Bidbutler hacking jobs
Hi, I'm seeking an experienced ethical hacker/ penetration tester to deliver online training one on one with for a beginner. Must have AWS knowledge and able to follow curriculum. Long term opportunity for the right freelancer.
We own a Magento 1.9 website and would like to convert it to a Wordpress / Woocommerce 5.2.x website. You need to build the website using a UX builder from flatsome . No hard code is allowed and no hacking of the wordpress core file is allowed. No plugins installation is allowed except: Contact Form 7 WooCommerce You need to use the child theme in order to: override template view use the file CSS is allowed only in the file inside the child theme folder. Any override will be done according to wordpress guidelines: NO HARD CODE OR HACKING or core files is allowed. The new site needs to be exactly the same as the old website including all layout and responsive design. All links need to be relative so when we convert the website to production
We own a Magento 1.9 website and would like to convert it to a Wordpress / Woocommerce 5.2.x website. You need to build the website using a UX builder from flatsome . No hard code is allowed and no hacking of the wordpress core file is allowed. No plugins installation is allowed except: Contact Form 7 WooCommerce You need to use the child theme in order to: override template view use the file CSS is allowed only in the file inside the child theme folder. Any override will be done according to wordpress guidelines: NO HARD CODE OR HACKING or core files is allowed. The new site needs to be exactly the same as the old website including all layout and responsive design. All links need to be relative so when we convert the website to production
...restrict any posting.... k) The Developer will use a fresh coding, no third party codings or modules/application will be used unless asked by the buyer and the buyer will have complete right on the coding as per US laws. l) The website will be fully safe and secure from hacking/malicious attaks or sql injuntion sort of website should follow OWASP standards e.g. prevent following attackes CSRF(cross site request forgery), Cross site injections and attackes, sql injection, filter all inputs and encode outputs, code , hacking code attacks, Data Encryption m) site should have multi language support n) Users can have Option to like, share, comment a profile Budget will be allocated after the project is submitted. Same Developer will be given more similar oppertunities on o...
...pricing) - Multi-ware house inventories (there are several) - Ability to markup product pricing by categories and option to do so by pricing (IE: low cost higher markup, high cost low markup) - Accurate shipping quotations -Some minor template modifications are required please see bellow ** All work done must allow for system upgrades without compromising the work of the candidate (IE: no core code hacking) CONCERNS: -Our supplier provided us with a general sorting sheet, we have already come up with matching products to 105 different categories; while some categories are clear, and others are extremely general. Example: Computer Accessories. This category can have mouse, keyboards and screen protectors for laptops. We need to integrate products with our existing categories a...
It's a growth hacking agency. Looking for someone very good who I can then hire out to web dev clients.
...industry of our website and online shopping sites. • Google guidelines for building links must be followed. • Absolutely NO links from websites with a google penalty or google ban. Website Types we DO NOT want links from: • Ping Sites • Link Farms • Directory Sites • Article Directories/Submission sites • Under Construction sites or Parked Domains • Torrent Sites • Gambling Sites • Adult Sites • Hacking Sites • Hate Sites • Forums • Guestbooks • Classifieds • link exchange programs • Pharmacy sites • Sites with intrusive advertising such as popups or popunder advertising • Sites containing malware or malicious scripts • No pages with more than 100 external links on them The fol...
We need somebody with diverse marketing support experience: Scope of tasks: - social media (Twitter, Facebook) - Gueriella marketing - newsletter marketing (creating newsletter templates) - growth hacking tactics fluent english at least: 3yrs work experience in marketing Location needed is Eastern Europe Ability to work 20-25 hours a week Please provide proof of your experience in your proposal.
...ghost writer. Complete tasks on your own time. Potential for regular pay increases, bonuses and responsibilities for the right person. Read through the contest outline below to learn how to become a key part of our online marketing team. Contest Outline *Writer to review blog posts posted at link below in order to get a sense of the “voice” to be written in. *Contestant will receive a video and a transcription of the video located in this folder: *Contestants to submit: **A blog post to accompany the video **A 300 word review of a recent movie they saw and explain why I should watch it. **Three examples of their own work (can be other blogs or websites) Contest Rules *Read
Looking to hire a Designer that can design 2 sided business card . we have a logo, and just need someone to design the card. The logo (Attached)will be either a silver or gold raised foil. the card will be a suede card (if this info is needed). 1. Full Name 2. email 3. phone 4. text - Digital Growth Hacking Experts 1,2,3 will be provided when selecting the contest winner
About us: Rho+1 is a full-funnel ad agency We use strategy, copywriting, design, media buying, and growth hacking to generate leads, drive sales, recruit, and build brand awareness for our clients. We're looking for an experienced translator to translate a short 350-word landing page from Swedish to Finnish. It is a company lead-generation website. This project requires experience with Swedish to Finnish translation. The text is semi-technical. In your proposal, please share a brief summary of your experience, including examples of relevant translation work.
...website can check in the steam market the price and give them 15% (I should be able to choose in backend) less than the steam market. I expect that this takes extensive knowledge in steam-api, steamanalyst-api and various payment system integrations as well as scripting CS:GO-bot accounts to integrate with the system. I also require solid security measures on the website since I expect plenty of hacking attempts and DDOS-attacks. I need my customer security to be top-notch at all times. References: Skin.club. I hope we can work this together for a long time. Other than that, I'd love integrated systems for referrals, affiliates and so on, as well as a system in the back-end that lets me manually handle support tickets. This means, in order to handle support effectively, ...
need someone with a ethical hacking back ground to generate password for company email
Hi! We are seeking security/hacking experts who are able to accomplish interesting things. With you we will form a team and create newsworthy stuff. Please let us know what you are working on and what you have found out. Kind Regads, Ndroi Team
Need freelancer to fix user hacking issue.
Hi, I am interested in whatsapp hacking. Are you dealing in this job? Thank you Zeeshan
Hello Who have experience to change api's data using some hacking tricks Thanks
We need somebody with diverse marketing support experience: Scope of tasks: - social media (Twitter, Facebook) - Gueriella marketing - newsletter marketing (creating newsletter templates) - growth hacking tactics fluent english at least: 3yrs work experience in marketing Location needed is Europe Please provide proof of your experience in your proposal.
I am currently looking for a technical content writer. The project is about an ebook which should allow insight into "Ethical Hacking" and can be used as a beginner's guide.
hey there I'll design an attractive & modern website for your business with best and latest ui/ux design. I'm well experienced in designing stunning websites which support you to achieve your targets. I may have couple of questions for you to make sure we both und...the requirements: 1-Have you already purchased domain & hosting plans? 2-Do you have the content ready for this? Benefits for you: 1- Creates best website for you amount your competitors. 2- Creative and modern website. 3- Responsive on all mobile devices. 4-Friendly communication. 5-Available for revisios. 6-High quality work. Also free penetration testing service for protection you from hacking or crber attacks. please feel free to contact well discuss further details through chat.I look for...
hey there I'll design an attractive & modern website for your business with best and latest ui/ux design. I'm well experienced in designing stunning websites which support you to achieve your targets. I may have couple of questions for you to make sure we both und...the requirements: 1-Have you already purchased domain & hosting plans? 2-Do you have the content ready for this? Benefits for you: 1- Creates best website for you amount your competitors. 2- Creative and modern website. 3- Responsive on all mobile devices. 4-Friendly communication. 5-Available for revisios. 6-High quality work. Also free penetration testing service for protection you from hacking or cyber attacks. please feel free to contact well discuss further details through chat.I look for...
Scenario-1 SQL Injection Attack: the objective of this technique is to the attack data driven application security weakness, by entering a malicious SQL statement into an entry field for execution to allow spoofing, tamper with the data at rest, exposure of data on the system, destroying the data or make the data unavailable. Scenario-2 Cross-site Scripting Attack: the objective of this technique is execute a malicious scripts/code in web browser or web application, so that when the victim visits the web application the malicious code will be executed. This will then allow the web application to become a vehicle to deliver the malicious script to others users on the same platform Scenario-3 Dictionary Attack: the objective of this technique is to breach the computer security of th...
hey there I'll design an attractive & modern website for your business with best and latest ui/ux design. I'm well experienced in designing stunning websites which support you to achieve your targets. I may have couple of questions for you to make sure we both und...the requirements: 1-Have you already purchased domain & hosting plans? 2-Do you have the content ready for this? Benefits for you: 1- Creates best website for you amount your competitors. 2- Creative and modern website. 3- Responsive on all mobile devices. 4-Friendly communication. 5-Available for revisios. 6-High quality work. Also free penetration testing service for protection you from hacking or cyber attacks. please feel free to contact well discuss further details through chat.I look for...
I have a real estate business. We have been in litigation for 6 years with an associate. My computer has been hacked, I have taken screenshots everywhere, tried to clean out the plists, malware clean etc, but they are getting through with temporary proxies. I need someone to establish a connection between who is hacking me and the proof I have found, in order to make a police complaint. There is a link to my iPhone as well. They can probably see this email.
...candidate must be creative and come up with designs as per expectations and execute them in a timely manner The designer has to be comfortable in coming up with Animations in the Design and implement them in the site. The flow of the site has to be extremely smooth. The candidate has to be extremely hands-on with Hubspot as we run our entire site on Hubspot. The candidate needs to know growth hacking techniques to come up with designs and implement designs in the shortest amount of time. The candidate needs to take full responsibility of proper functioning of the website including Mobile Responsiveness of the site. The candidate needs to fix the mobile responsiveness of the current site and also be responsible Mobile Responsiveness for all future designs and its implementatio...
...registration possible • Same user date should be used for a forum • Award system in forum • YOAST usage for SEO optimization • Multilingual (except forum, this can be separate within the forum categories) o If someone from US enters HP, he should get automatically English language, users from Germany automatically german! • Security is important, so what do I need for wordpress security (anti hacking) • Implementation of Instagram account and facebook account How does Wordpress work with test instances and productive instances? Can we do easy Backup from productive instance to a sub-domain to test functionalities and page preparation… etc? I am open for all kind of cooperation. I would love to work with someone in long-term. But as you mig...
Dear friend, We are a growth hacking company in Canada which delivers multiple growth services for our clients. We need a web crawler and smart guy who is able to extract data from website and also process some basic data entry. Our intention is to work long term and provide you different requests which will be done to support our clients. Our team is young, and you will have the opportunity to grow in our startup if you want to. :-) Let me know if you are interested in knowing more. All the best, Jose Moliner
...our website and online shopping sites. • Google guidelines for building links must be followed. • Absolutely NO links from websites with a google penalty or google ban. Website Types we DO NOT want links from: • Ping Sites • Link Farms • Directory Sites • Article Directories/Submission sites • Under Construction sites or Parked Domains • Torrent Sites • Gambling Sites • Adult Sites • Hacking Sites • Hate Sites • Forums • Guestbooks • Classifieds • link exchange programs • Pharmacy sites • Sites with intrusive advertising such as popups or popunder advertising • Sites containing malware or malicious scripts • No pages with more than 100 external links on them T...
I am looking for GDPR compliant website to be developed for an online marketplace for student jobs. It needs to allow: 1) employers to post jobs 2) employers to search and view ...communicate to employers via the platform 13) a means for the platform to charge employers a finders fee for each student they are provided contacts to and hired 14) Admin functionality to manage any student/employer issues. 15) Internal messaging systems to be complimented by email notifications as well to both students and employers. 16) must be built with proven security design patterns to prevent hacking of data I am looking for a clean, simple but professional user interface and will need to see evidence of previous work - hopefully in a similar application you have produced already. Many Thanks ...
i needed software (loader) for hide my username and password from my software i m working remotely via team view purpose of loader anti hacking my userman and password
Looking for someone who can do ethical hacking to identify weak points on web/online system
We need an expert in facebook hacking to bring us 1-Login information included the password 2-Emails /Numbers of the Victims
...Incoming and outgoing calls Incoming notifications Battery removal Cable insertion and removal for data transfer Network outage and recovery Media player on/off Device power cycle Usability testing - Ensure the app is usable across all devices and OS. Installation testing: Test for installation, updating and uninstalling of an application Certification testing: Security testing - vulnerabilities to hacking, authentication and authorization policies, data security, session management and other security standards. Location testing: Connectivity changes with network and location (Please confirm if you can do this as we are launching the app in Nigeria) Outdated software testing: Load testing: Simultaneous testing of the app by downloading and operating. Black box testing. Crowd ...
Anyone who is good in C language and knows ethical hacking can do this project
Interception and Alteration of DNS Requests The trick here is how web page addresses are like extensions of the IP addresses that the Internet works with. This extension is called D...internet router / modem. - Mode 2: By taking advantage of technical aspects of the network, hackers make the ISP's DNS "err" and enter a different number from the correct one. This error only airs for a few hours until the DNS buffer is renewed and it looks up the correct IP address again, undoing the modification; - In order for the fake file to continue loading after DNS returns to normal, the hacking advertising code tells the victim's browser that it is "valid" until December 2015. As a result, the browser does not attempt to reload this file and advertising is still d...
We are a new interior designing service company that need to grow through funnel growth on the internet and social market, to boost our sales. we need someone who can take care of all social media responsibility and target all the channels. Build brand awareness and drive traffic to our website, monitor groups and customers looking for services, and create strategy & build the traffic
Hi, We need a online trainer who can teach beginning to advanced hacking concepts
...----------------------------------------------------------------------------- The Funding Projects will be posted by Organisations like: – "Social Enterprise", "Individual", "Charity" or "Corporation" ---------------------------------------------------------------------------- The template code must be open and should be simple and safe without any plugin or dependencies that can potentially expose to hacking. The web design MUST be 'Responsive' ----------------------------------------------------------------------------- Web Designer quoting for this project MUST have a portfolio of web design work done in the past and demonstrated ability to convert into installable Joomla 3.x template once the design is finalised. Bidd...
We require a competent senior developer to help look at an existing payment gateway integration and fix security problems. The system has been compromised by hackers so we need an expert to have a look and block all loopholes. See below API details for the integration:
my soft switch from ipsmarxs is hacking which is installed in server from galaxyvisions. I am looking to any one who can defend my switch from hacking.
Good day, We developed in-house in a WP multisite network. The intention is that we will wo...and that is that all the product media (images, galleries, videos) need to be physically duplicated in the media folder of each partner shop/subsite. Therefore we started researching the alternative solution for this issue and we came across this plugin: WordPress Multisite Shared Media (), but most likely there will be some hacking required to make the two plugins to work together seamlessly, and that is beyond our in-house capabilities. Hence this job request, in the hope that we could find a workable and affordable solution. Looking forward to receiving quotes from qualified people Edwin Spiessens
I’m looking for an artist on a simple classifieds site with user authorization via SMS. Increased protection against hacking and attacks is required. All components are purchased.
Hello, I'm looking for someone who is capable of hacking any website to test penetration. Actually , I need to upload html files in any directory of target website. No upfront payment. Can work for long time. Only bid if you are capable. Budget 50$ per website.
Need to hack ethically to a phone remotely more details coming later fixed price is nearly 80.00 usd