
Manual penetration testing of web applications, APIs, and mobile apps — including business logic flaws and chained attack paths.

Focused security assessment of APIs — covering authentication, authorization, input validation, business logic, and data exposure.

Cloud security audit combining CIS benchmarks with pentesting experience to find exploitable misconfigurations in your AWS, Azure, or GCP setup.

Security review of Kubernetes and OpenShift platforms covering RBAC, pod security, container images, and CIS benchmark compliance.

Two-phase attack surface mapping using OSINT, service fingerprinting, and CVE analysis to find what's exposed before attackers do.

Review of your software development lifecycle for security gaps — from build pipeline hardening to DFIR readiness and scanner integration.

Whitebox security analysis with source code access — combining manual review, data flow analysis, and architecture assessment.
Low-volume newsletter to announce new trainings, services, and conference talks (about four mails per year)