Filtrer

Mes recherches récentes
Filtrer par :
Budget
à
à
à
Type
Compétences
Langues
    État du travail
    2,000 attack ddos travaux trouvés au tarif de EUR

    recherche de administrateur réseau performant et de préférence FR pour bloquer des attaques tcp udp etc sur iptables ou voir pourquoi pas autoriser seulement des frames si possible afin de laisser aucune place aux attaques dos ddos.

    €173 (Avg Bid)
    €173 Offre moyenne
    5 offres
    Tunnel Gre S'est terminé left

    Bonjour, Je cherche quelqu'un pour faire un tunnel gre (script) avec des ports ouvert avec deux serveurs. Serveur A : Celui avec une protection ddos Serveur B : Celui qui heberge les jeux

    €2 - €6 / hr
    €2 - €6 / hr
    0 offres
    Unity project S'est terminé left

    ...-------------------------------------------------------- You will design a simple mobile augmented reality application under Unity with Vuforia. You have two possible projects: - A treasure hunt: where the user must scan targets and then answer a question to give rise to the next question. o I scan A => The question is displayed in AR, I answer, it gives me the location of target B - A Zombie attack, using positioning in space (or on the ground). Show you a gun which when clicked shoots against Zombies coming towards you o It's up to you to determine the terms of the game (+ Zombies in 60 sec? Do not cross a line? etc.)...

    €291 (Avg Bid)
    €291 Offre moyenne
    6 offres
    Firewall DDOS S'est terminé left

    Bonjour, Nous sommes un petit serveur FIVEM, et nous subissons d'énormes attaques DDOS. J'ai commencé par bloquer les pays étrangers, bloquer les requêtes en fonction du nombre etc, mais ce n'est pas suffisant (via iptables). Je recherche quelqu'un en capacité de bloquer ces attaques sur le long terme. Notre serveur est chez OVH, et c'est principalement du DDOS UDP. Merci

    €185 (Avg Bid)
    €185 Offre moyenne
    8 offres
    ReConfigurer un serveur nginx S'est terminé left

    Bonjour, Je suis à la recherche d'une personne qui pourrait reconfigurer mon nginx pour qu'il supporte le plus possible d'utilisateur. J'aimerai que le serveur nginx et la configuration php-fpm résiste à des ddos layer 7. Merci de proposer des prix dans un budget abordable.

    €29 (Avg Bid)
    €29 Offre moyenne
    7 offres

    Realization of security attack simulations on SDN (Software defined networks) on a virtual environment using kali linux Attacks like Dos, arp poisoning... the important thing is to have the steps to follow up in order to perform an attack on SDN It's possible to exploit the openflow protocol vulnerabilities on this simulation It's for my bachelor project !!! On network security field Thank you

    €220 (Avg Bid)
    €220 Offre moyenne
    3 offres
    cree un site de tchat est annonce S'est terminé left

    je cherche une personne capable de crée un site comprenant un tchat avec annonce et abonnement multilingue avec protection anti ddos

    €458 (Avg Bid)
    €458 Offre moyenne
    40 offres

    I'm in need of a skilled developer to craft an AI-based firewall in a SaaS format. Features must include: - Real-time threat detection - Automated incident response - A user-friendly dashboard. The finished product wi...a skilled developer to craft an AI-based firewall in a SaaS format. Features must include: - Real-time threat detection - Automated incident response - A user-friendly dashboard. The finished product will need to be hosted on a direct server. For security, it must meet these criteria: - Basic security measures - Advanced threat detection and prevention - Customizable security rules - DDOS attack prevention. Applicants with a strong background in AI, SaaS development, and cloud computing are desired, particularly those with experience in high...

    €304 (Avg Bid)
    €304 Offre moyenne
    12 offres

    ...with implementing security measures within AWS, particularly leveraging AWS WAF, AWS IP Reputation, and AWS CloudTrail. Key Responsibilities: - Implement rigorous access control policies to ensure only authorized personnel can access our resources. - Configure and fine-tune AWS WAF to establish robust web application firewall rules, block specified IP addresses, and provide protection against DDoS attacks. - Set up and monitor AWS IP Reputation, ensuring that any malicious IP addresses are effectively blocked from our system. Skills and Experience: - Proven experience in implementing AWS security measures, particularly with AWS WAF, AWS IP Reputation, and AWS CloudTrail. - Strong understanding of encryption protocols and access control policies within AWS. - Experience with mo...

    €433 (Avg Bid)
    €433 Offre moyenne
    18 offres

    I'm looking for an expert in openbsc, osmocombb, and openbts GSM to help me with a project that includes the following key aspects: - **GSM Man-in-the-Middle (MITM):** The project also involves GSM man-in-the-middle functionality. This includes capabilities such as intercepting and analyzing GSM communications, modifying GSM network traffic, and manipulating GSM network authentication. Ideal Skills and Experience: - Proven experience with openbsc, osmocombb, and openbts GSM. - In-depth knowledge of GSM network setups, including voice calls, SMS, and base station capabilities. - Proficiency in network monitoring and analysis tools. - Previous experience with GSM man-in-the-middle implementations. - Excellent problem-solving skills to address any performance requirements that may ari...

    €2153 (Avg Bid)
    €2153 Offre moyenne
    26 offres

    WHM clearing malware, sent ddos attaks reported ip abuse

    €47 (Avg Bid)
    €47 Offre moyenne
    1 offres

    Game Requirement Character : Male, full animation: Idle, run, attack, jump, die… Provide full UI and Game Asset Provide full sound and effect Number Map: 8 Number Boss: 8 Enemy for each map: 4-5 ( with full animation: idle, run, attack, die… ) Provide Game icon. Intergrate with Admob in game Intergrate shop IAP in game. Game can run on Mobile and PC also. Game resolution: Hozirontal 1920x1080

    €19 (Avg Bid)
    €19 Offre moyenne
    6 offres

    I'm looking for a highly skilled machine learning expert to develop a solution that leverages supervised learning techniques to detect different types of side channel attacks . The solution should ideally be capable of adapting to various datasets. Key Responsibilities: - Development of detection model using supervised learning. - The model should be designed to adapt and learn from different datasets. - collecting data from Hardware level Ideal Skills & Experience: - Expertise in Machine Learning is mandatory, specifically in supervised learning techniques. - A strong understanding of cybersecurity and side channel attacks is required. - Familiarity with various datasets and hands-on experience in working with them. - A strong understanding of Microarchitecture analysis (reg...

    €438 (Avg Bid)
    €438 Offre moyenne
    31 offres

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €27 (Avg Bid)
    €27 Offre moyenne
    8 offres

    I have a AWS Infrastructure setup project requiring expertise in Cloudfront NLB and protection using WAF. As the goal is targeted at content distribution and load balancing, proficiency i...want end user to access website on EC2 IIS with custom ports like 8080, 5440 etc and not standard 80 or 443. User will be providing url with port number and on IIS different website is binded with different port number. For WAF, protective measures against DDoS attacks, SQL injections, and XSS attacks are necessary. Thus, an understanding of these areas is also needed. Skills and experience: - Proficient in AWS services (Amazon EC2, ELB, Cloudfront and Amazon S3) - Knowledge of Cloudfront NLB - Experience with WAF - Understanding of DDoS attacks, SQL injections, and XSS attacks protecti...

    €142 (Avg Bid)
    €142 Offre moyenne
    31 offres

    ...the time the systems administrators discovered the nature of the attack, it was largely too late. Critical files all across the AvantPharm network had been encrypted and were unusable. To make things worse, the backup system in place was unmonitored and had been failing backup jobs for months, so they did not have a reliable way to restore the encrypted data. AvantPharm narrowly averted complete disaster by paying the attackers one of the largest ransomware payments in history; 25 million dollars. However, they nearly lost the business when the attacker took 2 full weeks to return control of their data as well, so the impact was further damaging to profitability and reputation. In the end, the company barely weathered the attack and resumed operations at reduced capacity o...

    €18 (Avg Bid)
    €18 Offre moyenne
    95 offres

    I require a reliable and experienced developer to assist me in implementing a Content Security Policy (CSP) in my JavaScript application. Key Details: - Purpose: The primary goal of this CSP implementation is to prevent Cross-Site Scripting Attacks within the application. - Target Sources: The CSP should be configured to allow only self-hosted scripts...permitted. - Integrate the CSP seamlessly with the existing application architecture, ensuring no disruptions in functionality. Ideal Skills and Experience: - Proficiency in JavaScript and web application security. - Prior experience with Content Security Policy implementations. - Understanding of and its usage in specifying content sources. - Knowledge of common Cross-Site Scripting (XSS) attack vectors and mitigation strategies.

    €11 (Avg Bid)
    €11 Offre moyenne
    13 offres

    ...vulnerabilities, severity levels, and recommended remediation measures. Collaborate with our development team to prioritize and address security issues. Requirements: Proven experience in penetration testing for Magento 2 websites and AWS environments. Proficiency in industry-standard tools and techniques for vulnerability assessment. Strong understanding of web application security principles and common attack vectors. Excellent communication skills. Deliverables: Detailed penetration testing report. Regular progress updates and communication. How to Apply: Please submit your proposal with details of your experience, approach to penetration testing, and proposed timeline and cost estimates. Additionally, include any relevant certifications or references. Thank you for your i...

    €167 (Avg Bid)
    €167 Offre moyenne
    21 offres
    System Security Specialist Required S'est terminé left

    We recently experienced a malware attack on our system and we're seeking an expert who can ensure this doesn't happen again in the future. We don't require data recovery services; our main priority is to make sure it never happens again. Ideal candidates should possess: - In-depth experience in counteracting malware attacks - Mastery in various security domains such as network, application, and endpoint security - Proven track record in enhancing system security

    €120 (Avg Bid)
    €120 Offre moyenne
    20 offres

    I'm urgently looking for a skilled professional to help me secure my website against DDoS attacks, specifically focusing on DNS amplification. work over any disk only must be now !

    €44 (Avg Bid)
    €44 Offre moyenne
    50 offres

    EL bot debe poder operar en varios DEX usando flashloans como caracteristica pricipal, las oportunidades de las transacciones las debe buscar en los mempool de los contratos inteligentes de cada DEX. Tambien debe poder hacer frontrunning de las transsacciones The bot must can operate on many DEX using flashloans like principal function, the oportunities of transaction have to l...caracteristica pricipal, las oportunidades de las transacciones las debe buscar en los mempool de los contratos inteligentes de cada DEX. Tambien debe poder hacer frontrunning de las transsacciones The bot must can operate on many DEX using flashloans like principal function, the oportunities of transaction have to look for in the mempool of the Contratcs of the DEX. must can do frontrunning,and sandwich ...

    €140 (Avg Bid)
    €140 Offre moyenne
    22 offres

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €10 (Avg Bid)
    €10 Offre moyenne
    7 offres
    Autoencoder & GRU Attack Classifier S'est terminé left

    I'm seeking the expertise of a data scientist or machine learning engineer to develop a model for classifying various types of attacks on a KDD dataset. The ideal candidate will have extensive knowledge in the use of autoencoders for feature extraction and GRU models. Key project elements include: * Professionals will need to implement an autoencoder for feature extraction with the core goal of reducing data dimensionality. Prior experience in working with high-dimensional data and in deploying autoencoders is necessary. * Subsequently, the system built should be capable of classifying Denial of Service (DoS), User to Root (U2R), and Probe attacks within the KDD dataset. Good working knowledge of GRU models and the mentioned attacks is required. * The project includes steps to ensure...

    €32 (Avg Bid)
    €32 Offre moyenne
    8 offres
    Quantum Encryption Python Developer S'est terminé left

    ...are: 1- create multiple python code for the below: A- encrypt a file with rsa and calculate the needed time and resources. B- encrypt a file with ecc and calculate the needed time and resources. C- decrypt the encrypted files using two quantum algorithms with out any keys (attack) and calculate the needed time and resources. D- encrypt a file with one of post quantum encryption algorithms and calculate the needed time and resources. E- decrypt the quantum encrypted files using quantum algorithms with out any keys (attack) and calculate the needed time and resources. 2- prepare full package with the needed libraries and codes that is requested above. 3- for quantum computer you should connect with ibm quantum computer. 4- all requirement should be delivered in three days. ...

    €275 (Avg Bid)
    €275 Offre moyenne
    27 offres

    I'm looking for a skilled professional to conduct a network security test on our workstations using ARP poisoning techniques. The focus of this project is to identify vulnerabilities in the network and provide a detailed description of each one. Key Requirements: - Conducting ARP poisoning attack on our network - Identifying and exploiting vulnerabilities on workstations - Compiling a detailed report on the vulnerabilities found Ideal Skills and Experience: - In-depth knowledge of networking protocols and security - Previous experience with ARP poisoning attacks - Ability to produce detailed and comprehensive security reports - Familiarity with common network vulnerabilities and their exploitation This is a critical project for us, and we are looking for someone with signifi...

    €60 (Avg Bid)
    €60 Offre moyenne
    15 offres
    SAAS-BOILERPLATE Customization S'est terminé left

    I'm looking to modify the SAAS-BOILERPLATE open-source project to create an interactive membership website for indie filmmakers and film students. NOTE: MOST of the required functions are already implemented in the boilerplate. You do NOT need to connect Stri...for webdesigner collaboration (squarespace has an interesting version that is attached below to the project) IDEAL FREELANCER PROFILE: - Have previous experience with backend development using Laravel PHP - security-focused emphasis on security against attacks on webapps - experience minimizing the attack surface of webapps - Understand how to integrate video hosting in SaaS

    €519 (Avg Bid)
    À la une
    €519 Offre moyenne
    64 offres

    I am seeking a skilled freelancer to help me create a data collection tool for an intrusion detection system. This system's main purpose is to collect data for analysis, focusing on network traffic. Key tasks include: - Designing a new normal and attack dataset using Mininet WiFi - The focus is on detecting Denial of Service (DoS) and Man-in-the-Middle (MitM) attacks Ideal candidates should have experience: - Building intrusion detection systems - Working with Mininet WiFi - Handling network traffic data - Familiarity with DoS and MitM attacks This tool will greatly aid in identifying and preventing future network attacks by providing structured data for our analysis team.

    €328 (Avg Bid)
    €328 Offre moyenne
    3 offres
    Cryptogrphy expert S'est terminé left

    More details: What specific expertise in cryptography are you looking for? Cryptanalysis techniques What is the primary goal of the cryptanalysis project? Questions that include groups, algorithms, attack. not help from chatGPT or any AI Which cryptographic algorithms or protocols are you currently using or planning to use in your project? Hash functions collisions and more. There is a file with question for example, if you can answer on this question with out any AI we can proceed i will pay good for each question you answer :)

    €195 (Avg Bid)
    €195 Offre moyenne
    12 offres

    ...developer, with strong proficiency in developing dynamic, engaging, and user-friendly business websites, primarily centered around information technology services. Key Areas: - Showcase Services: Foremost, the website should beautifully present my key services which are Cybersecurity Managed Solutions ,Vulnerability Assessment and management, disaster recovery as a service, SOC as a service, DDoS mitigation, penetration testing, cloud computing security, and Incident Response. - Lead Generation: A flawless mechanism for capturing leads and inquiries is essential. Thus, effective CTAs, contact forms, and pop-ups, etc., should be correctly integrated. - Website Features: The website must feature video content to grab the attention of the viewer, must feature case studies, cl...

    €446 (Avg Bid)
    €446 Offre moyenne
    116 offres
    Robust pfsense Public Subnet Setup S'est terminé left

    I'm looking for a network specialist to set up my pfsense for public subnet, prioritizing network security. Specifically, my main concerns are: - Malware attacks - Distributed Denial of Service (DDoS) attacks - Intrusion attempts The setup should be designed to accommodate more than 50 connected devices. The ideal freelancer for this project should have advanced knowledge and experience in network security, specifically in dealing with the aforementioned threats. A strong background in pfsense setup and load balancing is also essential.

    €157 (Avg Bid)
    €157 Offre moyenne
    9 offres

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €16 (Avg Bid)
    €16 Offre moyenne
    5 offres

    Wordpress site not opening need to fix now may be attack?

    €5 / hr (Avg Bid)
    €5 / hr Offre moyenne
    81 offres

    Veuillez vous inscrire ou vous connecter pour voir les détails.

    À la une Scellé Meilleur concours LDN

    I'm on the lookout for a season...expertise in computer security. Key Project Objectives: - Assessment and improvement of network security - Implementation of secure protocols, with a specific focus on http3 - Thorough analysis and counteracting of cyber security threats - Network traffic analysis under attack conditions Ideal Skills and Experience: - Profound knowledge in network security and cyber security - An adept understanding and experience in http3 - Proven experience in security threat mitigation - Prior experience handling network traffic analysis under attack conditions Please note that only candidates with expert-level experience in the above-mentioned fields will be considered. This project demands the highest level of proficiency and professional acumen...

    €26 / hr (Avg Bid)
    €26 / hr Offre moyenne
    21 offres
    Ubuntu OpenVPN Fail2ban Setup S'est terminé left

    I'm in need of a security expert to properly configure Fail2ban on my Ubuntu server that is dedicated to filter and protect my OpenVPN setup. Your task will be to ensure that Fail2ban effectively mitigates the threat of: - Brute force attacks - DDoS attacks - Unauthorized login attempts Ideal Skills Include: - Strong knowledge of Ubuntu - Experience setting up and configuring Fail2ban - Understanding of NGINX Note: I am running a NGINX service with free openvpn for a local and private tunnel between The Server and many clients from a script.

    €31 (Avg Bid)
    €31 Offre moyenne
    10 offres

    I'm seeking a professional to conduct a smooth transition of my CDN services from StackPath to Cloudflare. The reason for this migration is not focusing on better performance, cost savings, or additional features, but, potentially, for multiple reasons or for reasons not listed here. This project doesn't have any specific requirements in regards to DDoS protection, global content delivery, or HTTPS support, however, having general experience with CDN migrations and infrastructures will be beneficial. Requirements: - Background in managing CDN services - Knowledge of StackPath and Cloudflare platforms - Mitigation plans for potential downtime during the migration Please include any relevant past work, experiences and detailed project proposals to boost your application...

    €31 (Avg Bid)
    €31 Offre moyenne
    22 offres

    I am in need of a skilled cybersecurity professional with specific experience in DDoS threats. The purpose of this project is to capture and analyze DDoS attack traffic from our corporate network. With your help, I aim to: - Identify patterns that indicate a potential DDoS threat - Understand our network's vulnerabilities to these specific attacks - Develop a proactive defense system through learned network behavior Please note, this project requires experience with corporate network environments, analysis of DDoS network traffic, and a deep understanding of network defense systems.

    €210 (Avg Bid)
    €210 Offre moyenne
    11 offres

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €62 (Avg Bid)
    €62 Offre moyenne
    8 offres

    I'm urgently in search of a certified and empanelled vendor who can perform a comprehensive scan for both my web and mobile applications. Key Tasks: - Conduct thorough scans to identify any potential vulnerabilities. - Draw up a comprehensive report detailing any findings. Ideal Candidate: - Comprehensive knowledge of different attack vectors is mandatory, even though no specific concern is prioritized for this project. - Proven experience as an empanelled vendor is compulsory. - Must be able to work under tight deadlines, as the completion of this project is ASAP.

    €319 (Avg Bid)
    €319 Offre moyenne
    11 offres

    Developing an application on the Ryu controller in an SDN network. Initially, I aim to process data. Next, establish a Al agent for detecting and mitigating DDoS attacks. Finally, generate graphical curves to illustrate the results.

    €173 (Avg Bid)
    €173 Offre moyenne
    14 offres

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €62 (Avg Bid)
    €62 Offre moyenne
    7 offres

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €77 (Avg Bid)
    €77 Offre moyenne
    14 offres

    Per country analysis of Distributed Denial of Service attacks We have been collecting data on UDP reflection based Distributed Denial of Service attacks since 2014. There are significant differences in attack patterns between countries (time of day, day of week, target of attack) and in response to global interventions targeting DDoS. This project would involve drilling down in to the per-country data to understand what is going on and why.

    €128 (Avg Bid)
    €128 Offre moyenne
    28 offres

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €35 (Avg Bid)
    €35 Offre moyenne
    11 offres
    DDoS recovery for my Zencart Site S'est terminé left

    I have a small website running on Zencart that apparently suffered a DDoS attack 3 days ago and the website is still down. Now my clients can't visit the site, I've contacted Hostgator (I have a shared server account there) and I've been told I have "web bots crawling my site at unmanaged speeds"... I tried to set longer crawl delays and installed the CloudFlare but the website is still down... Any ideas how to bring the website up and running again?

    €21 (Avg Bid)
    €21 Offre moyenne
    15 offres

    I'm seeking a seasoned Java developer for an immediate project involving the construction of a Spring Boot filter. The main task centres on the creation and implementation of a filter for all incoming requests to the controller, specifically designed to combat XSS attacks and remove Zero Width Space (ZWSP) characters. Key Project Requirements: - Develop a Spring Boot application filter. - The filter must effectively handle and block all potentials XSS attacks. - The filter must efficiently remove all encountered ZWSP characters. - The developed filter must suitably plug into a Spring Boot application. - The filter should be designed to handle high networking traffic smoothly. Test Cases Require to Cover: - Scenarios of filtering XSS attacks. - Scenarios that deal with the removal o...

    €130 (Avg Bid)
    €130 Offre moyenne
    7 offres

    I require a comprehensive analysis of various attack surface management companies. The major areas to focus on include: 1. Features: This includes an exhaustive evaluation of the following: - Vulnerability scanning - Asset discovery - Risk assessment - Configuration management 2. Pricing: Provide a detailed overview of each company's pricing structure along with proof. 3. Effectiveness: I'm interested in a thorough evaluation of the effectiveness of each company's software/services. The ideal freelancer for this job should possess an in-depth understanding of cybersecurity software and services. Experience in writing reviews and comparisons of software is a bonus. The review is to be delivered in a concise, easy-to-comprehend report. Please include C...

    €102 (Avg Bid)
    €102 Offre moyenne
    25 offres

    We require an individual capable of crafting a comprehensive proposal encompassing our array of vulnerability assessment and penetration testing services, including: 1) Vulnerability Assessment and Penetration Testing for Web Applications, Mobile Applications, N...comprehensive proposal encompassing our array of vulnerability assessment and penetration testing services, including: 1) Vulnerability Assessment and Penetration Testing for Web Applications, Mobile Applications, Networks, Infrastructures, and Active Directories. 2) Social Engineering Assessments. 3) Physical Security Evaluations. 4) Red Teaming Exercises. 5) Purple Teaming Collaborations. 6) Attack Surface Management. 7) Source Code Analysis. 8) Software Composition Analysis (SCA). 9) Dynamic Application Security Testi...

    €22 / hr (Avg Bid)
    €22 / hr Offre moyenne
    22 offres
    Advanced Prompt Generation Engineer S'est terminé left

    ...and Refine.) • Identify and Fill Gaps: Look for content gaps within my niche. Providing information that is currently unavailable, underexplored or make a very difficult and scientific explanation, to a much-understood language. • Share my Unique Perspective: Incorporate personal insights and experiences. This can offer a fresh angle on common topics. • Always think on a new angle / approach to attack the keywords subject, by using use data, graphs, synthesis data and key takeaways, focus on Quality. • Engage with my Audience; Make a Recognizable Impact, Ensure my content makes a noticeable difference in my audience's knowledge or experience. • Cite my Sources Properly: When using information, facts, quotes, or ideas from others, citing my sources n...

    €839 (Avg Bid)
    €839 Offre moyenne
    12 offres