Freelancers using Kali Linux
Freelancers using Kali Linux
Sign Up
Post a job
Sign Up
Log In
Filters
1
Projects
People
Dragos Moruz
Timișoara, Romania
Seasoned cybersecurity leader.
5.0
Rating
2
Followers
Follow
Message
Seasoned cybersecurity leader.
1
Free Vulnerability Scanning Demo - Instant Security Insight
1
23
1
Firewall Configuration & Rule Review
1
9
1
Automated Vulnerability Scanning and Security Assessment
1
6
1
Cybersecurity Dissertation Consultation – Research Direction
1
22
Kali Linux
(6)
Follow
Message
Ahmed Khan
Lahore, Pakistan
Cybersecurity specialist with ability to identify flaws
New to Contra
Follow
Message
Cybersecurity specialist with ability to identify flaws
0
I discovered a stored cross-site scripting (XSS) vulnerability in a practice web application's comment section that allowed me to inject malicious JavaScript that would execute in any user's browser. By submitting a comment containing a script payload, I successfully stole session cookies from other users and could have hijacked their accounts, performed actions on their behalf, or defaced the website. This finding was documented in a comprehensive report including proof-of-concept screenshots showing cookie theft, CVSS risk scoring of 6.5 (Medium), and step-by-step remediation guidance including input sanitization and output encoding. This assessment demonstrates my ability to find client-side vulnerabilities that can compromise every user visiting the site.
0
1
0
I discovered a SQL injection vulnerability in a practice web application that allowed me to bypass the login system and access the entire user database without any credentials. By inserting a simple payload into the username field, I successfully logged in as the first user in the database and extracted sensitive information including usernames, password hashes, and user email addresses. This finding was documented in a detailed report with proof-of-concept screenshots, risk analysis showing potential data breach impact, and step-by-step remediation guidance including parameterized queries and input validation. This assessment demonstrates my ability to find critical database vulnerabilities that could expose thousands of customer records.
0
1
0
During a security assessment of a practice web application, I discovered an exposed FTP directory with directory listing enabled, revealing multiple sensitive files including a password database, backup configurations, compiled source code, and error logs. After finding a clue in robots.txt, I navigated to the /ftp directory and documented over ten exposed files with their associated risks. My final report included an executive summary, detailed findings with screenshots, risk ratings for each exposed file, and step-by-step remediation guidance including disabling directory listing and removing sensitive data. This finding highlights how simple misconfigurations can lead to critical data exposure.
0
10
0
I discovered an Insecure Direct Object Reference (IDOR) vulnerability in a practice web application that allowed unauthorized users to access other people's private snippets simply by changing a number in the URL. Using whatweb and manual inspection, I identified parameter tampering points and successfully accessed private data for five different users without authentication. The finding was documented in a comprehensive report including executive summary, technical details with screenshots, CVSS risk scoring, and step-by-step remediation instructions. This assessment demonstrates my ability to find broken access controls that automated tools miss and deliver clear, actionable fixes.
0
11
Kali Linux
(4)
Follow
Message
Muhamed Ali
Egypt
Versatile Cybersecurity & HR Expert
Follow
Message
Versatile Cybersecurity & HR Expert
0
Training project , Enhancing Security Awareness: Understanding t
0
7
0
Onsite Network Pentest
0
7
0
Onion Circuit for a special purpose research client
0
7
View more →
Kali Linux
(3)
Follow
Message
Nitin Yadav
Gurugram, India
Top-Notch Cybersecurity & Penetration Testing
Follow
Message
Top-Notch Cybersecurity & Penetration Testing
0
Pen-Test for Real Estate Marketing Platform
0
0
0
Security Assessment of Satellite Comm GUI System
0
0
0
Comprehensive Web Application Penetration Testing
0
0
View more →
Kali Linux
(3)
Follow
Message
Tabrez alam
Patna, India
DevOps & Solution Architecture | Artificial Intelligence
New to Contra
Follow
Message
DevOps & Solution Architecture | Artificial Intelligence
0
Zetawa Dark's Innovative Software Solutions
0
0
1
This report describes the process of deploying the Zetawa website from Hostinger hosting to the Vercel cloud platform. The purpose of this deployment was to improve website performance and manage the domain efficiently using DNS records. The Zetawa website was successfully deployed from Hostinger to Vercel. The website is now live on the custom domain with proper DNS configuration, improved deployment workflow, and stable performance.
1
35
1
We are an Android development team focused on building and deploying high-quality, user-friendly, and performance-optimised apps on the Google Play Store. We manage the complete app lifecycle-from development and testing to deployment and support-while following best practices and Google Play policies. Details:- 1. Android App Development Native Android app development using Java and/or Kotlin 2. Testing & Quality Assurance Manual and automated testing Bug fixing and performance improvements 3. Google Play Console Deployment Creation and management of Google Play Console accounts Version management and release tracks (Internal, Closed, Open, Production) 4. Post-Launch Support & Maintenance App updates and feature enhancements Crash monitoring and analytics 5. Security & Compliance Secure data handling and permissions management
1
28
2
Security is one of the important aspects in computing. In data transfer, security must be considered as one of the method implemented to ensure secure data transfer. Data transfer is transferring information from a location or host to another host, or server. To have a secure data transfer, The primary goal of any system is that the data cannot be modified by any external user or intruder. To avoid such a type of situation convert data into a non-readable form at sender side and convert that data in readable form again at receiver side. Data security- how to prevent someone else from knowing the contents of a message while it is being transmitted. Encryption - transform information into a different,Decryption - restore the original information from the encrypted form. Plaintext - original data. Cipher text - encrypted data.
2
22
Kali Linux
(1)
Follow
Message
Nirjhar Banik
Kolkata, India
Cybersecurity & QA: Affordable Expert Solutions
Follow
Message
Cybersecurity & QA: Affordable Expert Solutions
0
Securing Flagship Products: P0 Bug Fixes, API Rate-Limiting
0
6
0
Accelerated Security & QA Excellence
0
6
0
Accelerated Test Automation & Fortified Security
0
7
View more →
Kali Linux
(2)
Follow
Message
Sunny Saini
Hariana, India
Cybersecurity Specialist | Web Developer | UI/UX Designer
Follow
Message
Cybersecurity Specialist | Web Developer | UI/UX Designer
0
Vulnerability Assessment and Penetration Testing (VAPT) for Star
0
10
0
UI Design & Frontend Development for AGZA NGO Website
0
1
0
Development and UI/UX Design of HexaDefend
0
2
View more →
Kali Linux
(1)
Follow
Message
Tanvir Ahmed
Dubai - United Arab Emirates
Cybersecurity Specialist & Web App Penetration Tester
7
Followers
Follow
Message
Cybersecurity Specialist & Web App Penetration Tester
0
Performed OWASP Top 10–based web application penetration testing for an educational institute, identifying vulnerabilities and providing remediation to enhance security.
0
101
1
Book 1:1 appointment
1
36
0
Book 1:1 Appointment
0
27
0
my custome design
0
41
Kali Linux
(1)
Follow
Message
Explore people