Youtube mobile exploit jobs

Suodata

Viimeisimmät hakuni
Suodatusperuste:
Budjetti
asti
asti
asti
Taidot
Kielet
    Työn tila
    1,621 youtube mobile exploit työtä löytyi, hinnoittelu EUR
    I need a 1500 words researched article​ 3 päivää left
    VARMENNETTU

    I need you to write a research artic...scammers to use and abuse genuine people who put genuine effort and time. Also how is it ripping off only the genuine people on this platform whilst supporting scammers to exploit genuine people. Only serious and genuine writer with factual and well researched content would be allowed to work on this project.

    €25 / hr (Avg Bid)
    €25 / hr Keskimäär. tarjous
    26 tarjoukset

    ...which identifies the devices used. We would ask the selected Freelancer to be careful, this is an active network and we would wish to minimize any disruption to users. If an exploit will cause disruption (e.g. changing an existing user password) then tell us how you could have done this, but don't actually do it. If you carry out a change, indicate how

    €926 (Avg Bid)
    €926 Keskimäär. tarjous
    21 tarjoukset

    ...upload test, etc.), system application vulnerabilities and other content testing and [kirjaudu nähdäksesi URL:n] are better of a black hat 2. Use the Business Security Assessment Tool to exploit vulnerabilities within the scope of the assessment target and verify vulnerabilities such as Web application vulnerabilities, host operating system vulnerabilities, database

    €32869 (Avg Bid)
    €32869 Keskimäär. tarjous
    6 tarjoukset

    PROJECT DESCRIPTION Project Description I require a Python coded Microsoft Word (extension .doc) exploit builder/Tool to convert executable files extensions to .doc file extensions that can be opened with any version of MS office Word. The doc exploit must be SILENT type (Not Macro). The word document when opened must silently and automatically install

    €485 (Avg Bid)
    €485 Keskimäär. tarjous
    3 tarjoukset
    Penetration Test of External Network 3 päivää left
    VARMENNETTU

    ...which identifies the devices used. We would ask the selected Freelancer to be careful, this is an active network and we would wish to minimize any disruption to users. If an exploit will cause disruption (e.g. changing an existing user password) then tell us how you could have done this, but don't actually do it. If you carry out a change, indicate how

    €520 (Avg Bid)
    €520 Keskimäär. tarjous
    15 tarjoukset

    ...upload test, etc.), system application vulnerabilities and other content testing and [kirjaudu nähdäksesi URL:n] are better of a black hat 2. Use the Business Security Assessment Tool to exploit vulnerabilities within the scope of the assessment target and verify vulnerabilities such as Web application vulnerabilities, host operating system vulnerabilities, database

    €30146 (Avg Bid)
    €30146 Keskimäär. tarjous
    28 tarjoukset

    ...Requirements: Describe in detail the business problem the project solves or what opportunity does it take advantage of. 4. Solution: Explain the plan to solve the problem or exploit the opportunity. 5. Authorization: Note the people who have authorization throughout the project. 6. Appendix: This is where you attach papers supporting your proposal.

    €31 (Avg Bid)
    €31 Keskimäär. tarjous
    8 tarjoukset

    ...and I are working on an application to be introduced in China (living in Beijing at present moment). The application centers on the job market. Adjectives we are trying to exploit through this icon include: simplicity, calming, ease, fun, hopeful, and empowering. This project would be specifically for the application icon, not the logo of the company

    €18 (Avg Bid)
    €18 Keskimäär. tarjous
    16 tarjoukset

    ...speaking with the main person running that, he said that the script doesnt mass send snapchats, the individual’s score doesn’t change— he said that his team was able to find an exploit in Snapchat/ i posted this job before and was actually scammed :/ the guy sent me some files that i have no clue how to use- if someone could maybe look at those and get something

    €137 (Avg Bid)
    €137 Keskimäär. tarjous
    5 tarjoukset

    ...username and password and they are able to use a script to sign in and boost your snapchat score. I talked to the main developer and he said he decompiled the app, found what to exploit, reverse the app, and create the script. He said that there are actually no snapchats sent, its just something done in the coding that makes it appear as if you sent more snapchats

    €20 (Avg Bid)
    €20 Keskimäär. tarjous
    1 tarjoukset

    ...an Excel worksheet Inputdata are the blue cells Outputdata are the orange cells As webpages we have more flexibility to organize it than the simple worksheets, so let`s exploit it to make the pages more friendly. This is an application for users (engineers) to calculate the piles of a building. It needs: 1) Register/login system 2)Page to register

    €127 (Avg Bid)
    €127 Keskimäär. tarjous
    12 tarjoukset

    I am interested in learning ethical exploitation of websites. So i want to learn possible and common wordpress vulnerabilities in 2018 that we can exploit a website as quickly as possible. under few minutes preferably If there are any expert who can teach me without sparing anything. please bid.

    €144 (Avg Bid)
    €144 Keskimäär. tarjous
    13 tarjoukset

    I'm about to change platform, I'm transferring everything to magento2, to exploit the potential of magento2. So I need a magento expert, to help me with multilingual translations, use the Instagram shop function, to tag products and bring them directly to the payment on the website. improve SEO, use the "m2epro" extension to upload all products directly

    €161 (Avg Bid)
    €161 Keskimäär. tarjous
    29 tarjoukset

    Need to find entry point of an exploit used against my accounts yesterday. Find out what script was used and remove/ patch from it happening again

    €32 (Avg Bid)
    €32 Keskimäär. tarjous
    15 tarjoukset

    I'm looking for someone with a strong background in InfoSec to cover and teach me intermediate -> advanced memory corruption bug hunting as-well as exploit development in 64bit environments with exploit mitigations such as ASLR/DEP in place.

    €81 (Avg Bid)
    €81 Keskimäär. tarjous
    6 tarjoukset

    i need a python coder for refud a python script

    €158 (Avg Bid)
    €158 Keskimäär. tarjous
    9 tarjoukset

    We need to make some test exploit using Metasploit.

    €161 (Avg Bid)
    €161 Keskimäär. tarjous
    4 tarjoukset

    am a security engineer and i need a silent doc exploit for penetration testing

    €582 (Avg Bid)
    €582 Keskimäär. tarjous
    1 tarjoukset

    ...how to use them. [kirjaudu nähdäksesi URL:n] [kirjaudu nähdäksesi URL:n] 3. Develop a report describing what netbios is and how the attacker to a windows domain can exploit it . Give examples with specific tools. 4. Develop a report that describes what kerberos authentication is in a windows domain. 5. Develop a report that explains which the

    €111 (Avg Bid)
    €111 Keskimäär. tarjous
    6 tarjoukset

    ...how to use them. [kirjaudu nähdäksesi URL:n] [kirjaudu nähdäksesi URL:n] 3. Develop a report describing what netbios is and how the attacker to a windows domain can exploit it . Give examples with specific tools. 4. Develop a report that describes what kerberos authentication is in a windows domain. 5. Develop a report that explains which the

    €22 (Avg Bid)
    €22 Keskimäär. tarjous
    1 tarjoukset