Creloaded exploits jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 creloaded exploits jobs found, pricing in CAD

    ...produce a detailed analysis report on selected CVE vulnerabilities associated with WordPress. This report is specifically for an academic project. Here are the particular CVEs for review: 1. CVE-2023-32243 2. CVE-2023-0084 I can provide the older versions of those plugins with bugs you just need to execute and create output on docker environment and add screenshots of execution showing how it exploits security and then the share the proposed mitigations in the report. You must have to cover the below mentioned points in the reports: briefly describe the architecture of the web application/framework describe the type(s) of vulnerability that is considered describe the vulnerabilities in detail describe how to exploit the vulnerabilities describe how the vulnerabilities were ...

    $61 (Avg Bid)
    $61 Avg Bid
    20 bids

    ...estimation, and desktop UI development (e.g., with Tkinter, PyQt, or other GUI libraries). * **DEX APIs:** In-depth knowledge of integrating with decentralized exchange APIs. * **Aave Expertise:** Solid understanding of Aave flash loan mechanics and API interactions. **Additional Considerations:** * **Security:** The code must prioritize security and implement safeguards against potential exploits. * **Scalability:** The bot should be designed to handle increasing trade volume and multiple simultaneous arbitrage opportunities. * **Code Optimization:** Focus on efficient code in both Solidity and Python for low latency and maximum transaction speed. **Submission Guidelines:** Please provide the following when submitting your proposal: * **Portfolio:** Showcase relevant blo...

    $830 (Avg Bid)
    $830 Avg Bid
    94 bids

    I'm searching for an experienced full-stack web developer with a proficient command in PHP (php mysql). The candidate will be tasked with the impleme...providing support to do it - Integrating UI elements with server-side logic Ideal Experience and Skills: - Profound knowledge of PHP - Strong experience in web development - Understanding and implementation of security and data protection - Good problem solving skills - Validating user actions on the client side and providing responsive feedback - Strong knowledge of the common PHP or web server exploits and their solutions Please note: I already have the completed design which will be provided. You will strictly be working on the development. Applicants are needed immediately, and development is expected to commence as so...

    $221 (Avg Bid)
    $221 Avg Bid
    77 bids

    ...Experience Required: - Extensive experience in malware analysis, specifically for Windows and Linux platforms - Working on Jupyter, a malware variant associated with the SolarMaker family. - Proven track record in both static and dynamic malware analysis - Ability to work under tight schedules - Excellent problem-solving and analytical skills - Sound understanding of malware techniques and exploits - Familiarity with tools such as IDA Pro, Ghidra, and Wireshark - Detailed malware analysis - Code Analysis of the malware Responsibilities: - Conduct comprehensive static and dynamic malware analysis - Provide actionable insights and detection strategies - Clearly document findings for technical and non-technical audience If you believe you're equipped for this critical ta...

    $632 (Avg Bid)
    $632 Avg Bid
    17 bids

    ...trading unlocks). * Liquidity detection: The bot is able to detect when the liquidity pool is created and be able to snipe trades immediately within seconds on the same block if possible. This will be the main function. * Should scan contracts and filter out parameters in regards to rugs/scams like honeypots, if contract is freezable, liquidity not locked, has airdrops, mintable, liquidity exploits, dev exploits, etc. and filter those out and automatically trigger good contracts and as soon as liquidity is added on those good contracts triggered then it should buy/snipe tokens immediately dealing directly with blockchain to ensure we are one of the first to snipe once liquidity is added. Need to be able to buy in whatever denomination i set that is editable by me at an...

    $814 (Avg Bid)
    $814 Avg Bid
    22 bids

    ...and have them fixed. Here's what I'm looking for in the hired professional: • Extensive experience with WordPress: The expert should understand the exploitation of WordPress sites and how to fortify them. • Complete Malware removal: Identifying and removing malicious coding throughout the website, ensuring a clean slate. • Server-Level expertise: An understanding of database and server-level exploits is preferable, with the potential malware affecting more than just the website's frontend. • Backup Restoration: Since a backup of the website is available, experience with backup restorations is necessary. • Proactive Fortification: We need to ensure this issue doesn't recur. Your skills should extend to securing the website from fu...

    $55 (Avg Bid)
    $55 Avg Bid
    26 bids

    ...Experience Required: - Extensive experience in malware analysis, specifically for Windows and Linux platforms - Working on Jupyter, a malware variant associated with the SolarMaker family. - Proven track record in both static and dynamic malware analysis - Ability to work under tight schedules - Excellent problem-solving and analytical skills - Sound understanding of malware techniques and exploits - Familiarity with tools such as IDA Pro, Ghidra, and Wireshark - Detailed malware analysis - Code Analysis of the malware Responsibilities: - Conduct comprehensive static and dynamic malware analysis - Provide actionable insights and detection strategies - Clearly document findings for technical and non-technical audience If you believe you're equipped for this critical ta...

    $475 (Avg Bid)
    $475 Avg Bid
    7 bids

    ...Compatibility must be ensured with the Solana trading platform. * Liquidity detection: The bot is able to detect when the liquidity pool is created and be able to snipe trades immediately within seconds * Anti-Rug features * Should scan contracts and filter out parameters in regards to rugs/scams like honeypots, if contract is freezable, liquidity not locked, has airdrops, mintable, liquidity exploits, etc. and filter those out and automatically trigger good contracts and as soon as liquidity is added on those good contracts triggered then it should buy/snipe tokens immediately dealing directly with blockchain to ensure we are one of the first to snipe once liquidity is added. Need to be able to buy in whatever denomination i set that is editable by me at any point * filter...

    $344 - $1031
    Sealed
    $344 - $1031
    14 bids

    I'm looking for bright, young freelancers to spearhead the development of an e-commerce website focusing on home decor. This project will require the following expertise: - Pentesting: To ensure the website is secure and free from potential exploits - E-commerce Web Development: To create a user-friendly platform that facilitates the effective buying and selling of home decor products Beyond technical skills, this job also calls for creativity and a flair for graphic design to make the website visually appealing. If you also have a knack for content writing, that would be a plus as this will help in crafting compelling product descriptions and other website content. Ideal candidates should be teens as this project is targeted at giving opportunities to young, budding freela...

    $41 / hr (Avg Bid)
    $41 / hr Avg Bid
    16 bids

    I'm looking for bright, young freelancers to spearhead the development of an e-commerce website focusing on home decor. This project will require the following expertise: - Pentesting: To ensure the website is secure and free from potential exploits - E-commerce Web Development: To create a user-friendly platform that facilitates the effective buying and selling of home decor products Beyond technical skills, this job also calls for creativity and a flair for graphic design to make the website visually appealing. If you also have a knack for content writing, that would be a plus as this will help in crafting compelling product descriptions and other website content. Ideal candidates should be teens as this project is targeted at giving opportunities to young, budding freela...

    $41477 (Avg Bid)
    $41477 Avg Bid
    7 bids

    I'm in search of a skilled Developer to dive into the underbelly of a now-classic game's code. Our journey back in time isn't driven by nostalgia, but by a critical mission: enhancing security. **Core Requirements:** - Analyze the game's existing C++ code to identify any security vulnerabilities or exploits. - Develop a method to reliably trigger these exploits. This is crucial for testing and ensuring we've accurately identified the weaknesses. - Implement fixes to eliminate these vulnerabilities, fortifying the code against potential breaches. **Who Should Apply:** - If you have extensive experience with C++, particularly in the realm of security and exploit mitigation, your expertise could be invaluable. - Experience in deciphering and working w...

    $153 (Avg Bid)
    $153 Avg Bid
    8 bids

    ...**Key Project Requirements:** - Experience with Minecraft modding, particularly in editing and altering existing mods. - Ability to add a new item to the mod pack that fits seamlessly with existing content. - Proficiency in Java and familiarity with Minecraft mod development tools. - A keen eye for detail to ensure that the modifications maintain the game's balance and do not introduce bugs or exploits. **Ideal Skills and Experience:** - Strong background in Minecraft mod creation and customization. - Proven track record of successful mod projects, specifically involving gameplay enhancements. - Creative problem solving to integrate new ideas effectively. - Excellent communication skills to understand the specific requirements and provide regular updates. This project aims...

    $142 (Avg Bid)
    $142 Avg Bid
    6 bids

    I am seeking a seasoned scriptwriter with an affinity for creating compelling content with dark and gritty undertones. This endeavour involves writing a script for an adult simulation game, heavily focusing on amorous exploits in a realistic yet dark environment. Skills and experience desirable for the project include: * Proven experience in script writing, particularly for video games * A knack for crafting engaging, mature and dark narratives * Familiarity with simulation games and their story-telling mechanics The game's central theme revolves around adult relationships in a challenging, no-holds-barred environment. The narrative and dialogue should reflect this harsh reality, evoking intense emotions and high-stakes scenarios. Your creativity and originality should shi...

    $14 (Avg Bid)
    $14 Avg Bid
    9 bids

    I require an experienced penetration tester to identify vulnerabilities in my small network and web application. The project involves: - Network penetration testing - Web application testing My expectations from the test are purely to pinpoint any...size is small, encompassing 1-10 devices/pages, meticulousness is paramount. Ideal freelancers for this project should possess: - A strong background in network and web application penetration testing - Proven experience in identifying and addressing security vulnerabilities - Attention to detail, no matter how minute the network environment In-depth understanding of common vulnerabilities and exploits will be preferred. I look forward to a comprehensive report highlighting any detected vulnerabilities along with suggestions for imp...

    $210 (Avg Bid)
    $210 Avg Bid
    34 bids

    ...experienced FiveM server developer to take my fully set-up, but erring server to peak performance. With a focus on advanced roleplay features, customizability and improved gameplay mechanics, this project requires some serious skills. Key tasks include: - Debugging: Ensure everything is configured to match our desired economy. - Error & Exploit Fixing: Identify and rectify all bugs and potential exploits. This will need a keen eye for security vulnerabilities. Ideal candidates will have a strong record of server development, a deep understanding of FiveM and an ability to provide top-notch roleplay functionality. Let's get this server firing on all cylinders! - We need all jobs, pricing & realistic interactions and few more things doing to our city. we are also...

    $255 (Avg Bid)
    $255 Avg Bid
    4 bids

    ...web frameworks {{such as Laravel, Yii, etc depending on your technology stack}} Understanding the fully synchronous behavior of PHP Understanding of MVC design patterns Basic understanding of front-end technologies, such as JavaScript, HTML5, and CSS3 Knowledge of object-oriented PHP programming Understanding accessibility and security compliance. Strong knowledge of the common PHP or web server exploits and their solutions Understanding fundamental design principles behind a scalable application User authentication and authorization between multiple systems, servers, and environments Integration of multiple data sources and databases into one system Familiarity with limitations of PHP as a platform and its workarounds Creating database schemas that represent and support business...

    $17 / hr (Avg Bid)
    $17 / hr Avg Bid
    14 bids

    I'm seeking a proficient developer to clonemodules of an open source software, specifically focusing on file inclusion exploits. This project also includes enhancing the user interface, particularly the color scheme and styling. Key responsibilities would include: - Cloning the exploit modules from the open source software, with a focus on file inclusion exploits - Upgrading the color scheme and styling of the UI to render a more aesthetically appealing interface Ideal freelancers should possess: - Proficiency in scripting and coding - Strong background in exploit development - Experience in UI design, specifically color scheme and styling - Understanding of open source software licenses and regulations. This task requires delicate balance of technical proficiency a...

    $379 (Avg Bid)
    $379 Avg Bid
    15 bids

    ...as follows: Scope: - The penetration test should focus on the client's Web Application. Report Detail: - The client requires both a high-level summary and a detailed technical report. - The high-level summary should provide an overview of the findings and their potential impact. - The detailed technical report should include in-depth analysis of vulnerabilities, attack vectors, and potential exploits. Remediation Recommendations: - The client requires remediation recommendations to be included in the report. - These recommendations should outline steps to mitigate identified vulnerabilities and enhance overall security. Ideal Skills and Experience: - Extensive experience in conducting Grey Box External Penetration Tests. - Proficiency in identifying and exploiting vulner...

    $621 (Avg Bid)
    $621 Avg Bid
    38 bids

    ...ensuring secure wallet connections and potential airdrop functionalities.    - Provide clear instructions and guidance for players to easily connect their wallets and participate in in-game activities. 5. Testing and Iteration:    - Conduct rigorous testing of the game mechanics, cryptocurrency interactions, and frontend functionality to identify and address any technical issues, bugs, or potential exploits.    - Develop a plan for continuous iteration and improvement based on user feedback and data analytics. 6. Community Engagement and Marketing:    - Create a strategy for community engagement to build interest and anticipation for the game's launch and beta phase.    - Plan marketing initiatives to attract potential play...

    $206 (Avg Bid)
    $206 Avg Bid
    9 bids

    I am in search of a talented VFX artist...unique flare to ongoing documentary and cinematic video projects. Requirements: - Expertise in creating a multitude of effects, with the flexibility to explore various types, as specifics are yet to be determined. Skills and Experience: - Proven experience working as a VFX artist, preferably in the film and documentary sector - Creativity and an impressive VFX portfolio, illustrating excellent exploits in past projects Work Scope: - This is not a one-time gig, rather an ongoing requirement to add the awe of visual effects for multiple projects. In essence, an opportunity to make a lasting impact on diverse stories that need visual enchantment. Please highlight your experience in your proposal. Looking forward to examining your uniqu...

    $26 / hr (Avg Bid)
    $26 / hr Avg Bid
    32 bids

    I require a highly skilled network security auditor to do an audit of the network infrastructure (including servers and workstations) and undertake a comprehensive examination of my setup, to ensure optimal security measures are in place. Some crucial areas to be focused on include: - Firewall configuration - Intrusion detection systems - Wireless network sec...should hold one of the following certifications: - CISSP (Certified Information Systems Security Professional) - CISM (Certified Information Security Manager) - CSIR Please apply with specific examples of your past and related work experience. Your detail-oriented project proposals would get higher consideration. The mission here is to ensure my network's robustness against potential threats and exploits. Ready to sta...

    $29 / hr (Avg Bid)
    $29 / hr Avg Bid
    8 bids

    ...Encounters Detail chance meetings and pivotal moments that led to their initial collaborations, hinting at their future endeavors together. Chapter 3: Driven by Passion Discuss their shared love for automobiles, tracing the roots of their automotive enthusiasm from early experiences. Chapter 4: Audacious Adventures Highlight their most daring and uproarious escapades from both Top Gear and personal exploits. Chapter 5: Mishaps and Triumphs Chronicle the spectrum of their experiences, from uproarious victories to hilariously calamitous moments. Chapter 6: Evolution of a TV Phenomenon Trace the development of their on-screen chemistry and personas from the Top Gear era to The Grand Tour, revealing behind-the-scenes antics. Chapter 7: Unfiltered Voices Delve into their unreser...

    $711 (Avg Bid)
    $711 Avg Bid
    35 bids

    The purpose of this activity is to help you enumerate and model the security of your system architecture by looking at it from the point of view of threats. According to the Microsoft Threat Modeling methodology, we treat the word "threat" as a class of exploits. They fall into the following categories (STRIDE): • Spoofing • Tampering • Repudiation • Information Disclosure • Denial of Service • Elevation of Privilege ACTIVITY Today, let's model a cloud-based storage system. Store a file in a folder on your desktop, and it gets immediately uploaded to the server. Users can share folders, allowing other users or the public view the files. The context level diagram of the file sharing system is represented in Figure 1: Context Level Dia...

    $82 (Avg Bid)
    $82 Avg Bid
    2 bids

    this activity is to help you enumerate and model the security of your system architecture by looking at it from the point of view of threats. According to the Microsoft Threat Modeling methodology, we treat the word "threat" as a class of exploits. They fall into the following categories (STRIDE). a cloud-based storage system. Store a file in a folder on your desktop, and it gets immediately uploaded to the server. Users can share folders, allowing other users or the public view the files. The aim of this activity is to Identify Threats based on the STRIDE threat modeling using Microsoft Threat Modeling Tool (TMT).

    $29 (Avg Bid)
    $29 Avg Bid
    3 bids

    I am looking for an intermediate certified ethical hacker trainer and prefer an offline mode of training. I am seeking a training program with minimum duration of 1 to 3 months. The trainer should understand the higher level concepts, such as vulnerability assessment and scanning, threat assessment, and analysis of various types of exploits. He/She should be knowledgeable in various methods of intrusion and analysis of unintended access. The training needs to include hands-on experience in the domains of ethical hacking, security principles, trends and legal aspects. Furthermore, the trainer should have a comprehensive understanding of the safeguards that need to be implemented to secure the system. The successful candidate should also possess teaching skills, preferably have the ab...

    $1086 (Avg Bid)
    $1086 Avg Bid
    7 bids

    ...down bad actors • Introduce tools and processes to identify and report vulnerabilities in systems, services, containers, and infrastructure, through automated scanning, pen testing, and similar research efforts • Assist the development team to understand threat vectors, model exposure, and implement best practices for application security • Stay current with industry trends, CVE disclosures/exploits, and the state of the art in security technology to advise the broader team Qualifications • 7+ years of experience in the information security space with a focus on Windows Server, SQL Server, and Microsoft Azure • Strong working knowledge of commercial and open-source security tools (IDS/IPS, SIEM, SAST, DAST, SCA, vulnerability scanners) • F...

    $12421 (Avg Bid)
    $12421 Avg Bid
    7 bids

    ...industry, underwriting necessitates intricate analyses and risk assessments to determine insurance policy evaluations. However, traditional underwriting processes are often hindered by delays in data processing and decision- making, thereby compromising the efficiency and precision of underwriters. "UNDERWRITEX" seeks to address these challenges through the introduction of an advanced workbench that exploits distributed edge computing. By conducting pivotal tasks closer to the data source, this development mitigates latency issues and enhances real-time decision-making capabilities, ultimately elevating the overall underwriting process. The idea is to integrate advanced machine learning algorithms and data processing techniques to enhance the efficiency of risk assessme...

    $232 (Avg Bid)
    $232 Avg Bid
    3 bids

    ...skills: 1. Vulnerability and malware analysis skills for x86/JavaScript. 2. 0day exploits. 3. Static and dynamic code analysis and debugging tools like Metasploit, Burp Suite, angr, afl, BinaryAnalysisPlatform bap, KLEE, bindiff, BitBlaze, Ghidra-sre, x64dbg, IDA Pro, OllyDbg, AutoSploit, MetaSploit, Mimikatz, Kali Linux, snort, tcpdump, Wireshark, ClamAV, Malware analysis sandboxes like Cuckoo 4. Unpackers, PDF parsing, decompression & JS extraction. 5. Disassemblers, decompilers. 6. Analyzing sample exploits or their descriptions and extending them to provide all relevant details. 7. Analyzing binary patches regarding vulnerabilities and fixes. 8. Coding sample programs with vulnerable code and coding exploits, e.g. based on CERT info. 9. Application security,...

    $1727 (Avg Bid)
    $1727 Avg Bid
    16 bids

    Mostly self-explanatory. Asset(s) of almost any kind (to be discussed further) Preagreed upon list of exploits for which bonuses do not apply Pitch deck must be the primary component, however a follow up “step by step” will result in a large bonus. High level of communication expected, via audio call minimum. Very good $/hour, beats banker rates by far. Easy way to make some cash for a new laptop. Three people are working on our end on creating this task, although the split in who says what is 50:30:20 (myself, my ex-assosciate, a gun student starting his education in similar areas, with banking experience and a future that he earned himself. Nepotism is a common hate amongst our small group and we believe the bb’s are slowly coming down to make space for somet...

    $5865 (Avg Bid)
    $5865 Avg Bid
    10 bids

    UPDATE #01: This project is about extracting data from a running game (data mining scrapping). Please note that you will need the PC game "Diablo 4" from Activision Blizzard. However, it is not about interfering with the game, so not about cheats or exploits or the like! ### I am seeking a skilled developer to create a "Diablo 4 Kill Notifier" for Windows PCs. The software should monitor Diablo 4 gameplay in real-time and upon detecting a kill, send a notification to a Kafka instance. Ideal Skills and Experience: Proficiency in C# programming language. Solid experience in developing Windows PC applications. Deep understanding of Diablo 4 game mechanics, especially related to kill tracking. Familiarity with messaging systems, particularly Kafka, for real-time ...

    $789 (Avg Bid)
    Featured
    $789 Avg Bid
    12 bids

    I am looking for a skilled developer who can help ...a skilled developer who can help me fix security vulnerabilities present in my Wordpress sites. Specifically, I have identified vulnerabilities in the plugins and themes used on my sites. Ideal skills and experience for this job include: - Expertise in Wordpress security - Knowledge of common security vulnerabilities in plugins and themes - Experience with identifying and fixing security exploits - Familiarity with popular security plugins and services I am open to suggestions for security solutions, but I am looking for someone who can provide me with a comprehensive approach to improving the security of my sites. If you have the skills and experience necessary to help me secure my Wordpress sites, I would love to hear...

    $130 (Avg Bid)
    $130 Avg Bid
    72 bids

    I am looking for a skilled professio...network within a week. The scope of the test will be focused on the network only. I do not have any specific areas or vulnerabilities that I want to be tested, so I will rely on the expertise of the professional to conduct a thorough examination. Ideal Skills and Experience: - Extensive experience in network security and penetration testing - Knowledge of various network vulnerabilities and exploits - Familiarity with network architecture and protocols - Ability to provide detailed reports and recommendations for remediation - Certification in ethical hacking or related fields is preferred If you are confident in your ability to provide a high-quality and timely service, please submit your proposal with your qualifications and relevant e...

    $629 (Avg Bid)
    $629 Avg Bid
    34 bids

    ...Design and integrate an in-game store where players can purchase new character skins, visual effects, and expressive emojis to personalize their gameplay experience. and integrate an anti-cheat system to detect and prevent cheating or unfair practices, ensuring a fair and enjoyable PvP environment. Implement various detection mechanisms to identify unauthorized modifications, hacks, or exploits that give players an unfair advantage. Regularly update and improve the anti-cheat measures to stay ahead of potential cheaters and maintain a secure gaming environment. the game for performance and compatibility across iOS and Android platforms, utilizing best practices and platform-specific optimizations. Conduct thorough testing and debugging to identify and resolve any issues or

    $353 (Avg Bid)
    $353 Avg Bid
    16 bids

    ...ghostwriter. Responsibilities: Write 3 good Twitter threads per week on Web3 topics Stay up-to-date with the latest trends in crypto Twitter Provide high-quality content as a ghostwriter Requirements: Proven experience as a content writer or similar role professionally or individually Excellent writing skills in English Knowledge of Web3 and Crypto Twitter trends (Defi, NFTs, Gamefi, Airdrops, Exploits/hacks, Smart contract technology) Ability to write engaging and informative content Attention to detail Pricing: The pricing for this role is negotiable. We can work out either per thread, per week or month rates. Duration: To start immediately. This project will last for several months and there is possibility to be a longer term arrangement. Reference: Please provide your tw...

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    10 bids

    ...WordPress site with the theme and plugins activated but no content. We need the content that is visible at wp-admin to be extracted from all of the spam data in the database of the current site, we need it to be cleaned of anything malicious, viruses removed, and then we need it installed on the new website. The final step will be to ensure that the new site doesn’t have any malicious code or exploits that can cause this problem again. DEVELOPER REQUIREMENTS I have been working successfully with freelancers and developers on this site for 20 years. I am only looking for top rated accounts. - Realistic expectations - Sticks to deadlines - Completes all tasks - Communicates regularly Ideal skills and experience: - Strong knowledge of WordPress - Experience with large data...

    $1490 (Avg Bid)
    $1490 Avg Bid
    108 bids

    My project is to create an IoT Network Traffic Dataset. I need to collect as much data as possible, focusing in particular on packet information. The Dataset should have the same features as To do this, you should simulate an IoT network using any tool, conduct one or two attacks...information. The Dataset should have the same features as To do this, you should simulate an IoT network using any tool, conduct one or two attacks and ensure all of the traffic is captured. The captured traffic will be used to create the dataset. The IoT network should be very simple and the attacks could be either Fuzzers, Backdoors, DoS, Exploits, Shellcode and Worms. All of this should be documented.

    $96 (Avg Bid)
    $96 Avg Bid
    5 bids

    ...Responsibilities: Write 3 good Twitter threads per week on Web3 topics Stay up-to-date with the latest trends in crypto Twitter Provide high-quality content as a ghostwriter Requirements: Proven experience as a content writer or similar role professionally or individually Excellent writing skills in English Knowledge of Web3 and Crypto Twitter trends (Defi, NFTs, Gamefi, Airdrops, Exploits/hacks, Smart contract technology) Ability to write engaging and informative content Attention to detail Pricing: The pricing for this role is negotiable. We can work out either per thread, per week or month rates. Duration: To start immediately. This project will last for several months and there is possibility to be a longer term arrangement. Reference: Please prov...

    $54 / hr (Avg Bid)
    $54 / hr Avg Bid
    12 bids

    I am looking to migrate a CreLoaded eCommerce store to either OsCommerce or OpenCart, with integration to InforSX. I need someone who can provide a successful migration and set up InforSX integration, as this has not been done before. There is less than 10,000 pieces of data that need to be migrated so the project should be relatively straightforward. I am open to suggestions from experienced professionals on how to best manage the process and complete the job efficiently. I am excited to explore these options and find the best way to complete this project successfully.

    $778 (Avg Bid)
    $778 Avg Bid
    29 bids

    I am seeking an experienced Roblox developer with a strong background in game security to identify and assess potential vulnerabilities in our Roblox game. My goal is to identify risks associated with in-game exploits, vulnerabilities, and various security threats. I am looking forward to collaborating with you. Game Type: The Roblox game is a sea-based PvP fighting game that features intense combat, strategic navigation, and dynamic environments. Players engage in intense battles with a parry-type fighting mechanic. Responsibilities: Thoroughly review and analyze the game's assets, and systems to identify potential security vulnerabilities and weaknesses. Perform penetration testing and simulate potential attack scenarios to uncover vulnerabilities that may be exploited by...

    $583 (Avg Bid)
    Featured
    $583 Avg Bid
    6 bids

    I need Android Developer who can help in resolving my android application issue as below : Your app is not compliant with the Elevated Privilege Abuse and Device and Network Abuse policies. We’ve determined your app contains code which attempts to exploit a known vulnerability. We don’t allow code that exploits security vulnerabilities or code that compromises the integrity of the system or gaining elevated privileges. Apps are not allowed to bypass restrictions on starting activities from the background. Let me know if you can help in resolving this.

    $161 (Avg Bid)
    $161 Avg Bid
    9 bids

    We got a WordPress website, that need to have some security fixes on the windows server. It have 2 exploits need to be fixed and they are: 1- Change admin login URL from wp-admin to any URL 2- From the Hardening tab, enable Block unauthorized access to and load-styles.php.

    $210 (Avg Bid)
    $210 Avg Bid
    49 bids

    ... as it may turn out, the first). These total around 310,000 words. For this reason the designer must have either native or fluent English. If you do not like reading English fiction, this is not a job for you. Here is the blurb for the first volume: ‘1926. Professor Josef van der Holt obtains a post at an all-women’s college overseas. Stuffy London suddenly becomes the site for the unseemly exploits of his half-Dutch and half-German daughters Anneliese and Isabel. When tragedy carves out a hollow in their lives, their ailing souls send the sororal twins on jagged paths: while Isabel takes flight in sensual hedonism Anneliese skirts danger in her role as sleuth. Elusive are the sentiments they seek: swift stopovers of fleeting feeling. Seditious loves and passions sc...

    $3402 (Avg Bid)
    $3402 Avg Bid
    43 bids

    I need someone to examine my website and try to find security problems in it. Content Injection, SQL Injection Exploit, CSRF Exploit, XSS Exploit, other exploits.

    $66 (Avg Bid)
    $66 Avg Bid
    11 bids

    We are looking for a PHP Developer responsible for developing PHP...as CodeIgniter Should be knowledge of WordPress(Woo commerce) Understanding the fully synchronous behavior of PHP Understanding of MVC design patterns Basic understanding of front-end technologies, such as JavaScript, jQuery, HTML5, and CSS3 Knowledge of object-oriented PHP programming. Understanding accessibility and security compliance Strong knowledge of the common PHP or web server exploits and their solutions Understanding fundamental design principles behind a scalable application User authentication and authorization between multiple systems, servers, and environments Integration of multiple data sources and databases into one system Familiarity with the limitations of PHP as a platform and its wor...

    $27 / hr (Avg Bid)
    $27 / hr Avg Bid
    64 bids

    Hi I need to run a security penetration test against my network. open ports nmap and old versions of software possible exploits for previous scan horizontal scalation inside network. You should use vpn or proxy.

    $245 (Avg Bid)
    $245 Avg Bid
    14 bids

    Looking for a pen tester for one of these specific fields: IOT (eg. security cameras) - Webapp - Public IP - Local Network. Need also evidence (video) and full reports to be able to replicate the exploits.

    $242 (Avg Bid)
    $242 Avg Bid
    18 bids

    Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. Write in essay format not in outline, bulleted, numbered or other list format. Use the five paragraph format. Each paragraph must have at least five sentences. Include an interesting meaningful title. Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one full...

    $34 (Avg Bid)
    $34 Avg Bid
    19 bids

    ...- Deep understanding of relational databases including MySQL, database design best practices, database performance best practices, database performance optimizations, and debugging MySQL database performance bottlenecks. - Experience with designing and building REST APIs, GraphQL - Experience with JWT for API authentication and authorization. - Strong knowledge of the common PHP or web server exploits and their solutions. - Familiarity with the limitations of Yii2/PHP as a platform and its workarounds. - Extensive use of APIs and understanding of HTTP and REST architecture. - Experience with version control (e.g Git). - Excellent written and oral communication skills. What will really excite us: - Knowledgeable with Angular or other Javascript frontend framework. - Good understa...

    $19 / hr (Avg Bid)
    $19 / hr Avg Bid
    96 bids

    *READ BEFORE PROPOSING!!!! * -BNB CHAIN ONLY - Hello. I am looking for a long term cooperation with an individua...I have secured deals with various DeFi project teams , to receive bounties for finding bugs/flaws in their security . The job is simple , I am giving you a list of DeFi projects and you get paid for each bug/security flaw you might find . The reason I stated flashloans in the title is because most of the exploits are done using them as leverage . If this sounds like something that you might be interested in , let's talk more . PAYMENT IS ONLY DONE WHEN BUGS/FLAWS/EXPLOITS ARE FOUND *AND* PROVEN . PAYMENT IS DEPENDING ON THE NATURE OF THE EXPLOIT FOUND AND ON THE CAPITAL OF EACH DEFI PROJECT . MINIMUM PAYMENT IS 3000$ / exploit found...

    $9566 (Avg Bid)
    $9566 Avg Bid
    21 bids