Son aramalarım
Şuna göre filtrele:
    İş Durumu
    1,829 bluekeep exploit iş bulundu, ücretlendirmeleri EUR

    Español: Somos una empresa que inicia, nos dedicamos a la venta de café en grano y molido, sin embargo el diferenciador está en el concepto de venta, que refiere al lado sexy del café. (primeras citas, salidas con amig@s, mensajes en servilletas con teléfonos para desconocidos, besos en cuellos de camisas, mensajes al amanecer etc.) Buscamos la creación d...

    €41 (Avg Bid)
    58 girdi

    Hello, It seems you might be a good fit for our project. We have a new product, a natural bar soap. We do have a viewpoint of this product eg. which angle to exploit, audience, etc.. We would love to hear from you how do you see it and give it a character. Would love to discuss more over chat. Let me know.

    €17 (Avg Bid)
    €17 Ortalama Teklif
    18 teklifler
    Vote-Exploit Bitti left

    Es geht hierbei darum, dass ich einen Weg brauche auf [URL'yi görüntülemek için giriş yapın] die vpn/proxy-detection zu umgehen. Manche VPNs funktionieren, manche tuen es nicht. Ich bin mit meinen Kenntnissen am Ende und suche daher jemanden der das Problem mit entsprechender Expertise lösen kann. Entweder in Form eines Bots oder einer Browser-Extension für ...

    €141 (Avg Bid)
    €141 Ortalama Teklif
    1 teklifler

    The front end – or the client-side – is considered the most vulnerable part of a website. As such, it is often targeted by cybercriminals looking to steal valuable customer data. Criminals will exploit third-party technologies to sneak in ‘the back door’ of a website. Leveraging live chat bots, social media buttons, CSS injection, keylogging, DDoS attack, trackers or adve...

    €171 (Avg Bid)
    €171 Ortalama Teklif
    13 teklifler

    I need to write 5 cyber flag challenges. The requirements are the following: The challenge might be a file or a website (create a web page with part of the challenge etc.) or whatever you can think of. You can totallly go wild here (and try less challenges include QR codes.) The flag description: The challenge solution should be a band's name and song to be found, in the following format: Af...

    €634 (Avg Bid)
    €634 Ortalama Teklif
    3 teklifler
    €171 Ortalama Teklif
    18 teklifler

    Exploit JPG 150$ fixed price

    €124 (Avg Bid)
    €124 Ortalama Teklif
    1 teklifler

    Those who know how to exploit weaknesses in the SS7 systems used in telecoms Knowledge of how ss7 works and the vulnerabilities of it. For eg intercepting sms Will discuss product in more detail with those who have the knowledge to perform. I am open to discussion on budget if you provide a working product.

    €1693 - €3386
    Özellikli Mühürlü Gizlilik Anlaşması
    €1693 - €3386
    4 teklifler

    Hi all, As the headline states - we are looking for a technical writer to write a `10 most known website security vulnerabilities` article and a listicle . The article should be 500 words mark. The listicle should be short and sweet. Main premise: The article will survey the 2020 10 most common security breaches hackers use to exploit personal and business websites. Submission condition...

    €20 (Avg Bid)
    €20 Ortalama Teklif
    38 teklifler

    Want to exploit CVE-2017-1000253 (Linux PIE/stack corruption) under specified kernel version [URL'yi görüntülemek için giriş yapın] In these link you can find information about vulnerability and also see an example exploit which is written for version [URL'yi görüntülemek için giriş yapın] [URL'yi görüntülemek içi...

    €184 (Avg Bid)
    €184 Ortalama Teklif
    1 teklifler

    Given the following C code file, perform a stack smash on the vuln.c code file using a C program that you create named exploit.c. For full credit, your program should attempt to open up a reverse shell on the attacked program as root by exploiting the buffer (you can verify this by typing the command ‘whoami‘ on the resulting terminal. Don’t start the exploit as root–use yo...

    €68 (Avg Bid)
    €68 Ortalama Teklif
    2 teklifler

    Hello, We are developing Octolis a SaaS solution to unify / manage customer data (=Customer Data Platforms for short). The project has been launched by a data consulting firm, there is a great opportunity in this market (example: recent acquisition of Segment by Twilio). The V1 product is starting to run at a few customers. We are in the process of signing partnerships with reseller software pub...

    €37 / hr (Avg Bid)
    €37 / hr Ortalama Teklif
    51 teklifler

    I have 3 sites on 1 ubuntu VPS. The sites were infected with the file manager exploit plugin. I have cleaned and removed. however each time wordpress updates (it seems), malware files are added back. Would like a full clean and audit of the VPS I can pay for wordfence team to sort all this perfectly so it must be less costs than this.

    €140 (Avg Bid)
    €140 Ortalama Teklif
    42 teklifler

    we will use a deliberately vulnerable Linux image called “Metasploitable 2”. The Metasploitable virtual machine is an intentionally vulnerable version of Ubuntu Linux designed for testing security tools and demonstrating common vulnerabilities. You can use VMWare to run the image. must select one vulnerability and exploit it. To exploit, you are expected to perform the necessary hacki...

    €145 (Avg Bid)
    €145 Ortalama Teklif
    4 teklifler

    hello, I'm trying to use kali Linux to exploit the Metasploitable 2, I want a guy who does this for me, and make a report of the exploit and what exploit he choose, I prefer exploiting Java on port 8080, or any other vulnerability if you are familiar with. the attached document will explain more, and I will attach a sample report for another exploit. thank you.

    €188 (Avg Bid)
    €188 Ortalama Teklif
    4 teklifler

    Looking for a AgileCRM guru! We have recently started using AgileCRM and we need help setting up certain functions and getting it to integrate with us. We are using it for our shopify store and we are using another account for our B2B sales function. The first job (and there may be others) is we would like to set up a B2B contract in AgileCRM so that it can easily pull company contact information ...

    €300 (Avg Bid)
    €300 Ortalama Teklif
    1 teklifler

    Witaj Pawel W. Nazywam się Dawid Wilk i jestem Project Managerem w młodej, prosperującej firmie EXPLOIT. Jesteśmy polską firmą założoną na Islandii. Zajmujemy się tworzeniem stron intenetowych (zazwyczaj sklepy) w WordPress. My zajmujemy się szablonami i grafiką. Potrzebowalibyśmy kogoś kto zajmie się stronką od strony funkcjonalnej. Ze względu na ograniczenia w tej wiadomości więcej będę mó...

    €207 (Avg Bid)
    €207 Ortalama Teklif
    1 teklifler
    T-shirt design Bitti left

    I need help finalising my t-shirt design. It is currently in concept form as a line drawing and I would like someone to to bring it to life make it vibrant with colour. The concept represent a Slow Fashion Revolution. Where we reject the fast fashion industry with it's pollution and exploitation and embrace slow fashion that promotes quality over quantity, sustainable and ethical practices. ...

    €54 (Avg Bid)
    €54 Ortalama Teklif
    65 teklifler

    1. Perform a black-box security testing on the above system. To this end, your test method should cover at least the following aspects: Network scan - useful for finding the IP address of the victim's computer when performing remote security testing. Enumeration – attempt to enumerate the list of services found in the scan above. This may include FTP, SMB, web application service enumer...

    €190 (Avg Bid)
    €190 Ortalama Teklif
    16 teklifler

    Objective: Understand the stack smashing buffer exploit thoroughly. 1. From the paper “Smashing the stack for fun and profit” by Alephone do the following a. Download the article by Aleph One (see References). You will be extracting the source code of exploit3.c and exploit4.c files from it. b. Improve the code of exploit3.c and exploit4.c so that there are no warning messages from g...

    €25 - €207
    €25 - €207
    0 teklifler

    Im looking for someone to find me a exploit on a online flash game

    €75 (Avg Bid)
    €75 Ortalama Teklif
    1 teklifler

    I would need someone who could do my project where there is some assembler, debian, linux, The purpose of this project is about basic tools and vital rigor to have when automatising tasks on a system, assembler,assembly , linux, debian, shell,Security,network,language C , C++... To be able to exploit programs, you have to understand how a program works.

    €30 (Avg Bid)
    €30 Ortalama Teklif
    1 teklifler

    Hey, i search a guy who can find some bug or exploit for a game like habbo.

    €24 (Avg Bid)
    €24 Ortalama Teklif
    2 teklifler

    I Looking For A Developer Who Will Develop A Tech Website On WordPress Like : [URL'yi görüntülemek için giriş yapın] . I will pay money only if you made a website like this : [URL'yi görüntülemek için giriş yapın] . So explore the site very carefully.

    €239 (Avg Bid)
    €239 Ortalama Teklif
    11 teklifler

    READ EACH STEP CAREFULLY (It seems a lot of work, but it's simple, and don't require a lot of time), in detail, before providing your willingness to work on the project! I had to include my request in a separate text file, because it was too long for the field provided by the " [URL'yi görüntülemek için giriş yapın]" platform. I also included the scr...

    €583 (Avg Bid)
    €583 Ortalama Teklif
    8 teklifler

    READ EACH STEP CAREFULLY (It seems a lot of work, but it's simple, and don't require a lot of time), in detail, before providing your willingness to work on the project! I had to include my request in a separate text file, because it was too long for the field provided by the " [URL'yi görüntülemek için giriş yapın]" platform. I also included the scr...

    €427 (Avg Bid)
    €427 Ortalama Teklif
    3 teklifler
    Silent Exploit Bitti left

    Hello, I need someone who can build a silent word exploit, pdf and jpeg A silent exploit means a script which generates a word document, pdf and jpeg which silently executes a command in the background once executed. That command in this case is downloading and executing a program (we will use putty for example). Which means, once somebody opens the document in word, pdf, jpeg it automaticly do...

    €340 (Avg Bid)
    €340 Ortalama Teklif
    5 teklifler

    We have 15 years of experience of online systems including Inventory Management, but are looking for fresh input to guide the development of our next generation of mobile solution solutions. We are continually redeveloping our solutions to meet the evolving needs of the market and to exploit the capabilities of new technology. Specifically we want fresh ideas on the visual look and feel of an app...

    €1442 (Avg Bid)
    €1442 Ortalama Teklif
    32 teklifler

    I want to build a cloud based VA assessment tool with full customer login, management dashboard, production of automatic reports with vulnerability findings, payment plans, billing history, account details, renewal/expiration. The vulnerability assessment engine will be able to web crawl automatically all dirs,subdirs,vhosts etc., not just through the source code, but by bruteforcing it. Then i w...

    €750 (Avg Bid)
    €750 Ortalama Teklif
    14 teklifler

    We are looking for a great Go developer who possesses a strong understanding of how best to leverage and exploit the language’s unique paradigms, idioms, and syntax. Your primary focus will be on developing Go packages and programs that are scalable and maintainable. Skills [URL'yi görüntülemek için giriş yapın] knowledge of Go programming language, paradigms, c...

    €7 / hr (Avg Bid)
    €7 / hr Ortalama Teklif
    2 teklifler

    Your team currently works as a research wing for a standard SOC (Security Operations Center). The SOC keeps analytics on the current trends within the network. Your team will be assigned a current issue that has been seen at the border of the network, trying to infiltrate the organizations network/systems. Upon being assigned your item, it will be your job to go out and search OSINT (Open Source I...

    €79 (Avg Bid)
    €79 Ortalama Teklif
    19 teklifler

    Hi there I require a small amount of malware removing from my website. See error log below: /var/log/cxs/wrightsboutique:Oct 5 12:11:35 huya cxs[94041]: ['/home/wrightsboutique/public_html/wp-content/plugins/hello-doly/ [URL'yi görüntülemek için giriş yapın]'] - Known exploit = [Fingerprint Match] [PHP cPanel Exploit [P1657]] /var/log/cxs/wrightsboutique:Oct ...

    €31 (Avg Bid)
    €31 Ortalama Teklif
    40 teklifler

    If you cant articulate your bid in simple English, pls do not bid. If you cant provide the answers, pls do not bid. *Looking for someone with critical reading experience to form questions and answers to passages provided.* The questions can be formed along SAT Reading Comprehension style, or in the following way: 4-context based qn, 4-inference qn, 1-author tone, 1 figure of speech (if the passag...

    €64 (Avg Bid)
    €64 Ortalama Teklif
    47 teklifler

    Recently, we successfully fabricated a series of poly(dimethyl acrylamide-co-stearyl acrylate and/or lauryl acrylate) (PDMAAm-co-SA and/or LA) based mechanically tunable thermally induced shape memory type hydrogels (SMGs) via stereolithographic 3D printing process (Shiblee et al., Soft Matter, 2018). By utilizing anisotropic swelling and mechanical properties of the SMGs, we also developed 3D pri...

    €58 (Avg Bid)
    €58 Ortalama Teklif
    12 teklifler

    In this project we would like you to find a way to extract the original firmware from an Android phone and flash it to the different device but same model. Here's the phone info: - Model Name: SHARP AQUOS sense2 (originally sold in Japan) - Model Code: SHV43, SH-01L (both are the same device but sold from different carriers and they have different firmware.) We will provide you one sample un...

    €869 (Avg Bid)
    €869 Ortalama Teklif
    3 teklifler

    I would like to find a freelancer that can build me a pdf and doc and xls exploit In one and please must be completely silent and fud after exploiting my file and would like it to be delivered in 1 week interval thanks. And my budget is around $100-$200 .

    €47 (Avg Bid)
    €47 Ortalama Teklif
    4 teklifler

    The report should contain: 1. a short description of the vulnerability, 2. a Python script showing the exploit using pwntools, 3. a description of how the exploit works, and 4. the string found in flag.txt.

    €21 (Avg Bid)
    €21 Ortalama Teklif
    2 teklifler

    ABOUT US: We are a small e-commerce company based in the UK, selling health and wellbeing related products in Europe. We are looking for 2 virtual assistants who will work with us long term, and who can take on varied tasks on a daily basis, depending on the needs of the business. This is a General VA role, with administrative tasks, some product research, and other tasks as needed. Starting wi...

    €4 / hr (Avg Bid)
    €4 / hr Ortalama Teklif
    31 teklifler

    I am currently studying Cyber Security, Kali Linux , Ubuntu (Linux) and Metaspoiltable I'm in the US..need English speaking tutor, and has a good knowledge of the aforementioned programs to spend at least a few hours a week depending on how things go. Some of the things I would like to learn: 1. Run OWasp Zap against DVWA and identify vulnerabilities. Manually exploit a vulnerability. 2. L...

    €32 / hr (Avg Bid)
    €32 / hr Ortalama Teklif
    8 teklifler

    This is related to the esx license plate script but I require an exploit to be fixed along with a check to be put in place to prevent certain characters being typed. You must understand Fivem, ESX, HTML, and Lua, with somewhat proof. This is an esx script in questions as well, more info can be provided in message , apologies for being vague.

    €18 (Avg Bid)
    €18 Ortalama Teklif
    2 teklifler

    Necessary : Arduino pro mini 328-micro servo motor-rechargable battery-bluetooth module-female hader-soldering iron Statically and Dynamically Stable Gaits When the robot walks, it has to keep its balance. There are two general strategies for doing that, and according to them, we divide the gaits into statically stable and dynamically stable. For statically stable gaits it doesn’t matter how...

    €51 (Avg Bid)
    €51 Ortalama Teklif
    6 teklifler
    cybersecurity Bitti left

    We are looking for developers who have a strong interest in working in cybersecurity security. You need to come from a pentesting and ethical hacking background. and demonstrate experience in using standard exploits and developing custom exploits using Azure You need to demonstrate the ability to develop scripts for enabling the automation of exploits and converting the output to different format...

    €262 (Avg Bid)
    €262 Ortalama Teklif
    8 teklifler

    My site is a adult social network using wordpress and buddypress and alot of other plugins. Someone has created a backdoor and is infecting the site with lots of malware, they have also created a cronjob which makes the malware re appear ever minute. So deleting the malware does not fix it. Need someone who is very skilled in wordpress and malware. So can clean the site of all files currently in...

    €86 (Avg Bid)
    €86 Ortalama Teklif
    33 teklifler

    Firstly I want to apologise for being new to the posting process, but what I also realise that the only way I am going to get the desired results is finding someone on my design page - and that can only be done by the mentioning things i like such as William Klein in terms of style. For the money I do not expect superstars, but I also have to go for the best, and that means someone proving they a...

    €128 (Avg Bid)
    €128 Ortalama Teklif
    6 teklifler

    Create a buffer flow exploit for program (using string input),please provide details in the chat.

    €28 (Avg Bid)
    €28 Ortalama Teklif
    4 teklifler

    I have a good space in my roof and i want to exploit this space and transfer it to green harden and good space to have arest

    €31 (Avg Bid)
    €31 Ortalama Teklif
    33 teklifler

    In the bosom of one of those spacious coves which indent the eastern shore of the Hudson, at that broad expansion of the river denominated by the ancient Dutch navigators the Tap pan Zeke, and where they always prudently shortened sail and implored the protection of St. Nicholas when they crossed, there lies a small market town or rural port, which by some is called Greens burgh, but which is more...

    €9 / hr (Avg Bid)
    €9 / hr Ortalama Teklif
    11 teklifler

    Need a expert on using Google Analytics to advise us on designs and solutions, to give a second opinion. We are extracting data from GA into a Business Intelligence / Business Analytics data warehouse for integration into our existing BI system. I am not looking for a coder. I am looking for expert advise and a second opinion on our designs and proposed solutions. * Expert should be able to advi...

    €44 / hr (Avg Bid)
    €44 / hr Ortalama Teklif
    11 teklifler

    hi my site is causing some.errors. this is the error report from my server support. I need an experienced dev to fix this up for me. The following files are being detected as a PHP WordPress Exploit [P1412]] file:/home/cbhspass/public_html/wp-content/themes/twentynineteen/ [URL'yi görüntülemek için giriş yapın] file:/home/cbhspass/public_html/wp-content/themes/twent...

    €71 (Avg Bid)
    €71 Ortalama Teklif
    13 teklifler

    I have a site on codeignter . The upload code of the framework is weak and the hackers are able to exploit the code to upload text and image. I need to secure the code so that no one other than the admin can make changes on the code

    €22 (Avg Bid)
    €22 Ortalama Teklif
    18 teklifler