SocketSilence
Light Weight
- Депозит
- $0
Пожалуйста, обратите внимание, что пользователь заблокирован
Senior programmer, with more than 10 years of experience willing to fix, create, design, analyze or perform any necessary function to catapult your project to the next level
Full Stack, with knowledge in various programming languages
If a task can be coded, rest assured i am prepared to tackle it, no challenge is too big for me, and if i encounter unfamiliar terrain, i quickly adapt and learn.
Surely, there are organizations and individuals who would greatly benefit from my capabilities.
Some of the things we can do, although if you have any idea in mind you are welcome, you can share it and we will tell you if it is viable for us;
Extensions for different browsers, both computer and mobile.
Dedicated software for the most ingenious projects.
Software analysis to search for errors or malicious files, back doors, or anything strange
Stealer, Drainers, Morpher , Encryptors Development
Games of Chance, Casinos, Bets.
Development and creation of Marketplaces.
Exploit Programming
Development and programming of systems (Extensive knowledge in large libraries).
Creation of telegram bots.
Creation of web pages and web applications.
Penetration testing for different operating systems.
Full Network penetration testing (Cobalt, Acunetix, Intruder, zenmap, Burp, Invicti, Ettercap, Metasploit, Nmap, Pompem, Np, Arp, Evilgo, cloudfox among many others)
Full training to obtain network access.
work by PM
Senior programmer, with more than 10 years of experience willing to fix, create, design, analyze or perform any necessary function to catapult your project to the next level
Full Stack, with knowledge in various programming languages
If a task can be coded, rest assured i am prepared to tackle it, no challenge is too big for me, and if i encounter unfamiliar terrain, i quickly adapt and learn.
Surely, there are organizations and individuals who would greatly benefit from my capabilities.
Some of the things we can do, although if you have any idea in mind you are welcome, you can share it and we will tell you if it is viable for us;
Extensions for different browsers, both computer and mobile.
Dedicated software for the most ingenious projects.
Software analysis to search for errors or malicious files, back doors, or anything strange
Stealer, Drainers, Morpher , Encryptors Development
Games of Chance, Casinos, Bets.
Development and creation of Marketplaces.
Exploit Programming
Development and programming of systems (Extensive knowledge in large libraries).
Creation of telegram bots.
Creation of web pages and web applications.
Penetration testing for different operating systems.
Full Network penetration testing (Cobalt, Acunetix, Intruder, zenmap, Burp, Invicti, Ettercap, Metasploit, Nmap, Pompem, Np, Arp, Evilgo, cloudfox among many others)
Full training to obtain network access.
work by PM