Hi, I’m Michiel!

I hack your systems and applications,
so that others won’t.

About myself

I’m a seasoned penetration tester with more than seven years of experience in cyber security and have completed numerous assessments for customers. I’m a continuous learner and I’m always interested in new hacking techniques or other relevant materials. I keep myself up-to-date by achieving certifications, attending conferences, reading blogs by the community, participating in CTFs or research topics by myself.

I’m a builder and a breaker. I have developed my own automation tools which I use during penetration tests and have built my own small datacenter at home. This allows me to self-host my own services which both improve the quality of an assessment, as well as provide clients with a platform to securely share confidential information. All customer information is stored in-house and not with any third party providers.

Penetration Testing Services

Web Applications

A complete deep-dive assessment of your web app, including your APIs.

API

Your API endpoints will be tested for any logical or business flaws.

Source Code Review

White-box pentest where we test your asset combined with your source code.

Infrastructure

Pentest of your internal or external systems and networks. Can be an overall or objective-based assessment.

Mobile Applications

Assessment of your Android or iOS app where we validate the app behaviour and the backend communications.

IoT Devices

Pentest on an IoT-device that is able to communicate on a network. Assessment type can vary, depending on its purpose.

Why Me?

Honesty & Care

I care deeply for my clients and will continuously involve them during assessment whilst also being completely transparent with them. I will never “beat around the bush” and will always tell my clients exactly how their security posture is and how to improve it.

Unique Expertise

I am not your average “checkbox” penetration tester. I will take a deep dive into your system or app and understand how it works before I will break it. Additionally, I will take extra care for your security and business values. We will discuss together what you’re mostly concerned about and will analyze these aspects further during the assessment.

Valuable Reports

In the reports that you will receive after the assessment, I will not simply state if your security is good or bad. Instead, I make use of a custom-made scoring system to exactly indicate where your security posture lies and what your focus points will be.

Certifications

I have completed multiple examinations and earned various certifications to build further on my expertise.

Let’s talk!

Are you lying awake about your security posture? Or want to talk about something else? Then send me a message and we’ll get in touch!

First Name
Last Name
Email
Message
The form has been submitted successfully!
There has been some error while submitting the form. Please verify all form fields again.
Scroll to Top