into the same agent. We're building it because the average security team runs nine separate tools to do work that should live in one place, on one taxonomy, with one alert path.
What we do
One open-source agent runs on every server you operate. It speaks the standards your SOC already uses — MITRE ATT&CK, D3FEND, Sigma, OCSF, NIST CSF — and emits events that drop straight into existing SIEM/EDR/SOC stacks. A module marketplace lets the community extend detections, scanners, and active-defense playbooks without forking the core.
Who we are
ThreatCrush is a product of Profullstack, Inc. — a senior engineering shop that has shipped infrastructure, payments, and developer tooling under the @profullstack scope on npm and GitHub for years. The same operators run ThreatCrush.
We're small and senior on purpose. We do not raise to hire — we hire when the loop demands it. If you're curious about the team, our GitHub is the most honest signal.
How we're different
- Open source by default. MIT-licensed core. No vendor lock-in.
- Open standards by default. Every detection carries a public technique ID — not a vendor SKU.
- One agent. CTEM + SIEM + EDR + SOC capabilities from the same daemon, not four agents fighting for the same syscall.
- A marketplace, not a roadmap. Community modules close the long tail faster than any single team can.
Get in touch
- General: hello@threatcrush.com
- Security: security@threatcrush.com
- Investors: threatcrush.com/investors · invest@threatcrush.com
- Gov & defense: gov@threatcrush.com
- Schedule: calendly.com/chovy