Meet Pentest-Tools.com at Infosecurity Europe 2025 [stand C152]

Tired of vulnerability scanners that scream and reports that ramble?
Drop by stand C152 and see how we turn scan and exploitation data into real proof that drives effective action. 

Whether you’re juggling clients, assets, or board expectations, we’ve got the product and people to help you silence the noise, validate business risks, and walk into your next meeting with receipts - screenshots included.

  • Get swag worth wearing

  • Don’t miss our live workshop

  • Talk to the hackers behind the tools

Add us to your event plan

Why stop by our stand (C152)?

Here’s what you can expect when you come to meet our team at Infosec Europe this year:

  • Shield Check Icon

    Built by breakers. Brought to you live.

    Our team wrote the payloads, built the detections, and ran the scans you’re trying to automate. Real answers, no scripts. Ask anything.

  • Rocket launch icon

    Real demos. No buzzwords.

    We won’t “disrupt” your thinking - we’ll show you how our toolkit lets you scan smarter, validate faster, and report sharper.

  • Globe icon

    End the multi-tool juggling act.

    One product. Comprehensive coverage. Network, web, API, cloud - authenticated and unauthenticated, external and internal. No more duct-taping scanners together.

  • Swag worth stopping for.

    We’re bringing gear you’ll actually wear - and maybe even fight your teammates over.

Live security workshop: practical and packed with proof

Automating vulnerability detection and validation in your private cloud – live demo

📅 Tuesday, June 3, 2025, 12:00 - 13:30 BST

📍Security workshop - South Gallery Room 4

Join us for a no-fluff conversation and a live demo where we show how to stop chasing alerts and start confirming real risk inside your private cloud - automatically.

Think fewer alerts, more answers. This isn’t another cloud risk theory session - it’s a live walkthrough of how to move from scan to validated proof in minutes, not hours. No filler. Just real output, real fast.

You’ll walk away with:

  • A framework to automate cloud vulnerability triage (minus the false positives)

  • Tactics for confirming real risk with built-in PoCs and payload visibility

  • Clear reporting tricks that’ll save you from yet another spreadsheet marathon

Who should definitely be in the room:

  • Offensive security consultants juggling client audits

  • Internal security leads handling hybrid infrastructure chaos

  • Anyone tired of cleaning up after tools that overpromise and underdeliver

Meet your hosts:

🎙️ ADRIAN FURTUNA
CEO & Founder, Pentest-Tools.com

This is an image

Using his deep technical expertise and over two decades of hands-on IT security work, Adrian Furtuna founded and built Pentest-Tools.com with a team of offensive security experts pooling together their 30+ years of collective experience.

A speaker at international conferences (BlackHat Europe, Hack.lu, ZeroNights, Hacktivity, DefCamp, OWASP, Hacknet) and a university lecturer, Adrian believes in generously sharing insights, research, and solutions to help security teams make a bigger impact with less time and effort.


🎙️ DRAGOS SANDU
Product Manager, Pentest-Tools.com

This is an image

Starting his career in code, Dragos moved into Product Management to better connect technical capabilities with real-world user challenges. 

For over 5 years he has been shaping the product at Pentest-Tools.com  to match real customer needs and help clients navigate a highly complex technical landscape with constantly expanding needs, while building a deep, nuanced understanding of the cybersecurity ecosystem, along with its drivers and pervasive challenges.

Find us at stand C152 - and bring your hardest question

Come find us at stand C152 and talk to the people behind the tools – we’ll show you how to achieve what really matters to your work.

No noise. No fluff. Just clarity, credibility, and speed - live and in color.

Who you can meet at the event

Adrian Furtuna, Founder & CEO

Robert Tanase, Lead Product Manager

Dragos Sandu, Product Manager

Cristin Sirbu, Product Manager

Daniel Bechenea, Product Manager

Daniel Ciorobescu, Customer Success Manager

Gabriel Pana, SVP, GTM & Customer Experience

Jan Pedersen, Channel Account Manager

Alice Teodorescu, Senior Product Marketing Manager

Mario Popescu, Product Marketing Specialist

Event recap

Build a smarter cloud vulnerability workflow - live

Learn how to build a streamlined, automated vulnerability management workflow, specifically designed for busy security teams operating in modern cloud infrastructures.

Discover what’s possible. Prove what’s real.

With proprietary tech and key experts in offensive security.

  • Trusted by 2,000+ teams in 119 countries

  • 6.3M+ scans in 2024 (1 every 5 seconds)

  • 611K scans run by pentest robots - because automation isn’t optional anymore

  • Benchmarked #1 for detection accuracy in public network assessment tests

Don't take our word for it

“Invaluable addition to my cybersecurity toolkit”

Pentest-tools is a very good PT and VA testing tool. Comprehensive features, intuitive UI and proven accuracy make it a must-have. Time-saving, user-friendly interface for all skill levels.

Source: Gartner Peer Reviews

"Simple, centralized vulnerability management platform with multiple tools"

We recently started using PenTest-Tools, this tool combines multiple scanners in one platform, which allows us to centralize our vulnerability management process into one place and manage it more easily. Additionally, this tool has an integration function to JIRA that helps us manage the findings more effectively. Furthermore, the support team is also very good by providing feedback and resolutions quickly.

Source: Gartner Peer Reviews

"Exploring the Versatility of Modern Vulnerability Detection Software"

It is a great tool for performing vulnerability scans, it offers a variety of detection and explotation scanners, it has customizable reports and it is very easy to use. It is the best cost-benefit option. It does not offer the ability to scan through agents or servers hosted in the clients infraestructure, it is only posible with VPN profile, so the scan engine is always on their side.

Source: Gartner Peer Reviews

Got questions or a use case to validate?

Shoot us a message at support@pentest-tools.com or partnerships@pentest-tools.com - or check out our Partner program. We love a challenge!

Technology vetted by industry specialists

Deloitte Fast 500 EMEA 2023 logo

Deloitte Fast 500 EMEA 2023

Based on revenue growth

Deloitte Fast 50 logo

Deloitte Fast 50 CE 2022

Companies to watch

SC Awards 2022 logo

SC Awards 2022

Best Vulnerability Management Solution (highly commended)

G2 awards spring 2025 high performer

Vulnerability scanning

G2 awards spring 2025 fastest implementation

Dynamic Application Security Testing

G2 awards spring 2025 easiest to use

Website Security