Hire the best Kali Linux Freelancers in Nairobi, KE

Check out Kali Linux Freelancers in Nairobi, KE with the skills you need for your next job.
  • $100 hourly
    DO NOT contact me with requests to hack social media accounts, recover accounts, or engage in any illegal activities. This includes, but is not limited to, unauthorized network intrusions, financial fraud, identity theft, data breaches, or any form of hacking motivated by personal reasons, such as revenge/grudges, romantic relationships, and snooping on someone’s private details. I operate STRICTLY within LEGAL and ETHICAL boundaries and do not condone or participate in any UNLAWFUL or UNETHICAL behavior. Red Team Activities I engage in red teaming exercises under two distinct categories, ensuring all activities comply with legal and ethical standards: 1. Company or Home Penetration Tests These services are designed to identify vulnerabilities and strengthen the security of organizations or individuals. Common examples include: Simulated phishing attacks to test employee awareness or individual response to social engineering. Social engineering simulations, such as impersonation, attempts to access restricted areas or home networks. Network penetration testing to identify weak points in business or home systems. Web application security assessments to uncover exploitable flaws in personal or corporate applications. Requirements: Clients must provide WRITTEN AUTHORIZATION, including a clearly defined scope of engagement, confirming that the organization or homeowner sanctions the activities. 2. Criminal Investigations I also engage in verified investigations involving criminal activities. Examples include: Location tracking of missing persons or stolen devices (where legally sanctioned). Digital forensic analysis to identify and trace cybercriminal activities. Offensive actions, such as testing systems to retrieve data under explicit jurisdictional approval. Requirements: LEGAL DOCUMENTATION proving the case has been REPORTED to LAW ENFORCEMENT. WRITTEN APPROVAL authorizing offensive actions under the JURISDICTION OF THE LAW. Encrypted Communication for Privacy In rare and exceptional cases involving VERIFIED SPECIAL CRIMINAL INVESTIGATIONS, where the client requires ENCRYPTED communication to ensure their PRIVACY, I may reserve the right to communicate securely outside the platform ONLY after the contract is assigned on Upwork. My Expertise are; ✅ Dark Web Cyber Threat Intelligence, Fraud Investigation, Criminal Profiling, Company OSINT Investigations ✅ Malware Reverse Engineering and Disassembly ✅ WordPress Malware Removal & Hacked Website Recovery ✅ Digital Forensics (Data Recovery and Analysis, Mobile Device Forensics (iPhone & Android), Network Forensics, Email Header Analysis) ✅ Network Security: Firewall (pfsense,), IDS/IPS (Snort and Suricata), OpenVPN Access Server, SIEM (Wazuh), Web Proxy (Squid) ✅ Cyber Security Articles: Technical Writing, Blog Writing, Article Writing, Research Reports, Scientific Reports, ebooks, and Blogs (Fluent in American or British English) ✅ Pcap File Analysis (Wireshark, Network Miner, Wireedit, Scapy, ParserCap) ✅ Phishing Simulation, Red Team Operations, Exploit Development I currently hold the following certifications: ➡ Certified Ethical Hacking ➡ Certified Penetration Tester and Bug Bounty Hunter ➡ Autopsy Digital Forensics ➡ Cyber Triage Digital Forensics Incidence Response
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Snort
    Wireshark
    Information Security
    Ethical Hacking
    Network Analysis
    PfSense
    Website Security
    Digital Forensics
    Computer Network
    Network Security
    Intrusion Detection System
    Information Technology
    Intrusion Prevention System
    Technical Writing
  • $30 hourly
    I have experience in linux system administration, and have over 3 years experience in developing captive portal systems. I am also familiar with freeradius and how it can be used for access point control especially for Wireless/wired internet connections. I am knowledgeable in areas pertaining to backend web developing using PHP. I have also developed enterprise applications in Python.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Desktop Application
    RADIUS
    Computer Science
    Computing & Networking
    C
    Metasploit
    Linux System Administration
    Product Installation Support
    Python
    Bash
  • $35 hourly
    A cyber security enthusiast with 8 years' experience in the technology and security industry and highly skilled in python programming, technical writing and penetration testing. - I'm experienced in security assesments - Fully versed in Python programming, Bash scripting and penetration testing - Deep technical understanding of AWS and Azure cloud environments
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Virtual Machine
    Intrusion Detection System
    Ubuntu
    Python
    Microsoft Active Directory
    Bash Programming
    Linux
    Security Operation Center
    Bash
    Wireshark
    Penetration Testing
    Technical Writing
  • $500 hourly
    About David is a Cyber security Enthusiast with a demonstrated history of working in the computer and network security industry. He has good understanding of many security tools; FortiSIEM, Splunk, Security Onion, Portnox, Fortigate and Sophos firewalls, Azure Cloud, Nessus, Burpsuite , Nmap scripting , Kali Linux,Msfconsole among other advanced tools for pentesting. He has performed technical assessments to both Tier 11 and Tier 111 banks, Legal institutions, Saccos, Hotels, Manufacturing, Insurance sectors among others institutions. David has experience in delivering cyber security solutions,risk assessment,trainings not only in Kenya but also in East Africa Region. David is a critical thicker with ability to carry out high-analytical skills and solve complex problems making him outstanding. Hobbies *During his free time David practices ethical hacking on tryhackme for fun. *CTF player *Threat hunter
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Computer Network
    Network Security
    Information Security
    System Security
    Nessus
    Firewall
  • $40 hourly
    Hello! I am Titus, a highly skilled and passionate cybersecurity professional with 13+ years of experience in ensuring the protection and integrity of digital assets for individuals and businesses. My expertise lies in assessing security risks, implementing robust security measures, and responding to emerging cyber threats. I take pride in keeping organizations safe from potential cyber-attacks and safeguarding sensitive data.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Linux
    Training
    Information Security Awareness
    Web Application Security
    Web App Penetration Testing
    OS Security
    Cryptography
    Cyber Threat Intelligence
    Risk Management
    Risk Assessment
    Network Analysis
    Network Security
    Cybersecurity Management
    System Security
  • $20 hourly
    -Automation & Scripting (Python, Bash, PowerShell) -Technical Support -Virtualization (VMware, Hyper-V) -Data Recovery -Disk Imaging -Dark Web Investigations -Log Anaylsis -Penetration Testing -Vulnerability Assessment -Memory Forensics -Network Forensics -Operating Systems (Windows, Linux, macOS) -Writting -Data Entry -Network Administration -System Administration -Endpoint Security -Hardware/Software Maintenance - Recovery of Lost Email/Social Media Accounts
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Android
    Cisco Router
    Computer
    Cisco
    Firewall
    Microsoft Outlook
    Windows Administration
    Cacti
    User Authentication
    Microsoft Outlook Development
    Information Security
    Operating System
    IT Support
    Digital Forensics
    Python Script
    Support Services Unlimited Dashboard
    Writing
    Vulnerability Assessment
    Data Recovery
    Penetration Testing
  • $8 hourly
    Hello, my name is Emmanuel Mwara. A Professional Penetration Tester & Bug Bounty Hunter. Bug hunting is my passion and Penetration Testing is my profession. As a bug hunter I am able to find vulnerability in deep and as penetration tester I am able to create a good & clear penetration testing report. In a world where cyber threats are constantly evolving and becoming more sophisticated, it's imperative that you work with a trusted pentester who understands the latest techniques and trends. With years of proven experience as a pentester, I have honed my skills and expertise to deliver results that exceed expectations. My passion for helping businesses stay secure is second to none, and I always look forward to establishing new long-term relationships with clients to ensure that their security remains strong and resilient. My expertise in penetration testing:- ✅Web-Application Penetration Testing based on OWASP TOP 10 ✅Vulnerability Assessment-website & web application ✅SQL Injection ✅XSS-Cross Site Scripting ✅CSRF-Cross Site Request Forgery ✅SSRF-Server Site Request Forgery ✅Business Logic Flaw ✅IDOR-Insecure Direct Object ✅RCE-Remote Code Execution ✅RFI-Remote File Inclusion ✅LFI-Local File Inclusion ✅Path Traversal ✅Authentication Bypass ✅File upload ✅Host Header Injection ✅Open Redirect ✅HTML Injection ✅CORS-Cross Origin Resource Sharing ✅Clickjacking ✅E-mail Spoofing Pentesting tools: BurpSuite Professional, sqlmap, nmap, wireshark, Metasploit, Nessus, XSSStrike etc Thank you so much for taking the time to visit my profile, and feel free to reach out at any time if you have any questions! Keep your business safe & secure!!
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Microsoft Active Directory
    Web Scraping
    Scripting
    Python
    Information Security
    Web Application Security
    Application Security
    Security Assessment & Testing
    Penetration Testing
    Vulnerability Assessment
    Network Penetration Testing
    Web App Penetration Testing
    Network Security
  • $40 hourly
    Hello dear humble client. I'm an ethical hacker of over 5 years in the Field, I've work work with a lot of company in Belgium, Australia and UK and they all enjoy my service with them. And also I've help a lot of people on Upwork to solve their issue base on Facebook, Twitter, Instagram, Snapchat, crypto, Money hack from hacker recovery and Gmail recovery. And I always do my job successfully for them and they even introduce me to their other partners. You dealing with me you didn't have any issue anymore and all your problem will be solve successfully sir/ma. WhatsApp +254790333167
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    JavaScript
    Web Development
    Machine Learning
    Python
    HTML
    Cybersecurity Tool
    Ethical Hacking
    Vulnerability Assessment
    Penetration Testing
  • $25 hourly
    Career Objective To attain a position in an organization where I can maximize my potential as well as acquire experience in the ICT field and contribute to decision and policy formulation. -I am good at ethical hacking -I love automating tasks in Kali Linux using bash and python -I am good at setting up computer networks from the physical infrastructure to monitoring the network. -Penetration testing using Kali Linux, social engineering, and writing reports on how we can improve the organization's security. -Writing malware such as keyloggers and backdoors. -Writing network tools such as a network scanner similar to a network discover tool or a network packet sniffer all in Python language.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Ethical Hacking
    Accounting
    Social Engineering Assessment
    Cyber Threat Intelligence
    IT Support
    Python Script
    Penetration Testing
    Computing & Networking
    Network Engineering
  • $9 hourly
    I'm a graphic designer experienced in creating logos for companies and banners for even cloth companies. I'm also good at I.T. I’m also a developer experienced in building websites for small and medium-sized businesses. Whether you’re trying to win work, list your services, or create a new online store, I can help.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Linux System Administration
    Ubuntu
    Windows 11 Administration
    Cybersecurity Tool
    Software Configuration Management
  • $25 hourly
    Hi there! I'm a passionate tech enthusiast with a strong background in Python programming and cybersecurity. I thrive on solving complex problems and developing secure, efficient solutions. With expertise in Python, I enjoy creating scripts and applications that enhance security protocols and automate tasks. My cybersecurity knowledge equips me to identify vulnerabilities and implement robust security measures to protect data and systems. I’m always eager to learn and stay updated with the latest trends in technology. Let’s connect and explore how we can collaborate to create innovative and secure solutions! Feel free to modify it to match your style!
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Network Analysis
    Ethical Hacking
    Penetration Testing
    Python
  • $20 hourly
    Hi! My name is Yusuf a passionate Ethical Hacker who can protect your systems/networks from web attacks by implementing security policies at different layers or by detecting the security flaws with over 5 years of experience in Penetration Testing, System, Network, Web, and Mobile Security. I have participated in multiple bug bounty programs both Private and Public and helped to disclose a couple of security exploits. I'm continuously and proactively improving my professional skill set by participating in various national and international training, seminars, conferences, and by acquiring and maintaining specialized professional Cyber Security certifications Some of the Tools/Skills I have a great experience with: - Cloud: AWS, Azure, GCP, Digital Ocean, OVH. - Deployments: Kubernetes. - Operating Systems: Linux (CentOS, Fedora, Ubuntu, Debian) and Windows Servers (2008R2 - 2012 - 2016). - Firewalls/Proxies: pfSense, Nginx, Cisco, Juniper. - VPN: OpenVPN, StrongSwan, OpenSwan, IPSec, SoftEtherVPN. Ready to offer my expertise! Feel free to get in touch for an initial consultation. I look forward to working with you.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Web Hosting
    Information Security Audit
    Cloud Security
    Website Security
    Ethical Hacking
    Cybersecurity Monitoring
    Information Security
    Security Testing
    Cybersecurity Management
    System Security
    Web App Penetration Testing
    Vulnerability Assessment
    Certified Information Systems Security Professional
    Network Security
  • $9 hourly
    Master of All bussinssz network & negotiationd good bussiness ddveloper and more energic hardworking
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    O-1 Visa
    RADAR Construction Management RADAR
    H&S Web Solutions Inventory Management System
    PASS Software
    E-Business Soft Solution e-Campus
    JGSullivan Interactive Digital Asset Management
    Yelp Management
    IBM System p
    WHMCS Development
    TALogic MyCommunity
    USAID
    LAMP Administration
  • $10 hourly
    I'm a software engineer with experience in ethical hackig, penetration testing and Information and Communication Technology. I can help you recover lost social media accounts, retrieve lost or forgoten passwords and boost security to your accounts. I will do your task within the shortest time possible and as per your requirement. Regular communication is really important, so lets keep in touch.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    C++
    Erlang
    Penetration Testing
    Instagram
    Facebook
    Ethical Hacking
    WhatsApp
    Information Security
    Information Retrieval
    JavaScript
    Python
    PHP
  • $20 hourly
    I am a passionate Cybersecurity Professional and a Certified Penetration Tester with nearly two years of experience. I am proficient in conducting vulnerability assessments, penetration tests, and security audits to identify and remediate vulnerabilities. I possess strong technical skills and expertise in network security, web-application security, and security reporting. I remain committed to continuous learning and actively involved in the cybersecurity community.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Office 365
    SOC 1
    Software Configuration Management
    Help Desk Technology International ServicePRO
    Technical Support
    Network Administration
    Windows 10 Administration
    Security Assessment & Testing
  • $20 hourly
    I am Software Engineer with experience in Ethical Hacking, Penetration Testing and Cybersecurity. I have worked with different clients all over the world to help them recover their lost social media accounts and improve device security. I have experience in Kali Linux, Network Security, Ethical Hacking and IT services. I will fully project manage your brief from start to finish. Regular communication is important, so let's keep in touch.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Instagram
    Google Ads
    Software
    Python
    Ethical Hacking
    Information Security
    Vulnerability Assessment
    Penetration Testing
  • $28 hourly
    As an experienced Cyber Security Analyst, I specialize in uncovering vulnerabilities and securing systems against potential threats. With a proven track record of conducting comprehensive vulnerability assessments and penetration testing, I help businesses enhance their security posture. My expertise includes : * Proven Expertise: Over two years of experience performing in-depth penetration tests on diverse infrastructures, identifying high-risk vulnerabilities, and crafting actionable remediation strategies that significantly improve security resilience. * Advanced Tool Proficiency: Skilled in industry-standard tools such as Metasploit, Burp Suite, Wireshark, and SIEM, ensuring a thorough approach to identifying and mitigating threats. * Real-World Application: Hands-on experience with projects like developing secure Django- based applications and leading email threat detection initiatives using Apps Script. * Certifications: Certified Network Security Practitioner (CNSP) and Practical Ethical Hacking (PEH), among others, demonstrating a commitment to staying at the forefront of cybersecurity practices. Whether securing cloud environments, strengthening network defenses, or identifying application vulnerabilities, I deliver results that protect your assets and instill confidence in your security infrastructure. Let's work together to ensure your systems are fortified against evolving threats.
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Network Penetration Testing
    Linux
    API
    Linux System Administration
    Web App Penetration Testing
    Malware Removal
    Vulnerability Assessment
    Metasploit
  • $15 hourly
    I am a Cyber Security analyst with experience in penetration testing, network security and threat & vulnerability management. - I am competent in the use of Wireshark, Burp Suite, Nmap, Nessus and similar cyber security tools - I am well-verse in reconnaissance, scanning and enumeration, web application security and database security - I am experienced in Python programming. - Feel free to reach out for cyber security-related consultation!
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Web App Penetration Testing
    Information Technology
    Network Security
    Information Security Threat Mitigation
    Wireshark
    Database Administration
    HTML5
    SQL Injection Mitigation
    SQL
    Cyber Threat Intelligence
    Tech & IT
    Linux
    Python
  • $3 hourly
    good at software development, web development, android apps development, programming and database usage, marketing specialist, cyber security and social media accounts management
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Virtual Machine Operating System
    Active Listening
    Creative Writing
    Social Media Account Setup
    Android Debug Bridge
    C
    Typing
    Windows Forms
    Cryptocurrency
    Windows 11 Administration
    Windows 10 Administration
    HTML5
    Python
  • $25 hourly
    Experienced IT Specialist | Cybersecurity & Cloud Computing Expert I am a highly skilled IT professional with a strong background in Cybersecurity and Cloud Computing. I specialize in managing and securing digital infrastructures, deploying cloud-based solutions, and optimizing IT systems to enhance business operations. With hands-on experience in network administration, data protection, and software development, I deliver efficient and reliable solutions tailored to clients' needs. Key Skills: Cybersecurity strategy and implementation Cloud computing (AWS, Azure, Google Cloud) Ethical hacking Penetration testing Vulnerability assessment Experience Highlights: Designed and implemented secure cloud environments for multiple organizations, improving system performance and data protection. Successfully completed cybersecurity audits and developed robust strategies to mitigate risks. Led teams in IT projects, delivering high-quality results under tight deadlines. I am passionate about staying updated with the latest technology trends and helping businesses thrive by providing scalable and secure IT solutions. Let’s collaborate to achieve your project goals!
    vsuc_fltilesrefresh_TrophyIcon Kali Linux
    Cloud Computing
    Cloud Management
    Vulnerability Assessment
    Security Analysis
    Web Application Security
    Security Infrastructure
    Security Testing
    Information Security
    Cybersecurity Management
    Blockchain
    Web App Penetration Testing
    Penetration Testing
    Cloud Security
    Ethical Hacking
  • Want to browse more freelancers?
    Sign up

How hiring on Upwork works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.

Trusted by

How do I hire a Kali Linux Freelancer near Nairobi, on Upwork?

You can hire a Kali Linux Freelancer near Nairobi, on Upwork in four simple steps:

  • Create a job post tailored to your Kali Linux Freelancer project scope. We’ll walk you through the process step by step.
  • Browse top Kali Linux Freelancer talent on Upwork and invite them to your project.
  • Once the proposals start flowing in, create a shortlist of top Kali Linux Freelancer profiles and interview.
  • Hire the right Kali Linux Freelancer for your project from Upwork, the world’s largest work marketplace.

At Upwork, we believe talent staffing should be easy.

How much does it cost to hire a Kali Linux Freelancer?

Rates charged by Kali Linux Freelancers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.

Why hire a Kali Linux Freelancer near Nairobi, on Upwork?

As the world’s work marketplace, we connect highly-skilled freelance Kali Linux Freelancers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Kali Linux Freelancer team you need to succeed.

Can I hire a Kali Linux Freelancer near Nairobi, within 24 hours on Upwork?

Depending on availability and the quality of your job post, it’s entirely possible to sign up for Upwork and receive Kali Linux Freelancer proposals within 24 hours of posting a job description.