Wormhole attack olsremplois

Filtrer

Mes recherches récentes
Filtrer par :
Budget
à
à
à
Type
Compétences
Langues
    État du travail
    2,000 wormhole attack olsr travaux trouvés au tarif de EUR
    Unity project S'est terminé left

    ...-------------------------------------------------------- You will design a simple mobile augmented reality application under Unity with Vuforia. You have two possible projects: - A treasure hunt: where the user must scan targets and then answer a question to give rise to the next question. o I scan A => The question is displayed in AR, I answer, it gives me the location of target B - A Zombie attack, using positioning in space (or on the ground). Show you a gun which when clicked shoots against Zombies coming towards you o It's up to you to determine the terms of the game (+ Zombies in 60 sec? Do not cross a line? etc.)...

    €288 (Avg Bid)
    €288 Offre moyenne
    6 offres

    Realization of security attack simulations on SDN (Software defined networks) on a virtual environment using kali linux Attacks like Dos, arp poisoning... the important thing is to have the steps to follow up in order to perform an attack on SDN It's possible to exploit the openflow protocol vulnerabilities on this simulation It's for my bachelor project !!! On network security field Thank you

    €218 (Avg Bid)
    €218 Offre moyenne
    3 offres

    etudiante en informatique, je cherche a implémenter quelques attaque de déni de sevice (blackhole,wormhole,sinkhole,grayhole....) sous ns2

    €206 (Avg Bid)
    €206 Offre moyenne
    1 offres

    étudiante en informatique ,je cherche a implémenter quelques attaques sous NS2 , a savoir blackhole, wormhole , sinkhole et grayhole , dans l attente de votre réponse merci d avance !

    €206 (Avg Bid)
    €206 Offre moyenne
    1 offres

    I require a person who has stage combat, choreography, and live performance experience. The main goal is to orchestrate a faux attack scenario wherein I appear to successfully defend myself. Key elements: - Choreographing a believable yet safe confrontation - Ensuring the performance goes as planned in a live setting - Professionalism in order to maintain the illusion for the audience Ideal skills and experience: - Stage combat and choreography - Previous acting or performing arts experience - Ability to react and improvise if things don't go as planned Please note, this is not about encouraging violence or causing fear. It's all about creating an engaging performance that makes me look like a hero in front of my girlfriend.

    €23 - €291
    €23 - €291
    0 offres

    ...specific expertise in creating intuitive user interfaces and seamless user experiences. The task at hand involves crafting the UI/UX for a cutting-edge platform dedicated to attack surface management. Project Overview: Our goal is to develop a user-friendly platform that enables efficient management of attack surfaces, empowering users to identify, assess, and mitigate potential vulnerabilities effectively. As such, we require a designer who can translate complex functionalities into visually appealing and easy-to-navigate interfaces. Key Requirements: - Strong background in UI/UX design - Experience designing for attack surface management or other cybersecurity platforms - Proficient in creating interactive visualizations, intuitive navigation, and real-time moni...

    €412 (Avg Bid)
    €412 Offre moyenne
    92 offres

    I need an expert in Natural Language Processing, specifically in sentiment analysis and text classification, to assist with my project. While I haven't chosen a programming language for this task, I am open to suggestions. It's currently unclear if I will need a pre-trained or custom NLP model, so both options should be explored. Best fit for the job would include: - Extensive experience in NLP, especially sentiment analysis and text classification - Ability to provide insights on different programming languages for the task - Experience with both pre-trained and custom NLP models.

    €297 (Avg Bid)
    €297 Offre moyenne
    32 offres

    My current project involves creating a GSM Man-In-The-Middle (MITM) system using OpenBSC and OsmocomBB. I need an expert to help me complete this project by intercepting calls and messages. Key requirements include: - Extensive knowledge and experience using OpenBSC, OsmocomBB and USRP B210 - Ability to work with the Motorola C118 phone - Solid understanding of MITM attack methodologies and GSM vulnerabilities - Familiarity with network security and testing procedures - Ability to provide a basic setup and operation guide upon completion The project is already in partial implementation stage, and I need someone to help finalize it, and ensure it can effectively intercept calls and messages. This will involve a combination of software and hardware work, so experience in both areas ...

    €2279 (Avg Bid)
    €2279 Offre moyenne
    14 offres

    I'm currently in an urgent situation where my website has seemingly vanished and a malware infection has been detected. The public PHP file has been modified which I discovered within the last 24 hours. Unfortunately...last 24 hours. Unfortunately, I have not been able to recover any data or files from my website. I'm looking for a skilled specialist with experience in: - Website restoration - Malware removal and prevention - PHP recovery and security The ideal freelancer would be someone who can help recover my lost data, restore the functionality of my website, mitigate the effect of the current malware attack, and ensure the robust constitution of the website to prevent future breaches. Quick turnaround is of essence due to the critical nature of this situation.

    €39 (Avg Bid)
    €39 Offre moyenne
    23 offres

    It's unfortunate we've found ourselves under a malware attack on our WordPress website. We believe it's due to code injections, though we can't rule out other possibilities. As a result, we're looking to onboard a professional with relevant experience in swiftly identifying and effectively resolving such issues. Skills & Experience: - Proven experience in dealing with WordPress malware attacks - Proficient in identifying and resolving code injections - Strong security strategy for preventing future attacks Your application should demonstrate your previous experience in handling similar situations. Evidence of your ability to work quickly and effectively is crucial to this emergency! Let's secure our website and prevent this from happening again....

    €389 (Avg Bid)
    €389 Offre moyenne
    153 offres
    Trophy icon Health & Safety Poster Creation S'est terminé left

    I'm in need of a graphic designer who can draft a visually engaging and easy-to-understand training poster focused on safety specific to the security team Key features include: - The focal point: Highlighting Pre Attack Indicators (PAINs) . - Target audience: The security team - Content: A visual reminder of the different PAINs (Pre Attack Indicators) that they should be aware of when working. Company Name: 3D Academy of Applied Security The poster will be blown up and posted in our office (36 inches high x 24 inches wide) Would imagine it may be easier to have different squares for each PAIN, but will leave that up to designer As a bonus, would like to have something consistent on 2 pages that could be incorporated into a PowerPoint presentation. The righ...

    €170 (Avg Bid)
    Garanti
    €170
    151 propositions

    I need a cybersecurity expert who can conduct penetration testing and data encryption tasks for me. Key Tasks: - **Penetration Testing:** This involves assessing the security of a system by simulating an attack from an external source. You need to be able to identify vulnerabilities, weaknesses and potential threats. I'm not sure whether I need comprehensive testing of my system or a specific target, so you should be able to advise on this. - **Data Encryption:** I would also need assistance with encrypting my data. This is crucial to protect sensitive information from unauthorized access. Reporting: - **Reporting Detail:** After the penetration testing and data encryption tasks are completed, I require a comprehensive report. This should include both an executive summary...

    €793 (Avg Bid)
    €793 Offre moyenne
    12 offres

    I'm going to attack Freelancer and expose how you guys are crooks. The entire Freelancer community will know who you are. I give you 72 hours to give me my paid work. I paid you, and I have the receipts, but as of today, I can't get anything for work. It's a scam. I will shout your name and your techniques very loudly

    €247 (Avg Bid)
    €247 Offre moyenne
    1 offres
    Trophy icon Florida Carpentry Business Logo Design S'est terminé left

    ...with crafting or construction businesses. - Be proficient in graphic design software. - Understand brand identity. - Have a good sense of typography and alignment. - Have a good color sense. Tips on getting the bag: Creativity, simplistic, Original, with a touch of pride. Add a simple touch of usa or florida flag element Simplistic is the foundation.. U got 13 days so please research..plan...and attack this with patience. I m taken my time and will hire to create brand stuff in future. Super Tip...if ur good at old vintage looking authentic wooden signs from old westerns(without bullet holes please) then u will have my attention. Carpenters dont use actual trees or logs or axes etc... Thats more arborists...or landscaping.. We use by products of wood..plywood..2*4s etc... If...

    €93 (Avg Bid)
    Garanti
    €93
    1596 propositions

    ...paper discuss the current event you have selected, specifying the counterterrorism activity that was carried out and the specific terrorist activity that was directly prevented from being carried out, as a result of the actions of the individuals involved in the prevention of the attack. Include a summary of the major points presented in the selected news source, including what activity was prevented, how that activity was prevented, who was involved in preventing the attack, and who attempted to perpetuate the attack. Close by discussing the global efforts in counterterrorism and how these efforts affect the presence of terrorist activity. Include sub-headers for all sections of your paper. Include at least five (5) scholarly sources, three of which must be peer-re...

    €68 (Avg Bid)
    €68 Offre moyenne
    52 offres

    Game Requirement Character : Male, full animation: Idle, run, attack, jump, die… Provide full UI and Game Asset Provide full sound and effect Number Map: 8 Number Boss: 8 Enemy for each map: 4-5 ( with full animation: idle, run, attack, die… ) Provide Game icon. Intergrate with Admob in game Intergrate shop IAP in game. Game can run on Mobile and PC also. Game resolution: Hozirontal 1920x1080

    €23 (Avg Bid)
    €23 Offre moyenne
    7 offres

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €27 (Avg Bid)
    €27 Offre moyenne
    8 offres
    Cyber Security Article Writing S'est terminé left

    ...the time the systems administrators discovered the nature of the attack, it was largely too late. Critical files all across the AvantPharm network had been encrypted and were unusable. To make things worse, the backup system in place was unmonitored and had been failing backup jobs for months, so they did not have a reliable way to restore the encrypted data. AvantPharm narrowly averted complete disaster by paying the attackers one of the largest ransomware payments in history; 25 million dollars. However, they nearly lost the business when the attacker took 2 full weeks to return control of their data as well, so the impact was further damaging to profitability and reputation. In the end, the company barely weathered the attack and resumed operations at reduced capacity o...

    €18 (Avg Bid)
    €18 Offre moyenne
    95 offres

    I require a reliable and experienced developer to assist me in implementing a Content Security Policy (CSP) in my JavaScript application. Key Details: - Purpose: The primary goal of this CSP implementation is to prevent Cross-Site Scripting Attacks within the application. - Target Sources: The CSP should be configured to allow only self-hosted scripts...permitted. - Integrate the CSP seamlessly with the existing application architecture, ensuring no disruptions in functionality. Ideal Skills and Experience: - Proficiency in JavaScript and web application security. - Prior experience with Content Security Policy implementations. - Understanding of and its usage in specifying content sources. - Knowledge of common Cross-Site Scripting (XSS) attack vectors and mitigation strategies.

    €11 (Avg Bid)
    €11 Offre moyenne
    12 offres

    ...vulnerabilities, severity levels, and recommended remediation measures. Collaborate with our development team to prioritize and address security issues. Requirements: Proven experience in penetration testing for Magento 2 websites and AWS environments. Proficiency in industry-standard tools and techniques for vulnerability assessment. Strong understanding of web application security principles and common attack vectors. Excellent communication skills. Deliverables: Detailed penetration testing report. Regular progress updates and communication. How to Apply: Please submit your proposal with details of your experience, approach to penetration testing, and proposed timeline and cost estimates. Additionally, include any relevant certifications or references. Thank you for your i...

    €165 (Avg Bid)
    €165 Offre moyenne
    21 offres
    System Security Specialist Required S'est terminé left

    We recently experienced a malware attack on our system and we're seeking an expert who can ensure this doesn't happen again in the future. We don't require data recovery services; our main priority is to make sure it never happens again. Ideal candidates should possess: - In-depth experience in counteracting malware attacks - Mastery in various security domains such as network, application, and endpoint security - Proven track record in enhancing system security

    €118 (Avg Bid)
    €118 Offre moyenne
    19 offres

    EL bot debe poder operar en varios DEX usando flashloans como caracteristica pricipal, las oportunidades de las transacciones las debe buscar en los mempool de los contratos inteligentes de cada DEX. Tambien debe poder hacer frontrunning de las transsacciones The bot must can operate on many DEX using flashloans like principal function, the oportunities of transaction have to l...caracteristica pricipal, las oportunidades de las transacciones las debe buscar en los mempool de los contratos inteligentes de cada DEX. Tambien debe poder hacer frontrunning de las transsacciones The bot must can operate on many DEX using flashloans like principal function, the oportunities of transaction have to look for in the mempool of the Contratcs of the DEX. must can do frontrunning,and sandwich ...

    €138 (Avg Bid)
    €138 Offre moyenne
    21 offres

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €11 (Avg Bid)
    €11 Offre moyenne
    6 offres
    Autoencoder & GRU Attack Classifier S'est terminé left

    I'm seeking the expertise of a data scientist or machine learning engineer to develop a model for classifying various types of attacks on a KDD dataset. The ideal candidate will have extensive knowledge in the use of autoencoders for feature extraction and GRU models. Key project elements include: * Professionals will need to implement an autoencoder for feature extraction with the core goal of reducing data dimensionality. Prior experience in working with high-dimensional data and in deploying autoencoders is necessary. * Subsequently, the system built should be capable of classifying Denial of Service (DoS), User to Root (U2R), and Probe attacks within the KDD dataset. Good working knowledge of GRU models and the mentioned attacks is required. * The project includes steps to ensure...

    €32 (Avg Bid)
    €32 Offre moyenne
    8 offres
    Quantum Encryption Python Developer S'est terminé left

    ...are: 1- create multiple python code for the below: A- encrypt a file with rsa and calculate the needed time and resources. B- encrypt a file with ecc and calculate the needed time and resources. C- decrypt the encrypted files using two quantum algorithms with out any keys (attack) and calculate the needed time and resources. D- encrypt a file with one of post quantum encryption algorithms and calculate the needed time and resources. E- decrypt the quantum encrypted files using quantum algorithms with out any keys (attack) and calculate the needed time and resources. 2- prepare full package with the needed libraries and codes that is requested above. 3- for quantum computer you should connect with ibm quantum computer. 4- all requirement should be delivered in three days. ...

    €272 (Avg Bid)
    €272 Offre moyenne
    27 offres

    I'm looking for a skilled professional to conduct a network security test on our workstations using ARP poisoning techniques. The focus of this project is to identify vulnerabilities in the network and provide a detailed description of each one. Key Requirements: - Conducting ARP poisoning attack on our network - Identifying and exploiting vulnerabilities on workstations - Compiling a detailed report on the vulnerabilities found Ideal Skills and Experience: - In-depth knowledge of networking protocols and security - Previous experience with ARP poisoning attacks - Ability to produce detailed and comprehensive security reports - Familiarity with common network vulnerabilities and their exploitation This is a critical project for us, and we are looking for someone with signifi...

    €59 (Avg Bid)
    €59 Offre moyenne
    15 offres
    SAAS-BOILERPLATE Customization S'est terminé left

    I'm looking to modify the SAAS-BOILERPLATE open-source project to create an interactive membership website for indie filmmakers and film students. NOTE: MOST of the required functions are already implemented in the boilerplate. You do NOT need to connect Stri...for webdesigner collaboration (squarespace has an interesting version that is attached below to the project) IDEAL FREELANCER PROFILE: - Have previous experience with backend development using Laravel PHP - security-focused emphasis on security against attacks on webapps - experience minimizing the attack surface of webapps - Understand how to integrate video hosting in SaaS

    €515 (Avg Bid)
    À la une
    €515 Offre moyenne
    62 offres

    I am seeking a skilled freelancer to help me create a data collection tool for an intrusion detection system. This system's main purpose is to collect data for analysis, focusing on network traffic. Key tasks include: - Designing a new normal and attack dataset using Mininet WiFi - The focus is on detecting Denial of Service (DoS) and Man-in-the-Middle (MitM) attacks Ideal candidates should have experience: - Building intrusion detection systems - Working with Mininet WiFi - Handling network traffic data - Familiarity with DoS and MitM attacks This tool will greatly aid in identifying and preventing future network attacks by providing structured data for our analysis team.

    €325 (Avg Bid)
    €325 Offre moyenne
    3 offres
    Cryptogrphy expert S'est terminé left

    More details: What specific expertise in cryptography are you looking for? Cryptanalysis techniques What is the primary goal of the cryptanalysis project? Questions that include groups, algorithms, attack. not help from chatGPT or any AI Which cryptographic algorithms or protocols are you currently using or planning to use in your project? Hash functions collisions and more. There is a file with question for example, if you can answer on this question with out any AI we can proceed i will pay good for each question you answer :)

    €193 (Avg Bid)
    €193 Offre moyenne
    12 offres

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €16 (Avg Bid)
    €16 Offre moyenne
    5 offres

    Wordpress site not opening need to fix now may be attack?

    €5 / hr (Avg Bid)
    €5 / hr Offre moyenne
    81 offres

    I'm on the lookout for a season...expertise in computer security. Key Project Objectives: - Assessment and improvement of network security - Implementation of secure protocols, with a specific focus on http3 - Thorough analysis and counteracting of cyber security threats - Network traffic analysis under attack conditions Ideal Skills and Experience: - Profound knowledge in network security and cyber security - An adept understanding and experience in http3 - Proven experience in security threat mitigation - Prior experience handling network traffic analysis under attack conditions Please note that only candidates with expert-level experience in the above-mentioned fields will be considered. This project demands the highest level of proficiency and professional acumen...

    €26 / hr (Avg Bid)
    €26 / hr Offre moyenne
    21 offres

    I am in need of a skilled cybersecurity professional with specific experience in DDoS threats. The purpose of this project is to capture and analyze DDoS attack traffic from our corporate network. With your help, I aim to: - Identify patterns that indicate a potential DDoS threat - Understand our network's vulnerabilities to these specific attacks - Develop a proactive defense system through learned network behavior Please note, this project requires experience with corporate network environments, analysis of DDoS network traffic, and a deep understanding of network defense systems.

    €208 (Avg Bid)
    €208 Offre moyenne
    11 offres

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €61 (Avg Bid)
    €61 Offre moyenne
    8 offres

    I'm urgently in search of a certified and empanelled vendor who can perform a comprehensive scan for both my web and mobile applications. Key Tasks: - Conduct thorough scans to identify any potential vulnerabilities. - Draw up a comprehensive report detailing any findings. Ideal Candidate: - Comprehensive knowledge of different attack vectors is mandatory, even though no specific concern is prioritized for this project. - Proven experience as an empanelled vendor is compulsory. - Must be able to work under tight deadlines, as the completion of this project is ASAP.

    €316 (Avg Bid)
    €316 Offre moyenne
    11 offres

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €61 (Avg Bid)
    €61 Offre moyenne
    7 offres

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €76 (Avg Bid)
    €76 Offre moyenne
    14 offres

    Per country analysis of Distributed Denial of Service attacks We have been collecting data on UDP reflection based Distributed Denial of Service attacks since 2014. There are significant differences in attack patterns between countries (time of day, day of week, target of attack) and in response to global interventions targeting DDoS. This project would involve drilling down in to the per-country data to understand what is going on and why.

    €125 (Avg Bid)
    €125 Offre moyenne
    28 offres

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    €34 (Avg Bid)
    €34 Offre moyenne
    11 offres
    DDoS recovery for my Zencart Site S'est terminé left

    I have a small website running on Zencart that apparently suffered a DDoS attack 3 days ago and the website is still down. Now my clients can't visit the site, I've contacted Hostgator (I have a shared server account there) and I've been told I have "web bots crawling my site at unmanaged speeds"... I tried to set longer crawl delays and installed the CloudFlare but the website is still down... Any ideas how to bring the website up and running again?

    €21 (Avg Bid)
    €21 Offre moyenne
    15 offres

    I'm seeking a seasoned Java developer for an immediate project involving the construction of a Spring Boot filter. The main task centres on the creation and implementation of a filter for all incoming requests to the controller, specifically designed to combat XSS attacks and remove Zero Width Space (ZWSP) characters. Key Project Requirements: - Develop a Spring Boot application filter. - The filter must effectively handle and block all potentials XSS attacks. - The filter must efficiently remove all encountered ZWSP characters. - The developed filter must suitably plug into a Spring Boot application. - The filter should be designed to handle high networking traffic smoothly. Test Cases Require to Cover: - Scenarios of filtering XSS attacks. - Scenarios that deal with the removal o...

    €129 (Avg Bid)
    €129 Offre moyenne
    7 offres

    I require a comprehensive analysis of various attack surface management companies. The major areas to focus on include: 1. Features: This includes an exhaustive evaluation of the following: - Vulnerability scanning - Asset discovery - Risk assessment - Configuration management 2. Pricing: Provide a detailed overview of each company's pricing structure along with proof. 3. Effectiveness: I'm interested in a thorough evaluation of the effectiveness of each company's software/services. The ideal freelancer for this job should possess an in-depth understanding of cybersecurity software and services. Experience in writing reviews and comparisons of software is a bonus. The review is to be delivered in a concise, easy-to-comprehend report. Please include C...

    €101 (Avg Bid)
    €101 Offre moyenne
    25 offres

    We require an individual capable of crafting a comprehensive proposal encompassing our array of vulnerability assessment and penetration testing services, including: 1) Vulnerability Assessment and Penetration Testing for Web Applications, Mobile Applications, N...comprehensive proposal encompassing our array of vulnerability assessment and penetration testing services, including: 1) Vulnerability Assessment and Penetration Testing for Web Applications, Mobile Applications, Networks, Infrastructures, and Active Directories. 2) Social Engineering Assessments. 3) Physical Security Evaluations. 4) Red Teaming Exercises. 5) Purple Teaming Collaborations. 6) Attack Surface Management. 7) Source Code Analysis. 8) Software Composition Analysis (SCA). 9) Dynamic Application Security Testi...

    €21 / hr (Avg Bid)
    €21 / hr Offre moyenne
    22 offres
    Advanced Prompt Generation Engineer S'est terminé left

    ...and Refine.) • Identify and Fill Gaps: Look for content gaps within my niche. Providing information that is currently unavailable, underexplored or make a very difficult and scientific explanation, to a much-understood language. • Share my Unique Perspective: Incorporate personal insights and experiences. This can offer a fresh angle on common topics. • Always think on a new angle / approach to attack the keywords subject, by using use data, graphs, synthesis data and key takeaways, focus on Quality. • Engage with my Audience; Make a Recognizable Impact, Ensure my content makes a noticeable difference in my audience's knowledge or experience. • Cite my Sources Properly: When using information, facts, quotes, or ideas from others, citing my sources n...

    €831 (Avg Bid)
    €831 Offre moyenne
    12 offres
    Research Proposal -- 2 S'est terminé left

    I want to get a topic in Ransomware and write on Ransomware attack effects on IT Businesses.

    €111 (Avg Bid)
    €111 Offre moyenne
    51 offres
    AI Content Creation & Management S'est terminé left

    ...and Refine.) • Identify and Fill Gaps: Look for content gaps within my niche. Providing information that is currently unavailable, underexplored or make a very difficult and scientific explanation, to a much-understood language. • Share my Unique Perspective: Incorporate personal insights and experiences. This can offer a fresh angle on common topics. • Always think on a new angle / approach to attack the keywords subject, by using use data, graphs, synthesis data and key takeaways, focus on Quality. • Engage with my Audience; Make a Recognizable Impact, Ensure my content makes a noticeable difference in my audience's knowledge or experience. • Cite my Sources Properly: When using information, facts, quotes, or ideas from others, citing my sources n...

    €2290 (Avg Bid)
    €2290 Offre moyenne
    26 offres

    Seeking skilled freelancers for UI/UX design for an Attack Surface Management project. Familiarity with Attack Surface Management preferred but not mandatory. Design style similar to & Please share relevant work samples. Specifics: - Incorporate interactive dashboards - Include detailed analytics - Construct a user-friendly navigation system Skills and experience: - Strong UI/UX design skills - Previous work with similar projects - Knowledge in cybersecurity (preferred, not mandatory)

    €932 (Avg Bid)
    €932 Offre moyenne
    58 offres

    As a rapidly evolving tech firm, I need a resource experienced in evaluating and implementing multiple notable blockchain technologies on our server. This involves acquiring and compiling the technologies' source codes. Ideal Candidate Skills: • Expertise in Wormhole, LayerZero, ChainLink, Axelar, Celer C-Bridge, and Flare • Experience in server-side compilation, implementation, and debugging When applying please include: • Your prior experience with the listed technologies Please note, the main goal or objective of this project has not been explicitly defined. It is, however, implicit in the tasks needed to be performed, namely, successful evaluation and implementation of the mentioned technologies.

    €186 (Avg Bid)
    €186 Offre moyenne
    1 offres
    Trophy icon Heart Attack Education Pamphlet Design S'est terminé left

    Looking for an experienced graphic artist with mastered skills in Microsoft Word to help me design an informative and eye-catching pamphlet about acute myocardial infarction or heart attack. Detailed Brief: - The pamphlet size: Must be designed to fit on both sides of A4 paper, including diagrams. - Color Scheme: Green and Yellow. I want these colors to be the dominant shades for the design, giving clean and professional vibes. Maximum size: two sides of an A4 page (margins 2cm), Font styles Arial or Calibri with minimum font size 11, line spacing 1.5 (minimum). - Content: It will cover three main points: 1. Symptoms of acute myocardial infarction. 2. Causes of acute myocardial infarction. 3. Prevention tips for acute myocardial infarction Ideal Skills: - Strong Microsoft ...

    €93 (Avg Bid)
    Urgent Garanti
    €93
    96 propositions