You will get a penetration test your website with a professional report
You will get a penetration test your website with a professional report
Basic
Light Scan Minimal Scanning of your Website + Basic Report, No Recommendations
- Delivery Time 2 days
- Application Audit
- Project Plan
- Cost Estimation
2 days
delivery —
Oct 12, 2024
Revisions may occur after this date.
Upwork Payment Protection
Fund the project upfront. MD Emran gets paid once you are satisfied with the work.
Project details
I will penetration test the Security of Your Site and provide a professional report including vulnerabilities & recommendations so you can secure your site FAST!
Services Include:
1. Pen Test for SQL Injection, XSS, OWASP Top 10, and 3000 other vulnerabilities
2. SOC 2 Security Compliance Attestation
3. Deep Crawl & Analysis
4. High Detection Rate, Low False Positives
5. Vulnerability Assessment Scanning & Management
6. Website Testing
Packages Include:
Premium Professional Full Scan, Manual Review, Consultation, Security Assessment Report & Rescan
Standard Basic scan, detailed report and recommendations
Basic Minimal scan, basic report, no recommendations
Deepscan is a Senior Quality Professional with over 5+ years of experience in the fields of Quality Assurance, Ethical Hacking, and Web Programming. Deepscan provides customers with the information needed to be secure through Award Winning cutting-edge technology and industry expertise.
Don't let hackers gain access to your sensitive information, Secure Your Site TODAY!
Your Success is my Satisfaction!
Services Include:
1. Pen Test for SQL Injection, XSS, OWASP Top 10, and 3000 other vulnerabilities
2. SOC 2 Security Compliance Attestation
3. Deep Crawl & Analysis
4. High Detection Rate, Low False Positives
5. Vulnerability Assessment Scanning & Management
6. Website Testing
Packages Include:
Premium Professional Full Scan, Manual Review, Consultation, Security Assessment Report & Rescan
Standard Basic scan, detailed report and recommendations
Basic Minimal scan, basic report, no recommendations
Deepscan is a Senior Quality Professional with over 5+ years of experience in the fields of Quality Assurance, Ethical Hacking, and Web Programming. Deepscan provides customers with the information needed to be secure through Award Winning cutting-edge technology and industry expertise.
Don't let hackers gain access to your sensitive information, Secure Your Site TODAY!
Your Success is my Satisfaction!
Cybersecurity Assessment Type
Penetration TestingCybersecurity Expertise
Data Protection, Cyber Threat Intelligence, Risk AssessmentTechnology Type
Firewall, IaaS, Computer Network, Data Center, Database, Operating System, SaaS, Web Application, CRM, Email System, ERP, Mobile Device, PaaSCybersecurity Regulation
ISO, HIPAA, HITECH, NIST Cybersecurity FrameworkWhat's included
Service Tiers |
Starter
$100
|
Standard
$300
|
Advanced
$500
|
---|---|---|---|
Delivery Time | 2 days | 3 days | 3 days |
Application Audit | |||
Project Plan | |||
Cost Estimation |
Frequently asked questions
2 reviews
(1)
(0)
(0)
(0)
(1)
This project doesn't have any reviews.
RM
Riyaz M.
Oct 27, 2023
Ethical hacking
MD Imran, got the good knowledge about ethical hacking. Very good sense of humor. He understood my project diagram and problems which I wanted to solve. He solved everything in couple of hours which I was trying to solve from last four days.
I recommend MD Imran for Ethical hacking work.
I recommend MD Imran for Ethical hacking work.
VP
Victor P.
Mar 11, 2023
Pentest
Not good enough - he sent me a report for pentest an wasnt ready to explain it to me. He suggested if I dont know what the report contained then its my problem.
Stay away
Stay away
About MD Emran
Cybersecurity Specialist |Penetration Tester |Dark-Web Expert
43%
Job Success
Dhaka, Bangladesh - 3:16 am local time
I am a top 33 ranking bug hunter on HackerOne with over 5 years of experience in cybersecurity. I specialize in providing cutting-edge security solutions tailored to meet the unique needs of each client.
Core Competencies:
*Penetration Testing & Vulnerability Assessment: Identifying and mitigating vulnerabilities in web/mobile applications, networks, and systems.
*Incident Response & Forensics: Swiftly responding to breaches and performing thorough forensic analysis.
*Cloud & Application Security: Securing cloud infrastructures (AWS, Azure, Google Cloud) and ensuring robust security in applications.
*DevSecOps Integration: Embedding security practices within DevOps workflows.
*Threat Hunting & Intelligence: Proactively hunting threats and leveraging intelligence to protect against advanced threats.
*Zero Trust Security: Designing and implementing zero trust security models.
*Reverse Engineering: Analyzing software to understand its components and uncover vulnerabilities.
*Dark Web & Deep Web Analysis: Navigating and analyzing dark web and deep web environments to identify and mitigate risks.
*Cryptocurrency Security: Ensuring the security of cryptocurrency transactions and protecting digital assets.
*I stay at the forefront of cybersecurity, constantly updating my skills to combat emerging threats. My approach is holistic, focusing on comprehensive strategies that address current vulnerabilities and anticipate future risks.
I am an effective communicator and collaborator, working closely with clients to understand their security challenges, develop tailored solutions, and educate them on best practices.
Explore my portfolio: dev-mohammad-emran.pantheonsite.io
Let's work together to fortify your digital defenses and protect your valuable assets.
Steps for completing your project
After purchasing the project, send requirements so MD Emran can start the project.
Delivery time starts when MD Emran receives requirements from you.
MD Emran works on your project following the steps below.
Revisions may occur after the delivery date.
After purchasing the project, send require so Emran can start the project.
Delivery time starts when Emran receives requirements from you.
Emran works on your project following the steps below.
1. Information Gathering Searching for sensitive information that can be found and left by mistake. The organization being tested will provide the penetration tester with general information about in-scope targets 2. Check for Vulnerable Libraries