Offensive IT Security from Germany

About DSecured

DSecured is a German IT security company that offers services such as penetration testing and red teaming, as well as consulting for international clients.

We specialize in all aspects of perimeter security, relying on a strong team of experienced security experts who bring extensive knowledge in both offensive and defensive IT security.

500+
Vulnerabilities
7+
Years Experience
Top 10
Bug Bounty
About DSecured
Top Hacker
HackerOne, Bugcrowd
Certified
OSCP

Our Success in Numbers

Trust is built on proven results

0
Critical Vulnerabilities

Found in bug bounty programs worldwide

0
Penetration Tests Conducted

For companies across various industries

0
Years of Experience

In offensive IT security

Top 10
Hacker Rankings

On leading bug bounty platforms

Our Team & Expert Network

3
Core Team Members
Top 10 Bug Bounty Hackers
+
20+
Specialized Experts
In our extended network
=
100%
Project Coverage
Every challenge solvable

Our core team of 3 experienced penetration testers is complemented by a network of over 20 specialized security experts. This structure allows us to assemble the perfect team for each project while guaranteeing the highest quality. Almost all team members have been active in bug bounty hunting for many years and are ranked among the Top 10 Hackers in various programs. For instance, Damian is one of the top hackers at Toyota, while Majd is among the top hackers at PayPal.

Core Team

Damian Strobel
Web Security API Testing Red Teaming eASM Development

Damian Strobel

Founder & Penetration Tester

Top 10 @ Toyota Bug Bounty

HackerOne LinkedIn Github

Majd Atiyat
Mobile Security Web Applications Bug Bounty Secure Code Review

Majd Atiyat

Penetration Tester & Consultant

Top 10 @ PayPal Bug Bounty

HackerOne LinkedIn

Patrik Fehrenbach
Network Security Infrastructure Testing Cloud Security API Security

Patrik Fehrenbach

Penetration Tester & Consultant

Security Expert & Bug Hunter

HackerOne LinkedIn Github

Our Expert Network

In addition to our core team, we leverage a network of over 20 specialized security experts. These experts bring years of experience in various fields and are brought in based on project requirements.

Mobile Security

iOS & Android Experts

4+ Specialists

Cloud Security

AWS, Azure, GCP

5+ Specialists

Infrastructure

Network & Hardware

3+ Specialists

Source Code Audit

Secure Code Review

4+ Specialists

OSINT & Recon

Intelligence Gathering

3+ Specialists

Cryptography

Encryption & Protocols

2+ Specialists
Scalable Teams

We assemble the ideal team for each project

Proven Expertise

All network experts are tested and certified

Quick Availability

Projects usually start within 1-2 weeks

Core Values & Philosophy

These principles guide us in every project and client relationship

Customer Orientation

Customer Orientation

In our company, the satisfaction of our customers is the priority. We do everything we can to develop solutions that meet their specific requirements and goals.

Integrity

Integrity

Our work is characterized by unwavering integrity, as we adhere uncompromisingly to ethical principles and industry standards to ensure the trust and security of our customers.

Curiosity

Curiosity

Driven by our constant curiosity, we push the boundaries of what is possible, always seeking new ways to improve the IT security of our clients and exceed their expectations.

Innovation

Innovation

Our pursuit of innovation allows us to develop forward-thinking security solutions that protect our clients against current and future threats.

Relevance

Relevance

We place great emphasis on maintaining the relevance of our solutions by continuously adapting to the dynamic landscape of IT security and updating our offerings accordingly.

Transparency

Transparency

We believe in the importance of transparency in all our business relationships, so that our clients are always fully informed about the strategies and methods we use to protect their IT environments.

Activities & Industries

Successful projects across various industries worldwide

Aviation

Aviation

As an external Red Team, we were allowed to attack one of the largest aviation companies.

Universities

Universities

At a British research institute, we found external and internal threats.

Car Manufacturers

Car Manufacturers

We found dozens of security vulnerabilities for a German manufacturer.

IT Companies

IT Companies

We were able to detect a large PII leak at a Brazilian company.

Insurance Companies

Insurance Companies

We regularly assess the external IT security of potential policyholders.

Robotics

Robotics

At regular intervals, we conduct penetration tests against a well-known robotics application.

Railway Companies

Railway Companies

We were allowed to analyze the entire infrastructure of a foreign railway company.

SaaS Providers

SaaS Providers

SaaS providers are classic customers - the complexity of these applications makes regular pentests necessary.

Gaming

Gaming

Gaming portals are also part of our customer portfolio.

How We Work

Our automated process for maximum transparency and efficiency

01
Planning

Planning

We analyze your needs and create a customized security plan.

02
Execution

Execution

We search for security vulnerabilities, general issues, shadow IT & leaks!

03

Client Dashboard

Automatic access to your personal dashboard with live status, issues, and progress - everything in real-time!

Automated
04
Reporting

Reporting

You receive detailed, clear reports on the security status of your system.

Learn More About How We Work

Discover our Client Dashboard, complete transparency, and all features in detail.

Workflow Details

Trust Through Results

Our clients value our expertise and reliability

Certified Security Experts

OSCP and other certifications combined with years of practical experience

International Recognition

Successful collaboration with Fortune 500 companies and leading tech corporations

Highest Confidentiality

Strict NDAs and professional handling of sensitive data are standard practice

Personal Support

Direct contact with the pentesters during and after the project

Continuous Improvement

Regular training and participation in international security conferences

Detailed Documentation

Comprehensive reports with clear recommendations and PoC code

"Working with DSecured was outstanding. The team not only identified critical vulnerabilities, but also provided practical solutions and valuable security recommendations. Communication was always professional and transparent."

Leading German Technology Company

IT Security Manager

Company History

Our journey to leading security expertise

2023/24

Founding of DSecured. Development of a new eASM with broader focus (Darknet Intelligence, Brand Protection, OSINT) and capabilities to monitor large portions of the internet.

2022

Asset deal with a NASDAQ company. eASM "NEO" becomes part of the product portfolio of an American/Israeli corporation. Damian becomes VP of Cyber Products.

2019

eASM Platform "NEO" officially launches

2018

Damian Strobel becomes Partner & CTO in an international IT security company. His mission: To improve external IT security of corporations through automation, proven penetration testing and red teaming, as well as methods from bug bounty hunting.

2017

First prototype of a software solution for continuous monitoring is released and finds critical security vulnerabilities in the infrastructure of PayPal, Uber, and other US corporations.

Certificates & Qualifications

Proven expertise meets practical experience

OSCP
500+ Bugs
Top 10 Rankings

OSCP-Certified Experts

Several team members hold the renowned OSCP certificate. However, we value demonstrable success and practical experience more - our 500+ discovered vulnerabilities and Top 10 bug bounty rankings speak for themselves.

Flexible Team Composition

On our part, it is no problem to assemble a team in advance that meets the regulatory requirements of the client - in this regard, we provide advisory support.

Practical Success

Our Top 10 rankings in international bug bounty programs and over 500 discovered vulnerabilities speak for themselves - real expertise in the field.

Ready to Improve Your IT Security?

Let's work together to identify and fix your vulnerabilities. Schedule a no-obligation initial consultation with our experts.

Free Initial Consultation
Custom Quote Preparation
Fast Response Time

Quick Start

Projects usually begin within 1-2 weeks after contract award

Transparent Pricing

Use our configurator for an initial cost estimate

Made in Germany

Your project stays in Germany - highest data protection standards guaranteed