Hi, my name is

Manar AbuDaqqa

Mobile Developer

About Me

Know more about me


I'm Manar AbuDaqqa

A mobile developer and information security engineer living and working in Gaza, Palestine

I'm passionate about creating and developing clean, unique, elegant products. I specialize in building Applications for small to medium size business. I keep my code clean, readable, modular and well refactored. I enjoy working with complex user interfaces

  • Flutter
  • Dart
  • PHP
  • Pen Testing
  • Web Security
  • Linux administration
  • Capture the Flag
  • PL/SQL
  • Firebase
  • Postman


Mobile Developer

From single landing pages to a fully-blown eCommerce store, I'll develop that fits you and your business.

Web Security

We evaluate each and every component installed in your organization’s network and cross-verify its firmware and configured protocols with the latest updates available in the market. With this, we are able to identify best-in-class hardware and software for security purposes.

Network Security

Never let any suspicious and unauthorized user enter your network and get access to your servers. We monitor your resources 24/7 and also install an IPS and IDS system-enabled firewall for better protection from cyber-attacks..

Penetration Testing

Our Web Security Experts test every individual IT asset to identify loopholes and examine its vulnerability in accordance with threat models and risk matrix. Our multi-level testing methodology assists our clients to furnish their digital safety.

Linux administration

Linux administration covers backups, file restores, disaster recovery, system security management, and storage management.

Capture the Flag

CTF in computer security is an exercise in which "flags" are secretly hidden in purposefully-vulnerable programs or websites. It can either be for competitive or educational purposes.

Latest Works

Latest Blogs

March 1, 2022 CYBER SECURITY

What’s a Zero-Click Exploit & Zero-Click Malware?

Zero-click attacks are causing trouble for even the most vigilant tech users and corporations these days. So, let’s explore zero-click exploits and zero-click malware to better understand these attacks and why they’re such an concern.

Read More
May 22, 2023 Linux Administration

How to Set Up SSH Without a Password in Linux

SpyCloud recovered 721.5 million stolen credentials from the darknet in 2022. Don’t be the next victim. Go passwordless! Protect one of attackers’ favorite network entry points. Discover how to log in to SSH without a password in Linux.

Read More

How to Tell If You’re Using a Secure Connection in Chrome.

Whether you’re a small business running your website or a website user, it’s imperative you know how to check if you’re using a secure connection. Here’s what you can look out for in the Google Chrome browser.

Read More

Get In Touch

Drop Me message

My inbox is always open I'll try my best to get back to you!