ProText Hacker

Professional Penetration Tester, Security Expert and Ethical Hacker


ProText Hacker provides the absolute best phone hacking service. Anything else would be a disappointment. It’s not just about offering outstanding customer service or being honest – it’s about being the absolute best in the industry. We know you have high expectations when you use our law enforcement tools for online hacking to find the truth, so we do everything in our power to give you what you want, including catering to any needs or requests that may arise while you are busy working on your investigation. At ProText Hacker, we strive to provide an exceptional experience for our customers every time because quality matters.


With over ten years of experience in cyber-security and penetration testing, He is a certified ethical hacker and auditor. Founder of Yappo Security, a cyber-security firm that provides cyber-security throughout the world.

He has the following certifications:

  • CEH  (Certified Ethical Hacking)
  • CISSP (Certified Information Security Systems Professional)
  • CISA  (Certified Information Systems Auditor)
  • Associate AWS Certified Solutions Architect

Solutions Architecture is her area of expertise.

$30.00/hr

He has worked on both cloud and on-premises systems. To accomplish this, he used the following infrastructure tools:

AWS, sVMware, sAzure

I dealt with the following technology on the devops side of things:

  • HAProxy
  • Apache
  • Nginx
  • Tomcat
  • Veeam
  • PRTG
  • Github and Gitlab
  • Jenkins
  • Docker
  • Rancher(Kubernetes)
  • ECS (AWS)
  • Chef and Opsworks

Skills & expertise

  • Solutions Architecture Deliverables
  • Sequence Diagram
  • Activity Diagram
  • State Diagram
  • Object Diagram
  • Use Case Diagram

Solutions Architecture Skills

  • Web Servers
  • Java
  • Apache Tomcat
  • Elasticsearch
  • Web Services
  • Microsoft IIS
  • Cloud Computing
  • UML

Other skills

  • ChefHTMLCSSC++

Yappo Security’s Founder, CTO, and Senior Penetration Tester

April 2018

  • Has performed penetration tests for a variety of clients.
  • Has advised recommendations for remediation and best practices.
  • Reports any security related activity efficiently.