Creloaded exploitstrabajos

Filtro

Mis búsquedas recientes
Filtrar por:
Presupuesto
a
a
a
Tipo
Habilidades
Idiomas
    Estado del trabajo
    2,000 creloaded exploits trabajados encontrados, precios en USD

    ...realizarán con y sin credenciales, con un máximo de hasta 2 perfiles por aplicación, 5 formularios por aplicación web. e) Definición de escenarios de ataque y explotación de vulnerabilidades Revisar las vulnerabilidades y errores de configuración identificados para determinar su impacto. Asimismo, se debe realizar pruebas de penetración específica y/o pruebas de vulnerabilidades, ejecución código exploits y verificación de resultados. La explotación de vulnerabilidades no deberá afectar ni degradar el servicio de las aplicaciones y/o direcciones IP a auditar. f) Generación de recomendaciones y documentación final: Presentación de Resultados y Recomendaciones de...

    $2625 (Avg Bid)
    $2625 Oferta promedio
    6 ofertas

    ...realizarán con y sin credenciales, con un máximo de hasta 2 perfiles por aplicación, 5 formularios por aplicación web. e) Definición de escenarios de ataque y explotación de vulnerabilidades Revisar las vulnerabilidades y errores de configuración identificados para determinar su impacto. Asimismo, se debe realizar pruebas de penetración específica y/o pruebas de vulnerabilidades, ejecución código exploits y verificación de resultados. La explotación de vulnerabilidades no deberá afectar ni degradar el servicio de las aplicaciones y/o direcciones IP a auditar. f) Generación de recomendaciones y documentación final: Presentación de Resultados y Recomendaciones de...

    $940 (Avg Bid)
    $940 Oferta promedio
    5 ofertas
    SCRIPTER PARA ROBLOX Finalizado left

    ocupo un scripter para roblox que sepa crear scripts quiero que me enseñe a crear scripts para exploits pago con robux y le doy un grupo hakeado que no ocupa renovarse nunca mas y muchos robux

    $15 (Avg Bid)
    $15 Oferta promedio
    1 ofertas

    Antivirus y Antispyware Anti-Phishing Bloqueo de exploits Exploración basada en la nube Mínimo impacto en el sistema Protección contra ataques basados en scripts Protección ante ransomware UEFI Scanner Firewall personal Antispam Protección contra ataques de red Protección ante botnets Control parental Protección de cámara Web Anti-Theft FUNCIONE EN WINDOWS Y LINUX

    $405 (Avg Bid)
    $405 Oferta promedio
    2 ofertas

    ...clientes y que ofrece servicios de consultoría y auditoría del más alto nivel. Experiencia realizando proyectos de Hacking Ético.- Conocimiento y experiencia en el uso de metodologías y estándares de seguridad (OSSTMM, ISSAF, OWASP).- Se valorarán certificaciones de seguridad así como conocimientos técnicos adicionales sobre seguridad en dispositivos móviles, análisis de malware, creación de exploits, sistemas de VoIP, automatización de tareas, experiencia en programación.- Capacidad para impartir formación y realizar presentaciones en público.- Nivel alto de inglés a nivel de lectura y demostrable de 4 o 5 años en la realización de proyectos de a...

    N/A
    N/A
    0 ofertas

    ...realizados entre entornos, apuntando a la mejora continua. - Resolución de incidentes - Aplicación de Cambios Evolutivos de aplicaciones - Backup & Recovery de aplicaciones - Seguimiento de logs de aplicaciones - Hacking, Spoofing, Backdoors. - Shellscripting, Troubleshooting. - “hacking”: exploración, denegación de servicio, “sniffing”, “spoofing”, “buffer overflows”, “exploits”, “backdoors”, “key loggers”, “phishing”; entre otras - configuration management. - implementaciones con CA Release Automation, Harvest, Bamboo, Puppet, u otras herramientas asociadas a DevOps. - herramientas ágiles (Jira, Confluence, Stash,...

    N/A
    N/A
    0 ofertas

    ...produce a detailed analysis report on selected CVE vulnerabilities associated with WordPress. This report is specifically for an academic project. Here are the particular CVEs for review: 1. CVE-2023-32243 2. CVE-2023-0084 I can provide the older versions of those plugins with bugs you just need to execute and create output on docker environment and add screenshots of execution showing how it exploits security and then the share the proposed mitigations in the report. You must have to cover the below mentioned points in the reports: briefly describe the architecture of the web application/framework describe the type(s) of vulnerability that is considered describe the vulnerabilities in detail describe how to exploit the vulnerabilities describe how the vulnerabilities were ...

    $44 (Avg Bid)
    $44 Oferta promedio
    21 ofertas

    ...estimation, and desktop UI development (e.g., with Tkinter, PyQt, or other GUI libraries). * **DEX APIs:** In-depth knowledge of integrating with decentralized exchange APIs. * **Aave Expertise:** Solid understanding of Aave flash loan mechanics and API interactions. **Additional Considerations:** * **Security:** The code must prioritize security and implement safeguards against potential exploits. * **Scalability:** The bot should be designed to handle increasing trade volume and multiple simultaneous arbitrage opportunities. * **Code Optimization:** Focus on efficient code in both Solidity and Python for low latency and maximum transaction speed. **Submission Guidelines:** Please provide the following when submitting your proposal: * **Portfolio:** Showcase relevant blo...

    $604 (Avg Bid)
    $604 Oferta promedio
    94 ofertas

    I'm searching for an experienced full-stack web developer with a proficient command in PHP (php mysql). The candidate will be tasked with the impleme...providing support to do it - Integrating UI elements with server-side logic Ideal Experience and Skills: - Profound knowledge of PHP - Strong experience in web development - Understanding and implementation of security and data protection - Good problem solving skills - Validating user actions on the client side and providing responsive feedback - Strong knowledge of the common PHP or web server exploits and their solutions Please note: I already have the completed design which will be provided. You will strictly be working on the development. Applicants are needed immediately, and development is expected to commence as so...

    $161 (Avg Bid)
    $161 Oferta promedio
    77 ofertas

    ...Experience Required: - Extensive experience in malware analysis, specifically for Windows and Linux platforms - Working on Jupyter, a malware variant associated with the SolarMaker family. - Proven track record in both static and dynamic malware analysis - Ability to work under tight schedules - Excellent problem-solving and analytical skills - Sound understanding of malware techniques and exploits - Familiarity with tools such as IDA Pro, Ghidra, and Wireshark - Detailed malware analysis - Code Analysis of the malware Responsibilities: - Conduct comprehensive static and dynamic malware analysis - Provide actionable insights and detection strategies - Clearly document findings for technical and non-technical audience If you believe you're equipped for this critical ta...

    $460 (Avg Bid)
    $460 Oferta promedio
    17 ofertas

    ...trading unlocks). * Liquidity detection: The bot is able to detect when the liquidity pool is created and be able to snipe trades immediately within seconds on the same block if possible. This will be the main function. * Should scan contracts and filter out parameters in regards to rugs/scams like honeypots, if contract is freezable, liquidity not locked, has airdrops, mintable, liquidity exploits, dev exploits, etc. and filter those out and automatically trigger good contracts and as soon as liquidity is added on those good contracts triggered then it should buy/snipe tokens immediately dealing directly with blockchain to ensure we are one of the first to snipe once liquidity is added. Need to be able to buy in whatever denomination i set that is editable by me at an...

    $592 (Avg Bid)
    $592 Oferta promedio
    22 ofertas

    ...and have them fixed. Here's what I'm looking for in the hired professional: • Extensive experience with WordPress: The expert should understand the exploitation of WordPress sites and how to fortify them. • Complete Malware removal: Identifying and removing malicious coding throughout the website, ensuring a clean slate. • Server-Level expertise: An understanding of database and server-level exploits is preferable, with the potential malware affecting more than just the website's frontend. • Backup Restoration: Since a backup of the website is available, experience with backup restorations is necessary. • Proactive Fortification: We need to ensure this issue doesn't recur. Your skills should extend to securing the website from fu...

    $40 (Avg Bid)
    $40 Oferta promedio
    26 ofertas

    ...Experience Required: - Extensive experience in malware analysis, specifically for Windows and Linux platforms - Working on Jupyter, a malware variant associated with the SolarMaker family. - Proven track record in both static and dynamic malware analysis - Ability to work under tight schedules - Excellent problem-solving and analytical skills - Sound understanding of malware techniques and exploits - Familiarity with tools such as IDA Pro, Ghidra, and Wireshark - Detailed malware analysis - Code Analysis of the malware Responsibilities: - Conduct comprehensive static and dynamic malware analysis - Provide actionable insights and detection strategies - Clearly document findings for technical and non-technical audience If you believe you're equipped for this critical ta...

    $346 (Avg Bid)
    $346 Oferta promedio
    7 ofertas

    ...Compatibility must be ensured with the Solana trading platform. * Liquidity detection: The bot is able to detect when the liquidity pool is created and be able to snipe trades immediately within seconds * Anti-Rug features * Should scan contracts and filter out parameters in regards to rugs/scams like honeypots, if contract is freezable, liquidity not locked, has airdrops, mintable, liquidity exploits, etc. and filter those out and automatically trigger good contracts and as soon as liquidity is added on those good contracts triggered then it should buy/snipe tokens immediately dealing directly with blockchain to ensure we are one of the first to snipe once liquidity is added. Need to be able to buy in whatever denomination i set that is editable by me at any point * filter...

    $250 - $750
    Sellado
    $250 - $750
    14 ofertas

    I'm looking for bright, young freelancers to spearhead the development of an e-commerce website focusing on home decor. This project will require the following expertise: - Pentesting: To ensure the website is secure and free from potential exploits - E-commerce Web Development: To create a user-friendly platform that facilitates the effective buying and selling of home decor products Beyond technical skills, this job also calls for creativity and a flair for graphic design to make the website visually appealing. If you also have a knack for content writing, that would be a plus as this will help in crafting compelling product descriptions and other website content. Ideal candidates should be teens as this project is targeted at giving opportunities to young, budding freela...

    $30 / hr (Avg Bid)
    $30 / hr Oferta promedio
    16 ofertas

    I'm looking for bright, young freelancers to spearhead the development of an e-commerce website focusing on home decor. This project will require the following expertise: - Pentesting: To ensure the website is secure and free from potential exploits - E-commerce Web Development: To create a user-friendly platform that facilitates the effective buying and selling of home decor products Beyond technical skills, this job also calls for creativity and a flair for graphic design to make the website visually appealing. If you also have a knack for content writing, that would be a plus as this will help in crafting compelling product descriptions and other website content. Ideal candidates should be teens as this project is targeted at giving opportunities to young, budding freela...

    $30183 (Avg Bid)
    $30183 Oferta promedio
    7 ofertas
    Secure Old Game Code Finalizado left

    I'm in search of a skilled Developer to dive into the underbelly of a now-classic game's code. Our journey back in time isn't driven by nostalgia, but by a critical mission: enhancing security. **Core Requirements:** - Analyze the game's existing C++ code to identify any security vulnerabilities or exploits. - Develop a method to reliably trigger these exploits. This is crucial for testing and ensuring we've accurately identified the weaknesses. - Implement fixes to eliminate these vulnerabilities, fortifying the code against potential breaches. **Who Should Apply:** - If you have extensive experience with C++, particularly in the realm of security and exploit mitigation, your expertise could be invaluable. - Experience in deciphering and working w...

    $111 (Avg Bid)
    $111 Oferta promedio
    8 ofertas

    ...**Key Project Requirements:** - Experience with Minecraft modding, particularly in editing and altering existing mods. - Ability to add a new item to the mod pack that fits seamlessly with existing content. - Proficiency in Java and familiarity with Minecraft mod development tools. - A keen eye for detail to ensure that the modifications maintain the game's balance and do not introduce bugs or exploits. **Ideal Skills and Experience:** - Strong background in Minecraft mod creation and customization. - Proven track record of successful mod projects, specifically involving gameplay enhancements. - Creative problem solving to integrate new ideas effectively. - Excellent communication skills to understand the specific requirements and provide regular updates. This project aims...

    $103 (Avg Bid)
    $103 Oferta promedio
    6 ofertas

    I am seeking a seasoned scriptwriter with an affinity for creating compelling content with dark and gritty undertones. This endeavour involves writing a script for an adult simulation game, heavily focusing on amorous exploits in a realistic yet dark environment. Skills and experience desirable for the project include: * Proven experience in script writing, particularly for video games * A knack for crafting engaging, mature and dark narratives * Familiarity with simulation games and their story-telling mechanics The game's central theme revolves around adult relationships in a challenging, no-holds-barred environment. The narrative and dialogue should reflect this harsh reality, evoking intense emotions and high-stakes scenarios. Your creativity and originality should shi...

    $10 (Avg Bid)
    $10 Oferta promedio
    9 ofertas

    I require an experienced penetration tester to identify vulnerabilities in my small network and web application. The project involves: - Network penetration testing - Web application testing My expectations from the test are purely to pinpoint any...size is small, encompassing 1-10 devices/pages, meticulousness is paramount. Ideal freelancers for this project should possess: - A strong background in network and web application penetration testing - Proven experience in identifying and addressing security vulnerabilities - Attention to detail, no matter how minute the network environment In-depth understanding of common vulnerabilities and exploits will be preferred. I look forward to a comprehensive report highlighting any detected vulnerabilities along with suggestions for imp...

    $153 (Avg Bid)
    $153 Oferta promedio
    34 ofertas

    ...experienced FiveM server developer to take my fully set-up, but erring server to peak performance. With a focus on advanced roleplay features, customizability and improved gameplay mechanics, this project requires some serious skills. Key tasks include: - Debugging: Ensure everything is configured to match our desired economy. - Error & Exploit Fixing: Identify and rectify all bugs and potential exploits. This will need a keen eye for security vulnerabilities. Ideal candidates will have a strong record of server development, a deep understanding of FiveM and an ability to provide top-notch roleplay functionality. Let's get this server firing on all cylinders! - We need all jobs, pricing & realistic interactions and few more things doing to our city. we are also...

    $185 (Avg Bid)
    $185 Oferta promedio
    4 ofertas
    Core & Advanced php Finalizado left

    ...web frameworks {{such as Laravel, Yii, etc depending on your technology stack}} Understanding the fully synchronous behavior of PHP Understanding of MVC design patterns Basic understanding of front-end technologies, such as JavaScript, HTML5, and CSS3 Knowledge of object-oriented PHP programming Understanding accessibility and security compliance. Strong knowledge of the common PHP or web server exploits and their solutions Understanding fundamental design principles behind a scalable application User authentication and authorization between multiple systems, servers, and environments Integration of multiple data sources and databases into one system Familiarity with limitations of PHP as a platform and its workarounds Creating database schemas that represent and support business...

    $12 / hr (Avg Bid)
    $12 / hr Oferta promedio
    14 ofertas

    I'm seeking a proficient developer to clonemodules of an open source software, specifically focusing on file inclusion exploits. This project also includes enhancing the user interface, particularly the color scheme and styling. Key responsibilities would include: - Cloning the exploit modules from the open source software, with a focus on file inclusion exploits - Upgrading the color scheme and styling of the UI to render a more aesthetically appealing interface Ideal freelancers should possess: - Proficiency in scripting and coding - Strong background in exploit development - Experience in UI design, specifically color scheme and styling - Understanding of open source software licenses and regulations. This task requires delicate balance of technical proficiency a...

    $276 (Avg Bid)
    $276 Oferta promedio
    15 ofertas

    ...as follows: Scope: - The penetration test should focus on the client's Web Application. Report Detail: - The client requires both a high-level summary and a detailed technical report. - The high-level summary should provide an overview of the findings and their potential impact. - The detailed technical report should include in-depth analysis of vulnerabilities, attack vectors, and potential exploits. Remediation Recommendations: - The client requires remediation recommendations to be included in the report. - These recommendations should outline steps to mitigate identified vulnerabilities and enhance overall security. Ideal Skills and Experience: - Extensive experience in conducting Grey Box External Penetration Tests. - Proficiency in identifying and exploiting vulner...

    $452 (Avg Bid)
    $452 Oferta promedio
    38 ofertas

    ...ensuring secure wallet connections and potential airdrop functionalities.    - Provide clear instructions and guidance for players to easily connect their wallets and participate in in-game activities. 5. Testing and Iteration:    - Conduct rigorous testing of the game mechanics, cryptocurrency interactions, and frontend functionality to identify and address any technical issues, bugs, or potential exploits.    - Develop a plan for continuous iteration and improvement based on user feedback and data analytics. 6. Community Engagement and Marketing:    - Create a strategy for community engagement to build interest and anticipation for the game's launch and beta phase.    - Plan marketing initiatives to attract potential play...

    $150 (Avg Bid)
    $150 Oferta promedio
    9 ofertas

    I am in search of a talented VFX artist...unique flare to ongoing documentary and cinematic video projects. Requirements: - Expertise in creating a multitude of effects, with the flexibility to explore various types, as specifics are yet to be determined. Skills and Experience: - Proven experience working as a VFX artist, preferably in the film and documentary sector - Creativity and an impressive VFX portfolio, illustrating excellent exploits in past projects Work Scope: - This is not a one-time gig, rather an ongoing requirement to add the awe of visual effects for multiple projects. In essence, an opportunity to make a lasting impact on diverse stories that need visual enchantment. Please highlight your experience in your proposal. Looking forward to examining your uniqu...

    $19 / hr (Avg Bid)
    $19 / hr Oferta promedio
    32 ofertas

    I require a highly skilled network security auditor to do an audit of the network infrastructure (including servers and workstations) and undertake a comprehensive examination of my setup, to ensure optimal security measures are in place. Some crucial areas to be focused on include: - Firewall configuration - Intrusion detection systems - Wireless network sec...should hold one of the following certifications: - CISSP (Certified Information Systems Security Professional) - CISM (Certified Information Security Manager) - CSIR Please apply with specific examples of your past and related work experience. Your detail-oriented project proposals would get higher consideration. The mission here is to ensure my network's robustness against potential threats and exploits. Ready to sta...

    $21 / hr (Avg Bid)
    $21 / hr Oferta promedio
    8 ofertas

    ...Encounters Detail chance meetings and pivotal moments that led to their initial collaborations, hinting at their future endeavors together. Chapter 3: Driven by Passion Discuss their shared love for automobiles, tracing the roots of their automotive enthusiasm from early experiences. Chapter 4: Audacious Adventures Highlight their most daring and uproarious escapades from both Top Gear and personal exploits. Chapter 5: Mishaps and Triumphs Chronicle the spectrum of their experiences, from uproarious victories to hilariously calamitous moments. Chapter 6: Evolution of a TV Phenomenon Trace the development of their on-screen chemistry and personas from the Top Gear era to The Grand Tour, revealing behind-the-scenes antics. Chapter 7: Unfiltered Voices Delve into their unreser...

    $518 (Avg Bid)
    $518 Oferta promedio
    35 ofertas

    The purpose of this activity is to help you enumerate and model the security of your system architecture by looking at it from the point of view of threats. According to the Microsoft Threat Modeling methodology, we treat the word "threat" as a class of exploits. They fall into the following categories (STRIDE): • Spoofing • Tampering • Repudiation • Information Disclosure • Denial of Service • Elevation of Privilege ACTIVITY Today, let's model a cloud-based storage system. Store a file in a folder on your desktop, and it gets immediately uploaded to the server. Users can share folders, allowing other users or the public view the files. The context level diagram of the file sharing system is represented in Figure 1: Context Level Dia...

    $60 (Avg Bid)
    $60 Oferta promedio
    2 ofertas

    this activity is to help you enumerate and model the security of your system architecture by looking at it from the point of view of threats. According to the Microsoft Threat Modeling methodology, we treat the word "threat" as a class of exploits. They fall into the following categories (STRIDE). a cloud-based storage system. Store a file in a folder on your desktop, and it gets immediately uploaded to the server. Users can share folders, allowing other users or the public view the files. The aim of this activity is to Identify Threats based on the STRIDE threat modeling using Microsoft Threat Modeling Tool (TMT).

    $21 (Avg Bid)
    $21 Oferta promedio
    3 ofertas

    I am looking for an intermediate certified ethical hacker trainer and prefer an offline mode of training. I am seeking a training program with minimum duration of 1 to 3 months. The trainer should understand the higher level concepts, such as vulnerability assessment and scanning, threat assessment, and analysis of various types of exploits. He/She should be knowledgeable in various methods of intrusion and analysis of unintended access. The training needs to include hands-on experience in the domains of ethical hacking, security principles, trends and legal aspects. Furthermore, the trainer should have a comprehensive understanding of the safeguards that need to be implemented to secure the system. The successful candidate should also possess teaching skills, preferably have the ab...

    $790 (Avg Bid)
    $790 Oferta promedio
    7 ofertas

    ...down bad actors • Introduce tools and processes to identify and report vulnerabilities in systems, services, containers, and infrastructure, through automated scanning, pen testing, and similar research efforts • Assist the development team to understand threat vectors, model exposure, and implement best practices for application security • Stay current with industry trends, CVE disclosures/exploits, and the state of the art in security technology to advise the broader team Qualifications • 7+ years of experience in the information security space with a focus on Windows Server, SQL Server, and Microsoft Azure • Strong working knowledge of commercial and open-source security tools (IDS/IPS, SIEM, SAST, DAST, SCA, vulnerability scanners) • F...

    $9039 (Avg Bid)
    $9039 Oferta promedio
    7 ofertas
    CROSSPLATFORM UI Finalizado left

    ...industry, underwriting necessitates intricate analyses and risk assessments to determine insurance policy evaluations. However, traditional underwriting processes are often hindered by delays in data processing and decision- making, thereby compromising the efficiency and precision of underwriters. "UNDERWRITEX" seeks to address these challenges through the introduction of an advanced workbench that exploits distributed edge computing. By conducting pivotal tasks closer to the data source, this development mitigates latency issues and enhances real-time decision-making capabilities, ultimately elevating the overall underwriting process. The idea is to integrate advanced machine learning algorithms and data processing techniques to enhance the efficiency of risk assessme...

    $169 (Avg Bid)
    $169 Oferta promedio
    3 ofertas

    ...skills: 1. Vulnerability and malware analysis skills for x86/JavaScript. 2. 0day exploits. 3. Static and dynamic code analysis and debugging tools like Metasploit, Burp Suite, angr, afl, BinaryAnalysisPlatform bap, KLEE, bindiff, BitBlaze, Ghidra-sre, x64dbg, IDA Pro, OllyDbg, AutoSploit, MetaSploit, Mimikatz, Kali Linux, snort, tcpdump, Wireshark, ClamAV, Malware analysis sandboxes like Cuckoo 4. Unpackers, PDF parsing, decompression & JS extraction. 5. Disassemblers, decompilers. 6. Analyzing sample exploits or their descriptions and extending them to provide all relevant details. 7. Analyzing binary patches regarding vulnerabilities and fixes. 8. Coding sample programs with vulnerable code and coding exploits, e.g. based on CERT info. 9. Application security,...

    $1257 (Avg Bid)
    $1257 Oferta promedio
    16 ofertas

    Mostly self-explanatory. Asset(s) of almost any kind (to be discussed further) Preagreed upon list of exploits for which bonuses do not apply Pitch deck must be the primary component, however a follow up “step by step” will result in a large bonus. High level of communication expected, via audio call minimum. Very good $/hour, beats banker rates by far. Easy way to make some cash for a new laptop. Three people are working on our end on creating this task, although the split in who says what is 50:30:20 (myself, my ex-assosciate, a gun student starting his education in similar areas, with banking experience and a future that he earned himself. Nepotism is a common hate amongst our small group and we believe the bb’s are slowly coming down to make space for somet...

    $4268 (Avg Bid)
    $4268 Oferta promedio
    10 ofertas
    Diablo 4 Kill Notifier Finalizado left

    UPDATE #01: This project is about extracting data from a running game (data mining scrapping). Please note that you will need the PC game "Diablo 4" from Activision Blizzard. However, it is not about interfering with the game, so not about cheats or exploits or the like! ### I am seeking a skilled developer to create a "Diablo 4 Kill Notifier" for Windows PCs. The software should monitor Diablo 4 gameplay in real-time and upon detecting a kill, send a notification to a Kafka instance. Ideal Skills and Experience: Proficiency in C# programming language. Solid experience in developing Windows PC applications. Deep understanding of Diablo 4 game mechanics, especially related to kill tracking. Familiarity with messaging systems, particularly Kafka, for real-time ...

    $574 (Avg Bid)
    Destacado
    $574 Oferta promedio
    12 ofertas

    I am looking for a skilled developer who can help ...a skilled developer who can help me fix security vulnerabilities present in my Wordpress sites. Specifically, I have identified vulnerabilities in the plugins and themes used on my sites. Ideal skills and experience for this job include: - Expertise in Wordpress security - Knowledge of common security vulnerabilities in plugins and themes - Experience with identifying and fixing security exploits - Familiarity with popular security plugins and services I am open to suggestions for security solutions, but I am looking for someone who can provide me with a comprehensive approach to improving the security of my sites. If you have the skills and experience necessary to help me secure my Wordpress sites, I would love to hear...

    $94 (Avg Bid)
    $94 Oferta promedio
    72 ofertas
    Pnettration Test Finalizado left

    I am looking for a skilled professio...network within a week. The scope of the test will be focused on the network only. I do not have any specific areas or vulnerabilities that I want to be tested, so I will rely on the expertise of the professional to conduct a thorough examination. Ideal Skills and Experience: - Extensive experience in network security and penetration testing - Knowledge of various network vulnerabilities and exploits - Familiarity with network architecture and protocols - Ability to provide detailed reports and recommendations for remediation - Certification in ethical hacking or related fields is preferred If you are confident in your ability to provide a high-quality and timely service, please submit your proposal with your qualifications and relevant e...

    $458 (Avg Bid)
    $458 Oferta promedio
    34 ofertas

    ...Design and integrate an in-game store where players can purchase new character skins, visual effects, and expressive emojis to personalize their gameplay experience. and integrate an anti-cheat system to detect and prevent cheating or unfair practices, ensuring a fair and enjoyable PvP environment. Implement various detection mechanisms to identify unauthorized modifications, hacks, or exploits that give players an unfair advantage. Regularly update and improve the anti-cheat measures to stay ahead of potential cheaters and maintain a secure gaming environment. the game for performance and compatibility across iOS and Android platforms, utilizing best practices and platform-specific optimizations. Conduct thorough testing and debugging to identify and resolve any issues or

    $257 (Avg Bid)
    $257 Oferta promedio
    16 ofertas

    ...ghostwriter. Responsibilities: Write 3 good Twitter threads per week on Web3 topics Stay up-to-date with the latest trends in crypto Twitter Provide high-quality content as a ghostwriter Requirements: Proven experience as a content writer or similar role professionally or individually Excellent writing skills in English Knowledge of Web3 and Crypto Twitter trends (Defi, NFTs, Gamefi, Airdrops, Exploits/hacks, Smart contract technology) Ability to write engaging and informative content Attention to detail Pricing: The pricing for this role is negotiable. We can work out either per thread, per week or month rates. Duration: To start immediately. This project will last for several months and there is possibility to be a longer term arrangement. Reference: Please provide your tw...

    $15 / hr (Avg Bid)
    $15 / hr Oferta promedio
    10 ofertas

    ...WordPress site with the theme and plugins activated but no content. We need the content that is visible at wp-admin to be extracted from all of the spam data in the database of the current site, we need it to be cleaned of anything malicious, viruses removed, and then we need it installed on the new website. The final step will be to ensure that the new site doesn’t have any malicious code or exploits that can cause this problem again. DEVELOPER REQUIREMENTS I have been working successfully with freelancers and developers on this site for 20 years. I am only looking for top rated accounts. - Realistic expectations - Sticks to deadlines - Completes all tasks - Communicates regularly Ideal skills and experience: - Strong knowledge of WordPress - Experience with large data...

    $1084 (Avg Bid)
    $1084 Oferta promedio
    108 ofertas

    My project is to create an IoT Network Traffic Dataset. I need to collect as much data as possible, focusing in particular on packet information. The Dataset should have the same features as To do this, you should simulate an IoT network using any tool, conduct one or two attacks...information. The Dataset should have the same features as To do this, you should simulate an IoT network using any tool, conduct one or two attacks and ensure all of the traffic is captured. The captured traffic will be used to create the dataset. The IoT network should be very simple and the attacks could be either Fuzzers, Backdoors, DoS, Exploits, Shellcode and Worms. All of this should be documented.

    $70 (Avg Bid)
    $70 Oferta promedio
    5 ofertas

    ...Responsibilities: Write 3 good Twitter threads per week on Web3 topics Stay up-to-date with the latest trends in crypto Twitter Provide high-quality content as a ghostwriter Requirements: Proven experience as a content writer or similar role professionally or individually Excellent writing skills in English Knowledge of Web3 and Crypto Twitter trends (Defi, NFTs, Gamefi, Airdrops, Exploits/hacks, Smart contract technology) Ability to write engaging and informative content Attention to detail Pricing: The pricing for this role is negotiable. We can work out either per thread, per week or month rates. Duration: To start immediately. This project will last for several months and there is possibility to be a longer term arrangement. Reference: Please prov...

    $39 / hr (Avg Bid)
    $39 / hr Oferta promedio
    12 ofertas

    I am looking to migrate a CreLoaded eCommerce store to either OsCommerce or OpenCart, with integration to InforSX. I need someone who can provide a successful migration and set up InforSX integration, as this has not been done before. There is less than 10,000 pieces of data that need to be migrated so the project should be relatively straightforward. I am open to suggestions from experienced professionals on how to best manage the process and complete the job efficiently. I am excited to explore these options and find the best way to complete this project successfully.

    $566 (Avg Bid)
    $566 Oferta promedio
    29 ofertas

    I am seeking an experienced Roblox developer with a strong background in game security to identify and assess potential vulnerabilities in our Roblox game. My goal is to identify risks associated with in-game exploits, vulnerabilities, and various security threats. I am looking forward to collaborating with you. Game Type: The Roblox game is a sea-based PvP fighting game that features intense combat, strategic navigation, and dynamic environments. Players engage in intense battles with a parry-type fighting mechanic. Responsibilities: Thoroughly review and analyze the game's assets, and systems to identify potential security vulnerabilities and weaknesses. Perform penetration testing and simulate potential attack scenarios to uncover vulnerabilities that may be exploited by...

    $424 (Avg Bid)
    Destacado
    $424 Oferta promedio
    6 ofertas
    Android Developer Finalizado left

    I need Android Developer who can help in resolving my android application issue as below : Your app is not compliant with the Elevated Privilege Abuse and Device and Network Abuse policies. We’ve determined your app contains code which attempts to exploit a known vulnerability. We don’t allow code that exploits security vulnerabilities or code that compromises the integrity of the system or gaining elevated privileges. Apps are not allowed to bypass restrictions on starting activities from the background. Let me know if you can help in resolving this.

    $117 (Avg Bid)
    $117 Oferta promedio
    9 ofertas

    We got a WordPress website, that need to have some security fixes on the windows server. It have 2 exploits need to be fixed and they are: 1- Change admin login URL from wp-admin to any URL 2- From the Hardening tab, enable Block unauthorized access to and load-styles.php.

    $153 (Avg Bid)
    $153 Oferta promedio
    49 ofertas

    ... as it may turn out, the first). These total around 310,000 words. For this reason the designer must have either native or fluent English. If you do not like reading English fiction, this is not a job for you. Here is the blurb for the first volume: ‘1926. Professor Josef van der Holt obtains a post at an all-women’s college overseas. Stuffy London suddenly becomes the site for the unseemly exploits of his half-Dutch and half-German daughters Anneliese and Isabel. When tragedy carves out a hollow in their lives, their ailing souls send the sororal twins on jagged paths: while Isabel takes flight in sensual hedonism Anneliese skirts danger in her role as sleuth. Elusive are the sentiments they seek: swift stopovers of fleeting feeling. Seditious loves and passions sc...

    $2476 (Avg Bid)
    $2476 Oferta promedio
    43 ofertas
    Website security check Finalizado left

    I need someone to examine my website and try to find security problems in it. Content Injection, SQL Injection Exploit, CSRF Exploit, XSS Exploit, other exploits.

    $48 (Avg Bid)
    $48 Oferta promedio
    11 ofertas
    PHP DEVELOPER Finalizado left

    We are looking for a PHP Developer responsible for developing PHP...as CodeIgniter Should be knowledge of WordPress(Woo commerce) Understanding the fully synchronous behavior of PHP Understanding of MVC design patterns Basic understanding of front-end technologies, such as JavaScript, jQuery, HTML5, and CSS3 Knowledge of object-oriented PHP programming. Understanding accessibility and security compliance Strong knowledge of the common PHP or web server exploits and their solutions Understanding fundamental design principles behind a scalable application User authentication and authorization between multiple systems, servers, and environments Integration of multiple data sources and databases into one system Familiarity with the limitations of PHP as a platform and its wor...

    $20 / hr (Avg Bid)
    $20 / hr Oferta promedio
    64 ofertas