Looking for penetration tester / ethical hacker for a Enterprise-level SaaS solution with multiple access points. This is a long-term partnership with multiple projects in the pipeline. Experience with cybersecurity audits and SOC 2 compliance is a plus.
Hi, Due to some technical reasons, we need to book appointments with script to save time and avoid loosing slots when available. Skills required : Burp Suite, Ethical hacker, Internet Security, etc regards.
I need a system admin to investigate a breach on my dedicated server that allowed a hacker to send a few thousand emails. I need to find out how they breached and the method to correct it. NOTICE- YOU MUST BE ABLE TO LOGIN TO MY PC VIA TeamViewer or Anydesk to access Cpanel and WHM. WE cannot give out password.
...currently hosts 3 domains plus some several subdomains with websites corresponding to the domains & subdomains. The server is managed with Plesk. The Plesk email system is used for my business email. Last week, the server was compromised by somebody who has been continuously sending SPAM from all 3 domains on this server. I cannot use my own email accounts
I need a system admin to investigate a breach on my dedicated server that allowed a hacker to send a few thousand emails. I need to find out how they breached and the method to correct it.
...bluehost. Any other domain, namely [login to view URL], was created as a subdomain. A hacker (maybe) graciously left me with this backup months and months later following what I thought was the end of my site. Bluehost was locked out and could do nothing. As is, i have an EC2 instance running centOS 7 and has cpanel installed. I need to have that instance
...have a presence. So, if you are from India, Southeast Asia, South America, Africa, Middles East, you are more than welcome to apply. Company: [login to view URL] Growth Hacker Core Responsibilities: • Acquire new customers (schools and kids' parents) to use our platform. • Plan, manage and execute performance-based user-acquisition campaigns across
I have a wordpress site that has been subject to a hacker attack. I have cleaned up most of the files but now when I log in to the site I am directed to spam sites
...marketed through Fundraising, using the power of social media. Digital Marketing Manager - Conceptualize and create growth strategies for [login to view URL] and [login to view URL] - Help conceptualize and create an expansion playbook - Apply analysis and optimization techniques to aggressively scale paid media campaigns on Facebook, Instagram, and
For a coming soon multiplayer online game, I need a design for 10 collection cards of many different characters. The game is working around the crypto-related world (Bitcoin, Mining...). It will be a Clash Royale like, so I think you can easily understand what it has to look like; A simple border, design inside (that can be view in small size) and
...just thinking is creating csv string out of dataframe rows then I may run single neo4j query That will definitely give me results Query will look like this: WITH ["growth hacker","Popego"] as terms MATCH (t:Term) where [login to view URL] in terms return t So Are confident in fixing any one of the way? If yes, can you strart immediately I will give scala file
English: We are looking for a person that separates the Digital Marketing strategy, focused on Growth Hacking techniques. Activities include: - Creation and optimization of home pages (Unbounce / Instapage) - Creation and optimization of email marketing campaigns, both connected clients and cold contacts. (Autopilot, Hubspot, or tool to choose) - Definition
*LOOKING FOR FREELANCE PROGRAMMERS TO PERMANENTLY WORK WITH, IN MULTIPLE PROJECTS. NOT A ONE TIME THING. • Making Arduino-based prototypes o robotics o consumer products o medical products • Arduino exp 1-2years • Electronics basic know-how • Coding experience with Arduino ( bonus if experience Android Programming, Unity, C# ) SINGAPORE BASED
You'll be responsible for developing, initiating, creating and overseeing several short- and long term digital marketing campaigns, as well as spearheading advertising and marketing solutions. We’re looking for a “Growth Hacker” with experience in SEO, SEM, PPC, copywriting, art direction and social media who can expand our brand's reach and awarene...
... Links must not be made using automated software or any other illegal linking methods (like hacked website etc.). Blackhat or Grey hat methods will not be accepted nor paid for. We have the right to reject URLs that do not comply with the following Guidelines. - At least 1 backlink must be PR5 - At least 5 backlinks must be PR4 - At least 25 backlinks
...need some changes to an existing website. I have and HTML Bitcoin Faucet and lots have been complete though the site is not running, i need someone to complete the site Here are some required features: admin panel needs to be properly installed with all required features Faucet in a box intergration Tutorial (walkthrough for newbies) Needs more
hello, i want to make fictional story about freelancer in real world. make it very interesting.. set the world timeline, place, tech, government, people, and other things..
...some changes to an existing website. I have and HTML CSS Bitcoin Faucet and lots have been complete though the site is not running, i need someone to complete the site Here are some required features: admin panel needs to be properly installed with all required features Faucet in a box intergration Tutorial (walkthrough for newbies) Needs
Hi, Looking for a UI created, for a computer hacking simulation. At this point all we want is a login screen, and then a "console" where the user can type commands into it and receive data back. We're looking for an original design, hacker themed, retro... Uplink, Tron, Mr Robot styled. Something captivating and attractive, but also simple.
...hackers hack into our databases, and also perform DDos attacks etc. We need a skilled ethical hacker in this field, who has knowledge of the attacks hackers use such as XSS, SQL Injection, DDOS and more to look into our site and server and secure it for the future. If you have read this project description, please include the word 'iread' in your
I need a graphical step by step layout of how a program can be changed by a hacker to elevate their authority. We will provide the programming statements and language for each infographic. There will be three...Trap Door, Storage Alteration, Storage Reference. I need these by 9/6/18.
...above and beyond for his customers, to create for me a site and sign up for a membership site I am launching in the next two weeks. This guy's letter was great that I received, but I still need to meet with him to decide: "I am Expert of New Kajabi and can help you with any project related New Kajabi. As a Sales Funnel Hacker and Designer, I he...
we need python hacker to optimise our current codebase, make it faster and develop integration with tensor-flow or similar. it is best if you are available part time - preferably 4 hours a day or maybe 3 full days a week. no agents, companies, etc, we want to work with you, dear programmer, directly and want you to be part of our distributed team
Excelify.i...from other platforms to Shopify, and to manage the store data in that store. [login to view URL] goal is to become the default way how Shopify store owners manage their data. Looking for a person who will find and execute creative and bold ways to grow our customer base, and help us become #1 best-selling app on Shopify AppStore "Tools" section.
Are you an expert at web scraping / hacking? I will supply a csv file of 2000+ company names. I need to know the parent/child tree. This information is usually available in business research databases. I have one free source thought it is not ideal because of their site's restrictions. You will get us the list of the company names the parent companies
I have an adult website that need standard SEO, creating links, blog posts and articles, and all that is required to help me position on certain phrases I am looking for someone who can drive organic traffic quickly using white hat and No use of automated software or bots. A daily / weekly report needs to be presented covering details such as when
...monitors) along with other tools. Experience| Skills Needed: (Must have one of the mentions below) Coder Hacker PPH C++ Security Database Conrtol Tech more..... Age Requirement: Must be 18-28 Responsibility: Help code and launch an app. (Design is finished, but we need it to come to life) Characteristics: Innovative Creative
...theme should be cyber, hacker, or futuristic-looking 6. Sound effects are authorized (but optional) 7. Visit this link for an *EXAMPLE*: [login to view URL] Be creative! If you need an extension, please message me. I will consider extending if enough people request it. You MUST be competitive for me to consider the request
...PR 3-8 Permanent Quality Backlinks quick for escort websites. Requirement are as follows : *200 PR3+ backlinks. Some websites must be PR6 and PR7. As many PR8 and PR9 as possible. * NO LINKS FROM DIRECTORIES, ARTICLES,SOCIAL BOOKMARKING. * All links must be appropriate for our website. * Page Rank is for page that has the backlink - not the homepage
...looking for a professional hacker for partnership that can make you easily 10,000 to 50,000 thousands dollar for a months this is not a scam or some other stupid offer its a real offer that will make you rich as you wish, i can guarantee that because the site rules i cant write more details on this message so if you are a professional hacker and you
There is a this smartphone iOS app I need a hacker to check if that app is tracking anything on the phone where it is installed. I can not provide the source code though. The app installs itself as Device Managment app. Serious offers please.