Profile of Brendan H

Brendan H Vulnerability, Recovery expert, Translation and Localization Professional
12 years experience 11 projects worked USA
$80.00 /hr
Computer HackerCredit RepairPhone HackerRemove Unwanted ContentVulnerability Tester
  • Certified Ethical Black Hat that offers an outstanding customer service and fully detailed results. Expert in PHONE HACK (iOS, Android) FUNDS RECOVERY (Binary Options), DELETION of unwanted messages/posts. Vast experience in exposing just about anything, check me out.


Work History (10)

  • URGENT, Need completion ASAP

    $4,000.00 October 19, 2020
  • Mobile phone hack

    $900.00 October 7, 2020
  • Delete info off cell phone

    $1,000.00 September 30, 2020

    We had a couple minor issues but Brendan was very kind, patient and courteous with me. He did a great job for a fabulous price. He definitely gives you your monies worth. Worth every penny and more so I’m giving him a bonus

  • Hack android phone.

    $1,200.00 September 8, 2020

    Cancelling due to insufficient funds.

  • Data manipulation on official website

    $1,300.00 August 26, 2020

    Amazing job in a reasonable amount of time, he tirelessly put me through the process and repeatedly and patiently made sure I understood how to access my information needed, Thank you so so much.

  • Hack phone

    $600.00 August 26, 2020

    Quick and swift, was able to recover some of the files needed he couldn't finish it up because of my time frame but he was honest and I am satisfied with the info I have.

  • Snapchat Password

    $200.00 August 24, 2020
  • Being Harassed by Anonymous Numbers

    $400.00 August 20, 2020
  • Snap Chat and Instagram

    $200.00 August 13, 2020
  • Hack bf's phone

    $150.00 August 12, 2020

    This guy helped a lot. He knows what to do and how to do it. Totally recommend him! 5 stars

Work Experiences

  • Digital service intern

    Department of Defense

    May 2007 - March 2008

    Automated and executed penetration tests for builds.
    Participated in understanding of security practices and standards.
    Generated and reviewed reports relating to testing software packages.
    Conducted investigation of client requests to understand product security.
    Formulated and executed requirements to implement security tests.
    Provided assistance in vulnerability evaluations and penetration testing operations.
    Implemented detection of attacks in coordination with network defenders.
    Administered software applications by identification of security malfunctions.

  • Vulnerability Officer

    Google Inc

    March 2008 - August 2014

    Conducted network penetration tests and implemented vulnerability assessments.
    Evaluated operational effects of security system attacks.
    Analyzed and resolved vulnerabilities in relation to automated networks.
    Prepared and documented test plans for security evaluations.
    Designed and updated reports about security of targeted systems.
    Developed training programs and trained ethical hackers.
    Participated in courses for password cracking and attack technologies.
    Supported and administered security of intranet systems and networks.


  • SEC575 Mobile Device Security and Ethical Hacking


    May 2016 - May 2016

    Dynamic Mobile Application Analysis and Manipulation
    Device Architecture and Application Interaction
    Static Application Analysis
    Mobile Penetration Testing

  • Foundstone Ultimate Hacking


    June 2015 - June 2015

    Advanced network reconnaissance including stealth scans and identification of services running on non-standard ports
    Monitoring switched networks using arp spoofing and other techniques
    The dangers and detection of covert channels are explored using ICMP, UDP, TCP and HTTP protocols
    SQL hacking methodologies
    Advanced UNIX® configuration techniques
    Compilation and test of malicious Linux® Kernel Modules
    Client-side Attacks

  • Offensive Security Certified Professional


    January 2008 - January 2008

    Active Directory Attacks
    PowerShell Empire
    Introduction to Buffer Overflows
    Bash Scripting
    Passive Information Gathering
    Win32 Buffer Overflows
    Privilege Escalation
    Client-Side Attacks
    Web Application Attacks
    Port Redirection and Tunneling
    The Metasploit Framework

  • GIAC Penetration Tester


    January 2008 - January 2008

    Cyber defence and ICS
    Pen testing
    Digital Forensics and incident response
    IT security

  • Certified Ethical Hacker (CEH) V10

    EC Council

    September 2006 - November 2006

    Information security overview
    Information security threats and attack vectors
    Ethical hacking concepts
    Information security controls


  • Master of Information and Cybersecurity

    UC Berkeley

    January 2006 - February 2008

    Here I learnt data and information security for public and private sectors.

  • Computer and Information science

    California Institute of Technology

    September 2001 - June 2005

    A Computer Science Graduate Certificate that provided me with a solid course of study in the mathematical foundations of computing as well as important aspects of computer programming, database security, algorithm, Artificial intelligence and Data computation.