|kali linux pentest lesson
||ı need on kali linux lesson for my education
||Dec 6, 2016
||Dec 6, 20165d 18h
|Security Tools Website Developer Required
||We run a security tools portal, where people can run opensource security tools like nmap online, you can see the existing site here: [url removed, login to view]
We are looking for someone to take on this project and continue where our previous developer has left it. This project requires good knowledge of linux system admin, php and sql. Knowledge of how to install new security tools in Linux ...
||PHP, System Admin, Linux, SQL
||Oct 26, 2016
||Oct 26, 2016Ended
|Pentest SQLMAP bypass SQL injection
I have write a litlle code php, and i would like to know if he is secure again SQL injection.
the aim of this project, if try to bypass my code for penetration testing.
Files: [url removed, login to view], [url removed, login to view] [url removed, login to view]
||Oct 4, 2016
||Oct 4, 2016Ended
|Pentest my web app
||I need to ensure that my website is fully secured from hackers. i need to discover bugs like XSS SQLi file upload vulnerabilities etc.
I won't accept anything related to CSRF until it doesn't compromise any of the users data.
||Aug 1, 2016
||Aug 1, 2016Ended
|White Hat Pentest
||Can we access to local network by just know the router IP address. Need expert white hat to see what is the best things I should got from this IP.
||Linux, Web Security, Network Administration, Internet Security, Growth Hacking
||Jun 20, 2016
||Jun 20, 2016Ended
|Security audit en pentest of a website via internet
||This is a small project and also a test because we are looking for a partnership to organize regular pentest/security audit at a competitive price.
We are looking for a auditor with high skill in Ethical hacking and cyber security, including pentest (ip scanning, discovering of vulnerability,..), web security (owasp top 10: SQLi, XSS,..), risk analyses (based on a architecture or a document) an...
||Web Security, Drupal, Internet Security, Growth Hacking
||Jun 14, 2016
||Jun 14, 2016Ended
||We have a small webdesign company. We need a security specialist with expertise in web application pentesting to regularly check our customer websites before we deliver them.
This is a first pentesting job to proof your skills. You will be supplied a working Joomla testing environment on our server, which you can do your security tests on. As a result we expect a full pentest report with found se...
||PHP, Joomla, MySQL, HTML
||Jun 14, 2016
||Jun 14, 2016Ended
|Teach me to get remote access to server running opens, ftp, mysql
||I need to get access to a remote web server with an open ftp,ssh,mysql. The computer is hosting a apache server on port 80. I will have to be able to get to the logic of the website. I do have a written permission to pentest this system. The actual version and port of each service is uploaded in detail as an image.
-No brute force attacks
-No social engineering
-Exploit based attacks are we...
||PHP, Software Architecture
||Jun 8, 2016
||Jun 8, 2016Ended
|PenTest and Report of Vulnerability - Web Secutiry
||This project its about make a PenTest and make Reports about Vulnerability's found in a list of 50 sites.
||PHP, Linux, Web Security, Database Administration
||Apr 27, 2016
||Apr 27, 2016Ended
|Web Penetration Professional and Code Reviewer
||I am looking for Code Reviewer and Web Pentest Professional Who are required to work for Long term Project in Kuala Lumpur. We will provide visa and all necessary arrangement...
Send your Cv : [url removed, login to view](at)[url removed, login to view]
||Web Security, Computer Security, Software Testing, Website Testing, Internet Security
||Mar 10, 2016
||Mar 10, 2016Ended
|Check the Security Strength on Database, Website and server
||I need someone who can do expert pentest and send me a report on how my old developer has done the security
Need SOMEONE WHO CAN SHOW HIS/HER TALENT
||Feb 21, 2016
||Feb 21, 2016Ended
|Technical Writer with Git Knowlegde Needed for IT Security Report
||Join the world's first not-for-profit computer security consultancy company, and have the flexibility and freedom of a remote, freelancing position.
A Netherlands-based computer security company seeks talented technical writers to write
penetration testing reports and offer letters. This is a remote position, so you can be geographically located anywhere in the world, as long as you have ...
||XML, Proofreading, Technical Writing, Report Writing, Git
||Dec 16, 2015
||Dec 16, 2015Ended
|hire ethical hackers
||pentest a site so that accessing the site is not a problem,brech the firewall only a professional who can do this
||Dec 7, 2015
|Pentest to Website
||I need someone to pentest and give access to an specific web server. I have the IP that needs to be tested and I know that only ports 22 (SSH) and 80 (HTTP) are open.
||PHP, Web Security, Software Architecture, Internet Security
||Oct 29, 2015
||Oct 29, 2015Ended
|Help with finalizing a pentest (SQLI)
Due to unforeseen circumstances our pentester had to leave.
However, he left us a location WHERE the SQLI was but not with futher documentation.
We need somebody who can quickly finish this.
||Web Security, Computer Security, Internet Security
||Oct 26, 2015
||Oct 26, 2015Ended
|Penetration Testing and Security Remediation Work (Hourly, Ongoing)
||I have several projects that require hands-on work in:
-documenting pentest results
-documenting remediation strategies
-being hands-on in actual remediation
-general security best practices (architecture, account management, etc...)
An NDA will be required to ensure that you do not disclose vulnerabilities discovered as part of your work. Being that you are remote y...
||Web Security, Website Testing, Internet Security
||Aug 16, 2015
||Aug 16, 2015Ended
|Pentest for my website
||I need a penetration testing for one of my sites
||Web Security, Testing / QA, Computer Security, Website Testing
||Aug 11, 2015
||Aug 11, 2015Ended
|Python developer needed
||Need experienced python developer to modify a script in python.
Note: This is a Greyhat project. Knowledge of pentest/CEH/Internet Security is required but no necessary.
||Aug 8, 2015
||Aug 8, 2015Ended
|My software product - pentest it - remove HASP HL Protection V1.X -> Aladdin
||I need someone who is proficient in Delphi, Reverse Engineering, Pentesting to try and remove the HASP protection I use on my product. I own a company that designs a very specific type of software (not important what it does) and I protect it using HASP, specifically HASP HL Protection V1.X -> Aladdin. I will provide the full software along with instructions, if you manage to show me you can by...
||Delphi, Engineering, Software Testing, Debugging, Windows API
||Aug 2, 2015
||Aug 2, 2015Ended
|web vulnerability scanner simple tools.
||Please see link for reference
[url removed, login to view]
it said that shouldn't be as complicated as this website
The program should find SQL injection or Cross Site Scripting (XSS)
the name will be vulnerability scanner
should be from scratch...
the images are not soo important....
||PHP, Software Architecture, Software Testing, MySQL, Web Hosting
||Jun 19, 2015
||Jun 19, 2015Ended