You will get thorough pentest assessment covering latest zero days.

Muhammad A.
Muhammad A.

Let a pro handle the details

Buy Assessments & Penetration Testing services from Muhammad, priced and ready to go.

You will get thorough pentest assessment covering latest zero days.

Muhammad A.
Muhammad A.

Let a pro handle the details

Buy Assessments & Penetration Testing services from Muhammad, priced and ready to go.

Project details

After the completion, you'll get an in-depth vulnerability assessment report that will include:
1: Screenshots / captures as proofs of vulnerabilities discovered.
2: Step-by-step procedures to re-produce the vulnerabilities found.
3: Remediation with recommendations for each vulnerability found.
Cybersecurity Assessment Type
Penetration Testing
Cybersecurity Expertise
Configuration Management, Cyber Threat Intelligence, Gap Analysis
Technology Type
Firewall, IaaS, Computer Network, Data Center, Database, Operating System, SaaS, Web Application, CRM, Email System, ERP, Mobile Device, PaaS
Cybersecurity Regulation
GDPR, ISO, NIST Cybersecurity Framework, PCI DSS
What's included
Service Tiers Starter
$500
Standard
$1,000
Advanced
$1,500
Delivery Time 5 days 15 days 30 days
Application Audit
-
Project Plan
-
-
Cost Estimation
-
-
Muhammad A.

About Muhammad

Muhammad A.
Penetration Tester / Cyber Security Consultant
Muscat, Oman - 12:42 am local time
- CISSP, OSCP, CEH, CREST CPT Certified
- ISO 27001-2013 Lead Implementer
- Bug Bounty Hunter

Expertise include system, network, web and mobile applications penetration testing.

I have 14+ years of experience in web application penetration testing, mobile application penetration testing and network vulnerability assessments

Expertise include (but not limited to) :
- Web Application Pen-testing
- Information Security Consultancy
- Android and iOS applications penetration testing.
- Malware analysis and removal.
- Code Review from Security Point-of-View.
- Vulnerability Assessment of Network Devices/Databases/Web Server/Application Server and more.
- Documentations related to cyber security (NIST, ISO 27001 etc)

Steps for completing your project

After purchasing the project, send requirements so Muhammad can start the project.

Delivery time starts when Muhammad receives requirements from you.

Muhammad works on your project following the steps below.

Revisions may occur after the delivery date.

Kick off meeting

Kick-off meeting with the client for understanding the requirements and sync on the plan.

Perform the assessment

Perform the assessments as per the scope of the project.

Review the work, release payment, and leave feedback to Muhammad.