You will get Restaurant food ordering and delivery app with admin panel
Top Rated

Project details
Single restaurants, coffee shop, Ice cream shop or pizza shop menu ordering and delivery application The single restaurant application helps in online food ordering and delivering at the customers doorstep. The app is available in Android and is equipped with user-friendly features. The app assists the customers to place an order from the restaurant and get them delivered at their doorstep.
Customer App Features
Browse the menu
Add to cart
Pay by Cash/card
Customers profile
My orders
Rider App Features:
Start/Stop shift
Pending Orders
Realtime Chat
Set Availability
Profile
Customer App Features
Browse the menu
Add to cart
Pay by Cash/card
Customers profile
My orders
Rider App Features:
Start/Stop shift
Pending Orders
Realtime Chat
Set Availability
Profile
Platform
Mobile WebApp Type
Native AppDevelopment Technology
Java, Objective-CApp Purpose
RestaurantExpertise
Cross Browser & Device Compatibility, Design, Localization$500
- Delivery Time 14 days
- Number of Revisions 0
- Number of Mobile Operating Systems 2
- App Store Upload
- App Icon Design
- Splash Screen
- Ad Network Integration
- Source Code
Optional add-ons
You can add these on the next page.
Additional Mobile Operating System
(+ 10 Days)
+$500
6 reviews
(5)
(1)
(0)
(0)
(0)
This project doesn't have any reviews.
AF
Ahmed F.
Feb 9, 2025
You will get pentest of your web and mobile app with vulnerability report
Very accurate, we received the promised report in time and as detailed as expected. Would hire him again for future jobs
DM
Daniel M.
Dec 29, 2024
Testing Computer for Indicator of Compromise.
A pleasure to work with. Thanks Osama!
YA
Yanis A.
Aug 2, 2024
You will get pentest of your web and mobile app with vulnerability report
JP
Juan P.
Jul 21, 2024
Convert Negociotok to Invesiontok
SS
Shivaan S.
May 8, 2022
Hire Professional For Upload Apps on Play Console
best
About Osama
Penetration Tester | Ethical Hacker | Cyber Security Consultant
100%
Job Success
Peshawar, Pakistan - 10:10 pm local time
---------------------------------- AREAS OF EXPERTISE----------------------------------
• VAPT – Vulnerability Assessment and Penetration Testing
• Risk Assessment of Digital Assets
• Applications Security
• Network Security
• Malware Analysis
• Kali Linux
• Python Scripting
• RAT Development
• Android App Development
---------------------------------- CAREER CONTRIBUTIONS-----------------------------------
- Facilitated Government in securing their public-facing digital assets by identifying and reporting vulnerabilities in “Citizens Portal Mobile App” and “Covid-Govt. Mobile App”.
Major reported vulnerability: “Insecure Data Storage” | “Unintended Data Leakage” | “Insecure Communication” | “Susceptible to Reverse Engineering” | “Use of Hardcoded Credentials”
- Recognized and appreciated officially by KP Cyber Emergency Response Center for identifying Information Security Issues in web/mobile applications.
- Completed 50+ International projects. I have happy clients from all over the world.
CERTIFICATIONS
~~ Certified Ethical Hacker.
~~ Fortinet Certified Network Security Expert, NSE1+NSE2.
~~ Certified Associate in Python Programming.
TRAININGS DONE IN FIELD OF CYBER SECURITY
~~ Digital Forensics.
~~ OS Hardening.
~~ End User Security.
~~ Privacy and Data Protection Laws.
~~ Essentials of Cyber Security and Vulnerability Assessment.
~~ Web Application Penetration Testing.
~~ Mobile App Penetration Testing.
~~ Network Penetration Testing.
Familiar with pentesting Network, Wireless, Bluetooth, Mobile Apps, Web Apps on various devices with various screen sizes and versions. Moreover, will provide user experience and full report of the bugs and record the testing and provide you recordings and screenshots with marking of the issues.
Report Submission includes Screenshots (proof of concept) of vulnerability been exploited, CVE, CVSS risk level and mitigation to them.
SERVICES:
"OWASP top 10 vulnerability assessment"
☑️ SQL Injection.
☑️ Broken Authentication.
☑️ Insecure Data Storage.
☑️ Sensitive Information Leakage.
☑️ Insufficient Cryptography.
☑️ Cross-Site Scripting attack.
☑️ Broken Access Control.
☑️ Security Misconfiguration.
☑️ Business Logic Flaws.
☑️ Path Traversal Attack.
☑️ Insecure Design.
☑️ Software And Data Integrity Failures.
☑️ Server Side Request Forgery- SSRF.
"OWASP Mobile Top 10 vulnerability assessment"
✔️ Static analysis
✔️ Dynamic Analysis
✔️ Reverse engineering
✔️ Code review
✔️ Find potential security flaw in application
✔️ SSL pinning check
✔️ Improper Platform Usage
✔️ Insecure Data Storage
✔️ Insecure Communication
✔️ Insecure Authentication
✔️ Insufficient Cryptography
✔️ Insecure Authorization
✔️ Client Code Quality
✔️ Code Tampering
✔️ Extraneous Functionality
✔️ Logging of Sensitive Data
✔️ Leakage of Sensitive Data
✔️ Malware check
✔️ Check list of IP's app is communicating with
✔️ API Tempering
✔️ Sandbox testing
✔️ Root Detection
Work Methodology:
# Information Gathering
# Reconnaissance
# Vulnerability Assessment
# Exploitation
# Maintaining Persistent Access
# Clearing Traces
# Report Submission
I will first understand your requirement and then propose you best solution possible.
Steps for completing your project
After purchasing the project, send requirements so Osama can start the project.
Delivery time starts when Osama receives requirements from you.
Osama works on your project following the steps below.
Revisions may occur after the delivery date.
Requirement Phase
Collect all necessary info needed to setup apps.
Configuration and Installation
API Integration and Uploading apps to stores.