Base64 vulnerability jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    3,293 base64 vulnerability jobs found, pricing in USD

    We need to resolve some vulnerability of our drupal website [login to view URL]

    $78 (Avg Bid)
    $78 Avg Bid
    11 bids

    We have converted a PDF to HTML and need the following functionality: 1.) Draggable object that will allow user to enter text wherever they would like on the provided HTML. 2.) Draggable object that will allow the user to place and draw their signature wherever they would like in the HTML. (The drawn signature should be accessible as a base64 string in the typescript component after drawn). 3.) Op...

    $87 (Avg Bid)
    $87 Avg Bid
    19 bids
    Security Analyst 4 days left
    VERIFIED

    I am looking for a security analyst who can assist with vulnerability remediation and analysis. Must have skills: Solving vulnerabilities detected from Qualys Vulnerability Scanner, Registry and Config File fixes. User must be good in powershell to automate some small tasks too. Must have experience in solving vulnerabilities detected from Qualys.

    $14 / hr (Avg Bid)
    $14 / hr Avg Bid
    15 bids

    I need function in our project to encode md5 string with base64 this is php version and i need it in c++ $md5 = base64_encode($md5); $md5 = strtr($md5, '+/', '-_'); $md5 = str_replace('=', '', $md5);

    $25 (Avg Bid)
    $25 Avg Bid
    10 bids

    I'm seeking an expert vulnerability and penetration tester to: Explore a website using NordVPN so that you have a whitelisted IP address and find vulnerabilities in our solution Report those vulnerabilities so that they can be fixed by our development team

    $22 / hr (Avg Bid)
    $22 / hr Avg Bid
    31 bids

    - Please pick an asset such as a specific software, hardware component or a network protocol and apply the NIST SP800-30 framework by going through the following steps: a. Data collection: Creation of asset survey profile, control survey profile and threat vulnerability matrix for the asset. b. Data analysis: Impact, control and Likelihood analysis, risk score calculation. c. Risk classificatio...

    $80 (Avg Bid)
    $80 Avg Bid
    1 bids

    - Please pick an asset such as a specific software, hardware component or a network protocol and apply the NIST SP800-30 framework by going through the following steps: a. Data collection: Creation of asset survey profile, control survey profile and threat vulnerability matrix for the asset. b. Data analysis: Impact, control and Likelihood analysis, risk score calculation. c. Risk classificatio...

    $65 (Avg Bid)
    $65 Avg Bid
    4 bids

    I need to migrate a Magento Store to a different server and domain. Source is: [login to view URL] This store was sold, so it will have a new name/logo/colors but the main layout will remain. I need the store to be installed on the new server using the most recent version of Magento on it. Database must be fully erased. There's no worry about it. Attention: we have been hacked before, so i...

    $183 (Avg Bid)
    $183 Avg Bid
    43 bids

    We are looking for individuals with AWS certification, they will be given priority. Core Responsibilities • Design and automate governance framework across our cloud environments with an emphasis on AWS. • Partner with application delivery teams in enabling cloud services after evaluating the risk exposure. • Conduct POCs on services from security and risk stand points and create a...

    $1134 (Avg Bid)
    $1134 Avg Bid
    41 bids

    Hello. I want to write a PhD proposal. I have the format. I want the subject to be on groundwater vulnerability study in hydrocarbon processing facilities.

    $100 (Avg Bid)
    $100 Avg Bid
    1 bids

    Source code for [login to view URL] hosted in [login to view URL] (i.e., [login to view URL] ). A benign example would be: [login to view URL] <?php $name = $_GET['name']; echo "Welcome $name<br>"; echo "Have Fun!"; ?> 1. Which of these 3 terms precisely describe the vulnerability for this index page? Justify your answer. a. Persistent XSS b. Non-pers...

    $26 (Avg Bid)
    $26 Avg Bid
    7 bids

    Good day, I want to write a PhD proposal on groundwater vulnerability assessment for hydrocarbon processing facilities.

    $100 (Avg Bid)
    $100 Avg Bid
    1 bids

    For our firmware on raspberry we would like to have a function where we send a photo to and the function returns response back. We also want to use this function on our Ubuntu server. Create a firmware function on raspberry Pi 3 and Ubuntu that recognize face of person. - Detect liveness - detect male or female - detect tired, gloomy, sad - check face on local DB / base64 image (not file) for re...

    $264 (Avg Bid)
    $264 Avg Bid
    18 bids

    I need you to write a research article. Groundwater vulnerability study

    $28032 (Avg Bid)
    $28032 Avg Bid
    26 bids

    implementation of semantic rules for detecting HTTP vulnerability attacks

    $177 (Avg Bid)
    $177 Avg Bid
    7 bids

    server pentest task and write vulnerability in file

    $162 (Avg Bid)
    $162 Avg Bid
    22 bids

    We're looking for a professional web developer to build a new p2p bitcoin exchange with - Escrow and adding offers like paxful - Start trade, mark trade as paid, complete trade, auto-cancel trade, cancel trade by user, dispute trade, leave feedback -Trade live chat -DDOS Protection - 2 fa authentification -Transaction SQL and protection of data -Proper protection against : Clickjacking XS...

    $1551 (Avg Bid)
    $1551 Avg Bid
    40 bids

    1. Need to create second language products from Vendor Frontend dashboard using wpml. Create Multilanguage (Arabic version of existing and new products) products option using WPML from Dokan frontend dashboard. Create product from frontend having some minor problem. Functionality:- If vendor create and submit the secondary language product from frontend dashboard, that product is waiting for app...

    $27 (Avg Bid)
    $27 Avg Bid
    6 bids

    1. For Homepage - Totally RTL is not [login to view URL] to recorrect. Featured Products - Need to show only the Highest sales products only backend work completed - need frontend only. Need Pixel perfection. 2. Create some ( inner pages, Global buttons, Global popup windows, Global Forms and also recorrect the current all pages, create and recorrect mobile responsive theme as per PSD or image fi...

    $59 (Avg Bid)
    $59 Avg Bid
    7 bids

    file upload vulnerability check

    $127 (Avg Bid)
    $127 Avg Bid
    4 bids

    I have 3 Project 1st MVC API project, suppose URL is [login to view URL] 2nd MVC project for dashboard, suppose URL is [login to view URL] 3rd IONIC-4 with Angular-5, supppose name is ImageUploadApp abcAPI.com==> My API project has post method name UploadImage() which has image upload code, basically accepting N number of images in base64 string. xyzDashboard.com==> My dashboard project ha...

    $17 (Avg Bid)
    $17 Avg Bid
    5 bids

    Find a vulnerability on the university’s website, which can at least find any student, and any group of lessons, and even to change the grade for the subject. Technologies: IBM, Java, Vue. "Hack"

    $55 (Avg Bid)
    $55 Avg Bid
    2 bids

    We need a policy book (a simplified version of policies grouped according to the list of topics below). This should be a single document. Policies should be standardized, for a site that processes user data, but without unnecessary points, only the most important. After the preparation of the first version of the document, there will be some small adjustments (which refers to the particular site)....

    $20 / hr (Avg Bid)
    $20 / hr Avg Bid
    31 bids

    For example, doc macro vulnerability CHM script exploiting vulnerabilities

    $507 (Avg Bid)
    $507 Avg Bid
    4 bids

    I need a classic ASP page written with VB script code that will act as a JSON rest API web service. This ASP page will be hosted on a Windows server running IIS 7.5. This page will accept JSON Posts from "the thing's network" I need you to write the logic that will parse the JSON header to extract the variables and values. I will write the code to insert these values in a databa...

    $155 (Avg Bid)
    $155 Avg Bid
    4 bids

    Hi mahamadali, I noticed your profile and would like to offer you my project. We can discuss any details over chat. I need these things done on a php site: 1. adding a Recaptcha to a sign-up form (the code for the previous Recaptcha form is still there, which should make this task easier) 2. fixing one minor glitch (can provide full error message) 3. patching up an XSS vulnerability in a file I&...

    $50 (Avg Bid)
    $50 Avg Bid
    1 bids

    We are from an Online Tutoring Company We are currently looking for an online tutor who can teach Information Security Course which should consist of any of the following domains: o Network & Endpoint Security o Cryptography and Public Key Infrastructure o Security Monitoring & Incident Handling o Threat Intelligence o Vulnerability Management o Identity Management o Security Operations ...

    $8 / hr (Avg Bid)
    $8 / hr Avg Bid
    10 bids

    hello, someone hacked my websites, and I need to get rid of the virus and find any vulnerability in my website. can you do this job

    $1500 (Avg Bid)
    $1500 Avg Bid
    1 bids

    Current Issue: we have a javascript file which contains an Obfuscated javascript code which is not readable the functions, all parameters, objects are encrypted or obfuscated. at the beginning of the file, there is a javascript array which contains a base64 encrypted items (each item in that array is base64 but we have decoded them and put them in [login to view URL]) Requested task: we want to ...

    $39 / hr (Avg Bid)
    $39 / hr Avg Bid
    64 bids

    • Conduct a security risk assessment to prioritize investments and activities • Conduct a risk assessment of system prior to going live • Perform a review and update risk assessment in February 2020 • Conduct risk assessment of the system annually from February 2021 • Perform risk assessments for our datacenters • Prepare a service continuity/ disaster recovery ...

    $1133 (Avg Bid)
    $1133 Avg Bid
    17 bids

    Seeking experience security tester to test security of our web application and server from 1. Vulnerability like XSS, Posion Null, SQL Injection, Port Scanning, Script Vulnerabilities 2. Recommendation Report and Patching 3. Verify the patches done and re-test Bidder to present security report done to be shortlisted to receive full spec.

    $104 (Avg Bid)
    $104 Avg Bid
    13 bids

    I need help in developing a 4000 word compeling research proposal for a cyber security research project - this is around threat and vulnerability management and needs to be from an SME.

    $72 (Avg Bid)
    $72 Avg Bid
    38 bids

    TLS Vulnerability presentation. i will provide version and type of hardware i need a presentation and info on this issue

    $149 (Avg Bid)
    $149 Avg Bid
    10 bids

    Location: Washington DC/Metro area Looking for Microsoft Certified professional to perform the following: Install Microsoft Server 2019 Install Microsoft Seal- [login to view URL] Setup domain control and VPN Setup Group policy Configure Firewall Configure IPV4/IPV6 Install Anti Virus/Identity Protection Install Retina- [login to view URL] Create task scheduler/Backups Upon completion provide ...

    $50 / hr (Avg Bid)
    $50 / hr Avg Bid
    27 bids

    For our firmware on raspberry we would like to have a function where we send a photo to and the function returns response back. We also want to use this function on our Ubuntu server. Create a firmware function on raspberry Pi 3 and Ubuntu that recognize face of person. - Detect liveness - detect male or female - detect tired, gloomy, sad - check face on local DB / base64 image (not file) for re...

    $341 (Avg Bid)
    $341 Avg Bid
    23 bids
    $847 Avg Bid
    20 bids

    I would like to grow this one further but need a roadmap and structure on Content -Themes: Cyber physical systems, critical infrastructure, cyber and it sec; self driving vehicles Output: 4-6 pages

    $71 (Avg Bid)
    $71 Avg Bid
    12 bids

    Small simple project. Just need help with creating a simple crosswalk in Excel. Just needs to list the following and then map it to specific NIST items. Such as NIST800-100 for Information Security Program/Governance. An example would be the table listed in this doc: [login to view URL] Just needing the categories below listed, followed by a description and then the NIST library that is maps to ...

    $25 (Avg Bid)
    $25 Avg Bid
    15 bids

    The selected freelancer consultant will collaborate with us and carry out the followings: Develop tools to conduct mapping of all communities and villages within a community selected for Activity intervention, develop an instrument to capture the socio demographic details of prospective participants, develop a tool to assess the vulnerability of prospective participating households using the set c...

    $459 (Avg Bid)
    $459 Avg Bid
    8 bids

    We are building vulnerability scanners and pod agents. As part of that we need to have the following agents built so we can protect the users from such vulnerabilities. 1. User gets an email with a hyperlink, when clicked it asks for the gmail username/password. Once entered, it will ask for delete all the messages in that gmail account (using the API). We need to be able to trace the user...

    $115 (Avg Bid)
    $115 Avg Bid
    8 bids

    Design a host/network/mobile application that is capable of detecting a single host/network vulnerability. * Any programming language such as C, C#, Java, Python, etc. may be used. * A one-page pdf [login to view URL] proposal should include the following sections: Title, Abstract (i.e. a brief summary and description of the project) and Used Tools (i.e. Java or Python, etc.). * The final report s...

    $172 (Avg Bid)
    $172 Avg Bid
    14 bids

    Primary responsibility would be to perform Vulnerability Assessment & Penetration Testing as well as Source Code Review of Web Applications and articulate reports of the assessment and present findings to various stakeholders as well as support clients in patching the identified vulnerabilities Perform the security assessment on web applications, network devices and servers Write in-house tool...

    $4 / hr (Avg Bid)
    $4 / hr Avg Bid
    3 bids

    We are looking for a all round Cyber Security Expert / Developer / BA to assist with the following: Guide us on architecture Perform Penetration, and vulnerability testing (web application, and network) Consult as Expert Due to the nature of the application, we require persons whom only work at the highest level, and is able to maintain absolute discretion (which will at all times be mutual). T...

    $31 / hr (Avg Bid)
    $31 / hr Avg Bid
    21 bids

    1. Use C language and cuda 2. Read the contents of the txt text, one string per line 3. String execution (md5|base64) 4. Encrypt to sha256 to get the private key (btc|eth) 5. Generate wallet address (btc|eth) 6. Private key and address Save to [login to view URL] | [login to view URL] I can provide a similar project for github for reference. There is bitcoin cuda encryption method.

    $151 (Avg Bid)
    $151 Avg Bid
    3 bids

    Realize an API REST in C# that - receives 7 strings as input - connects to a web page - fills in an HTML web form with the 7 values (5 textboxes, 1 dropdown menu and 1 radio button) - invokes an already existing API to decode a captcha image shown in the web page (this API receives the base64 encoding of the image and returns a string containing the decoded Captcha) - fills the captcha text box - ...

    $182 (Avg Bid)
    $182 Avg Bid
    34 bids

    Prototype Application development Firebase Authentication prototype using HTML,JAVASCRIPT,Angular,PHP: Basic requirement 2-3 pages prototype application: login/signup page Sample Dashboard Page Functionality: User login using email/mobile and password User creation, disable, enable, Reset password, update email and mobile Disable user after 5 unsuccessful login attempts Log writing - password c...

    $160 (Avg Bid)
    $160 Avg Bid
    5 bids

    Training on following • Execute internal, external, wireless, and web application pen tests • Execute social engineering tests, including phishing, vishing, and physical • Execute Vulnerability scans and assessments • Compile and write client reports • Navigate the Kali system from the command line only • Create, modify, move, and write files and documents from the c...

    $10 / hr (Avg Bid)
    $10 / hr Avg Bid
    10 bids

    I need help for the penetration test for my website. You should know well about the SQL injection and Vulnerability back doors. website : [login to view URL] Should be complete with in 2 days.

    $186 (Avg Bid)
    $186 Avg Bid
    9 bids

    I have following Base64 string with non english characters. My VBA have procedure that decodes base64 but it does not decodes non english characters properly. Can someone make the correction in attached excel so that I get the following output from my base64 input Base 64: ======== VGhpcyBzdHJpbmcgY29udGFpbnMgZm9yZWlnbiBjaGFyYWN0ZXJzLiAgUnVzc2lhbjog0LssINC8LCDQvSwg0L8sINGALCDRgSwg0YIsINGELCDRhSw...

    $15 (Avg Bid)
    $15 Avg Bid
    4 bids

    I need the following: A website which is connected to a contabo server A Website which preforms 3 Risk assessments on any given website Good design and to be able to download all content to a report All work much be your own Deadline is short but money is high I need a vulnerability website. This is a website which searches other websites for vulnerabilities. But as i have such sort notice ...

    $1683 (Avg Bid)
    $1683 Avg Bid
    30 bids