Penetration Testing Services

Browse providers by the type of penetration testing service you need. Each category lists qualified companies with relevant expertise.

Web Application

76

Web application penetration testing is a systematic process of probing web-based applications for security vulnerabilities that could be exploited by ...

Network

74

Network penetration testing evaluates the security of your organisation's network infrastructure by simulating attacks against internal and external n...

Mobile App

54

Mobile application penetration testing assesses the security of iOS and Android applications by examining the app binary, its communication with backe...

IoT

14

IoT penetration testing evaluates the security of Internet of Things devices, their firmware, communication protocols, cloud backends, and mobile comp...

Cloud

69

Cloud penetration testing assesses the security of cloud environments hosted on platforms such as AWS, Microsoft Azure, and Google Cloud Platform. Unl...

API

61

API penetration testing focuses on the security of application programming interfaces, which form the backbone of modern web and mobile applications. ...

Social Engineering

52

Social engineering testing evaluates the human element of your organisation's security posture by simulating real-world manipulation techniques used b...

Red Teaming

57

Red teaming is an advanced adversary simulation exercise that tests an organisation's detection and response capabilities by emulating real-world thre...

Purple Teaming

14

Purple teaming is a collaborative security exercise that brings together offensive (red team) and defensive (blue team) capabilities to improve an org...

Physical

12

Physical penetration testing evaluates the effectiveness of an organisation's physical security controls by attempting to gain unauthorised access to ...

Wireless

33

Wireless penetration testing assesses the security of an organisation's wireless networks, including Wi-Fi, Bluetooth, and other radio-frequency commu...

SCADA/ICS

11

SCADA/ICS penetration testing evaluates the security of industrial control systems, supervisory control and data acquisition (SCADA) systems, and oper...

Vulnerability Assessment

59

Vulnerability assessment is a systematic process of identifying, quantifying, and prioritising security vulnerabilities across an organisation's IT in...

Source Code Review

18

Source code review (also known as secure code review or code audit) is a systematic examination of an application's source code to identify security v...

Configuration Review

27

Configuration review is a detailed assessment of system, network, and application configurations against security best practices and industry benchmar...

Assumed Breach

16

Assumed breach testing is a targeted security assessment that begins from the premise that an attacker has already gained initial access to the organi...

AI & LLM

2

AI and LLM penetration testing is a specialised security assessment designed for applications that integrate large language models and generative AI. ...