Ultimate Hacking Keyboard is an open-source, split USB keyboard designed for extreme productivity and ergonomics. I’m László Monda, founder of the UHK, and you’ll be working with me. I’ve written about 90% of the UHK firmware, but I don’t have enough time for it anymore, so I’m looking for a developer to maintain the firmware in the long run. ...
Hi, This is Santosh Chinnabathini. Highly skilled+experienced computer savvy professional. Always r...Marketing Social Media Marketing Local Marketing PPC/Conversion Rate Optz Email Marketing SEO Content Marketing Strategy Lead Generation Customer Acquisition Growth Hacking Digital Marketing Consulting Available: ✔ 24/7 available.
...view], [url removed, login to view] etc., no rented links, FFA sites, adult & porn sites, pharmacy sites, illegal websites, hate-based websites, violent websites, cracking or hacking websites, no blacklisted or spam sites, links from "bad neighborhood" sites (e.g. link farms, porn and so on), ping sites, etc. - No scraped content, mirror sites, orphaned
...(I will provide all content), with similar style to this site: [url removed, login to view] Site homepage plan will be sent trough direct message. Site must be made secure from hacking and withstand further pentesting. In your offer show examples of your work. You see what is needed so your bid price is final. Full payment will be released after completion
...warnings about unknowns. *Modular variable renamer executable/batch to be a maybe server side or on PC. Example every X days all program variables are renamed to prevent hacking. Might be good for MMO games. - uses a set of variable names and replaces them by appending data to old variable name or by encryption. - upon second execution
Hello, I'm looking for someone who could edit the source of 2D MMORPG engine in Visual Basic. **Simple project**
Hello, I'm looking for someone who could edit the source of VB 2D MMORPG engine, to add an attack animation for base characters. This is really micro - project.
Pictures will be provided if you know about the test cases and automation testing
Existing wordpress website has become unavailable to modify because admin credentials are lost. Its not mobile friendly and would like the existing site established on a new host and have some mobile features incorporated.
...followers steadily. I am looking for someone to guide me in the right directions on the purchase of the correct software tools like followliker. This followliker tool has a monthly fee and need your suggestion on other tools. Send me information on the better youtube videos on getting more followers slowly and organically. I am not trying to get
I'm looking for a Wordpress guru having expertise and experience in Pentesting - SQL Injection - XSS/cross-site scripting - Malware Removal... Experience in research in CMS Wordpress only. Please send your CV mentioning all your achievements, experience to me. Do not forget to add your email id and/or phone number for further ease of communication. Cheers, Boris
I have a logo for a computer hacking conference, I need to get it printed on a shirt, but the design needs to be expanded to add some shapes or something to make it a more interesting shirt. The shirt will be black or a dark colour. Ideally the design won't be too "chunky", as we don't want it to take up too much ink.
Our website is about Apple products and money saving deals. I am looking for someone who have an interest in what happening in the Apple world, in money saving and life hacking solutions. The job is to write one article a week about a news digest of those topics. And you will use our internal tool to send the newsletter to our subscribers.
Hello, I need someone with a decent assembly knowledge to dissasemble some dll files from an old online game, in order to find some loopholes, to get bonuses in-game. More details will be given through messages, I already made a little progress with it. Please bid if you're interested, will pay up to 200$, it should be a 2-3day job max. Thanks !
1. Experience in blackbox pentesting, offensive vulnerability scans, > social engineering, hacking > a. People who currently work at tech-positions for penetration testing > companies, cyber-security companies, infosec auditing, competitive > intelligence, vulnerability research, malware research > b. People who studied computer engineering,