Penetration Testing Freelancers

Showing 80 freelancers

Penetration Testing Freelancers

Showing 80 freelancers

  • Ethical Hacker

    Penetration Testing/Ethical Hacking Exploit development Excellent troubleshooting and technical support abilities Productivity Improvement Administration, maintaining and troubleshooting of all kinds of Software, Hardware & Operating Systems Excellent Knowledge of LAN/WAN, VoIP, Wireless Network … more

    Penetration Testing/Ethical Hacking Exploit development Excellent troubleshooting and technical support abilities Productivity Improvement Administration, maintaining and troubleshooting of all kinds of Software, Hardware & Operating Systems Excellent Knowledge of LAN/WAN, VoIP, Wireless Network  less

    network-security penetration-testing 00 more less
    • $45.00 HOURLY RATE
    • 5.0
    • 0 HOURS
    • BOSNIA AND HERZEGOVINA
    • LAST ACTIVE
    • 0 PORTFOLIO ITEMS
    • 2 TESTS
    ASSOCIATED WITH:
  • Expert in PHP, JQuery, AJAX. Pentester in my free time

    I came from the field of particle physics, where at some point I realized I like much more to program than the physics itself. Indeed, as a physicist, I always loved the challenges, always trying to find the best and … more

    I came from the field of particle physics, where at some point I realized I like much more to program than the physics itself. Indeed, as a physicist, I always loved the challenges, always trying to find the best and fastest solution for every problem. For more than 10 years I have programmed in plenty of languages (PHP,C++,Java,etc..), collaborating in some projects with hundreds of thousands of code lines, and starting from scratch several other projects which ended up having several thousands lines of code. Why should you hire me? If you are looking for a programmer that will give you the best and the fastest solution possible, then you are looking at the right profile. Why my solution will be better than others??, you may ask... Well, as I already said, I love the challenges, they are my hobby and my life, so don't doubt for a second that I will put my soul in your problem. At the same time, I expect professionalism and respect from your side. By the way, at the time of charging for my work, I only charge the time I'm actually typing down; I never charge the time I'm researching and thinking about your problem (I usually get most of the best solutions during the sleep ;) In conclusion, if you already hired a team of programmers charging 9$/h and couldn't complete the job (maybe due to lack of interest or preparation), you could always contact me, and once I commit myself to your project, you can be 100% sure that the job will be finished on time. Looking forward to work with you, Gabriel UPDATE: Recently I have been involved in a lot of penetration testing projects (and I had lot of fun doing them!). I will be more than glad to check out the security of your system.  less

    php c++ javascript mail-server-implementation penetration-testing html jquery ajax mysql linux-system-administration 00 more less
    • $36.67 HOURLY RATE
    • 5.0
    • 556 HOURS
    • GERMANY
    • LAST ACTIVE
    • 4 PORTFOLIO ITEMS
    • 1 TEST
  • Web, Graphics and Logo Designer

    Dear Client There is nothing more satisfying than a satisfied client,I always work utilizing my skills towards how best a client wants a job done to produce results that reflect, if not perfect, satisfactory expectations from the client.This … more

    Dear Client There is nothing more satisfying than a satisfied client,I always work utilizing my skills towards how best a client wants a job done to produce results that reflect, if not perfect, satisfactory expectations from the client.This makes sure that my client is not only satisfied but wont hesitate to give me a thumbs up for the quality service delivered. Skills and Specialities; Graphic Design & Web Front End Designs -Logo design -Mobile & Website UI Design -Prototype UI Design -Adobe Fireworks, Adobe Photoshop & Illustrator Specialist Network Security - Wireless Access Points, - Linux Firewall scripts - Consultation on WEP,WPA/WPA2 Security. - Web vulnerability testing -Network Penetration Testing. Web Technology Coding -HTML5 -Java-script -CSS I also posses experiences in data entry and online research where i have and continue to be involved in handling large amount of data that includes comprehensive research and recording relevant data. -Data entry tools Ms word,Ms Access, Ms excel & Ms Power-point. -Conversion of PDF to Word/Excel  less

    javascript cisco-routers cisco-ios security penetration-testing graphic-design ui-design adobe-fireworks adobe-photoshop adobe-illustrator 00 more less
    • $7.80 HOURLY RATE
    • 5.0
    • 0 HOURS
    • KENYA
    • LAST ACTIVE
    • 2 PORTFOLIO ITEMS
    • 9 TESTS
  • Networking | Virtualization | Security

    1.Installing Windows Servers 2008/2012,Modifying,Configuring Server Core,Active Directory Domain Controller configuring, Managing Accounts,Organizational Units,Multiply local groups,Windows Firewall,IPv4,DHCP,DNS,Hyper-V, Share and NTFS persmissions,Configuring Printers. 2.Vulnerability Analysis,Assessment and Penetrate … more

    1.Installing Windows Servers 2008/2012,Modifying,Configuring Server Core,Active Directory Domain Controller configuring, Managing Accounts,Organizational Units,Multiply local groups,Windows Firewall,IPv4,DHCP,DNS,Hyper-V, Share and NTFS persmissions,Configuring Printers. 2.Vulnerability Analysis,Assessment and Penetrate testing, OWASP TOP 10 web apps testing,information gathering,password cracking,exploatation,wireless hacking,sniffing\spoofing. Removal of Malware,Viruses ,Backdoors and any other malicious codes. Security updates,server defending,IIS,apache,ftp,rdp,ssh,stealthy authentication. IDS/IPS,Network monitoring. Protection of websites and servers,cloud security. 24/7 Server Security Management IT support, solving user problems and troubleshooting.  less

    computer-networking network-security tcp-ip penetration-testing windows-administration adobe-photoshop microsoft-active-directory dns microsoft-hyper-v dhcp 00 more less
    • $10.00 HOURLY RATE
    • 5.0
    • 0 HOURS
    • BOSNIA AND HERZEGOVINA
    • LAST ACTIVE
    • 0 PORTFOLIO ITEMS
    • 5 TESTS
  • Cybernetic and Computational System Engineering

    For the past five years, I have been learning about the information security world, working as an CEH (Certified Ethical Hacker). With some of my co-workers, i have participated in a lot of projects, strictly focused on Information Security. Also … more

    For the past five years, I have been learning about the information security world, working as an CEH (Certified Ethical Hacker). With some of my co-workers, i have participated in a lot of projects, strictly focused on Information Security. Also, as we evolve and grow in this area, we have trained ourselves in Forensics Sciences, attending clients who need to know what happened after a contingency. I consider myself a self-taught person that likes to grow and that is not afraid of challenges or difficult cases. At this moment my priority is to teach and so much to share the little knowledge I have gained over the years, as well as learn from those who have traveled a different path and with this keep on growing.  less

    penetration-testing network-security network-administration linux-system-administration cisco-routers mysql mac-os-app-development cryptography 00 more less
    • $30.00 HOURLY RATE
    • 5.0
    • 0 HOURS
    • MEXICO
    • LAST ACTIVE
    • 0 PORTFOLIO ITEMS
    • 3 TESTS
  • Senior Security Researcher and Consultant, Google Hall of Famer

    Information Security Consultant with over 6 years of experience. He is primarily focused in the application Security space. He has managed and executed multiple projects involving network penetration tests, vulnerability assessments, penetration testing of thick clients and web based applications … more

    Information Security Consultant with over 6 years of experience. He is primarily focused in the application Security space. He has managed and executed multiple projects involving network penetration tests, vulnerability assessments, penetration testing of thick clients and web based applications, Wireless penetration testing and several process audits. Brilliant understanding and practical exposure to OWASP TOP 10, SANS TOP 20, CWE, OSSTMM, ISSAF standards Completed his graduation in Electronics and telecommunication engineering in 2007. Some of the key projects worked on: -Internet Banking Application threat modeling & security testing -Security testing of IVR phone banking application -Conducted process audits, IT general controls testing, SOXA, SAS70, Shared assessments -Tested production applications in the areas of Banking, Education, Retail, Healthcare, and Telecommunication. He has written content for PenTest Magazine (http://pentestmag.com/september-issue-mobile-hack/) and has contributed for the latest versions of CSA’s papers on cloud security. He also has rich experience in data loss prevention and Privileged Identity mangement tools. He has designed a framework for securing mobile application particularly android and IOS. He has also been involved in designing a methodology for securing the applications in cloud (SaaS)  less

    security penetration-testing network-security vulnerability-assessment internal-auditing process-architect process-improvement technical-writing technical-documentation wordpress software-testing 00 more less
    • $88.89 HOURLY RATE
    • 4.7
    • 798 HOURS
    • INDIA
    • LAST ACTIVE
    • 1 PORTFOLIO ITEM
    • 5 TESTS
  • RHEL / CentOS System Admin, AWS, WHM/Cpanel

    Handling unmanaged VPS, Dedicated Server with core console (Terminal). -Giving sites maximum Uptime. -Implementing new policy and maintain backup and backend server. -Prevent from websites hack (SQL Injection, FTP bypass, Brute force on SSH Tunnel ) -Maintain All site on Nginx … more

    Handling unmanaged VPS, Dedicated Server with core console (Terminal). -Giving sites maximum Uptime. -Implementing new policy and maintain backup and backend server. -Prevent from websites hack (SQL Injection, FTP bypass, Brute force on SSH Tunnel ) -Maintain All site on Nginx and Kloxo with limited sync time. -Manage shop cart Zencard and Magento site on servers and make server compatible . Penetration Testing: -Client side attacks - Server side attacks - Web applications vulnerability scans - Custom exploiting techniques - Social engineering  less

    linux-system-administration penetration-testing mail-server-implementation mysql dns squid security network-security apache-administration node.js subversion nginx centos iptables ssh ubuntu 00 more less
    • $11.11 HOURLY RATE
    • 5.0
    • 101 HOURS
    • INDIA
    • LAST ACTIVE
    • 2 PORTFOLIO ITEMS
    • 3 TESTS
loading