You will get to investigate malicious files, IP address or URLs

Dharmil B.
Dharmil B.

Let a pro handle the details

Buy Cybersecurity Management services from Dharmil, priced and ready to go.

You will get to investigate malicious files, IP address or URLs

Dharmil B.
Dharmil B.

Let a pro handle the details

Buy Cybersecurity Management services from Dharmil, priced and ready to go.

Project details

If you have suspect a file, URL, Email or IP to be malicious and you need to investigate them, then I can help you with the investigation bit.


I have 4 years of experience in investigating malwares, URLs, IPs etc and providing timely remedy to clients. I will investigate the IP address, URL, email file or file hash provided by you, and provide you with a detailed threat or investigation report with all of my findings based on open-source intelligence (OSINT) and other open source technologies.


I can perform static and dynamic malware analysis and provide you with Indicators of Compromise (IoC).
What's included
Service Tiers Starter
$50
Standard
$75
Advanced
$100
Delivery Time 4 days 2 days 1 day
Cybersecurity Monitoring
-
-
-
Malware Removal
-
-
-
Security Analysis
-
-
-
Security Patch Installation
-
-
-
Dharmil B.

About Dharmil

Dharmil B.
Incident Response | Digital Forensics | Cyber Threat Intelligence
Mumbai, India - 4:20 pm local time
I have been handling, managing and investigating various type of Digital Forensic and Incident Response cases for 4 years now. I have successfully identified root cause of various incidences which includes insider threats, ransomware attacks and data breach. I can provide service on the following lines Computer Acquisition and Analysis Memory Acquisition and Analysis Smartphone Acquisition and Analysis Malware Analysis - Static and Dynamic URL, Email, Domain and IP Analysis Log Analysis. Audio and Video forensics, CCTV footage investigation, image forensics etc

Steps for completing your project

After purchasing the project, send requirements so Dharmil can start the project.

Delivery time starts when Dharmil receives requirements from you.

Dharmil works on your project following the steps below.

Revisions may occur after the delivery date.

Collect/ Gather information

I will gather information about the malicious file/IP address/Link using open source intelligence (OSINT)

Deliver first draft

I will share the first draft of my report containing detailed information regarding my findings.

Review the work, release payment, and leave feedback to Dharmil.