Report this freelancer

Daniyal Shahzad

Cyber Security Researcher
Pakistan
1 January 2002
  • Successful Projects
    0
  • Services Delivered
    0
  • Completed Services
    0
  • Services Pending
    0

Freelancer Information

Hi, I'm Daniyal, a dedicated cybersecurity enthusiast with a sharp focus on Web Application, Android, and IoT Penetration Testing. I specialize in finding vulnerabilities before attackers do—helping you secure your digital assets, products, and infrastructure.

With a hands-on approach and real-world experience, I offer:

✅ In-depth Web Application Pentesting (OWASP Top 10, Business Logic flaws, etc.)
✅ Android Pentesting using tools like Frida, Burp Suite, ADB, and custom PoCs
✅ IoT Device Assessments covering hardware, firmware, network protocols, and embedded services
✅ Detailed reporting with risk ratings, impact analysis, and remediation guidance
✅ Custom exploits and Proof of Concepts for advanced scenarios
Whether you're launching a product or want a security audit for peace of mind, I’ll help ensure it’s battle-tested.

🔒 Let’s secure your assets before someone else tests them for you!


Freelancer Education

B
2019-2024 BS Cyber Security
Air University

I have completed a Bachelor of Science in Cyber Security, where I developed a strong foundation in both the technical and professional aspects of the field. The program equipped me with practical knowledge across a broad range of cybersecurity domains, including network security, penetration testing, and reverse engineering. Throughout my studies, I learned not only how to identify and mitigate security vulnerabilities but also how to approach cybersecurity challenges from an industry-oriented perspective. For my final year project, I conducted a comprehensive penetration test on cellular networks, which involved analyzing potential attack vectors and assessing the security posture of mobile communication systems. This project allowed me to apply theoretical concepts in a real-world environment and further deepened my interest in telecommunications security.


Work & Experience

A
01-01-2024 Application Security Engineer
Busiber Bogazici MIS

As an Application Security Engineer, I specialize in uncovering and fixing security flaws across web, mobile, and client-server applications. From breaking into APIs and bypassing SSL pinning on mobile apps to simulating real-world attacks on authentication systems, I help businesses stay one step ahead of cyber threats. I've worked with global clients like Logiwa, Dijiname, QuizClothing, and Upstash, delivering actionable insights and practical fixes. Whether it’s testing mobile apps with tools like Frida and Objection, or analyzing malware to stop it in its tracks, I bring a hands-on, results-driven approach to every project—always with the goal of making your product safer, faster.

H
01-05-2024 - 01-08-2024 Hardware Security Intern
CISPA Helmholtz Center for Information Security

I've worked extensively at the intersection of mobile, embedded, and firmware security, modifying existing exploits to enhance penetration testing capabilities and uncover deeper vulnerabilities. My work includes injecting persistent root-level backdoors into Android OS via baseband exploits, and replicating complex, hardware-based vulnerabilities like those revealed by Google Project Zero—chaining CVEs to deliver over-the-air payloads. I’ve collaborated on RTOS development for MSP430 series, tackled firmware extraction from Broadcom and Qualcomm SoCs, and performed fuzzing and reverse engineering on satellite communication modules to identify critical weaknesses. With hands-on experience in kernel programming and baseband penetration testing, I bring a deep, low-level understanding of how systems operate—and how they can be secured.

R
01-01-2025 Research Assistant (IOT and Embedded Systems)
National Center for Cyber Security - NASTP

I’ve conducted hands-on research across a range of systems, starting with TP-Link WiFi routers, where I developed custom firmware based on OpenWRT, integrating WiFi auditing tools and new features. This project deepened my knowledge of embedded systems, Linux, and Git, while sharpening my problem-solving skills through real-world development challenges. I also explored the security architecture of Google Tensor devices and their bootloaders, successfully bypassing modem-level restrictions on IMEIs and serial numbers, which expanded my understanding of modem security in IoT and automotive systems. Currently, I’m working on an open-source bootloader to gain deeper insight into system architecture and OS internals. Additionally, my research on cellular networks uncovered methods to capture OTPs and bypass 2FA, revealing critical vulnerabilities with potential impacts on the banking sector.


Awards

W
2022 Winner of National CTF
I led a two-person team in a national-level Capture The Flag (CTF) competition, where we secured 1st place in the Web Application Security category, outperforming participants with over five years of industry experience. This victory not only validated my practical skills in real-world scenarios but also opened doors to new professional opportunities and earned me a scholarship in recognition of my performance.