Filtrovat

Moje poslední hledání
Třídit podle:
Rozpočet
pro
pro
pro
Typ
Dovednosti
Jazyky
    Stav zakázky
    2,000 cyber attack Nalezené pracovní možnosti
    Logo Design
    6 dní left

    ...element 3. Typography ✅ Bold, futuristic, and high-tech font ✅ Must look professional and premium ✅ No generic fonts—customization is preferred ✅ Typography should be modern, geometric, and readable ✅ Optional: Subtle modifications in letters to reflect AI & betting theme 4. Color Scheme Since BetBrainX is dark-themed, the logo should use: ✅ Primary Colors: Futuristic neon blue, electric green, or cyber glow accents ✅ Secondary Colors: Dark gray, black, and deep shades (for contrast) ✅ Optional Gradient: A sleek, high-tech gradient effect (not too flashy) ✅ Monochrome Version: Must look good in black and white 5. Adaptability & Use Cases The logo should work in different formats: ✅ Scalable for website, mobile apps, and marketing materials ✅ Icon version for mobi...

    €25 Average bid
    €25 Průměr. nabídka
    134 nabídky

    I'm seeking a skilled developer to create a SaaS application focusing on web security, specifically for penetration testing. This application should be user-friendly and efficient, catering to businesses needing robust cyber security measures. Aimed mainly towards MSPs and SMBs Ideal Skills: - Extensive experience in developing SaaS applications - Deep understanding of cyber security, particularly web security - Proficiency in creating tools for penetration testing - Excellent UI/UX design skills - Strong problem-solving abilities The ideal candidate will have a proven track record in this field and can deliver high-quality work within a reasonable timeframe.

    €2686 Average bid
    €2686 Průměr. nabídka
    68 nabídky

    ...mini read-only VS2022 screen, compiler, and Windows Task scheduler. • Bidding Your bid is my budget. If you deliberately put in a low bid to attract me to speak to you, you either revise your bid, or I will ignore you. • Delivery We need the source code and will integrate your program into a much larger one. You will be paid once you finish all the work and it works on my machine. We will also attack your program, as it has to be secure and reliable without loopholes. It has to be bug-free. • Platform Your code has to work on Windows. • Workplace You will be working online remotely. • Experience Please show us your detailed related work experience and portfolio. Without similar experience, you are unlikely to be awarded, as you may not finish the pro...

    €249 Average bid
    €249 Průměr. nabídka
    68 nabídky

    I am launching a Cyber Security Awareness initiative and need coordinators across small cities in India. Your primary role will be to establish collaborations and contacts with schools and colleges in your respective areas to conduct seminars and workshops on Cyber Security topics. Key Responsibilities: - Collaborating with School Administrators, College Professors, and Educational Consultants to set up seminars and workshops, most probably paid workshops and seminar. - If required visit to Colleges and School in person to meet with the HoD or Principal. - Coordinating Cyber Security workshops and seminars in Schools and Colleges. - Building future collaborations for training and career guidance. Topics to Cover: - Cybersecurity basics - Safe online practices - Car...

    €76 Average bid
    €76 Průměr. nabídka
    6 nabídky
    Cyber Attack Map
    8 dní left

    Hi Vimal, Need a cyber attack graph map. Thanks

    €48 Average bid
    €48 Průměr. nabídka
    1 nabídky

    ...money-multiplying strategies, including e-commerce, automation, crypto investments, and high-risk business ventures. AI should study, test, and implement profitable algorithms for gambling, trading, and financial automation. 6. Cybersecurity Capabilities (Offense & Defense) The AI must be able to: Analyze and defend against cyber threats (firewall bypass, intrusion detection, exploit mitigation). Perform penetration testing to identify and secure vulnerabilities. Launch simulated cyber-attacks for testing security systems and improving defenses. Detect, prevent, and counter hacking attempts on my devices, websites, or servers. Technical Requirements & Development Stack Programming Languages: Python, C++, C#, Java, JavaScript, PHP, Perl AI & ML Frameworks: Tens...

    €4230 Average bid
    €4230 Průměr. nabídka
    35 nabídky

    ...snarling and breathing fire. It coils in a stormy mist, lunging at Toma. (Symbolism: Pure destruction, chaos.) 2. Strigoi – A decayed, undead spirit with glowing red eyes, emerging from dark waters with eerie waves, reaching toward Ileana, resisting her magic. (Symbolism: Death, corruption, haunting presence.) 3. Evil Wolf – A shadowy, monstrous wolf with red glowing eyes, crouching low, ready to attack the Noble Wolf. Its fur is jagged, resembling thorny shadows. (Symbolism: Predation, darkness, malevolence.) --- Setting & Background Mystical Forest Split in Two – The Good Side has lush greenery, glowing leaves, and golden light breaking through the clouds. The Evil Side is twisted, dark, with swampy trees and eerie mist rising from the ground. S...

    €1665 Average bid
    €1665 Průměr. nabídka
    16 nabídky

    ...displayed on a website where viewers can watch the battle unfold with play, pause, and speed control buttons. How It Works Game progress is stored in JSON file. The entire game logic (player stats, movements, attacks, special abilities) is defined in a JSON file. Each agent has attributes like health, attack, defense, energy, position, and abilities (e.g., Dodge, Block, Bribe). Simulation Engine A program reads the JSON file and simulates the battle step by step. Each agent makes decisions (move, attack, heal, dodge) based on their attributes and surroundings. The game progresses until only one agent remains (winner). Website Interface Live Game Board: Shows agent positions and status (health, energy, actions). Play/Pause Controls: Users can start, pause, or speed up t...

    €650 Average bid
    €650 Průměr. nabídka
    8 nabídky

    ...Integration** - Implement an intuitive and flexible content management system (CMS) for easy updates. - Integrate features such as student portals, online admission forms, event management, and faculty profiles. - Ensure mobile-friendliness and cross-browser compatibility. 3. **Security & Performance Optimization** - Strengthen website security to prevent vulnerabilities and cyber threats. - Optimize the website for fast loading speeds and smooth navigation. - Implement caching, CDN, and other performance-enhancing techniques. 4. **Third-party Integrations** - Connect necessary APIs for payment gateways, learning management systems (LMS), or student databases. - Integrate social media, chat support, and email marketing tools. 5...

    €253 Average bid
    €253 Průměr. nabídka
    35 nabídky

    I am seeking a seasoned cyber security professional to enhance the security of my admin panel. While I currently have some measures in place, they require significant improvement. The primary goal is to implement general security enhancements. Ideal Skills: - Expertise in cyber security - Knowledge of vulnerabilities and SQL injection - Experience in general security enhancements - Proficiency in creating robust security measures Key Tasks: - Assess current security measures and identify weaknesses - Implement improvements for general security - Secure the admin panel against potential threats

    €10 / hr Average bid
    €10 / hr Průměr. nabídka
    13 nabídky

    ...fueling the production of its toxic sludge. That's when they realise they must use the resources it has stolen against the monster. Panel 10: Unfortunately, their presence alerts the beast and it attacks. Cheese jumps into action, deflecting each blow with his sword. Each strike is more ferocious than the last. It does not relent, but neither does Cheese. Panel 11: Topher scoops up Cheese mid-attack and uses one of the sludge-covered pipes as a ramp. With one fell swoop, Cheese cuts through the tank, releasing the cleansing waters. The flames of the beast drown in the deluge. Panel 12: Desperately trying to prevent its downfall, it swings one of its pipe-like tendrils at the pair. Topher jumps in front of it, shielding Cheese. Once the waters are swallowed by the drain, i...

    €43 Average bid
    €43 Průměr. nabídka
    35 nabídky

    I am launching a special Cyber MSP (Managed Security Provider) program designed to check PCs and network devices for security vulnerabilities within a network. I already have an existing program, but I am looking for a skilled individual to use, update, and enhance it, with a focus on improving its interface and functionality. Who I'm Looking For: Proficient in programming (preferably with experience in cybersecurity-related tools). Knowledgeable in network security and vulnerability assessments. Capable of improving UI/UX to make the software more user-friendly. Committed and detail-oriented in security-related development. This is a serious project, so if you do not have the necessary skills or experience, please do not apply. I am looking for someone who ca...

    €1444 - €2889
    Doporučené Zapečetěný
    €1444 - €2889
    13 nabídky

    I'm seeking an expert in cybersecurity and diagramming to create comprehensive diagrams and flowcharts to help identify vulnerabilities in our systems. The primary purpose of these diagrams will be to pinpoint potential security flaws. Ideal Skills: - Proficient in creating Network Security Diagrams and Incident Response Flowcharts - Experienced in cybersecurity with a focus on identifying vulnerabilities - Able to visualize complex security workflows in a simplified manner - Skilled with diagramming software and tools I am open to suggestions on areas of focus, but I would prefer a comprehensive approach that covers network, application, and data security.

    €81 Average bid
    €81 Průměr. nabídka
    20 nabídky

    ...aiming to educate the public on digital risks, data protection, and the latest cybersecurity trends and news. 2. Vision To establish CyberLens as the leading digital awareness and cybersecurity platform in the Arab world by delivering reliable, up-to-date, and easy-to-understand content. 3. Mission • Raise awareness about cybersecurity fundamentals. • Provide news and reports on the latest cyber threats. • Offer practical educational content for data protection. • Analyze emerging technologies and their security impact. 4. Target Audience ✔ General users looking to protect their data. ✔ IT and cybersecurity professionals. ✔ Entrepreneurs and businesses seeking security solutions. ✔ Students and researchers interested in technology. 5. Branding & ...

    €131 Average bid
    €131 Průměr. nabídka
    48 nabídky

    I have fixed Pipedrive Issues like attack on CRM, Email issue resolved, Zapier issue resolved.

    €26 Average bid
    €26 Průměr. nabídka
    1 nabídky

    I'm seeking a professional to conduct a comprehensive vulnerability assessment on my web application. The primary aim is to identify potential security weaknesses and enhance my overall security posture. Key Requirements: - Extensive experience in web application vulnerability assessment - Proficient in identifying security weaknesses - Proven track record of improving security postu...in web application vulnerability assessment - Proficient in identifying security weaknesses - Proven track record of improving security posture for clients - Familiarity with the latest web security standards and threats - Ability to deliver a detailed report with actionable recommendations Your expertise is crucial in fortifying my web application and ensuring its resilience against potential cyb...

    €15 / hr Average bid
    €15 / hr Průměr. nabídka
    17 nabídky

    I'm in need of professional help to get a defamatory Twitter post taken down. The post has been made by an individual and contains a personal attack against me. Ideal Skills: - Expertise in social media law - Proven track record in handling defamation cases - Strong communication skills for liaising with Twitter - Experience with legal documentation and procedures - Ability to work under pressure and meet tight deadlines I am looking for someone who can handle this situation discreetly and efficiently. Time is of the essence as this post is causing significant distress. Please get in touch if you can assist.

    €29 - €241
    Zapečetěný
    €29 - €241
    16 nabídky

    I'm looking for a talented web designer to create a Cyberpunk themed blog titled "The Academic Odyssey". The theme should be dark and metallic, simple yet eye-catching, without being overly extravagant or excessive. Key Features: - A grid layout for the blog - A search bar - An archive section for past posts - A commenting option for readers - 'About ...understanding of Cyberpunk aesthetics - Ability to create visually appealing yet simple designs - Experience working with grid layout - Strong skills in creating text and photo combinations for web pages Please use a color scheme primarily featuring neon blue and pink accents. The search bar should offer basic search functionality. The blog will be built on WordPress.

    €45 Average bid
    €45 Průměr. nabídka
    18 nabídky

    ...player and manage various tasks, including mining, fighting spiders, and handling mine collapses. Key Features of the Macro: - Control a player near the screen center - Mine a rock wall with varied inputs - Move to the side and repeat mining - Return to the original position after a few cycles - Handle random events like spiders appearing or mines collapsing - If a spider appears, swap weapons and attack it - If a mine collapses, quickly head to the exit, re-enter and return to original position - Implement dynamic movement patterns to avoid detection from anti-cheat systems/game Admins lurking. Detection Methods: - Use pixel color detection to identify events Additional Requirements: - The macro needs to run in the background, allowing me to use my PC without interruptions wh...

    €140 Average bid
    €140 Průměr. nabídka
    7 nabídky
    Ecole 2600
    16 hodiny left

    ...These stickers will be used on phones, laptops, and other accessories, so they must be visually striking and suitable for high-quality printing. Project Requirements ✅ Design Format & Size: • Stickers should be round, with dimensions of approximately 3x3 inches or 4x4 inches. ✅ Theme & Elements: - French flag - Pirate flag - Symbols that relates to the game of life - PLEASE NO LOCKS OR SHITTY CYBER SYMBOLS
 - Stuff we like - - - ✅ Color Scheme: • follow our website ✅ Style: • Clean, modern, and impactful designs • Legible text with good contrast against the background • Minimalistic yet striking

    €18 / hr Average bid
    €18 / hr Průměr. nabídka
    52 nabídky

    ...of the game. softwares would be blender and unity. the characters are not rigged. the animations will be for 7 characters. key points regarding the animation: 1. They need to be available for both the first person view and third person view. 2. upper body and lower body should be separated, meaning, while lower body may be walking or running the upper body might be playing idle animation or attack animation etc. 3. there are multiple clothes which needs to be weight painted and adjusted as well 4. player and all the other characters should share the same rig and should share the same animation the animations for the demo include: ( idle, running in 8 direction, jumping, slashing with sword in 3 direction, thrust, blocking in 4 direction, damage, dying)...

    €413 Average bid
    €413 Průměr. nabídka
    27 nabídky

    ...security tools to expand detection capabilities and address security gaps. • Advanced Threat Detection: Support the refinement of security solutions leveraging Large Language Models (LLMs) to minimize false positives and identify business logic vulnerabilities. • Threat Intelligence & Research: Proactively analyze new Web3 threats and vulnerabilities, developing effective mitigation strategies. • Attack Simulation & Analysis: Recreate and analyze real-world Web3 attacks in controlled environments to test and refine defense mechanisms. • Knowledge Sharing & Mentorship: Assist in strengthening the team’s Web3 security expertise by sharing knowledge, best practices, and research findings. • Strat...

    €18 / hr Average bid
    €18 / hr Průměr. nabídka
    49 nabídky

    ...professional and clean WordPress WooCommerce site for selling cyber security products. The site needs to be integrated with various payment options including Credit/Debit Cards and PayPal. Key Requirements: - Integration: Set up seamless payment integration with Credit/Debit Cards and PayPal. - User Engagement: Implement product reviews functionality to encourage customer interaction and provide social proof. - Customer Support: Incorporate a reliable live chat support system to assist customers in real time. The ideal freelancer for this project should have substantial experience in building and customizing WooCommerce sites, with a solid portfolio of e-commerce projects, preferably in the tech or product review space. Understanding of cyber security products would be ...

    €169 Average bid
    €169 Průměr. nabídka
    55 nabídky

    ...looking to build a long term relationship for ongoing work. We specialize in computer forensics, cell phone forensics, and general cyber investigations and are looking for experienced forensic investigators to join our growing network. This is a fully remote, 1099 subcontractor position with flexible case volumes ranging from 1-10 cases per month, depending on our case volume. This is a client facing position. Key Responsibilities - Conduct investigations in the following areas: • Hacking investigations (computers, cell phones, cloud accounts) • Spyware and malware investigations • Data theft and employee misconduct cases • Device audits and assessments • Cyber harassment cases • Analyze digital evidence using industry-standard tools. &bull...

    €2330 Average bid
    €2330 Průměr. nabídka
    6 nabídky

    ...and tachypnoeic Mary’s ECG shows a STEMI Mary’s BSL is 5.2, temp is 36.C Mary’s skin is pale and slightly grey and she is sweating   Mary tells you that she has never had pain like this in the past. She knows she has high cholesterol and high blood pressure and takes medications to control both conditions. Mary is a non-smoker. Mary also tells you that her father died young from a heart attack. During your assessment Mary also says to you “I think I’m dying”.     Task Your task is to answer the following questions in the text box below (you should write your answers in a word document and then cut and paste them into the textbox below to avoid loosing your work. Q2-Explain the pathophysiology of the condit...

    €20 Average bid
    €20 Průměr. nabídka
    14 nabídky

    As an F1 Visa holder with an MS in Cyber Security, I am seeking professional assistance in finding a suitable job. I am particularly interested in roles within the Security Analysis domain. Key Responsibilities: - Assist in the job search process within the Cybersecurity industry, specifically targeting Security Analysis roles. - Help in optimizing my resume to appeal to potential employers in this field. - Provide interview preparation to enhance my performance in potential interviews. Ideal Skills and Experience: - Extensive knowledge and experience in the Cybersecurity industry. - Proven track record of assisting individuals in securing jobs in Cybersecurity. - Excellent skills in resume writing and interview coaching. I am hopeful that with your assistance, I can successfull...

    €528 Average bid
    €528 Průměr. nabídka
    8 nabídky

    I'm seeking an experienced cyber security expert with a strong background in terminal, python, and docker to assist on a project. The primary goal of this project is to conduct comprehensive security audits on applications. Your tasks will include: - Performing detailed application security audit using software to identify and rectify vulnerabilities. - Providing insights and recommendation. Ideal candidates should have: - Proven experience in conducting application security audits. - Strong skills in terminal, python, and docker. - Ability to work collaboratively on a project.

    €21 / hr Average bid
    €21 / hr Průměr. nabídka
    52 nabídky

    Following a hacking incident, I've lost access to both my Cpanel and webmail. Unfortunately, my email was compromised as well, which has complicated matters with support. They don't believe my situation due to my inability to reach them via my email. I'm seeking a professional who can help me regain access by cracking the passwords for either of these accounts. Skills required: - Ethical Hacking - Cyber Security - Password Recovery Time is of the essence. Your prompt response and assistance will be greatly appreciated.

    €116 Average bid
    €116 Průměr. nabídka
    12 nabídky

    I am seeking a seasoned cyber security consultant to assist with the implementation of critical security measures. Key Responsibilities: - Implementing a robust firewall setup to safeguard our network - Applying data encryption techniques to ensure our information is secure Ideal candidates should have extensive experience in network security and data protection. Please provide evidence of previous projects in your proposal.

    €284 Average bid
    €284 Průměr. nabídka
    29 nabídky

    I'm seeking a freelancer who can help me create a cyber security catalog that showcases our services, a modern and sleek logo, and a presentation that includes our service offerings, customer testimonials, and case studies. - Cyber Security Catalog: This catalog should effectively showcase our cyber security services in a clear and engaging manner. - Logo Design: The logo should be modern and sleek, reflecting the contemporary and cutting-edge nature of our services. - Presentation: This should cover our service offerings, include customer testimonials to build trust and credibility, and feature case studies to demonstrate our success and expertise in the field. The ideal freelancer for this project should have experience in service catalog creation, logo desig...

    €102 Average bid
    €102 Průměr. nabídka
    67 nabídky

    ... • Bidding Your bid is my budget. If you deliberately put in a low bid to attract me to speak to you, you either revise your bid, or I will ignore you. • Delivery We need the source code and will integrate your program into a much larger one. You will be paid once you finish all the work and it works on my machine. We will also attack your program, as it has to be secure and reliable without loopholes. It has to be bug-free. • Platform Your code has to work on Windows. • Workplace You will be working online remotely. • Experience Please show us your detailed related work experience and portfolio. Without similar experience, you are unlikely to be awarded, as you may not finish the project anyway. • IP The intellectual property

    €193 Average bid
    €193 Průměr. nabídka
    41 nabídky

    OpenCart Technical Tasks Checklist: 1. Critical System Review Fix basket functionality: a) Product addition errors b) Basket update issues c) Debug checkout process d) Review and resolve PHP error logs a) Test core system functions 2. Security Implementation a) Install and configure Captcha at checkout b) Research and implement robust firewall solution c) Configure security parameters d) Set up attack prevention measures e) Monitor security logs 3. Opencart 3.0.3.8 Optimization a) Verify system integrity after upgrade done from OpenCart 2 to 3.0.38 b) Check database performance c) Validate template compatibility d) Review error logs and resolve issues e) Test all core functionalities 4. Product Display Features Install/Update product corner labels: sale, new, sale Configure filt...

    €162 Average bid
    €162 Průměr. nabídka
    73 nabídky
    Trophy icon E-Commerce Web Design Contest
    5 dní left

    ...Playset** 38. **Play-Doh Kitchen Creations Burger Set** 39. **LeapFrog LeapStart Interactive Learning System** 40. **Lego Friends Heartlake City** 41. **Disney Princess Royal Castle** 42. **Galt Toys Wooden Railway Set** 43. **Tiny Love 3-in-1 Rocker Napper** 44. **Fisher-Price Thomas and Friends Trackmaster** 45. **Barbie Mermaid Doll** 46. **Play-Doh Sweet Shoppe Cake Playset** 47. **Hot Wheels Shark Attack Track Set** 48. **Nerf Zombie Strike Hammershot Blaster** 49. **Little Tikes Easy Score Basketball Set** 50. **VTech 3-in-1 Sports Center** 51. **Hasbro Twister Game** 52. **Bigjigs Toys Wooden Pirate Ship** 53. **Fisher-Price Imaginext Batcave** 54. **LeapFrog Musical Rainbow Tea Party** 55. **Peppa Pig Playhouse** 56. **Chicco First Baby Blocks** 57. **Tiny Love Super Mat ...

    €65 Average bid
    Zaručené
    €65
    87 příspěvky

    ...specific bank account 4. Send payment (GBP and EUR) to a third party. • Bidding Your bid is my budget. If you deliberately put in a low bid to attract me to speak to you, you either revise your bid, or I will ignore you. • Delivery We need the source code and will integrate your program into a much larger one. You will be paid once you finish all the work and it works on my machine. We will also attack your program, as it has to be secure and reliable without loopholes. It has to be bug-free. • Platform Your code has to work on Windows. • Workplace You will be working online remotely. • Experience Please show us your detailed related work experience and portfolio. Without similar experience, you are unlikely to be awarded, as you may not fini...

    €282 Average bid
    €282 Průměr. nabídka
    5 nabídky

    My Apache web server seems to be under a malware/injection attack. It's timing out and I urgently need an expert to help mitigate this situation. Ideal Skills: - Extensive experience with Apache web server - Knowledge of MySQL - Proficiency in identifying and mitigating malware/injection attacks - Strong understanding of server security measures - Ability to work under pressure to restore server functionality Please reach out if you can help.

    €120 Average bid
    €120 Průměr. nabídka
    44 nabídky

    I need an expert to configure Cyber Panel Enterprise on my VPS running AlmaLinux 9. The primary purpose of this setup is for website hosting, specifically for Joomla sites. Ideal skills and experience: - Deep understanding and experience with Cyber Panel Enterprise - Extensive knowledge of VPS management - Proficient in AlmaLinux 9 - Experience with Joomla site hosting - Website hosting expertise

    €130 Average bid
    €130 Průměr. nabídka
    25 nabídky

    I am looking for a highly skilled Mobile App Security and Video Streaming Security Expert with expertise in reverse engineering prevention, API security, runtime attack mitigation, and HLS Video Piracy protection to prevent unauthorized video downloads without using DRM. Our project requires security hardening against reverse engineering, API interception, SSL unpinning, MITM attacks, Frida/Xposed-based attacks, HLS Video piracy security and other advanced security threats. The ideal candidate should have deep knowledge of mobile application security, penetration testing, obfuscation techniques, runtime security, anti-debugging strategies, and HLS Video Protection without using DRM. Key Responsibilities: ✅ Reverse Engineering Prevention – Implement security measures to prote...

    €691 Average bid
    €691 Průměr. nabídka
    28 nabídky

    ...specific bank account 4. Send payment (GBP and EUR) to a third party. • Bidding Your bid is my budget. If you deliberately put in a low bid to attract me to speak to you, you either revise your bid, or I will ignore you. • Delivery We need the source code and will integrate your program into a much larger one. You will be paid once you finish all the work and it works on my machine. We will also attack your program, as it has to be secure and reliable without loopholes. It has to be bug-free. • Platform Your code has to work on Windows. • Workplace You will be working online remotely. • Experience Please show us your detailed related work experience and portfolio. Without similar experience, you are unlikely to be awarded, as you may not fini...

    €273 Average bid
    €273 Průměr. nabídka
    31 nabídky

    I'm seeking a talented animator to create a wide range of animations for both male and female characters for my game. The animations needed include: - Idle Animations: Various idle states for different scenarios. - Combat Animations: Including attack, defense, and evasive maneuvers. - Walking/Running Animations: Different speeds, terrains and styles. - Jumping Animations: Various heights and styles of jumps. - Dying Animations: Realistic and game-appropriate death sequences. - Interacting with Objects Animations: Picking up, throwing, using objects. - Swimming Animations: Different strokes and speeds for various water scenarios. - Climbing Animations: Scaling different types of surfaces. I'm also looking for a lot more animations to be used in Carrers such as any and all...

    €3416 Average bid
    €3416 Průměr. nabídka
    30 nabídky

    I'm looking for a seasoned professional or a competent team with a strong background in network security, machine learning, and Splunk to create a DDoS and ...traffic data. - Primarily detect volumetric DDoS attacks. - Utilize supervised learning methods through Splunk for detection. - Connect to our company's network via APIs. - Generate a comprehensive incident report that includes potential vulnerabilities identified. Ideal Candidates Should Have: - Proven experience in developing network security tools. - In-depth knowledge of DDoS and IP Spoofing attack patterns. - Proficiency in using Splunk for data analysis and supervised learning for anomaly detection. - Skills in API integration. Budget: $750 to $1250 max. Please share examples of similar projects you have suc...

    €1019 Average bid
    €1019 Průměr. nabídka
    17 nabídky

    I'm seeking a proficient Cybersecurity Trainer for online sessions in Hindi. The ideal candidate will cover network security, application security, cyber threat intelligence, digital forensic, and VAPT. The target learners are intermediate level professionals. Key Requirements: - Conduct live interactive sessions - Deliver engaging and informative content - Address queries and facilitate discussions - Promote a positive learning atmosphere - Use real-world examples to illustrate complex topics Skills Needed: - Comprehensive knowledge of the mentioned Cybersecurity topics - Excellent communication skills in Hindi - Prior experience in teaching Cybersecurity - Ability to create interactive and engaging training sessions - Strong understanding of intermediate Cybersecurit...

    €7 / hr Average bid
    €7 / hr Průměr. nabídka
    7 nabídky
    roblox game
    Ukončeno left

    ...Each spell can have its own range, effects, and cooldowns. You can create attack spells, healing spells, and defensive spells, similar to how characters in Black Clover use their magic creatively. Magic UI: Build an easy-to-use UI (user interface) for players to select their spells during combat. You can create hotbars, spell selection menus, and cool-down timers. Ultimate Spells: Add powerful, game-changing abilities that players can unlock after reaching certain milestones or levels. These could be signature spells like Asta's Anti-Magic or Yuno’s Wind Magic techniques. 5. Combat and Animation Roblox allows you to create custom animations for characters and combat. Focus on: Attack Animations: Create fluid attack animations for casting spells. These...

    €4713 Average bid
    €4713 Průměr. nabídka
    12 nabídky

    I am in need of a qualified penetration tester to assist in assessing the security of one of our publicly available, computer-use AI agents developed by Anthropic. The primary focus of this task will be to simulate a harmless prompt injection attack on our test AI agent accessible via an API key that i will provide. Key Details: - The project involves testing a computer-use AI agent. - The primary concern is with potential vulnerabilities related to malicious code injection. - The pentesting should be conducted in our development environment via API. - To run this you will need to setup a docker environment i will provide the docker image. Please note that further information will be provided to the successful freelancer we choose to work with. Ideal candidates should have extensi...

    €61 / hr Average bid
    €61 / hr Průměr. nabídka
    12 nabídky

    I am in need of profiles for personnel specializing in Information Security, IT Security, and Cybersecurity. Ideal skills and experience for the job: - Deep understanding of IT Security principles - Expertise in Information Security protocols - Proficiency in Cybersecurity measures and tactics Specific skills required for the Cybersecurity profiles: - Vulnerability Analysis - Network Monitoring - Incident Response - Cybersecurity Management There is no immediate deadline for this project, allowing for thorough and thoughtful profile development.

    €1772 Average bid
    €1772 Průměr. nabídka
    29 nabídky

    I'm looking for a seasoned professional specializing in cyber security, particularly in penetration testing and OSINT, with a primary focus on social media analysis. Your tasks will include: - Conducting penetration tests to identify potential vulnerabilities and exploits - Using OSINT methodologies to analyze social media and gather relevant intelligence Ideal candidates should have extensive experience in cyber security and OSINT, with a proven track record in penetration testing. You should be adept at social media analysis and capable of identifying potential security threats. Strong analytical skills and attention to detail are crucial for this role.

    €95 Average bid
    €95 Průměr. nabídka
    16 nabídky

    ...trades through a sophisticated sandwich attack algorithm. This project entails: - Crafting a hybrid execution strategy: The MEV contract should allow for both automatic and manual execution, with the latter requiring prior approval. This will necessitate an intuitive and user-friendly interface for monitoring and intervening in trade executions. - Implementing an advanced sandwich attack algorithm: The algorithm's complexity should be at an advanced level, capable of outsmarting competitors and capitalizing on profitable trading opportunities. Ideal candidates for this project should have: - In-depth knowledge and experience with Solana and MEV contracts. - Proven track record of developing complex trading algorithms, specifically sandwich attack algorithms...

    €77 Average bid
    €77 Průměr. nabídka
    1 nabídky

    I have developed about half of my game project and now I need an experienced game developer to add enemy AI and...and convert the game for Android. The AI will have patrolling and attacking behaviors, so knowledge of implementing this type of AI is crucial. Key Requirements: - Implementing enemy AI with patrolling and attacking behaviors - Converting the game for Android - Creating UI and UX elements tailored for mobile For the Android version, I need specific UI buttons including: - Action, jump, and attack buttons As for UX, the focus should be on: - Ensuring smooth controls - Facilitating easy navigation Ideal Skills: - Game development experience, particularly with Android - Proficient in AI implementation - Strong UI/UX design skills - Understanding of mobile game control...

    €87 Average bid
    €87 Průměr. nabídka
    11 nabídky

    ...directly to the CTO (me) - an old school linux system administrator. We should have daily meetings to evaluate: - any technical decisions that need to be done - any roadblock you might encounter - I can help you find an elegant solution - the progress of the project - I will also do some testing and bug reporting - We require light code and secure code: avoiding unnecessary dependencies and limiting attack surface! (Though I am not a coder, I also work actively on all those projects and communication is key to getting things in order) We estimate that with the existing basis, it is possible to complete the project in +- 23 days of work with 10hrs/day. Please let us know if you are interested by this project, we are keen on having a meeting, discuss the details and start work as...

    €21 / hr Average bid
    €21 / hr Průměr. nabídka
    13 nabídky

    ...Control Systems Integrated Automation Systems (IAS) Role of IAS in monitoring and controlling propulsion, cargo, and auxiliary systems. Programmable Logic Controllers (PLCs) Programming, troubleshooting, and optimization of PLC-based systems. SCADA Systems Supervisory control in real-time operations and data logging. Cybersecurity for Automation Systems Securing PLCs, IAS, and SCADA systems from cyber threats. 5. Advanced Navigation and Communication Systems Electronic Navigation Systems Modern ECDIS, GPS, GNSS, and autonomous navigation technologies. Radar and AIS Systems Latest developments in radar and Automatic Identification Systems. Maritime Communication Satellite communication (VSAT, Inmarsat) and GMDSS updates. Autonomous Vessels and ETO Role Managing electronic systems ...

    €130 Average bid
    €130 Průměr. nabídka
    27 nabídky

    Nejlepší články z komunity cyber attack