Elite red team operations, advanced penetration testing, and adversary simulation — delivered by operators with real-world offensive experience.
From initial access to full domain compromise — we simulate the full attack lifecycle to expose your real risk before adversaries find it first.
We don't simulate theoretical threats — we replicate the exact techniques used by real adversaries. Starting from zero access, we pursue your most valuable assets through stealth, persistence, and lateral movement, testing whether your people, processes, and technology can detect and respond in time.
Cloud breaches are almost never about zero-days — they're about misconfigurations, excessive permissions, and forgotten resources. We assess your cloud posture the way an attacker would, chaining low-severity findings into high-impact attack paths that automated scanners miss entirely.
MFA alone won't save you. We run campaigns using the exact infrastructure and tradecraft threat actors use — from browser-in-the-browser lures and AiTM proxies that bypass MFA entirely, to pretexted spear-phishing targeting executives. Every campaign ends with actionable metrics and awareness recommendations.
Automated scanners flood developers with noise. We combine SAST tooling with deep manual review by engineers who understand both how code is written and how it's attacked — uncovering the subtle logic flaws, privilege escalations, and data leakage paths that scanners consistently miss.
Modern applications are complex — multiple SPAs, microservices, third-party integrations, and public APIs each introduce their own attack surface. We test the full stack manually, chaining low-risk issues into scenarios that demonstrate real business impact: account takeover, data exfiltration, privilege escalation.
From your internet-facing perimeter to your internal domain controllers, we map and exploit your infrastructure the way a targeted attacker would — enumerating every exposed asset, prioritising exploitable vulnerabilities, and demonstrating the full impact of a network-level breach.
We are not a checkbox security firm. Every engagement is led by a practitioner who has spent years in the trenches — developing offensive tooling, evading enterprise EDRs, and exploiting real production environments.
Our operators have presented at international security conferences, contributed to the offensive security community, and hold the industry's most respected certifications.
Red Team Security SRL was founded by Andrei Grigoras — a self-driven, self-taught security professional with over 7 years of hands-on offensive security experience. Starting from a Junior Security Researcher role in 2018, Andrei progressed rapidly through SOC analysis, consulting at Accenture, senior penetration testing at TwelveSec and Casumo, independent tooling research, and most recently as a Red Team Operator at PwC Ireland — leading engagements against organizations with 5,000+ employees.
Andrei is a recognized speaker at international security conferences including DefCamp, BSides Athens, BSides Tirana, HEK.SI, and INFOSEK.SI. He has developed multiple custom offensive tools used in real engagements, contributed original research to the community, and competed for Team Romania in the European Cyber Security Challenge.
Leading red team engagements for large enterprises (5,000+ employees), developing custom attack infrastructure, modifying tools like Kerbrute and SOAPHound, and supporting External Attack Surface Management.
Built Web Application Vulnerability Scanner MVP with scraper, fuzzer, and AI-powered anomaly detector. Developed Automated Red Team engine with 60+ CVE PoCs and Terraform-based infrastructure.
Led red team operations using Mythic and Cobalt Strike, deployed resilient red team infrastructure, mentored junior staff, and conducted mobile, web, infrastructure, and phishing assessments.
Security testing across iGaming products including code review, external/internal PT, phishing, and infrastructure assessments. Close cooperation with dev/ops teams.
Security training development, SAST/DAST assessments at Accenture. SIEM log investigation and MDR endpoint analysis at SecureWorks.
Researched new vulnerabilities, implemented them in the platform, and participated in bug bounty programs.
Industry-recognized offensive security certifications backed by real-world competition wins and community contributions.
Compromised 80+ machines on HackTheBox including Rastalabas challenges, maintaining Pro Hacker rank through consistent offensive security practice.
Every engagement follows a structured, transparent process designed to maximize findings while minimizing operational disruption.
We define clear boundaries, objectives, and success criteria. Scope, timeline, communication protocols, and emergency contacts are established before any testing begins.
Passive and active reconnaissance to map your external attack surface — domains, IP ranges, employee data, technology stack, supplier relationships, and exposed credentials.
Methodical exploitation using manual techniques augmented by custom tooling. We chain vulnerabilities to demonstrate real business impact, not just theoretical risk.
Detailed technical and executive reports with reproduction steps, impact ratings, and prioritized remediation roadmaps. Live debrief with your technical and executive teams.
We support your team through the remediation process and provide complimentary re-testing to confirm that identified vulnerabilities have been properly resolved.
We don't rely solely on public tools. Our operator develops and maintains a suite of custom offensive capabilities.
A heavily modified evilginx3 fork featuring dynamic HTML obfuscation to defeat browser-side static scanning engines, link cloaking, and real-time credential capture piped into Gophish campaign metrics.
A feature-extended Gophish fork with native QR code campaign support, full bidirectional integration with the custom Evilginx3 for AiTM flows, and improved credential export and reporting functionality.
Custom multi-stage DAST tool: a Selenium-driven scraper maps all inputs, a fuzzer tests XSS, SSTI, LFI, SQLi, and open-redirect vectors, and an AI-assisted anomaly detector reduces false positives automatically.
Automated tool that submits phishing domains for recategorisation across multiple vendor reputation platforms using Selenium and an integrated captcha-solving engine — keeping infrastructure off blocklists.
60+ hand-written RCE exploit proof-of-concepts covering CVEs from the last 5 years. Each includes a reproducible vulnerable environment, cross-compiled Linux/Windows binaries, and documented exploitation steps.
Two-variant ransomware PoC developed for red team engagements: a full-UI simulator that replicates real-world ransomware UX and workflow for executive-level impact demos, and a fileless in-memory variant that operates without touching disk to evade EDR-protected environments.
Ready to understand your real risk? Every engagement starts with a confidential scoping call. Reach out and we'll get back to you within 24 hours.