Pen Testing Services
Browse pen testing services by category. Each category lists qualified pen testing companies with relevant accreditations and expertise.
Web Application
83Web application penetration testing is a systematic process of probing web-based applications for security vulnerabilities that could be exploited by ...
Network
82Network penetration testing evaluates the security of your organisation's network infrastructure by simulating attacks against internal and external n...
Mobile App
58Mobile application penetration testing assesses the security of iOS and Android applications by examining the app binary, its communication with backe...
IoT
19IoT penetration testing evaluates the security of Internet of Things devices, their firmware, communication protocols, cloud backends, and mobile comp...
Cloud
77Cloud penetration testing assesses the security of cloud environments hosted on platforms such as AWS, Microsoft Azure, and Google Cloud Platform. Unl...
API
69API penetration testing focuses on the security of application programming interfaces, which form the backbone of modern web and mobile applications. ...
Social Engineering
55Social engineering testing evaluates the human element of your organisation's security posture by simulating real-world manipulation techniques used b...
Red Teaming
63Red teaming is an advanced adversary simulation exercise that tests an organisation's detection and response capabilities by emulating real-world thre...
Purple Teaming
20Purple teaming is a collaborative security exercise that brings together offensive (red team) and defensive (blue team) capabilities to improve an org...
Physical
14Physical penetration testing evaluates the effectiveness of an organisation's physical security controls by attempting to gain unauthorised access to ...
Wireless
36Wireless penetration testing assesses the security of an organisation's wireless networks, including Wi-Fi, Bluetooth, and other radio-frequency commu...
SCADA/ICS
13SCADA/ICS penetration testing evaluates the security of industrial control systems, supervisory control and data acquisition (SCADA) systems, and oper...
Vulnerability Assessment
69Vulnerability assessment is a systematic process of identifying, quantifying, and prioritising security vulnerabilities across an organisation's IT in...
Source Code Review
23Source code review (also known as secure code review or code audit) is a systematic examination of an application's source code to identify security v...
Configuration Review
34Configuration review is a detailed assessment of system, network, and application configurations against security best practices and industry benchmar...
Assumed Breach
21Assumed breach testing is a targeted security assessment that begins from the premise that an attacker has already gained initial access to the organi...
AI & LLM
2AI and LLM penetration testing is a specialised security assessment designed for applications that integrate large language models and generative AI. ...