Youtube mobile exploit työt

Suodata

Viimeisimmät hakuni
Suodatusperuste:
Budjetti
asti
asti
asti
Tyyppi
Taidot
Kielet
    Työn tila
    1,637 youtube mobile exploit työtä löytyi, hinnoittelu EUR
    Penetration Testing 02 1 päivä left
    VARMENNETTU

    Objectives 1. Analyse the given operating system for vulnerabilities. 2. Exploit all discovered vulnerabilities to gain root access to the operating system. 3. Produce a report summarizing your penetration testing processes and findings. Scope You are to plan and execute a penetration test of the computer system hosted in the VM, following

    €87 (Avg Bid)
    €87 Keskimäär. tarjous
    14 tarjoukset

    Objective to Achieve:- • Analyze any GNU/Linux Based operating system and analyze the choice operating system to understand the vulnerabilities. • Further exploit anyone of the discovered vulnerabilities and provide relevant prove for of the exploitation process. • Provide remediation strategy for the above exploited vulnerabilities and provide test

    €97 (Avg Bid)
    €97 Keskimäär. tarjous
    3 tarjoukset

    I need a reliable .jpg exploit

    €70 (Avg Bid)
    €70 Keskimäär. tarjous
    1 tarjoukset

    Objectives 1. Analyse the given operating system for vulnerabilities. 2. Exploit all discovered vulnerabilities to gain root access to the operating system. 3. Produce a report summarizing your penetration testing processes and findings. Preparation You are given a VMWare virtual machine containing a potentially vulnerable operating system

    €134 (Avg Bid)
    €134 Keskimäär. tarjous
    10 tarjoukset

    ... 3. Wearing our clothes will promote well-being. 4. Our clothes will be eco - friendly and sustainable. 5. It will be a fair trade company, that is it will not exploit labours and only work for empowering employment. 6. 100% Natural Inspired by nature, the benefits of organic and natural clothing are many. Not only wearing our clothes

    €17 (Avg Bid)
    Taattu
    €17
    94 työtä
    Trophy icon Design my book cover 1 päivä left

    ...pixelated paint program like GIMP. Back Cover Text: A controversial president is assassinated. In the ensuing confusion, demagogues seize power. Several world leaders act to exploit the situation, declaring war and invading the United States. The loss of electrical power, phone service, and the internet—along with the destruction of all forms of transportation—results

    €192 (Avg Bid)
    Taattu
    €192
    183 työtä

    ...before the rest have gained realization. In depth abilities to recognize indicators, drivers, and emerging markets behind different business models. We seek to identify and exploit applicable market forces by formulating ideas, comparing, and contrasting businesses to ensure the right analysis, strategies, and solutions for common and uncommon barriers

    €27 (Avg Bid)
    €27 Keskimäär. tarjous
    26 tarjoukset
    Penetration Testing Loppunut left

    ...will contain: 1. Brief rationale of the chosen methodology. 2. Details of the vulnerabilities you have discovered. Screenshot. 3. Descriptions of the exploits you used to exploit the discovered vulnerabilities. 4. Details of unsuccessful tests. 5. The process and techniques you used, including the tools and commands used. 6. Possible mitigations

    €97 (Avg Bid)
    €97 Keskimäär. tarjous
    14 tarjoukset

    Objective to Achieve:- • Analyze any GNU/Linux Based operating system and analyze the choice operating system to understand the vulnerabilities. • Further exploit anyone of the discovered vulnerabilities and provide relevant prove for of the exploitation process. • Provide remediation strategy for the above exploited vulnerabilities and provide test

    €51 (Avg Bid)
    €51 Keskimäär. tarjous
    3 tarjoukset

    So guys you know black ops 2 community servers needs to be comnected by server ip. We need to open game press console and write connec...press "escape" to open console and writes connect and ourserip automatic. This can be donne on autokey but idk my users to use autokey I want something like this. Is not a exploit is not cheating and is not macro.

    €18 (Avg Bid)
    €18 Keskimäär. tarjous
    2 tarjoukset

    Are you will familiar with ctfs? Buffer overflows? If you understand everything in this blog post: [kirjaudu nähdäksesi URL:n] Than let me know and I have a problem for you to solve!

    €49 (Avg Bid)
    €49 Keskimäär. tarjous
    3 tarjoukset

    Objective to Achieve:- • Analyze any GNU/Linux Based operating system and analyze the choice operating system to understand the vulnerabilities. • Further exploit anyone of the discovered vulnerabilities and provide relevant prove for of the exploitation process. • Provide remediation strategy for the above exploited vulnerabilities and provide test

    €127 (Avg Bid)
    €127 Keskimäär. tarjous
    4 tarjoukset

    I want a PDF or MS WORD or MS EXCEL download and execute exploit software to enable me build files to carry out the task.

    €1060 (Avg Bid)
    €1060 Keskimäär. tarjous
    19 tarjoukset

    ...90317 SSH Weak Algorithms Supported 4. HIGH 7.8 82101 Debian DLA-118-1 : linux-2.6 security update 5. SSH Server CBC Mode Ciphers Enabled and explain about each different exploit that can cause a impact to the company 1. CRITICAL 10.0 77823 Bash Remote Code Execution (Shellshock) 2. CRITICAL 10.0 78385 Bash Incomplete Fix Remote Code Execution Vulnerability

    €98 (Avg Bid)
    €98 Keskimäär. tarjous
    13 tarjoukset

    I have a site that was hacked with this exploit: [kirjaudu nähdäksesi URL:n] There's a wordpress, a magento, and a vbulletin site on this host. I just restored from a backup, and was hacked again. I restored from yet another backup, and want someone to go through and let me know if there

    €369 (Avg Bid)
    €369 Keskimäär. tarjous
    14 tarjoukset
    Project for Vapt S. Loppunut left

    ...report on the findings created. We would ask the selected Freelancer to be careful, these are active websites and we would wish to minimize any disruption to users. If an exploit will cause disruption (e.g. changing an existing user password) then tell us how you could have done this, but don't actually do it. If you carry out a change, indicate how

    €174 (Avg Bid)
    €174 Keskimäär. tarjous
    1 tarjoukset
    Game of Thrones RPG Loppunut left

    ...com/attachments/466232044725207042/466241991898824715/[kirjaudu nähdäksesi URL:n] 3. Habbocity API The platform where everyone play allow them to disposed of an code API, we will demand them the code to exploit some informations. TAKE CONTACT WITH THE CLIENT FOR THIS PART 4. Various epic functionnalities Once the character fully completed, almost all this content of this websi...

    €473 (Avg Bid)
    €473 Keskimäär. tarjous
    11 tarjoukset
    Roblox exploit Loppunut left

    i need alt delete,walkspeed,teleport,infinite jump,game gui for booga booga,jailbreak,bee swarm simulator and egg farm simulator

    €131 (Avg Bid)
    €131 Keskimäär. tarjous
    1 tarjoukset

    ...getting hit with hundreds of attacks daily. So it has forms that do allow query string and we do allow that but we have several people that are running thousands of scrips to exploit this ability. The are hitting our server at an unbelievable rate and this is causing the site to crawl. Simply put we need to take all precautions we can from being hacked

    €476 (Avg Bid)
    €476 Keskimäär. tarjous
    51 tarjoukset

    ...which identifies the devices used. We would ask the selected Freelancer to be careful, this is an active network and we would wish to minimize any disruption to users. If an exploit will cause disruption (e.g. changing an existing user password) then tell us how you could have done this, but don't actually do it. If you carry out a change, indicate how

    €984 (Avg Bid)
    €984 Keskimäär. tarjous
    27 tarjoukset

    ...upload test, etc.), system application vulnerabilities and other content testing and [kirjaudu nähdäksesi URL:n] are better of a black hat 2. Use the Business Security Assessment Tool to exploit vulnerabilities within the scope of the assessment target and verify vulnerabilities such as Web application vulnerabilities, host operating system vulnerabilities, database

    €36337 (Avg Bid)
    €36337 Keskimäär. tarjous
    4 tarjoukset

    PROJECT DESCRIPTION Project Description I require a Python coded Microsoft Word (extension .doc) exploit builder/Tool to convert executable files extensions to .doc file extensions that can be opened with any version of MS office Word. The doc exploit must be SILENT type (Not Macro). The word document when opened must silently and automatically install

    €484 (Avg Bid)
    €484 Keskimäär. tarjous
    3 tarjoukset

    ...which identifies the devices used. We would ask the selected Freelancer to be careful, this is an active network and we would wish to minimize any disruption to users. If an exploit will cause disruption (e.g. changing an existing user password) then tell us how you could have done this, but don't actually do it. If you carry out a change, indicate how

    €519 (Avg Bid)
    €519 Keskimäär. tarjous
    15 tarjoukset

    ...upload test, etc.), system application vulnerabilities and other content testing and [kirjaudu nähdäksesi URL:n] are better of a black hat 2. Use the Business Security Assessment Tool to exploit vulnerabilities within the scope of the assessment target and verify vulnerabilities such as Web application vulnerabilities, host operating system vulnerabilities, database

    €30534 (Avg Bid)
    €30534 Keskimäär. tarjous
    29 tarjoukset

    ...Requirements: Describe in detail the business problem the project solves or what opportunity does it take advantage of. 4. Solution: Explain the plan to solve the problem or exploit the opportunity. 5. Authorization: Note the people who have authorization throughout the project. 6. Appendix: This is where you attach papers supporting your proposal.

    €31 (Avg Bid)
    €31 Keskimäär. tarjous
    8 tarjoukset

    ...and I are working on an application to be introduced in China (living in Beijing at present moment). The application centers on the job market. Adjectives we are trying to exploit through this icon include: simplicity, calming, ease, fun, hopeful, and empowering. This project would be specifically for the application icon, not the logo of the company

    €18 (Avg Bid)
    €18 Keskimäär. tarjous
    16 tarjoukset

    ...speaking with the main person running that, he said that the script doesnt mass send snapchats, the individual’s score doesn’t change— he said that his team was able to find an exploit in Snapchat/ i posted this job before and was actually scammed :/ the guy sent me some files that i have no clue how to use- if someone could maybe look at those and get something

    €137 (Avg Bid)
    €137 Keskimäär. tarjous
    5 tarjoukset

    ...username and password and they are able to use a script to sign in and boost your snapchat score. I talked to the main developer and he said he decompiled the app, found what to exploit, reverse the app, and create the script. He said that there are actually no snapchats sent, its just something done in the coding that makes it appear as if you sent more snapchats

    €20 (Avg Bid)
    €20 Keskimäär. tarjous
    1 tarjoukset

    ...to write the name lowercase (treasuree, not TREASUREE). The logo should be close to the subject area, not complelety abstract, but may be simple. It may be interesting to exploit the ideas of both vault and containers/nodes (google Docker), but keeping the logo simple (minimalistic) enough. I prefer the flat style over the 3D. Please send only one

    €44 (Avg Bid)
    €44
    41 työtä

    ...an Excel worksheet Inputdata are the blue cells Outputdata are the orange cells As webpages we have more flexibility to organize it than the simple worksheets, so let`s exploit it to make the pages more friendly. This is an application for users (engineers) to calculate the piles of a building. It needs: 1) Register/login system 2)Page to register

    €126 (Avg Bid)
    €126 Keskimäär. tarjous
    12 tarjoukset

    I am interested in learning ethical exploitation of websites. So i want to learn possible and common wordpress vulnerabilities in 2018 that we can exploit a website as quickly as possible. under few minutes preferably If there are any expert who can teach me without sparing anything. please bid.

    €144 (Avg Bid)
    €144 Keskimäär. tarjous
    13 tarjoukset

    I'm about to change platform, I'm transferring everything to magento2, to exploit the potential of magento2. So I need a magento expert, to help me with multilingual translations, use the Instagram shop function, to tag products and bring them directly to the payment on the website. improve SEO, use the "m2epro" extension to upload all products directly

    €160 (Avg Bid)
    €160 Keskimäär. tarjous
    29 tarjoukset

    Need to find entry point of an exploit used against my accounts yesterday. Find out what script was used and remove/ patch from it happening again

    €32 (Avg Bid)
    €32 Keskimäär. tarjous
    15 tarjoukset

    I'm looking for someone with a strong background in InfoSec to cover and teach me intermediate -> advanced memory corruption bug hunting as-well as exploit development in 64bit environments with exploit mitigations such as ASLR/DEP in place.

    €79 (Avg Bid)
    €79 Keskimäär. tarjous
    6 tarjoukset

    i need a python coder for refud a python script

    €157 (Avg Bid)
    €157 Keskimäär. tarjous
    9 tarjoukset

    We need to make some test exploit using Metasploit.

    €160 (Avg Bid)
    €160 Keskimäär. tarjous
    4 tarjoukset

    am a security engineer and i need a silent doc exploit for penetration testing

    €581 (Avg Bid)
    €581 Keskimäär. tarjous
    1 tarjoukset

    ...how to use them. [kirjaudu nähdäksesi URL:n] [kirjaudu nähdäksesi URL:n] 3. Develop a report describing what netbios is and how the attacker to a windows domain can exploit it . Give examples with specific tools. 4. Develop a report that describes what kerberos authentication is in a windows domain. 5. Develop a report that explains which the

    €111 (Avg Bid)
    €111 Keskimäär. tarjous
    6 tarjoukset

    ...how to use them. [kirjaudu nähdäksesi URL:n] [kirjaudu nähdäksesi URL:n] 3. Develop a report describing what netbios is and how the attacker to a windows domain can exploit it . Give examples with specific tools. 4. Develop a report that describes what kerberos authentication is in a windows domain. 5. Develop a report that explains which the

    €22 (Avg Bid)
    €22 Keskimäär. tarjous
    1 tarjoukset

    I noticed your profile and would like to offer you my project. We can discuss any details over chat. Please k...overflow algorithm. Must have:linux,Python and above average Network Security Knowledge. 1. I need you to find devices on the net implementing shodan and 2. do a buffer overflow exploit . Its a little more detailed in that but its the gist.

    €43 (Avg Bid)
    €43 Keskimäär. tarjous
    4 tarjoukset
    Exploit needed Loppunut left

    I need you to develop some software for me. I would like this software to be developed using Python. exploit exe file in DOC/JPG/PDF file needed. The exploit bind an executable file with a .doc .pdf file, making the .exe invisible Skills: .NET, C Programming, C# Programming, C++ Programming, Javascript

    €140 (Avg Bid)
    €140 Keskimäär. tarjous
    7 tarjoukset

    exploit exe file in DOC/JPG/PDF file needed. The exploit bind an executable file with a .doc .pdf file, making the .exe invisible Skills: .NET, C Programming, C# Programming, C++ Programming, Javascript

    €131 (Avg Bid)
    €131 Keskimäär. tarjous
    1 tarjoukset

    You can search <python pdf exploit on youtube> to get more insight. I have attached one file. In here, I have added some sample script.

    €78 (Avg Bid)
    €78 Keskimäär. tarjous
    3 tarjoukset
    Tech Exploit Hub Loppunut left

    I need a logo designed.

    €17 (Avg Bid)
    €17 Keskimäär. tarjous
    31 tarjoukset

    ...possible; 4. The resize must be done in hardware. Connect "video_decode" component output to resize "component" input; 5. No software image manipulations! Implementation must exploit hardware-only functionality; 6. Do as little memory copy as possible. Frame data must be copied once from hardware buffer; 7. No memory leaks are allowed. I won't accept job

    €1690 (Avg Bid)
    €1690 Keskimäär. tarjous
    4 tarjoukset
    Design project Loppunut left

    I need a logo designed. Tech Exploit Hub

    €15 (Avg Bid)
    €15 Keskimäär. tarjous
    26 tarjoukset

    ...teacher is retired or outside the country). 2. It makes giving lectures easy on the teachers inside the class, without the need to write down. This enables the teacher to exploit the writing time for discussing and answering the students on their questions. 3. The ability to record the lecture just once without repeating it to each student, such

    €165 (Avg Bid)
    €165 Keskimäär. tarjous
    8 tarjoukset
    Builders Devs Loppunut left

    We build games more often and we can hire devs and builders. We also are game company and were more than that you can also make friends in our game and do not exploit it would be a perm ban.

    €474 (Avg Bid)
    €474 Keskimäär. tarjous
    25 tarjoukset

    ...username and password and they are able to use a script to sign in and boost your snapchat score. I talked to the main developer and he said he decompiled the app, found what to exploit, reverse the app, and create the script. He said that there are actually no snapchats sent, its just something done in the coding that makes it appear as if you sent more snapchats

    €149 (Avg Bid)
    €149 Keskimäär. tarjous
    11 tarjoukset
    Video making Loppunut left

    I work in a fin-tech startup in Delhi. We are rapidly expanding and wants to fully exploit the opportunities in video making as well. I need some great video makers/ professionals on an urgent basis.

    €104 (Avg Bid)
    Paikallinen
    €104 Keskimäär. tarjous
    27 tarjoukset