Phishing attack websitecông việc

Bộ lọc

Tìm kiếm gần đây của tôi
Lọc theo:
Ngân sách
đến
đến
đến
Loại
Nhiều kỹ năng
Ngôn ngữ
    Tình trạng công việc
    2,000 phishing attack website công việc được tìm thấy, giá theo USD
    animation 2d cho game unity Đã kết thúc left

    Làm animation cho nhân vật game bằng dragon bone hoặc spine File pts đã tách layer ( đầu, mình, chân tay, vũ khí ..) Animation gồm: idle, walk, attack, hit, death.

    $6 / hr (Avg Bid)
    $6 / hr Giá đặt trung bình
    2 lượt đặt giá

    I'm in need of a skilled developer to craft an AI-based firewall in a SaaS format. Features must include: - Real-time threat detection - Automated incident response - A user-friendly dashboard. The finished product will...skilled developer to craft an AI-based firewall in a SaaS format. Features must include: - Real-time threat detection - Automated incident response - A user-friendly dashboard. The finished product will need to be hosted on a direct server. For security, it must meet these criteria: - Basic security measures - Advanced threat detection and prevention - Customizable security rules - DDOS attack prevention. Applicants with a strong background in AI, SaaS development, and cloud computing are desired, particularly those with experience in high-securi...

    $324 (Avg Bid)
    $324 Giá đặt trung bình
    12 lượt đặt giá
    Urgent Malware Removal for Multiple Sites 5 ngày left
    ĐÃ XÁC THỰC

    I'm in urgent need of an expert in malware removal to assist me with cleaning up more than 5 of my websites. The affected websites are a mix of e-commerce and blog sites. The malware has caused significant issues on these sites, including: - Phishing attacks - All sites showing a white page and appearing to be disabled Your primary task will be to conduct a thorough clean-up of these sites, ensuring all malware is removed and that the sites are restored to their original state. Ideal Skills and Experience: - Proven experience with malware removal, particularly for multiple websites - Familiarity with e-commerce and blog sites - Ability to conduct a thorough clean-up without causing any additional damage - Knowledge of security best practices to prevent future incidents

    $90 (Avg Bid)
    $90 Giá đặt trung bình
    44 lượt đặt giá

    I'm looking for an expert in openbsc, osmocombb, and openbts GSM to help me with a project that includes the following key aspects: - **GSM Man-in-the-Middle (MITM):** The project also involves GSM man-in-the-middle functionality. This includes capabilities such as intercepting and analyzing GSM communications, modifying GSM network traffic, and manipulating GSM network authentication. Ideal Skills and Experience: - Proven experience with openbsc, osmocombb, and openbts GSM. - In-depth knowledge of GSM network setups, including voice calls, SMS, and base station capabilities. - Proficiency in network monitoring and analysis tools. - Previous experience with GSM man-in-the-middle implementations. - Excellent problem-solving skills to address any performance requirements that may ari...

    $2296 (Avg Bid)
    $2296 Giá đặt trung bình
    26 lượt đặt giá

    I am seeking a knowledgeable freelancer to deliver a well structured and robust report on Malware, Phishing, and Ransomware cyber attacks that occur prominently in Australia. This report is aimed at the general public and should therefore be written in a comprehensible and digestible manner. The goal is to provide a surveillant scan of key issues, impacts, and potential precautions, giving readers a thoughtful understanding of these cyber threats. To accomplish this project optimally, the required skills and experience include: - Proficiency in Cybersecurity and related topics - Extensive knowledge about Malware, Phishing, and Ransomware attacks - Strong research skills, with a keen focus on Australia - Excellent writing and communication skills, with experience in makin...

    $20 (Avg Bid)
    $20 Giá đặt trung bình
    36 lượt đặt giá

    Game Requirement Character : Male, full animation: Idle, run, attack, jump, die… Provide full UI and Game Asset Provide full sound and effect Number Map: 8 Number Boss: 8 Enemy for each map: 4-5 ( with full animation: idle, run, attack, die… ) Provide Game icon. Intergrate with Admob in game Intergrate shop IAP in game. Game can run on Mobile and PC also. Game resolution: Hozirontal 1920x1080

    $20 (Avg Bid)
    $20 Giá đặt trung bình
    6 lượt đặt giá

    I'm looking for a highly skilled machine learning expert to develop a solution that leverages supervised learning techniques to detect different types of side channel attacks . The solution should ideally be capable of adapting to various datasets. Key Responsibilities: - Development of detection model using supervised learning. - The model should be designed to adapt and learn from different datasets. - collecting data from Hardware level Ideal Skills & Experience: - Expertise in Machine Learning is mandatory, specifically in supervised learning techniques. - A strong understanding of cybersecurity and side channel attacks is required. - Familiarity with various datasets and hands-on experience in working with them. - A strong understanding of Microarchitecture analysis (reg...

    $467 (Avg Bid)
    $467 Giá đặt trung bình
    31 lượt đặt giá

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $29 (Avg Bid)
    $29 Giá đặt trung bình
    8 lượt đặt giá

    ...more than one occasion, IT staff highlighted specific concerns about a general lack of adequate security controls and policies. Then, just 3 months ago, the worst-case scenario was fully realized. All it took was a single, well-crafted phishing email with an embedded URL that redirected the unsuspecting recipient to the attacker’s website. Once that happened, a malicious executable was automatically installed on the user’s computer and quickly crawled the entire network, encrypting data. By the time the systems administrators discovered the nature of the attack, it was largely too late. Critical files all across the AvantPharm network had been encrypted and were unusable. To make things worse, the backup system in place was unmonitored and had been faili...

    $19 (Avg Bid)
    $19 Giá đặt trung bình
    95 lượt đặt giá

    I require a reliable and experienced developer to assist me in implementing a Content Security Policy (CSP) in my JavaScript application. Key Details: - Purpose: The primary goal of this CSP implementation is to prevent Cross-Site Scripting Attacks within the application. - Target Sources: The CSP should be configured to allow only self-hosted scripts...permitted. - Integrate the CSP seamlessly with the existing application architecture, ensuring no disruptions in functionality. Ideal Skills and Experience: - Proficiency in JavaScript and web application security. - Prior experience with Content Security Policy implementations. - Understanding of and its usage in specifying content sources. - Knowledge of common Cross-Site Scripting (XSS) attack vectors and mitigation strategies.

    $12 (Avg Bid)
    $12 Giá đặt trung bình
    13 lượt đặt giá

    ...implementing a captcha to prevent spam emails, I continue to receive phishing attempts. I'm looking for a professional who can enhance my current captcha system or propose an alternative solution to effectively block these unwanted emails. Key Requirements: - Expertise in web security and spam prevention, particularly against phishing attempts. - Proven experience in implementing and optimizing captcha systems. - Familiarity with various types of captchas, especially text-based ones. - Strong communication skills to explain the solution and potential maintenance requirements. It's important that the chosen solution doesn't disrupt the user experience or the functionality of the contact form, while effectively filtering out phishing emails.

    $136 (Avg Bid)
    $136 Giá đặt trung bình
    73 lượt đặt giá

    Description: We are looking for an experienced cybersecurity professional to conduct a comprehensive penetration test for our Magento 2 website hosted on AWS. The objective is to identify and address any vulnerabilities that may compromise the security of our e-commerce platform. Project Scope: Conduct a thorough penetration test on our Magento 2 website hosted on AWS infrastructure. Identify and exploit potential vulnerabilities in the web application and AWS environment. Provide a detailed report outlining all identified vulnerabilities, severity levels, and recommended remediation measures. Collaborate with our development team to prioritize and address security issues. Requirements: Proven experience in penetration testing for Magento 2 websites and AWS environments. P...

    $178 (Avg Bid)
    $178 Giá đặt trung bình
    21 lượt đặt giá

    We recently experienced a malware attack on our system and we're seeking an expert who can ensure this doesn't happen again in the future. We don't require data recovery services; our main priority is to make sure it never happens again. Ideal candidates should possess: - In-depth experience in counteracting malware attacks - Mastery in various security domains such as network, application, and endpoint security - Proven track record in enhancing system security

    $128 (Avg Bid)
    $128 Giá đặt trung bình
    20 lượt đặt giá

    EL bot debe poder operar en varios DEX usando flashloans como caracteristica pricipal, las oportunidades de las transacciones las debe buscar en los mempool de los contratos inteligentes de cada DEX. Tambien debe poder hacer frontrunning de las transsacciones The bot must can operate on many DEX using flashloans like principal function, the oportunities of transaction have to l...caracteristica pricipal, las oportunidades de las transacciones las debe buscar en los mempool de los contratos inteligentes de cada DEX. Tambien debe poder hacer frontrunning de las transsacciones The bot must can operate on many DEX using flashloans like principal function, the oportunities of transaction have to look for in the mempool of the Contratcs of the DEX. must can do frontrunning,and sandwich ...

    $149 (Avg Bid)
    $149 Giá đặt trung bình
    22 lượt đặt giá

    ...detailed, comprehensive video tutorial on email phishing techniques. The primary aim of this tutorial is to serve as a research resource in the field of email phishing. The ideal candidate for this project should be well-versed in the following areas: - Email phishing: The freelancer should have a comprehensive understanding of various email phishing techniques that are prevalent in the cyber world. - Video tutorial creation: The tutorial should be engaging and easy to follow for users who may not be experts in the field. - Cybersecurity: A general understanding of cybersecurity principles would be beneficial to ensure accurate portrayal of email phishing threats and preventive measures. The video should encompass all aspects of email phishing...

    $38 (Avg Bid)
    $38 Giá đặt trung bình
    47 lượt đặt giá

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $11 (Avg Bid)
    $11 Giá đặt trung bình
    7 lượt đặt giá

    I'm seeking the expertise of a data scientist or machine learning engineer to develop a model for classifying various types of attacks on a KDD dataset. The ideal candidate will have extensive knowledge in the use of autoencoders for feature extraction and GRU models. Key project elements include: * Professionals will need to implement an autoencoder for feature extraction with the core goal of reducing data dimensionality. Prior experience in working with high-dimensional data and in deploying autoencoders is necessary. * Subsequently, the system built should be capable of classifying Denial of Service (DoS), User to Root (U2R), and Probe attacks within the KDD dataset. Good working knowledge of GRU models and the mentioned attacks is required. * The project includes steps to ensure...

    $34 (Avg Bid)
    $34 Giá đặt trung bình
    8 lượt đặt giá

    ...are: 1- create multiple python code for the below: A- encrypt a file with rsa and calculate the needed time and resources. B- encrypt a file with ecc and calculate the needed time and resources. C- decrypt the encrypted files using two quantum algorithms with out any keys (attack) and calculate the needed time and resources. D- encrypt a file with one of post quantum encryption algorithms and calculate the needed time and resources. E- decrypt the quantum encrypted files using quantum algorithms with out any keys (attack) and calculate the needed time and resources. 2- prepare full package with the needed libraries and codes that is requested above. 3- for quantum computer you should connect with ibm quantum computer. 4- all requirement should be delivered in three days. ...

    $293 (Avg Bid)
    $293 Giá đặt trung bình
    27 lượt đặt giá

    I'm looking for a skilled professional to conduct a network security test on our workstations using ARP poisoning techniques. The focus of this project is to identify vulnerabilities in the network and provide a detailed description of each one. Key Requirements: - Conducting ARP poisoning attack on our network - Identifying and exploiting vulnerabilities on workstations - Compiling a detailed report on the vulnerabilities found Ideal Skills and Experience: - In-depth knowledge of networking protocols and security - Previous experience with ARP poisoning attacks - Ability to produce detailed and comprehensive security reports - Familiarity with common network vulnerabilities and their exploitation This is a critical project for us, and we are looking for someone with signifi...

    $64 (Avg Bid)
    $64 Giá đặt trung bình
    15 lượt đặt giá
    SAAS-BOILERPLATE Customization Đã kết thúc left

    I'm looking to modify the SAAS-BOILERPLATE open-source project to create an interactive membership website for indie filmmakers and film students. NOTE: MOST of the required functions are already implemented in the boilerplate. You do NOT need to connect Stripe integration. REQUIREMENTS: - Customize the user interface with a simple, clean layout ready for collaboration with a web designer - Integrate member-only content with limited access by tier / user group - I need all content (except for content specifically labeled FREE tier) to be locked until users sign up that tier and only allow access if account has paid for the month. - each tier needs a playlist (with main image and text) for multiple videos and SVG animations

    $553 (Avg Bid)
    Nổi bật
    $553 Giá đặt trung bình
    64 lượt đặt giá

    I am seeking a skilled freelancer to help me create a data collection tool for an intrusion detection system. This system's main purpose is to collect data for analysis, focusing on network traffic. Key tasks include: - Designing a new normal and attack dataset using Mininet WiFi - The focus is on detecting Denial of Service (DoS) and Man-in-the-Middle (MitM) attacks Ideal candidates should have experience: - Building intrusion detection systems - Working with Mininet WiFi - Handling network traffic data - Familiarity with DoS and MitM attacks This tool will greatly aid in identifying and preventing future network attacks by providing structured data for our analysis team.

    $350 (Avg Bid)
    $350 Giá đặt trung bình
    3 lượt đặt giá
    Craft a Phishing Email Đã kết thúc left

    I am looking for a professional to craft a deceptive phishing email that targets famous people for school. Ideal Skills and Experience: - Proficiency in crafting phishing emails - Experience in targeting specific personas - Creativity in making the email engaging - Awareness of ethical considerations in this type of project Project 1: Craft a Phishing Email Description: Phishing emails are increasingly more accurate and deceptive. In this project, you will do your own research to craft your own. Research what makes a “good” phishing email. Specifically how to manipulate sender information, what subjects are best to use, what type of language is effective, etc Choose your favorite celebrity and write them a phishing email (consider th...

    $16 (Avg Bid)
    $16 Giá đặt trung bình
    6 lượt đặt giá
    Cryptogrphy expert Đã kết thúc left

    More details: What specific expertise in cryptography are you looking for? Cryptanalysis techniques What is the primary goal of the cryptanalysis project? Questions that include groups, algorithms, attack. not help from chatGPT or any AI Which cryptographic algorithms or protocols are you currently using or planning to use in your project? Hash functions collisions and more. There is a file with question for example, if you can answer on this question with out any AI we can proceed i will pay good for each question you answer :)

    $208 (Avg Bid)
    $208 Giá đặt trung bình
    12 lượt đặt giá

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $17 (Avg Bid)
    $17 Giá đặt trung bình
    5 lượt đặt giá

    Wordpress site not opening need to fix now may be attack?

    $5 / hr (Avg Bid)
    $5 / hr Giá đặt trung bình
    81 lượt đặt giá

    Vui lòng Đăng Ký hoặc Đăng Nhập để xem thông tin.

    Nổi bật Niêm phong Cuộc thi hàng đầu NDA

    I'm on the lookout for a season...expertise in computer security. Key Project Objectives: - Assessment and improvement of network security - Implementation of secure protocols, with a specific focus on http3 - Thorough analysis and counteracting of cyber security threats - Network traffic analysis under attack conditions Ideal Skills and Experience: - Profound knowledge in network security and cyber security - An adept understanding and experience in http3 - Proven experience in security threat mitigation - Prior experience handling network traffic analysis under attack conditions Please note that only candidates with expert-level experience in the above-mentioned fields will be considered. This project demands the highest level of proficiency and professional acumen...

    $28 / hr (Avg Bid)
    $28 / hr Giá đặt trung bình
    21 lượt đặt giá

    I am in need of a skilled cybersecurity professional with specific experience in DDoS threats. The purpose of this project is to capture and analyze DDoS attack traffic from our corporate network. With your help, I aim to: - Identify patterns that indicate a potential DDoS threat - Understand our network's vulnerabilities to these specific attacks - Develop a proactive defense system through learned network behavior Please note, this project requires experience with corporate network environments, analysis of DDoS network traffic, and a deep understanding of network defense systems.

    $224 (Avg Bid)
    $224 Giá đặt trung bình
    11 lượt đặt giá

    I need an accomplished Ethical Hacker with expertise in domestic surveillance and more. Key tasks I am looking for include: - Network penetration testing to ensure the security of my local network - Web application testing, to scrutinize and fortify the security of my web applications - Email phishing simulation, to evaluate the resistance and response of my existing systems to phishing attempts The main purpose of this project is to investigate suspected infidelity. Therefore, absolute discretion and professionalism are required. The ideal candidate should have extensive experience with these tasks and demonstrate a keen eye for detail. I want this project to be completed as soon as possible, without compromising on the quality of work.

    $46 / hr (Avg Bid)
    Gấp
    $46 / hr Giá đặt trung bình
    8 lượt đặt giá

    I'm seeking a seasoned Evilginx phishlet creator who can craft a custom YAML script for Evilginx 3. This script needs advanced functionalities, such as a custom login page, enhanced phishing email templates, and custom phishing targets to mimic Email service providers. The project's main purpose is to help understand and avert phishing tactics in the context of security research. Your role will involve studying and imitating phishing techniques focused primarily on mimicking email service providers. Existing experience in cybersecurity, knowledge of phishing techniques and the ability to mimic them effectively is crucial for this task. Familiarity with YAML scripts for Evilginx 3 will also be beneficial.

    $108 (Avg Bid)
    $108 Giá đặt trung bình
    80 lượt đặt giá

    ...effectively design and create a customized antivirus program. The distinctive features that should be incorporated include: - Real-time Scanning: The antivirus must perform regular checks to detect potential threats in the system. - Firewall Protection: It should incorporate a network security feature that monitors and controls incoming and outgoing network traffic. - Phishing Detection: An essential feature to protect against phishing scams by analyzing and blocking suspicious websites. - Another specific function that's going to be told after hiring, it requires excellent programming skills in the area. Meanwhile, the target operating system for this particular project will be Windows and Android. As for the support for multiple user accounts, a decision is ye...

    $451 (Avg Bid)
    $451 Giá đặt trung bình
    87 lượt đặt giá

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $66 (Avg Bid)
    $66 Giá đặt trung bình
    8 lượt đặt giá

    ...with expertise in Node.js, React, and the MEAN stack (MongoDB, , Angular, and Node.js) to develop a comprehensive cybersecurity training and phishing simulation web application. This platform aims to enhance organizational cybersecurity awareness and preparedness by providing a wide range of features including user management, training content management, phishing simulation, and comprehensive reporting and analytics. Exmaple of Similar Platform for you to refer- 1)Knowbe4(Includes both phishing and training plaform)- 2) GoPhish( Open source Phishing Simulation coded in go ) - Core Features of the Platform: User Management: Integration with Active Directory (AD), Single Sign-On

    $4592 (Avg Bid)
    $4592 Giá đặt trung bình
    72 lượt đặt giá

    I'm urgently in search of a certified and empanelled vendor who can perform a comprehensive scan for both my web and mobile applications. Key Tasks: - Conduct thorough scans to identify any potential vulnerabilities. - Draw up a comprehensive report detailing any findings. Ideal Candidate: - Comprehensive knowledge of different attack vectors is mandatory, even though no specific concern is prioritized for this project. - Proven experience as an empanelled vendor is compulsory. - Must be able to work under tight deadlines, as the completion of this project is ASAP.

    $340 (Avg Bid)
    $340 Giá đặt trung bình
    11 lượt đặt giá

    I need a knowledgeable freelancer to create dynamic and engaging info-graphics that bring information security awareness to life. These should focus on, but not restrict to: - Cyber attacks and threat mitigation - Privacy laws and data protection - Safe online habits and phishing The target audience will stretch from employees and students to the general public. All designs must be delivered in PDF format. Ideal candidates should have prior experience in graphic design, a keen attention to detail, and a solid understanding of cybersecurity concepts. Previous experience in creating info-graphics for a similar audience will be appreciated. Your ability to translate complex info into easily digestible and visual formats will be crucial for this role.

    $82 (Avg Bid)
    $82 Giá đặt trung bình
    137 lượt đặt giá

    I need a skilled content creator to build some riveting videos for an educational course I'm developing. Your rol...developing. Your role will primarily involve: - Creating moderate animation rivaling basic visual effects for approximately 1 minute long videos - Assigning an engaging voiceover to each of the videos, since voiceover provision falls under your responsibility - Focusing on using illustrative infographics as the preferred visual style Given the technical nature of the subject matter, which focuses on phishing scam awareness, it would be a plus if you have previous experience delivering similar projects. The ideal candidate must possess strong animation skills, a keen attention to briefs details, proficiency in infographic design, and an ear for identifying engag...

    $131 (Avg Bid)
    $131 Giá đặt trung bình
    53 lượt đặt giá

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $66 (Avg Bid)
    $66 Giá đặt trung bình
    7 lượt đặt giá

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $82 (Avg Bid)
    $82 Giá đặt trung bình
    14 lượt đặt giá

    Per country analysis of Distributed Denial of Service attacks We have been collecting data on UDP reflection based Distributed Denial of Service attacks since 2014. There are significant differences in attack patterns between countries (time of day, day of week, target of attack) and in response to global interventions targeting DDoS. This project would involve drilling down in to the per-country data to understand what is going on and why.

    $137 (Avg Bid)
    $137 Giá đặt trung bình
    28 lượt đặt giá

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $37 (Avg Bid)
    $37 Giá đặt trung bình
    11 lượt đặt giá

    I have a small website running on Zencart that apparently suffered a DDoS attack 3 days ago and the website is still down. Now my clients can't visit the site, I've contacted Hostgator (I have a shared server account there) and I've been told I have "web bots crawling my site at unmanaged speeds"... I tried to set longer crawl delays and installed the CloudFlare but the website is still down... Any ideas how to bring the website up and running again?

    $23 (Avg Bid)
    $23 Giá đặt trung bình
    15 lượt đặt giá

    I'm seeking a seasoned Java developer for an immediate project involving the construction of a Spring Boot filter. The main task centres on the creation and implementation of a filter for all incoming requests to the controller, specifically designed to combat XSS attacks and remove Zero Width Space (ZWSP) characters. Key Project Requirements: - Develop a Spring Boot application filter. - The filter must effectively handle and block all potentials XSS attacks. - The filter must efficiently remove all encountered ZWSP characters. - The developed filter must suitably plug into a Spring Boot application. - The filter should be designed to handle high networking traffic smoothly. Test Cases Require to Cover: - Scenarios of filtering XSS attacks. - Scenarios that deal with the removal o...

    $139 (Avg Bid)
    $139 Giá đặt trung bình
    7 lượt đặt giá

    I require a comprehensive analysis of various attack surface management companies. The major areas to focus on include: 1. Features: This includes an exhaustive evaluation of the following: - Vulnerability scanning - Asset discovery - Risk assessment - Configuration management 2. Pricing: Provide a detailed overview of each company's pricing structure along with proof. 3. Effectiveness: I'm interested in a thorough evaluation of the effectiveness of each company's software/services. The ideal freelancer for this job should possess an in-depth understanding of cybersecurity software and services. Experience in writing reviews and comparisons of software is a bonus. The review is to be delivered in a concise, easy-to-comprehend report. Please include C...

    $108 (Avg Bid)
    $108 Giá đặt trung bình
    25 lượt đặt giá

    I'm seeking an expert in cyber security who can provide a list of over 1000 phishing websites target Saudi Arabia. The list should specifically target websites such as similar domain names to legitimate sites, suspicious URLs, Presence of fake login pages. Your role will be critical in identifying these potentially harmful phishing websites. The perfect freelancer will have a strong background in cyber security, particularly in phishing detection. Experience in website analysis and a keen eye for detail will be highly beneficial.

    $170 (Avg Bid)
    $170 Giá đặt trung bình
    13 lượt đặt giá

    We require an individual capable of crafting a comprehensive proposal encompassing our array of vulnerability assessment and penetration testing services, including: 1) Vulnerability Assessment and Penetration Testing for Web Applications, Mobile Applications, N...comprehensive proposal encompassing our array of vulnerability assessment and penetration testing services, including: 1) Vulnerability Assessment and Penetration Testing for Web Applications, Mobile Applications, Networks, Infrastructures, and Active Directories. 2) Social Engineering Assessments. 3) Physical Security Evaluations. 4) Red Teaming Exercises. 5) Purple Teaming Collaborations. 6) Attack Surface Management. 7) Source Code Analysis. 8) Software Composition Analysis (SCA). 9) Dynamic Application Security Testi...

    $23 / hr (Avg Bid)
    $23 / hr Giá đặt trung bình
    22 lượt đặt giá

    Our company is in need of a sophisticated network phishing tool that will be self-installing and fully operational to scrutinize our local network critically. This unique software should have the capability to: - Scour our network for any phishing attempts - Generate inclusive reports concerning any phishing attempts - Detect and alert any sham domains, deceptive email addresses, and counterfeit external links - Validate the security of all emails by identifying any changes made remotely to any links. - Port check octet check (OMFA 419) (Khartun table) protocols GRU IKE SMTC SSH unlicenced products. - Ports 8080 443 etc traffic routing per app per user per port. This network phishing tool is expected to be seamlessly compatible with various operating systems,...

    $12 / hr (Avg Bid)
    $12 / hr Giá đặt trung bình
    8 lượt đặt giá

    ...and Refine.) • Identify and Fill Gaps: Look for content gaps within my niche. Providing information that is currently unavailable, underexplored or make a very difficult and scientific explanation, to a much-understood language. • Share my Unique Perspective: Incorporate personal insights and experiences. This can offer a fresh angle on common topics. • Always think on a new angle / approach to attack the keywords subject, by using use data, graphs, synthesis data and key takeaways, focus on Quality. • Engage with my Audience; Make a Recognizable Impact, Ensure my content makes a noticeable difference in my audience's knowledge or experience. • Cite my Sources Properly: When using information, facts, quotes, or ideas from others, citing my sources n...

    $895 (Avg Bid)
    $895 Giá đặt trung bình
    12 lượt đặt giá
    Research Proposal -- 2 Đã kết thúc left

    I want to get a topic in Ransomware and write on Ransomware attack effects on IT Businesses.

    $117 (Avg Bid)
    $117 Giá đặt trung bình
    53 lượt đặt giá

    ...and Refine.) • Identify and Fill Gaps: Look for content gaps within my niche. Providing information that is currently unavailable, underexplored or make a very difficult and scientific explanation, to a much-understood language. • Share my Unique Perspective: Incorporate personal insights and experiences. This can offer a fresh angle on common topics. • Always think on a new angle / approach to attack the keywords subject, by using use data, graphs, synthesis data and key takeaways, focus on Quality. • Engage with my Audience; Make a Recognizable Impact, Ensure my content makes a noticeable difference in my audience's knowledge or experience. • Cite my Sources Properly: When using information, facts, quotes, or ideas from others, citing my sources n...

    $2465 (Avg Bid)
    $2465 Giá đặt trung bình
    26 lượt đặt giá