Penetration Testing, or “pentesting” for short, is a valuable service for businesses and organizations of all sizes. It involves trying to access a system, website, or service illegally in order to expose any vulnerabilities that hackers can exploit. This allows IT departments and the people that protect the organization’s data to see those security issues before anyone malicious does. A Penetration Tester can help an organization keep their systems securely running by tackling any issues they discover while testing their systems.

Here's some projects that our expert Penetration Testers made real:

  • Demonstrating proprietary techniques and practices related to identifying and remediating security vulnerabilities
  • Preparing vulnerability assessment reports on potential weak spots in existing infrastructure
  • Optimizing systems for increased resilience with rigorous stress and load tests
  • Evaluating networks and services for common exploits that can easily be addressed
  • Exploring custom software for any issues prior to release
  • Securing voice counter-parties with careful auditing of cloud functions

Penetration Testing is one of the more comprehensive ways a company can test their security vulnerabilities, exposing any issues before they become a problem. Freelancer.com has plenty of experienced Penetration Testers ready to take on your project. Don’t put the security of your business at risk by waiting to address these potential issue. Post your project today and hire a Penetration Tester on Freelancer.com.

Nga 8,636 vlerësimet, klientët vlerësojnë Penetration Testers 5 nga 5 yje.
Punësoni Penetration Testers

Penetration Testing, or “pentesting” for short, is a valuable service for businesses and organizations of all sizes. It involves trying to access a system, website, or service illegally in order to expose any vulnerabilities that hackers can exploit. This allows IT departments and the people that protect the organization’s data to see those security issues before anyone malicious does. A Penetration Tester can help an organization keep their systems securely running by tackling any issues they discover while testing their systems.

Here's some projects that our expert Penetration Testers made real:

  • Demonstrating proprietary techniques and practices related to identifying and remediating security vulnerabilities
  • Preparing vulnerability assessment reports on potential weak spots in existing infrastructure
  • Optimizing systems for increased resilience with rigorous stress and load tests
  • Evaluating networks and services for common exploits that can easily be addressed
  • Exploring custom software for any issues prior to release
  • Securing voice counter-parties with careful auditing of cloud functions

Penetration Testing is one of the more comprehensive ways a company can test their security vulnerabilities, exposing any issues before they become a problem. Freelancer.com has plenty of experienced Penetration Testers ready to take on your project. Don’t put the security of your business at risk by waiting to address these potential issue. Post your project today and hire a Penetration Tester on Freelancer.com.

Nga 8,636 vlerësimet, klientët vlerësojnë Penetration Testers 5 nga 5 yje.
Punësoni Penetration Testers

Filtër

Kërkimet e mia të fundit
Filtro sipas:
Buxheti
deri në
deri në
deri në
Lloji
Aftёsitё
Gjuhët
    Shteti i punës
    16 u gjetën punë
    Comprehensive Penetration Test & Audit
    6 ditë left
    Të verifikuara

    Across my web applications, internal network infrastructure, desktop endpoints, company phones, and public social-media profiles, I need a full-scope security examination. The engagement must blend hands-on penetration testing with a structured security audit so that both technical weaknesses and policy gaps are captured in one clear deliverable. Scope • External and internal testing of web apps, network segments, desktops, mobile devices, and social-media assets • Manual and automated discovery using industry-standard tools such as Burp Suite, Nmap, Metasploit, Wireshark, Nessus, Kali Linux, and OSINT/social-engineering toolkits • Coverage of OWASP Top 10, SANS Top 25, common mobile attack vectors, and configuration hardening checks Deliverables • Comprehen...

    €167 Average bid
    €167 Oferta mesatare
    26 ofertat
    €230 Oferta mesatare
    38 ofertat

    I have a firewall, pen testing and research project assignment. Info for firewall assignment. LO2 Design, implement, analyse, configure & critique a system to a given set of network security requirements. LO3 Apply the analytical and practical skills needed to perform, assess, and reflect on security testing with reference to appropriate methodologies and frameworks Penalties for late submission of assessment You will be given a scenario of a network that you must secure. You must use principles of security to secure the network against potential threats. For the second part of the assessment, you will be expected to penetration test your secure network and reflect on the vulnerabilities, if any, that you have. Document your findings and rec...

    €209 Average bid
    €209 Oferta mesatare
    24 ofertat

    *Project Description:* We have purchased the full source code of 6amMart, and the goal of this project is to convert this system into a Microservices architecture. This process will be carried out gradually. As a first step, we need to design and implement a new, dedicated Core system that will operate alongside 6amMart and gradually replace its existing internal core. The 6amMart source is a complete multi-vendor Marketplace and Delivery platform designed to provide multiple services simultaneously. This system includes the following main modules: Food Grocery Pharmacy Parcel Shop In addition to these modules, operational components such as order management, payments, users, vendors, and delivery agents are managed through different panels (Admin, Vendor, and User). The system is stru...

    €1808 Average bid
    €1808 Oferta mesatare
    161 ofertat

    I need a seasoned ethical hacker to perform a full-scale security audit of one of my production web applications. The primary goal is to uncover code-level vulnerabilities—anything from insecure input handling to flawed session management—and provide a clear remediation plan. While the audit may touch on broader OWASP issues, I’m specifically interested in how the current codebase could be exploited and what exact fixes will close those gaps. Here is how I see the engagement unfolding: • Conduct a thorough review of the live application and its underlying source code, using industry-standard tools such as Burp Suite, OWASP ZAP, static analysis utilities, and any custom scripts you rely on. • Deliver a detailed report that ranks each finding by severity, expl...

    €2930 Average bid
    €2930 Oferta mesatare
    1 ofertat

    I'm seeking a skilled cybersecurity professional to secure my devices. Someone has been infiltrating my macOS computer and iOS phone, and I need expert help to stop this. Key Requirements: - Secure my devices from unauthorized access - Identify and remove any existing malicious code - Provide a report on vulnerabilities - Recommend and implement security measures Ideal Skills and Experience: - Proven track record in cybersecurity - Expertise in macOS and iOS security - Strong knowledge of malware and intrusion detection - Ability to communicate technical details clearly Please ensure you have relevant certifications and experience.

    €23 / hr Average bid
    €23 / hr Oferta mesatare
    13 ofertat

    Saya mencari ahli yang dapat memberi saya konsultasi keamanan jaringan yang solid untuk lingkungan Perbankan dan Keuangan. Fokus utama saya adalah menilai postur keamanan saat ini, mengidentifikasi celah kritis, lalu merancang rencana mitigasi yang praktis dan siap diterapkan. Ruang lingkup singkat: • Meninjau arsitektur jaringan dan kebijakan akses yang sudah ada. • Melakukan analisis kerentanan tingkat jaringan serta pengujian penetrasi terbatas bila diperlukan. • Menyusun laporan risiko beserta rekomendasi prioritas (best practice, kepatuhan regulator, dan langkah cepat yang dapat diambil tim internal). • Sesi diskusi online untuk memaparkan temuan dan menjawab pertanyaan tim IT saya. Saya menghargai komunikasi jelas, dokumentasi terstruktur, dan pendekatan p...

    €26 Average bid
    €26 Oferta mesatare
    1 ofertat

    A full-scope penetration test is required on my production web application with special attention paid to authentication and authorization workflows, input validation and sanitization routines, session management, and any additional vectors you deem necessary for a modern OWASP-aligned assessment. Automated scanning is welcome, yet the emphasis should remain on thorough manual exploitation using tools such as Burp Suite, Kali Linux, or equivalents, so that business-logic flaws are uncovered alongside technical ones. Please include a redacted sample or concise summary of past work that demonstrates report structure, depth of findings, and remediation guidance. No other application materials are necessary at this stage. Deliverables expected: • An executive summary and detailed ...

    €225 Average bid
    €225 Oferta mesatare
    27 ofertat
    End-to-End SaaS QA Audit
    3 ditë left
    Të verifikuara

    I’m ready to give you full access to our live, multi-tenant transportation SaaS, and I need a complete quality audit finished as soon as possible—no later than 20 business days after the NDA is signed. What I expect you to cover • Functional depth first: 13 individual modules (booking, dispatch, driver tracking, pricing, invoicing, SMS/email marketing, and the rest) must be exercised in real-world workflows for all six user roles. • Security with special focus on tenant-to-tenant isolation. Authentication, authorization, injection vectors, and PCI areas still need attention, but isolation is the non-negotiable baseline. • Load and performance baselines under realistic concurrency. • Usability feedback from the perspective of each role. • Cr...

    €419 Average bid
    €419 Oferta mesatare
    58 ofertat

    Saya membutuhkan sebuah script pengujian keamanan khusus untuk VPS DigitalOcean yang saya kelola. Fokus pengujian adalah pada ketahanan layanan terhadap serangan DDoS sehingga saya bisa menilai seberapa cepat server melambat, titik kegagalan, serta parameter yang perlu dioptimalkan. Ruang lingkup yang saya harapkan: • Menulis script (bash atau python) yang dapat mensimulasikan traffic DDoS secara terukur—misalnya melalui flood HTTP/HTTPS atau UDP—tanpa merusak sistem file atau mengeksekusi payload berbahaya. • Opsi konfigurasi agar saya bisa menentukan durasi, intensitas, dan jenis traffic. • Log real-time dan ringkasan hasil (CPU, RAM, bandwidth, response time) setelah pengujian selesai. • Panduan penggunaan singkat: cara menjalankan, parameter apa s...

    €43 / hr Average bid
    €43 / hr Oferta mesatare
    2 ofertat

    I need an experienced security expert to evaluate the network layer of our multiplayer game infrastructure. This evaluation is limited to penetration testing and does not include reverse engineering or anti-cheat development. The evaluation must cover three core activities: port scanning (mapping all exposed services), vulnerability scanning (identifying exploitable weaknesses), and intrusion detection testing (evaluating the responsiveness of our current monitoring systems to actual attack patterns). Vulnerability reproduction needs to be written into a simple user interface script. You will be using a test copy of the production environment for the evaluation, which includes the login server, matchmaking server, and in-game transaction server. Upon completion of the testing, I expect to...

    €140 Average bid
    €140 Oferta mesatare
    21 ofertat
    Token Exposure Security Testing Tool
    2 ditë left
    Të verifikuara

    Project Brief (Summary): Authorized Token Exposure Testing Platform Goal Develop a security testing tool to identify insecure handling of API tokens, session tokens, and credentials in web apps and APIs— Mainly Telgram HTTP API tokens Core Functions Scan for phishing websites…, - Traffic Analysis: Inspect and replay HTTP requests to detect tokens in headers, cookies, and responses - Client-Side Scanning: Identify tokens or secrets in JavaScript, LocalStorage, SessionStorage, and frontend code - Endpoint Discovery: Map API endpoints and classify authentication requirements - Token Inspection: Decode and analyze JWTs (expiry, scope, sensitivity) - Auth Testing: Validate whether APIs correctly enforce authentication and authorization - Offline Analysis: Support...

    €121 Average bid
    €121 Oferta mesatare
    73 ofertat

    I’m enrolled in an online security course and the Capture-the-Flag component is very challenging. Your role is to coach me through these CTF tasks, sharpening technique rather than simply handing over flags. During live screen-share sessions, I want you to help me: - navigate through multiple machines and OS (Windows and Linux) - navigate various exploits (metasploit, kali) basd on the unique machine environment - navigate different clues and dead ends We can schedule focused virtual meetings around specific machines and exploits and walk through challenges. If this sounds like your kind of deep dive, let’s connect and plan the first walkthrough.

    €17 / hr Average bid
    €17 / hr Oferta mesatare
    13 ofertat

    I need an experienced security professional to spend time in our Delhi NCR office and harden every layer of our development environment, starting with the laptops my engineers use daily. Immediate focus – securing laptops Please arrive ready to implement or advise on: • Prevent data/code leakage • Restrict USB, file sharing, and all external uploads • Control developer access with screen recording Activity monitoring is the key restriction I want enforced from day one. You may bring your own preferred EDR/DLP toolset or work with ours; what matters is that the controls are provably effective and centrally managed. Broader scope during the same engagement Once the endpoints are locked down, I’ll move straight to: – Rolling out Data Loss Preve...

    €68 Average bid
    €68 Oferta mesatare
    9 ofertat

    We are a startup working on a highly confidential and private internal project. Due to the sensitive nature of this initiative, we require a highly experienced Cybersecurity Specialist with strong expertise in advanced security testing and simulation techniques. This is not a basic vulnerability scanning or standard assessment role. We need an expert capable of performing comprehensive, advanced-level security testing against robust environments while maintaining complete confidentiality. Project Duration: 2 to 3 months (possible extension based on project needs) Compensation: ₹3,00,000 per month (premium budget for the right expert with proven advanced skills) Key Requirements: 5+ years of hands-on experience in advanced cybersecurity testing and security operations Must hold advance...

    €1669 Average bid
    €1669 Oferta mesatare
    6 ofertat

    Artikuj Të Rekomanduar Vetëm Për Ju