Website vulnerabilities finder jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 website vulnerabilities finder jobs found, pricing in GBP

    ...will implement a robust user registration and authentication system. This section discusses the importance of secure authentication practices, such as password hashing and the use of access tokens, to prevent unauthorized access. 5. Input Validation and Sanitization: To mitigate the risk of security vulnerabilities, the application will implement strict input validation and sanitization techniques. This section emphasizes the importance of validating user input to prevent common vulnerabilities, such as SQL injection and cross-site scripting (XSS) attacks. 6. Secure Transaction Processing: The application will incorporate secure transaction processing mechanisms to ensure the integrity and confidentiality of financial transactions. This section discusses the implem...

    £209 (Avg Bid)
    £209 Avg Bid
    5 bids

    Arabic & English marketplace e-commerce on both website and mobile Strengths: Clear identification of technologies used (Widgets, JavaScript frameworks, Font scripts, Miscellaneous, Web servers, Programming languages, CDN, Maps, Development, Live chat, JavaScript libraries, UI frameworks). Potential use of Module Federation (50% sure) and Webpack (50% sure). Areas for Improvement: Technology Modernization: Consider upgrading libraries (jQuery, jQuery UI, Modernizr, Slick) to their latest versions or exploring modern alternatives (React, Angular, Vue.js) for better performance and maintainability. Component-Based Architecture: Refactor code into reusable components for improved maintainability and scalability, especially with React or Angular. Performance Optimization: Impleme...

    £227 (Avg Bid)
    £227 Avg Bid
    9 bids

    I'm seeking a skilled developer to create an innovative Islamic prayer app with e-commerce functionality. Key Features: - Prayer Time Notifications: The app must notify users of prayer times. - Qibla Direction Finder: It should include a reliable Qibla direction finder. - Quran Recitation: The app should have a feature for users to listen to Quranic verses. - Tasbeeh: Implement a digital version of the tasbeeh for users. - E-Commerce: I'd like the app to include e-commerce functionality with the following features: - Product Catalog: A user-friendly display of available products. - Shopping Cart: Users should be able to add items to their cart. - Payment Gateway Integration: Secure integration of a payment gateway for transactions. Target Platforms: - Th...

    £427 (Avg Bid)
    £427 Avg Bid
    70 bids

    I'm looking for an experienced SEO professional who can help me address some admin issues with my existing website. I need to clean up some back-end issues and resolve some admin tasks to improve SEO. Key Tasks: - Fixing broken links: The website has a number of broken links that need to be identified and rectified. - Optimizing database performance: I need help in ensuring that the database is running efficiently. - Resolving security vulnerabilities: The website has some security vulnerabilities that need to be addressed immediately. - Resolving toxic backlinks: I need help in identifying and disavowing toxic backlinks that could be harming the website's SEO. The ideal candidate for this project will have good references and is able to work...

    £10 / hr (Avg Bid)
    £10 / hr Avg Bid
    93 bids

    I am in search of a cybersecurity professional who can provide specialized assistance in the area of Network Security and Zero Trust Network Access. Your responsibilities will entail: - Securing my network against any potential threats and vulnerabilities - Implementing an effective Zero Trust Network Access system The ideal freelancer for this project would have: - Strong experience and expertise in network security and Zero Trust Network Access - Understanding of cybersecurity best practices - Demonstrable experience in protecting sensitive information and preventing cyber threats. Please note, familiarity and experience with any specific cybersecurity framework (NIST, ISO 27001, or CIS) is not necessary for this project. Your primary task will be to safeguard the network a...

    £18 / hr (Avg Bid)
    £18 / hr Avg Bid
    14 bids

    The website is compromised, that needs to be fixed. Also I want a more updated 2024 look and feel for the website. Following needs to be fixed: - Identify and resolve website security vulnerabilities. - Repairing any damage done to the site, ensuring it loads reliably. - Identifying and addressing any other vulnerabilities exposed by the hack - Thorough cleanup needed to remove malicious content/links (to casinos) - There are Google Search Console owners added, they needs to be removed incl. HTML verification file. - Other issues in Google Search Console needs to be fixed and all pages needs to be indexed. - Update all plugins and WordPress to latest versions. Remove unnecessary plugins. - Ensure HTTPS functions correctly on all pages. - Measures firewal...

    £40 (Avg Bid)
    £40 Avg Bid
    29 bids

    We are seeking an experienced penetration tester to join our team. As a penetration tester, you will be responsible for identifying and exploiting vulnerabilities in our systems to ensure they are secure. Your main tasks will include conducting vulnerability assessments, performing penetration testing, and providing recommendations for remediation. To excel in this role, you should have a strong understanding of various testing methodologies, possess analytical skills to interpret test results, and be familiar with a wide range of penetration testing tools and techniques. Skills required: - Penetration testing - Vulnerability assessment - Ethical hacking - Knowledge of network protocols - Familiarity with security frameworks - Strong problem-solving skills This is a medium-sized ...

    £406 (Avg Bid)
    £406 Avg Bid
    24 bids

    ...and system infrastructure. The primary objective of this task is to find potential security vulnerabilities. - Task Details: Your work will involve identifying weaknesses that could possibly be exploited to undermine our security controls and then testing how effective these controls truly are. - Approach: Please prioritize any vulnerabilities found according to threat severity level. I'm looking to focus on the most critical threats before handling the lesser ones. - Necessary Skills: Previous experience in network security, vulnerability assessment, and penetration testing is critical. You need to demonstrate a strong understanding of network and system infrastructure, its vulnerabilities, and security control mechanisms. This task requires a lot of...

    £81 (Avg Bid)
    £81 Avg Bid
    15 bids

    I've devised a dummy website primary for understanding log analysis which is a major concern in today's advanced technology world. To test its vulnerabilities, I require a well-rounded professional equipped with proficiency in PHP and Node.js. - Focus Area: Your tasks will encompass SQL injection techniques over my website's user login systems, data retrieving systems, and contact forms. - Skill Set: An experience with SQL injection tests is crucial. Knowledge of web technologies such as PHP and Node.js is essential. Understanding of website log analysis will also be advantageous. Your comprehensive reports on the performed tests and findings will enhance the robustness of my website and will aid in my understanding of the log analysis for fut...

    £33 (Avg Bid)
    £33 Avg Bid
    12 bids
    Trophy icon Memecoin Design & Solana Marketing 6 days left

    ...propose a unique idea for a Memecoin and describe how you would work with us to develop it and build a community that uses it. Key Aspects of the Memecoin: - **Unique Branding**: I need the Memecoin to have a distinctive branding that stands out and is easily recognizable. - **Secure Smart Contract**: Security is a top priority for this project. The smart contract must be robust and free from vulnerabilities. - **High Transaction Speed**: With Solana as the blockchain, the Memecoin should take advantage of its high transaction speeds. Target Audience: - **General Public**: I want the Memecoin to appeal to a wide audience. - **Crypto Enthusiasts**: Reaching out to those already invested in the crypto world is important. - **Memers and Internet Communities**: This group is cruc...

    £239 (Avg Bid)
    Featured Guaranteed Sealed
    £239
    12 entries

    ...for our customers while providing efficient management tools for our team. Requirements: E-commerce Website: Develop a responsive and user-friendly website similar to with the following features: -Product catalog with categories and filters -Shopping cart and checkout process -User registration and login -Order tracking and management -Payment gateway integration (e.g., PayPal, Stripe) with emphasis on security -Responsive design compatible with various devices -High performance and fast loading times even under heavy traffic conditions -Android and iOS Applications: Build native mobile applications for Android and iOS platforms with the same functionality as the website, including push notifications and seamless synchronization with the web version. Admin Panel...

    £1340 (Avg Bid)
    £1340 Avg Bid
    36 bids

    I'm looking to have an Automator workflow created that will work with a Safari page. The function of this workflow should be to take the current open web page (which I am viewing in Reader view) and save it as a pdf to the Finder, specifically, to a set folder on my device. Here's what I'm looking for: 1. **Compatibility:** The Automator workflow should be compatible with macOS Mojave. 2. **Naming the PDF:** The saved PDF needs to be automatically titled with the Date in a yyyy-mm-dd format at the beginning of the file name. The website always provides the remainder of the file name, which I want to keep. 3. **Additional Functionality:** No additional functions are required beyond saving the web page as named PDF to a specific folder. The ideal can...

    £110 (Avg Bid)
    £110 Avg Bid
    3 bids

    ...**Track the Unauthorized User**: Additionally, the freelancer should track the person who has taken over my account. It is essential to identify this user for legal and security reasons. I have already taken steps to secure my phone number by enabling a two-step verification process. Nonetheless, I need a professional who can help me regain access to my account and ensure that any potential vulnerabilities are addressed. The ideal candidate would have experience in: - Domain account recovery - Cybersecurity and hacking expertise - User tracking and identification techniques - Strong communication skills for coordinating with the domain provider's customer support Please note that this project is time-sensitive, and I am looking for a freelancer who can swiftly and efficie...

    £32 (Avg Bid)
    £32 Avg Bid
    6 bids

    ...the XSS payloads wordlist. -h, --help: Display help information. example: xss -L /Desktop/ -o /Desktop/ This tool checks parameters regardless of whether they are filtered or unfiltered. 5- Testing SQL: This tool automatically injects payloads into every input field on the selected website. For instance, if I select , the tool systematically scans all inputs on the website, injecting payloads to determine if SQL injection vulnerabilities exist. only these options I need: -u --url Options: -u, --url: Specify the target URL. -o, --output: Specify the output file path. -L, --list: Specify the URL list. -h, --help: Display help information. example: SqlInjection -L /Desktop/ -u -o /Desktop/

    £134 (Avg Bid)
    £134 Avg Bid
    29 bids

    ...smooth operation of the app. - Remote access: Create secure remote access policies to enable staff to work remotely without compromising the app's security. - Network security: Implement network security policies to protect the app from cyber threats and ensure data integrity. - Secure software development: I need you to incorporate best practices in secure software development to prevent vulnerabilities and ensure a robust app. Key Skills and Experience: - Proven experience in policy development within the IT sector. - Strong understanding of safety, customer service, and data privacy policies. - Knowledge of risk management, remote access, and network security practices. - Expertise in secure software development and capacity management. - Experience in anti-malware, back...

    £122 (Avg Bid)
    £122 Avg Bid
    20 bids

    Are you facing issues with your WordPress website and need expert help to resolve them quickly? Look no further! I'm here to offer you reliable and efficient WordPress troubleshooting services to get your website back on I Offer:Plugin Issues: If your plugins are causing conflicts or not functioning properly, I'll diagnose the problem and provide solutions to ensure smooth Problems: Whether it's layout issues, broken elements, or compatibility problems, I'll investigate and fix any issues with your WordPress Errors: From 404 errors to white screens of death, I'll identify the root cause of any site errors and implement fixes to restore Optimization: Slow loading times? I'll analyze your site's performance and make necessary optimizations

    £40 (Avg Bid)
    £40 Avg Bid
    1 bids

    I need assistance in evaluating current vulnerabilities and implementing necessary security measures. Ideal Candidate: - Robust experience in Cybersecurity, specifically in assessing and managing security vulnerabilities - Well-versed in small network management - Proficient in understanding and implementing effective security protocols and measures.

    £155 (Avg Bid)
    £155 Avg Bid
    29 bids

    ...developer to create a solution for local authorities and municipal bodies to streamline waste management processes. The ideal candidate should have experience in creating professional and corporate design interfaces and should have developed apps in the environmental or waste management sector. Main Features: - Real-time waste pickup tracking - An integrated payment system - Waste disposal location finder - Text message support - Dashboard management Key Skills: - Strong experience in UI/UX design with a portfolio of professional and corporate designs. - Proven ability in the development of similar waste management systems or environmental apps. - Expert knowledge in integrating payment systems. - At least 5 years of experience in mobile app development, preferably in ...

    £68 (Avg Bid)
    £68 Avg Bid
    30 bids

    ...seeking an experienced professional with proficiency in Node.js ( Framework) to comprehensively review my backend code. Key Responsibilities: - Inspect and evaluate the data handling and database management of my application. Any proposed modifications should aim at promoting the efficiency and performance of data flow within it. - Scrutinize the security implementation for potential vulnerabilities. Recommendations for enhancements should be accompanying any identified weak points. - Critically assess the performance and efficiency of the present code and propose changes that will render the backend of my application more effectively. Ideal Skills and Experience: - Extensive experience in backend code review is an absolute necessity, particularly in the context of Microser...

    £25 / hr (Avg Bid)
    £25 / hr Avg Bid
    14 bids

    In this project, I'm looking for someone knowledgeable in website security to guide me and others through hacking a basic blog. This is purely for educational purposes, aimed at raising awareness about potential security vulnerabilities that can be mitigated. Here's what you need: - Extensive knowledge of website vulnerabilities and how to exploit them ethically. - A clear understanding of blogging platforms - WordPress, Blogger, Tumblr, or custom-built sites. - The ability to develop a simple website for demonstration. - Excellent communication skills to explain complex techniques simply. Remember, this is not for malicious intent, but to educate on enhancing blog security.

    £23 (Avg Bid)
    £23 Avg Bid
    8 bids

    I'm looking for an experienced app developer to create a new property finder application. The application needs to be developed for both iOS and Android platforms and should be bilingual, supporting both English and Arabic languages. Important features include: - Property search: The app must provide ease in searching properties with effective filters. - Map integration: The app should incorporate map integration feature to display property locations. - User profiles: It needs to support user profiles for better user experience. Please note, offline usage of the app is not required at this stage. Candidates having experience in developing similar apps and fluency in English and Arabic will be given preference. Please submit your proposals along with your relevant work samples...

    £3083 (Avg Bid)
    £3083 Avg Bid
    111 bids

    Design and Implementation of an Application and Website Responsive User Interface (UI) Design: Ensure that the design functions smoothly and responsively on various devices such as desktop computers, tablets, and smartphones. Content Management System (CMS): A scalable database that allows easy addition, editing, and deletion of content. An easy-to-use management interface that allows instructors to efficiently manage courses and content. Student Management and Registration System: Capability for students to register and log in to their personal accounts. Detailed information about course progress and outcomes. Secure Payment System: Integration with trusted payment service providers such as Apple Pay and Mada, among others. Ensure that payment transactions are conducted securely a...

    £2338 (Avg Bid)
    £2338 Avg Bid
    204 bids

    I am searching for a skilled ethical hacker to perform a comprehensive "security audit" on an informational website. Responsibilities: - Testing and eliminating any potential security vulnerabilities. The ideal candidate should have: - P assionate - A mbitious - L eading - E xcellent - S mart - T alented - I mpressive - N oble This project is aimed at ensuring the website is safe from any unethical threats, ultimately safeguarding the audience's integrity and users' data.

    £54 (Avg Bid)
    £54 Avg Bid
    14 bids

    ...of my PHP-based website. I particularly need to ensure the website is compliant with OWASP Top 10 standards. Key Requirements: - User Authentication Testing: Verify the strength of our user authentication methods. The chosen freelancer should be able to effectively identify and exploit vulnerabilities in our user login process. - Authorization Controls Testing: We need thorough testing on the authorization controls in place to ensure that only authorized users can access specific resources. - Input Validation Testing: We need someone who can identify any weaknesses in the input validation of our website. This is crucial in preventing common security vulnerabilities like SQL injection and cross-site scripting. Ideal Skills: - Proven experience in eth...

    £100 (Avg Bid)
    £100 Avg Bid
    22 bids

    I am in need of a developer skilled in Python for a project concerning the creation of a tablet finder application compatible with Windows. The primary feature of this application must be search filters, specifically, those able to find tablets based on their MAC addresses. Ideal candidate would posses: - Proficient in Python - Experience in creating search filters - Familiar with MAC addresses - Working knowledge of Windows compatibility - Detail-oriented and able to work autonomously. The focus of this project is the development of a reliable application that can perform complex searches based on a tablet's MAC address. This is a specialized task requiring detailed and specific skill sets.

    £120 (Avg Bid)
    £120 Avg Bid
    11 bids

    ...designer with specific expertise in creating intuitive user interfaces and seamless user experiences. The task at hand involves crafting the UI/UX for a cutting-edge platform dedicated to attack surface management. Project Overview: Our goal is to develop a user-friendly platform that enables efficient management of attack surfaces, empowering users to identify, assess, and mitigate potential vulnerabilities effectively. As such, we require a designer who can translate complex functionalities into visually appealing and easy-to-navigate interfaces. Key Requirements: - Strong background in UI/UX design - Experience designing for attack surface management or other cybersecurity platforms - Proficient in creating interactive visualizations, intuitive navigation, and real-time moni...

    £353 (Avg Bid)
    £353 Avg Bid
    92 bids

    I am looking for a proficient cyber security researcher with an emphasis on securing various applications. The scope of work includes web applications, mobile applications, and desktop applications. Key Responsibilities: - Identify and correct various security vulnerabilities specifically: cross-site scripting (XSS), SQL injection, and session hijacking. - Devise strategies to enhance the security of all our applications. - Regularly conduct security checks to identify potential threats. Ideal skills: - Proven experience in securing different application platforms. - In-depth understanding of XSS, SQL injection, and session hi-jacking. - Comprehensive knowledge of network security and data protection. I need someone who is adept in application security to safeguard our digital ...

    £249 (Avg Bid)
    £249 Avg Bid
    12 bids

    For this project, I am looking for a seasoned system developer to build a network application which leverages improved security measures. This application needs to be capable of conducting precise user authentication using usernames...deliver comprehensive network traffic capture Ideal Skills: - Proficiency in Networks and Security, especially with the use of Sockets API - Practical experience in application/network development - Good understanding of Wireshark or similar network traffic analysis tools The captured network traffic will be used to: - Gauge the performance of the network - Identify potential security vulnerabilities - Diagnose and troubleshoot network-related issues Any demonstration of the ability to simplify this complex process in previous work will be highly...

    £76 (Avg Bid)
    £76 Avg Bid
    1 bids

    ...current project involves creating a GSM Man-In-The-Middle (MITM) system using OpenBSC and OsmocomBB. I need an expert to help me complete this project by intercepting calls and messages. Key requirements include: - Extensive knowledge and experience using OpenBSC, OsmocomBB and USRP B210 - Ability to work with the Motorola C118 phone - Solid understanding of MITM attack methodologies and GSM vulnerabilities - Familiarity with network security and testing procedures - Ability to provide a basic setup and operation guide upon completion The project is already in partial implementation stage, and I need someone to help finalize it, and ensure it can effectively intercept calls and messages. This will involve a combination of software and hardware work, so experience in both areas ...

    £1953 (Avg Bid)
    £1953 Avg Bid
    14 bids

    I'm seeking an expert in Long Language Models (LLM) to develop a model that can detect vulnerabilities using network traffic analysis. Key Requirements: - Experience with Long Language Models (LLM) such as GPT, BERT, etc.. - Previous work and experience in the field of cybersecurity, particularly in vulnerability detection. - Ability to design and implement a model that can accurately identify network traffic patterns associated with vulnerabilities. The successful freelancer should be able to: - Understand the nuances of different LLMs in order to choose the most suitable one for the task at hand. - Develop a robust vulnerability detection model using the chosen LLM. - Demonstrate their experience in cybersecurity and vulnerability detection. Please highlight your ex...

    £310 (Avg Bid)
    £310 Avg Bid
    30 bids

    ...that not only empowers my clients to modify content but also ensures the site is SEO and vulnerability friendly. (If you have knowledge on Drupal, I have existing project to update from Drupal 4 to latest version, that also will be ok with me) Key Features: - Content Editing Capabilities: The CMS should have a user-friendly WYSIWYG editor that allows clients to easily update and maintain their website content. - Media Management: The system should support media upload and management, ensuring seamless integration of images, videos, and other media. - Version Control: The CMS should have version control features, allowing users to track changes and revert to previous versions when needed. SEO Optimization Features: - SEO-Friendly URLs: The system should support custom URLs that...

    £422 (Avg Bid)
    £422 Avg Bid
    60 bids

    I'm looking for a skilled developer to help me resolve a specific CORS issue in my Java Spring application that's been dockerized. The issue seems to be specifically related to preflight requests. Key Points: - The application is built using Java Spring, and it's dockerized. Previous attempts to resolve the CORS issue have been unsuccessful. - Technologies used in my application do includ...in solving CORS-related issues. - React - Knowledge of best practices and common pitfalls when it comes to handling CORS with Spring Security and CorsFilter. The selected freelancer should be able to diagnose the issue quickly and provide an efficient resolution without introducing new problems. It's crucial that the fix doesn't compromise the security of the application or in...

    £25 (Avg Bid)
    £25 Avg Bid
    19 bids

    ...technical & business fields]. The cover should appeal to this audience without overly childish visuals. Concept: Frustrated Hacker vs. Robust Security I will provide the image/s to be used. Foiled Attacks: Depict common threats being repelled: A phishing email bouncing off a shield marked "MFA" A malicious bug labeled "Malware" squashed by a "Software Update" patch Other clever visualizations of vulnerabilities failing to be exploited... Background: Simple, perhaps a subtle tech-inspired pattern to avoid distraction Title/Tagline: Space for a bold title like "Hackers Hate This!" and a short tagline summarizing the book's focus. Style & Feel: Dynamic and lightly humorous, emphasizing the hacker's increasing frustratio...

    £22 (Avg Bid)
    £22 Avg Bid
    80 bids

    I'm in need of an expert who can effectively set up SMTP IMAP via dovecot exim on a Ubuntu server to send and receive emails fo...receive emails for my business. I have an existing domain and email address that will be integrated into this process. We have hestiacp installed. Here are the specific requirements: - Proficiency in dovecot exim, SMTP, IMAP, and familiarity with email clients like Outlook, Gmail or Apple Mail. - Excellent knowledge of Ubuntu server administration. - Ability to secure the email server from vulnerabilities. The server will be used for both internal and customer communication purposes, so the setup must be professional and reliable. If you possess these skills and can deliver high-quality work, kindly place your bid. Looking forward to a successful...

    £76 (Avg Bid)
    £76 Avg Bid
    10 bids

    ...developer to address a list of issues impacting my website's performance and security. Key Deliverables: - **Bugs Fixing**: The website currently has a number of bugs that need to be identified and fixed. While I have a list, it's not detailed so it will require some exploration on your part. - **Security Enhancements**: Beyond the bugs, I also need you to conduct a security audit to identify potential vulnerabilities and implement necessary fixes to ensure that user data is well protected. Ideal Experience: - Extensive experience in web development and bug fixing - Proven track record of improving website security - Familiarity with common security vulnerabilities and methods to mitigate them - Strong communication skills to explain the issues a...

    £66 (Avg Bid)
    £66 Avg Bid
    29 bids

    We've created a web-based HTML game but are facing issues with unusually high scores by some players. We suspect that there might be loopholes in the game's mechanics which are being exploited. Key Points for Freelancers: - We need an expert in HTML5-based game development. - The role is purely for auditing the game for security vulnerabilities, not for any development work. - Your application should primarily focus on your past work, especially in auditing and fixing security issues in HTML5 games. Communication: For updates and feedback, I prefer to communicate via email.

    £17 (Avg Bid)
    £17 Avg Bid
    12 bids

    As an enthusiast of Australian horse racing, greyhounds, and harness matches, I'm in dire need of a specialist who can construct a web application that accurately exposes true odds and positive expected value (EV). This tool will be specifically made to analyze selected Australian races. The ideal applicant should have excellent knowledge of: ...info delivery Having experience with Google Sheets API and databases is advantageous, though not a requirement. Expertise in these tech fields will make the application’s data gathering and management process considerably more effective. A passionate professional who understands the ins and outs of Australian races is preferred, but not mandatory. Get in touch if you can build this precise EV finder application. An exciting ...

    £102 (Avg Bid)
    £102 Avg Bid
    12 bids

    I need a professional, skilled in crafting modern and minimalistic aesthetics. You will be required to: - Build a user authentication system via email and password - Design and implement a comprehensive workflow we need a simple online laundry website to showcase some vulnerabilities and some ways to mitigate those vulnerabilities. Main features : Roles: Admin ( already exists ). washer ( need to be created ). customer ( already exist as a user role ). Actions: Admin: need to be able to control the app ( already exist ). Washer: need to see the new orders comes from the customers ( with all details ) and approve them + add the delivery date. Customer: need to sign up login + create a new order + see hisher own order history + see the pricing list page + track o...

    £171 (Avg Bid)
    £171 Avg Bid
    14 bids

    We have Magento website which need few tasks to do. 2. Site Speed / Database Optimization: Fix site speed when doing site search, using finder plugin and when navigating the subcategories on layered navigation.  E.g. click “Shop Parts”  , then click one of the menus on the left categories such as “Braking System”. Paging through category pages also same speed issues. a. I’ve tried enabling Ajax and still same issue with performance. b. Site search is using Elasticsearch but still very slow c. Need to aim for 1-2 seconds load time. 3 . Magento Checkout: a. Fix bug on Checkout page regarding address. “Error occurred” when we add an address in Magento admin, then customer tries to use the account to make a purchase. b. Im...

    £52 (Avg Bid)
    £52 Avg Bid
    16 bids

    I need a professional, skilled in crafting modern and minimalistic aesthetics. You will be required to: - Build a user authentication system via email and password - Design and implement a comprehensive workflow we need a simple online laundry website to showcase some vulnerabilities and some ways to mitigate those vulnerabilities. Main features : Roles: Admin ( already exists ). washer ( need to be created ). customer ( already exist as a user role ). Actions: Admin: need to be able to control the app ( already exist ). Washer: need to see the new orders comes from the customers ( with all details ) and approve them + add the delivery date. Customer: need to sign up login + create a new order + see hisher own order history + see the pricing list page + track o...

    £136 (Avg Bid)
    Urgent
    £136 Avg Bid
    19 bids

    I'm looking for an expert in game vulnerabilities and hacking to help me find weaknesses in an action game for Android. The end goal is to create a cheat that provides infinite currency in the game. Key Requirements: - Proficient in game hacking and security testing. - Experience with creating cheats for Android games. - Strong understanding of game mechanics. Your responsibilities will include: - Identifying vulnerabilities in the game. - Creating a cheat that provides unlimited currency. - Ensuring the cheat is compatible with the Android platform.

    £161 (Avg Bid)
    £161 Avg Bid
    9 bids

    I need a skilled developer to review the code of an existing PHP product. I'd like you to provide an in-depth analysis of how well the code is structured, and to what extent it supports security, performance, and scalability. Key focus areas for the review: - Security: Ensure the codebase is resilient to common vulnerabilities and threats. - Performance: Identify any bottlenecks or inefficiencies in the code that could be impacting performance. - Scalability: Assess how well the current codebase can accommodate future growth and expansion. I'm looking for the following in the ideal candidate: - Proficient in PHP with proven experience in code review and analysis. - Strong understanding of security best practices. - Experience in optimizing code for performance. - Knowle...

    £1776 (Avg Bid)
    £1776 Avg Bid
    74 bids

    I'm seeking an expert who can create logs for a synthetic scenario in Splunk. The purpose of this task is to analyze potential security vulnerabilities. Consequently, your focus should be on identifying types of requests made, as well as geographical sources of traffic. Logs should be generated hourly. Ideal Skills: - Extensive experience with Splunk - Solid understanding of network security - Familiarity with traffic analysis Your responsibilities: - Create and manage logs for the purpose of security analysis - Monitor specific traffic patterns, particularly the types of requests and geographical sources - Ensure logs are generated every hour.

    £13 (Avg Bid)
    £13 Avg Bid
    8 bids

    1. Project Overview ● Title: Texas Hold'em Poker Game ● Development Platform: Unity ● Blockchain Integration: Web3 with the integration of the coin token ...the contracts directory. Transaction Flow: Detailed flowcharts for all transaction processes are included in the flowcharts directory. 6. Issues and Challenges Critical Bugs: ● The betting logic has numerous bugs affecting gameplay fairness and must be prioritized. ● Performance Issues: Memory leaks observed during longer gameplay sessions need addressing. ● Security Concerns: Potential vulnerabilities in smart contract code for handling tokens. 7. Future Roadmap Planned Features: Introduction of tournament modes and leaderboards. Suggestions for Improvement: Refactoring the betting engine for better reliability and ...

    £2176 (Avg Bid)
    £2176 Avg Bid
    36 bids

    I'm looking for a skilled developer to help me build a file upload functionality for my website. Key Points: - The purpose of this feature is to allow users to upload CSV files. You will have to ensure that the system can handle this specific file format. - The feature needs to be integrated into a REST backend and a React frontend. Experience with these technologies is crucial. Additional Information: - You should ensure that the upload process is secure and efficient, safeguarding against any potential vulnerabilities. - The final version of the feature should be user-friendly and easy to navigate. Ideal Skills and Experience: - Proficiency in REST and React is a must. - Experience in building file upload functionalities, specifically handling CSV files would be ad...

    £29 (Avg Bid)
    Urgent
    £29 Avg Bid
    12 bids

    I'm in need of an expert in cybersecurity to help us to clarify and clearly explain 61 page of Questions that we have to respond. We need someone 100% fluent in english and who can also speak on the call. you'll help us on the cal...Candidate: - Fluent in English: Clear communication is crucial for this project. - Advanced Level Expertise: I require an expert with deep understanding and experience in cybersecurity. - Previous Experience: Proven track record in improving network security, data protection, and enterprise cybersecurity is a big plus. - Strong Analytical Skills: Must be able to identify potential risks and vulnerabilities and provide effective solutions. - Experience in Enterprise Security: Understanding of the unique challenges of ensuring cybersecurity at ...

    £5 - £10 / hr
    Sealed NDA
    £5 - £10 / hr
    3 bids

    ...ensuring the sites function smoothly. - Performance optimization: The programmer should be able to identify and implement strategies for enhancing the performance of the websites. This might involve streamlining code, improving server response times, and addressing other speed-related issues. - Security enhancements: Security is a top priority for us. The programmer should be able to identify vulnerabilities and implement necessary measures to enhance the security of the websites. - Regular maintenance: We need a programmer who can commit to providing regular maintenance, including bug fixes and updates as necessary. - New Ideas, SEO, Google .... and all necessary legal issues to be solved in regards of the EU Laws (the programmer should minimally know what we need from exis...

    £13 / hr (Avg Bid)
    £13 / hr Avg Bid
    148 bids