GrodRiket

Looking for professional pentesters?
Our team provides different types of pentesting services to identify vulnerabilities and bugs and provide professional penetration report, as hackers will no longer be able to take advantage of and exploit them.

Who are we?

GrodRiket is a team that consists of professional penetration testers and cyber security researchers. We perform various types of attacks on different operating systems and platforms. Our team members are located in several countries including Yemen, Sweden, Egypt and Turky.

logo

What We Do

Penetration Testing

Is a process of discovering possible vulnerabilities within a system, Network, application, website, etc.

RedTeam Operations

Red Teaming is a Full-scale black-box attack simulation designed to measure the BlueTeam effectiveness.

Security Training

we have highly qualified training staffs can offer to your organization employees all security training programs.

Are Your Critical Assets safe?

A lot of orginizations have been victims to random attacks from different parts of the world.FireEye, the most popular security company have been attacked exploiting some critical bugs, though alot of other cyber security related companies have got hacked as well. We can't say that our company is going to secure your orginization untill it's unhackable due to new technologies and improvments, however we will make sure that it gets alot harder to attack than ever.

about
about

Are you credible to your clients?

People care most about their privacy. To earn your clients trust your company should have a good reputation and most important, be secure. In case an application requires a client to provide some sensitive information about them, they should have the client's trust. If the application isn't secure or buggy and vulnerable, it would lead to the application losing users crediblity and reputation.

Our Services

Web Applications Penetration Testing

Allowing GrodRiket to protect the company's web application security will reduce the company's possibility of being hacked or exposed to vulnerabilities, because many secure data organizations are compromised due to lack of security awareness and poor software implementation, which may result in your data being exposed. Web applications, our experts will determine the most critical web application vulnerabilities in the world by comprehensively inspecting your company’s web applications, and help you understand, recreate and mitigate all detected vulnerabilities

Mobile Applications Penetration Testing

Ignoring the mobile application security measures in your business can lead to massive data violations that can result in significant financial losses and damage your company's reputation. Our security analysts will conduct security assessments of your applications and provide an independent assessment of the security level of your mobile applications, which also includes automated investigation and manual vulnerability investigation along with a systematic search for attack vectors that could successfully exploit the detected problems and solutions

Infrastructure Penetration Testing

GrodRiket helps create security processes, awareness and services. The process includes verification of existing security matters and execution of custom vulnerability analysis, validation of risk levels, providing a detailed report of this process which includes the detected vulnerabilities and description, exploitation, steps to reproduce, proof of concept and real world scenarios for each vulnerability and provides a detailed guide on troubleshooting and reducing risk, and improving security layers.

Source Code Review

The source code is the basis of any application, regardless of the application working well, it can still have serious security vulnerabilities. GrodRiket believes that finding and fixing software vulnerabilities is a step towards improving the security of your business. The output from the source code review is more critical than the black box / white box output because security issues can be overcome in other phases. Contrary to this phase, the probability is higher.

Security Consultancy Services

The security consulting service is a supplement to the service that aims to measure and improve the level of network security based on the methodological methods of the system, network and security requirements of institutions and organizations. Provide security advisory services through expert security consultants appointed according to the specific needs of the organization.

Malware Analysis

GrodRiket malware researchers can perform standard analysis of malware in two ways, whether manually or automatically, to thoroughly understand the behavior of the malware, just in case you have been attacked and want to fully recover from the attack, or you want to Understand what your concurrency can achieve and how to avoid it. We then provide you with a detailed report on this process and provide you with a detailed roadmap on how to prevent infection before future attacks in your area.

Team Members

Person

Mohammed F. Al-Barbari

PHP Java Android Penetration Tester Web Security Code Analyist Red Teamer
Person

Hamzeh R. Kanngo

C/C++ C# Cryptography Reverse Engineering Code Analyist OpenGl Game dev
Person

Mohammed Al-Zayyat

Python PHP BASH Penetration Tester Networking Red Teamer
Person

Zeyad Abd El-Azim

Python Ruby Networking Exploits Developer Penetration Tester

Acknowledgements