Filter

My recent searches
Filter by:
Budget
to
to
to
Skills
Languages
    Job State
    564 fud jobs found, pricing in USD

    I need you to develop some software for me. I would like this software to be developed for Windows using Java. custom fud silent install exploit

    $162 (Avg Bid)
    $162 Avg Bid
    19 bids

    We need a POC for...1 and 10, with all recent security updates, in c++ for x64 and x86 for fully hiding a process for the Task Manager and 3rd party tools such as Process Explorer. Must be 100% FUD. No UI needed. To qualify, please prepare a demo to prove your capability of creating such POC and after being hired, we will request the full source code.

    $188 (Avg Bid)
    $188 Avg Bid
    14 bids

    Looking for someone to create a fud skype automatic message poster.

    $472 (Avg Bid)
    $472 Avg Bid
    19 bids

    I need to crypt an open source exe. It need to be FUD and evade : -runtime detection -scantime detection Let me know what you can done.

    $34 (Avg Bid)
    $34 Avg Bid
    6 bids

    Y...read about "Crypters" What is a crypter? - Crypters are software tools that use a combination of encryption, obfuscation, and code manipulation of malware to make them FUD (Fully Undetectable) by legacy security products. If you can do this. I need your skills and service for daily running work. Please only BID, if you know this subject.

    $117 (Avg Bid)
    $117 Avg Bid
    3 bids

    I require a Python coded Microsoft Word (extension .doc) exploit builder/Tool to convert executable files extensions to .doc file extensions that can be opened with 2007 to 2013 version of MS office Word. The doc exploit must be SILENT type (Not Macro). The word document when opened must silently and automatically install the exe/dll/bat/pif file in the background unknown to the target host machi...

    $283 (Avg Bid)
    $283 Avg Bid
    2 bids

    PROOF OF CONCEPT FOR AUTHORIZED PENTEST **** FUD Key logger with all usual logger options (key logging,clipboard,pages etc email and ftp logs,invisible in tray,task,folder and add/remove programs) + Remote Installl + PDF or JPG server file to be sent via email, and executed upon opening file. Must be FUD against AV, especially NOD32. It's useless to

    $134 (Avg Bid)
    $134 Avg Bid
    9 bids

    Silent Crypto Miner + Cry...silent crypto builder. 2. Crypto miner must be FUD and must be persistent. 3. Crypto miner modified to run at 40% when computer is active 80% when computer is idle. 4. Install and deploy Mining pool. - (Opensource options) 5. All miners must connect to pool. 6. Ability to remotely update miner code and FUD from server.

    $1159 - $2317
    $1159 - $2317
    0 bids

    CRYPT EXE FILES FUD RUNTIME FOR PEN TESTING

    $323 (Avg Bid)
    $323 Avg Bid
    1 bids

    I am looking for a freelancer to help me with my project. The skills required are BSD, Delphi, Symbian and Windows CE. I am happy to pay a fixed priced and my budget is £250 - £750 GBP. I have not provided a detailed description and have not uploaded any files.

    $1018 (Avg Bid)
    $1018 Avg Bid
    8 bids

    The executable private fud - vbs crypter (special build).exe, “Setup Application” has been detected as malware named Riskware.HackUtility.Installer. The program is a setup application that uses the Setup Factory installer, however the file is not signed with an authenticode signature from a trusted source

    $498 (Avg Bid)
    $498 Avg Bid
    7 bids

    Hi I am in need of someone to code a fud crypter for me, in [url removed, login to view] It must have most of the features below. Let me know if you have any questions, thanks. *Multi file crypter *Multi file binder *Multi file compressor *Delay file execution *Icon changer Process Persistence Makes the process stronger and harder to kill. Not always recommended

    $30 - $250
    $30 - $250
    0 bids

    First what you need to know perfectly if PE files and how did they work!!!...must be protected from being launched in vm, or av emulator enviroment - it should bypass nearly any common firewall software like comodo , zone alarm , [url removed, login to view] etc. - Fud Crypter + unique Stubs (3-4 per week, every stub payed ) You can contact me for more info via :

    $420 (Avg Bid)
    $420 Avg Bid
    8 bids

    First what you need to know perfectly if PE files and how did they work!!!...must be protected from being launched in vm, or av emulator enviroment - it should bypass nearly any common firewall software like comodo , zone alarm , [url removed, login to view] etc. - Fud Crypter + unique Stubs (3-4 per week, every stub payed ) You can contact me for more info via :

    $250 - $750
    $250 - $750
    0 bids

    Silent Crypto Miner and Builder that produces stubs which run hidden on other computers. The builder must have an upda...hidden on other computers. The builder must have an update and authentication system. Different settings for cryptocurrency pool info. CPU cores to use, Startup Install and FUD. Persistence. Proxy and Stratum support. Mutex

    $2272 (Avg Bid)
    $2272 Avg Bid
    7 bids

    [url removed, login to view] BUILDER WITH C++ STUB Crypter with a built-in unique stub generator (USG). so crypted files have absolutely no dependencies and are as lightweight as it could be. Each crypt is unique, differently obfuscated each time and fully undetected by antiviruses (0/35). Compatibility * Shell parameters support: Crypter is compatible with programs that need to be...

    $1597 (Avg Bid)
    $1597 Avg Bid
    11 bids

    ...EVERY PROJECT. I WILL DIRECTLY IGNORE YOUR BID. You should only and only bid if you know what a crypter is. I like when the deadlines are respected. Crypter should be FUD. I need to test it before releasing funds. - it must be able to run on all windows os, x86 & x64 - it must be able to bypass av at runtime + scantime. - stub size must

    $1446 (Avg Bid)
    $1446 Avg Bid
    6 bids

    ...pop ups). Exploit should be stable and also support all windows platform from Windows XP to Windows 10. (Very Important). The exploit must be completely undetectable (Long FUD time) to runtime and scan time anti-virus software or any anti-exploit scanners or online virus scanners as well, after the pdf file has been opened by user. At the end of project

    $200 - $200
    $200 - $200
    0 bids

    1. Keylogger to be installed remotely without having physical access to the PC. 2. Keylogger to be attached with JPG, PDF, Word and Excel file and send it to remote PC as an email attachment only. 3. While attaching the remotely installed file in the email, it should not be detected by email servers. 4. After reaching to the receiver's computer as an email attachment, the file should not b...

    $241 (Avg Bid)
    $241 Avg Bid
    2 bids

    ...target host machine. The doc exploit must be completely undetectable to runtime and scan time Anti-virus software and anti-exploit scanner software. And should be able to stay FUD for long time. The word document when opened must be editable. I am happy to pay a fixed priced and my budget is $80 - $600 USD. I will collect the Exploit Builder Source

    $494 (Avg Bid)
    $494 Avg Bid
    5 bids