Pricing

Transparent pentest pricing, scoped by the product you need tested

Skip the black-box quote process. Answer three technical questions and get a practical baseline range for your application security pentest.

Scoped by application type, access complexity, and technical surface area.

Size your pentest in under 60 seconds

Tell us what needs to be tested. We map your product to a clear T-shirt size and show a baseline price range before any sales conversation.

Use rough numbers. You do not need a perfect inventory to get a useful estimate.

Choose the option that best matches the product surface our team would assess.

If you are unsure, pick the closest match. We will confirm the final scope during the technical sync.

Count roles with different permissions, workflows, or access levels. Testing role boundaries is one of the biggest drivers of effort.

Include roles that matter for security testing, not job titles from your org chart.

Use whichever number is easier: user-facing screens, major workflows, or API endpoints. A rough estimate is enough.

Do not worry about being exact. The estimate is designed to work with imperfect inputs.

How pricing works

  1. 1 Most quote models use company size, cloud spend, or user count. We scope by testing effort.
  2. 2 Application type, role complexity, and product surface produce a baseline T-shirt size.
  3. 3 Mixed or in-between inputs produce a range instead of a dead-end error.
  4. 4 A 10-minute technical sync locks the exact fixed price before work starts.

No repeated discovery. Your calculator inputs travel with the request so the next conversation starts from the estimate.

Transparent T-shirt-sized pricing

Baseline ranges based on technical testing effort. We lock the exact fixed price after a short technical sync.

Small

  • Single web app or focused API
  • 1-2 security-relevant roles
  • Less than 25 pages or endpoints
3-5 business days Focused product surfaces

Medium

  • Web app, API, or web plus mobile
  • 3-4 distinct user roles
  • 25-100 pages or endpoints
5-7 business days Typical SaaS products

Large

  • Multiple surfaces or mature app
  • 5-7 roles or richer authorization
  • 100-250 pages or endpoints
7-10 business days Mature product teams

Custom

  • Complex ecosystem or multiple apps
  • 8+ roles or custom permissions
  • 250+ pages, endpoints, or hard-to-count surface
10-14 business days Broad ecosystems

Enterprise

Custom scope for complex requirements, multiple products, compliance needs, or ongoing testing arrangements.

Start a conversation

The calculator gives you a baseline range. The exact fixed price is confirmed during a 10-minute technical sync.

How buying works without repeating yourself

1
Estimate your range
Answer three technical questions about product surface, roles, and endpoints.
2
Share the saved scope
Your calculator inputs are passed to our team so we start from the estimate.
3
Lock the fixed price
A 10-minute technical sync confirms the final scope and price.
4
Approve internally
Use the estimate summary for budget approval, procurement, or technical review.

Common questions

Why T-shirt sizing instead of hourly rates?

Technical testing effort is driven by product surface, authorization complexity, and workflow depth. T-shirt sizing gives you a useful planning range before a sales conversation, then we lock the exact fixed price after a short technical sync.

What if we're between sizes?

The calculator returns a range instead of forcing a single number. During the technical sync, we confirm what is in scope, group related endpoints or workflows, and give you the fixed price in writing before work begins.

Do you offer retests after we fix issues?

Yes. One re-test is included within 30 days of report delivery. This gives you documented confirmation that fixes hold without adding a second commercial decision right after remediation.

What deliverables are included?

Every assessment includes a comprehensive vulnerability report with proof-of-concept evidence, an executive summary for leadership, technical remediation guidance with code examples, and a follow-up Q&A session to ensure your team understands the findings.

Can we use the report for compliance?

Yes. Our reports are designed to satisfy most compliance requirements — SOC 2, ISO 27001, PCI DSS. We focus on real security, not checkbox exercises, but the documentation is thorough enough for auditor review.

What payment terms do you offer?

We invoice 50% at project start and 50% on delivery of the final report. For enterprise engagements, we can accommodate NET-30 or other arrangements. No payment is required until scope is confirmed and approved.

When you are ready

Ready to lock the scope?We will start from your estimate.

Share your calculator inputs and we will confirm the exact fixed price in a short technical sync. No duplicate discovery call required.

Start a conversation

or view a sample report first

No sales pressure
Fixed pricing confirmed upfront
You decide the pace