Certified Ethical Black Hat that offers an outstanding customer service and fully detailed results. Expert in PHONE HACK (iOS, Android) FUNDS RECOVERY (Binary Options), DELETION of unwanted messages/posts. Vast experience in exposing just about anything, check me out.
We had a couple minor issues but Brendan was very kind, patient and courteous with me. He did a great job for a fabulous price. He definitely gives you your monies worth. Worth every penny and more so I’m giving him a bonus
Cancelling due to insufficient funds.
Amazing job in a reasonable amount of time, he tirelessly put me through the process and repeatedly and patiently made sure I understood how to access my information needed, Thank you so so much.
Quick and swift, was able to recover some of the files needed he couldn't finish it up because of my time frame but he was honest and I am satisfied with the info I have.
This guy helped a lot. He knows what to do and how to do it. Totally recommend him! 5 stars
Add work experience to your profile. (optional)
Automated and executed penetration tests for builds.
Participated in understanding of security practices and standards.
Generated and reviewed reports relating to testing software packages.
Conducted investigation of client requests to understand product security.
Formulated and executed requirements to implement security tests.
Provided assistance in vulnerability evaluations and penetration testing operations.
Implemented detection of attacks in coordination with network defenders.
Administered software applications by identification of security malfunctions.
Add work certification to your profile. (optional)
Dynamic Mobile Application Analysis and Manipulation
Device Architecture and Application Interaction
Static Application Analysis
Mobile Penetration Testing
Advanced network reconnaissance including stealth scans and identification of services running on non-standard ports
Monitoring switched networks using arp spoofing and other techniques
The dangers and detection of covert channels are explored using ICMP, UDP, TCP and HTTP protocols
SQL hacking methodologies
Advanced UNIX® configuration techniques
Compilation and test of malicious Linux® Kernel Modules
Active Directory Attacks
Introduction to Buffer Overflows
Passive Information Gathering
Win32 Buffer Overflows
Web Application Attacks
Port Redirection and Tunneling
The Metasploit Framework
Cyber defence and ICS
Digital Forensics and incident response
Add work education to your profile. (optional)
Here I learnt data and information security for public and private sectors.
We will review the reports from both freelancer and employer to give the best decision. It will take 3-5 business days for reviewing after receiving two reports.