Hire the best Kali Linux Freelancers in Cairo, EG

Check out Kali Linux Freelancers in Cairo, EG with the skills you need for your next job.
  • $35 hourly
    I am offering to develop and customize your odoo modules ✩ I am working as odoo,python developer since odoo 8, with 7 years of experience. ✩ I have been working as a Senior Developer for 10 years. ✩ I Used to build web application with ASP MVC, C# ,php, python ✩ design and manage Database using PostgreSQL, SQL server, MySQL. ✩ Expertise in analysis, design, development, testing application. ✩ I have Designed and Developed custom Odoo modules (Back-end and Client-side) in (Python, XML, and JavaScript) ✩ Extended and customized the existing modules of Odoo ✩ APIs Integration ✩ Great experience in custom Qweb Reporting. ✩ Creating a hierarchical security system I can also a sure you that all modules that build by me will be tested by an expert penetration tester ✩ I have many Certifications in Penetration Testing Field : ✩ Certified Ethical Hacker CEH ✩ Offensive Security Certified Professional OSCP ✩ Offensive Security Certified Expert OSCE
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Information Analysis
    Metasploit
    Ethical Hacking
    Reverse Engineering
    Web App Penetration Testing
    Network Penetration Testing
    Information Security
    Web Development
    Python
  • $5 hourly
    🔐 Penetration Testing Expertise I specialize in various penetration testing methodologies, ranging from reconnaissance and enumeration to exploitation and post-exploitation phases. My self-taught journey has allowed me to dive deep into: Network Penetration Testing: Identifying open ports, services, and vulnerabilities using tools like Nmap, Wireshark, and Metasploit. Web Application Testing: Knowledge of the OWASP Top 10 vulnerabilities, with hands-on experience in finding and exploiting web application security flaws like SQL injection, XSS, and CSRF. System Exploitation: Familiar with exploiting misconfigurations, weak credentials, and outdated systems on Linux and Windows environments. 🔧 Tools and Techniques I have practical experience with a wide range of industry-standard tools used in penetration testing: Nmap: Network scanning and port enumeration. Metasploit Framework: Exploitation and post-exploitation. Burp Suite: Web application vulnerability identification. Wireshark: Network protocol analysis and traffic monitoring. OpenVAS & Nessus: Vulnerability scanning and reporting. SQLMap: Automated SQL injection and database testing. Hydra: Brute force attack tools for login and credential testing. John the Ripper & Hashcat: Password cracking and analysis. 📚 Self-Study & Certifications (In Progress) While I’m still pursuing formal certifications, my continuous learning path has exposed me to the same concepts and knowledge covered in recognized programs such as: TryHackMe: Participated in Capture the Flag (CTF) challenges, working on various real-world penetration testing scenarios. Hack The Box: Completed multiple labs focused on web and network exploitation, privilege escalation, and post-exploitation. YouTube & Blogs: Regularly follow prominent cybersecurity experts and resources for up-to-date learning and practical knowledge. 🖥️ Personal Projects To further sharpen my skills, I’ve developed and maintained a personal cybersecurity lab to simulate penetration testing environments. Here are a few highlights of my hands-on projects: Home Lab Setup: Created virtual environments using VirtualBox, simulating networks and vulnerable machines such as Metasploitable and DVWA for practice. Conducted vulnerability scans and exploited systems using tools like Nmap, Nessus, and Metasploit. CTF Participation: Regularly engage in Capture the Flag events on TryHackMe and Hack The Box, successfully identifying and exploiting vulnerabilities in both Linux and Windows environments. Scripting Automation: Developed basic Python scripts to automate repetitive tasks like scanning and vulnerability assessment. 🕵️‍♂️ Key Services I Offer Whether you’re a small business or an individual looking to secure your systems, I can provide valuable services to enhance your security posture: Web Application Penetration Testing: Comprehensive testing to identify and exploit web vulnerabilities, including SQL injection, XSS, and broken authentication mechanisms. Network Penetration Testing: Identify open ports, vulnerable services, and misconfigurations in your network infrastructure. Vulnerability Assessment: A detailed report on potential vulnerabilities within your systems, offering insights and suggestions on remediation. Password Auditing and Brute Forcing: Ensure that your systems have strong, secure password policies by testing them against various brute force methods and password cracking techniques. Wireless Network Testing: Evaluate the security of your wireless infrastructure, including encryption and access point vulnerabilities. Security Consultation: Provide strategic guidance on how to strengthen your security practices, including best practices in securing web applications, networks, and user data. 🧠 Continuous Learning & Future Goals Cybersecurity is an ever-evolving field, and I pride myself on being a lifelong learner. I regularly participate in online courses, hands-on labs, and CTFs to stay current with the latest attack vectors, vulnerabilities, and defense strategies. I’m currently working towards formal certifications such as: CompTIA Security+ Certified Ethical Hacker (CEH) Offensive Security Certified Professional (OSCP) I am committed to continuously expanding my knowledge and refining my skills to provide high-quality cybersecurity services. 🚀 Why Choose Me? While I may be at the beginning of my career in cybersecurity, my enthusiasm, dedication, and hands-on experience set me apart. Here’s why you should consider me for your next project: Self-Motivated and Fast Learner: I have developed a strong technical foundation through self-study and practical experience, giving me the ability to adapt to new tools and technologies quickly. Passion for Cybersecurity: I am deeply passionate about identifying vulnerabilities and helping others secure their systems. My work is driven by curiosity and a desire to protect against cyber threats. Attention to Detail: Cybersecurity requires thorough analysis an
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Vulnerability Assessment
    Security Analysis
    Risk Assessment
    Risk Analysis
    Security Testing
    Network Security
    OWASP
    Penetration Testing
    Internet of Things
    Troubleshooting
    Operating System
    Problem Solving
    Network Design
    Information Technology
  • $20 hourly
    I am a highly skilled penetration tester with 2 years of hands-on experience in cybersecurity, specializing in Web, API, Android, and Network Penetration Testing. Throughout my career, I've worked with top companies such as SecqLinq, Bugswagger, and DeepStrike, delivering thorough and actionable security assessments. Certified in EWPTXv2 and Certified Authorization Professional (CAP), I bring in-depth knowledge and technical expertise to every project. My approach includes detailed penetration testing and comprehensive reporting to ensure that vulnerabilities are identified and mitigated effectively. Expertise Includes: Web Penetration Testing: Identifying and fixing vulnerabilities in web applications. API Penetration Testing: Securing APIs against common and advanced attack vectors. Android Penetration Testing: Protecting Android applications from security threats. Network Penetration Testing: Enhancing network security by identifying infrastructure weaknesses. I take pride in delivering detailed and professional pentest reports that include thorough risk analysis and remediation recommendations to help clients fortify their security posture.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Vulnerability Assessment
    Web App Penetration Testing
    Penetration Testing
  • $10 hourly
    As a dedicated student in the Faculty of Business Information System at Misr University for Science and Technology, I am passionate about leveraging my skills to drive meaningful insights and contribute to the evolving world of cybersecurity. I am currently enhancing my expertise through learning penetration testing and developing a robust skill set that includes: Cybersecurity , Red Teaming . Open to networking and potential collaborations, I welcome connections with fellow professionals who share a passion for innovation in these domains. -
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Ethical Hacking
    Linux System Administration
    Python
    PHP
    Penetration Testing
    Information Security
  • $10 hourly
    I am Ali Elkholy, a dedicated Certified Penetration Tester and Ethical Hacker with a passion for securing digital infrastructures. My expertise lies in uncovering vulnerabilities in systems, networks, and applications, ensuring businesses are safeguarded against ever-evolving cyber threats. With proficiency in tools like Kali Linux, Burp Suite, and Metasploit and an in-depth understanding of OWASP Top 10 vulnerabilities, I deliver comprehensive penetration testing and cybersecurity assessments. My mission is to help organizations identify risks, implement robust defenses, and build resilience against potential breaches. Driven by a love for learning and problem-solving, I continually stay ahead in the cybersecurity field, bringing the latest methodologies and techniques to every project. Let’s work together to create a secure digital future.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Vulnerability Assessment
    Ethical Hacking
    Information Security
  • $30 hourly
    I am an office certified in RHCSA with hands on experience in DevOps tools like Gitlab cicd, K8s, ansible, terraform and docker.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Ansible
    Docker
    Arch Linux
    Jenkins
    Bash Programming
    Linux System Administration
    Red Hat Enterprise Linux
    Python
  • $3 hourly
    As a skilled Cybersecurity Specialist with expertise in malware analysis, reverse engineering, and network analysis, I am passionate about uncovering hidden threats, analyzing vulnerabilities, and building secure digital environments. With a strong foundation in operating systems, low-level programming (Assembly, C, C++), and scripting languages like Python, I deliver precise and reliable solutions to complex security challenges.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    C++
    Python
    Operating System
    Network Analysis
    X86 Assembly Language
    Malware Removal
    Malware Detection
    Reverse Engineering
    C
  • $10 hourly
    Greetings! I'm Youssef Shafik, Your Solution for Digital Success About Me: I specialize in crafting bespoke websites tailored to the needs of small and medium-sized businesses. Whether you're aiming to establish your online presence, showcase your services, or launch an e-commerce platform, I've got you covered. What I Bring to the Table: Technical Expertise: Proficient in HTML and CSS3 for building sleek and responsive designs, along with skills in Bootstrap, Javascript and Typescript to create dynamic and optimized websites. Project Management: From conception to deployment, I handle every aspect of your project, ensuring a seamless and stress-free experience for you. Effective Communication: I prioritize regular communication throughout the project lifecycle, keeping you informed and involved every step of the way. Your feedback and vision are integral to the success of our collaboration. Let's Connect: Ready to take your online presence to the next level? Let's collaborate and bring your vision to life. Whether you need a stunning portfolio website, an engaging blog, or a robust e-commerce platform, I'm here to help. Reach out to me today, and let's make your digital dreams a reality.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    ChatGPT
    Bootstrap
    AngularJS
    Firebase
    TypeScript
    UI/UX Prototyping
    Front-End Development
    GitHub
    Git
    JavaScript
    CSS 3
    HTML5
  • Want to browse more freelancers?
    Sign up

How hiring on Upwork works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

How do I hire a Kali Linux Freelancer near Cairo, on Upwork?

You can hire a Kali Linux Freelancer near Cairo, on Upwork in four simple steps:

  • Create a job post tailored to your Kali Linux Freelancer project scope. We’ll walk you through the process step by step.
  • Browse top Kali Linux Freelancer talent on Upwork and invite them to your project.
  • Once the proposals start flowing in, create a shortlist of top Kali Linux Freelancer profiles and interview.
  • Hire the right Kali Linux Freelancer for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a Kali Linux Freelancer?

Rates charged by Kali Linux Freelancers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a Kali Linux Freelancer near Cairo, on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance Kali Linux Freelancers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Kali Linux Freelancer team you need to succeed.

Can I hire a Kali Linux Freelancer near Cairo, within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Kali Linux Freelancer proposals within 24 hours of posting a job description.