Welcome to Shelltrail

We are an experienced pentesting company based in Sweden with a vast range of expertise in the field of cybersecurity. Our professional and highly skilled team is dedicated to providing top-tier security solutions to protect your business from cyber threats.

Get your free proposal today

It shouldn’t matter if it’s your first time ordering a pentest or if you have previous experience - getting a proposal suitable for your company should be easy.

Use our contact form to get in touch with us and we will set up a meeting to discuss what type of assessment may suit your company in specific.

Cyber security services

We offer a wide selection of security assessments

*

Kubernetes security assessments aims to evaluate the current state of an organization’s Kuberentes environment, identifying areas where improvements can be made to enhance overall security posture and proactively find vulnerabilities that may compromise the system’s integrity, availability or confidentiality.

A cloud security assessment involves evaluating the configuration, access controls, data protection measures, and overall security of an organization’s cloud-based resources to ensure the safe and compliant use of cloud services.

An external infrastructure security assessment involves analyzing an organization’s network, systems, and online presence from an external perspective to identify and mitigate vulnerabilities that could be exploited by external attackers.

An internal infrastructure security assessment encompasses evaluating an organization’s network, systems, and resources from within to detect potential vulnerabilities and ensure the protection of sensitive data against insider threats and unauthorized access.

A Red Team security engagement involves simulating real-world cyberattacks on an organization’s systems and infrastructure to identify vulnerabilities, test defensive capabilities, and improve overall security posture.

Web application security assessment involves evaluating and identifying vulnerabilities and weaknesses within a web application to ensure its protection against unauthorized access, data breaches, and cyber threats.

About us

Meet the employees at shelltrail

IT Security Consultant

IT Security Consultant

Research

Research done by our employees

Follow along a journey to find vulnerabilities in the RPC functionaliy of ManageEngine ADAudit

Part 2 of the ManageEngine ADAudit research focuses on reverse engineering the ADAudit Agent to provide proper input data for the previously built custom RPC client

Part 3 of the ManageEngine ADAudit research focuses on how AES encrpytion was implemented in the ADAudit Agent, and how it was bypassed

Have you ever had issues with CSRF tokens during a web assessment? Or drop data from burp to commandline for parsing? This is the guide to leverage the power of the Reshaper plugin developed by @ddwightx

New research into an (legacy) extension for Microsoft Endpoint Configuration Manager/SCCM/ConfigMgr reveal new attack paths for Active Directory domain compromise or elevation of privileges.

Blog

Informational blogs

Contact

Connect with us

 I agree to Shelltrail's privacy policy.