Banner Image

Skills

  • Email Services
  • Engineering
  • HTTP
  • Linux
  • Malware
  • Microsoft Windows
  • Penetration Testing
  • Quality Assurance and Testing
  • Reports
  • Reverse Engineering
  • Scanning
  • Software Development

Services

  • Penetration Testing, Reverse Engineering

    $75/hr Starting at $75 Ongoing

    Dedicated Resource

    Penetration Testing, Reverse Engineering, Vulnerability assessment and mitigation. Windows and web apps testing and reverse engineering with binary code review and test for stack and buffer overflow and...

    Email ServicesEngineeringHTTPLinuxMalware

About

Email, Engineering, HTTP. Linux, Malware, Microsoft Windows, Penetration Testing, Quality Assurance (QA) & Testing, Reports, Reverse Engineering, Scanning, Software Dev, Penetration tester

Sydney based with 8+ years experience in;
Penetration Testing, Reverse Engineering, Vulnerability assessment and mitigation.
Windows and web apps testing and reverse engineering with binary code review and test for stack and buffer overflow and binary code injection.
tailor made scanning scripts/software for your company including brute force attack software's, password attack and password recovery scripts and software and keyloggers with results emailed to your specified email address.
All these scripts and or software are tailor made specifically to suit your website and web apps and the testing parameters you need.
If needed I can also write a custom made trojans, backdoor or any virus so you can test the integrity of your server / network system.

Some of my skills involve below for reference;
Object oriented programming.
Packet manipulation
Socket programming.
Compiling programs to binary executables.
Sending & receiving HTTP requests.
Parsing HTML.
Network hacking / penetration testing.
Changing MAC address & bypassing filtering.
Network mapping.
ARP Spoofing - redirect the flow of packets in a network.
DNS Spoofing - redirect requests from one website to another.
Spying on any client connected to the network - see usernames, passwords, visited urls...etc.
Replace files on the fly as they get downloaded by any computer on the same network.
Detect ARP spoofing attacks.
Bypass HTTPS.
Create malware for Windows, OS X and Linux.
Create trojans for Windows, OS X and Linux.
Hack Windows, OS X and Linux using custom backdoor.
Bypass Anti-Virus programs.
Use fake login prompt to steal credentials.
Display fake updates.
Use own keylogger to spy on everything typed on a Windows & Linux.
Website hacking / Penetration testing.
Discover subdomains.
Discover hidden files and directories in a website.
Run wordlist attacks to guess login information.
Discover and exploit XSS vulnerabilities.
Discover weaknesses in websites using own scanner.

Work Terms

Hours of work will depend on customer requirement with a minimum of 1 hour work and excess minutes rounded up to the next hour or can agree with a full package deal for a particular job ie; 1 week work for x amount of payment. Terms of payment either through guru.com or in bitcoins (preferable). Contact is only via guru.com.

All scripts / software / hacks / viruses made for the customer are solely the responsibility of the customer and I will not be held responsible if the said scripts / software / hacks / viruses is lost or stolen or used for illegal purposes. It is automatically implied that you have the explicit permission from the server owner or IT manager or the owner of the IT systems that you are testing/hacking and deploying these tools.
By using my services customers automatically agrees to indemnify the software developer(me) of any and all wrongdoings and legal liabilities and damages resulting in the misuse of the said scripts / software / hacks / viruses or malwares.