Manual penetration testing, not automated scanning
Every engagement is scoped individually, priced transparently, and you’ll deal directly with the consultant doing the work – not an account manager. Our methodology is built on OWASP WSTG, NIST SP 800-115, and CREST testing guides, with testing techniques informed by the MITRE ATT&CK framework and aligned with NCSC guidance.
Whether you’re meeting a compliance requirement or testing ahead of a product launch, we focus on finding vulnerabilities that matter to your business, not padding a report.
JUMP TO:
Not sure which testing you need?
Application Security Testing
Test the software and products your customers use
Web Application Testing
Protect your web apps from data breaches before attackers find the weaknesses. Expert manual testing that goes beyond automated scanners.
We identify vulnerabilities in the OWASP Top 10 and more, including authentication flaws, and business logic issues across all user privilege levels.
API Security Testing
Secure your REST, GraphQL, and SOAP APIs against data exposure and unauthorised access.
OWASP API aligned testing covering broken authorisation, excessive data exposure, rate limiting issues, and parameter tampering vulnerabilities in your microservices, public APIs, and mobile backends.
Mobile App Security
iOS and Android security testing covering insecure data storage, weak cryptography, improper platform usage, and API security.
Our mobile testers perform reverse engineering, runtime manipulation, and backend API testing to identify vulnerabilities before your app reaches production.
Desktop Application Testing
Identify critical vulnerabilities in Windows and macOS applications including privilege escalation, insecure data storage, and code injection flaws.
We test how your application handles sensitive data, communicates with backend services, and manages user permissions through both source code review and black-box testing.
Embedded Device & IoT Testing
Embedded device security testing of hardware products and IoT devices. Specialised assessment of hardware interfaces, firmware analysis, wireless protocols, and the full ecosystem including mobile apps, web dashboards, and cloud platforms.
Network & Infrastructure Security Testing
Test your infrastructure and network defences
External Network Pentesting
Discover your external attack surface by testing your internet-facing infrastructure from an attacker’s perspective.
We identify vulnerabilities in firewalls, VPNs, remote access services, and exposed systems through reconnaissance, service enumeration, and exploitation attempts.
Internal Network Pentesting
Simulate insider threats and assumed-compromise scenarios to test your internal defenses. Understand what attackers could achieve after gaining initial access to your network.
We assess Active Directory security, lateral movement opportunities, privilege escalation paths, and access to critical systems.
Wi-Fi Security Assessment
Ensure your wireless infrastructure doesn’t become an easy entry point for attackers.
Comprehensive wireless security testing covering corporate and guest networks. We test encryption strength, identify rogue access points, assess network isolation, and evaluate captive portal security.
Vulnerability Assessment
Automated vulnerability scanning with manual validation and prioritisation. Ideal for regular monitoring and compliance requirements.
We identify known vulnerabilities, missing patches, and misconfigurations across your infrastructure, then eliminate false positives and provide context-specific remediation guidance.
Continuous Security Testing
Security testing designed for organisations that continue to grow
Pentest-as-a-Service (PTaaS)
Get unlimited retesting, on-demand consultant access, and real-time vulnerability tracking through our Attack Surface Center platform. Your security keeps pace with your rate of change and development velocity without traditional testing delays.
Get a quote for testing today
Our Penetration Testing Process
Every assessment starts with a planning and scoping session, where we collaborate with you to define and understand your specific security needs and objectives for testing to ensure a targeted and effective approach to the engagement.
This scope of work is provided as part of our working agreement, and is further stated in the resulting assessment report that is provided at the completion of testing.
Our standard recommendations provide a balance of deep, thorough coverage of your environments whilst also ensuring that testing is performed in a safe and constructive manner to minimise any potential impact to your resources.
Each scope of work is tailored to your business requirements and level of security maturity and risk appetite and outlines:
Our team conducts a thorough assessment of the target environment to discover assets, services, web pages and then identifying potential vulnerabilities and weaknesses that could be exploited by attackers.
Depending upon the type of engagement, we perform different types of testing aligned with industry standards. For example, with external network testing we focus upon the services that are exposed from assets and form a picture of what the attack surface looks like from the outside in.
For web application testing, for example, we focus upon on identifying potential flaws that could allow unauthorised access to customer or business data, either from an unauthenticated or authenticated user perspective.
This systematic approach ensures comprehensive coverage while minimising false positives common in automated scanning.
As ethical hackers, we safely simulate real-world cyber attacks through exploitation to test your defences, gaining insights into any vulnerabilities and the effectiveness of your security measures.
Where it is possible to gain access to a system, we will perform post-exploitation activities if this is included in the agreed scope of work. This allows us to delve deeper into the security posture and discover additional weaknesses that may present within your environment.
Safe, controlled exploitation demonstrates real business impact:
We coordinate all exploitation activities with your team and never take actions that could cause service disruption without explicit approval.
During the engagement we provide live access to the data that we report on via our Attack Surface Center platform. This offers you the ability to see vulnerabilities being discovered and reported in real-time.
We provide a detailed report of our findings for every engagement, and offer debriefing sessions to discuss the vulnerabilities, their impact, and any recommended remediation strategies with your stakeholders at a level they are most comfortable with.
Every engagement includes:
Reports are delivered within 5 business days of testing completion, with live findings available throughout testing via Attack Surface Center.
Which Type of Penetration Test Do You Need?
Not every organisation has with the same requirements. Here are the most common situations we see, and the testing we’d typically recommend for each.
You’re preparing for ISO 27001 certification or renewal
Your ISMS audit will expect evidence that you’ve tested your security controls independently.
We’d typically recommend an external network penetration test as a starting point, combined with web application testing if you have customer-facing systems in scope. We’ll produce reporting that maps directly to Annex A requirements.
You’re working towards PCI DSS compliance
Requirement 11.4 mandates penetration testing of your cardholder data environment at least annually, covering both internal and external boundaries.
We scope CDE-focused engagements specifically to meet PCI DSS requirements and provide methodology documentation your QSA will accept.
You’re launching or significantly updating a web application or API
Pre-launch or pre-release is the right time to test. Finding vulnerabilities before your users do is significantly cheaper than finding them after.
A web application penetration test or API assessment will identify authentication flaws, data exposure risks, and logic vulnerabilities before they reach production.
You’re building or shipping a mobile or desktop application
Client-side applications introduce a different category of risk: insecure data storage, weak cryptography, improper session handling, and backend API vulnerabilities that web testing alone won’t surface.
Mobile and desktop testing is scoped to your platform and release timeline.
Your development team ships frequently and point-in-time testing isn’t keeping up
A single annual penetration test made sense when software changed slowly. If your team is deploying weekly or continuously, security testing needs to match that pace.
PTaaS gives you ongoing coverage, on-demand consultant access, and unlimited retesting without re-scoping each time.
You’ve never had a penetration test before or are not sure what you need
That’s what scoping calls are for. Tell us about your environment, your compliance obligations, and any specific concerns and we’ll recommend an assessment that fits your risk profile and budget, and provide a fixed quote within 24 hours.
Penetration testing – common questions
Our pricing is based on scope, complexity and your organisation’s context. To make things easier, we publish realistic price ranges so you can quickly assess fit before requesting a quote.
You can speak with our team for bespoke engagement that tailors our resources and testing methodologies for your business’ risk profile and requirements. Each quote factors in:
To ensure accurate pricing by not over or under-scoping an assessment, we aim to learn as much about your business and the target(s) as possible.
We’re able to support scoping discussions via email if preferred.
Most engagements will range from 3-5 days, depending upon the type of testing (web application, external network, etc.).
Retesting is available and can be bundled or quoted separately. For certain types of testing, such as web application or API testing, we can include free spot-check retesting at no charge.
Yes, we can provide a discount for multi-service engagements and repeat engagements. If you are a charity, start-up, or public services organisation – let us know and we can work within your budget.

