Hire the best Kali Linux Freelancers in Dhaka, BD

Check out Kali Linux Freelancers in Dhaka, BD with the skills you need for your next job.
  • $39 hourly
    👩‍🚒Certifications that I hold👨‍🚒 🎯Certified Ethical Hacker(CEH) 🎯Certified Appsec Practitioner(CAP) 🎯Certified Network Security Practitioner(CNSP) 🎯Certified Penetration Tester(CPT) 🎯Certified Vulnerability Assessor(CVA) 🎯ISO 27001:2022 Certified Lead Auditor ---------------------------------------- Experiences: Penetration Testing ---------------------------------------- In the past couple of years, I have done more than 100 penetration tests and security assessments. Most are web applications, APIs, and mobile (iOS, Android) applications. I also pen-test the applications based on SOC 2, ISO 27001:2022, HIPAA, and PCI DSS compliance to fulfill the compliance requirements. ------------------------------------------------ Experiences: Blue Team Activists ------------------------------------------------ In my blue team activists, I did more than 50 projects related to Digital Forensics Investigations, Incident Handling, Malware analysis, SIEM, EDR, DLP and SOC. ----------------------------------------------- Experiences: Cyber Security Training ----------------------------------------------- I also trained more than 1 million people in Cyber security, such as Ethical Hacking, Certification training, Bug Hunting, CTF, API Penetration Testing, Mobile Penetration Testing, System Penetration Testing, Information Security , Cyber Attacks and Defense. ------------------------------------------------ My Penetration Testing Services (VAPT) ------------------------------------------------ ✅ Web Applications Penetration Testing ✅ API Penetration Testing ✅ Mobile Application (Android, iOS) Penetration Testing ✅ Network Penetration Testing ✅ Cloud Penetration Testing ✅ IoT Penetration Testing ---------------------------------------------------------------- My Digital Forensics and Incident Responses Services ---------------------------------------------------------------- ✅Malware Analysis ✅Analysis of Forensics Evidence ✅ Writing a Forensic Report ✅ Recover Deleted Files & Corrupted Files ✅ .exe, .img, .E01, .ova,.raw etc & any other file types analysis ✅ Log Analysis & Report Issues ✅ Security Incident Response ✅ Network Forensic and Monitoring ✅Email fraud and spam email Analysis ✅ Vulnerability Analysis on OS & Risk Assessment ✅ Online Tracking and monitoring of fraud activities ✅Cybercrime Investigations ✅Data Recovery and Analysis ✅ Corporate Cybersecurity Consultation ---------------------------------------- My Security Audit (GRC) Services ---------------------------------------- ✅ ISO 27001:2022 ✅ SOC 2 ✅ PCI DSS ----------------------------------------- My Training Services and Courses ------------------------------------------ ✅ Ethical Hacking ✅ CEH Practical Exam Preparation Training ✅ CPENT Exam Preparation Training ✅ CTF and Bug Hunting Training ✅ Corporate Cyber Security Training ✅ Hack the box challenge solve Why Hire Me? 🔥 I did more than 100 Professional Penetration tests and Security Assessments 🔥I hold professional certifications (CEH, ISO 27001:22, CAP, CNSP, CV) 🔥 National Runner Up CTF Player and Bug Hunter 🔥 I will provide a details and clear pen-testing report 🔥 A Researcher and Learner 🔥 Professional Work at a Lower cost. 🔥 24 hours super express Delivery (If needed) 🔥100% Satisfaction Overall, I work in projects according to my client desire and satisfaction. I always respect my client desire and maintain my ethics, never share or disclose any information with others.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    WordPress Security
    Cybersecurity Tool
    Cyber Threat Intelligence
    Web App Penetration Testing
    Network Penetration Testing
    Penetration Testing
    Website Security
    Cryptography
    Ethical Hacking
  • $30 hourly
    ✔Top Rated✔5 years of industry expertise ✔100% Job Success Score ✔Reporting with mitigation ✔100s of pentest experience ✔Developer collaboration ✔Equipped with industry leading tools ✔Software Development Background What I Can Do For You: ---------------------------- → Deep vulnerability assessment and penetration testing. → Generate high-quality visual reports with graphical stats on your security status. → Easy-to-follow remediation recommendations for vulnerabilities. → Secure your application from breaches, prioritizing Critical and High issues. → Identify attack chains before or after a security breach. → Manual plus automated approach to hunt down every vulnerability that exists. → Reporting with Real-life attack scenarios with impact and CVSS scoring. → Test for the latest CVEs relevant to your technology stack. → Secure code review to identify and fix security loopholes. → Full Black Box, Grey Box, and White Box Penetration tests. → Provide PCI-DSS, GDPR, SOC 2, ISO 27001, NIST, HIPAA compliant pentest reports. → Collaborate with your developers to help them implement fixes. → Free re-test after fixes to ensure no bypasses. Vulnerabilities My Test Covers: ------------------------------------- My manual testing checks(200+) draw from OWASP, PTES, OSSTMM, and 5 years of hands-on penetration testing and vulnerability assessment experience. It covers: → Injection flaws (SQLi, XXE, XSS, RCE, CSRF, etc.) → Sensitive information leaks → Broken authentication and session management → SSRF vulnerabilities → File upload vulnerabilities → Security misconfigurations → Broken access control → Insecure deserialization → API vulnerabilities (BOLA, key exposure, injections, SSRF) → Insecure communications → Race conditions → Client-side vulnerabilities → Business logic flaws → Security bypass (WAF evasion,403 Bypass, etc.) Tools I Use Most: --------------------- OS: Kali Linux Toolkit: Nuclei, Nmap, Nessus, bloodhound, OWASP Amass, PowerSploit, Nikto, gobuster, FFUF, sqlmap, Mimikatz, commix, SharpHound, Metasploit, subfinder, subdomainer, xsser, HTTPX, GAU, httprobe, eyewitness, dalfox, wafw00f, socat, wpscan, Nikto and custom wordlists for dictionary brute forcing and fuzzing. Sometimes I write my scripts with Bash, and Python according to my needs. About me: ------------- With 10 years of combined experience, including involvement in hacktivist groups, I bring 5 years of White Hat Hacker expertise as a fintech penetration test lead and founding member of a Security Operation Center (SOC). My background spans Bug Bounty Hall Of Fames, Laravel-PHP development, and proficiency in offensive and defensive security strategies, complemented by participating in Capture The Flag (CTF) competitions. I have worked with organizations like- HSBC Bank, Metlife, Old Mutual, Bangladesh Bank projects, Bangladesh Govt., SSLCOMMERZ, etc. What My Clients are saying: 1. "Awesome experience. It was a pleasure working with Iftekharul." ⭐⭐⭐⭐⭐ - Saurabh 2. "As a Penetration Tester he truly stood out"⭐⭐⭐⭐⭐ - Komol Given my extensive experience in penetration testing and application security, I can surely add significant value to your organization by identifying and mitigating vulnerabilities and enhancing your overall security posture. I look forward to the opportunity to work with you! Shoot me a message today to be secured. Take a look at some of my work below 👇
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Web Application Security
    Application Security
    Security Assessment & Testing
    Web App Penetration Testing
    Black Box Testing
    Network Penetration Testing
    Website Security
    Security Testing
    Network Security
    Vulnerability Assessment
    Information Security
    Security Analysis
    Penetration Testing
    Ethical Hacking
  • $55 hourly
    Hello, I am Amena, a dedicated Penetration Tester, Ethical Hacker, and Cyber Security Expert and Cryptocurrency Investigator with a proven track record of conducting and leading numerous security audits, penetration tests, and red team engagements. Throughout my career, I have worked with a diverse range of clients, including multinational corporations, startups, and small businesses, all seeking to enhance their security posture and gain a competitive edge. My expertise lies in the field of Penetration Testing, Cyber Security, and Vulnerability Assessment. I possess extensive hands-on experience in these areas, enabling me to develop a deep understanding of the most prevalent and cutting-edge technology stacks utilized globally, as well as their associated security vulnerabilities. I offer the following services: ✅ Penetration Testing Engagement ✅ I provide comprehensive manual testing and automated assessment for websites, applications, servers, and infrastructure within the defined scope. Leveraging professional tools like BurpSuite Professional and Nessus, as well as my own collection of scripts and tools, I deliver thorough results. Additionally, I conduct internal penetration tests and network infrastructure assessments. ✅ Professional Report & Statistics ✅ Each discovered vulnerability is meticulously documented in a detailed report, outlining the step-by-step exploitation and discovery methodology. The report includes proof-of-concept screen captures, full requests and responses, CVSS v3.0 risk scores, impact assessment, and ownership attribution. ✅ Remediation Advice & Guidance ✅ I offer actionable recommendations for addressing identified security issues, providing guidance on effective fixes and highlighting associated risks and impacts. ✅ Asset Discovery ✅ Employing active and passive techniques, I help assess your organization's digital footprint and external attack surface. This includes subdomain enumeration and service/port discovery. ✅ Free Checkup ✅ As part of the service, I conduct a retest of previously identified vulnerabilities to ensure the effectiveness of implemented security controls and fixes, thereby minimizing any potential bypass or exploitation risks. ✅ OSINT Reconnaissance ✅ I leverage Open Source Intelligence (OSINT) techniques to gather valuable data about your company available on the internet. This includes identifying breached email addresses and associated passwords traded on the dark web. With access to over 4 billion personally curated records, I can help you assess your vulnerability and determine which passwords require immediate change. ✅ Briefing ✅ I am available for calls or meetings to discuss the Scope of Work, focus areas for the penetration testing engagement, inclusion of subdomains, engagement type (black-box or white-box), account requirements, preferred load testing hours, and any additional guidance needed, particularly for organizations new to penetration testing. ✅ Debriefing ✅ After completing the penetration test, I am available for calls or meetings to review the engagement results, discuss main findings, and address any concerns regarding your company's security. I provide further clarification on vulnerabilities and their associated risks and impacts. ✅Cryptocurrency Investigator✅ Experienced cryptocurrency investigator with a keen eye for tracing digital financial transactions, offering expertise in uncovering fraudulent activities and ensuring compliance in the blockchain ecosystem. Dedicated to safeguarding the integrity of cryptocurrencies, I bring a wealth of knowledge in blockchain forensics and risk assessment, providing invaluable insights for clients in the ever-evolving world of digital finance. If you seek a skilled and experienced Penetration Tester, Ethical Hacker, and Cyber Security Expert, Cryptocurrency Investigator, I am ready to assist you in fortifying your digital defenses. Let's connect and discuss how we can ensure the security of your valuable assets.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    WordPress
    Web App Penetration Testing
    Security Analysis
    Web Application Security
    Black Box Testing
    OWASP
    Risk Assessment
    Information Security Awareness
    Network Penetration Testing
    Security Assessment & Testing
    Information Security
    Penetration Testing
    Vulnerability Assessment
    Security Testing
  • $20 hourly
    I am an Ethical Hacker and Penetration tester who has been providing security and test results as a report for corporations and individuals. "Ethical Hacking - Securing PC & mobile, running tests for vulnerabilities & server-side security (7+ experience)" Server Security Misconfiguration -Hardening -Broken Authentication and Session Management -Insecure OS/Firmware -Broken Cryptography -Automotive Security Misconfiguration -Sensitive Data Exposure -Cross-Site Scripting (XSS) -Cross-Site Request Forgery (CSRF) -Application-Level Denial-of-Service (DoS) -Insecure OS/Firmware -Server-Side Injection -Client-Side Injection -Sensitive Data Exposure -Malware Detected -Location Tracking Expert in 1. Hardening operating system ( Windows and Linux) 2. Penetration Testing of web applications with the report and mitigation suggestion. 3. Total security assessment of the Application. 4. Code analysis Static and Dynamic with the recommendation for mitigation. 5. Backdoor script identification and remove 6.Hidden link removal 7. WordPrass best security enhancement, firewall integration 8. Linux server administration, security, firewall 9. DDoS mitigation, firewall (Cloudflare, CSF) 10. Domain/email blacklist removal Security Incident Response: ✔️ Get access information, and begin the investigation immediately. ✔️ Identify the source of an intrusion, and fix the vulnerability. ✔️ Clean up malware, and recover the website. ✔️ Implement advanced security measures. ✔️ Frequently update the client with the current status. ✔️ Keep track of all actions performed, and provide a full audit report. You can contact me for a free consultation, or website health checkup, and explore if we’d be a good fit to work together. Let me help you fix your website and make sure it’s 100% clean and protected from security threats
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    NIST Cybersecurity Framework
    Web Development
    ISO 27001
    Penetration Testing
    Web App Penetration Testing
    Linux System Administration
    AWS OpsWorks
    DevOps
    Web Application Security
    SSL
    WordPress Malware Removal
    Ethical Hacking
    Vulnerability Assessment
  • $10 hourly
    hi i am an ethical hacker and a professnoal bug bounty hunter ..........................................................
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Ethical Hacking
    Bug Bounty
    Penetration Testing
    Vulnerability Assessment
  • $20 hourly
    This is Asif here. I am an experienced tech support specialist with 4+ years of experience in Client-end troubleshooting, remote troubleshooting with Microsoft Windows, Office (On-prem & 365), Computer Networking, Cybersecurity, Malware Removal, System Optimization, and Recovery. I listen to your problems and deploy my core skills to eliminate your technical difficulties. I am ready to help you with all of the following offerings: - IT Support & Administration - IT Project Management - Technical Documentation - Cybersecurity Assessment
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Cybersecurity Management
    Microsoft Visio
    Google Workspace Administration
    Cloud Computing
    Android
    Windows 10 Administration
    Red Hat Administration
    DNS
    Office 365
    DHCP
    Microsoft Azure
  • $70 hourly
    Hi I'm MD Fahim ( @pentester_mdfahim / 3df4h13010 ). I'm a Cybersecurity Researcher And Software Penetration Tester. With professional experience in corporate cybersecurity field. I have successfully identified vulnerabilities and secured many systems for my clients. As a freelancer I worked on many projects, showcasing expertise in : Web Application Penetration Testing (VAPT), Digital Forensics, Reverse Engineering, OSINT, Malware Remove & Software Security. OWASP Top 10 Vulnerability Assessment and Cybersecurity risk management. Although my major skill is in cybersecurity, But I also have soft skills in Web Application Development, Android and iOS App Development. My skill set, dedication, and commitment to staying updated with the latest trends, pull me continuously in the field of cybersecurity. Client Satisfaction is My first Priority: I'm passionate about exceeding client expectations and fostering long-term partnerships. I'll work closely with you to understand your specific needs and deliver a solution that safeguards your valuable digital assets. Proven Track Record: My experience as a Cyber Security Researcher, combined with my freelance work, has equipped me to handle complex security challenges. I'm meticulous, detail-oriented, and committed to clear communication throughout the project lifecycle. Ready to Collaborate? Let's discuss how I can help you strengthen your website security and ensure data protection. Feel free to browse my Upwork profile for detailed service packages or contact me for a custom quote. I'm here to provide you expert solutions with cybersecurity. Thank you.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Web Testing
    Web Development
    Ethical Hacking
    Digital Forensics
    Vulnerability Assessment
    Web Application Security
    Web App Penetration Testing
    Android App Development
    OS Security
    Windows Administration
    Linux System Administration
    Network Penetration Testing
    System Security
    Penetration Testing
  • $30 hourly
    🔒 𝐈𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 🛡️ 𝐏𝐞𝐧𝐞𝐭𝐫𝐚𝐭𝐢𝐨𝐧 𝐓𝐞𝐬𝐭𝐢𝐧𝐠 🌐 𝐖𝐞𝐛 𝐀𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 📱 𝐌𝐨𝐛𝐢𝐥𝐞 𝐀𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 📝 𝐈𝐓 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐏𝐨𝐥𝐢𝐜𝐲 🔍 𝐕𝐮𝐥𝐧𝐞𝐫𝐚𝐛𝐢𝐥𝐢𝐭𝐲 𝐀𝐬𝐬𝐞𝐬𝐬𝐦𝐞𝐧𝐭 Hello, I’m Delwar Alam, an Information Security Expert with over 5 years of experience. I have completed more than 100 penetration tests and security assessments, specializing in web and mobile applications in the finance sector. Throughout my career, I have become proficient in various technologies and frameworks such as J2EE, ASP, and PHP. My work includes understanding all common attack vectors and implementing effective mitigation techniques. My qualifications include OSCP Penetration Testing with Kali Linux and Certified Ethical Hacker (CEH) v.10. I am dedicated to providing top-notch IT Security services while maintaining professionalism. 🔒 𝐈𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 Experienced in safeguarding data through the implementation of robust security measures and practices. 🛡️ 𝐏𝐞𝐧𝐞𝐭𝐫𝐚𝐭𝐢𝐨𝐧 𝐓𝐞𝐬𝐭𝐢𝐧𝐠 Conducting thorough penetration tests to identify vulnerabilities in web and mobile applications. 🌐 𝐖𝐞𝐛 𝐀𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 Ensuring web applications are secure from potential threats through comprehensive security assessments and reporting. 📱 𝐌𝐨𝐛𝐢𝐥𝐞 𝐀𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 Specializing in securing mobile applications by testing for security flaws across various platforms. 📝 𝐈𝐓 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐏𝐨𝐥𝐢𝐜𝐲 Creating detailed and effective IT security policies to safeguard organizational data and compliance. 🔍 𝐕𝐮𝐥𝐧𝐞𝐫𝐚𝐛𝐢𝐥𝐢𝐭𝐲 𝐀𝐬𝐬𝐞𝐬𝐬𝐦𝐞𝐧𝐭 Identifying and evaluating vulnerabilities in IT systems to prevent potential security breaches. 𝐒𝐨𝐫𝐫𝐲, 𝐈 𝐚𝐦 𝐧𝐨𝐭 𝐚𝐛𝐥𝐞 𝐭𝐨 𝐥𝐨𝐜𝐚𝐭𝐞 𝐲𝐨𝐮𝐫 𝐠𝐢𝐫𝐥𝐟𝐫𝐢𝐞𝐧𝐝, 𝐫𝐞𝐜𝐨𝐯𝐞𝐫 𝐲𝐨𝐮𝐫 𝐥𝐨𝐬𝐭 𝐅𝐀𝐂𝐄𝐁𝐎𝐎𝐊, 𝐆𝐌𝐀𝐈𝐋, 𝐘𝐀𝐇𝐎𝐎, 𝐞𝐭𝐜. 𝐚𝐜𝐜𝐨𝐮𝐧𝐭, 𝐨𝐫 𝐟𝐢𝐧𝐝 𝐲𝐨𝐮𝐫 𝐥𝐨𝐬𝐭 𝐩𝐡𝐨𝐧𝐞. 𝐏𝐥𝐞𝐚𝐬𝐞 𝐝𝐨 𝐧𝐨𝐭 𝐢𝐧𝐯𝐢𝐭𝐞 𝐦𝐞 𝐭𝐨 𝐬𝐮𝐜𝐡 𝐣𝐨𝐛𝐬. Before I start offensive tests, I may ask you for evidence that you are the site owner or to show me that you have admin access. If you are looking for an expert to enhance your cybersecurity posture, let’s connect and discuss how I can help your business.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    WordPress Malware Removal
    Website Security
    Certified Information Systems Security Professional
    Security Engineering
    Web Application Security
    Information Security Audit
    Security Analysis
    Web App Penetration Testing
    Information Security
    AT&T Cybersecurity
    Vulnerability Assessment
    Malware Removal
    Penetration Testing
  • $10 hourly
    I use reliable logging tools, but most of the work is done by hand which means the result will be more accurate and effective. To make sure I really tested your website you will find videos, screenshots to prove that. I will check on: Source Code Audit Recover Hacked Website Finding Web Server Security Issues Email Security Web Application Security Issues [EX: SQLI, RCE, SSRF, CSRF, XSS etc.] REST API Analysis Risk and Gap Analysis Load balancing Penetration Network , firewall Local and remote penetration System vulnerability Checking network security Detection and prevention Form data validation Cookies and headers/bodies Backdoors Authentication Infrastructure and hardware checking Optimize, usability MIS performance API testing Integrated security framework Product integration testing Database/modules interdependencies Source code audit Software quality assurance Initiate, institute business requirements Client approvals Report analysis Inception report Assessment report Final report Examination in accordance with OWASP guidelines. Entry test methods are tradeoffs between speed, efficiency and installation. In general, the black box entry test is the fastest type of entry test. However, the limited information available from testers increases the likelihood that risk is being ignored and reduces the effectiveness of the test, because testers do not have the information needed to identify their attacks for high-value or potentially vulnerable purposes. The gray box test performs a small trade in speed compared to the black box test to ensure efficiency and increase. The acquisition of structural documentation allows testers to be more focused on their efforts and internal network access enhances analytical coverage especially compared to black box testing, where testers will not detect risk that gives them access within the network perimeter. The white box test is a slow and detailed way to breathe. The vast amount of information obtained by local retailers takes time to process; however, a higher level of access enhances the likelihood that both the internal and external vulnerabilities that are expected will be identified and addressed.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Information Security
    Malware Removal
    Application Security
    Security Assessment & Testing
    Metasploit
    Bug Fix
    Bug Tracking & Reports
    Penetration Testing
    Vulnerability Assessment
    WordPress Malware Removal
    Ethical Hacking
    Web App Penetration Testing
    Network Security
  • $70 hourly
    I am an Ethical Hacker (White Hat Hacker). I am certified Kali Linux Ethical Hacking and Penetration Testing. MY SKILLS INCLUDE - System Hacking & Prevention - Man in the Middle Attack & Prevention - Network Scanning - Web App Testing (SQLi, XSS, RFI/LFI, OWASP TOP 10 etc) - Website Penetration (Bug Reporting and Exploting) - Vulnerability Assessment - Malware Removed (From Any Website) - Hacked account recovery, - HACKED WEBSITE RECOVERY - Password recovery. - Security analysis. - Security Audit - Wireless Security (Aircrack-ng suite, ARP Spoofing, Honey Pots etc) Android Phone Hacking & Prevention I have good analytical skills. I can deliver best result in given time and under strict deadlines. I am a passionate and hard working freelancer. 100% Client's satisfaction is my main Goal. Quality and accuracy is the thing that can not provide everyone. If you would like high quality work and 100% accuracy work with a fast turn around for a fair price, You can contact me. You won't be disappointed.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Blockchain, NFT & Cryptocurrency
    Web Application Security
    System Administration
    Ethical Hacking
    Internet Security
    Security Engineering
    Blockchain Security
    Python
    Information Security
    Firewall
    Network Security
    Database Security
    Vulnerability Assessment
    Penetration Testing
  • $70 hourly
    I am an Ethical Hacker (White Hat Hacker). I am certified Kali Linux Ethical Hacking and Penetration Testing. MY SKILLS INCLUDE - System Hacking & Prevention - Man in the Middle Attack & Prevention - Network Scanning - Web App Testing (SQLi, XSS, RFI/LFI, OWASP TOP 10 etc) - Website Penetration (Bug Reporting and Exploting) - Vulnerability Assessment - Malware Removed (From Any Website) - Hacked account recovery, - HACKED WEBSITE RECOVERY - Password recovery. - Security analysis. - Security Audit - Wireless Security (Aircrack-ng suite, ARP Spoofing, Honey Pots etc) Android Phone Hacking & Prevention I have good analytical skills. I can deliver best result in given time and under strict deadlines. I am a passionate and hard working freelancer. 100% Client's satisfaction is my main Goal. Quality and accuracy is the thing that can not provide everyone. If you would like high quality work and 100% accuracy work with a fast turn around for a fair price, You can contact me. You won't be disappointed.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Blockchain, NFT & Cryptocurrency
    Web Application Security
    System Administration
    Ethical Hacking
    Internet Security
    Security Engineering
    Blockchain Security
    Python
    Information Security
    Firewall
    Network Security
    Database Security
    Penetration Testing
    Vulnerability Assessment
  • $30 hourly
    I m having experience in Web-app security, Mobile app security, API security, Vulnerability Assessment & Penetration Testing. I am experienced with tools like burp suite,acunetix, Nessus, IBM AppScan, Nmap, Pentest tools, Frida, Drozer and of course with Kali Linux & some GitHub open source tools like Amass, Aquatone…etc many more for finding the vulnerabilities in the web application and mobile application.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Bitcoin
    Ethical Hacking
    Digital Forensics
    Network Penetration Testing
    HackerRank
    Facebook
    Malware Removal
    Bug Investigation
    Cryptocurrency
    Virus Removal
    Penetration Testing
  • $70 hourly
    I am an Ethical Hacker (White Hat Hacker). I am certified Kali Linux Ethical Hacking and Penetration Testing. MY SKILLS INCLUDE - System Hacking & Prevention - Man in the Middle Attack & Prevention - Network Scanning - Web App Testing (SQLi, XSS, RFI/LFI, OWASP TOP 10 etc) - Website Penetration (Bug Reporting and Exploting) - Vulnerability Assessment - Malware Removed (From Any Website) - Hacked account recovery, - HACKED WEBSITE RECOVERY - Password recovery. - Security analysis. - Security Audit - Wireless Security (Aircrack-ng suite, ARP Spoofing, Honey Pots etc) Android Phone Hacking & Prevention I have good analytical skills. I can deliver best result in given time and under strict deadlines. I am a passionate and hard working freelancer. 100% Client's satisfaction is my main Goal. Quality and accuracy is the thing that can not provide everyone. If you would like high quality work and 100% accuracy work with a fast turn around for a fair price, You can contact me. You won't be disappointed.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Blockchain, NFT & Cryptocurrency
    Web Application Security
    System Administration
    Ethical Hacking
    Internet Security
    Security Engineering
    Blockchain Security
    Python
    Penetration Testing
    Network Security
    Database Security
    Information Security
    Vulnerability Assessment
    Firewall
  • $15 hourly
    ✅ 7+ Years Pentesting ✅Supporting All Time Zones Any Where ✅ Unlimited Revisions ✅ Working In Try Hack Me Are you looking for a professional ethical hacker to conduct a security audit or penetration test for your company? Look no further! With years of experience and a deep understanding of modern technology stacks and their vulnerabilities, I am well-equipped to provide high-quality penetration testing services to a wide range of clients. 🎯 Why Hire Me for Your Digital Security Needs? 1........🔒 Extensive Experience I have conducted and led hundreds of security audits, penetration tests, and red team engagements for a variety of companies, giving me a wealth of hands-on experience in the field. 2........🔍 Comprehensive Cybersecurity Services My services include comprehensive penetration testing, detailed reporting, expert remediation advice, asset discovery and mapping, follow-up checkups, OSINT reconnaissance, consultations and briefings, and post-engagement debriefings. 3........🔑 Customized Security Solutions I provide personalized, tailored services to each of my clients, taking the time to understand their unique needs and requirements. 4.........🛡️ Professionalism and Expertise I am an ethical hacker and have a deep understanding of modern technology stacks and their vulnerabilities. I use professional software and tools, as well as personal scripts and techniques, to ensure the accuracy and thoroughness of my work. 5........📞 Clear communication I am available for meetings and calls to discuss the scope of work, the focus of the engagement, and any other questions or concerns you may have. I also provide post-engagement debriefings to ensure that you understand the results of the engagement and any potential security risks. Ready to secure your business? Let's fortify your cybersecurity defenses together. Contact me today to schedule a consultation and discover how my services can safeguard your business from evolving cyber threats. Looking forward to working with you and make the world safer.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Computing & Networking
    Malware Detection
    Network Mapper
    Security Management
    Security Analysis
    Wireless Security
    Phishing Detection
    Network Penetration Testing
    Reverse Engineering
    Web Application Security
    Security Testing
    Ethical Hacking
    Penetration Testing
    Cybersecurity Management
  • $10 hourly
    fast worker fast learner and cooperative___ Ensure the security of your systems with my professional penetration testing services. I specialize in identifying and addressing vulnerabilities in your networks, websites, and applications. By conducting thorough security assessments, I can help you strengthen your defenses and protect your data from cyber threats. Protect your business from cyber threats with my ethical hacking services. I offer professional penetration testing and security assessments to identify and fix vulnerabilities in your systems. With years of experience in cybersecurity, I can help you safeguard your data and maintain a secure online presence. Simplify your data gathering process with my professional web scraping services. Whether you need market research data, competitor analysis, or product information, I can extract and deliver the data you require efficiently. Let me help you streamline your data collection process with accurate and reliable web scraping solutions.Transform your website with engaging and persuasive copy that resonates with your audience. As a professional website copywriter, I specialize in creating captivating content.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Video Editing & Production
    Logo
    Photo Editing
    Technical Project Management
    Web Crawling
    Research Documentation
    Data Extraction
    Logo Design
    Ethical Hacking
    Web Scraping
    Lead Generation
    Tech & IT
    Content Distribution & Promotion
    Penetration Testing
  • $10 hourly
    As a seasoned cybersecurity expert, I specialize in safeguarding digital infrastructures and ensuring data integrity across various industries. With a deep understanding of threat detection, vulnerability assessments, and advanced security protocols, I help organizations protect their sensitive information from cyber-attacks. My expertise spans across network security, cloud protection, encryption methods, and ethical hacking, providing businesses with comprehensive defense strategies. I am passionate about staying ahead of emerging threats and continuously adapting to the evolving cybersecurity landscape. Through hands-on experience and continuous learning, I develop innovative solutions that prevent breaches, ensure compliance with global standards, and foster a culture of security awareness. Whether it's implementing firewalls, conducting penetration testing, or leading incident response efforts, I am dedicated to fortifying digital ecosystems, making cyberspace safer for everyone.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Web App Penetration Testing
    Network Penetration Testing
    Penetration Testing
    Bash Programming
    Digital Forensics
    CyTrack Intelligence Systems CyCC
    Cybersecurity Management
    Information Security
    Government Reporting Compliance
    Computing & Networking
    Computer Network
    Network Engineering
    Database
    Database Management
  • $20 hourly
    Greetings!  I have more than 3 years experience in Cyber Security and have developed skills in several key areas, including Penetration Testing, Web App Penetration Testing, Network Penetration Testing, OSINT, Malware Removal, Vulnerability Assessment & Penetration Testing. Armed with a Bachelor's in Computer Science and Engineering. ▶️ Services That I Provide ☑️Web Application Penetration Testing and Reporting ☑️Malware Analysis and Removal ☑️OWASP Vulnerability Testing and Reporting ☑️Security Analytics ☑️API Penetration Testing and Reporting ☑️Vulnerability Assessment ☑️Network Penetration Testing and Reporting ☑️Website security ☑️Vulnerability Detection ☑️Provide a Detailed report on Penetration Testing ☑️Cyber Crime Investigation ☑️Email Investigations Report  ☑️Recover Deleted Files ☑️Images, Video, Audio Files ☑️ OSINT ☑️Ethical Hacking and Cyber Security Corporate Training 🚁  Why Hire Me? 🔥 I'm a C)VA: Certified Vulnerability Assessor-Mile2,                C)SA1: Certified Security Awareness 1-Mile2,                NSE 1 Network Security Associate-Fortinet,                Certified AppSec Practitioner (CAP)-The SecOps Group,                Ethical Hacking Essentials (EHE)-EC-Council. 🔥 I will provide details and a clear pen-testing report. 🔥 I'm a  Cyber Security Researcher and learner. 🔥 Professional work at a lower cost. 🔥 24 hours super express delivery (if needed), 🔥100% Satisfaction. In general, I complete tasks in accordance with the needs and preferences of my clients. I never discuss or reveal any information with third parties, I always respect my clients' wishes, and I uphold my ethics.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Cyber Threat Intelligence
    Cybersecurity Tool
    Network Engineering
    Malware Detection
    Malware Removal
    WordPress Malware Removal
    Vulnerability Assessment
    Website Security
    Ethical Hacking
    Network Penetration Testing
    Web App Penetration Testing
    Penetration Testing
    Information Security
  • $5 hourly
    Database server setup like Mysql,DB2, Oracle,PHPMyAdmin webserver like apache,IIS,Nginx TFTP server Mail server setup FTP server setup SFTP server Proxy server Syslog server IP routing process (EIGRP, OSPF, STATIC, BGP) IP services (DHCP, NAT, PAT, ACL, NTP) HSRP,VRRP,GLBP NMS servers like Zabbix,observium,Nagios Internet VPN ( site-to-site VPN, client VPN) Device security using AAA with TACACS+ and RADIUS Palo Alto Firewalls, Cisco ASA, Fortigate, Juniper Nessus,acunetix, burp suite,NMAP, kali, Metasploit,HPing3
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    System Administration
    CentOS
    Information Security
    Nagios Core
    NGINX
    Penetration Testing
    Vulnerability Assessment
    Palo Alto Firewalls
    Network Administration
    MySQL
    Cisco Router
    Ubuntu
    Network Security
  • $20 hourly
    Myself Hasan.I can do penetration testing and find vulnerabilities. I can help you in Website management and security.i can recover Instagram/Facebook/gmail account.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Penetration Testing
    Ethical Hacking
  • $9 hourly
    Professional Summary: Experienced IT Infrastructure Manager with over 23 years of expertise in managing and optimizing IT systems and networks. Proven track record in leading remote teams, implementing cloud solutions, and ensuring cybersecurity. Adept at strategic planning, project management, and improving infrastructure efficiency.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Red Hat Enterprise Linux
    Backup
    Disaster Recovery
    Windows 11 Administration
    Cloud Migration
    Microsoft Azure
    Office 365
    Windows Server
    Customer Support
    Cisco
    Fortinet
    Group Policy
    Microsoft Active Directory
  • $20 hourly
    Hello, I am a highly skilled and experienced Ethical Hacker and Cybersecurity Programmer with a proven track record of identifying and mitigating vulnerabilities. Over the past year, I have worked with 8 companies as a Bug Hunter, helping them enhance their security posture and protect their digital assets. Skills: Ethical Hacking: Proficient in tools like Metasploit, Burp Suite, Nmap, Wireshark, and more. Penetration Testing: Network, web application, mobile app, and social engineering assessments. Vulnerability Assessment: Identifying and reporting security weaknesses. Red Teaming: Simulating real-world attacks to test security defenses. Programming: Proficient in Python, Ruby, and other languages for automation and scripting. Certifications: Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), Certified Information Systems Security Professional (CISSP), CompTIA Security+. Why Choose Me? Expertise: Over a year of hands-on experience in ethical hacking and cybersecurity. Attention to Detail: Thorough and meticulous approach to ensure no vulnerability goes unnoticed. Communication: Clear and concise reporting, ensuring clients understand the implications and solutions. Commitment: Dedicated to helping clients achieve the highest level of security.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Security Assessment & Testing
    Vulnerability Assessment
    Digital Forensics
    Cybersecurity Monitoring
    Malware Detection
    Red Team Assessment
    Metasploit
    Cybersecurity Management
    Bug Bounty
    Penetration Testing
    Bunting
    Cyber Threat Intelligence
    Network Security
    Ethical Hacking
  • $20 hourly
    With over six years of experience as an Information Security Officer and Team Leader at a leading Private Commercial Bank, I bring a wealth of expertise in protecting critical assets and ensuring organizational cybersecurity resilience. My core strengths include: • Vulnerability Assessment & Penetration Testing • API Security Testing • Web & Android Application Functional & Security Testing • Malware Analysis & Digital Forensics • SIEM Implementation & Management (ELK, Wazuh, Kibana, etc.) • Cybersecurity Policy Development In addition to my hands-on experience in the banking sector, I am also a part-time lecturer in a Masters in Cyber Security program, where I train the next generation of cybersecurity professionals, focusing on real-world, practical applications. What I can offer: • Robust security testing to identify and mitigate vulnerabilities • Expert forensic analysis and malware investigation • Comprehensive API, web, and mobile app security testing • Custom cybersecurity policies and compliance strategies • Efficient deployment and management of SIEM solutions for incident detection and response • Troubleshooting and resolving any security-related issues • Completion of cybersecurity assignments and academic tasks If you're looking for a dedicated cybersecurity professional with a strong technical background and real-world expertise, I'm here to help secure your business. Let's work together to keep your systems safe and resilient.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Ethical Hacking
    Policy Writing
    API Testing
    Risk Assessment
    Network Penetration Testing
    Web Application Security
    Digital Forensics
    Information Security
    Application Security
    Security Assessment & Testing
    Database Security
    Penetration Testing
    Vulnerability Assessment
  • Want to browse more freelancers?
    Sign up

How hiring on Upwork works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

How do I hire a Kali Linux Freelancer near Dhaka, on Upwork?

You can hire a Kali Linux Freelancer near Dhaka, on Upwork in four simple steps:

  • Create a job post tailored to your Kali Linux Freelancer project scope. We’ll walk you through the process step by step.
  • Browse top Kali Linux Freelancer talent on Upwork and invite them to your project.
  • Once the proposals start flowing in, create a shortlist of top Kali Linux Freelancer profiles and interview.
  • Hire the right Kali Linux Freelancer for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a Kali Linux Freelancer?

Rates charged by Kali Linux Freelancers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a Kali Linux Freelancer near Dhaka, on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance Kali Linux Freelancers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Kali Linux Freelancer team you need to succeed.

Can I hire a Kali Linux Freelancer near Dhaka, within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Kali Linux Freelancer proposals within 24 hours of posting a job description.