You will get a professional penetration test for your web application

Mohammed J.
Mohammed J. Mohammed J.
5.0
Top Rated

Let a pro handle the details

Buy Assessments & Penetration Testing services from Mohammed, priced and ready to go.

You will get a professional penetration test for your web application

Mohammed J.
Mohammed J. Mohammed J.
5.0
Top Rated

Let a pro handle the details

Buy Assessments & Penetration Testing services from Mohammed, priced and ready to go.

Project details

During the assessment, I will use proven non-invasive testing techniques to quickly identify weaknesses. The application is viewed and manipulated from several perspectives,including with no credentials, user credentials, and privileged user credentials. My methodology covers all of the OWASP Top 10 web application security risks and more.

At the end of the project I will provide you with a detailed penetration test report stating how secure your website is , Description of each vulnerability , Proof of Concept and Remediation.
Cybersecurity Assessment Type
Penetration Testing
Cybersecurity Expertise
Data Protection, Audit, Risk Assessment
Technology Type
Firewall, IaaS, Computer Network, Database, Operating System, SaaS, Web Application, ERP, Mobile Device, PaaS
Cybersecurity Regulation
ISO, HIPAA, NIST Cybersecurity Framework, PCI DSS, SOC 2
What's included
Service Tiers Starter
$179
Standard
$299
Advanced
$499
Delivery Time 3 days 6 days 10 days
Application Audit
Project Plan
Cost Estimation

Frequently asked questions

5.0
10 reviews
100% Complete
1% Complete
(0)
1% Complete
(0)
1% Complete
(0)
1% Complete
(0)
Rating breakdown
Availability
5.0
Deadlines
5.0
Skills
4.9
Cooperation
5.0
Quality
4.9
Communication
5.0

AC

Alex C.
5.00
Oct 28, 2024
Help secure my windows app so its not detected as a Trojan Awesome job across multiple contracts. Great job on Github Actions, Jenkins, App Sec and more!

QW

Qilong W.
4.60
Sep 19, 2024
Nightvision

JM

Jason M.
5.00
May 1, 2024
Github Actions Finished the work on time and with great quality.

JM

Jason M.
5.00
May 1, 2024
Observability Project Great work. Delivered on time and with quality.

ZS

Zanni S.
5.00
Mar 28, 2024
Web application penetration testing Jawabri is a very knowledgable developer with deep understanding in security, API and web development. We did several security checks on API projects and the work was completed in excellent quality. Communication is perfect. All deadlines were met. Thank you.
Mohammed J.

About Mohammed

Mohammed J.
Penetration Tester | Web, API, Network Security Expert
100% Job Success
5.0  (10 reviews)
Bethlehem, Palestinian Territories - 7:36 pm local time
Seasoned professional penetration tester with over 8 years of impactful cybersecurity experience. proficient in penetration testing, software development, and system administration.

My penetration testing expertise lies in conducting Blackbox, Greybox, and WhiteBox testing on web applications, mobile applications, APIs, and networks. I have in-depth knowledge of various attack vectors and their corresponding mitigations.

I am also a security researcher who has earned acknowledgments from prominent companies like OPPO, Bluehost, Toyota, Tencent, etc. for uncovering a number of vulnerabilities through the HackerOne bug bounty platform.

My comprehensive penetration testing reports go beyond identification; they include clear documentation of vulnerabilities, proofs-of-concept, and remediations. Ensuring 100% client satisfaction, I provide actionable insights on how to fix vulnerabilities.

Steps for completing your project

After purchasing the project, send requirements so Mohammed can start the project.

Delivery time starts when Mohammed receives requirements from you.

Mohammed works on your project following the steps below.

Revisions may occur after the delivery date.

The client sends requirements

The client sends requirements. so that we can clearly establish the boundaries of the test, including which systems and applications will be tested.

Information Gathering & Reconnaissance

Collect information about the target application, such as technologies used, application structure, and potential entry points. This can include passive reconnaissance, identify what kind of threats the application may face.

Review the work, release payment, and leave feedback to Mohammed.