Cyber Security Services
Our pricing is based on client’s requirements and complexity of the task. For simple, routine services not requiring additional research and tooling, pricing can be based either on the daily rate or can include per project rate depending on requirements of clients.
Custom pricing structure and quoting system is applied to all jobs and projects that we take on. The more complex the task is the more expensive it will be for our clients. We have listed below a couple of examples showing typical pricing for specific tasks. These are only listed for illustrative purposes, and to allow clients and customers to better understand why there are differences in pricing.
We are positioned in the mid-market pricing tier, rather than trying to be the most competitive on price, we provide additional value added services often as a part of the service or as free add-ons for our clients. As our team uses extensive research to find vulnerabilities, develop new and innovative attack vectors, and understand the importance of availability of services while deploying weaponised payloads, we reflect the expertise in the pricing.
At lower price end, consumers and businesses will find offerings that either do not meet basic quality standards or are not provided by experts in the field. We value the quality over quantity and that approach is built into our pricing model.
Sample of charges only for illustrative purposes.
The table lists typical pricing per service taking into account the level of complexity and expertise required to provide the high quality output, and deliverables to clients. The actual prices quoted to customers may vary as pricing is based on complexity of tasks and the service required by clients. The table does not include all services that we offer.
Service type | Complexity level (higher complexity means more advanced skills are required) | Client type | Cost per day |
---|---|---|---|
Standard security test (penetration testing) | Medium | Business | £2000 |
Custom security test or objective led Red Teaming test | High | Business | £5000 |
Consultancy fee | Medium | Business | £3000 |
Consultancy fee | Medium | Consumer | £1000 |
Consultancy fee | Medium | Non-for-profit | free |
0 day exploit | High/Medium/Low | Business | unlimited pricing threshold |
Exploit development for known CVE without public exploit code e.g. for Red Teams | High/Medium/Low | Business | unlimited pricing threshold |
Targeted research any scope | High/Medium/Low | Business | unlimited pricing threshold |
Cyber Security challenge for charitable causes | High/Medium/Low | Any target from “magnificent seven” organisations who agree to participate | unlimited pricing threshold – proceeds will be donated to selected charities |
Research into securing keyless entry cars against theft | High/Medium/Low | Business or Consumer | Name your price |
Research into securing drones, and UAVs | High/Medium/Low | Business or Consumer | Name your price |
Data security investigation | High/Medium/Low | Business or Consumer | £2000 |
Data privacy investigation | High/Medium/Low | Business or Consumer | £3000 |
Password audit | High/Medium/Low | Business | £2000 |
Security training for teams or Individuals | High/Medium/Low | Business or Consumer | £2000 – £20,000 |
Finding, fixing and retesting security vulnerabilities | High/Medium/Low | Business | £20,000 |
Reverse engineering | High/Medium/Low | Business | unlimited pricing threshold |
Configuration review | High/Medium/Low | Business | £2000 |