SECURITY ANALYSIS.
PAY BY THE HOUR.

No 2-week "black box" engagements. No sales calls. No fluff. Laser-focused security assessments for the specific modules that keep you up at night.

Rate per hour

150 EUR

The "No-BS" Model

  • Zero Sales Calls Email us what you want and we'll send you a quote. We don't do discovery meetings to explain basic concepts. We don't need your company strategy, number of employess and revenue.
  • No Upsells We won't try to sell you a SOC platform, SIEM licenses, ISO 27001 consultants, or a fractional CISO. We just analyze the code.
  • Surgical Scope Pay for 4 hours to check one API endpoint, or 40 hours for a full analysis. You define the perimeter.

Code & Dependencies

Java, C#, Python, C, C++, TypeScript, whatever.

Data Flow & Architecture

Logic flaws, cloud infrastructure vulnerabilities, and auth bypasses.

Logs & Forensics

Figure out how you're hacked and exactly where they went.

Is this for you?

Privacy Assured

We don't need to know where you use that code. Everyone offers NDAs, but if you don't share that information in the first place, you're safer.

Review code methods

You're an SME developing software and want to assess if a specific part of the code is hackable before a release.

Architecture Advice

You're designing a system or changing your data flow and need an expert to review the logic for foundational flaws.

Reverse Engineering

Delivering an app to clients and want to see what can be reverse-engineered or exploited by an adversary with binary access.

Post-Breach

You were hacked and want to understand how. We find the entry point and footprint, skipping generic advice.

Black-Hat Mindset

You're threat modeling and need an external attacker mindset to find the kill chain before the bad guys do.

What do you get as a result?

You'll get a report with our opinion about the safety of your targeted scope. No 50 page fluff, just technical proof.

Binary Security

Feedback with reverse engineering proofs and exact bypass methods.

Code Analysis

Specific feedback about the lines of code that leak data or allow unauthorized access.

Architectural Assessment

Explanation of possible attack vectors and suggestions for improvement.

Who are we?

We are a small team of senior security professionals who have spent years working as penetration testers for large, regulated institutions and as security architects for software companies.

There's a small gap in the market. Full-scope security assessments are usually reserved for enterprise players with massive budgets, often costing tens of thousands of dollars. These tests are frequently delivered as "black-box" audits, which provide very limited technical value to the engineers actually building the product.

We also understand the developer's reality: when asked when to hire external security, engineers often push the activity until the product is "done" - which means it either happens years too late or not at all. HackThatPart was created to solve this by providing surgical, hourly access to high-level expertise exactly when it matters most.