Take Control

The tactics, techniques and procedures that adversaries use evolve at a rapid pace. To stay ahead of malicious actors, it is essential to work with a team that knows how they operate and can recommend relevant solutions.

Our Services

We understand that every organisation, environment and security needs are unique.
The services provided by SilentGrid are always tailor-made for our customers' specific needs. Our engagements provide a customised combination of multiple elements from our service portfolio to ensure optimal coverage for your security concern at hand.

Assumed Breach

Assess your defensive readiness for the scenario where a sophisticated threat actor managed to establish an initial foothold on your network

Red Teaming

Evaluate your organisation's security controls, procedures and overall security maturity by simulating a sophisticated end-to-end real-world attack

Penetration Testing

Manually assess your infrastructure and software to identify vulnerabilities that could be leveraged to compromise the security of your digital property

Perimeter Assessment

Map your publicly exposed resources and uncover attack surfaces you might not be aware of

Adversary Emulation

Use tools, techniques and procedures of attackers to assess your detection and response capabilities

Password Analysis

Assess your current employees' security awareness by running a password analysis against your Active Directory environment

image
image
image
image
image
image
image
image
image
image image

Client Portal

All our clients get access to a dedicated portal*, which allows them to:


  • Track engagements and identified issues in real-time
  • Access project details
  • Focus and monitor remediation efforts
  • Get a concise view of current and historical projects
  • Access various statistics


*opt-out available

image
image
image
image
image

Certifications and Recognitions

Our expertise is supported by the internationally most recognised certifications in the offensive security industry.

image
image
image
image
image

From our Blog

Commvault Edge (CVE-2017-3195)

A stack based buffer overflow in the Commvault Edge Communication Service (cvd) allows remote attackers to execute arbitrary code...

Read Story

Exploit Exercises - Overview on ROP

This level deals with some basic obfuscation / math stuff, non-executable memory and return into libc / .text / return orientated programming (ROP)...

Read Story

A Guide from CVE to PoC – CVE-2015-6946

Multiple stack-based buffer overflows in the Reprise License Manager service in Borland AccuRev allow remote attackers to execute arbitrary code...

Read Story
image
image
image
image
image
image
image
image
image
image
image

Keep up to date

Sign up now to our mailing list and receive the latest from our blog.