Professional Cybersecurity Services and Solutions | Ethical Hacking | Penetration Testing | Vulnerability Assessment | Cyber Threat Intelligence | OSINT
I'm experienced Certified Ethical Hacker (C|EH) and Penetration Tester, which help business remediation vulnerabilities, mitigation attacks, protect from malware, data leaks and breaches, conduct security audits and trainings, perform Cyber Threat Intelligence (CTI) and OSINT investigations.
Conduct Black-box, White-box, Grey-box penetration testing. Performs various ethical hacking techniques and attacks: Fuzzing, Enumeration, Brute Force, OSINT/SOCMINT/HUMINT/IMINT/GEOINT, Google Dorking, Passive DNS, DOS/DDOS, HTML/PHP/XSS/SQL-injection, CSRF/SSRF/CRLF, Local File Inclusion (LFI) / Remote File Inclusion (RFI), Remote Code Execution (RCE), Man-in-the-Middle (MITM), Fingerprinting, Reconnaissance, Exploitation, Escalation Privileges, Threat Hunting, Reverse Engineering, Social Engineering.
My best tools: Metasploit, BurpSuite, SQLmap, NMAP, WPScan, THC Hydra, Nuclei, Acunetix, Nessus, OpenVAS, ZAP, Shodan, Censys, Spidefoot, Maltego, theHarvester, Amass, Metagoofil, Maryam, Dirsearch etc.
To guarantee quality, in my work I follow according to the best cybersecurity software and hardware tools, international practices and standards (ISO/IEC, OWASP, SANS, COBIT, MITRE, PTES, OSSTMM, NIST, PCI-DSS, GDPR, COBIT, ITIL etc.), and try to keep up with the latest cybersecurity news to successfully offer the best solutions for my clients.
I like a scientific and risk-oriented approach, I am a fan of Zero Trust Architecture. Apply Red Team and Blue Team skills, use Critical Thinking Model + Technical Skills. In my spare time, I conduct computer security research, take part in Re
Attachments (Click to Preview)
-