You will get a professional penetration testing following output OWASP report
Top Rated
1 contract in progress
You will get a professional penetration testing following output OWASP report
Top Rated
1 contract in progress
Project details
I will test your website and try to break through in it with your consent. I am using only OWASP security framework . Most of the work is done manually . All Web and API goes to OWASP checks . At the end of the project I will provide you with a detailed penetration test report stating how secure your website is , Description of the vulnerability , Proof of Concept , Remediation .
Starter is only automatic scan from commercial tools and report that you get is from that tool automatically regerated.
Starter is only automatic scan from commercial tools and report that you get is from that tool automatically regerated.
Cybersecurity Assessment Type
Penetration TestingCybersecurity Expertise
Data Protection, Audit, Risk AssessmentTechnology Type
Firewall, IaaS, Computer Network, Data Center, Database, Operating System, SaaS, Web Application, CRM, Email System, ERP, Mobile DeviceCybersecurity Regulation
ISO, HIPAA, NIST Cybersecurity Framework, PCI DSS, SOC 2What's included
Service Tiers |
Starter
$250
|
Standard
$500
|
Advanced
$750
|
---|---|---|---|
Delivery Time | 3 days | 5 days | 10 days |
Application Audit | |||
Project Plan | |||
Cost Estimation |
Frequently asked questions
352 reviews
(348)
(4)
(0)
(0)
(0)
PF
Pablo F.
May 27, 2024
Florjan went above-and-beyond with his pen test and vulnerability scanning report! he adapted to all of our requirements, responded very quicky to everything, and helped us make our web app much more secure! Will use again in our yearly pen test requirement.
DW
Daniel W.
Dec 20, 2023
WL
Wendi L.
Dec 5, 2023
Great communication. Delivered timely and comprehensive.
CW
CH W.
Oct 24, 2023
HB
Hendrik B.
Oct 23, 2023
TA
Tamas A.
Nov 6, 2024
Website penetration test
Flori delivered the report on time. He was very responsive. Will work with him again soon.
KB
Kevin B.
Oct 29, 2024
Implement CloudFlare to our Platform
Excellent work, thank you so much.
We’ll be using Florian again very soon
We’ll be using Florian again very soon
EB
Eugene B.
Oct 29, 2024
You will get a professional Mobile ( iOS, Android ) penetration test based on OWASP
Florjan performed rigorous testing and provided a detailed report which we can use to improve our security.
We will be working with Florjan again.
We will be working with Florjan again.
WT
William T.
Oct 12, 2024
Wanted: Ethical Hacker | Web penetration tester Security Researcher
Great experience, highly recommended
DC
Dan C.
Oct 9, 2024
Black box penetration test
About Florjan
Professional Penetration Tester , CEH , Ethical Hacker
100%
Job Success
1
contract in progress
Tirana, Albania - 5:45 pm local time
CEH ( Certified Ethical Hacker)
740 MCSA ( Installation, Storage and Compute with Windows Server 2016)
To whom it may concern,
In the last years I did more than 400 Penetration Tests and Security Assessments. Most of them on Web and Mobile ( Android and iOS ) applications with Finance Background implemented with various technologies and frameworks, server security testing and hardening. Sample reports can be provided who is interested.
Prompt responses to your needs.
You can consider me as and internal staff of your company , always helping you to do the best in security.
---------------------------------------------------------------------
Phishing simulation for your company needs
___________________________________________________________
Professional Load and Stress Testing if you are interested for your application
__________________________________________________________
Steps for completing your project
After purchasing the project, send requirements so Florjan can start the project.
Delivery time starts when Florjan receives requirements from you.
Florjan works on your project following the steps below.
Revisions may occur after the delivery date.
Information Gathering
Searching for sensitive information that can be found and left by mistake. The organization being tested will provide the penetration tester with general information about in-scope targets
Check for Vulnerable Libraries
This check if the developer is using any potential vulnerable library that can help us to Exploit application latter.