Penetration Testing
Vulnerability Assessment
Security Consulting
No Threat Missed
OWASP
Top 10 Methodology
Manual
Expert-led testing, not just scanners
0
Data retained after engagement close

What we do

Services

Focused web application security testing. We do two things exceptionally well — and we are transparent about what is included.

>_ test
Core service

Web Application Penetration Test

A structured, time-boxed manual assessment of your web application. We identify, exploit (where safe), and document vulnerabilities with real evidence — not just scanner output.

  • OWASP Top 10 full coverage
  • Authenticated & unauthenticated testing
  • Business logic & access control flaws
  • API & authentication testing
  • Executive + technical report with CVSS scores
  • One complimentary retest of critical/high findings
Core service

Vulnerability Assessment

A systematic review of your web application's attack surface. Ideal as a risk baseline, compliance precursor, or standalone engagement for organisations not yet ready for a full pentest.

  • Comprehensive surface enumeration
  • CVSS-scored findings with risk ratings
  • Prioritised remediation roadmap
  • Suitable for compliance baseline
  • Faster turnaround than full pentest
  • Can be scoped as pentest precursor
Advisory

Security Consulting

Independent security advisory for organisations building or reviewing their security posture. Scope, prioritise, and plan your security programme with guidance grounded in hands-on testing experience.

  • Security programme advisory
  • Pre-engagement scoping & planning
  • Remediation review & guidance
  • Third-party findings review
  • Compliance readiness advisory (MAS TRM, PDPA)
  • Engagement scoping for other providers

How we work

Our process

Transparent, structured engagements from first contact to final report.

01 ——
Scoping call

We discuss your environment, objectives, and constraints. You receive a tailored SOW with fixed scope and pricing.

02 ——
Agreement & deposit

Sign the MSA and SOW. A 50% deposit confirms your engagement date. Work begins only upon receipt.

03 ——
Testing

Manual testing conducted within agreed hours and scope. Your emergency contact is available throughout.

04 ——
Report & debrief

Draft report within 5 business days. Final report and 1-hour debrief session included in every engagement.

05 ——
Retest

One complimentary retest of critical and high findings within 60 days of final report delivery.

Why choose us

Why N.T.M.

An independent, focused consultancy — not a large firm with rotating junior staff.

// Expert-led manual testing

Every finding is manually verified, exploited where safe, and documented with real evidence — not a scanner report with false positives.

// Zero data retention

All client data is encrypted in transit and at rest. Evidence is securely wiped from our systems upon final report delivery.

// Fixed-scope, fixed-price

No surprise invoices. Scope is agreed upfront in a signed SOW. You know exactly what you are getting and what it costs.

// Clear, actionable reports

Every finding includes CVSS score, reproduction steps, real evidence, and a concrete remediation recommendation your team can act on immediately.

// Retest included

One complimentary retest of critical and high findings is included in every engagement. Fix it — we will verify it.

// Singapore-based

Local consultancy operating under Singapore law and the Cybersecurity Act. Aligned with MAS TRM and PDPA requirements.

Get in touch

Request an assessment

Tell us about your environment and we will get back to you within one business day.

Please enter your name.
Please enter your company name.
Please enter a valid email address.
Please select a service.
Please provide a brief description.
Please complete the captcha.
// Message received. We will be in touch within one business day.
Email
Response time
Within 1 business day
Engagements
Remote and on-site available
Singapore and regional clients welcome
Typical lead time
1–2 weeks from signed SOW
to engagement start
What to prepare
Target URL(s) or IP ranges
Preferred testing window
Any compliance requirements
Technical contact details