Penetration testing that finds what automated scanners miss. Manual exploitation, business logic flaws, and actionable remediation for organizations that demand real security.
Penetration Tester | Security Researcher | Offensive Security Specialist
I'm a penetration tester specializing in identifying vulnerabilities that automated tools miss. My methodology combines manual testing expertise with deep technical knowledge to uncover complex web application flaws, business logic errors, and chained attack vectors that require human intuition to discover.
Conducted penetration testing engagements for government institutions and large enterprises, assessing critical infrastructure, internal networks, and sensitive web applications. Experience working within strict compliance frameworks and delivering detailed reports to executive stakeholders.
Contributed to EU-funded cybersecurity initiatives, performing security assessments on cross-border digital platforms and research infrastructure. Collaborated with international teams to evaluate security postures and implement hardening measures for multi-national deployments.
Specializing in web application penetration testing, network infrastructure assessments, and Active Directory security reviews. My approach emphasizes manual testing techniques, attack path chaining, and identifying vulnerabilities that scanners overlook.
Currently exploring Offensive AI Research, developing autonomous agent frameworks that leverage large language models for intelligent vulnerability discovery and multi-step attack simulation. Building custom security tools for specialized assessments.
Comprehensive penetration testing services to identify and eliminate your organization's attack surface.
Manual, methodology-driven testing to identify OWASP Top 10 vulnerabilities, authentication bypasses, and business logic errors.
Comprehensive network security evaluations including Active Directory attacks and lateral movement analysis.
Custom tooling and automation to accelerate vulnerability discovery and enhance security operations.
Open-source tools and research pushing the boundaries of offensive security.
A reconnaissance tool designed to scrape and analyze client-side JavaScript files for hidden API endpoints, hardcoded secrets, and sensitive data exposure. Automates the tedious process of JavaScript analysis during web application assessments.
Pioneering research leveraging Large Language Models and "Chain-of-Thought" reasoning for intelligent, multi-step attack simulation. Autonomous agents capable of contextual decision-making, vulnerability chaining, and adaptive exploitation strategies.
Professional experience, technical skills, and industry certifications.
Full-cycle security assessments for large-scale Greek organizations. From scoping to executive reporting.
Manual web app testing and custom security automation for enterprise systems.
Elite vetted researcher finding high-severity vulnerabilities in Fortune 500 programs.
CI/CD security integration, container hardening, and infrastructure-as-code practices.
Enterprise infrastructure management, network security, and incident response.
Offensive Security Certified Professional
AchievedCertified Web Exploitation Specialist
AchievedCertified Red Team Analyst
AchievedOffensive Security Web Expert
In ProgressReady to identify vulnerabilities in your systems before attackers do? Get in touch.
Whether you need a full penetration test, security consultation, or want to discuss your organization's security postureβI'm here to help.