Convidar Freelancer para Projeto
Parece que você não tem um projeto ativo no momento. Por que não postar um projeto agora? É grátis!Publique um Projeto
- 95%Trabalhos concluídos
- 87%No Orçamento
- 5%Taxa de Recontratação
Project 20368978 has been deleted
“He doesn't has any knowledge about the vulnerabilities and how to remediate it also he has no idea how to write report I will never and ever hire him again.”Saleh B. 1 mês atrás
propose work idea in computer security field and implement it and write a paper
“good work, would hire him again”Osama H. 1 mês atrás
Old Joomla Site Hacked. Get it working. Update to Latest Version.
“This is hard to review because Md Shofiur did the work. I feel honest reviews are important so...he kept pressing in to complete the project—it took 2-3 rounds though. I would rehire and recommend his work. However, he did push for money outside the agreement on two different occasions. One at the start at the project and another at the end despite being very clear on what needed to be done at the beginning of the project. Nothing changed in regards to the scope. All in all, a good experience.”Joshua M. há 4 meses
block geo ip on windows server
“The project is not completed according to the dispute”Kyoungsuk K. há 4 meses
RUSH PROJECT: Java Security code review
“Shofiur was able to complete my last minute rush project for a code review fast and professionally, gave a realistic time frame to complete and delivered within that frame.”Lennert S. há 4 meses
“Shofiur Was Super fast and very knowledgeable. He found Security Exploits that other software had missed”George A. há 4 meses
Website Hacking / Penetration Testing (2018)Udemy, Inc.
This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine.
Ethical Hacking (2017)Udemy, Inc.
This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine. All the attacks explained in this course are launched against real devices in my lab.
Preferred Freelancer Program SLA100%
Conectado com o Facebook
- Telefone Verificado
- Identidade Verificada
- E-mail Verificado