Search iconBook meeting

Secure Your Web Applications Today!

Start with a reliable partner who understands your security needs.

Book meeting

Why Choose pentests.dk?

  • Tailored Testing Every organization is unique, and so are your security needs. The pentest is customized to protect critical systems.
  • Expertise With over 25 years of experience in IT security and an ongoing OSCP certification, extensive knowledge is applied to every project.
  • Proven Methodology The pentest follows the OWASP Web Security Testing Guide (WSTG) as the primary framework, with flexibility to apply other methods as needed.

Pricing

  • Free

    Vulnerability Scanning

    Scanning of public networks.

    Free

    • Scanning of all TCP/UDP ports.
    • Service identification.
    • Light testing of web applications.
    • Testing of default logins.
    • Testing of TLS and HSTS.
    • Testing of DNSSEC, SPF, DMARC.
    • Summary report.
    • Max 20 IPs.

    Read more

  • Monthly

    Vulnerability Scanning+

    Scanning of public networks and software.

    dkk 1,500 per month

    • Includes Free features, plus:
    • Daily software vulnerability scans.
    • Daily emails for high-risk findings.
    • Weekly network scanning.
    • Weekly emails on network changes.
    • Monthly email report.
    • Max 20 IPs.

    Book meeting

  • Web Pentest

    Web Application Penetration Test

    from dkk 50,000

    • Thorough testing of web applications.
    • 120 endpoints.
    • OWASP Web Security Testing Guide.
    • Focus on business-critical systems.
    • Report with prioritized risks and remediation.
    • Security improvement recommendations.
    • Compliance with GDPR, NIS2, and ISO requirements.
    • Meeting to review the report.
    • Retesting of resolved vulnerabilities.

    Book meeting

What Our Customers Say

  • Per-Henrik Nielsen image

    Per-Henrik Nielsen

    CEO at TimeLog

    We have gained significant value from our collaboration with Pentests.dk. Their professional expertise and practical approach have provided us with better insight into our security posture and helped us meet requirements from both ISAE 3000 and our clients.

  • Dorte Holm Philip image

    Dorte Holm Philip

    Head of Development and Operation at IST Denmark Aps

    We are very satisfied with our collaboration with pentests.dk. We were especially impressed by the level of detail in the testing and the effort put into understanding our system, ensuring that no corners were overlooked.

  • Søren Øxenhave image

    Søren Øxenhave

    CTO at Zylinc

    It’s both fascinating and alarming to see what Christian discovers.

Three Simple Steps to a Pentest

  1. Scope and Planning Requirements, applications, and test scope are discussed in detail.
  2. Proposal and Contract A proposal and contract are presented, specifying timelines, test scope, and contact details.
  3. Execution and Delivery Tests are conducted as agreed, a detailed report is delivered, a review meeting is held, and retesting of resolved vulnerabilities is offered.

  • Enhanced Security

    Protect applications against threats and improve overall security posture.

  • Certification-Ready

    Meet GDPR, NIS2, ISAE, and ISO requirements with expert assistance.

  • Business Value

    Improved security can be a competitive advantage in sales and partnerships.

  • Custom Solutions

    Flexible pricing and scope ensure services align with business goals and budgets.