Hire the best Kali Linux Freelancers in Dhaka, BD
Check out Kali Linux Freelancers in Dhaka, BD with the skills you need for your next job.
- $39 hourly
- 5.0/5
- (16 jobs)
👩🚒Certifications that I hold👨🚒 🎯Certified Ethical Hacker(CEH) 🎯Certified Appsec Practitioner(CAP) 🎯Certified Network Security Practitioner(CNSP) 🎯Certified Penetration Tester(CPT) 🎯Certified Vulnerability Assessor(CVA) 🎯ISO 27001:2022 Certified Lead Auditor ---------------------------------------- Experiences: Penetration Testing ---------------------------------------- In the past couple of years, I have done more than 100 penetration tests and security assessments. Most are web applications, APIs, and mobile (iOS, Android) applications. I also pen-test the applications based on SOC 2, ISO 27001:2022, HIPAA, and PCI DSS compliance to fulfill the compliance requirements. ------------------------------------------------ Experiences: Blue Team Activists ------------------------------------------------ In my blue team activists, I did more than 50 projects related to Digital Forensics Investigations, Incident Handling, Malware analysis, SIEM, EDR, DLP and SOC. ----------------------------------------------- Experiences: Cyber Security Training ----------------------------------------------- I also trained more than 1 million people in Cyber security, such as Ethical Hacking, Certification training, Bug Hunting, CTF, API Penetration Testing, Mobile Penetration Testing, System Penetration Testing, Information Security , Cyber Attacks and Defense. ------------------------------------------------ My Penetration Testing Services (VAPT) ------------------------------------------------ ✅ Web Applications Penetration Testing ✅ API Penetration Testing ✅ Mobile Application (Android, iOS) Penetration Testing ✅ Network Penetration Testing ✅ Cloud Penetration Testing ✅ IoT Penetration Testing ---------------------------------------------------------------- My Digital Forensics and Incident Responses Services ---------------------------------------------------------------- ✅Malware Analysis ✅Analysis of Forensics Evidence ✅ Writing a Forensic Report ✅ Recover Deleted Files & Corrupted Files ✅ .exe, .img, .E01, .ova,.raw etc & any other file types analysis ✅ Log Analysis & Report Issues ✅ Security Incident Response ✅ Network Forensic and Monitoring ✅Email fraud and spam email Analysis ✅ Vulnerability Analysis on OS & Risk Assessment ✅ Online Tracking and monitoring of fraud activities ✅Cybercrime Investigations ✅Data Recovery and Analysis ✅ Corporate Cybersecurity Consultation ---------------------------------------- My Security Audit (GRC) Services ---------------------------------------- ✅ ISO 27001:2022 ✅ SOC 2 ✅ PCI DSS ----------------------------------------- My Training Services and Courses ------------------------------------------ ✅ Ethical Hacking ✅ CEH Practical Exam Preparation Training ✅ CPENT Exam Preparation Training ✅ CTF and Bug Hunting Training ✅ Corporate Cyber Security Training ✅ Hack the box challenge solve Why Hire Me? 🔥 I did more than 100 Professional Penetration tests and Security Assessments 🔥I hold professional certifications (CEH, ISO 27001:22, CAP, CNSP, CV) 🔥 National Runner Up CTF Player and Bug Hunter 🔥 I will provide a details and clear pen-testing report 🔥 A Researcher and Learner 🔥 Professional Work at a Lower cost. 🔥 24 hours super express Delivery (If needed) 🔥100% Satisfaction Overall, I work in projects according to my client desire and satisfaction. I always respect my client desire and maintain my ethics, never share or disclose any information with others.Kali LinuxWordPress SecurityCybersecurity ToolCyber Threat IntelligenceWeb App Penetration TestingNetwork Penetration TestingPenetration TestingWebsite SecurityCryptographyEthical Hacking - $30 hourly
- 5.0/5
- (14 jobs)
✔Top Rated✔5 years of industry expertise ✔100% Job Success Score ✔Reporting with mitigation ✔100s of pentest experience ✔Developer collaboration ✔Equipped with industry leading tools ✔Software Development Background What I Can Do For You: ---------------------------- → Deep vulnerability assessment and penetration testing. → Generate high-quality visual reports with graphical stats on your security status. → Easy-to-follow remediation recommendations for vulnerabilities. → Secure your application from breaches, prioritizing Critical and High issues. → Identify attack chains before or after a security breach. → Manual plus automated approach to hunt down every vulnerability that exists. → Reporting with Real-life attack scenarios with impact and CVSS scoring. → Test for the latest CVEs relevant to your technology stack. → Secure code review to identify and fix security loopholes. → Full Black Box, Grey Box, and White Box Penetration tests. → Provide PCI-DSS, GDPR, SOC 2, ISO 27001, NIST, HIPAA compliant pentest reports. → Collaborate with your developers to help them implement fixes. → Free re-test after fixes to ensure no bypasses. Vulnerabilities My Test Covers: ------------------------------------- My manual testing checks(200+) draw from OWASP, PTES, OSSTMM, and 5 years of hands-on penetration testing and vulnerability assessment experience. It covers: → Injection flaws (SQLi, XXE, XSS, RCE, CSRF, etc.) → Sensitive information leaks → Broken authentication and session management → SSRF vulnerabilities → File upload vulnerabilities → Security misconfigurations → Broken access control → Insecure deserialization → API vulnerabilities (BOLA, key exposure, injections, SSRF) → Insecure communications → Race conditions → Client-side vulnerabilities → Business logic flaws → Security bypass (WAF evasion,403 Bypass, etc.) Tools I Use Most: --------------------- OS: Kali Linux Toolkit: Nuclei, Nmap, Nessus, bloodhound, OWASP Amass, PowerSploit, Nikto, gobuster, FFUF, sqlmap, Mimikatz, commix, SharpHound, Metasploit, subfinder, subdomainer, xsser, HTTPX, GAU, httprobe, eyewitness, dalfox, wafw00f, socat, wpscan, Nikto and custom wordlists for dictionary brute forcing and fuzzing. Sometimes I write my scripts with Bash, and Python according to my needs. About me: ------------- With 10 years of combined experience, including involvement in hacktivist groups, I bring 5 years of White Hat Hacker expertise as a fintech penetration test lead and founding member of a Security Operation Center (SOC). My background spans Bug Bounty Hall Of Fames, Laravel-PHP development, and proficiency in offensive and defensive security strategies, complemented by participating in Capture The Flag (CTF) competitions. I have worked with organizations like- HSBC Bank, Metlife, Old Mutual, Bangladesh Bank projects, Bangladesh Govt., SSLCOMMERZ, etc. What My Clients are saying: 1. "Awesome experience. It was a pleasure working with Iftekharul." ⭐⭐⭐⭐⭐ - Saurabh 2. "As a Penetration Tester he truly stood out"⭐⭐⭐⭐⭐ - Komol Given my extensive experience in penetration testing and application security, I can surely add significant value to your organization by identifying and mitigating vulnerabilities and enhancing your overall security posture. I look forward to the opportunity to work with you! Shoot me a message today to be secured. Take a look at some of my work below 👇Kali LinuxWeb Application SecurityApplication SecuritySecurity Assessment & TestingWeb App Penetration TestingBlack Box TestingNetwork Penetration TestingWebsite SecuritySecurity TestingNetwork SecurityVulnerability AssessmentInformation SecuritySecurity AnalysisPenetration TestingEthical Hacking - $55 hourly
- 5.0/5
- (3 jobs)
Hello, I am Amena, a dedicated Penetration Tester, Ethical Hacker, and Cyber Security Expert and Cryptocurrency Investigator with a proven track record of conducting and leading numerous security audits, penetration tests, and red team engagements. Throughout my career, I have worked with a diverse range of clients, including multinational corporations, startups, and small businesses, all seeking to enhance their security posture and gain a competitive edge. My expertise lies in the field of Penetration Testing, Cyber Security, and Vulnerability Assessment. I possess extensive hands-on experience in these areas, enabling me to develop a deep understanding of the most prevalent and cutting-edge technology stacks utilized globally, as well as their associated security vulnerabilities. I offer the following services: ✅ Penetration Testing Engagement ✅ I provide comprehensive manual testing and automated assessment for websites, applications, servers, and infrastructure within the defined scope. Leveraging professional tools like BurpSuite Professional and Nessus, as well as my own collection of scripts and tools, I deliver thorough results. Additionally, I conduct internal penetration tests and network infrastructure assessments. ✅ Professional Report & Statistics ✅ Each discovered vulnerability is meticulously documented in a detailed report, outlining the step-by-step exploitation and discovery methodology. The report includes proof-of-concept screen captures, full requests and responses, CVSS v3.0 risk scores, impact assessment, and ownership attribution. ✅ Remediation Advice & Guidance ✅ I offer actionable recommendations for addressing identified security issues, providing guidance on effective fixes and highlighting associated risks and impacts. ✅ Asset Discovery ✅ Employing active and passive techniques, I help assess your organization's digital footprint and external attack surface. This includes subdomain enumeration and service/port discovery. ✅ Free Checkup ✅ As part of the service, I conduct a retest of previously identified vulnerabilities to ensure the effectiveness of implemented security controls and fixes, thereby minimizing any potential bypass or exploitation risks. ✅ OSINT Reconnaissance ✅ I leverage Open Source Intelligence (OSINT) techniques to gather valuable data about your company available on the internet. This includes identifying breached email addresses and associated passwords traded on the dark web. With access to over 4 billion personally curated records, I can help you assess your vulnerability and determine which passwords require immediate change. ✅ Briefing ✅ I am available for calls or meetings to discuss the Scope of Work, focus areas for the penetration testing engagement, inclusion of subdomains, engagement type (black-box or white-box), account requirements, preferred load testing hours, and any additional guidance needed, particularly for organizations new to penetration testing. ✅ Debriefing ✅ After completing the penetration test, I am available for calls or meetings to review the engagement results, discuss main findings, and address any concerns regarding your company's security. I provide further clarification on vulnerabilities and their associated risks and impacts. ✅Cryptocurrency Investigator✅ Experienced cryptocurrency investigator with a keen eye for tracing digital financial transactions, offering expertise in uncovering fraudulent activities and ensuring compliance in the blockchain ecosystem. Dedicated to safeguarding the integrity of cryptocurrencies, I bring a wealth of knowledge in blockchain forensics and risk assessment, providing invaluable insights for clients in the ever-evolving world of digital finance. If you seek a skilled and experienced Penetration Tester, Ethical Hacker, and Cyber Security Expert, Cryptocurrency Investigator, I am ready to assist you in fortifying your digital defenses. Let's connect and discuss how we can ensure the security of your valuable assets.Kali LinuxWordPressWeb App Penetration TestingSecurity AnalysisWeb Application SecurityBlack Box TestingOWASPRisk AssessmentInformation Security AwarenessNetwork Penetration TestingSecurity Assessment & TestingInformation SecurityPenetration TestingVulnerability AssessmentSecurity Testing - $20 hourly
- 4.5/5
- (19 jobs)
I am an Ethical Hacker and Penetration tester who has been providing security and test results as a report for corporations and individuals. "Ethical Hacking - Securing PC & mobile, running tests for vulnerabilities & server-side security (7+ experience)" Server Security Misconfiguration -Hardening -Broken Authentication and Session Management -Insecure OS/Firmware -Broken Cryptography -Automotive Security Misconfiguration -Sensitive Data Exposure -Cross-Site Scripting (XSS) -Cross-Site Request Forgery (CSRF) -Application-Level Denial-of-Service (DoS) -Insecure OS/Firmware -Server-Side Injection -Client-Side Injection -Sensitive Data Exposure -Malware Detected -Location Tracking Expert in 1. Hardening operating system ( Windows and Linux) 2. Penetration Testing of web applications with the report and mitigation suggestion. 3. Total security assessment of the Application. 4. Code analysis Static and Dynamic with the recommendation for mitigation. 5. Backdoor script identification and remove 6.Hidden link removal 7. WordPrass best security enhancement, firewall integration 8. Linux server administration, security, firewall 9. DDoS mitigation, firewall (Cloudflare, CSF) 10. Domain/email blacklist removal Security Incident Response: ✔️ Get access information, and begin the investigation immediately. ✔️ Identify the source of an intrusion, and fix the vulnerability. ✔️ Clean up malware, and recover the website. ✔️ Implement advanced security measures. ✔️ Frequently update the client with the current status. ✔️ Keep track of all actions performed, and provide a full audit report. You can contact me for a free consultation, or website health checkup, and explore if we’d be a good fit to work together. Let me help you fix your website and make sure it’s 100% clean and protected from security threatsKali LinuxNIST Cybersecurity FrameworkWeb DevelopmentISO 27001Penetration TestingWeb App Penetration TestingLinux System AdministrationAWS OpsWorksDevOpsWeb Application SecuritySSLWordPress Malware RemovalEthical HackingVulnerability Assessment - $10 hourly
- 5.0/5
- (1 job)
hi i am an ethical hacker and a professnoal bug bounty hunter ..........................................................Kali LinuxEthical HackingBug BountyPenetration TestingVulnerability Assessment - $20 hourly
- 5.0/5
- (6 jobs)
This is Asif here. I am an experienced tech support specialist with 4+ years of experience in Client-end troubleshooting, remote troubleshooting with Microsoft Windows, Office (On-prem & 365), Computer Networking, Cybersecurity, Malware Removal, System Optimization, and Recovery. I listen to your problems and deploy my core skills to eliminate your technical difficulties. I am ready to help you with all of the following offerings: - IT Support & Administration - IT Project Management - Technical Documentation - Cybersecurity AssessmentKali LinuxCybersecurity ManagementMicrosoft VisioGoogle Workspace AdministrationCloud ComputingAndroidWindows 10 AdministrationRed Hat AdministrationDNSOffice 365DHCPMicrosoft Azure - $70 hourly
- 0.0/5
- (0 jobs)
Hi I'm MD Fahim ( @pentester_mdfahim / 3df4h13010 ). I'm a Cybersecurity Researcher And Software Penetration Tester. With professional experience in corporate cybersecurity field. I have successfully identified vulnerabilities and secured many systems for my clients. As a freelancer I worked on many projects, showcasing expertise in : Web Application Penetration Testing (VAPT), Digital Forensics, Reverse Engineering, OSINT, Malware Remove & Software Security. OWASP Top 10 Vulnerability Assessment and Cybersecurity risk management. Although my major skill is in cybersecurity, But I also have soft skills in Web Application Development, Android and iOS App Development. My skill set, dedication, and commitment to staying updated with the latest trends, pull me continuously in the field of cybersecurity. Client Satisfaction is My first Priority: I'm passionate about exceeding client expectations and fostering long-term partnerships. I'll work closely with you to understand your specific needs and deliver a solution that safeguards your valuable digital assets. Proven Track Record: My experience as a Cyber Security Researcher, combined with my freelance work, has equipped me to handle complex security challenges. I'm meticulous, detail-oriented, and committed to clear communication throughout the project lifecycle. Ready to Collaborate? Let's discuss how I can help you strengthen your website security and ensure data protection. Feel free to browse my Upwork profile for detailed service packages or contact me for a custom quote. I'm here to provide you expert solutions with cybersecurity. Thank you.Kali LinuxWeb TestingWeb DevelopmentEthical HackingDigital ForensicsVulnerability AssessmentWeb Application SecurityWeb App Penetration TestingAndroid App DevelopmentOS SecurityWindows AdministrationLinux System AdministrationNetwork Penetration TestingSystem SecurityPenetration Testing - $30 hourly
- 4.7/5
- (20 jobs)
🔒 𝐈𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 🛡️ 𝐏𝐞𝐧𝐞𝐭𝐫𝐚𝐭𝐢𝐨𝐧 𝐓𝐞𝐬𝐭𝐢𝐧𝐠 🌐 𝐖𝐞𝐛 𝐀𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 📱 𝐌𝐨𝐛𝐢𝐥𝐞 𝐀𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 📝 𝐈𝐓 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐏𝐨𝐥𝐢𝐜𝐲 🔍 𝐕𝐮𝐥𝐧𝐞𝐫𝐚𝐛𝐢𝐥𝐢𝐭𝐲 𝐀𝐬𝐬𝐞𝐬𝐬𝐦𝐞𝐧𝐭 Hello, I’m Delwar Alam, an Information Security Expert with over 5 years of experience. I have completed more than 100 penetration tests and security assessments, specializing in web and mobile applications in the finance sector. Throughout my career, I have become proficient in various technologies and frameworks such as J2EE, ASP, and PHP. My work includes understanding all common attack vectors and implementing effective mitigation techniques. My qualifications include OSCP Penetration Testing with Kali Linux and Certified Ethical Hacker (CEH) v.10. I am dedicated to providing top-notch IT Security services while maintaining professionalism. 🔒 𝐈𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 Experienced in safeguarding data through the implementation of robust security measures and practices. 🛡️ 𝐏𝐞𝐧𝐞𝐭𝐫𝐚𝐭𝐢𝐨𝐧 𝐓𝐞𝐬𝐭𝐢𝐧𝐠 Conducting thorough penetration tests to identify vulnerabilities in web and mobile applications. 🌐 𝐖𝐞𝐛 𝐀𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 Ensuring web applications are secure from potential threats through comprehensive security assessments and reporting. 📱 𝐌𝐨𝐛𝐢𝐥𝐞 𝐀𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 Specializing in securing mobile applications by testing for security flaws across various platforms. 📝 𝐈𝐓 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐏𝐨𝐥𝐢𝐜𝐲 Creating detailed and effective IT security policies to safeguard organizational data and compliance. 🔍 𝐕𝐮𝐥𝐧𝐞𝐫𝐚𝐛𝐢𝐥𝐢𝐭𝐲 𝐀𝐬𝐬𝐞𝐬𝐬𝐦𝐞𝐧𝐭 Identifying and evaluating vulnerabilities in IT systems to prevent potential security breaches. 𝐒𝐨𝐫𝐫𝐲, 𝐈 𝐚𝐦 𝐧𝐨𝐭 𝐚𝐛𝐥𝐞 𝐭𝐨 𝐥𝐨𝐜𝐚𝐭𝐞 𝐲𝐨𝐮𝐫 𝐠𝐢𝐫𝐥𝐟𝐫𝐢𝐞𝐧𝐝, 𝐫𝐞𝐜𝐨𝐯𝐞𝐫 𝐲𝐨𝐮𝐫 𝐥𝐨𝐬𝐭 𝐅𝐀𝐂𝐄𝐁𝐎𝐎𝐊, 𝐆𝐌𝐀𝐈𝐋, 𝐘𝐀𝐇𝐎𝐎, 𝐞𝐭𝐜. 𝐚𝐜𝐜𝐨𝐮𝐧𝐭, 𝐨𝐫 𝐟𝐢𝐧𝐝 𝐲𝐨𝐮𝐫 𝐥𝐨𝐬𝐭 𝐩𝐡𝐨𝐧𝐞. 𝐏𝐥𝐞𝐚𝐬𝐞 𝐝𝐨 𝐧𝐨𝐭 𝐢𝐧𝐯𝐢𝐭𝐞 𝐦𝐞 𝐭𝐨 𝐬𝐮𝐜𝐡 𝐣𝐨𝐛𝐬. Before I start offensive tests, I may ask you for evidence that you are the site owner or to show me that you have admin access. If you are looking for an expert to enhance your cybersecurity posture, let’s connect and discuss how I can help your business.Kali LinuxWordPress Malware RemovalWebsite SecurityCertified Information Systems Security ProfessionalSecurity EngineeringWeb Application SecurityInformation Security AuditSecurity AnalysisWeb App Penetration TestingInformation SecurityAT&T CybersecurityVulnerability AssessmentMalware RemovalPenetration Testing - $10 hourly
- 4.2/5
- (4 jobs)
I use reliable logging tools, but most of the work is done by hand which means the result will be more accurate and effective. To make sure I really tested your website you will find videos, screenshots to prove that. I will check on: Source Code Audit Recover Hacked Website Finding Web Server Security Issues Email Security Web Application Security Issues [EX: SQLI, RCE, SSRF, CSRF, XSS etc.] REST API Analysis Risk and Gap Analysis Load balancing Penetration Network , firewall Local and remote penetration System vulnerability Checking network security Detection and prevention Form data validation Cookies and headers/bodies Backdoors Authentication Infrastructure and hardware checking Optimize, usability MIS performance API testing Integrated security framework Product integration testing Database/modules interdependencies Source code audit Software quality assurance Initiate, institute business requirements Client approvals Report analysis Inception report Assessment report Final report Examination in accordance with OWASP guidelines. Entry test methods are tradeoffs between speed, efficiency and installation. In general, the black box entry test is the fastest type of entry test. However, the limited information available from testers increases the likelihood that risk is being ignored and reduces the effectiveness of the test, because testers do not have the information needed to identify their attacks for high-value or potentially vulnerable purposes. The gray box test performs a small trade in speed compared to the black box test to ensure efficiency and increase. The acquisition of structural documentation allows testers to be more focused on their efforts and internal network access enhances analytical coverage especially compared to black box testing, where testers will not detect risk that gives them access within the network perimeter. The white box test is a slow and detailed way to breathe. The vast amount of information obtained by local retailers takes time to process; however, a higher level of access enhances the likelihood that both the internal and external vulnerabilities that are expected will be identified and addressed.Kali LinuxInformation SecurityMalware RemovalApplication SecuritySecurity Assessment & TestingMetasploitBug FixBug Tracking & ReportsPenetration TestingVulnerability AssessmentWordPress Malware RemovalEthical HackingWeb App Penetration TestingNetwork Security - $70 hourly
- 0.0/5
- (0 jobs)
I am an Ethical Hacker (White Hat Hacker). I am certified Kali Linux Ethical Hacking and Penetration Testing. MY SKILLS INCLUDE - System Hacking & Prevention - Man in the Middle Attack & Prevention - Network Scanning - Web App Testing (SQLi, XSS, RFI/LFI, OWASP TOP 10 etc) - Website Penetration (Bug Reporting and Exploting) - Vulnerability Assessment - Malware Removed (From Any Website) - Hacked account recovery, - HACKED WEBSITE RECOVERY - Password recovery. - Security analysis. - Security Audit - Wireless Security (Aircrack-ng suite, ARP Spoofing, Honey Pots etc) Android Phone Hacking & Prevention I have good analytical skills. I can deliver best result in given time and under strict deadlines. I am a passionate and hard working freelancer. 100% Client's satisfaction is my main Goal. Quality and accuracy is the thing that can not provide everyone. If you would like high quality work and 100% accuracy work with a fast turn around for a fair price, You can contact me. You won't be disappointed.Kali LinuxBlockchain, NFT & CryptocurrencyWeb Application SecuritySystem AdministrationEthical HackingInternet SecuritySecurity EngineeringBlockchain SecurityPythonInformation SecurityFirewallNetwork SecurityDatabase SecurityVulnerability AssessmentPenetration Testing - $70 hourly
- 0.0/5
- (0 jobs)
I am an Ethical Hacker (White Hat Hacker). I am certified Kali Linux Ethical Hacking and Penetration Testing. MY SKILLS INCLUDE - System Hacking & Prevention - Man in the Middle Attack & Prevention - Network Scanning - Web App Testing (SQLi, XSS, RFI/LFI, OWASP TOP 10 etc) - Website Penetration (Bug Reporting and Exploting) - Vulnerability Assessment - Malware Removed (From Any Website) - Hacked account recovery, - HACKED WEBSITE RECOVERY - Password recovery. - Security analysis. - Security Audit - Wireless Security (Aircrack-ng suite, ARP Spoofing, Honey Pots etc) Android Phone Hacking & Prevention I have good analytical skills. I can deliver best result in given time and under strict deadlines. I am a passionate and hard working freelancer. 100% Client's satisfaction is my main Goal. Quality and accuracy is the thing that can not provide everyone. If you would like high quality work and 100% accuracy work with a fast turn around for a fair price, You can contact me. You won't be disappointed.Kali LinuxBlockchain, NFT & CryptocurrencyWeb Application SecuritySystem AdministrationEthical HackingInternet SecuritySecurity EngineeringBlockchain SecurityPythonInformation SecurityFirewallNetwork SecurityDatabase SecurityPenetration TestingVulnerability Assessment - $30 hourly
- 3.8/5
- (12 jobs)
I m having experience in Web-app security, Mobile app security, API security, Vulnerability Assessment & Penetration Testing. I am experienced with tools like burp suite,acunetix, Nessus, IBM AppScan, Nmap, Pentest tools, Frida, Drozer and of course with Kali Linux & some GitHub open source tools like Amass, Aquatone…etc many more for finding the vulnerabilities in the web application and mobile application.Kali LinuxBitcoinEthical HackingDigital ForensicsNetwork Penetration TestingHackerRankFacebookMalware RemovalBug InvestigationCryptocurrencyVirus RemovalPenetration Testing - $70 hourly
- 0.0/5
- (0 jobs)
I am an Ethical Hacker (White Hat Hacker). I am certified Kali Linux Ethical Hacking and Penetration Testing. MY SKILLS INCLUDE - System Hacking & Prevention - Man in the Middle Attack & Prevention - Network Scanning - Web App Testing (SQLi, XSS, RFI/LFI, OWASP TOP 10 etc) - Website Penetration (Bug Reporting and Exploting) - Vulnerability Assessment - Malware Removed (From Any Website) - Hacked account recovery, - HACKED WEBSITE RECOVERY - Password recovery. - Security analysis. - Security Audit - Wireless Security (Aircrack-ng suite, ARP Spoofing, Honey Pots etc) Android Phone Hacking & Prevention I have good analytical skills. I can deliver best result in given time and under strict deadlines. I am a passionate and hard working freelancer. 100% Client's satisfaction is my main Goal. Quality and accuracy is the thing that can not provide everyone. If you would like high quality work and 100% accuracy work with a fast turn around for a fair price, You can contact me. You won't be disappointed.Kali LinuxBlockchain, NFT & CryptocurrencyWeb Application SecuritySystem AdministrationEthical HackingInternet SecuritySecurity EngineeringBlockchain SecurityPythonPenetration TestingNetwork SecurityDatabase SecurityInformation SecurityVulnerability AssessmentFirewall - $15 hourly
- 4.1/5
- (2 jobs)
✅ 7+ Years Pentesting ✅Supporting All Time Zones Any Where ✅ Unlimited Revisions ✅ Working In Try Hack Me Are you looking for a professional ethical hacker to conduct a security audit or penetration test for your company? Look no further! With years of experience and a deep understanding of modern technology stacks and their vulnerabilities, I am well-equipped to provide high-quality penetration testing services to a wide range of clients. 🎯 Why Hire Me for Your Digital Security Needs? 1........🔒 Extensive Experience I have conducted and led hundreds of security audits, penetration tests, and red team engagements for a variety of companies, giving me a wealth of hands-on experience in the field. 2........🔍 Comprehensive Cybersecurity Services My services include comprehensive penetration testing, detailed reporting, expert remediation advice, asset discovery and mapping, follow-up checkups, OSINT reconnaissance, consultations and briefings, and post-engagement debriefings. 3........🔑 Customized Security Solutions I provide personalized, tailored services to each of my clients, taking the time to understand their unique needs and requirements. 4.........🛡️ Professionalism and Expertise I am an ethical hacker and have a deep understanding of modern technology stacks and their vulnerabilities. I use professional software and tools, as well as personal scripts and techniques, to ensure the accuracy and thoroughness of my work. 5........📞 Clear communication I am available for meetings and calls to discuss the scope of work, the focus of the engagement, and any other questions or concerns you may have. I also provide post-engagement debriefings to ensure that you understand the results of the engagement and any potential security risks. Ready to secure your business? Let's fortify your cybersecurity defenses together. Contact me today to schedule a consultation and discover how my services can safeguard your business from evolving cyber threats. Looking forward to working with you and make the world safer.Kali LinuxComputing & NetworkingMalware DetectionNetwork MapperSecurity ManagementSecurity AnalysisWireless SecurityPhishing DetectionNetwork Penetration TestingReverse EngineeringWeb Application SecuritySecurity TestingEthical HackingPenetration TestingCybersecurity Management - $10 hourly
- 0.0/5
- (0 jobs)
fast worker fast learner and cooperative___ Ensure the security of your systems with my professional penetration testing services. I specialize in identifying and addressing vulnerabilities in your networks, websites, and applications. By conducting thorough security assessments, I can help you strengthen your defenses and protect your data from cyber threats. Protect your business from cyber threats with my ethical hacking services. I offer professional penetration testing and security assessments to identify and fix vulnerabilities in your systems. With years of experience in cybersecurity, I can help you safeguard your data and maintain a secure online presence. Simplify your data gathering process with my professional web scraping services. Whether you need market research data, competitor analysis, or product information, I can extract and deliver the data you require efficiently. Let me help you streamline your data collection process with accurate and reliable web scraping solutions.Transform your website with engaging and persuasive copy that resonates with your audience. As a professional website copywriter, I specialize in creating captivating content.Kali LinuxVideo Editing & ProductionLogoPhoto EditingTechnical Project ManagementWeb CrawlingResearch DocumentationData ExtractionLogo DesignEthical HackingWeb ScrapingLead GenerationTech & ITContent Distribution & PromotionPenetration Testing - $10 hourly
- 0.0/5
- (0 jobs)
As a seasoned cybersecurity expert, I specialize in safeguarding digital infrastructures and ensuring data integrity across various industries. With a deep understanding of threat detection, vulnerability assessments, and advanced security protocols, I help organizations protect their sensitive information from cyber-attacks. My expertise spans across network security, cloud protection, encryption methods, and ethical hacking, providing businesses with comprehensive defense strategies. I am passionate about staying ahead of emerging threats and continuously adapting to the evolving cybersecurity landscape. Through hands-on experience and continuous learning, I develop innovative solutions that prevent breaches, ensure compliance with global standards, and foster a culture of security awareness. Whether it's implementing firewalls, conducting penetration testing, or leading incident response efforts, I am dedicated to fortifying digital ecosystems, making cyberspace safer for everyone.Kali LinuxWeb App Penetration TestingNetwork Penetration TestingPenetration TestingBash ProgrammingDigital ForensicsCyTrack Intelligence Systems CyCCCybersecurity ManagementInformation SecurityGovernment Reporting ComplianceComputing & NetworkingComputer NetworkNetwork EngineeringDatabaseDatabase Management - $20 hourly
- 0.0/5
- (0 jobs)
Greetings! I have more than 3 years experience in Cyber Security and have developed skills in several key areas, including Penetration Testing, Web App Penetration Testing, Network Penetration Testing, OSINT, Malware Removal, Vulnerability Assessment & Penetration Testing. Armed with a Bachelor's in Computer Science and Engineering. ▶️ Services That I Provide ☑️Web Application Penetration Testing and Reporting ☑️Malware Analysis and Removal ☑️OWASP Vulnerability Testing and Reporting ☑️Security Analytics ☑️API Penetration Testing and Reporting ☑️Vulnerability Assessment ☑️Network Penetration Testing and Reporting ☑️Website security ☑️Vulnerability Detection ☑️Provide a Detailed report on Penetration Testing ☑️Cyber Crime Investigation ☑️Email Investigations Report ☑️Recover Deleted Files ☑️Images, Video, Audio Files ☑️ OSINT ☑️Ethical Hacking and Cyber Security Corporate Training 🚁 Why Hire Me? 🔥 I'm a C)VA: Certified Vulnerability Assessor-Mile2, C)SA1: Certified Security Awareness 1-Mile2, NSE 1 Network Security Associate-Fortinet, Certified AppSec Practitioner (CAP)-The SecOps Group, Ethical Hacking Essentials (EHE)-EC-Council. 🔥 I will provide details and a clear pen-testing report. 🔥 I'm a Cyber Security Researcher and learner. 🔥 Professional work at a lower cost. 🔥 24 hours super express delivery (if needed), 🔥100% Satisfaction. In general, I complete tasks in accordance with the needs and preferences of my clients. I never discuss or reveal any information with third parties, I always respect my clients' wishes, and I uphold my ethics.Kali LinuxCyber Threat IntelligenceCybersecurity ToolNetwork EngineeringMalware DetectionMalware RemovalWordPress Malware RemovalVulnerability AssessmentWebsite SecurityEthical HackingNetwork Penetration TestingWeb App Penetration TestingPenetration TestingInformation Security - $5 hourly
- 0.0/5
- (2 jobs)
Database server setup like Mysql,DB2, Oracle,PHPMyAdmin webserver like apache,IIS,Nginx TFTP server Mail server setup FTP server setup SFTP server Proxy server Syslog server IP routing process (EIGRP, OSPF, STATIC, BGP) IP services (DHCP, NAT, PAT, ACL, NTP) HSRP,VRRP,GLBP NMS servers like Zabbix,observium,Nagios Internet VPN ( site-to-site VPN, client VPN) Device security using AAA with TACACS+ and RADIUS Palo Alto Firewalls, Cisco ASA, Fortigate, Juniper Nessus,acunetix, burp suite,NMAP, kali, Metasploit,HPing3Kali LinuxSystem AdministrationCentOSInformation SecurityNagios CoreNGINXPenetration TestingVulnerability AssessmentPalo Alto FirewallsNetwork AdministrationMySQLCisco RouterUbuntuNetwork Security - $20 hourly
- 0.0/5
- (0 jobs)
Myself Hasan.I can do penetration testing and find vulnerabilities. I can help you in Website management and security.i can recover Instagram/Facebook/gmail account.Kali LinuxPenetration TestingEthical Hacking - $9 hourly
- 0.0/5
- (0 jobs)
Professional Summary: Experienced IT Infrastructure Manager with over 23 years of expertise in managing and optimizing IT systems and networks. Proven track record in leading remote teams, implementing cloud solutions, and ensuring cybersecurity. Adept at strategic planning, project management, and improving infrastructure efficiency.Kali LinuxRed Hat Enterprise LinuxBackupDisaster RecoveryWindows 11 AdministrationCloud MigrationMicrosoft AzureOffice 365Windows ServerCustomer SupportCiscoFortinetGroup PolicyMicrosoft Active Directory - $20 hourly
- 0.0/5
- (0 jobs)
Hello, I am a highly skilled and experienced Ethical Hacker and Cybersecurity Programmer with a proven track record of identifying and mitigating vulnerabilities. Over the past year, I have worked with 8 companies as a Bug Hunter, helping them enhance their security posture and protect their digital assets. Skills: Ethical Hacking: Proficient in tools like Metasploit, Burp Suite, Nmap, Wireshark, and more. Penetration Testing: Network, web application, mobile app, and social engineering assessments. Vulnerability Assessment: Identifying and reporting security weaknesses. Red Teaming: Simulating real-world attacks to test security defenses. Programming: Proficient in Python, Ruby, and other languages for automation and scripting. Certifications: Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), Certified Information Systems Security Professional (CISSP), CompTIA Security+. Why Choose Me? Expertise: Over a year of hands-on experience in ethical hacking and cybersecurity. Attention to Detail: Thorough and meticulous approach to ensure no vulnerability goes unnoticed. Communication: Clear and concise reporting, ensuring clients understand the implications and solutions. Commitment: Dedicated to helping clients achieve the highest level of security.Kali LinuxSecurity Assessment & TestingVulnerability AssessmentDigital ForensicsCybersecurity MonitoringMalware DetectionRed Team AssessmentMetasploitCybersecurity ManagementBug BountyPenetration TestingBuntingCyber Threat IntelligenceNetwork SecurityEthical Hacking - $20 hourly
- 0.0/5
- (0 jobs)
With over six years of experience as an Information Security Officer and Team Leader at a leading Private Commercial Bank, I bring a wealth of expertise in protecting critical assets and ensuring organizational cybersecurity resilience. My core strengths include: • Vulnerability Assessment & Penetration Testing • API Security Testing • Web & Android Application Functional & Security Testing • Malware Analysis & Digital Forensics • SIEM Implementation & Management (ELK, Wazuh, Kibana, etc.) • Cybersecurity Policy Development In addition to my hands-on experience in the banking sector, I am also a part-time lecturer in a Masters in Cyber Security program, where I train the next generation of cybersecurity professionals, focusing on real-world, practical applications. What I can offer: • Robust security testing to identify and mitigate vulnerabilities • Expert forensic analysis and malware investigation • Comprehensive API, web, and mobile app security testing • Custom cybersecurity policies and compliance strategies • Efficient deployment and management of SIEM solutions for incident detection and response • Troubleshooting and resolving any security-related issues • Completion of cybersecurity assignments and academic tasks If you're looking for a dedicated cybersecurity professional with a strong technical background and real-world expertise, I'm here to help secure your business. Let's work together to keep your systems safe and resilient.Kali LinuxEthical HackingPolicy WritingAPI TestingRisk AssessmentNetwork Penetration TestingWeb Application SecurityDigital ForensicsInformation SecurityApplication SecuritySecurity Assessment & TestingDatabase SecurityPenetration TestingVulnerability Assessment Want to browse more freelancers?
Sign up
How hiring on Upwork works
1. Post a job
Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.
How do I hire a Kali Linux Freelancer near Dhaka, on Upwork?
You can hire a Kali Linux Freelancer near Dhaka, on Upwork in four simple steps:
- Create a job post tailored to your Kali Linux Freelancer project scope. We’ll walk you through the process step by step.
- Browse top Kali Linux Freelancer talent on Upwork and invite them to your project.
- Once the proposals start flowing in, create a shortlist of top Kali Linux Freelancer profiles and interview.
- Hire the right Kali Linux Freelancer for your project from Upwork, the world’s largest work marketplace.
At Upwork, we believe talent staffing should be easy.
How much does it cost to hire a Kali Linux Freelancer?
Rates charged by Kali Linux Freelancers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.
Why hire a Kali Linux Freelancer near Dhaka, on Upwork?
As the world’s work marketplace, we connect highly-skilled freelance Kali Linux Freelancers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Kali Linux Freelancer team you need to succeed.
Can I hire a Kali Linux Freelancer near Dhaka, within 24 hours on Upwork?
Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Kali Linux Freelancer proposals within 24 hours of posting a job description.