Filter

Meine letzten Suchanfragen
Filtern nach:
Budget
bis
bis
bis
Typ
Fähigkeiten
Sprachen
    Jobstatus
    5,000 xss attack Gefundene Jobs, Preise in EUR

    Hallo wir suchen jemand der unsere Komplete Webseite bereinigen kann und sichern kann. Wir können kein Update ma...bereinigen kann und sichern kann. Wir können kein Update machen da ein Plugin noch Probleme hat "dies sollte natürlich auch geupdatet werden" Wir haben 3-5 x angriffe im Monat wo jemand MalwearAds in unsere Webseite einbaut Du solltest das Plugin Aktualisieren Datenbank bereinigen WordPress reinigen Lücken finden und dies beheben wir haben mit Burp suite unsere Webseite überprüft und sehr viele XSS (Cross site scripting )Lücken finden können. SQLi haben wir bislang keine gefunden. Es müsst daher intensiv geschaut werden wie Leute zugriff auf unseres System erlangen zu not via Honeypot etc. wir möchten hi...

    €549 (Avg Bid)
    €549 Gebot i.D.
    22 Angebote

    ...dann auch Lösungen/Hinweise gegeben werden. Hier einige Funktionen, die gescannt werden sollen. Wenn Sie weitere kennen, gerne mit angeben.... - TLS-Scanner überprüft Zertifikate, Protokollversionen & Verschlüsselungsalgorithmen - DOMXSS-Scanner zur Schwachstellenerkennung bei DOM Cross-Site Scripting Anfälligkeit - HTTP-Security-Header-Scanner prüft die Privatsphäre sowie den Clickjacking-und XSS-Schutz um Spoofing-Angriffe zu verhindern - Information-Leakage-Scanner prüft die Privatsphäre-Einstellungen des CMS - Initiative-S Scanner prüft Webseite auf Virenbefall oder Kompromittierung durch Fremdinhalte wie Phishing - Port-Scanner, welche Ports sind offen? - DDOS - Attacke - Test mit 50 Anfragen in der Sekunde -...

    €2259 (Avg Bid)
    €2259 Gebot i.D.
    22 Angebote

    ...dann auch Lösungen/Hinweise gegeben werden. Hier einige Funktionen, die gescannt werden sollen. Wenn Sie weitere kennen, gerne mit angeben.... - TLS-Scanner überprüft Zertifikate, Protokollversionen & Verschlüsselungsalgorithmen - DOMXSS-Scanner zur Schwachstellenerkennung bei DOM Cross-Site Scripting Anfälligkeit - HTTP-Security-Header-Scanner prüft die Privatsphäre sowie den Clickjacking-und XSS-Schutz um Spoofing-Angriffe zu verhindern - Information-Leakage-Scanner prüft die Privatsphäre-Einstellungen des CMS - Initiative-S Scanner prüft Webseite auf Virenbefall oder Kompromittierung durch Fremdinhalte wie Phishing - Port-Scanner, welche Ports sind offen? - DDOS - Attacke - Test mit 50 Anfragen in der Sekunde -...

    €1052 (Avg Bid)
    €1052 Gebot i.D.
    27 Angebote

    A spacecraft model is to be created for a PC Game (Viper Attack). This model will then serve as Enemy in the game *. From the submissions can several "winning", so ultimately I need several models. It's a top down-scrolling arcade game. To illustrate I have here a little in-game video: There are almost no limits to creativity, it should only be taken care of that there are no similarities, from Movie / Games u. a. existing designs. The model does not need to be super detailed. Which 3D modeling tool you do that does not matter. Output format is .fbx or .obj . technical: -Vertices: less than 15,000 -UVMap: yes, absolutely -Model of several parts: yes, but a maximum of 4 -Texturing: may, but does not have to. -Model or part models must be completely

    €79 (Avg Bid)
    Garantiert Versiegelt
    €79
    32 Einträge

    Hi Farid, the next creature i am interested in would be a Unicorn. Some impressions can be seen at these links: links: As before i need four animations: - Idle - Attack (Horn Thrust) - Casting (Rearing on the hind legs, the horn is considered the magic source: i will add glow/partikels around the horn for that later) - Walk Best regards Damian

    €95 (Avg Bid)
    €95 Gebot i.D.
    1 Angebote

    Meine Web Site wurde gehackt. Benötige dringend Hilfe!

    €103 (Avg Bid)
    €103 Gebot i.D.
    9 Angebote

    ...garantiert werden können. Erforderliche Kenntnisse sind: - mehrjährige Berufserfahrung als PHP Web-Entwickler; -sehr gute Kenntnissen von PHP, JavaScript, MySQL und Zend Framework; -Erfahrungen mit objektorientierte Programmierung (OOP) in PHP5 unter Verwendung von Design Patterns (z. B. MVC); -Kenntnisse von Sicherheitsaspekte bei Web-Anwendungen (z. B. SQL-Injection, Cross Site Scripting-XSS); -Fließende Deutschkenntnisse; -nachweisliche Referenzen auf den o.g. Gebieten; Nicht zwingend notwendig aber wünschenswert sind: -ausgeprägtes analytisches und problemorientiertes Denken; -Erfahrungen mit der Erstellung von Responsive und Mobile Designs; -Erfahrungen mit GIT; -Erfahrungen im Umgang mit den gängigen Grafikprogrammen (z.B. ...

    €36 / hr (Avg Bid)
    €36 / hr Gebot i.D.
    12 Angebote

    Sehr geehrte Freelancer, Leider hat unser bisheriger Programmierer eine Festanstellung angenommen und nur noch wenig Zeit. Allem Anschein nach besteht auf unserer neuen Homepage (bisher fast ohne Inhalte) eine Sicherheitsluecke die wir umgehend schliessen muessen, da wir am heutigen morgen den folgenden Eintrag in unserer Datenbank gefunden haben: „script alert( xss vuln ) /script“. Da dies moeglicherweise ueber zwei bisher vorhandene Kontaktfelder mit einem Zahlencode geschen konnte, wuerden wir diesen Zahlencode gern gegen eine Bilddarstellung austauschen und gleichzeitig auch einmal die vorhandene Programmierung durchsehen lassen wollen. Wir freuen uns auf Ihre Rueckmeldung und Ihr Angebot.

    €166 (Avg Bid)
    €166 Gebot i.D.
    8 Angebote

    We require an individual capable of crafting a comprehensive proposal encompassing our array of vulnerability assessment and penetration testing services, including: 1) Vulnerability Assessment and Penetration Testing for Web Applications, Mobile Applications, N...comprehensive proposal encompassing our array of vulnerability assessment and penetration testing services, including: 1) Vulnerability Assessment and Penetration Testing for Web Applications, Mobile Applications, Networks, Infrastructures, and Active Directories. 2) Social Engineering Assessments. 3) Physical Security Evaluations. 4) Red Teaming Exercises. 5) Purple Teaming Collaborations. 6) Attack Surface Management. 7) Source Code Analysis. 8) Software Composition Analysis (SCA). 9) Dynamic Application Security Testi...

    €20 / hr (Avg Bid)
    €20 / hr Gebot i.D.
    15 Angebote

    ...and Refine.) • Identify and Fill Gaps: Look for content gaps within my niche. Providing information that is currently unavailable, underexplored or make a very difficult and scientific explanation, to a much-understood language. • Share my Unique Perspective: Incorporate personal insights and experiences. This can offer a fresh angle on common topics. • Always think on a new angle / approach to attack the keywords subject, by using use data, graphs, synthesis data and key takeaways, focus on Quality. • Engage with my Audience; Make a Recognizable Impact, Ensure my content makes a noticeable difference in my audience's knowledge or experience. • Cite my Sources Properly: When using information, facts, quotes, or ideas from others, citing my sources n...

    €823 (Avg Bid)
    €823 Gebot i.D.
    12 Angebote

    I want to get a topic in Ransomware and write on Ransomware attack effects on IT Businesses.

    €107 (Avg Bid)
    €107 Gebot i.D.
    53 Angebote

    ...and Refine.) • Identify and Fill Gaps: Look for content gaps within my niche. Providing information that is currently unavailable, underexplored or make a very difficult and scientific explanation, to a much-understood language. • Share my Unique Perspective: Incorporate personal insights and experiences. This can offer a fresh angle on common topics. • Always think on a new angle / approach to attack the keywords subject, by using use data, graphs, synthesis data and key takeaways, focus on Quality. • Engage with my Audience; Make a Recognizable Impact, Ensure my content makes a noticeable difference in my audience's knowledge or experience. • Cite my Sources Properly: When using information, facts, quotes, or ideas from others, citing my sources n...

    €2301 (Avg Bid)
    €2301 Gebot i.D.
    25 Angebote

    I am in need of highly skilled Python, JavaScript, PHP, bootstrap, JQuery, and HTML programmers for a minimum of two major projects. The first project is focused on creating advanced Python tools for automating tasks of a penetration tester and bug bounty hunting. The tools should scan and exploit the most common vulnerability like XSS, IDOR, SSRF, RCE, Command injection, SQLI, and etc. To do all of this process manually take allot of time. It should be better to make a combo with some software that manage all of the work and Using AI to scan all of the file and codes and have a hacker mindset. For example burp suit have web scanner but it is not smart enough to think critically to find some vulnerability. of course sometimes its work but it is possible to create something much bett...

    €9 / hr (Avg Bid)
    €9 / hr Gebot i.D.
    14 Angebote

    Seeking skilled freelancers for UI/UX design for an Attack Surface Management project. Familiarity with Attack Surface Management preferred but not mandatory. Design style similar to & Please share relevant work samples. Specifics: - Incorporate interactive dashboards - Include detailed analytics - Construct a user-friendly navigation system Skills and experience: - Strong UI/UX design skills - Previous work with similar projects - Knowledge in cybersecurity (preferred, not mandatory)

    €918 (Avg Bid)
    €918 Gebot i.D.
    58 Angebote

    I'm facing a major reputation issue due to a personal attack in a Google review. This false info-based review has had a massive impact on my web presence. While I have made attempts to mitigate the issue by reporting it to Google and responding publicly, professional assistance is now needed for effective resolution. A background in online reputation management and knowledge of Google's content policy would be ideal for this task.

    €18 (Avg Bid)
    €18 Gebot i.D.
    1 Angebote

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €13 (Avg Bid)
    Garantiert
    €13
    3 Einträge

    Create an excel sheet where I can score my columns based on categor...Authentication b. IAM permissions c. Configuration of Network Security Measures 3. Breach Probability a. Historical Incidents b. Attack Frequency c. System Value 4. Encryption Status a. Relevance of Encryption Type b. Compliance with Encryption Standards c. Encryption Key Management and Controls 5. Configuration Complexity and Commonality of Misconfiguration Occurrence a. Complexity of Service Settings b. Common Configuration Errors c. Configuration Default Settings 6. Alignment with Pre-Exploitation Phases of MITRE ATT&CK and Cloud Threat Attribution a. Initial Access and Execution Risks b. Privilege Escalation and Defense Evasion c. Threat Actor Profiles and Attack Vector Analysis Total Li...

    €28 (Avg Bid)
    €28 Gebot i.D.
    8 Angebote

    ...developed using FastAPI, a high-performance web framework for building APIs with Python, and MongoDB for data storage. Requirements: Expertise in FastAPI and MongoDB is essential. In-depth understanding of RESTful APIs, CRUD operations, and web security best practices. Ability to implement robust security measures to protect against common vulnerabilities such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF). Experience with user authentication and authorization mechanisms, including token-based authentication and role-based access control (RBAC). Strong communication skills and the ability to collaborate effectively with our team. Deliverables: Develop a FastAPI backend with CRUD endpoints for managing admin panel data securely. Integrate Mo...

    €109 (Avg Bid)
    €109 Gebot i.D.
    19 Angebote

    Hi Ahmed Mahmoud S., hope you are all well. I have an assignment regarding a Differential Power Analysis attack on a crypto XOODYAK algorithm. And a task for conducting a leakage assessment and interpret test results. Would you be able to help? I currently have some of the code but it needs finishing. If I send you the description, can you take a look and healthly let me know whether you could finish it up in a week. This is highly important for me Sir.

    €230 (Avg Bid)
    €230 Gebot i.D.
    1 Angebote

    I am looking for a seasoned Cybersecurity Professional experienced in conducting realistic attack simulations and incident reports. The goal is to understand how our systems respond against: - DDoS (Distributed Denial of Service) attacks - Malware attacks - Ransomware attacks These simulations should include our Network Servers, four VMs, and Files. Ideal Skills: - Proficiency in conducting DDoS, Malware, and Ransomware attack simulations - Experience in handling and securing network servers and virtual machines - Practical knowledge about file-based attacks and their prevention The final deliverable should be a detailed report that includes a thorough technical analysis of the attack simulations' results. The report should help us identify vulnerabilities, un...

    €51 (Avg Bid)
    €51 Gebot i.D.
    15 Angebote

    I'm looking for an experienced professional who is skilled in working with WooCommerce to swiftly install 3D Secure on my e-shop. I need this done as soon as possible as this is an urgent project. Key Requirements: - Proven experien...working with WooCommerce to swiftly install 3D Secure on my e-shop. I need this done as soon as possible as this is an urgent project. Key Requirements: - Proven experience with WooCommerce - Profound knowledge of 3D Secure installation - Capability to quickly understand and implement necessary changes - Excellent attention to detail We had to disable the card payment as we faced massive cyber attack (card testing) recently. I need a quick intervention to make our e-shop fully functional again. Appreciate your time and look forward to ...

    €83 (Avg Bid)
    €83 Gebot i.D.
    17 Angebote

    I am searching for a Python developer proficient in Scrapy to forge web security testing tools. As a key deliverable, these tools must have the features below: - Subdomain Enumeration: Subdomains to be listed and categorized. - Directory Enumeration - Sensitive Parameter Detection - XSS Testing - SQL Testing Proven experience in creating security software is ideal. The developer should be adept at creating intermediate-level subdomain enumeration features. The project completion requires an understanding and implementation of Scrapy. I expect a functional, well-tested software package at the end of the project.

    €223 (Avg Bid)
    €223 Gebot i.D.
    18 Angebote

    I am seeking a skilled illustrator with a passion for Japanese anime and a keen understanding of various styles. Though I'm primarily interested in the classic anime style, I am open to incorporating other anime styles, if they serve the design well. The designs I require should be based on popular anime themes and characters, namely: - Naruto - One Piece - Dragon Ball Z - Attack on Titan - And other popular themes and characters, up for discussion Ideal freelancers for this project would demonstrate the following: - Proven experience with graphic design, specifically for clothing - A strong portfolio with emphasis on anime-style work - Ability to capture the essence of popular anime characters - A flexible design approach, to cater to different anime styles and...

    €103 (Avg Bid)
    €103 Gebot i.D.
    56 Angebote

    ...for styling and layout consistency. 6. **Error Handling and Logging**: Implement robust error handling mechanisms both on the frontend and backend. Log errors and application events for troubleshooting and monitoring purposes. 7. **Security Measures**: Apply security best practices such as input validation, output encoding, and protection against common vulnerabilities like Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF). 8. **Testing**: Write unit tests and integration tests for both the Angular frontend and the .NET Core backend to ensure code reliability and maintainability. Utilize testing frameworks like Jasmine, Karma, xUnit, or NUnit. 9. **Deployment**: Set up deployment pipelines for continuous integration and continuous deployment (CI/CD). Deploy the...

    €723 (Avg Bid)
    €723 Gebot i.D.
    43 Angebote

    My website was compromised last week, and I need the damage from the malicious code injection assessed and repaired immediately. Unfortunately, I do not have a recent backup to rely on. The perfect professional for this job would: - Have extensive experience in WordPress security - Be capable of identifying and mitigating these attacks promptl...security - Be capable of identifying and mitigating these attacks promptly - Have a strong understanding of the latest threats and malware activities that can impact a WordPress website - Provide guidance on keeping my site secure moving forward Given the lack of backup, a keen attention to detail is necessary to ensure minimal data loss. Upon completion, I would like a detailed report of the attack and the measures taken to rectify the ...

    €19 (Avg Bid)
    €19 Gebot i.D.
    31 Angebote

    Goal: To Demo red team skills with a modern attack, Recording a video with steps in a power point slides with explains Metodology: • The recording Will not appears names or country about developers. Only Kali Linux in English • Slides with screenshot and explain all steps • Share the virtual machines on the scenary attack Content: • Envarionment: Ataque a "CompanyX". • Techniques: Phishing spearphishing, zero-day vulnerabilities pivoting, privilege escalation, data exfiltration. • Tools: Virtual machines in virtualbox, Kali Linux, latest generation of attack tools. Benefifts: • Deep understanding of Red Team attack techniques. • Practical vision of tools and strategies. • Improvement of the security posture...

    €120 (Avg Bid)
    €120 Gebot i.D.
    11 Angebote

    I need an expert in Natural Language Processing, specifically in sentiment analysis and text classification, to assist with my project. While I haven't chosen a programming language for this task, I am open to suggestions. It's currently unclear if I will need a pre-trained or custom NLP model, so both options should be explored. Best fit for the job would include: - Extensive experience in NLP, especially sentiment analysis and text classification - Ability to provide insights on different programming languages for the task - Experience with both pre-trained and custom NLP models.

    €282 (Avg Bid)
    €282 Gebot i.D.
    31 Angebote

    I need an expert in Natural Language Processing, specifically in sentiment analysis and text classification, to assist with my project. While I haven't chosen a programming language for this task, I am open to suggestions. It's currently unclear if I will need a pre-trained or custom NLP model, so both options should be explored. Best fit for the job would include: - Extensive experience in NLP, especially sentiment analysis and text classification - Ability to provide insights on different programming languages for the task - Experience with both pre-trained and custom NLP models.

    €50 (Avg Bid)
    €50 Gebot i.D.
    16 Angebote

    I require an expert in network security and artificial intelligence to create an effective intrusion detection system specifically for medical IoT devices. Main Tasks: - Monitoring: Develop a system capable of vigilant surveillance of all activities on medical IoT devices. - Attack Recognition: The device must be able to recognize "man in the middle" attacks. Familiarity with the dynamics of such attacks will be key. - Response Mechanism: This aspect was not specified, so I suggest a system that blocks network traffic as a preliminary standard. Skills and Experience: - Proficient in AI and machine learning algorithms - Knowledge of IoT devices, particularly medical ones. - Strong experience in Network security - Understanding of intrusion detection system mechanisms...

    €524 (Avg Bid)
    €524 Gebot i.D.
    11 Angebote

    ...of enumeration/vulnerability assessment, scanning, exploit development, exploitation and a brief discussion on vulnerability fixes or detailed security recommendations with appropriate references where required. You will be provided with three Virtual Machines each ranked by their difficulty with instructions on how to access these VMs on ESXi. You will be given Kali Linux Virtual Machine to attack the targets. 1. Proof Filenames: / - This file is only accessible to the root or Administrator user and can be found under the /root directory (Linux) or the Administrator “Desktop” or “My Documents and Settings” (Windows). This file is available on every target machine. a. Proofs: Windows On all Windows targets, you must have a shell of one of the follo...

    €169 (Avg Bid)
    €169 Gebot i.D.
    19 Angebote

    ...sense of calm, the app should be intuitive, user-friendly, and highly accessible. Key Features: * Breathing Techniques: Incorporate the 4-7-8 and Progressive Muscle Relaxation breathing exercises as primary functions of the app. * Grounding Techniques: Implement the Body Scan and 5-4-3-2-1 grounding techniques as additional mechanisms for anxiety relief. * Guide the patients through the panic attack * Provide affirmations Ideal Skills and Experience: * Proficiency in UX/UI design across mobile platforms, particularly iOS and Android * A solid portfolio illustrating a knack for colorful and engaging layouts * Familiarity in designing wellness or healthcare-related apps * A clear understanding of the delicate nature of our target users' needs and the ability to incorporate t...

    €47 (Avg Bid)
    €47 Gebot i.D.
    18 Angebote

    We're seeking a skilled Security Researcher/Ethical Hacker to identify and report vulnerabilities in our Jira Cloud application. The ideal candidate will have a proven track record in ethical hacking, with expertise in various security domains including XSS, SQL Injection, SSRF, etc. Responsibilities include conducting thorough security assessments, utilizing the Bugcrowd Vulnerability Rating Taxonomy for prioritization, and providing detailed reports on findings. This role requires a deep understanding of security protocols and a proactive approach to enhancing application security. I will provide link to the cloud application. The aim is to highlight all potential P1/P2/P3/P4. Deadline for assessment 18th March, I will then do the fixes

    €465 (Avg Bid)
    €465 Gebot i.D.
    28 Angebote

    ...currently in need of an experienced security analyst who is capable of conducting a thorough vulnerability assessment testing on our ASP.NET web platform. Key Areas to be examined: • Cross-Site Scripting (XSS) • SQL Injection • Cross-Site Request Forgery(CSRF) We emphasis on the User Authentication process. We want to ensure that our user authentication systems are entirely secure and free of any potential vulnerabilities that might cause a threat to users' data. Ideal skills required: • Deep understanding of ASP.NET framework • Proficiency in web security testing • Experience with XSS, CSRF, SQL Injection vulnerabilities • Familiar with the user authentication process on web applications Our goal is to assure the utmost se...

    €326 (Avg Bid)
    €326 Gebot i.D.
    24 Angebote
    Secure website Beendet left

    Hello, my website seems to be experiencing what appears to be a bot attack. When accessing the site through Google, it redirects to another website. I'm seeking assistance in addressing this security issue.

    €91 (Avg Bid)
    €91 Gebot i.D.
    34 Angebote

    I am personally aiming to expand my knowledge of cybersecurity, particularly in the area of DDOS attacks. Having basic understanding...educational, and interactive simulations - Be equipped to provide a detailed report on the simulation, detection, and mitigation process Additionally, being able to thoroughly explain the steps involved would be essential, as it would aid my understanding of the subject matter. Other keys to comprehending the nuances would be strong communication skills and patience. In summary: - Set up a DDOS attack simulation - Teach detection and mitigation of said attacks - Provide a detailed report of the entire process Leveraging your expertise, I hope to learn more about cybersecurity and how to detect and mitigate DDOS attacks. Thank you for considering m...

    €295 (Avg Bid)
    €295 Gebot i.D.
    8 Angebote

    ...sense of calm, the app should be intuitive, user-friendly, and highly accessible. Key Features: * Breathing Techniques: Incorporate the 4-7-8 and Progressive Muscle Relaxation breathing exercises as primary functions of the app. * Grounding Techniques: Implement the Body Scan and 5-4-3-2-1 grounding techniques as additional mechanisms for anxiety relief. * Guide the patients through the panic attack * Provide affirmations Ideal Skills and Experience: * Proficiency in iOS and Android app development. * Knowledge of UX/UI design principles to ensure a clean, simple, and user-friendly interface. * Experience working on health/wellness applications, preferably with a focus on mental health. * Understanding and/or experience in inculcating interactive health-related exercises in an...

    €900 (Avg Bid)
    €900 Gebot i.D.
    18 Angebote

    In the current situation, my computer has been severely compromised. It has fallen victim to a .faust virus attack, which has resulted in a number of difficulties such as all files in inaccessible.. I'm hopeful to connect with a professional who can restore my computer to its original condition. Required Skills & Expertise: - The freelancer should be an Expect in the area of virus removal. - The potential candidate must possess an excellent understanding of various types of viruses, specifically the .faust virus - randsome. - The freelancer should provide proof of their relevant and successful past work experiences relating to virus removal. The perfect freelancer for this job would be someone who not only removes the virus but also ensures it does not re-infect my system...

    €726 (Avg Bid)
    €726 Gebot i.D.
    10 Angebote

    ...only forward , backward , side ways but NOT diagonally. Each player tries to encircle the enemy's one piece on three sides. Game pieces will be roman soldiers. the user instead of moving the star static game pieces, moves the characters from square to square, and the characters move with a walking animation. When red soldier for example is surrounded on three sides by three blue soldiers, they attack him together and he collapses dies and disapperrs. Please guide me on exactly what all the graphics designer must give, so that later we dont face delays because some components you need are missing. Also mention any other specs or criteria he must follow Please do not send AI (artificial idiocy) generated replies, it impresses no one. Just be an intelligent human, because ...

    €254 (Avg Bid)
    €254 Gebot i.D.
    23 Angebote

    ...with the application development teams and develop test cases, which can check the security of applications, databases and authentication mechanisms. • Experience using a wide variety of security tools to include Kali-Linux, Checkmarx CxSAST, CxIAST, Burp Suite Pro, Wireshark, Nmap, Nessus, Metasploit, and Nexpose. • Involved in implementing and validating the security principles of minimum attack surface area, least privilege, secure defaults, avoiding security by obscurity, keep security simple, Fixing security issues correctly. Strong knowledge in Manual and Automated Security testing for Web Applications. • Automation of security scanning process (DevSecOps) into the build environment with CI/CD pipeline using Codefresh, Maven, Gradle, ...

    €23 / hr (Avg Bid)
    €23 / hr Gebot i.D.
    30 Angebote

    ...detection and prevention system that leverages deep learning. This tool should be capable of providing real-time monitoring, deep analysis, and be integrated with a user-friendly web application. The primary functionality of the system should be: - Anomaly detection: using advanced deep learning algorithms to analyze network patterns and identify any unusual activities that could signify a possible attack. For the web application's interface, the system should present: - Graphical representation: visually display detected anomalies in a clear and intuitive manner, allowing for quick interpretation of the security status. The ideal candidate should possess strong skills in deep learning, anomaly detection, network security, and web application development. Experience in...

    €14 (Avg Bid)
    €14 Gebot i.D.
    2 Angebote

    ...cybersecurity to create an engaging presentation aimed at IT professionals and cybersecurity specialists. The sessions should cover the following area • Cyber Asset attack surface management: What is an asset (example Camera sensor), why do we need to protect it, what happens when we do not ? Explicit example. The presentation is for a municipality (city council). Present a case history where a similar party got its self hacked because they ignored CAASM. Explain why just locking your computer with a MFA is not the answer to everything, tell em about CAASM. Pinpoint and elaborate on proven strategies for managing and reducing the attack surface in cybersecurity. I need to sell a CAASM solution to the municipality so tailor the present accordingly. How will th...

    €63 (Avg Bid)
    €63 Gebot i.D.
    56 Angebote

    I am seeking a professional with strong cybersecurity skills to assist with a serious incident that has occurred. I have fallen victim to a cyber attack and require expert assistance to ensure my system is secure and potentially trace the hacker who has infiltrated my system. Key Responsibilities Involved: - Providing real-time monitoring and alerting solutions. - Implementing effective firewall and antivirus protection. - Conducting thorough log analysis and tracking activities. The hacker has compromised various sorts of my personal, financial, and confidential business data. Not only has my name, address, and phone number been accessed, but my financial details, including credit card and bank account information, have also been breached. In addition, confidential business data...

    €255 (Avg Bid)
    €255 Gebot i.D.
    17 Angebote

    I am in need of a specialist in Hyperledger who can assist in several vital aspects of my project within the finance sector. The areas of focus include: 1. Blockchain Development: Need to build a robust blockchain system, ensuring it is secure, resistant to attack and efficient in operation. 2. Smart Contract Development: Need to devise smart contracts that are reliable, secure and seamlessly integrated into the blockchain. 3. Supply Chain Management: Require assistance in designing a supply chain management process which is transparent and free from errors or fraud. The main purpose of the blockchain development required for the project is record keeping. As such, the professional should be adept at using blockchain technology for secure and efficient data storage. Ideal Skil...

    €1193 (Avg Bid)
    €1193 Gebot i.D.
    23 Angebote

    ...placed on developing a secure payment portal to ensure the security of personal and financial data. Ideal candidates should have: - Experience with Python web development. - Knowledge of subscription management features and secure payment gateway integrations. - Past experience in SaaS website development. i got the source for fitching in pythone identify fitching in web sites but doesnt block the attack i need to modifay the code to block the attacks while the software is active in addition to use my web payment gateway as safe payment gate way after doing verfication on the recipiant creditability not scamer and has license process verfied transactions all verfication process to be consedired from fruade if some body has some thing ready it would be nice to cut on time. Con...

    €494 (Avg Bid)
    €494 Gebot i.D.
    58 Angebote

    ...integrate a ready-made User Generated Content (UGC) model into my Roblox game. The model is already built. Scripts and animations are also there. Your task will be to ensure its functionality in the game environment and implement its ability to interact with the environment and attack players. Key Responsibilities: - Successful implementation of the pre-built UGC model into the game - Adequate model functionality testing in the game environment - Enabling the UGC model's capabilities for environmental interaction and player attack The ideal candidate will have: - Proficiency in Roblox Studio - Experience with Blender - Proven record of incorporating UGC models into Roblox games - An understanding of basic animation principles This project doesn't require a com...

    €25 (Avg Bid)
    €25 Gebot i.D.
    7 Angebote

    I'm looking to create tutorial videos for the game, Clash of Clans. The primary focus will fall on aspects such as base building, attack strategies, and clan management. Ideal Skills and Experience: • Extensive familiarity with Clash of Clans game, especially base building, attack strategies, and clan management. • Good video editing skills for creating clear and engaging tutorials. Key Topics to Cover: • Base Building: This should cover designing defensive structures for the base, optimizing resource placement for efficiency, and maximizing the base's defensive capabilities, to help players create an impregnable fortress. • Attack Strategies: Share beneficial strategies that will help players mount successful attacks on opponents. &bul...

    €2 / hr (Avg Bid)
    €2 / hr Gebot i.D.
    3 Angebote

    As a business, we have run into a critical issue with our Joomla site. It's come under a malicious attack leaving it inaccessible and in need of urgent professional assistance to rectify this situation. Our requirements are twofold: 1. Malware Removal: - Our site is currently inaccessible, likely due to the malware. We urgently need someone experienced in dealing with such infection to restore the site back to running order. 2. Recap Integrations: - We also require a reCAPTCHA integration into our site's contact form as an important means of extra security. The ideal candidate should have expertise in: - Joomla site management - Website malware detection and removal - Integration of reCAPTCHA to web forms. This role warrants a professional with a soli...

    €28 - €230
    €28 - €230
    0 Angebote