We Hack Differently.

From penetration testing to cloud security, we’ve got you covered.

Learn More

What We Do

Abricto Security is redefining penetration testing and the value it brings to our customers. With decades of experience, we’ve seen it all and developed our services to dynamically tailor-fit each of our clients. From custom security assessments to long-term service partnerships, digging deep to understand your organization’s specific challenges is what sets us apart. Our “you first” attitude impacts everything we do, which is why we approach each client with a unique set of solutions.

Our Services

Who We Are

Abricto Security is a team of security leaders, consultants, ethical hackers and cloud professionals working together to test and strengthen your company’s security posture. We bring together real-world expertise and a passion for all things security.

About Us

We Run On 100% "You First" Values

We know it takes open communication to derive mutual trust from your partner cyber security firm. That’s why we lead with a “you first” attitude that impacts everything we do. At the end of the day, it’s your business, your security and your peace of mind.

Contact Us

Our Services & Assessments

Abricto Security offers a wide array of specialized assessments to measure and quantify the effectiveness of your organization’s security controls. These are great snapshots of current security posture. Services are on-going partnerships designed to iteratively improve security controls and practices.

Learn More

LatestBlogs

Our Response to COVID-19

By Cornel du Preez | April 13, 2020 | Blog

Abricto Security understands that all industries feel the impact of COVID-19 and we’re here to help. Our team is shifting our operating procedures...

Read More »

SQLmap Cheatsheet and Examples

By Cornel du Preez | April 02, 2020 | Blog

Target the http://target.server.com URL using the “-u” flag: sqlmap -u ‘http://target.server.com’ Specify POST requests by...

Read More »

Extracting Private Keys From Public Keys Generated With Weak Random Number Generators

By Cornel du Preez | March 19, 2020 | Blog

Public key encryption is heavily utilized in modern implementations of SSH. By leveraging public key cryptography, administrators can generate both...

Read More »

Request a Consultation

Cybersecurity can be a complicated matter. We offer a consultation for those who’d like to learn more.

Send us a note