Based in Umhlanga, Durban — expert penetration testing in South Africa for healthcare practices, dental clinics, and SMEs. Executive-ready reports. Actionable remediation that actually works.
Eight live tools that show you exactly what attackers already see — plus a full arsenal of free templates and frameworks. Before you spend a rand.
12 critical security controls. 90 seconds. Instant executive-grade breach exposure score across identity, backup, endpoint, and detection domains. See where you're most exposed right now.
START ASSESSMENTEnter your domain. We run live DNS lookups, certificate transparency scans, Shodan port data, and RDAP WHOIS — and generate the exact intelligence file an attacker compiles before targeting you.
COMPILE MY DOSSIERSelect your industry and company size. Watch the financial damage tick up in real time — modelled on IBM Cost of Data Breach 2025 data. Puts R44.1M in visceral, ticking perspective.
START THE CLOCKSearch any CVE ID or product name across NVD, CISA KEV, GitHub Advisories, and Exploit-DB in real time. Instantly see severity scores, known exploits, and whether a vulnerability is actively being weaponised.
SEARCH VULNERABILITIESUpload, paste, or extract a video frame. Claude's AI reads the image, runs multiple live web searches, and delivers a full OSINT report — original source, earliest known date, stolen art matches, meme variants, and propaganda trails.
TRACE THIS IMAGEPaste any suspicious URL. We run 16-point heuristic analysis, query Google Safe Browsing's threat database, and scan with VirusTotal's 90+ security engines — all in real time. Know before you click.
SCAN A LINKDefine your engagement type, discover in-scope assets, set testing windows, and generate a signed-ready MOU and Nmap command — all in a guided 7-step wizard. No guesswork.
START SCOPINGType any password. Instantly see how long it would take to brute-force — from a throttled login form, to a home gaming PC, to a nation-state supercomputer. 100% offline. Your password never leaves your browser.
TEST A PASSWORD31 battle-tested templates, policies, checklists, and frameworks used by real security teams. IRPs, pentest checklists, POPIA tools, NDAs, and more. Free. No login. No catch.
OPEN THE ARSENALEvery figure below is sourced directly from IBM's 2025 Cost of a Data Breach Report — the industry's most comprehensive breach study, now in its 20th year. 600 organisations. 17 industries. South Africa included.
All figures: IBM / Ponemon Institute Cost of a Data Breach Report 2025. SA figures in ZAR. Global in USD. Full report: ibm.com/reports/data-breach
Manual, expert-led security testing that goes far beyond automated scanners. Every engagement is scoped precisely, executed methodically, and delivered with clarity. Click any service to open a full deep-dive.
We think like attackers, operate like operators, and report like executives.
Our penetration tests simulate real adversary techniques across web applications, internal networks, external perimeters, cloud infrastructure, and APIs. We don't run a scanner and call it a pentest — every finding is manually validated, chained, and contextualised for your business. You get proof of impact, not just a list of CVEs.
An attacker identifies a forgotten dev subdomain with a debug endpoint enabled. They use it to enumerate internal API routes, find a JWT with a static secret, forge admin tokens, and exfiltrate 40,000 patient records — all within 72 hours of initial access. This subdomain existed for 11 months before anyone noticed. We find these.
Executive Summary Report
Board-ready: risk posture, key findings, business impact
Full Technical Report
Every finding: proof-of-concept, CVSS, exploitability, fix instructions
Developer Remediation Guide
Step-by-step fix instructions, code-level examples where applicable
Live Debrief Session
Expert walkthrough of every critical finding with your team
Full Retest Included
We verify every fix is genuine — not just patched on paper
A systematic, broad scan of your entire attack surface — every weakness catalogued and ranked.
Unlike a pentest, a vulnerability assessment is about breadth over depth — mapping every security weakness across your networks, servers, applications, and cloud services. Prioritised by real-world exploitability (not just CVSS), this is the foundation of a strong security programme and a prerequisite for most compliance frameworks.
A critical unpatched vulnerability in a legacy VPN appliance sits undetected for 9 months. Automated threat actors exploit it to gain initial access, establish persistence, and quietly harvest credentials before triggering ransomware. A quarterly VA catches this before the window opens — estimated damage avoided: R12M+.
Comprehensive Scan Report
Full inventory of all identified vulnerabilities
Risk-Ranked Vulnerability List
CVSS scores with real-world business context applied
Expert Remediation Guidance
Prioritised next steps for every critical and high finding
Tailored for dental practices, clinics, and medical SMEs protecting patient data.
Healthcare is the #1 most targeted industry for cyber attacks. Patient data is worth 10 to 50 times more than financial data on the dark web (Trustwave, Experian) — and the regulatory consequences of a breach are severe. We understand HIPAA, POPIA, and the specific threat landscape facing medical practices, telehealth platforms, EHR systems, and dental software.
A single phishing email compromises a receptionist account at a dental practice. The attacker pivots to the imaging server — which was on the same flat network — encrypts all patient X-rays, and demands a R500K ransom. Backups were on a network share accessible from the compromised account. Practice is down for 3 weeks. Total cost: R1.8M. We prevent this.
HIPAA/POPIA Gap Analysis
Control mapping, gaps identified, penalties quantified
Compliance Roadmap
Prioritised remediation plan with estimated effort and cost
Patient Data Protection Plan
Specific guidance for PHI security, backups, and access control
We also offer Security Audits & Compliance and Incident Response & Remediation — see the full picture on our services page.
VIEW ALL 5 SERVICES IN FULL DETAILA proven 4-phase process built around how real attackers operate. No spray-and-pray. No bloated CVE lists. Just clear, actionable intelligence that leads to genuine risk reduction.
We map your full attack surface and build a threat model before touching a single system. Passive OSINT, DNS enumeration, certificate transparency, Shodan — the same starting point a real attacker uses. You approve scope. We begin.
Ethical, targeted testing simulating real adversary behaviour. No automated spray-and-pray. Every attack vector is manually tested, chained, and validated by a human expert. We find what scanners miss — including logic flaws, misconfigurations, and business-layer vulnerabilities.
Clear risk ratings, compliance impact, and business context — not just a CVE list. Every finding includes CVSS score, real-world exploitability rating, proof-of-concept evidence, and remediation instructions your developers can implement without a translator.
We guide the fix, then verify it. Retesting is included in every engagement to confirm every vulnerability is genuinely closed — not just patched on paper. You receive a final certification report suitable for auditors, clients, and insurers. Close the loop, not just the ticket.
Sector-specific threat knowledge. We know the regulations, the common attack paths, and the specific systems used in your industry — not generic security advice.
POPIA-focused assessments for patient data, imaging systems, and practice management software.
Clinics, telehealth platforms, and EHR system security against the #1 targeted sector.
Protecting privileged client data, communications, and intellectual property for law firms and consultancies.
PCI DSS compliance, card data protection, API security, and BEC fraud prevention.
Right-sized security programmes — enterprise-grade protection without enterprise budgets.
Critical infrastructure protection, POPIA compliance, and citizen data security for public sector entities.
Protecting student data, research IP, and administrative systems for schools, colleges, and universities.
Payment security, customer data protection, supply chain risk, and fraud prevention for online retailers.
Industry-certified expertise — and all the advantages of working directly with the operator who runs your engagement, not a project manager who farms it out.
No handoffs. No junior analysts running your engagement while the senior consultant is on the proposal. The person you speak to is the person running the tools.
Large firms charge for floors of overhead. We don't. You get the same manual, MITRE ATT&CK-mapped methodology at a fraction of the cost.
Every engagement is covered by a mutual NDA before any information is shared. Confidentiality isn't a paid add-on — it's the default.
No 400-page Nessus exports. Every finding is manually validated, contextualised for your business, and written so your team can actually fix it.
We understand the local threat landscape — SAPS cyber division, SA-specific ransomware groups, POPIA enforcement priorities — not just global frameworks copy-pasted for local clients.
We don't report and disappear. A full retest of every finding is included in every engagement. We verify the fix is real, not just patched on paper for the auditors.
Real attack breakdowns, threat advisories, and practical security guidance — written by the same consultant who runs your engagement.
USB hub at the patient's feet. Shared WiFi. Four PCs, one flat network. A pentester walks through every step — and every fix.
The latest LockBit variant is actively targeting EMEA SMEs. Here's the TTPs and how to harden against them before you're next.
From Flipper Zero to the WiFi Pineapple — the tools used for physical penetration testing are openly available. Here's what they do.
Not a demo environment. Not a synthetic scenario. These are actual findings from live client engagements — anonymised, verified, and representative of what we find in the wild.
Everything prospects actually want to know — answered plainly, without the sales spin.
Still have a question not answered here?
Ask Us DirectlyConfidential consultation. No commitment. We'll tell you exactly what we'd test and what we'd expect to find — before you spend a rand.
> threat.level=UNKNOWN → schedule.consultation() → threat.level=MANAGED
We respond within 24 hours · All inquiries strictly confidential · Under NDA from first contact