Facebook LinkedIn

Services

Vulnerability analysis

We offer a variety of vulnerability analysis for our clients, in many different areas, be it Website, IoT or IT network testing.

Penetration Testing

For our clients we offer a complete IT security mapping from an ethical hacker’s perspective. In the analysis you can find anything from a company’s Internet footprint to detection to exploiting potentially detected vulnerabilities.

Trainings

We offer various IT security,- and awareness training. Our training can be useful for programmers, administrators and important colleagues of the company.

Compliance

We perform a full security assessment of your organization in accordance with the requirements of the NIS2 directive. Our service covers everything from in-depth monitoring, automated security testing, and “Red Team” exercises to ensure the protection and compliance of your systems.

AS/400 (IBM i) Penetration Testing

Formerly known as the AS/400, the IBM i operating system is enterprise-grade, highly reliable, and robust it is widely used in environments that support critical business operations such as banking, healthcare, and government systems. 

AI system penetration testing

AI systems, such as machine learning models, LLM-based chatbots, and autonomous agents are composed of complex, multi-layered architectures. 

Source Code Analysis

Source code analysis—also known as Static Application Security Testing (SAST) is a foundational pillar of secure software development. 

TLPT & Red teaming

Threat Led Penetration Testing (TLPT) and Red Teaming are advanced security exercises that simulate targeted attacks on live systems based on real-world threats. 

About us

We are information technology professionals with strong background in cyber security assessments along with related consulting and trainings.


Superior Pentest was created to help companies to deal with IT security related problems and reveal possible IT security risks.


The company is your trusted partner for penetration testing, ethical hacking, IT security training and services.


Our team has the following widely recognized qualifications:
OSCP, OSWP, CEH, ISO 27001

References

We always turn to our customers with discretion, so our reference list is not complete. We are proud of their feedback.


  • We have professional experience in evaluating the IT security at multinational companies in various fields in many different countries.
  • Also we worked together successfully with companies from finance, insurance, technology and telecommunication sectors.
  • Additionally, with pharmaceutical and automotive industry professionals.
  • Our work includes testing different corporate banking solutions, external and internal websites, and testing mobile applications for various hungarian commercial banks.
  • From an ethical hacker perspective, we examined and did a penetration testing on a website dealing with crypto currency.
  • We also worked in international markets. For a multinational investment and financial services provider - established and based in Switzerland -, we performed internal network testing, testing of internally developed and used software, and testing of internal and external websites.

Blog

We want to give as much knowledge as possible about the security status of IT systems not only to our customers, but also to those who are interested in this topic. On our blog you can read about IT security events, tools and news, among other things.