GIORGI DOGRASHVILI

PENETRATION TESTER | ETHICAL HACKER

🔝

$ whoami

Giorgi is a cybersecurity professional with hands-on expertise in penetration testing across a wide variety of digital environments. He’s worked on projects involving:

His skill set also includes OSINT techniques, providing a strategic layer to uncover "hidden" information about organizations.

With certifications and licenses described below, Giorgi holds internationally recognized credentials in the cybersecurity industry.

His knowledge extends to industry standards and frameworks such as:

He applies these frameworks to real-world projects and enriches them with experience and the latest insights from the global cybersecurity community.

Giorgi is also a registered contributor to the CVE program, with multiple publicly registered vulnerabilities.

Passionate about community involvement, he welcomes new connections and actively supports newcomers in cybersecurity—helping them start and grow their careers. He shares his research, publishes blogs, and reflects on lessons learned to give back to the community that helped him grow.

Known for his drive, responsibility, and commitment to continual improvement, Giorgi combines technical expertise with strong communication and collaboration skills—making him a valuable asset to any cybersecurity project.

Skills & Tools

Certifications

OSEP Certificate

OSEP – OffSec Experienced Penetration Tester

The Offensive Security Experienced Penetration Tester (OSEP) certification validates advanced penetration testing skills, including bypassing security defenses, evading antivirus, and exploiting hardened systems. It proves the ability to simulate real-world, complex attacks in a controlled environment.

OSCP Certificate

OSCP – Offensive Security Certified Professional

The Offensive Security Certified Professional (OSCP) certification demonstrates the ability to identify, exploit, and remediate vulnerabilities in various systems. It focuses on hands-on penetration testing, requiring candidates to complete a challenging 24-hour exam with real-world scenarios.

OSWP Certificate

OSWP – OffSec Wireless Professional

The Offensive Security Wireless Professional (OSWP) certification validates skills in attacking and securing wireless networks. It focuses on identifying vulnerabilities, cracking encryption, and implementing secure wireless configurations through hands-on testing in real-world scenarios.

eCPPT Certificate

eCPPT – Certified Professional Penetration Tester

The eLearnSecurity Certified Professional Penetration Tester (eCPPT) certification validates practical skills in penetration testing, including network, web app, and system exploitation. It emphasizes real-world scenarios, requiring candidates to perform full assessments and deliver professional reports.

eJPT Certificate

eJPT – Junior Penetration Tester

The eLearnSecurity Junior Penetration Tester (eJPT) certification validates foundational knowledge of penetration testing, networking, and basic exploitation. It focuses on hands-on skills in information gathering, scanning, enumeration, and vulnerability assessment in real-world scenarios.

CEH Certificate

CEH – Certified Ethical Hacker

The Certified Ethical Hacker (CEH) certification validates skills in identifying, analyzing, and mitigating cybersecurity threats. It covers ethical hacking techniques, tools, and methodologies used by attackers, preparing professionals to think like hackers and protect systems effectively.

CompTIA SEC+ Certificate

CompTIA Security+

CompTIA Security+ is a globally recognized certification that validates foundational cybersecurity skills. It covers key topics like network security, threats, vulnerabilities, risk management, and incident response, preparing professionals for entry-level security roles across various industries.

KLCP Certificate

KLCP - Kali Linux Certified Professional

The Kali Linux Certified Professional (KLCP) certification validates expertise in using Kali Linux for penetration testing and ethical hacking. It covers advanced skills in network scanning, vulnerability assessment, exploitation, and reporting, enabling professionals to perform effective security assessments with Kali Linux tools.

CVEs

CVE-2025-26264

CVE-2025-26264 - GeoVision GV-ASWeb with the version 6.1.2.0 or less, contains a Remote Code Execution (RCE) vulnerability within its Notification Settings feature. An authenticated attacker with "System Settings" privileges in ASWeb can exploit this flaw to execute arbitrary commands on the server, leading to a full system compromise.

CVE-2024-56901

CVE-2024-56901 - A Cross-Site Request Forgery (CSRF) vulnerability in Geovision GV-ASManager web application with the version 6.1.1.0 or less that allows attackers to arbitrarily create Admin accounts via a crafted GET request method. This vulnerability is used in chain with CVE-2024-56903 for a successful CSRF attack.

CVE-2024-56898

CVE-2024-56898 - Broken access control vulnerability in Geovision GV-ASManager web application with version v6.1.0.0 or less. This vulnerability allows low privilege users perform actions that they aren't authorized to, which can be leveraged to escalate privileges, create, modify or delete accounts.

CVE-2024-56902

CVE-2024-56902 - Information disclosure vulnerability in Geovision GV-ASManager web application with the version v6.1.0.0 or less, which discloses account information, including cleartext password.

CVE-2023-24709

In Paradox Security System IPR512 web panel, an unauthenticated user can input JavaScript string, such as "" that will overwrite configurations in the file "login.xml" and cause the login form to crash and make it unavailable.

CVE-2024-56903

CVE-2024-56903 - Geovision GV-ASManager web application with the version 6.1.1.0 or less allows attackers to modify POST request method with the GET againsts critical functionalities, such as account management. This vulnerability is used in chain with CVE-2024-56901 for a successful CSRF attack.

CVE-2025-26263

CVE-2025-26263 - GeoVision ASManager Windows desktop application with the version 6.1.2.0 or less, is vulnerable to credentials disclosure due to improper memory handling in the ASManagerService.exe process.

Contact