Certified Ethical Black Hat that offers an outstanding customer service and fully detailed results. Expert in PHONE HACK (iOS, Android) FUNDS RECOVERY (Binary Options), DELETION of unwanted messages/posts. Vast experience in exposing just about anything, check me out.
Quick, he had a set template for activision account modification and hack.. I will use him again
I didn't like his approach but he delivered, glad I didn't question him.. Thanks a lot
After carefully accessing the website and getting started, he confirmed to me my job wasn't executed because of complications I agree with and a refund was initiated. Thank you for your honesty, hope to work together again
He promised to get it done in 8 hours but I had to wait almost 12 hours, he apologized and I understand.. Overall he delivered, will work with him again
Add work experience to your profile. (optional)
Conducted network penetration tests and implemented vulnerability assessments.
Evaluated operational effects of security system attacks.
Analyzed and resolved vulnerabilities in relation to automated networks.
Prepared and documented test plans for security evaluations.
Designed and updated reports about security of targeted systems.
Developed training programs and trained ethical hackers.
Participated in courses for password cracking and attack technologies.
Supported and administered security of intranet systems and networks
Automated and executed penetration tests for builds.
Participated in understanding of security practices and standards.
Generated and reviewed reports relating to testing software packages.
Conducted investigation of client requests to understand product security.
Formulated and executed requirements to implement security tests.
Provided assistance in vulnerability evaluations and penetration testing operations.
Implemented detection of attacks in coordination with network defenders.
Administered software applications by identification of security malfunctions.
Add work certification to your profile. (optional)
Information security overview
Information security threats and attack vectors
Ethical hacking concepts
Information security controls
Cyber defence and ICS
Pen testing
Digital Forensics and incident response
IT security
Active Directory Attacks
PowerShell Empire
Introduction to Buffer Overflows
Bash Scripting
Passive Information Gathering
Win32 Buffer Overflows
Privilege Escalation
Client-Side Attacks
Web Application Attacks
Port Redirection and Tunneling
The Metasploit Framework
Advanced network reconnaissance including stealth scans and identification of services running on non-standard ports
Monitoring switched networks using arp spoofing and other techniques
The dangers and detection of covert channels are explored using ICMP, UDP, TCP and HTTP protocols
SQL hacking methodologies
Advanced UNIX® configuration techniques
Compilation and test of malicious Linux® Kernel Modules
Client-side Attacks
Dynamic Mobile Application Analysis and Manipulation
Device Architecture and Application Interaction
Static Application Analysis
Add work education to your profile. (optional)
A Computer Science Graduate Certificate that provided me with a solid course of study in the mathematical foundations of computing as well as important aspects of computer programming, database security, algorithm, Artificial intelligence and Data computation.
Here I learnt data and information security for public and private sectors.
We will review the reports from both freelancer and employer to give the best decision. It will take 3-5 business days for reviewing after receiving two reports.
Very ethical and strong