SEKurity GmbH

Offensive Security · Germany · BSI-methodology

We think likethe attackers.So that you aren't the next target.

SEKurity delivers real, repeatable attack scenarios — from a single application to a full enterprise simulation. No checklist test, no boilerplate report. Outcomes that measurably change your resilience.

live engagement logLIVE

[+] 03:41 lateral movement — tier-1 admin hash obtained

[+] 03:58 SAP RFC callback — SYSTEM session landed

[!] 04:12 detection gap: 41 min to first analyst ack

[~] 04:13 handing over to blue team for debrief

20+
years combined offensive security experience in our core team
Senior-led
every engagement — no junior flying solo
Reproducible
PoC with every finding — not just a CVSS score

01 — Services

Four disciplines. One goal: knowing your attack surface honestly.

Adversary Simulation

Red team engagements, DORA-aligned TLPT, targeted information gathering. We reproduce the behaviour of real threat actors under your actual defensive conditions.

Plan a simulation

Penetration Testing

Web, mobile, perimeter, internal infrastructure, Active Directory, SAP. Manual, auditable testing — no scanner dumps, no false-positive graveyards.

Request a test

Security Awareness

Phishing campaigns with realistic pretexts and measurable KPIs. Training that empowers users instead of scolding them.

Design a campaign

Compliance

NIS-2 and DORA aren't checkbox exercises. We translate regulatory requirements into technical test plans — and deliver audit-proof evidence.

Review a requirement

02 — Approach

A project with no surprises — except the ones we find.

  1. STEP · 01

    Scope & threat model

    Joint threat modeling, concrete objectives, unambiguous rules of engagement. Never a time-and-materials blank cheque.

  2. STEP · 02

    Execution

    Two-person team principle, four-eyes review before every escalation. Daily status update to your technical point of contact.

  3. STEP · 03

    Reporting & debrief

    Executive summary for leadership, technical report with reproducible proof-of-concepts, live debrief with Q&A.

  4. STEP · 04

    Retest & continuous

    Optional retest of closed findings, cleanly documented. On request: ongoing engagements across multiple quarters.

03 — Trust

Certified. Industry-proven. Independent.

Our experts hold industry-standard certifications and work on real mandates every day:

  • OSCP
  • CRTO
  • CRTL
  • GPEN
  • GWAPT
  • CISSP
  • CEH

Sectors we work with

Finance · Insurance · Public sector · Energy · Automotive · Healthcare · SaaS

04 — Next step

Ready to see your attack surface honestly?

A no-strings intro call takes 30 minutes. After that you'll know what's worth doing — and what isn't.