michielevers.be | Hi, I'm Michiel! I hack your systems and applications,so that others won't. About myself I'm a seasoned penetration tester with more than seven years of experience in cyber security and have completed numerous assessments for customers. I'm a continuous learner and I'm always interested in new… | consultant penetration, penetration testing, season penetration, penetration tester, tool penetration | security, cyber, assessment, consultant, system | 16 |
dju.be | 10 Vulnerable Vulnerable Web Web Applications Applications You You Can Can Play Play With With | | Penetration Penetration Testing Testing Laboratory Laboratory | | Online Online Training Training Courses Courses – Learn Learn Penetration Penetration Testing Testing in in Practice | advanced penetration, penetration testing, applications penetration, learn penetration, walkthrough penetration | photography, youtube, light, photographer, lightroom | 13 |
mmebv.be | MME is an independent IT company specialized in security audits, user awareness, penetration testing, ethical hacking and security training. | awareness penetration, penetration testing, audits penetration, penetration test, attack penetration | security, awareness, testing, hack, ethical | 12 |
secureness.be | Penetration testing is a simulated cyber attack on your system to identify vulnerabilities and determine the effectiveness of your security measures. Our expert team uses advanced techniques to find potential weak points in your network, applications, and devices. We provide a comprehensive report… | penetration testing, schedule penetration | vulnerability, cybersecurity, soc, security, testing | 9 |
cyberinit.be | CyberInIT, your trusted cybersecurity partner in Wallonia, centered around Liege. We offer expert security audits, vulnerability scans, penetration tests, and training programs. Safeguard your business against cyber threats with our proactive cybersecurity services. | scan penetration, penetration test, penetration testing, personalize penetration | cybersecurity, vulnerability, security, wallonia, threat | 7 |
ex-consulting.be | I started my career as a Freelance Security Consultant in July 2018. Since then I have worked on several long-term consultancy assignments in multiple sectors (healthcare, financial, government), as well as provided security training and performed penetration tests and provided Incident Response… | consultant penetration, penetration testing, training penetration, penetration test, activity penetration | security, consulting, consultant, cyber, vulnerability | 5 |
keysec360.be | One-shot security assessments or penetration tests alone do not protect us in our daily work | assessment penetration, penetration test, manual penetration | security, vulnerability, package, continuous, endpoint | 5 |
ironpeak.be | Mobile & Web Penetration testing, Hardening, Incident Response, Code Review, Threat Modelling. | web penetration, penetration testing, architecture penetration, model penetration | security, cybersecurity, consulting, risk, testing | 4 |
thesecurityfactory.be | How vulnerable is your environment? The key to defending your critical assets is knowing your weak spots and securing them. Penetration testing is the most effective method for assessing and improving your security level in terms of price and quality. | penetration testing, spot penetration | factory, security, hack, employee, defense | 3 |
quentinkaiser.be | I’m currently writing a tool to automate Android applications penetration testing and I discovered a bug in the Android emulator during this process. | blackberry penetration, penetration testing, application penetration | room, conference, thing, vulnerability, execution | 3 |
theshell-company.be | Helping you improve your security by analysing it : Penetration testing, security audit, process review,... | security penetration, penetration testing, audits penetration, system penetration | security, shell, cybersecurity, testing, response | 3 |
phlox-security.be | While a penetration test gives an overview about the technical security posture of your environment, it typically doesn't put your organization's resiliency against targeted attacks to the test. Do you want to test what your detective capabilities are and how your blue team will respond to a… | penetration testing, system penetration, penetration test | security, consulting, environment, red, technical | 3 |
awarity.be | The Awarity platform provides an all-in-one solution for enhancing your company’s cybersecurity. With a combination of advanced training, realistic phishing campaigns, and in-depth penetration tests, our platform enables businesses to cultivate a culture of awareness and resilience against cyber… | depth penetration, penetration test, insight penetration | awareness, security, campaign, pentest, cybersecurity | 2 |
sodha.be | The files (R and CSV) contain the replication data for our analysis of a set of 2,355 death duty forms from the Netherlands in 1921, presented in our article “Exploring Modern Bank Penetration in the Netherlands in the 20th Century,” published in Economic History Review. A detail... | bank penetration, penetration evidence, penetration netherlands | humanity, sign, dataset, log, add | 2 |
marcbogaerts.be | As I was doing this exercise I was looking for ways that could help me detect the vulnerabilities. This is how I got to learn about Kali Linux . This is a linux distribution that contains lots of tools that facilitate penetration testing. We will see some of the tools that I used to detect… | security penetration, penetration testing, tool penetration | database, exercise, vulnerability, query, request | 2 |
vivada.be | Increasing mobile penetration and network coverage is a key goal for both the telecommunications industry and society at large. | mobile penetration, penetration network | access, lte, network, wireless, broadband | 1 |
constrix.be | Prevention is better than a cure. Prolonged exposure to precipitation can lead to façade damage and moisture penetration. So protect your exterior walls with hydrofuge. This makes them water-repellent but still able to breathe because they remain vapour-permeable. | moisture penetration, penetration exterior | material, friendly, environmentally, resistance, wall | 1 |
exclusivecardesign.be | Anti-break-in: The window can be shattered, but the tinting film offers resistance to penetration. | | view, exclusive, window, warranty, porsche | 1 |
coatexbe.webhosting.be | …high pressure to obtain a flat film. Our calandering line within the Sioen Industries Group, produces pondliners in different thicknesses, always on a 200 cm width. There is no risk for fish intoxication and it offers resistance against root penetration. We offer 0,46 till 1,5 mm thick material. | root penetration, penetration till | pond, technical, welding, market, cut | 1 |
ozoos.be | Ozoos' expertise in developing Veezo has enabled them to offer other security services, such as assessments and penetration testing, to help businesses proactively manage their security risks. With industry-leading tools and techniques, Ozoos is at the forefront of helping businesses stay ahead of… | assessment penetration, penetration testing | security, innovation, officer, virtual, assessment | 1 |
one-to-one-consult.be | We provide professional sales and marketing services to premium luxury hospitality entities, ensuring maximum market penetration and success for its clients. | market penetration, penetration success | network, level, travel, trip, leisure | 1 |
pollevanhoof.be | I'm Polle Vanhoof. I'm a cyber security expert with years of experience in a wide range of technologies. I mainly focus my efforts on securing all kinds of IT systems, but it's not unusual for me to take on the occasional side-challenge. When not preoccupied with managing and executing penetration… | challenge penetration, penetration test | security, cyber, elegant, nugget, cybersecurity | 1 |
infrawave.be | Full-spectrum infrared heaters have a measurement from 3 to 10% IR-A, 20 to 30% IR-B and 60 to 80% IR-C. With the correct and safe ratio between IR-A, IR-B, and IR-C we are able to ensure, in combination with the correct power control, optimal and safe penetration depths. To reach the deeper… | safe penetration, penetration depth | infrared, heater, body, heat, health | 1 |
prospectr.be | Next, we set up everything necessary to reach your ICP in a consistent way. From the backend tech to our proprietary dashboard where you can find all incoming leads and manage them with your sales team. We reach out to your ICP on your behalf every month to ensure a fast and qualitative market… | | meeting, month, result, scalability, generic | 1 |
cybereyes.be | Penetration testing is a proactive approach to discovering exploitable vulnerabilities in your web applications, computer systems, and networks. Our manual testing process goes beyond automated scanning and into complex security exploitation. Gain a thorough understanding of these vulnerabilities… | | cybersecurity, technology, firewall, security, threat | 1 |
alsibois.be | Alsibois has fine grain size that allows penetration into micropores and microcracks, providing woodlike appearance after machining. | size penetration, penetration micropore | color, colour, artistic, renovation, wood | 1 |
hainautculturedemocratie.be | …within their homes. This is where open-concept living shines the most. It basically eliminates barriers by removing walls and creating seamless transitions between different areas. This not only allows for better flow and movement but also maximizes natural light penetration throughout the space. | light penetration, penetration space | system, space, mary, thing, house | 1 |
echelon.be | Whether your enterprise is in pursuit of strategic security consulting, comprehensive penetration testing, robust vulnerability management, or is poised to redefine its security framework, Echelon Labs is equipped with a suite of services and programs tailored to strengthen your security posture. | comprehensive penetration, penetration testing | lab, security, landscape, comprehensive, secure | 1 |
bramkelchtermans.be | Defend your application against penetration attacks, SQL injection and many more vulnerabilities! | application penetration, penetration attack | network, system, user, security, science | 1 |
soudobeam.be | Multi and Mono SoudOxar® lance heads are essential components of increasing productivity thanks to their superior penetration and agitation capacities. They also offer the advantages of increased service life and blowing density. | superior penetration, penetration agitation | welding, engineering, electron, beam, oxygen | 1 |
digitalgrowth.be | A KPI is a performance indicator for your company. This indicator is therefore quantified and allows you to monitor the effectiveness of an action in relation to defined objectives. A KPI can take different forms: revenue growth, absenteeism rate or penetration rate on your market, in digital… | rate penetration, penetration rate | agency, growth, strategy, need, present | 1 |
lesetudiantsbelges.be | iPhone, iPad, Android Apps – We offer our clients an additional resource to drive their online activities, target new audiences and increase market penetration. | | alignment, theme, responsive, html, text | 1 |
bigbrotherawards.be | …new police investigation and data collection methods: infiltration in a computer system by police officers who are allowed to commit offences; penetration in a computer system in order to make discrete visual inspection possible; secret investigation into computer systems without clear scope… | offence penetration, penetration computer | big, award, brother, government, citizen | 1 |
flexide-energy.be | The high penetration of renewable energy in the power system changed the dynamic of the energy market. It creates new opportunities for the valorization of the energy produced by your cogeneration and the valorization of your flexibility in the market. | high penetration, penetration renewable | energy, market, opportunity, asset, advantage | 1 |
vadordigital.be | We set up offsite ethical penetration tests in a win-win cooperation with your IT services. We test your DRP before the D day. | ethical penetration, penetration test | security, gdpr, issue, cybersecurity, change | 1 |
mattibijnens.be | Mainly active on the Intigriti platform. Currently all-time #1 for high-critical severity (leaderboard) . | penetration testing | bug, bounty, hunter, pentest, security | 0 |
sisec.be | SiSEC is specialised in Security Consultancy since 2012 in the Brussels area. | penetration testing | security, network, breach, advice, analysis | 0 |
xmconsulting.be | Enrich internal data and log files with threat intelligence feeds in order to better detect security incidents. | | security, cyber, threat, asset, remediation | 0 |
corelan.be | Posted in Cons and Seminars | Tagged amazon , corelan , corelan team , corelan-be , corelean , corelean-team , depalsr , download-mona , easy-rm-exploit-tutorial , exploit-writing-in-c , hitb2014ams , httpswww-corelan-be , IOActive , Jennifer Steffens , jennifer-steffens-ioactive , keynote… | | exploit, research, tutorial, security, class | 0 |
safepoint.be | We can assist you in many different ways to help you meet your cybersecurity and compliance needs using a no-nonsense business driven approach. Our experts are rigorously trained to handle all kind of situations and emergencies, from the design of your security processes and solutions, to their… | penetration testing | security, awareness, career, response, cyber | 0 |
ceeyu.be | The digital footprint of your suppliers could become entry doors for cybercriminals to your organization. And even if they don’t, a security incident at one of your suppliers could disrupt your operations. Using Ceeyu's Third Party Security Risk Management (TPRM) service, you can detect cyber… | penetration tests | risk, security, attack, chain, supply | 0 |
inductionheating.be | RF Heating Consult distinguishes itself through its specialized knowledge and skills in high-frequency high-end products and induction heating processes. We have a network of experienced specialists. We can give tailored, independent advice, taking into account the existing equipment and specific… | penetration depth | heating, generator, rf, semi, conductor | 0 |
cptex.be | In "Registration & Support", you'll find, the complete procedure for the product registration. | cone penetration, penetration tests | registration, cone, example, appointment, calculation | 0 |
devsource.be | The demand for talented IT Developers is exploding and show no sign of slowing over the next years. Businesses will need a new approach because availability is dropping, and wages are rising. | | soon, microservice, testing, developer, technology | 0 |
sandervandessel.be | In collaboration with another student, I got to choose between several different projects: smart device security research, writing a guide for starting a security research facility, and creating an IT guide for the elderly. After careful consideration, we decided to go for the smart device… | penetration testing | internship, security, cyber, research, device | 0 |
maximiliaanmuylaert.be | Hi, my name is Maximiliaan Muylaert. I am years old and live in Ninove, East Flanders. I graduated from university college with a bachelor degree in Applied Computer Science. I studied Modern Languages - Science in highschool at GO! Atheneum Ninove. | research penetration, penetration testing | system, cybersecurity, education, science, certificate | 0 |
spinae.be | We prefer to stay anonymous. We gave Spinae the mandate to break into our systems and show what a real cyber attack could potentially do. And they delivered! Our CEO hesitated to leave on holiday because of all the discovered security problems. Spinae helped us to prioritize the actions to resolve… | security penetration, penetration tests, inside penetration, penetration testing | security, ot, guidance, manage, compliance | 0 |
gocreate.be | A little under ten years ago, Warner Bros. Belgium came knocking on the door of GoCreate founder Dietrich, asking him to reconfigure their network after they’d bought a brand-new post-production installation. This ‘one-time collaboration’ quickly grew into a strong partnership. Today, Warner Bros… | penetration testing | security, interested, network, envelope, engineer | 0 |
splynter.be | At Splynter we want to holistically improve your cyber security posture through a vendor-independent, risk-based approach that combines high-quality security architecture, in-depth technical cyber security expertise and cyber security training. | quality penetration, penetration focus | security, cyber, risk, depth, approach | 0 |
dlmit.be | Hey, my name is Jonas De la Marche and I'm a cybersecurity specialist from the Ghent area. I studied System and Network Engineering and got a micro degree for Cybersecurity Specialist. | penetration testing, web penetration, application penetration | cybersecurity, system, environment, testing, network | 0 |
keyboardwarrior.be | We have the necessary data engineering and data science knowledge to solve your analytics needs from start to finish, whether it's optimizing decoding and sampling for video pipelines, building deep learning models or deriving key insights for e-commerce shops. | penetration testing | warrior, keyboard, security, native, language | 0 |
redrobot.be | First of all, what we can do is analyse the actual need for blockchain integration. Secondly we assist in designing an implementation track & the required software architecture. Finally, we can manage the project from start to finish and implement a solution. | penetration testing | red, blockchain, cyber, compliance, security | 0 |
void.be | Void Security - Information security, system administration and secure software development | auditing penetration, penetration testing | security, void, secure, system, consulting | 0 |
wevaho.be | In 2019, we took over the fire safety company Van De Velde and decided to definitely enter the fire safety sector. | resistant penetration, penetration seal | fire, resistant, nl, safety, gate | 0 |
cresco.be | …greatest asset is our background in ethical hacking. We thoroughly examine your systems, just like real hackers would. This provides you with a realistic assessment of the maturity of your security systems. Based on this analysis, we provide expert advice and develop an appropriate security plan. | penetration tests | cybersecurity, security, assessment, approach, red | 0 |
gijsvanlaer.be | My name is Gijs Van Laer, I'm a cryptographic engineer and information security consultant. Currently, I'm working at XFA , but do not hesitate to reach out for advice or other small projects. Below you can find a few of the services I can provide, but feel free to reach out if you have any… | penetration testing | security, university, cryptographic, research, advice | 0 |
q-project.be | Q-Project Management Consulting operates in the areas of Information Technology & Security advice, Project & Interim Management, Organisational advice & Quality care, and Auditing & Risk Management coaching. | | assessment, resource, security, risk, auditing | 0 |
studio-secure.be | We have a core group of more than 10 security experts. Some are Certified Ethical Hackers; some have PhDs in security-related fields. All make it their mission to know as much or more about exploiting security vulnerabilities as criminal hackers. | penetration testing, global penetration, penetration test, cms penetration, gdpr penetration | secure, security, advanced, compliance, vulnerability | 0 |