Web application Pentest
The Web Application Pentest is based on the latest OWASP Top Ten framework which guarantees that your application is tested against a wide range of vulnerabilities. Discover and mitigate all vulnerabilities before attackers can exploit them.
Cloud Azure Pentest
The Cloud Azure Pentest covers a wide range of scenarios from ARM (Azure Resource Manager) to AAD (Azure Active Directory) and ensures that your cloud infrastructure is safe and protected from intruders.
api pentest
The API Pentest is based on the latest OWASP API Security 2023 project which covers the most common and high impact security issues known for APIs. Keep your web, mobile or thick client APIs safe.
Attack surface Monitoring
External Attack Surface Mapping is a cybersecurity service that involves identifying and analyzing an organization’s digital footprint and potential entry points from an external perspective (Internet)
Assumed breach scenario
The Assumed Breach simulates a scenario where an attacker has already gain access to the internal infrastructure and it explores the different paths that may be abused to compromise the Active Directory Domain, emulating the advanced ransomware groups tactics and techniques
Testimonials

An exceptionally comprehensive review of our security and one that shows our years of development and focus on security have been well worthwhile.
Portainer.io
Docker Management Platform

Instrumental in helping us scale Federacy. Deep understanding of security, incredible communication skills, and great with troubleshooting and handling difficult problems. We couldn’t ask for a better consultant.
James Sulinski
CTO/Co-Founder

Wonderful and productive training sessions. Andrei is a great mentor! I recommend him totally!
Sorin Obreja,
Cybersecurity Student
Certifications

CRTP – Assess security of an Enterprise Active Directory environment.

OSCP – Demonstrated ability to identify vulnerabilities and execute organized attacks under tight time constraints.

CARTP – Understand and assess security of an Azure environments.

Practical Web Application Security and Testing – Uncovering OWASP Top 10 vulnerabilities using the techniques

Cyber Threat Intelligence – Threat actors, intelligence lifecycle and ethical considerations

Our consultants are part Synack Red Team alongside over 1,500 of the world’s most skilled and trusted security researchers