Pen Testing Services

Browse pen testing services by category. Each category lists qualified pen testing companies with relevant accreditations and expertise.

Web Application

83

Web application penetration testing is a systematic process of probing web-based applications for security vulnerabilities that could be exploited by ...

Network

82

Network penetration testing evaluates the security of your organisation's network infrastructure by simulating attacks against internal and external n...

Mobile App

58

Mobile application penetration testing assesses the security of iOS and Android applications by examining the app binary, its communication with backe...

IoT

19

IoT penetration testing evaluates the security of Internet of Things devices, their firmware, communication protocols, cloud backends, and mobile comp...

Cloud

77

Cloud penetration testing assesses the security of cloud environments hosted on platforms such as AWS, Microsoft Azure, and Google Cloud Platform. Unl...

API

69

API penetration testing focuses on the security of application programming interfaces, which form the backbone of modern web and mobile applications. ...

Social Engineering

55

Social engineering testing evaluates the human element of your organisation's security posture by simulating real-world manipulation techniques used b...

Red Teaming

63

Red teaming is an advanced adversary simulation exercise that tests an organisation's detection and response capabilities by emulating real-world thre...

Purple Teaming

20

Purple teaming is a collaborative security exercise that brings together offensive (red team) and defensive (blue team) capabilities to improve an org...

Physical

14

Physical penetration testing evaluates the effectiveness of an organisation's physical security controls by attempting to gain unauthorised access to ...

Wireless

36

Wireless penetration testing assesses the security of an organisation's wireless networks, including Wi-Fi, Bluetooth, and other radio-frequency commu...

SCADA/ICS

13

SCADA/ICS penetration testing evaluates the security of industrial control systems, supervisory control and data acquisition (SCADA) systems, and oper...

Vulnerability Assessment

69

Vulnerability assessment is a systematic process of identifying, quantifying, and prioritising security vulnerabilities across an organisation's IT in...

Source Code Review

23

Source code review (also known as secure code review or code audit) is a systematic examination of an application's source code to identify security v...

Configuration Review

34

Configuration review is a detailed assessment of system, network, and application configurations against security best practices and industry benchmar...

Assumed Breach

21

Assumed breach testing is a targeted security assessment that begins from the premise that an attacker has already gained initial access to the organi...

AI & LLM

2

AI and LLM penetration testing is a specialised security assessment designed for applications that integrate large language models and generative AI. ...