Following details will be shared with the tutors you will contact:
Confirm to delete
Are you sure want to delete this?
SAADEthical Hacker | Penetration Tester | Red Teamer |
No reviews yet
As a skilled penetration tester, I help businesses and organizations strengthen their cybersecurity defenses by identifying vulnerabilities in their networks, applications, and systems. With hands-on experience in practical penetration testing, I know how to think like a hacker and use a variety of tools and techniques to simulate attacks and find weaknesses that could be exploited. I am proficient in a range of testing methodologies, including web application testing, network penetration testing, and mobile application testing, and have expertise in tools such as Burp Suite, Metasploit, and Nessus. I provide comprehensive reports detailing my findings and recommendations for remediation, and I work closely with clients to ensure that they understand the risks and are equipped to mitigate them. Whether you need a one-time assessment or ongoing testing and monitoring, I am here to help you protect your assets and your customers' data.
Tools with which I have hands-on experience are Nessus, OpenVAS, Qualys, Mobsf, Burpsuite, Nikto, Sqlmap, Netcat, Socat, Winpeas, and Linpeas (Privilege Escalation), Metasploit-framework, Bloodhound, Responder, Impacket-psexec, Maltego, OWASP ZAP, Wireshark, dirbuster, hashcat, john-the-ripper, Jadx-GUI, Dex2jar, Strings, IDA-pro, Hydra, Wazhu, Snort, Splunk, GNS3, ThingSpeak, gqrx-SDR, gnuradio,gr-gsm, Hackrf, RTL-SDR-scanner.
Operating Systems: Kali Linux Parrot OS Dragon OS Cyborg OS SigintOS Ubuntu Windows 7/8.1/10/11
Languages: C++ Java Python Bash
If you're looking to learn or need help on any project or task related to the categories mentioned below my team has the expertise and capabilities to assist you.
Automation Scripting API Development OCR Extraction JSON Parsing Pipelines Flask Databases SQL MongoDB PostgreSQL Elasticsearch Bash Python Docker PM2 Cybersecurity Ethical Hacking Android Penetration Testing Web Penetration Testing Malware Analysis Network Penetration Testing Security Operations Intrusion Operations Open Source Intelligence Cyber Threat Intelligence Vulnerability Assessment Machine Learning Deep Learning Fraud Detection Natural Language Processing Data Analysis Data Visualization TensorFlow PyTorch Communication
Subjects
Python Beginner-Intermediate
Penetration testing Beginner-Expert
Ethical hacking Beginner-Expert
Cyber Security Beginner-Expert
Vulnerability Assessment and Penetration Testing Beginner-Expert
Experience
Ethical Hacker (Oct, 2022–Present) at Confidential
Security Operations (Aug, 2021–Present) at Cybersecurity Company
Education
BS Computer Science (Jan, 2016–now) from Institute of Space Technology,Islamabad Pakistan