Australia’s Trusted Experts in Offensive Security
Identify weaknesses, cut exposures, and build trust. Bespoke Offensive Security, tailored for your business.
What is Offensive Security?
Offensive Security (OffSec) finds your exposures, validates the effectiveness of your existing security controls, and provides clear pathways to mitigating or remediating these findings. These can include activities like penetration testing, red teaming, vulnerability scanning, attack surface management, and bug bounty programs.
Each of these services simulates an adversary to a different degree. Vulnerability scanners operate quickly and identify common misconfigurations and easily identifiable vulnerabilities. Penetration testing is performed by human actors who are creative and curious. They often find novel issues with serious impact to businesses, but stay within a set scope. Red team exercises are goal-oriented and seek to test organisational weaknesses. These could include gaps in your processes, technology footprint, or employee susceptibility.
Why does Offensive Security Matter?
Offensive security helps your executives and directors feel that they are protected from realistic threats. Without regular offensive security activities being performed, gaps in your protection are less likely to be identified, providing opportunity and a window for potential attackers.
Some Offensive Security services are necessary to adhere to compliance requirements for participating in different regions or industries. For example, enterprise procurement may ask questions about how frequently vulnerability scanning is performed, or what the SLA’s are for remediating these issues. ISO27001 and SOC2 explicitly require annual penetration testing to be performed.
Lastly, the potential commercial or geopolitical value your organisation provides will make it a target. Understanding and emulating your threat actors will give your organisation the best chance to detect and respond to these increasingly likely scenarios.
Who does Offensive Security Concern?
Offensive security is relevant to a broad range of stakeholders. Technical staff who are build or operate your IT and software systems will be able to fix vulnerabilities and learn how to eradicate future instances of them. Management will learn about the efficacy of their security investment and whether to seek or reallocate resources to compensate. Executives and directors can enable sales and marketing functions, establish trust with customers, proactively mitigate risk, and be prepared for legal, regulatory, or compliance objectives.
Offensive Security Options: Choosing the right path
ASPECT
Vulnerability Scanning
Penetration Testing
Red Teaming
Primary Objective
Identify weaknesses and technology or implementation mistakes quickly
Validate control efficacy and identify novel and business-relevant issues for scoped assets
Emulate a threat actor and test an organisations ability to identify and respond to a targeted campaign
Key Activities
Scanning networks, infrastructure, and websites
Triaging findings based on relevance and impact
Helping teams prioritise and address issues
Understand test objectives and assets included
Walkthrough of assets to effectively scope and identify threat vectors
Use automation to enumerate assets and identify low-hanging fruit
Manually interrogate and identify unique issues
Report on business impact, control efficacy, and both mitigation and remediation pathways
Understand overall red-team objectives and identified scope
Identify appropriate adversary to emulate and research tactics, techniques, and procedures
Build adversarial infrastructure and collect intelligence around the target organisation
Define a plan and execute upon it to achieve the objective
Report on mission success or failure, control gaps or weaknesses, and selected pathways for remediation
Threat Focus
Opportunistic actors, unskilled attackers, internet scanners, ransomware crews
Dependent on industry and scale. Assumed competence, and targeted capability over opportunism
Dependent on industry and scale. Assumed competence, and targeted capability over opportunism
Expected Costs
Product Licensing, typically dependent on asset count.
Open-source tools available for free, but require headcount to integrate and operate.
Managed triage service between $4k-$8k a month.
Dependent on scope, typically $8k-$16k for a small scope, $20k-$30k for a mid-scale scope, and $40k-$60k for a large scope.
Small scopes are typical for SAAS products and startups, or websites.
Mid scopes where infrastructure or mobile apps are involved as well as a moderate scale app
Larger scopes for hardware, esoteric technology, or large attack surfaces
–
Expected Timeframes
Scans can run on a set cadence, typically daily and progressing to hourly or continuously as products mature.
Tests can take 1-2 weeks to schedule and organise walkthroughs, environments, credentials, etc before the engagement begins.
Engagements are dependent on scope, but typically 10 business days
–
Application Security v Traditional Measure
Primary Objective
Identify weaknesses and technology or implementation mistakes quickly
PENETRATION TESTING
Validate control efficacy and identify novel and business-relevant issues for scoped assets
RED TEAMING
Emulate a threat actor and test an organisations ability to identify and respond to a targeted campaign
Key Activities
Scanning networks, infrastructure, and websites
Triaging findings based on relevance and impact
Helping teams prioritise and address issues
PENETRATION TESTING
Understand test objectives and assets included
Walkthrough of assets to effectively scope and identify threat vectors
Use automation to enumerate assets and identify low-hanging fruit
Manually interrogate and identify unique issues
Report on business impact, control efficacy, and both mitigation and remediation pathways
RED TEAMING
Understand overall red-team objectives and identified scope
Identify appropriate adversary to emulate and research tactics, techniques, and procedures
Build adversarial infrastructure and collect intelligence around the target organisation
Define a plan and execute upon it to achieve the objective
Report on mission success or failure, control gaps or weaknesses, and selected pathways for remediation
Threat Focus
Opportunistic actors, unskilled attackers, internet scanners, ransomware crews
PENETRATION TESTING
Dependent on industry and scale. Assumed competence, and targeted capability over opportunism
RED TEAMING
Dependent on industry and scale. Assumed competence, and targeted capability over opportunism
Expected Costs
VULNERABILITY SCANNING
Product Licensing, typically dependent on asset count.
Open-source tools available for free, but require headcount to integrate and operate.
Managed triage service between $4k-$8k a month.
PENETRATION TESTING
Dependent on scope, typically $8k-$16k for a small scope, $20k-$30k for a mid-scale scope, and $40k-$60k for a large scope.
Small scopes are typical for SAAS products and startups, or websites.
Mid scopes where infrastructure or mobile apps are involved as well as a moderate scale app
Larger scopes for hardware, esoteric technology, or large attack surfaces
RED TEAMING
–
Expected Timeframes
VULNERABILITY SCANNING
Scans can run on a set cadence, typically daily and progressing to hourly or continuously as products mature.
PENETRATION TESTING
Tests can take 1-2 weeks to schedule and organise walkthroughs, environments, credentials, etc before the engagement begins.
Engagements are dependent on scope, but typically 10 business days
RED TEAMING
–
Problems We Solve

Validating the efficacy of security controls that you have invested in

Helping businesses demonstrate trust to clients with independent assurance

Identifying novel or industry-specific issues
List of Our Offensive Services
Web Application Penetration Testing
Secure your SaaS business and websites. Our focus is on thorough and comprehensive assessments by experts, not blindly following a checklist. We have proven experience with helping SaaS product businesses and other scale-up tech businesses identify critical issues and mitigate or remediate vulnerabilities in their web products.
API Penetration Testing
Move past generic exploit payloads. We assess security relevance through analysing OpenAPI documents, thoroughly test schema constraints, omit and fuzz parameters, and monitor for access control gaps, information disclosures, and how downstream systems or side-effects present security risk.
AI Penetration Testing
We force humans into the loop. Our principal consultant wrote the BugCrowd methodology for testing AI applications (available here). Beyond prompt injection, we test for biases, abusing agent context, forced burning of credits, and making attacks reproducible even when dealing with non-deterministic systems.
Mobile Application Penetration Testing
Whether PWA or native, we hack mobile applications. Initial threat modelling gives us the context to seek information exposures and breaking programmer assumptions around the app-server architecture. Using either jailbroken devices or device emulation, we find vulnerabilities that scans definitely miss.
Network Penetration Testing
We don’t use GUI’s for tracking IP’s here. Our assessments are comprehensive. Broad network scanning is disruptive and noisy and introduces endless overhead for infrastructure teams. We search for misconfigurations and weaknesses in a targeted and controlled manner, making remediation easy, and testing non-disruptive..
AI-Lead Continuous Penetration Testing
Powered by Xbow, the Industry-Leading AI Penetration Testing Platform, we enable businesses to schedule on-demand, light-touch penetration testing. Our value is in the configuration and management of continuous testing, and contextualising / complementing with manual assurance where needed.
Vulnerability Scanning
Vulnerability scanning seeks to identify low-hanging fruit and help businesses address simple misconfigurations or easily identifiable gaps in your organisation. Scanning is quick, efficient, and cost-effective and a good first-step before engaging for penetration testing services.
Red Teaming
For the brave birds. Our experts attempt to achieve a predefined objective through broad methods and techniques. Some objectives include physical access to a location, gaining control of IT administration, accessing real customer data, or exfiltrating sensitive information. We emulate the tools, tactics, and procedures of a known threat actor group. Red teaming can be overwhelming, so we work with clients to select appropriate objectives, times, and boundaries.
Use Cases & Business Impact
Complance and
Regulatory Mandates
Many industries require regular penetration testing to verify that security is performed and existing controls are effective. ISO27001 and SOC2 Type 2 are the most common compliance drivers for testing, but industry-specific regulation like PCIDSS, ISM, and CPS234 can require testing. Unsure about your cyber compliance mandates? Consider our Advisory or Cyber Compliance services.
Enterprise
Enterprises and government agencies are frequently targeted by bad actors. These actors often target supplier companies as an initial beach-head into a larger firm. Due to this risk, they usually require penetration testing as part of the procurement process. Enterprises value quality and independence, and choosing Galah Cyber demonstrates your commitment.
Peace
of Mind
With cybersecurity incidents and fraud being frequent news topics, many directors worry about the security of their businesses. While cyber advisory helps select appropriate controls, offensive security can validate their effectiveness and identify new weaknesses and undiscovered flaws.
Demonstrating
Trust
Consumers are increasingly wary of privacy and security concerns, with many opting to pick vendors with higher trust scores. While price or value are always the primary consideration of customers, security can be a significant differentiator depending on your target market.
Our Engagement Model
1. Preparation
We define a clear, achievable scope and ensure all commercial, technical, and access requirements are in place before testing begins.
- Scope aligned to objectives, timeframes, and budget
- Testing window, start date, and kick-off confirmed
- Access, credentials, and system readiness validated
- WAFs and blocking controls managed as required
2. Execution
Our testers focus on real attack paths, prioritising depth and impact over shallow, scanner-driven coverage
- Threat modelling and attack path mapping
- Manual testing led by Senior and Principal testers
- Continuous activity logging and agreed progress updates
- Immediate escalation of critical findings
3. Reporting
We deliver concise, business-relevant reports that balance executive clarity with technical depth for remediation teams.
- Clear business impact for executives
- Reproducible technical detail for engineers
- Short-term mitigation and long-term remediation options
- Context-aware risk ratings using Galah’s matrix
4. QA
Every report passes a rigorous four-stage quality process to ensure accuracy, consistency, and clarity.
- Style linting against the Galah Cyber guide
- Independent technical review by uninvolved principals
- Editorial review for precision and readability
- Director sign-off on final deliverables
5. Delivery
We validate fixes, provide assurance documentation, and securely close the engagement.
- Free retesting to confirm remediation
- Letter of Attestation without technical detail
- Secure removal of client data
- Verification that all access is revoked
6. Program Design
We design a tailored application security program based on discovery insights, environment, and delivery objectives.
- Selection of relevant security services
- Integration across development and release stages
- Toolchain review and optimisation
- Metrics and success criteria definition
Why Galah
At Galah Cyber, we specialise in tailored, expert-lead, and outcome-oriented offensive security. Our penetration testers are some of Australia’s most talented and recognised hackers with careers spanning decades of offensive security engagements.
Having delivered over 1300 penetration testing and red team engagements in his time at DXC and BugCrowd, Miles Turton, Director of Offensive Security, knows exactly how to make clients achieve the best possible outcome. Miles is your goto for ensuring your scope is accurate, you pay for what is necessary, managing change and being flexible, and maintaining professionalism and excellence throughout the entire engagement window and subsequently afterwards.
Ryan Broadfoot, otherwise known as Norsey, was employee #1 at TheMissingLink and established international methodologies for testing applications. Ryan has held OSCP, OSWE, OSED, Corelan, CREST, and broad security certifications like CISSP and CISM. Ryan is well known in the international community for his open-source contributions and has been instrumental in creating innovative solutions to help clients get better outcomes from their engagements.
Together they lead the Offensive Security function. Miles and Ryan care deeply about the client experience, refusing to put their badge on low quality work. The hires we work with are vetted, and even experienced and qualified testers often fail to clear the bar to work at Galah Cyber. That’s how much we care about doing the right thing.
With Galah, you’re not buying a test; you have a long-term partner who is committed to your success.
FAQs
What is a penetration test?
A penetration test (sometimes shortened to pentest or PT) is an authorised engagement to proactively find vulnerabilities in assets you own. These assets are typically computer systems, but tests can be broad and cover business processes, humans, and physical infrastructure as much as servers, networks, and software.
Do I need a penetration test?
Penetration tests are typically required as a compliance requirement for many industries. They can give you peace of mind, validate your controls are effective, and signal trust to potential prospects. In low-risk situations, or where security is not relevant to commercial outcomes or compliance requirements, other forms of security can be more cost-effective. At Galah, we are honest and will tell you whether a test is necessary, or whether other security controls can provide better value for you and your stakeholders.
Are vulnerability scans a form of penetration testing?
A vulnerability scan is performed on a regular cadence by a computer system and searches for known weaknesses. Vulnerability scans are good at discovering basic vulnerabilities, but lack business impact and context as well as depth. Vulnerability scans are typically not accepted by buyers as a substitute for a penetration test. That said, they are valuable for continuously identifying simpler issues and making tests more comprehensive. At Galah, we will help you understand what form of offensive security is better suited for your organisation.
Are red team engagements a form of penetration testing?
A red team engagement seeks to achieve an objective through activities that could include penetration testing. They typically simulate known threat actor groups and emulate their tactics, techniques, and procedures. Red team engagements are stealthy, long, and surgical and better for validating organisational capabilities. Penetration tests seek to identify relevant and impactful issues in a set time period and are better suited for finding vulnerabilities in relevant assets. At Galah, we will help you understand what form of offensive security is better for your organisation.
Is penetration testing only relevant for big companies?
Penetration testing is relevant for organisations of all scales. Larger organisations typically have the most compliance and regulatory requirements, or assets that need the most protection, and so they’ll engage suppliers to do a variety of offensive security activities. But smaller businesses also need to demonstrate trust to customers, verify the efficacy of their existing security protections, comply with regulations, and build trust in potential prospects. At Galah, while we have large enterprise clients engaging us for testing, the majority of our projects are small businesses trying to achieve compliance, or software businesses looking to grow.
I don’t have anything worth hacking
While you may not believe you are a target or have anything of value, hackers are creative and opportunistic. They will find methods to extract value from you and your business. Reputational damage, extortion, facilitation of money laundering, planting of illegal content, ransom, corporate or national espionage, cash/data/IP theft, information exposure, and simple disruption or sabotage are all objectives that opportunistic hackers may want to inflict on you. No business is immune to hackers. At Galah, we are happy to explain
Can I do my own vulnerability scanning and penetration testing?
We encourage clients to do their own research, use vulnerability scanners, and otherwise do what they can to uplift their security posture. But like with school, you cannot mark your own homework. Regulators and prospects will want to see independent assessment of your systems and your staff are unlikely to have the same level of qualification, skill, and expertise as pure security consultants. Get independent advice, get Galah.
How long does a penetration test take?
Our typical engagement length is between 7-10 business days. We have had engagements as short as 3 business days, and as long as 60 business days. Other firms provide ‘T Shirt sized’ penetration tests. We don’t as we believe it universally results in a <bad client outcome>. Either poor test-coverage and quality from an underscoped engagement, or price-gouging from an overscoped engagement. We tailor our engagements to your objectives and constraints to consistently give quality assessments at fair prices.
How much does a penetration test cost?
Our engagements are tailored, and so are our costs. To provide rough budgetary guidance, smaller engagements range from $7000-$12000, mid-size engagements $18000-$24000, and large engagements can exceed $30000. At Galah, we will work with you to get the best outcome for your budget.
What is involved in a penetration test?
Check out our engagement model above! We’re happy to also provide a sample report, meet with you online, or introduce you to existing clients if you’re unsure of the engagement process and need further guidance.
Can you give me a price now / why don’t you have prices on the website?
At Galah Cyber, we tailor every engagement. Each business has unique challenges, unique assets, and unique constraints even in the same industry. We want to give you pricing that is fair and fit for your purposes. Not overcharge you or deliver inadequate quality services.
Why are you more expensive / why do different providers have such different quotes
We are a premium provider and only employ senior or principal consultants. Our penetration testers are required to hold industry qualifications, have deep expertise, at least 5 years of experience, and take client experience seriously. More expensive firms have significant overheads or apply a brand markup. Cheaper firms are staffed by inexperienced graduates, rely on unsustainable overwork cultures, or rely heavily on automation such as scanners and AI. We believe our pricing is fair as we have low overheads, treat our staff ethically, don’t cut corners, and only work with exceptional humans.
Podcasts
On Secured, Cole speaks with leading cybersecurity experts on the topics shaping OffSec today. Featured episodes include Brendan Dolan-Gavitt on AI-driven continuous testing, Shubham Shah on elite bug bounty performance, and Matt Jones on the exploit development market.
Listen on:
Latest episodes:
Insights
Book a Free Consultation
At Galah Cyber, we don’t just scan for vulnerabilities. We help you embed security into the way you build, ship, and scale software.
Whether you're leading a fast-moving dev team, securing complex APIs, or aligning to CPS 234 or ISO 27001, our expert-led, outcome-driven approach ensures your applications are resilient, compliant, and ready for whatever comes next.
Let’s protect your code, your customers, and your credibility, together.






