Dos hacking jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 dos hacking jobs found, pricing in GBP
    University Work Hacking 5 days left
    VERIFIED

    Dear Ladies and Gentlemen, I am searching for someone who can help me with a work (universty work) hacking. Point is to show the ways of hacking. - What methodes are there - What are the consequences - etc.. Pls only when you have experience in this

    £396 (Avg Bid)
    £396 Avg Bid
    26 bids

    I am in need of an experienced technical analyst for a critical project focus on testing ...the system can withstand under heavy loads without crashing or slowing down notably. Ideal freelancers should have significant experience in network or application security, proficiency in executing various types of tests including penetration and load tests, and a proactive approach to identifying potential vulnerabilities in systems. A strong understanding of cybersecurity principles, ethical hacking, and performance testing methodologies is crucial to the project's success. Your ability to deliver clear, easy-to-understand reports on your findings is also important. full documentation how the tests are being done is needed (step by step) or record videos in order for us to replicate...

    £359 (Avg Bid)
    £359 Avg Bid
    11 bids

    I am seeking a skilled game hacker for the purpose of modifying Game A's mechanics. More specifically, I am interested in altering the movement mechanics of this game. The ideal personnel would have: - Profound knowledge in hacking and game modification - A specific focus on movement mechanics - Proven experience in Game A or similar titles - Strong understanding of ethical hacking rules In essence, your task would be to alter these specific game mechanics in a fair and ethical way that aligns with the designated rules of game modification. A keen understanding of movement mechanics and the ability to replicate that in real time is a must for this project.

    £71 (Avg Bid)
    £71 Avg Bid
    3 bids

    I’m seeking an experienced cybersecurity specialist to secure my informational websites against hackers and malware. Key Responsibilities: - Implement robust security measures to fend off hacking attempts and prevent malware infections. - Prioritize the website's availability and uptime, ensuring the security protocols don’t interfere with the website's responsiveness and speed. Ideal Skills: - Extensive practical knowledge of website security best practices. - A solid understanding of hacker methodologies. - An ability to install and configure cybersecurity software. - Previous experience in protecting informational websites. Your role will be crucial in maintaining a secure digital environment that keeps my users' trust and consistently delivers ...

    £8 / hr (Avg Bid)
    £8 / hr Avg Bid
    32 bids

    Título del Proyecto: Rompiendo...Tenga en cuenta que este título es tentativo y sujeto a cambios según el diseño final. Autor: Bernardo Vicente Sanchez (sujeto a cambio en el diseño final) Animamos el uso de colores como el naranja, negro y blanco, pero estamos abiertos a la interpretación creativa del diseñador. El diseño frontal debe incorporar una fotografía de cabeza del autor, que se proporcionará al contratar. Se puede enviar dos variantes una sin foto del autor y una con foto. El diseño final debe entregarse en un formato listo para imprimir, adhiriendo a las especificaciones del editor. NOTA: De ser elegido tu diseño, se proveerá el título y subtítulo final y la foto del...

    £119 (Avg Bid)
    Guaranteed Sealed
    £119
    77 entries

    I need an IT specialist who can perform an ethical hacking on my home network system to alleviate my security concerns. Key responsibilities include: - Assessing and troubleshooting my home internet - Securing my Wi-Fi network from unrecognized access - Checking any suspicious activities on my devices - Preventing unwanted access to my personal information The devices connected to my home network include smartphones, computers/laptops, and smart TVs/streaming devices. Ideal skills for the job: - Strong experience in IT support - Knowledge of network setup and configuration - Proficiency in software and hardware installation - Solid background in ethical hacking and internet security. Let's ensure the security of my home network! I have a small home business...

    £113 (Avg Bid)
    £113 Avg Bid
    14 bids
    Software Development 3 days left
    VERIFIED

    I am in need of a professional who can develop a gaming software tailored explicitly for my personal Windows or Android device Key Features: - The software should help me know the outcome of a specific game result Ideal Candidate: - Proficient in script writing, programming, hacking would be an added advantage - Has a valid understanding of developing gaming applications - Familiarity with diverse gaming strategies would be a significant plus Will continue on chat but due to trust issues you will start the software and show me updates before I pay you

    £125 (Avg Bid)
    £125 Avg Bid
    26 bids
    Lead Generation 3 days left

    ...be an exhaustive list of pains and fears identified and communicated for each ICP, so that the ICP feels that we are speaking directly to them and the fears are allayed and the risk of moving forward is low. Campaign Elements: 1. **Research and Analysis** - Conduct thorough research into the pains, fears, and behaviours of the ICPs. - Investigate competitor's funnels for insights (funnel hacking). 2. **Ad Creation** - Craft ad copy that directly addresses the ICPs' specific issues. - Develop engaging adverts (static or video formats) highlighting a High Value Content Offer (HVCO), such as an eBook addressing the critical aspects of managing Amazon PPC effectively. 3. **Lead Magnet and Conversion Process** - Create an OPT-in page to capture leads by off...

    £15 / hr (Avg Bid)
    £15 / hr Avg Bid
    9 bids

    I am seeking an expert in Youtube growth hacking who can significantly increase subscriber count on my channel. Checking the channel, you will find it's primarily focused on educational materials and experiences on various aspects of life. What I need now is a strategy that aligns with the goal of daily video posting and leverages that content to gain maximum subscribers. I Want watch housrs also Ideal candidates should: - Have extensive experience and success in growing Youtube channels. - Be well-versed in Youtube's algorithms and SEO. - Be able to provide actionable strategies for daily content. - Demonstrate a clear understanding of effective promotional techniques to attract the target audience.

    £14 (Avg Bid)
    £14 Avg Bid
    11 bids

    As a keen organization looking to ensure our cyber security measures are fully proofed, we wish to invite experience...test on our network infrastructure. Our ultimate goals are to: - Identify any vulnerabilities within our system - Robustly assess the security measures we have already put in place on our network - Gauge the efficacy of our cybersecurity measures This project will require: - Deep understanding of cyber security and network system trends - Proven experience in penetration testing - Ethical hacking capabilities - Familiarity with both manual and automated testing tools Please bring forward your proficiency in providing comprehensive and detailed reports. We anticipate the information to be intricate, actionable, and explained in a way that a non-expert could u...

    £927 (Avg Bid)
    £927 Avg Bid
    25 bids
    Linux Server administrator -- 2 10 hours left
    VERIFIED

    ...responsible for: - Investigating potential security vulnerabilities within our server - Proposing and implementing necessary measures to fortify server security While the requirement does not particularly target any specific area of security, a comprehensive understanding of all aspects of server security, from firewalls to data encryption, will be regarded as an asset. Experience with warding off hacking attacks is particularly desired. Candidates who are skilled in configuring email accounts or setting up domains and databases, while not a mandatory requirement for this project, will be preferred. Of greater importance is the ability to diagnose WordPress websites hosted the Hestia control panel experience in Hestial control panel is very important and key in this task The wor...

    £27 (Avg Bid)
    £27 Avg Bid
    20 bids

    Seeking a dynamic Freelance Growth Hacker with a proven track record of growing a crypto project to success. Your goal: attract new investors by leveraging and adapting strategies that you ...have implemented elsewhere in the crypto world. Key Tasks: - Implement successful growth tactics to boost our investor base. - Use analytics to refine and optimize strategies. - Work flexibly and collaboratively with our remote team. - A keen understanding of the target audience (crypto enthusiasts, decentralized investors) is also vital Requirements: - Demonstrable success in crypto growth hacking. - Versatile marketing skills; creative and analytical mindset. - Excellent communication and teamwork abilities. Offer: - Work on an exciting crypto project with room for your ideas. - Lasting pa...

    £457 (Avg Bid)
    £457 Avg Bid
    11 bids

    I'm in need of a skilled...software engineer to develop a unique mobile application. The key functionality will be the ability to take control of another app as per user selection. This is not a common feature found in standard mobile applications, so it's crucial that you possess a strong understanding of mobile app development and possibly ethical hacking. Ideal Skills: - Robust knowledge in mobile application development - Experience with software that controls other apps - Understanding ethical hacking principles could be a plus The timeline for completion is within a month, so you should be prepared for an intense period of focused work. If you have experience in this niche area and can deliver within the specified timeline, kindly place your bid. Your expert...

    £248 (Avg Bid)
    £248 Avg Bid
    17 bids

    I'm in need of an expert hacker to secure my personal online accounts. The parameters for this project will be personal to me, and will be discussed with the hired freelancer. The ideal freelancer for this project would be highly experienced in Reverse Engineering. They would also be able to provide a detailed project proposal il...project would be highly experienced in Reverse Engineering. They would also be able to provide a detailed project proposal illustrating their intended approaches and methods to complete the project. Skills and Experience Required: - Expert in Reverse Engineering - Excellent communication skills - Must provide a detailed project proposal - Proven background in online security and ethical hacking - Confidentiality and high ethical standards...

    £1900 (Avg Bid)
    £1900 Avg Bid
    7 bids

    Hi Shayan T., I hope all is well with you, I have another Convert Orcad PCB II/ OR PCB386+ dos file version (I have *.brd and *.BD1, to Cadence Allegro or Autocad or other free viewer.

    £17 (Avg Bid)
    £17 Avg Bid
    1 bids

    I am seeking a talented Social Media Manager to build our presence on Facebook and Instagram. Requirements: - Ability to grow followers organically - Experience in running paid ad campaigns - Track record in driving site traffic via social media The goal of this project is to significantly ...The ideal candidate must have a proven track record in executing effective strategies that optimize our visibility, engage our audience and drive site visits. Both organic and paid strategies will be integral to achieving this goal. Skills and Experience: - Comprehensive understanding of Facebook and Instagram - Familiarity with analytics and social media advertising - Experience in growth hacking or similar positions - Versatility in using both organic and paid strategies to drive si...

    £49 (Avg Bid)
    £49 Avg Bid
    32 bids

    Seeking an ethical hacker with specialized expertise in cyber security. Ideal candidates must demonstrate: - Experience in different facets of ethical hacking, including but not limited to network penetration testing, web application security testing, and social engineering testing. Even though these areas were not specified in the project, a well-rounded candidate should possess skills in these areas. - Extensive experience in cyber security. This is a key requirement for this project. Please detail level of expertise and provide examples illustrating this experience. Applications must include detailed information about the freelancer's experience, preferably in the realms mentioned above. Past work samples are not a mandatory criterion but the emphasis is on your experienc...

    £18 / hr (Avg Bid)
    £18 / hr Avg Bid
    11 bids

    Seeking an ethical hacker with specialized expertise in cyber security. Ideal candidates must demonstrate: - Experience in different facets of ethical hacking, including but not limited to network penetration testing, web application security testing, and social engineering testing. Even though these areas were not specified in the project, a well-rounded candidate should possess skills in these areas. - Extensive experience in cyber security. This is a key requirement for this project. Please detail level of expertise and provide examples illustrating this experience. Applications must include detailed information about the freelancer's experience, preferably in the realms mentioned above. Past work samples are not a mandatory criterion but the emphasis is on your experienc...

    £10 / hr (Avg Bid)
    £10 / hr Avg Bid
    6 bids

    I'm looking for someone to re-write an old DOS desktop inventory application written in QBasic with an expected timeline of 2-3 months. The entire application needs to re-written in a modern environment, and I'm open to suggestions for improvement. The person I hire should have experience developing desktop applications and must be able to interpret old QBasic code (approx. 2,000 lines) and convert it to a high quality product that meets the requirements and timeframe.

    £552 (Avg Bid)
    £552 Avg Bid
    32 bids

    I need a professional with strong experience dealing with hacked WordPress websites. Under this project, your responsibilities would include: - Cleaning and restoring my hacked WordPress website...dealing with hacked WordPress websites. Under this project, your responsibilities would include: - Cleaning and restoring my hacked WordPress website from the recently available backup. - Enhancing the post-recovery security to prevent further hacking attempts. - Potentially identifying areas most impacted by the hack, as I'm unsure of specific areas. General skills and experience: - Proven track record with WordPress. - Specific experience dealing with recovery from hacking attacks. - Knowledgeable about preventative measures against hacking. - Experience in web...

    £142 (Avg Bid)
    £142 Avg Bid
    43 bids

    I'm in need of professional assistance to conduct an in-depth exploration of Android device's security. The tasks that need to be carried out involve: - Extracting data - Bypassing security measures - Analyzing present vulnerabilities Please note, the project will be hand...- Analyzing present vulnerabilities Please note, the project will be handled remotely as I do not have physical access to the Android device. I'm expecting a freelancer equipped with advanced skills in Android platform, cybersecurity, and remote access capabilities. Ethical hacking certification would be a plus. Your role is to identify and diagnose the holes in security rather than exploiting them. I'm looking forward to working with a dedicated security expert who respects the rules of ...

    £63 (Avg Bid)
    £63 Avg Bid
    3 bids

    ...Configure the URL and endpoint within PHP and AWS. Learn how to run the PHP and DB. Two Git Repos with what is thought to be the latest code. Make a list of to-dos of blockers and changes to rectify these blockers. Run Postman after DB is configured and document results with Postman configurations. Update the API documentation. Note: We need the current PHP code installed on this AWS (PHP admin, API, and associated DB, and Data fill). This means a full review of the PHP code, updates to the API document, admin database fill of DB, a full configuration and install of API PHP system document, list of to-dos with Blocker and non-blocker section document and being able to run the mobile apps making API calls like the production. Of course, we are not fully ...

    £10 / hr (Avg Bid)
    £10 / hr Avg Bid
    84 bids

    I require immediate assistance in hacking a phone for investigative purposes. This is a legal request and solely for the purposes of obtaining: - Call logs - Text messages - Pictures Timing is critical, and I therefore expect the work to be completed ASAP. An ideal freelancer for this project would have expertise in ethical hacking, digital forensics, and cyber investigations. Experience with information security and a proven track record in similar projects is greatly appreciated. Please note, strict adherence to ethical guidelines and professionalism is mandatory.

    £274 (Avg Bid)
    £274 Avg Bid
    25 bids

    ...diseño para poder configurar y adaptar el diseño y funcionalidades del plugin "Events Manager Pro" en una web de membresía con "Paid Membership Pro". Información sobre el sitio web: Plataforma: WordPress Tema usado: Tema hijo de Twenty Twenty-Four Plugins principales: Paid Membership Pro y Events manager Pro Hosting: Siteground Tareas principales a realizar: - Crear diseño para los eventos en dos columnas y adaptarlo al del sitio web. - Mostrar la lista de los asistentes a los eventos (esto se hace con placeholders ) - Configurar varios formularios de registro dependiendo del evento y si el usuario es miembro (está loguado o no). - Crear diseño de la página donde aparezcan todos los eventos. (Pr&oac...

    £127 (Avg Bid)
    £127 Avg Bid
    88 bids

    I require a proficient IT specialist with a deep understanding of system audit logs and SharePoint. I have recently experienced a cybersecurity issue, hence, the need for an expert to help to recover and secure my system. Your duties will include: - Comprehensive review and analysis of system logs for detection of any hacking patterns. - Implement corrective actions from system logs analysis and ensure security updates and patches are done. - Assist with data backup and recovery to restore lost files. - Set up SharePoint for document sharing and collaboration, with high focus on security protocols. The ideal candidate must have significant experience in system logs review, an understanding of SharePoint functionality, and a knack for data backup/recovery. Familiarity with network...

    £21 / hr (Avg Bid)
    £21 / hr Avg Bid
    6 bids

    Estoy buscando Voice over en de locutores para varios videos, son 3 videos, uno de 1 minuto 30 seg, otro de 40 segundos y otro de 40 segundos. total 2 minutos 50 segundos, requerio de dos voces en ingles masculinas y una femenina en español nativa. I need Voice over from announcers for 3 videos, one of 1 minute 30 seconds, another of 40 seconds and another of 40 seconds. total 2 minutes 50 seconds, required two male English voices and one female native Spanish voice.

    £99 (Avg Bid)
    £99 Avg Bid
    52 bids

    Necesitamos contratar la creacion y edicion de tres videos diferentes para una campaña de Facebook e Instagram ADS, cada video debe ir en los dos formatos diferentes que acepta Meta (1080x1080 px y 1920x1080 px). Cada vídeo debe llevar subtítulos. Nosotros haremos entrega de los guiones y las escenas de cada video. PD. Favor enviar muestra y cotización del trabajo antes de contratar. Escogeremos el trabajo de más calidad y de mejor precio.

    £12 (Avg Bid)
    Guaranteed
    £12
    6 entries

    I'm on the hunt for a competent "funnel hacker" with specialized experience in creating and identifying sales & operational funnels. The scope of this project involves funnel hacking current successful sales funnels and breaking it down with in a flow chart. Your Experience: - A solid background in optimizing or 'hacking' funnels in the social media niche Project: - Identify the entire sales funnel of @lladosfitness on instagram, @llados ok TikTok & "LLADOS" on YouTube (700k ish followers) - Organize everything into a flow chart with visuals and clickable links - Make it very clear as to what needs to be done if one was to replicate the exact funnel & every sales avenue this person has - Include Google/Facebook ads that you f...

    £67 (Avg Bid)
    Featured Urgent
    £67 Avg Bid
    2 bids

    ...photopolymerization, with an Anycubic printer. I can provide remote access if needed. Tenho um arquivo em STL de seios da face, parte do meu mestrado. Infelizmente, tudo que consegui imprimir até o momento, apresenta o interior com traves muito grossas, numa região chamada de labirinto etmoidal, que na figura 2 está apontado com marcações vermelhas. Todas estas espessuras não podem passar dos 0,2mm. Anexei foto do labirinto, que segmentei na figura 3: infelizmente, as espessuras variam muito pelas segmentações automática e manual. Deste modo, a impressora produz um biomodelo mais espesso, especialmente nas junções das células. Isto dificulta a simulação cirúrgica, po...

    £99 (Avg Bid)
    £99 Avg Bid
    17 bids

    I'm i...intermediate-level ethical hacker to tackle Snapchat. The focus is pure white-hat, with the aim to understand and anticipate potential security weaknesses or vulnerabilities. Although designing strategies to mitigate these vulnerabilities isn't required, I appreciate your insights in this aspect. Required Skills and Experience: - Proven experience in ethical hacking - Knowledge in cybersecurity and data protection protocols - Familiarity with commonly used hacking tools and techniques - Previous practice with social media platform security or similar would be beneficial Please note, the essence of this project doesn't involve applying talent for any form of illegitimate activities. Information or suggestions that contravene these professional standard...

    £99 (Avg Bid)
    £99 Avg Bid
    15 bids

    I am the owner of a website and I need an expert in cyber security. My primary aim is to gain an understanding of the website's level of security, specifically focusin...understanding of security features, your role will be to: - Test the password strength, identifying any weaknesses - Provide a detailed report of your findings, and suggestions for improvement - Provide ethical hacking service with permission Due to the nature of the task, it's imperative that you have a solid background in computer security or a related field. Advanced knowledge and techniques in hacking such as ethical hacking, penetration testing, Apollo Database and computer systems are vital. Please note: all actions are authorised and fall within the legal boundaries. Only ethical ...

    £14 / hr (Avg Bid)
    £14 / hr Avg Bid
    6 bids

    I'm seeking a proactive, engaged, and experienced Community Manager for my Web3 Gaming Projec...partnerships with other Web3 Gaming projects, KOLs and Influencers; - Create attractive Web3 Quests campaigns - Creating engaging content daily - Actively engaging with and building our online community - Moderating discussions to maintain a positive community environment Ideal applicants should have excellent communication skills, experience managing Twitter and Discord communities, growth hacking experience in the Web3 space, and a passion for gaming. Familiarity with the Web3 environment will be a significant advantage. Please provide examples of communities you’ve grown and links to your created content. P.S. Would be great if you love playing board games and have played...

    £10 / hr (Avg Bid)
    £10 / hr Avg Bid
    13 bids

    I am the owner of a website and I need an expert in cyber security. My primary aim is to gain an understanding of the website's level of security, specifically focusin...understanding of security features, your role will be to: - Test the password strength, identifying any weaknesses - Provide a detailed report of your findings, and suggestions for improvement - Provide ethical hacking service with permission Due to the nature of the task, it's imperative that you have a solid background in computer security or a related field. Advanced knowledge and techniques in hacking such as ethical hacking, penetration testing, Apollo Database and computer systems are vital. Please note: all actions are authorised and fall within the legal boundaries. Only ethical ...

    £21 / hr (Avg Bid)
    £21 / hr Avg Bid
    13 bids

    ...WhatsApp Instagram link, linking to actual Instagram posts, page footer, application links on Google, and... others. 8. The delivery price when the amount is 49,000 or less equals 5,000, or 50,000 or more equals 0, and it now works like this. It was previously added by one of the developers. 9. Install important add-ons 10. Activate the most important methods of protecting the site from hacking, such as captcha and... 11. Cleaning the site from any malicious programs that may be present as a result of previously using unofficial add-ons. It is preferable to delete the entire site to ensure 100% cleaning, but while preserving the current content of the same products that are currently present by keeping a backup copy of them or.... 12. How can I keep a copy of the ...

    £406 (Avg Bid)
    £406 Avg Bid
    64 bids

    I'm in need of an expert in ethical hacking, cybersecurity, and penetration testing. The main task will be gaining access to an Android phone for the purpose of monitoring and surveillance. Specific activities to monitor include: - Call logs and messaging - Location tracking Extensive experience in similar projects is a must, with a focus on maintaining data integrity and confidentiality. Please, only ethical hackers need apply.

    £52 (Avg Bid)
    £52 Avg Bid
    5 bids

    As an individual, my primary concern is understanding and improving my phone's security. I am looking for an expert who can undertake the task of hacking my Android phone in a controlled environment, the main goal being to retrieve personal data. This is to help me understand potential vulnerabilities and assess measures I can take. Requirements for this project include: - Deep understanding of Android vulnerabilities - Significant experience in penetration testing - Ethical hacking skills - Absolute respect for privacy norms and understanding of ethical boundaries Communication is a vital component, I expect regular reports. Note, this project’s intention is purely security enhancement and not for any malicious intent. If you appropriately fit the criteria, pl...

    £140 (Avg Bid)
    £140 Avg Bid
    16 bids

    I'm in need of a knowledgeable and experienced cybersecurity trainer. The individual will provide comprehensive training for up to 10 students who are beginners in the field. Key Responsibilities: - Deliver training on Network Security, Ethical Hacking, and Data Privacy - Develop teaching materials appropriate for the beginner level - Monitor student's progress and provide actionable feedback Ideal Skills & Experience: - Strong proficiency in Network Security, Ethical Hacking, and Data Privacy - Previous experience in the role of instructor or trainer, especially with beginner-level students - Excellent communications and interpersonal skills - Ability to simplify complex concepts and foster engaging learning environment.

    £6 / hr (Avg Bid)
    £6 / hr Avg Bid
    8 bids

    ...emails and text messages. The ultimate aim is to harness the knowledge for the purposes of ethical hacking. Key focus areas: - Fundamentals of Email and Text Message Spoofing. - Core Concepts that Govern Ethical Hacking. - Understanding the Interface between Spoofing and Ethical Hacking. A potential candidate for this project will ideally have: - Extensive experience in cybersecurity and ethical hacking. - Innovative teaching skills to simplify complex concepts. - Proficiency in course structure and creation. Your assignment is to enlighten beginners with zero experience about the theory behind spoofing, imparting them the tools necessary to utilize this knowledge in the field of ethical hacking. Please note that the course should strictly follow ...

    £19 / hr (Avg Bid)
    £19 / hr Avg Bid
    20 bids

    ...Responsibilities: - Clean up my Wordpress site from any existing malware. - Update and remove any security issues. - Assure the site isn't susceptible to hacking in the future. - Resolve issues related to outdated plugins and suspicious file modifications. Additional Issues: - My reservation system has also been affected and is currently not functioning. Handling this issue efficiently would be a crucial part of the job. Ideal Skills: - Experience in WordPress security and handling malware issues. - Proficiency in managing outdated plugins and fixing suspicious file modifications. - Previous experience in dealing with issues like hacking and data breach. - Familiarity with security tools such as website firewall, Malware scanner, and login security plugin. If you...

    £43 / hr (Avg Bid)
    £43 / hr Avg Bid
    69 bids

    I'm on the lookout for a professional who can significantly increase the number of subscribers on my educational YouTube channel, which currently has 115 subscribers. Specifically, the results of this project should help me reach a broad...Specifically, the results of this project should help me reach a broader audience so that my educational content can touch and impact more kids. Key tasks of the project include: - Develop an effective growth strategy - Implement the strategy, with emphasis on organic growth - Suggest ways to improve content quality or delivery Ideally, you will have experience in: - YouTube channel growth hacking - Content strategising with an educational focus - Audience development and engagement Looking forward to transforming my channel with ...

    £6 - £14
    Sealed
    £6 - £14
    9 bids

    Clean up of , , reload existing files from onto domain. Make sure backend is secure, clean, plugins are not causing easy hacking. 2FA all sites

    £24 / hr (Avg Bid)
    £24 / hr Avg Bid
    1 bids

    I'm in need of an experienced professional for a sensitive project. The main objective is to monitor activity on a specific phone. ***...sensitive project. The main objective is to monitor activity on a specific phone. ***Key Responsibilities***: * Monitoring call logs and text messages * Monitoring social media activity * Mapping the geographical location ***Expected Frequency***: This is an ongoing project and the monitoring is expected to be done continuously. ***Ideal Candidate***: You should have proven experience in ethical hacking, data retrieving, and digital forensics. A deep understanding of mobile operating systems, mobile surveillance techniques, and privacy laws is expected. It's also crucial that you handle this project ethically, responsibly and with utm...

    £238 (Avg Bid)
    £238 Avg Bid
    3 bids

    I'm looking for a skilled growth hacker with experience in Search Engine Optimization (SEO), Social Media Promotion, and Content Marketing. The main goal of this project is to significantly increase traffic to my website to sell an e book. I'm targeting an international audience, hence an unders...targeting an international audience, hence an understanding of diverse digital landscapes is essential. Key Responsibilities: - Implement SEO strategies to enhance website visibility - Develop, manage, and track social media promotions - Create captivating content that will drive traffic Ideal Skills: - Prior experience in SEO, social media promotions, content marketing - Proven results in growth hacking - Deep understanding of international digital spaces - Excellent written c...

    £40 / hr (Avg Bid)
    £40 / hr Avg Bid
    36 bids

    ...result in loss of marks. 2. Technical Report Requirements You are required to write a professional report describing your exploitation process for each target. You must document all your attacks including all steps and commands issued. For each target machine you exploit, you must provide the target’s operating system name and IP address and detailed documentation to accompany the ethical hacking process. Your documentation should be thorough enough that your attacks can be replicated step-by-step by a technically competent reader....

    £149 (Avg Bid)
    £149 Avg Bid
    18 bids

    I'm seeking an experienced penetration tester to perform a black box testing on my website. The aim is to identify potential vulnerabilities that may be exploited by malicious actors. This role demands a thorough understanding of various hacking methods and the ability to implement latest penetration testing tools. Key Requirements: - Expertise in Black Box Penetration Testing. - In-depth knowledge of potential website vulnerabilities. - Familiarity with latest penetration testing tools and techniques. - Strong report-writing skills to document findings. Please share your previous experiences in website penetration testing, along with any relevant certifications. Your approach on how you would test the website vulnerabilities and prevent potential security risks is high...

    £27 / hr (Avg Bid)
    £27 / hr Avg Bid
    41 bids

    ...internal systems. The key focus of this task will be to monitor someone's activities on Snapchat, which I currently do not have access to. The scope of the project includes: 1. Monitoring Specific Information: - I'm primarily interested in observing the target's Snapchat password. To complete this project successfully, you will need: Skills & Experience Required: - Prior experience in ethical hacking or digital forensics. - An understanding of Snapchat's API and backend systems. - Ability to work discreetly and maintain confidentiality. Please note, this project adheres to all legal and ethical constraints, and any actions taken should respect the target person's privacy rights. Your proposal should include your approach to this task, examples...

    £152 (Avg Bid)
    £152 Avg Bid
    4 bids

    We're seeking a skilled Security Researcher/Ethical Hacker to identify and report vulnerabilities in our Jira Cloud application. The ideal candidate will have a proven track record in ethical hacking, with expertise in various security domains including XSS, SQL Injection, SSRF, etc. Responsibilities include conducting thorough security assessments, utilizing the Bugcrowd Vulnerability Rating Taxonomy for prioritization, and providing detailed reports on findings. This role requires a deep understanding of security protocols and a proactive approach to enhancing application security. I will provide link to the cloud application. The aim is to highlight all potential P1/P2/P3/P4. Deadline for assessment 18th March, I will then do the fixes

    £407 (Avg Bid)
    £407 Avg Bid
    27 bids

    ...which is out of state to meet diversity requirements? 2) Hacking into a privately owned website and placing malware on the site: The corporation's motive was to squash public knowledge of their illegal and unethical behavior which the plaintiff's website shared plus give pointers of how to best sue defendant if there was cause. 3) Civil rights issues because the website hack restricted the site owner's free speech as users' anti-malware software prevented them from visiting it or adversely affected their computers 4) Conspiracy charges because in a large corporation there must have been >1 person approving, planning and hacking. 5) Way of stating/showing sufficient proof for “preponderance of evidence” when all evidence of the hack...

    £205 (Avg Bid)
    £205 Avg Bid
    23 bids