Welcome to Shelltrail

We are an experienced pentesting company based in Sweden with a vast range of expertise in the field of cybersecurity. Our professional and highly skilled team is dedicated to providing top-tier security solutions to protect your business from cyber threats.

Get your free proposal today

It shouldn’t matter if it’s your first time ordering a pentest or if you have previous experience - getting a proposal suitable for your company should be easy.

Use our contact form to get in touch with us and we will set up a meeting to discuss what type of assessment may suit your company in specific.

Cyber security services

We offer a wide selection of security assessments

*

A cloud security assessment involves evaluating the configuration, access controls, data protection measures, and overall security of an organization’s cloud-based resources to ensure the safe and compliant use of cloud services.

An external infrastructure security assessment involves analyzing an organization’s network, systems, and online presence from an external perspective to identify and mitigate vulnerabilities that could be exploited by external attackers.

An internal infrastructure security assessment encompasses evaluating an organization’s network, systems, and resources from within to detect potential vulnerabilities and ensure the protection of sensitive data against insider threats and unauthorized access.

A Red Team security engagement involves simulating real-world cyberattacks on an organization’s systems and infrastructure to identify vulnerabilities, test defensive capabilities, and improve overall security posture.

Web application security assessment involves evaluating and identifying vulnerabilities and weaknesses within a web application to ensure its protection against unauthorized access, data breaches, and cyber threats.

About us

Meet the employees at shelltrail

IT Security Consultant

IT Security Consultant

Research

Research done by our employees

New research into an (legacy) extension for Microsoft Endpoint Configuration Manager/SCCM/ConfigMgr reveal new attack paths for Active Directory domain compromise or elevation of privileges.

cmloot.py introduces new angles to exploit Configuration Manager, which has become the new black in internal security assessments of Active Directory environments.

Blog

Informational blogs

Contact

Connect with us