Freelancer Logo So funktioniert's Jobs durchsuchen Einloggen Registrieren Projekt posten
Computer Security Internet Security Network Security Penetration Testing Web Security
Profile cover photoundefined
Sie folgen jetzt .
Fehler beim Folgen des Nutzers.
Dieser Nutzer erlaubt es nicht, dass andere Nutzer ihm folgen.
Sie folgen diesem Nutzer bereits.
Ihr Mitgliedschaftsplan bietet nur 0 Folgen an. Upgraden Sie hier.
Das Folgen des Nutzers wurde erfolgreich beendet.
Fehler beim Nichtfolgen des Nutzers.
Sie haben erfolgreich empfohlen
Fehler beim Empfehlen des Nutzers
Ein Fehler ist aufgetreten. Bitte aktualisieren Sie die Seite und versuchen Sie es erneut.
E-Mail erfolgreich bestätigt.
Avatar des Nutzers
$40 USD / Stunde
kishoreganj, bangladesh
$40 USD / Stunde
Es ist momentan 6:56 PM
April 22, 2012 beigetreten
1 Empfehlung

Delwar A.


4,8 (14 Bewertungen)
$40 USD / Stunde
kishoreganj, bangladesh
$40 USD / Stunde
86 %
Abgeschlossene Arbeiten
96 %
92 %
8 %

Cyber Security and Penetration Testing Expert

I am a Cyber and information security expert. I invest my time and skills to help people protect their business from Cybercriminals. Specialties/ 10-years experience: Information Security and Assurance, Vulnerability Assessment, Cyber Security, Penetration Testing, IT security, Cyber Security Consultant, API Security, Mobile Application Security, Source Code Audit, Web Server Pen-testing. I started my journey in the information security domain in 2010. I have a team to collaborate with on different Cyber Security projects. My base programming skills are in PHP and Python. I am a highly-skilled framework of PHP especially Laravel, Codeigniter, and vastly experienced in Django. As a developer, I have both experienced in frontend and backend. I can manage Database MySql and MongoDB. I have worked as System Admin/ Network Administration so many years.
Freelancer Computer Security Consultants Bangladesh

Kontaktieren Sie Delwar A. über die Arbeit

Loggen Sie sich ein, um die Einzelheiten per Chat zu diskutieren.


Drupal CMS vulnerability find and all dir find and check all point..
Drupal CMS vulnerability and dir search
Drupal CMS vulnerability find and all dir find and check all point..
Drupal CMS vulnerability and dir search
Find OWASP 10 ten vulnerability and CMS vulnerability...
Sql injection, XSS, broken authentication bypass and cms
Find OWASP 10 ten vulnerability and CMS vulnerability...
Sql injection, XSS, broken authentication bypass and cms
Find OWASP 10 ten vulnerability and CMS vulnerability...
Sql injection, XSS, broken authentication bypass and cms
Find OWASP 10 ten vulnerability and CMS vulnerability...
Sql injection, XSS, broken authentication bypass and cms
Check your joomla CMS vulnerability
Joomla vulnerability scanner and report
Find your wordpress site vulnerability...
WordPress vulnerability scanner
Huge dictionary file, which of course can be changed to anything you want.
Progress tracking, if connection drops and the script has to stop for one reason or another, it'll give you the links that it could find and a progress parameter that you can provide the next time you run the program so you don't have to start from the beginning again.
User can specify the website page extension (.asp, .php etc) to narrow down the search options.
Results can be saved to a text file for future reference, and the user may choose to silence the script so that it doesn't show every link as it tests it.
Ability to pull robots.txt which sometimes might save you having to search the dictionary file as it often contains the link to the panel. The script attempts to parse robots.txt.
self changing user-agent that (a) keeps changing itself so that you don't end up getting blocked and (b) mimics a browser's user-agent to further minimize the chance that you get locked outside
Admin Panel finder using python script


Änderungen gespeichert
Zeigt 1 - 5 von 14 Bewertungen
Bewertungen filtern nach: 5,0
$270,00 USD
One of the best freelancers over here. Will continue working with him. Thanks!!
Linux Web Security Penetration Testing Network Security
+1 mehr
Flagge von Ankit S. @ankitsureka2012
vor 7 Monaten
₹1.300,00 INR
The project is not completed according to the dispute
Web Security Computer Security Software Testing Network Administration
Avatar des Nutzers
Flagge von Sudheer K. @sudheerkumar90
vor 1 Jahr
$1.350,00 USD
Great work. Will hire him again
Web Security Computer Security Research Writing Network Administration Internet Security
Flagge von Ankit S. @ankitsureka2012
vor 1 Jahr
€90,00 EUR
Excellent work done by the seller. I nevertheless found him to be extremely responsive, highly professional, and immensely intelligent in the field of IT and cyber security. He provided excellent 5-star service and delivered an excellent report. Very smooth experience and good communication. He is highly recommended and you should not hesitate to use his 1st class service.
Banner Design Blog Blackberry Article Writing Blog Design
+1 mehr
Flagge von Md.Fakrul Abedin B. @fakrulabedin79
vor 1 Jahr
$150,00 CAD
Although Delwar did some of the things I asked he didn't do all of them. I even had to google some examples to send to him so he understood what I wanted done. He told me during the review process that he was an expert in security. An expert would know what needs to be done to secure a form from hackers and spammers without help from me. He also told me he had a good grasp of the English language yet he stated he didn't understand what I wanted numerous times. I will now have to seek more help
Avatar des Nutzers
Flagge von Paul S. @nootkan
vor 2 Jahren


Cyber Security Specialist

BugsBD limited
Aug. 2016 - Aktuell
Cyber Security research, Pentester


BSc in software engineering

Daffodil International University, Bangladesh 2010 - 2014
(4 Jahre)


CISM (Certified Information Security Manager)

CISM (Certified Information Security Manager)

Certified Information Systems Auditor® (CISA®)

Certified Information Systems Auditor® (CISA®)

Certified Ethical Hacker

Certified Ethical Hacker is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems


Assessment of vulnerabilities of web applications of Bangladesh: A case study of XSS & CSRF

2016 Sixth International Conference on Digital Information and Communication Technology and its
In a sophisticated and coordinated cyber-attack $100 million has been stolen from Bangladesh's account. At­tackers introduced malicious code remotely into the Bangladesh Bank's server, which allowed them to process and authorize the transactions. Advanced attack techniques poses threats to all web application systems. Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF)

A Study of the Effects of Heartbleed Vulnerability in Bangladesh

The Fourth International Conference on Computer Science
One of the most critical and talked about Open Secure Socket Layer (SSL) and Transport Layer Security (TLS) threats is Heartbleed vulnerability. This vulnerability affects the " Heartbeat protocol " of the open SSL library. HeartBleed manipulates the Heartbeat protocol to get access and read the memory of the vulnerable web servers. OpenSSL is used in HTTPS for internet security.

Study of the Dirty Copy On Write, A Linux Kernel Memory Allocation Vulnerability

EasyChair for CEEIT 2017
Dirty Copy On Write also known as Dirty COW is a Linux based server vulnerability. This vulnerability allows attackers to escalate the file system protection of Linux Kernel, get root privilege and thus compromise the whole system. Linux kernel version 2.6.22 and higher are affected by this vulnerability. The patch for this vulnerability has been released very recently.

Study of Race Condition: A Privilege Escalation Vulnerability

WMSCI 2017 Secretariat
The Race condition is a privilege vulnerability that manipulates the small window of time between appliance of a security control and use of services in a system. This vulnerability is a result of interferences caused by multiple threads running in the system and sharing the same resources. These processes might include trusted process such as operating system files and un-trusted processes.

Kontaktieren Sie Delwar A. über die Arbeit

Loggen Sie sich ein, um die Einzelheiten per Chat zu diskutieren.


Identität verifiziert
Zahlung verifiziert
Telefon verifiziert
E-Mail verifiziert
Facebook verbunden


preferredfreelancer-1.png Preferred Freelancer Program SLA 1 89% us_eng_1.png US English 1 77%


Computer Security 13 Internet Security 12 Penetration Testing 11 Network Security 9 Web Security 7

Ähnliche Freelancer anschauen

Computer Security Consultants in Bangladesh
Computer Security Consultants
Internet Security Experts
Penetration Testers

Ähnliche Vorzeigeprojekte ansehen

Computer Security
Internet Security
Penetration Testing
Network Security
Vorheriger Nutzer
Nächster Benutzer
Einladung erfolgreich zugesendet!
Registrierte Benutzer Veröffentlichte Jobs
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2023 Freelancer Technology Pty Limited (ACN 142 189 759)
Vorschau wird geladen
Erlaubnis zur Geolokalisierung erteilt.
Ihre Anmeldesitzung ist abgelaufen und Sie wurden abgemeldet. Bitte melden Sie sich erneut an.