Freelancers using Kali Linux
Freelancers using Kali Linux
Sign Up
Post a job
Sign Up
Log In
Filters
1
Projects
People
Dragos Moruz
Timișoara, Romania
Seasoned cybersecurity leader.
5.0
Rating
4
Followers
Follow
Message
Seasoned cybersecurity leader.
1
Free Vulnerability Scanning Demo - Instant Security Insight
1
26
1
Automated Vulnerability Scanning and Security Assessment
1
8
1
Comprehensive Penetration Testing Services
1
16
1
Cybersecurity Dissertation Consultation – Research Direction
1
27
Kali Linux
(6)
Follow
Message
Ahmed Khan
Lahore, Pakistan
Cybersecurity specialist with ability to identify flaws
New to Contra
Follow
Message
Cybersecurity specialist with ability to identify flaws
0
I discovered a stored cross-site scripting (XSS) vulnerability in a practice web application's comment section that allowed me to inject malicious JavaScript that would execute in any user's browser. By submitting a comment containing a script payload, I successfully stole session cookies from other users and could have hijacked their accounts, performed actions on their behalf, or defaced the website. This finding was documented in a comprehensive report including proof-of-concept screenshots showing cookie theft, CVSS risk scoring of 6.5 (Medium), and step-by-step remediation guidance including input sanitization and output encoding. This assessment demonstrates my ability to find client-side vulnerabilities that can compromise every user visiting the site.
0
12
0
I discovered a SQL injection vulnerability in a practice web application that allowed me to bypass the login system and access the entire user database without any credentials. By inserting a simple payload into the username field, I successfully logged in as the first user in the database and extracted sensitive information including usernames, password hashes, and user email addresses. This finding was documented in a detailed report with proof-of-concept screenshots, risk analysis showing potential data breach impact, and step-by-step remediation guidance including parameterized queries and input validation. This assessment demonstrates my ability to find critical database vulnerabilities that could expose thousands of customer records.
0
14
0
During a security assessment of a practice web application, I discovered an exposed FTP directory with directory listing enabled, revealing multiple sensitive files including a password database, backup configurations, compiled source code, and error logs. After finding a clue in robots.txt, I navigated to the /ftp directory and documented over ten exposed files with their associated risks. My final report included an executive summary, detailed findings with screenshots, risk ratings for each exposed file, and step-by-step remediation guidance including disabling directory listing and removing sensitive data. This finding highlights how simple misconfigurations can lead to critical data exposure.
0
18
0
I discovered an Insecure Direct Object Reference (IDOR) vulnerability in a practice web application that allowed unauthorized users to access other people's private snippets simply by changing a number in the URL. Using whatweb and manual inspection, I identified parameter tampering points and successfully accessed private data for five different users without authentication. The finding was documented in a comprehensive report including executive summary, technical details with screenshots, CVSS risk scoring, and step-by-step remediation instructions. This assessment demonstrates my ability to find broken access controls that automated tools miss and deliver clear, actionable fixes.
0
24
Kali Linux
(4)
Follow
Message
Muhamed Ali
Egypt
Versatile Cybersecurity & HR Expert
Follow
Message
Versatile Cybersecurity & HR Expert
0
Training project , Enhancing Security Awareness: Understanding t
0
8
0
Onsite Network Pentest
0
8
0
Onion Circuit for a special purpose research client
0
7
View more →
Kali Linux
(3)
Follow
Message
Nitin Yadav
Gurugram, India
Top-Notch Cybersecurity & Penetration Testing
Follow
Message
Top-Notch Cybersecurity & Penetration Testing
0
Pen-Test for Real Estate Marketing Platform
0
0
0
Security Assessment of Satellite Comm GUI System
0
0
0
Comprehensive Web Application Penetration Testing
0
0
View more →
Kali Linux
(3)
Follow
Message
Timur çapkın
Turkey
Senior Security Researcher | Autonomous Recon Specialist | B
Follow
Message
Senior Security Researcher | Autonomous Recon Specialist | B
0
This project represents my work in building secure digital infrastructures and developing autonomous security tools. It focuses on proactive threat detection, vulnerability assessment, and implementing robust encryption protocols to safeguard sensitive data. Key Expertise: Penetration Testing, Bug Bounty Research, and Cyber Defense Strategy. Technologies: Python-based security automation and advanced web design security. Goal: To provide businesses with a "Digital Fortress" through comprehensive security audits and SEO-optimized, secure web solutions.
0
5
0
I am Timur Capkin; a security researcher and digital strategist awarded by giants like Mercedes-Benz on platforms such as HackerOne and Bugcrowd. I don't just build websites; I construct high-performance digital fortresses armored against cyber threats. With 10+ years of experience, I maximize your profitability while protecting your business from risks.
0
12
0
Who is the Founder of Cyber Ad World? I am Timur Capkin; a security researcher and digital strategist awarded by giants like Mercedes-Benz on platforms such as HackerOne and Bugcrowd. I don't just build websites; I construct high-performance digital fortresses armored against cyber threats. With 10+ years of experience, I maximize your profitability while protecting your business from risks.
0
18
0
As a Senior Security Researcher and Digital Strategist with over 15 years of experience, I provide a comprehensive digital package that bridges professional creativity with advanced technical security.
0
34
Kali Linux
(1)
Follow
Message
Nirjhar Banik
Kolkata, India
Cybersecurity & QA: Affordable Expert Solutions
Follow
Message
Cybersecurity & QA: Affordable Expert Solutions
0
Securing Flagship Products: P0 Bug Fixes, API Rate-Limiting
0
6
0
Accelerated Security & QA Excellence
0
6
0
Accelerated Test Automation & Fortified Security
0
8
View more →
Kali Linux
(2)
Follow
Message
Sunny Saini
Hariana, India
Cybersecurity Specialist | Web Developer | UI/UX Designer
Follow
Message
Cybersecurity Specialist | Web Developer | UI/UX Designer
0
Vulnerability Assessment and Penetration Testing (VAPT) for Star
0
10
0
UI Design & Frontend Development for AGZA NGO Website
0
2
0
Development and UI/UX Design of HexaDefend
0
2
View more →
Kali Linux
(1)
Follow
Message
Pir Ahsan Raza
Islamabad, Pakistan
Automation Engineer | n8n | Voice Agent | Python | Web dev
New to Contra
Follow
Message
Automation Engineer | n8n | Voice Agent | Python | Web dev
1
Identified a server side discount enforcement vulnerability in Name.com (http://Name.com)'s GitHub Student Pack integration. Developed a PoC confirming unlimited free domain redemptions post-OAuth verification.
1
6
1
Built a complete On-boarding pipeline + Match Alert for Investors and Founders and Mail Hot leads directly to CEO of Owlvest. Workflow on n8n, stored all data in google sheets, form was built with tally.so.... #n8n #Automation
1
24
1
Just finished Webflow project for @Greydots!
1
27
1
Got verified on n8n Cloud. plausible is now live and searchable directly from the canvas. Thanks to the n8n (https://www.linkedin.com/company/n8n/) team for building an open ecosystem worth contributing to. #n8n (https://www.linkedin.com/search/results/all/?keywords=%23n8n&origin=HASH_TAG_FROM_FEED) #automation (https://www.linkedin.com/search/results/all/?keywords=%23automation&origin=HASH_TAG_FROM_FEED) #plausible (https://www.linkedin.com/search/results/all/?keywords=%23plausible&origin=HASH_TAG_FROM_FEED) #opensourcetools (https://www.linkedin.com/search/results/all/?keywords=%23opensourcetools&origin=HASH_TAG_FROM_FEED)
1
44
Kali Linux
(1)
Follow
Message
Explore people