Pricing
Transparent pentest pricing, scoped by the product you need tested
Skip the black-box quote process. Answer three technical questions and get a practical baseline range for your application security pentest.
Scoped by application type, access complexity, and technical surface area.
Size your pentest in under 60 seconds
Tell us what needs to be tested. We map your product to a clear T-shirt size and show a baseline price range before any sales conversation.
Use rough numbers. You do not need a perfect inventory to get a useful estimate.
How pricing works
- 1 Most quote models use company size, cloud spend, or user count. We scope by testing effort.
- 2 Application type, role complexity, and product surface produce a baseline T-shirt size.
- 3 Mixed or in-between inputs produce a range instead of a dead-end error.
- 4 A 10-minute technical sync locks the exact fixed price before work starts.
No repeated discovery. Your calculator inputs travel with the request so the next conversation starts from the estimate.
Transparent T-shirt-sized pricing
Baseline ranges based on technical testing effort. We lock the exact fixed price after a short technical sync.
Small
$5,000-$7,500- • Single web app or focused API
- • 1-2 security-relevant roles
- • Less than 25 pages or endpoints
Medium
$7,500-$12,500- • Web app, API, or web plus mobile
- • 3-4 distinct user roles
- • 25-100 pages or endpoints
Large
$12,500-$20,000- • Multiple surfaces or mature app
- • 5-7 roles or richer authorization
- • 100-250 pages or endpoints
Custom
From $20,000- • Complex ecosystem or multiple apps
- • 8+ roles or custom permissions
- • 250+ pages, endpoints, or hard-to-count surface
Enterprise
Custom scope for complex requirements, multiple products, compliance needs, or ongoing testing arrangements.
The calculator gives you a baseline range. The exact fixed price is confirmed during a 10-minute technical sync.
How buying works without repeating yourself
Explore pricing and buying
Related pricing, scoping, and report resources
Move from a rough estimate into scope definition, vendor evaluation, report expectations, and internal approval.
Your First Penetration Test
A practical buyer guide to scope, safety, communication, and what to expect before a first pentest.
Pentest RFP Template
A reusable template for evaluating vendors, clarifying scope, and making internal procurement easier.
VAPT Reports, Pentest Attestations & Deliverables
See what Appsecco delivers after testing, including scope notes, evidence, remediation guidance, and attestations.
Sample Security Report
Review a redacted report preview to understand structure, evidence standards, and what internal stakeholders will see.
Apps & API Security Testing
Manual testing for web apps, APIs, authorization, business logic, and abuse paths.
Cloud, Kubernetes & IAM Security Testing
Scoped testing for IAM abuse, cloud attack paths, storage exposure, and Kubernetes security boundaries.
Common questions
Why T-shirt sizing instead of hourly rates?
Technical testing effort is driven by product surface, authorization complexity, and workflow depth. T-shirt sizing gives you a useful planning range before a sales conversation, then we lock the exact fixed price after a short technical sync.
What if we're between sizes?
The calculator returns a range instead of forcing a single number. During the technical sync, we confirm what is in scope, group related endpoints or workflows, and give you the fixed price in writing before work begins.
Do you offer retests after we fix issues?
Yes. One re-test is included within 30 days of report delivery. This gives you documented confirmation that fixes hold without adding a second commercial decision right after remediation.
What deliverables are included?
Every assessment includes a comprehensive vulnerability report with proof-of-concept evidence, an executive summary for leadership, technical remediation guidance with code examples, and a follow-up Q&A session to ensure your team understands the findings.
Can we use the report for compliance?
Yes. Our reports are designed to satisfy most compliance requirements — SOC 2, ISO 27001, PCI DSS. We focus on real security, not checkbox exercises, but the documentation is thorough enough for auditor review.
What payment terms do you offer?
We invoice 50% at project start and 50% on delivery of the final report. For enterprise engagements, we can accommodate NET-30 or other arrangements. No payment is required until scope is confirmed and approved.
When you are ready
Ready to lock the scope?
We will start from your estimate.
Share your calculator inputs and we will confirm the exact fixed price in a short technical sync. No duplicate discovery call required.
Start a conversationor view a sample report first