Hire the best Penetration Testers in Egypt

Check out Penetration Testers in Egypt with the skills you need for your next job.
  • $70 hourly
    As a cybersecurity expert and projects manager at XEye Security (XEyecs.com), I have worked with clients across the EU, the US, the Middle East, and South Africa and provided high-quality cybersecurity, Penetration Testing, Digital Forensics, and Cyber Investigation services ensuring their system's security against all kinds of cyber threats. I have more than 12 years of dedicated and outstanding experience with extensive knowledge dedicated to delivering high-quality security services that meet and exceed client's expectations. I believe that innovation, efficiency, and quality are the cornerstones of exceptional cybersecurity. At XEye Security we provide robust cybersecurity solutions and services as below: - Security Operations Center - Network Security - OT Security - Blockchain Security - Cloud Security - Email Security - Information Security Compliance Standards consulting and auditing - Cyber Investigation - Digital Forensics - Security Review - Vulnerability Remediation and Malware Removal - Dark Web Monitoring We also provide through our XEye Academy Cybersecurity recorded, live and private trainings, our private trainings include: - Security Analyst - Red Teaming - Application Security - Network Security - Security Awareness Training - Cybersecurity Certificate Based Training Please reach out to me though Upwork and I and my team are happy to support you anytime.
    Featured Skill Penetration Testing
    Information Security Audit
    Cybersecurity Tool
    Security Assessment & Testing
    Security Analysis
    Security Testing
    Cloud Security
    Red Team Assessment
    Code Review
    Cybersecurity Monitoring
    ISO 27001
    Information Security
    Digital Forensics
    Cybersecurity Management
    Vulnerability Assessment
  • $35 hourly
    Worried About Security? Tired of Boring Tasks? Need software Solutions ? No Problem! Concerned about your system’s security? I’ll safeguard your digital assets with thorough penetration testing and vulnerability assessments. Drowning in tedious tasks? Let me automate them, saving you time and enhancing productivity. No website? I create custom sites that not only look great but work perfectly for your needs. Let’s tackle your digital challenges together! I am Nour El Dien Bassiouny, a dedicated Penetration Tester with a strong focus on web, network, and android app pentesting. Holding the eWPTXv2 certification, I bring expertise in identifying and exploiting vulnerabilities to secure your systems effectively. My technical proficiency spans various programming languages and frameworks, including C++, C, PHP, MySQL, SQLite3, MongoDB, Laravel, Flask, Java, Python, and Bash. I am skilled in web and desktop development, automation, web scraping, and API development. With a primary emphasis on penetration testing and vulnerability assessment, I am committed to delivering thorough and reliable security evaluations to protect your assets. Let's work together to enhance your cybersecurity posture.
    Featured Skill Penetration Testing
    Automation
    PHP
    API Testing
    API Development
    Database
    Operating System
    Python
    C++
    Linux
    Web App Penetration Testing
    Network Engineering
    Web Application Development
    Computer Network
    Network Penetration Testing
  • $30 hourly
    I am an Ethical hacker, Web appliaction penetration tester, Mobile appliaction penetration tester, I worked at Hackerone Platform for almost 4 years , Found 150 Valid bug at different big companies like Autodesk, Dyson, Horizen, GrabCAD, BitMEX, Pfizer, Acronis, SEGA, etc... , Received 150 Thanks from diff companies , Created/wrote private tools with python programming langauge to automate find bugs
    Featured Skill Penetration Testing
    Smart Contract
    Web3
    Web Application Security
    Usability Testing
    Bug Bounty
    Desktop Application Testing
    Mobile App Testing
    Ethical Hacking
    Network Penetration Testing
    Web App Penetration Testing
    Application Security
    Kali Linux
    Information Security
    Vulnerability Assessment
  • $35 hourly
    I’m a certified web penetration tester who can develop an in-depth report about the security posture and the required actions for the security compliance using a vulnerabilities/risks assessment process. I'm Also certified Web Penetration Tester with a good experience in testing a lot of websites, in addition I'm ISO 27001 information Security Management system. I'm Location agnostic, working hours flexible, task focused and I've a Skype + Good Broadband. I can present a functional Penetration Test, as I have hacked many websites and I have a good experience to find security Vulnerabilities including but not limited to:  Cross site Scripting  SQL injections  XML injections  SSL configuration (hearth bleed, etc.)  Authentication problems  Distributed Denial-of-Service (DDoS) attack  Load Testing  Path Disclosure (insecure direct objects)  Cross site request forgery (CSRF)  JavaScript source code analyze  And much many more. I can write an in-depth report for you and deliver the full PDF stating:  The problem  What are these risks can cause?  What the problem means.  What are the remediation actions needed?  What links are affected. All this with no risk and no downtime, your visitors won't even know that testing is being done. Your report is deleted from my server immediately after delivery. It's for your eyes only. I'm professional in supporting and providing troubleshooting and assisting users, whereas I'm Microsoft Certified Desktop Support Technician, Microsoft Certified Professional since 2009 and I'm a professional user to Win 8 / Win 10 and Linux/Unix operating systems. In addition, I can provide security suggestions to protect the local PC as I'm certified ethical hacker and penetration tester who can develop an in-depth report about the security posture and the required actions for the security compliance using a vulnerabilities/risks assessment process. WHY ME: ✔️ Ready to Start ✔️ Keep your Data Secure and Confidential ✔️ Responsive and works Perfectly on all devices ✔️ Google Approved. 80+ Google Insight Rating ✔️ Strong SEO Structure, Integrated with Social media platforms ✔️ Friendly admin panel, I also provide training videos of admin panel ✔️ and more...
    Featured Skill Penetration Testing
    WordPress Malware Removal
    Security Analysis
    Network Administration
    Computing & Networking
    Website Security
    Web Application Security
    Risk Assessment
    Security Engineering
    Cybersecurity Management
    Kali Linux
    Vulnerability Assessment
    Information Security
    Network Security
  • $40 hourly
    I'm a Penetration Tester and Cyber Security Specialist who is a professional in evaluating the security posture of Web-Applications (Websites) and ensuring the security of personal clients' online identities, accounts, devices, and networks, I've possessed my current knowledge through 3+ years of self-study and research plus 2+ years of work in the industry, protecting clients on a personal level and running vulnerability assessments against business websites, always leaving positive impression and impact, I hold a great record of being able to expertly provide the following services: - Perform comprehensive security checkups on Emails and Phone numbers and pinpoint security holes which often lead victims to be hacked with zero interaction nor awareness from them. - Assist in Account Recovery (Ex. Instagram, Facebook) - Educate thoroughly on the findings and remediations for a vulnerable target, equipping clients with enough information to trust themselves as they continue to utilize the technologies as normal with no fear of being targetted by hackers. - Investigate and educate on online frauds/scams, especially crypto ones, why and how they work, and how to distinguish between legit and not legit easily. - Clean up networks and devices from viruses/malware and ensure optimal patching for security. - Report fraud websites that impersonate legit businesses for a takedown. IMPORTANT: When it comes to cybersecurity-related services, there is a number of scammers not to be underestimated, whether within or outside of Upwork, therefore stay vigilant and keep in mind the following, 1. If you were scammed online via crypto, there's no one out there with the right to give a guarantee that they will be able to recover it for you despite how well furnished the so-called hacker's portfolio appears to be, the chance remains very slim and you should only pursue this kind of service for the sake of leaving no stone unturned knowing the high probability of failure, and you should only select a freelancer with a reputable profile and reviews to back up their activity because scammer accounts are usually fresh with no reviews and no verified ID, feel free to consult me to evaluate that. 2. Same applies to the request of hacking an account, there are complicated caveats that explain why it DOES NOT work the way you think it does but to keep it short, if you want someone's account hacked, aside from it being illegal and unethical and isn't the type of "service" I provide, the chance for it to work is about 1% to begin with, again, I'm available for consultation, account recovery is a different subject with a higher probability for success as long as it's your own account that was lost/hacked.
    Featured Skill Penetration Testing
    Malware Removal
    Information Security
    Vulnerability Assessment
    System Security
    Network Security
    Information Security Consultation
    Website Security
    Network Penetration Testing
    Internet Security
    Ethical Hacking
    Security Testing
    Security Assessment & Testing
  • $66 hourly
    ⚠️DISCLAIMER ⚠️: I DON'T ACCEPT ILLEGAL WORK AND I DO NOT HACK MOBILE PHONES OR ACCOUNTS OR ANY TYPE OF THIS WORK As a dedicated Computer Engineering student, I've invested years in mastering ethical hacking, web app penetration testing, and conducting OSINT investigations, starting my journey in 2018. Through practical application and thorough testing of these skills, I've evolved into a versatile professional, excelling as a hacker, proficient web app penetration tester, adept vulnerability assessment specialist, and detail-oriented OSINT investigator. My track record speaks for itself, boasting a pristine reputation and a flawless 100% success rate across all Jobs FAQ Q: Am I certified 🤔? A: yes,I am certified web app Penetration tester with eWPTX from INE Q: What tools do i use in Penetration testing? A: That depends on the job, so sometimes i use manual scans and exploits and sometimes i use tools like (Nmap, BurpSuite, Metasploit, Nessus, SQLmap, OpenVAS, WPScan, Nikto, TestSSL)
    Featured Skill Penetration Testing
    Linux System Administration
    Internet Security
    Website Security
    Web App Penetration Testing
    Aircrack-ng
    Article Writing
    Black Box Testing
    Cybersecurity Monitoring
    Ethical Hacking
    Web Testing
    Digital Forensics
    Cybersecurity Management
    System Security
    Vulnerability Assessment
  • $35 hourly
    A 24+ times certified Senior Cyber Security Consultant with 8+ years of experience in building, architecting, and testing software, cloud systems, and DevOps systems to be reliable, secure, and cost-effective. I was able to apply my knowledge to ministries, fintech leaders, giant banks, technology behemoths, multiple regulator entities, and ...etc. In summary, A customer-centric professional who specializes in Cyber Security, Cloud Engineering/Security, and DevSecOps Engineering. Currently I am certified in 1 ) AWS Certified Cloud Practitioner (AWS CCP) 2) AWS Sysops Administrator Associate (AWS SOA) 3) AWS Developer Associate (AWS DVA) 4) AWS Solution Architect Associate (AWS SAA) 5) AWS Certified DevOps Engineer Professional (AWS DOP) 6) AWS Certified Security Specialty (AWS SCS) 7) Microsoft Azure Fundamentals (AZ900) 8) Microsoft Azure Administrator (AZ104) 9) Microsoft Azure Developer Associate (AZ204) 10) Microsoft Security, Compliance, and Identity Fundamentals (SC900) 11) Microsoft Certified: Azure Data Fundamentals (DP900) 12) OCEG GRC Professional Certification (GRCP) 13) OCEG GRC Auditor Certification (GRCA) 14) OCEG Integrated Policy Management Professional (IPMP) 15) OCEG Integrated Data Privacy Professional (IDPP) 16) OCEG Integrated Aduit & Assurance Professional (IAAP) 17) Microsoft Certified: Azure AI Fundamentals (AI900) 18) Microsoft Certified: Power Platform Fundamentals (PL900) 19) Microsoft Certified: Azure Solutions Architect Expert (AZ305) 20) Google Cloud Digital Leader (GCP CDL) 21) Google Associate Cloud Engineer (GCP ACE) 22) eLearnSecurity Certified Professional Penetration Tester (eCPPT) 23) eLearnSecurity Mobile Application Penetration Tester (eMAPT) 24) eLearnSecurity Web Application Penetration Tester Extreme (eWPTX)
    Featured Skill Penetration Testing
    Cloud Security Framework
    Network Penetration Testing
    Cloud Security
    Cloud Computing
    Web App Penetration Testing
    DevOps Engineering
    Google Cloud Platform
    Microsoft Azure
    Amazon Web Services
  • $130 hourly
    Over the last 10 years, I have developed a wide range of Android and iOS Applications including apps for small businesses and for huge international companies. Through my career in two international telecommunication companies, I have developed mobile apps contains a huge integration logic with many systems, location and GPS based apps, data analysis apps, and more. My core competency lies in complete end-end management of a new mobile application development project, and I am seeking opportunities to build applications from the ground up for you or your business. I am also a Certified Java SE Programmer, having good experience in J2EE, JSF, SQL & PL/SQL, and Python.
    Featured Skill Penetration Testing
    Unity
    Blender
    Android
    API Integration
    Android App Development
    iOS Development
    PHP
  • $50 hourly
    I'm an ambitious, enthusiastic and quick learner person graduated from faculty of science department of mathematics and computer science. Having a passion for IT infrastructure and systems security encourage me to be certified cybersecurity specialist, ethical hacker (CEH) and security analyst (ECSA) from EC-Council ready to take any penetration testing projects. Experienced in plethora of appliances and systems like Microsoft Windows, Red hat Linux, Cisco routers and switches, Apple Mac OS, HPE servers and storage , Dell EMC, Oracle Solaris, Sophos XG Firewall, Fortinet FortiGate and VMware products. Experienced in deploying and implementing a plethora of the formally mentioned products and software. Experienced in Backup Solutions and products from vendors like QNAP, Synology, Kaspersky, Veeam and Symantec. Certified Ethical Hacker from the EC-Council Certified Security Analyst from the EC-Council Certified Professional Android Developer from Google on Udacity Certified Cybersecurity Specialist from University of Maryland on Coursera Certified IT Essentials from Alexandria University FSCC
    Featured Skill Penetration Testing
    Docker
    Ubiquiti
    Virtual LAN
    Windows Server
    Network Security
    Linux System Administration
    Network Design
    Microsoft Azure
    Python
    System Security
    Network Penetration Testing
    System Administration
    Firewall
    Kali Linux
  • $25 hourly
    A reliable and detail-oriented software devleoper. Offering skills in Python, JavaScript, php, NodeJS, ReactJS, MongoDB, MySQL, Web Security & Penetration Testing, Web Servers, Web Development bringing 8 years of experience in web development and security which meet customers’ needs. Projects worked on: Web Application Firewall using OpenResty Python Cryptocurrencies APIs Integrations Fashion Website Blog Network-Based Inventory Resources Management
    Featured Skill Penetration Testing
    JavaScript
    TypeScript
    Fastify
    Node.js
    Database
    MongoDB
    Web Application Firewall
    Web Application
    Customer Relationship Management
    Custom PHP
    Web Application Security
    Linux System Administration
    Red Hat Administration
    OpenResty
  • $25 hourly
    Cyber security Engineer specialising in web and application security. With a strong background in both offensive and defensive security strategies, I bring a comprehensive approach to securing digital assets. My expertise spans different security sub-domains including : - Source Code Review - Network Security - WebApplication Penetration testing and hardening - Digital Forensics - Reverse Engineering and Malware Analysis My strong background in Software Engineering alongside previously working in a start-up gives me an edge by allowing me to view issues not only from a security standpoint but also from a business and a developer's perspective. I look forward to hearing from you to discuss how I can support your security initiatives and secure your digital assets.
    Featured Skill Penetration Testing
    Linux
    Microsoft Active Directory
    Metasploit
    Splunk
    MySQL
    Wireshark
    C
    JavaScript
    C++
    Python
    Code Review
    Network Traffic Analysis
    Reverse Engineering
    Web Application Security
  • $15 hourly
    A highly motivated IT engineer with a strong drive and determination to address intricate networking challenges, equipped with exceptional organizational skills and an extensive working knowledge of various networking technologies. Demonstrating a steadfast commitment to staying abreast of the latest advancements in the field, I have effectively provided colleagues and clients with insightful guidance and cutting-edge networking consultancy services. I am currently seeking a new and stimulating network engineer role that allows me to leverage my existing skills and experience while promoting my professional growth.
    Featured Skill Penetration Testing
    WordPress
    Network Engineering
    Query Debugging
    Web App Penetration Testing
    Microsoft Server
    Network Administration
    Office Administration
    Microsoft Active Directory
    Microsoft Exchange Server
    Office 365
  • $15 hourly
    I'm a cybersecurity professional with real-world SOC experience. I help businesses detect threats, automate tasks, and secure their infrastructure using proven tools and techniques. What I can do for you: Configure and secure network devices (firewalls, routers, switches) – FortiGate, Cisco, and more Set up and manage security tools: SIEM (Splunk), IDS/IPS, VPNs, EDR Automate cybersecurity tasks with Python scripting Perform log analysis, traffic inspection (PCAP), and identify IOCs Set up secure server environments (Linux/Windows) for web apps or internal use Conduct incident response, threat detection, and vulnerability analysis Offer cybersecurity consultation tailored to your business needs
    Featured Skill Penetration Testing
    Network Monitoring
    System Security
    Network Engineering
    Insurance & Risk Management
    Linux System Administration
    Windows Administration
    Cloud Computing
    Troubleshooting
    Cyber Threat Intelligence
    Network Access Control
    Threat Detection
    Network Security
    Firewall
    Python
  • $25 hourly
    I am a computer science student with extensive background in iot security and networking, I’m head of IEEE security branch in PUA, an excellent communicator and I’m extremely dedicated when I join a project. My skills include excellent communication and documentation, I can write academical papers with ease, as evidenced by my IELTS grade. I adhere to agreed upon prices and usually don’t charge per hour. I won’t take a job unless I can guarantee I can do it, additionally, if you’ve found yourself in need of a quick learner that’s where I shine the most. I’ve developed my own PoS system forked from ospos and currently working on integrating it with odoo for seamless integration without fully migrating to odoo. Excellent with wuick scripts, dirty work and the like- if you are on a budget and would like to keep the spendings to a minimum, I’m sure we can come to an agreement, just don’t hesitate to hit me up! I mostly love hardware hacking and projects concerning dumb workarounds, because I can more often than not transform that system into a robust, production-ready solution, just point me towards the system and watch the magic occur! I have designed many dev boards for rpi 3 and 4 compute modules, so evidently electrical engineering is something I excel at aswell. Especially IoT and embedded systems, and my projects do speak on my behalf. I’ve helped port openwrt to many unsupported systems, including modifying original firmware, modifying bootloader, patching drivers, etc I’ve also helped migrate an ERP system off the cloud to local hosting hardware while maintaining reliability and uptime. I have joined numerous championships, scoring second twice consecutively in WRO, locally and worldwide. Contribute to gadgetbridge huawei ble link v1 protocol reverse engineering. Also added support for storage manipulation. Enabled nfc functionality, but development stopped before fully understanding the payment process protocol. Basically the Swiss army knife of computer and through leisure before profession, but the best trademan you could hire is one who enjoys his work. If I applied, this means I’m interested, and therefore currently free, so please don’t hesitate to reply anytime, I’m almost always available.
    Featured Skill Penetration Testing
    Computer Hardware Installation
    Hardware Testing
    Reverse Engineering
    ESP32
    C
    Web Design
    Network Engineering
    Linux System Administration
    Embedded System
    Computer Network
    Computing & Networking
    Tech & IT
    Linux
  • $999 hourly
    Penetration Tester with a passion for identifying and mitigating security vulnerabilities. Leveraging a strong technical background and extensive experience in ethical hacking, I specialize in assessing network and application security, conducting thorough vulnerability assessments, and providing actionable recommendations to enhance cyber defenses. I am committed to staying up-to-date with the latest hacking techniques and security trends to deliver comprehensive and effective solutions.Penetration Tester with a passion for identifying and mitigating security vulnerabilities. Leveraging a strong technical background and extensive experience in ethical hacking, I specialize in assessing network and application security, conducting thorough vulnerability assessments, and providing actionable recommendations to enhance cyber defenses. I am committed to staying up-to-date with the latest hacking techniques and security trends to deliver comprehensive and effective solutions.
    Featured Skill Penetration Testing
    Web Application Security
    Network Security
    Vulnerability Assessment
  • $5 hourly
    🔐 Penetration Testing Expertise I specialize in various penetration testing methodologies, ranging from reconnaissance and enumeration to exploitation and post-exploitation phases. My self-taught journey has allowed me to dive deep into: Network Penetration Testing: Identifying open ports, services, and vulnerabilities using tools like Nmap, Wireshark, and Metasploit. Web Application Testing: Knowledge of the OWASP Top 10 vulnerabilities, with hands-on experience in finding and exploiting web application security flaws like SQL injection, XSS, and CSRF. System Exploitation: Familiar with exploiting misconfigurations, weak credentials, and outdated systems on Linux and Windows environments. 🔧 Tools and Techniques I have practical experience with a wide range of industry-standard tools used in penetration testing: Nmap: Network scanning and port enumeration. Metasploit Framework: Exploitation and post-exploitation. Burp Suite: Web application vulnerability identification. Wireshark: Network protocol analysis and traffic monitoring. OpenVAS & Nessus: Vulnerability scanning and reporting. SQLMap: Automated SQL injection and database testing. Hydra: Brute force attack tools for login and credential testing. John the Ripper & Hashcat: Password cracking and analysis. 📚 Self-Study & Certifications (In Progress) While I’m still pursuing formal certifications, my continuous learning path has exposed me to the same concepts and knowledge covered in recognized programs such as: TryHackMe: Participated in Capture the Flag (CTF) challenges, working on various real-world penetration testing scenarios. Hack The Box: Completed multiple labs focused on web and network exploitation, privilege escalation, and post-exploitation. YouTube & Blogs: Regularly follow prominent cybersecurity experts and resources for up-to-date learning and practical knowledge. 🖥️ Personal Projects To further sharpen my skills, I’ve developed and maintained a personal cybersecurity lab to simulate penetration testing environments. Here are a few highlights of my hands-on projects: Home Lab Setup: Created virtual environments using VirtualBox, simulating networks and vulnerable machines such as Metasploitable and DVWA for practice. Conducted vulnerability scans and exploited systems using tools like Nmap, Nessus, and Metasploit. CTF Participation: Regularly engage in Capture the Flag events on TryHackMe and Hack The Box, successfully identifying and exploiting vulnerabilities in both Linux and Windows environments. Scripting Automation: Developed basic Python scripts to automate repetitive tasks like scanning and vulnerability assessment. 🕵️‍♂️ Key Services I Offer Whether you’re a small business or an individual looking to secure your systems, I can provide valuable services to enhance your security posture: Web Application Penetration Testing: Comprehensive testing to identify and exploit web vulnerabilities, including SQL injection, XSS, and broken authentication mechanisms. Network Penetration Testing: Identify open ports, vulnerable services, and misconfigurations in your network infrastructure. Vulnerability Assessment: A detailed report on potential vulnerabilities within your systems, offering insights and suggestions on remediation. Password Auditing and Brute Forcing: Ensure that your systems have strong, secure password policies by testing them against various brute force methods and password cracking techniques. Wireless Network Testing: Evaluate the security of your wireless infrastructure, including encryption and access point vulnerabilities. Security Consultation: Provide strategic guidance on how to strengthen your security practices, including best practices in securing web applications, networks, and user data. 🧠 Continuous Learning & Future Goals Cybersecurity is an ever-evolving field, and I pride myself on being a lifelong learner. I regularly participate in online courses, hands-on labs, and CTFs to stay current with the latest attack vectors, vulnerabilities, and defense strategies. I’m currently working towards formal certifications such as: CompTIA Security+ Certified Ethical Hacker (CEH) Offensive Security Certified Professional (OSCP) I am committed to continuously expanding my knowledge and refining my skills to provide high-quality cybersecurity services. 🚀 Why Choose Me? While I may be at the beginning of my career in cybersecurity, my enthusiasm, dedication, and hands-on experience set me apart. Here’s why you should consider me for your next project: Self-Motivated and Fast Learner: I have developed a strong technical foundation through self-study and practical experience, giving me the ability to adapt to new tools and technologies quickly. Passion for Cybersecurity: I am deeply passionate about identifying vulnerabilities and helping others secure their systems. My work is driven by curiosity and a desire to protect against cyber threats. Attention to Detail: Cybersecurity requires thorough analysis an
    Featured Skill Penetration Testing
    Vulnerability Assessment
    Security Analysis
    Kali Linux
    Risk Assessment
    Risk Analysis
    Security Testing
    Network Security
    OWASP
    Internet of Things
    Troubleshooting
    Operating System
    Problem Solving
    Network Design
    Information Technology
  • $35 hourly
    I am a penetration tester and cybersecurity professional with a strong passion for securing digital systems and uncovering vulnerabilities before attackers do. With hands-on experience in ethical hacking, web and network security, and vulnerability assessments, I specialize in identifying security flaws and helping businesses strengthen their defenses. What I Do Best: - Web & Network Penetration Testing: Identifying and exploiting vulnerabilities in applications and infrastructure. - Security Assessments & Compliance: Ensuring systems align with security best practices (OWASP, MITRE ATT&CK, etc.). - Exploit Development & Red Teaming: Simulating real-world attacks to test security resilience. - Proficiency in Security Tools: Skilled in Burp Suite, Metasploit, Nmap, Wireshark, Kali Linux, and more. - I believe in continuous learning, staying ahead of emerging threats, and providing actionable security insights. Let’s work together to build a safer digital world!
    Featured Skill Penetration Testing
    Bash Programming
    PHP
    Python
    Phishing Website
    Information Security
    Ethical Hacking
    Network Penetration Testing
    Web App Penetration Testing
    Linux System Administration
  • $5 hourly
    Hello, My name is Omar Ahmed, a 21-year-old student at the Faculty of Engineering, specializing in Artificial Intelligence at Mansoura University. In addition to my studies, I am also self-learning Cyber Security as it is my passion to pursue a career in this field. I have hands-on experience in web penetration testing and web vulnerabilities, with a strong understanding of various attack vectors and mitigation techniques. My expertise includes identifying security flaws in web applications, exploiting them ethically, and providing recommendations to improve security posture. I am also familiar with tools such as Burp Suite, OWASP ZAP, and Metasploit, and continuously work on enhancing my skills through CTF challenges and real-world projects. As I continue to deepen my knowledge in AI and cybersecurity, I am committed to staying at the forefront of technological advancements and contributing to the security of digital environments
    Featured Skill Penetration Testing
    Network Security
    Ethical Hacking
    Cybersecurity Tool
    Web App Penetration Testing
  • $20 hourly
    I am a highly skilled penetration tester with 2 years of hands-on experience in cybersecurity, specializing in Web, API, Android, and Network Penetration Testing. Throughout my career, I've worked with top companies such as SecqLinq, Bugswagger, and DeepStrike, delivering thorough and actionable security assessments. Certified in EWPTXv2 and Certified Authorization Professional (CAP), I bring in-depth knowledge and technical expertise to every project. My approach includes detailed penetration testing and comprehensive reporting to ensure that vulnerabilities are identified and mitigated effectively. Expertise Includes: Web Penetration Testing: Identifying and fixing vulnerabilities in web applications. API Penetration Testing: Securing APIs against common and advanced attack vectors. Android Penetration Testing: Protecting Android applications from security threats. Network Penetration Testing: Enhancing network security by identifying infrastructure weaknesses. I take pride in delivering detailed and professional pentest reports that include thorough risk analysis and remediation recommendations to help clients fortify their security posture.
    Featured Skill Penetration Testing
    Kali Linux
    Vulnerability Assessment
    Web App Penetration Testing
  • $10 hourly
    I provide this service to keep our community on web application to be safe. From malicious hacking 'black hat ' 'Iam ethical hacking' To keep your's community safe. To keep your customer safe. To keep your data safe from any attack. To keep your company growth. Penetration testing Security researchers Information security Bug HunteR
    Featured Skill Penetration Testing
    Information Security
    Cybersecurity Management
    AT&T Cybersecurity
  • $10 hourly
    Hi! I'm Bavly Wagyh Kamal, also known as bibo_fox, a passionate cybersecurity specialist and ethical hacker with extensive experience in penetration testing, vulnerability detection, and bug bounty programs. I specialize in securing web applications, networks, and APIs against real-world threats.
    Featured Skill Penetration Testing
    Bug Bounty
  • $35 hourly
    🌟 Highly skilled and results-driven professional specializing in Cloud Security, Risk & Compliance. 🌟 I offer my expertise in protecting institutional assets and individuals' privacy against cyber threats. Throughout my career, I have evaluated security postures and threats for startups, schools, non-profit entities, and businesses. My core approach is to implement security controls that bring ROI and protect systems and apps from cyber threats while adhering to security benchmarks and compliance standards such as OWASP ASVS and CIS. I possess extensive experience collaborating with founders, executives, and various levels of top management. --------------- 🌟 Cloud Security skills 🌟 --------------- ✔ Build an overall security strategy and architecture ✔Developing security requirements aligned with business goals ✔ Translating security requirements into technical capabilities ✔ Designing resiliency strategies ✔ Designing security strategies for hybrid and multi-tenant environments ✔ Design technical and governance strategies to establish and maintain compliance ✔ Penetration Testing (Pentest+ Certified) ✔ Building, deploying, and maintaining secure infrastructure using IAC (Terraform) ✔ Hold Networking certifications From Cisco and Google (CCNA, Google Cloud Network Professional) --------------- 🌟 Risk & Compliance skills 🌟 --------------- ✔ Experienced in ISO 27K1, FedRamp, StateRamp,CAN-CIOSC-104_2021(cyber secure canda level 1&2) ✔ Familiarity with security frameworks such as MITRE and SP800-218 ✔ Develop compliance security policies, procedures, and incident response plans ✔ Conducting Risk Assessments and Audits ✔ Performing gap analysis and providing remediation steps ✔ Knowledge of security best practices (NIST, SANS, CIS) ✔ Expertise gap analysis to determine the current and future state ✔ Expertise in Information security risk assessment, analytics, and reporting ✔ Vendor Risk Assessment and Attestations ✔ Hold Security certifications From CompTIA and Google (PenTest+, Google Cloud Security Professional) My extensive knowledge of cloud-based technologies, coupled with a deep understanding of risk management frameworks, allows me to deliver robust security solutions for organizations across diverse industries. If you are seeking a dedicated and experienced Cloud Security and Risk & Compliance professional committed to elevating your organization's security posture, let's connect and explore how I can contribute to your success.
    Featured Skill Penetration Testing
    Web App Penetration Testing
    Windows Server
    Linux System Administration
    Terraform
    Cloud Engineering Consultation
    Cloud Security
    Cloud Migration
    Network Penetration Testing
    Cloud Computing
    Cloud Architecture
    Python
    Cloud Security Framework
  • $10 hourly
    As a professional penetration tester with a strong focus on cybersecurity, I specialize in identifying and mitigating vulnerabilities in web applications, networks, and systems. My expertise lies in performing comprehensive security assessments, vulnerability analysis, and ethical hacking to ensure that your digital assets are secure. With a commitment to safeguarding your business from potential threats, I offer tailored solutions that align with industry standards and best practices. Whether you need a detailed penetration test, vulnerability assessment, or security consultation, I am here
    Featured Skill Penetration Testing
    Web App Penetration Testing
    Website Audit
    Web Testing
    Network Security
    Security Analysis
    Malware Removal
    Vulnerability Assessment
    Malware Detection
    Security Testing
    Growth Hacking
    Cybersecurity Management
    Ethical Hacking
  • $20 hourly
    About me? An Egyptian 20-year-old CyberSecurity student who is studying WebApp PenTesting, tinkering with Android in my freetime and Linux Admin 1. I have been maintaining Android Custom AOSP ROMs for 4 years, which made me gain experience in dealing with Command-Line interface (CLI). At the same time, I was learning more about Linux since it is Open-Source Software and currently I have 2+ years experience in Linux.
    Featured Skill Penetration Testing
    Gemini
    Web App Penetration Testing
    Bash
    Chatbot Development
    C
    GitHub Copilot
    GitHub
    Git
    Python
    AOSP
    Linux
    C++/CLI
  • $10 hourly
    I'm a Full Stack .NET Developer with strong hands-on experience in building robust, scalable, and secure web applications using modern Microsoft technologies. My core stack includes: ✔ ASP.NET Core | ASP.NET MVC | Web API ✔ C# | ADO.NET | Entity Framework Core ✔ HTML5 | CSS3 | JavaScript | Bootstrap ✔ SQL Server | LINQ | Git & GitHub ✔ Clean Architecture | RESTful APIs | JWT Authentication 🔹 I’ve developed several real-world applications, including: - **Student Management System** using ASP.NET Core Web API and Clean Architecture. - **Restaurant Management Platform** with Identity, Roles, and JWT Authentication. - **Travelo Template**: A responsive front-end travel agency layout. My approach combines clean code, best practices, and solid problem-solving skills. I focus on writing maintainable, testable, and well-documented code. Whether it's creating REST APIs, building dynamic UIs, or integrating databases, I ensure performance and security are top priority. ✅ I’m always open to new challenges and long-term collaborations. Let’s discuss your project and turn your ideas into a high-quality .NET solution.
    Featured Skill Penetration Testing
    Responsive Design
    Bootstrap
    C#
    ASP.NET
    ADO.NET
    ASP.NET Web API
    ASP.NET MVC
    ASP.NET Core
    .NET Core
    Graphic Design
    WordPress
    Front-End Development
  • $10 hourly
    As a fresh graduate with a keen interest in Cyber Security and Software Development, I am excited about the prospect of contributing my skills and knowledge to your esteemed organization. Throughout my academic career, I have consistently demonstrated a commitment to learning and developing my abilities in these areas. In particular, my passion for Cyber Security and Penetration Testing has led me to engage in continuous practice and self-improvement in order to sharpen my skills.
    Featured Skill Penetration Testing
    Bash Programming
    Algorithms
    Web App Penetration Testing
    Operating System
    Object-Oriented Programming
    Data Structures
    Linux
    Python
    Git
    Microsoft Visual Studio
  • $60 hourly
    I’m a motivated penetration tester with hands-on experience in identifying and exploiting vulnerabilities in web applications and APIs. With a strong background in IT and cybersecurity, I’ve worked with high-profile clients to uncover 120+ vulnerabilities and develop effective mitigation strategies. I specialize in offensive security testing, threat simulation, and vulnerability assessments . My skill set includes web and API security (OWASP Top 10, IDOR, SSRF, RCE), scripting (Python, Bash, PHP), and compliance auditing (GDPR, PCI DSS). Whether you need a comprehensive pentest or support in securing your app from real-world threats, I bring proven technical expertise and clear communication to every engagement. Let’s secure your systems—together.
    Featured Skill Penetration Testing
    Application Security
    OWASP
    API Testing
    Web API
    Network Penetration Testing
    Web App Penetration Testing
  • Want to browse more freelancers?
    Sign up

How hiring on Upwork works

1. Post a job

Tell us what you need. Provide as many details as possible, but don’t worry about getting it perfect.

2. Talent comes to you

Get qualified proposals within 24 hours, and meet the candidates you’re excited about. Hire as soon as you’re ready.

3. Collaborate easily

Use Upwork to chat or video call, share files, and track project progress right from the app.

4. Payment simplified

Receive invoices and make payments through Upwork. Only pay for work you authorize.