Website brute forcer jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    1,351 website brute forcer jobs found, pricing in USD

    I'm in need of an hacker to perform a thorough black-box penetration testing on my WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your ke...

    $100 (Avg Bid)
    $100 Avg Bid
    16 bids

    ...integrating into all of my current systems <-- this is ideal C) You have the know-how on how to bulk create burner Instagram accounts that I can use for the scraping myself. I already have a system built for scraping this endpoint, but it burns accounts quickly. If I had a scalable flow of accounts coming in, I could simply brute force this data. That, or if you can offer burner accounts for $0.01-$0.05 per account, I could perhaps just buy all of the accounts off of you that I need to brute force the data. <-- this is more ideal than A Also - the data I'm after is *only* the account IDs of the followed accounts of each user. I don't need their URLs, or their thumbnails, follower counts, anything like that. Just a comprehensive list of account IDs that eac...

    $1043 (Avg Bid)
    $1043 Avg Bid
    88 bids

    Project Description: We seek a skilled developer to build a website for our tax and compliance service provider business. The website will serve two primary functions: 1. Knowledge Hub: This section will provide a comprehensive resource center with valuable content on tax laws, regulations, and compliance guidelines. It will be accessible through a subscription-based model. 2. Consultancy Services: Showcase the consultancy services offered by our team of tax and compliance experts. Users should be able to learn about our services and contact us easily with inquiries. Key Features: A. Subscription-based knowledge hub: 1. Users can subscribe to access in-depth content on tax laws, regulations, and compliance guidelines. 2. Content should be well-organized and easily searcha...

    $13 / hr (Avg Bid)
    $13 / hr Avg Bid
    13 bids

    We want any agency / freelancer to create WordPress website that is fast, secure, and fully licensed requires meticulous planning and execution. Develop a WordPress website with approximately 35-40 pages, ensuring high performance, security, and compliance with licensing requirements. Very Important and must read - - Use of a licensed WordPress theme. - No use of temporary or nulled plugins. - Achieve a performance score of 95+ on GTmetrix and Google PageSpeed Insights. - Ensure the website passes all checks on GTmetrix without any issues. 1. WordPress Theme and Plugins 1.1 - Choose a premium, licensed WordPress theme that is lightweight, responsive, and highly customizable. The theme should be well-supported and regularly updated by the developers. 1.2 - ...

    $321 (Avg Bid)
    $321 Avg Bid
    92 bids

    I am in need of a proficient security expert to help tackle my final project geared towards creating a low-interactive honeypot. This honeypot is intended to guard real networks by focusing on detection of Brute Force Attacks specifically. The honeypot should be designed for the Linux operating system and created to effectively emulate SSH. I require that you have: 1. the built should be on CML 2. Skill in SSH protocol 3. Experience in creating low-interactive honeypots 4. The ability to focus on detecting Brute Force Attacks 5. Should specific documentation design, developments, and testing : Chapter 4 — Design 4.1 Introduction 4.2 Interface Design 4.3 System Design 4.4 Summary -------------------- Chapter 5 — Development 5.1 Introduction 5.2 Interface De...

    $197 (Avg Bid)
    $197 Avg Bid
    3 bids

    I'm in need of an hacker to perform a thorough black-box penetration testing on a WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your kee...

    $94 (Avg Bid)
    $94 Avg Bid
    29 bids

    I'm in need of an hacker to perform a thorough black-box penetration testing on my WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your ke...

    $324 (Avg Bid)
    $324 Avg Bid
    23 bids

    We want any agency / freelancer to create WordPress website that is fast, secure, and fully licensed requires meticulous planning and execution. Develop a WordPress website with approximately 35-40 pages, ensuring high performance, security, and compliance with licensing requirements. Very Important and must read - - Use of a licensed WordPress theme. - No use of temporary or nulled plugins. - Achieve a performance score of 95+ on GTmetrix and Google PageSpeed Insights. - Ensure the website passes all checks on GTmetrix without any issues. 1. WordPress Theme and Plugins 1.1 - Choose a premium, licensed WordPress theme that is lightweight, responsive, and highly customizable. The theme should be well-supported and regularly updated by the developers. 1.2 - ...

    $331 (Avg Bid)
    $331 Avg Bid
    124 bids

    I'm in need of a security expert to properly configure Fail2ban on my Ubuntu server that is dedicated to filter and protect my OpenVPN setup. Your task will be to ensure that Fail2ban effectively mitigates the threat of: - Brute force attacks - DDoS attacks - Unauthorized login attempts Ideal Skills Include: - Strong knowledge of Ubuntu - Experience setting up and configuring Fail2ban - Understanding of NGINX Note: I am running a NGINX service with free openvpn for a local and private tunnel between The Server and many clients from a script.

    $33 (Avg Bid)
    $33 Avg Bid
    10 bids

    ...humans die the game resets an picks a new player to be chosen as first on infected team (all players respawn together) and all players are awarded $1000 in game currency. $50 per kill when on human team, $100 on infected team. (Assets will be provided) -3 classes for infected team one being the sprinter, which has an ability to boost speed for 30 seconds by 35% with a 60 second cooldown, next being brute, which is a tank with an ability to reduce incoming damage by 25% with an hp increase of 25% for 35 seconds with an 80 second cooldown. Last class will be screecher, which will have an ability that slows all human team players in an x amount of radius by 25% movement speed for 10 seconds with a 60 second cooldown -Leveling system, players start at level 1 an get xp per kill an m...

    $3453 (Avg Bid)
    $3453 Avg Bid
    3 bids

    I need a cybersecurity expert to beef up the security on my current website. The primary goal of my website is to provide information and resources, implying that securing user data is of utmost priority. the curreent used siftware does the following and i need extra features for securities 1 - Django SSL Redirect: To enforce the use of HTTPS, I used the django-ssl-redirect middleware. It automatically redirects HTTP requests to HTTPS. 2 - Django Rest Framework (DRF): DRF includes various authentication classes, permission classes, and throttling classes to help secure your API endpoints. 3 - Brute Force Protection: django-axes will help our website protect against brute force attacks by tracking failed login attempts and blocking suspicious IPs. ...

    $559 (Avg Bid)
    $559 Avg Bid
    57 bids

    ...with secure password practices - Familiarity with encryption algorithms (bcrypt preferred due to its robustness) - Ability to implement email verification systems for password resets Requirements: 1. Implement an effective password encryption mechanism, preferably using bcrypt, considering no specific encryption algorithm was chosen. The choice of bcrypt is due to its security features against brute-force attacks. 2. Develop a user-friendly password reset feature, enabling users to securely reset their passwords through email verification. This includes generating a secure, time-limited link that users can click to enter a new password. 3. Ensure the entire process adheres to best security practices, including but not limited to secure transmission of information, proper storage...

    $14 / hr (Avg Bid)
    $14 / hr Avg Bid
    74 bids

    ...accounts. 5. **Remember Me Feature:** Provide users with the option to stay logged in across sessions for seamless access. 6. **Login with Email or Username:** Allow users to log in using either their email address or username. 7. **Google reCAPTCHA on Registration:** Integrate Google reCAPTCHA to prevent automated bot registrations. 8. A**uthentication Throttling:** Implement measures to prevent brute-force attacks by locking user accounts after a certain number of incorrect login attempts. 9. **Interactive Dashboard:** Develop an intuitive and visually appealing dashboard for users to manage their accounts and access relevant information. 10. **Unlimited User Roles and Permissions:** Create a flexible role-based access control system with the ability to assign custom permission...

    $181 - $241
    Featured Urgent Sealed
    $181 - $241
    11 bids

    I'm seeking the expertise of a security proficient in both server and WordPress environments. I have a WordPress website operating on a virtual private server that requires further security measures. Key areas that require attention include: - Malware Protection: I need a specialist who can comprehensively scan for and remove any malicious software from my WordPress site and server. - Brute Force Protection: I need robust protection against brute force attacks. This may include recommending and implementing software or comprehensive security measures, like using a CDN. - Secure User Authentication: Enhancement of the user login process to ensure it's secure and resistant to unauthorized access is necessary. Experience in captcha incorporation, two-factor...

    $53 (Avg Bid)
    $53 Avg Bid
    47 bids

    I'm seeking an advanced Python developer to write a script that will use the GPU to increase the rate of key generation. The purpose of the script is essentially for brute forcing private keys and seed phrase. Understanding cryptographic principles will be a definite plus. Here's an overview of my requirements: - Development of a Python script capable of running primarily on Windows - Utilization of GPU computing power to increase key generation speed - Have knowledge of how seed phrase and private keys work in blockchain on different chains - Significant experience with Python, particularly involving cryptographic operations, is non-negotiable. Understanding of using GPU power for complex computations is a must-have - Knowledge of common coding best practices is crucial ...

    $84 (Avg Bid)
    $84 Avg Bid
    3 bids

    I'm looking for a social media security expert to reinforce the security of my Instagram and Twitter accounts. I've recently experienced a breach...expert to reinforce the security of my Instagram and Twitter accounts. I've recently experienced a breach and need a professional to conduct an in-depth audit of potential attack vectors. Your tasks will include: - Investigating the recent breach - Auditing all possible attack vectors While no specific attack vectors are suspected currently, an understanding of common tactics, such as phishing, brute force attacks, and malware injections, would be beneficial. Key skills and experience: - Strong knowledge of Instagram and Twitter security features - Experience with social media account audits - Understanding of co...

    $155 (Avg Bid)
    $155 Avg Bid
    9 bids

    ...ip at the moment I have problem checks: CHECK THAT THERE IS NOT A MALICIOUS SCRIPT ON A MACHINE////// CHECK EXEMPLE PROBLEM / An abusive behaviour (Intrusion) originating from your IP ip-37[.]59[.]171[.]7 has been reported to or noticed by our Abuse Team. Technical details showing the aforementioned problem follow An IP address within your delegated space is currently involved in an ongoing brute force attack against the following services: * SSH (Secure Shell) We have observed more than 6 login attempts within a 6 hour period originating from the following IP address: We last observed a malicious login attempt from this IP address at 2024-01-16 05:59:54 UTC. SSH (Secure Shell) (16 total) Date Source IP Target IP 2024-01-16 05:59:54 203.28.238

    $44 (Avg Bid)
    $44 Avg Bid
    14 bids

    Your mission : 1. Comprehensive Web Application Security Assessment 2. Thorough Vulnerability Identification 3. Exploit Simulation and Risk Mitigation 4. Detailed Security Assessment Reports 5. Customized Recom...Mitigation 4. Detailed Security Assessment Reports 5. Customized Recommendations for Strengthening Defenses Your abilities : - Bypass Authentication, Code Execution - SQL injection - Security monitoring - XSS (Cross-site scripting) - HTML injection - LFI (Local Life Inclusion) attack - CSRF - Network Security, Backdoors - URL Redirection attack - Host header injection - No Re-direct attack - Brute force attack etc. Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or Certified Information Systems Security Professional (CISSP) would be an ...

    $156 (Avg Bid)
    $156 Avg Bid
    18 bids

    In this challenge lab we'll play the role of the hacker attempting to brute-force a captured database of user credentials including salted hashes of the user's passwords. The lab will involve brute forcing.

    $187 (Avg Bid)
    $187 Avg Bid
    8 bids

    ...accessibility via a browser on both mobile and desktop platforms. Technical Preferences -- Utilize front-end frameworks such as Bootstrap, Tailwind, Bulma, or Custom CSS. Backend preferences include Python (Django, FastAPI, Flask) or PHP if not overly complex. Additional Features -- Integrate features such as: Copy-to-clipboard Expiry notifications Link deletion upon expiration Security measures against brute-force attacks Delivery and Punctuality -- The finished product must be fully functional and user-friendly, ready to implement upon delivery. We're targeting a completion deadline, and punctuality is critical - late submissions may result in gig termination. Please proactively seek clarification on any unclear points before accepting the assignment. Candidate Interact...

    $178 (Avg Bid)
    $178 Avg Bid
    31 bids

    I am looking for a Wordpress expert who can help improve the speed and security of my website. The current speed and security status of my website is average. I expect this project to be completed within 1-2 weeks. Skills and experience required: - Strong knowledge of Wordpress and experience in optimizing website speed and security - Familiarity with various speed optimization techniques such as caching, minification, and content delivery networks as well as using Pagespeed Insights to improve Desktop & Mobile versions of the site. - Proficiency in improving security measures to prevent brute force attacks, unauthorized logins, malware & steps to safely back up the site. - Experience in troubleshooting and resolving performance and security issues - Go...

    $102 (Avg Bid)
    $102 Avg Bid
    180 bids

    Hello, Nodered is going to be implemented on a Windows server A communication flow will be created with some plcs and several dashboards. We need to secure nodered with the following: -A user management module to be able to create and delete users with different permissions. -Limit login attempts with incorrect username and/or password (brute force attacks). -Do not allow 2 or more sessions from the same user, you can also force the session to close from the user management module. You could do it? It is not urgent but we would like to know the price and delivery time and what you propose to achieve the requirements.

    $326 (Avg Bid)
    $326 Avg Bid
    22 bids

    Hello, Nodered is going to be implemented on a Windows server A communication flow will be created with some plcs and several dashboards. We need to secure nodered with the following: -A user management module to be able to create and delete users with different permissions. -Limit login attempts with incorrect username and/or password (brute force attacks). -Do not allow 2 or more sessions from the same user, you can also force the session to close from the user management module. You could do it? It is not urgent but we would like to know the price and delivery time and what you propose to achieve the requirements.

    $139 (Avg Bid)
    $139 Avg Bid
    133 bids

    I am looking for a skilled developer to build an inverse logarithmic function in Python. The function should accurately calculate the inverse of a given logarithmic function. Requirements: - The inverse function should not use a brute force approach to calculate the inverse. - The function should be efficient and able to handle large inputs. Skills and experience needed: - Strong proficiency in Python programming. - Strong mathematics - Experience in working with logarithmic functions and their inverses. - Familiarity with efficient algorithms for calculating inverse functions. Programming language: Python.

    $128 (Avg Bid)
    $128 Avg Bid
    40 bids

    ...other common web vulnerabilities. - In the future, we'll need to perform regular Security Audits and Updates as needed to address bugs or vulnerabilities. - Error Handling: The system should handle errors without exposing sensitive information, such as system paths, database details, or other exploitable data. - Rate Limiting and Access Control: We may need to implement rate limiting to prevent brute force attacks and abuse, especially on login forms and API endpoints. - Logging and Monitoring: Implement logging of significant actions and regular monitoring for any suspicious activity. - Compatibility with Security Plugins: Ensure the plugin is compatible with popular WordPress security plugins. - Secure API Integration: If integrating with external APIs (like OpenAI), ensu...

    $3000 - $5000
    Featured Sealed
    $3000 - $5000
    28 bids

    ...UIKit, Foundation, etc., in order to implement the login function in the application. 3: Understand the basic principles and technologies of network programming, such as HTTP protocol, TCP/IP protocol, etc., in order to communicate with the server and verify user identity. 4: Understand the security requirements and best practices for user authentication, such as password encryption, preventing brute force cracking, preventing session hijacking, etc. 5: Have good user interface design capabilities to provide a friendly login interface and interactive experience in the application. 6: Understand data storage methods and technologies to securely store user login information on the device or server. 7: Have the ability to test and debug applications to ensure the stability and ...

    $2175 (Avg Bid)
    $2175 Avg Bid
    69 bids

    I am looking for a skilled professional who can provide a comprehensive VAPT report for my AWS instance. The ideal candidate should have a strong background in vulnerability assessment and be familiar with AWS security practices. Specific areas of concern include: - Interfaces/ports that allow brute force attacks - Policies that are currently allowing malware to spread from one folder to another The VAPT report should cover both vulnerability assessment and penetration testing, providing a thorough analysis of potential security risks and recommendations for improvement. The candidate should have experience in conducting VAPT assessments on AWS instances and be able to provide clear and concise recommendations for remediation. Overall, the goal of this project is to identify an...

    $48 (Avg Bid)
    $48 Avg Bid
    5 bids

    I am looking for a skilled professional who can provide a comprehensive VAPT report for my AWS instance. The ideal candidate should have a strong background in vulnerability assessment and be familiar with AWS security practices. Specific areas of concern include: - Interfaces/ports that allow brute force attacks - Policies that are currently allowing malware to spread from one folder to another The VAPT report should cover both vulnerability assessment and penetration testing, providing a thorough analysis of potential security risks and recommendations for improvement. The candidate should have experience in conducting VAPT assessments on AWS instances and be able to provide clear and concise recommendations for remediation. Overall, the goal of this project is to identify an...

    $15 (Avg Bid)
    $15 Avg Bid
    4 bids

    I am looking for a skilled professional who can provide a comprehensive VAPT report for my AWS instance. The ideal candidate should have a strong background in vulnerability assessment and be familiar with AWS security practices. Specific areas of concern include: - Interfaces/ports that allow brute force attacks - Policies that are currently allowing malware to spread from one folder to another The VAPT report should cover both vulnerability assessment and penetration testing, providing a thorough analysis of potential security risks and recommendations for improvement. The candidate should have experience in conducting VAPT assessments on AWS instances and be able to provide clear and concise recommendations for remediation. Overall, the goal of this project is to identify an...

    $51 (Avg Bid)
    $51 Avg Bid
    4 bids

    check all job Install nexcloud server add domain name or subdomain and ip ///question I would like this system to be hidden (what solution can you suggest) nexcloud installations on dedicated server with configuration, add SMTP messaging server add French language, firewall configuration, Brute force protection, SECURITY, AI (configurations) Machine learning based suspicious login detection testing the sca service works

    $37 (Avg Bid)
    $37 Avg Bid
    9 bids

    I have a crypto wallet with a small amount of coins in it. I have written down the seed phrase on paper and mistakenly omitted one word. Therefore the seed phrase has one word missing. I am sure all of the other words are in the correct order but I don't know the word that is missing. I think it should be possible to do a brute force dictionary restore of the seed phrase. I have seen this the below Reddit as an answer to the same problem I have which makes sense to me. "You need to run an automated application that will insert all possible words into the seed phrase. Worst case even if you don't know which word is forgotten and the rest are in order, that's only 2048x24=49,152 options. Looks like there are about 42k + combinations but really that isn’t a...

    $26 / hr (Avg Bid)
    $26 / hr Avg Bid
    12 bids

    ...expertise in these areas and are passionate about training others, we want to hear from you. Locations: Delhi NCR Duration per batch: 100 hours approximately 15-17 days Commercials per batch: Rs. 30,000 Topics you should be able to teach are: 1. Firewall and its types 2. Inspection Techniques 3. Layers, Protocols and Ports 4. Network Level Attacks and Detection Techniques 5. Brute Force Attack 6. Security Recommendations, Countermeasures and Security Baseline 7. Network Analysis and Monitoring 8. Cryptography and Cryptanalysis 9. Understanding Digital certificates and Signatures 10. Web Server & Application Security 11. Proxy Setup 12. Secure Coding Practices 13. Web Application Vulnerability Scanning Tools 14. Burp Sui...

    $346 (Avg Bid)
    $346 Avg Bid
    6 bids

    I am looking for a skilled penetration tester to assess the security of my web application. System/Network to be tested: - Web application. Areas of concern: - No specific vulnerabilities, just need a general assessment. Deliverables: - Report detailing...application. The attachment of screenshots is mandatory for the reporting. Description: I will provide a document in which we specify all the tests that needs to be performed. Other than the activities specified in the document, i also need to test the "Severity". The task will be only given after the applicant provides us evidences of an already performed penetration test example based on brute force. Indian, Pakistani and Chinese applicants will not be taken in consideration. We expect to receive the result of...

    $519 (Avg Bid)
    $519 Avg Bid
    29 bids

    Project Description: I am looking for a skilled freelancer who can help me disable/hide my competitors' Facebook pages during a 3-week campaign. My goal is to decrease competition and increase my brand visibility. Attention this is unethical work, if you don't feel comfortable please ignore it Requirements: - Hacking - Brute Force/Bypass - Experience in Facebook page management and administration - Knowledge of Facebook policies and guidelines - Ability to identify and disable/hide specific Facebook pages - Understanding of social media marketing and competition analysis Tasks: - Utilize the list of my competitors' Facebook pages that I will provide - Disable/hide their content on Facebook during the campaign - Ensure that their pages remain inaccessible to users ...

    $170 (Avg Bid)
    $170 Avg Bid
    7 bids

    I am looking for a skilled freelancer to prepare a secure server for my Laravel website. The ideal candidate should have experience with Ubuntu Virtual Private Servers (AWS) , cloudflare, and be proficient in Laravel 8.83. Specific requirements for the project include: - Server Hosting: Virtual Private Server (VPS) - Security Measures: Firewall Setup, protect agains cyber attacks such as DDoS, brute force, no function level control. - mail server setup including DKIM,SPF, DMARC, antiMalware, antispam, antivirus, closing unnecessary ports - efficient control panel such web min - Laravel Version: 8.83 - configuration security apache, PHP, Laravel, DB server - securing from AWS infrastructure side. The freelancer should have expertise in VPS setup and configuration, as well ...

    $157 (Avg Bid)
    NDA
    $157 Avg Bid
    34 bids

    I have a server bought from Linode. The server has Cent OS 7.0 installed with cpanel. There are multiple websites hosted on this server. Today I have received an email from Linode. We have received a report of Brute Force attempts originating from your Linode. This is most likely the result of a system compromise. If we have not heard from you in 24 hours, we may need to place network restrictions on your Linode to prevent further attacks. We want to fix this issue within 24 hours before they put restriction on my account Report Details from Linode is:

    $93 (Avg Bid)
    $93 Avg Bid
    11 bids

    ...prevent unauthorized tampering. Remove Recovery System / Safe Mode: Eliminate options to access recovery mode or safe mode. Lock Firmware with Secure Keys: Ensure firmware can only be updated with secure keys. Isolated App Environment: Applications should run in isolated environments, ensuring inter-app security. Integrated VPN: A built-in VPN feature for secure browsing and data transmission. Brute Force Protection: Protection against password-guessing attacks. Remove all Third Party Apps: All pre-installed third-party apps should be removed. Remove all Third Party Services: All pre-installed third-party services should be eliminated. Multiple User Mode: Ability for multiple users to use the device with separate profiles. Disabled Location Services: All location-based services s...

    $750 - $1500
    Sealed NDA
    $750 - $1500
    2 bids

    Project Description: Restore / Fix Website after Attack I need someone to help me restore and fix my WordPress website, which was recently subjected to an unknown type of attack. The homepage of my website now shows a skull, indicating that it has been compromised. Requirements: - Experience in website restoration and fixing after security attacks - Proficiency in WordPress platform - Knowledge of different types of attacks and their remedies - Ability to assess and identify the type of attack based on the symptoms - Familiarity with malware infections, DDoS attacks, and brute force attacks Deliverables: - Full restoration of the website to its previous state - Removal of any malicious code or malware - Implementation of security measures to pr...

    $43 (Avg Bid)
    $43 Avg Bid
    41 bids

    I am looking for an experienced coder to help me code a bubble pop puzzle solver. I would prefer the programming language to be golang or javascript and I am open to the freelancer's suggestion on which algorithm or method to use for the solver. The deadline for completing the project is within two weeks. The game starts by filli...they are empty. Empty columns will be filled by the columns on the left shifting to the right. No bubbles are replaced during the levels. I found a script for a program that uses golang to open up the site, start the game, save a screenshot of the board and analyze the grid and turn it into values and find groups. However I don't know how to write a function that will find a random solution by brute force (since A* might get detected), which i...

    $14 (Avg Bid)
    $14 Avg Bid
    15 bids

    I have a text file containing emails sent and received between me and an ex-girlfriend in the mid-1990s. We recently reconnected and want to have a laugh/cry at what we wrote. On my university's Sun Solaris machine I used the "crypt" command to keep the contents from prying eyes.....header format), (2) possible words and names in the encrypted file, and (3) a short list of the likely (alphanumeric) passwords I might have used to encrypt it. (There is software called Crypt Breakers Workbench on Github if you are starting from scratch.) Up for the challenge? You'll see some salty post-breakup exchanges if you can decrypt this historical file! (If you can decrypt this file with "brute-force" and want to prove it with your bid, please provide the first n...

    $106 (Avg Bid)
    $106 Avg Bid
    3 bids

    ...impersonate them. 4. Input Validation: Review and enhance input validation mechanisms to ensure that user input is properly validated and sanitized, minimizing the risk of code injection or unexpected behavior. 5. Secure Authentication: Evaluate the authentication process to ensure it follows best practices, including strong password hashing, secure storage of user credentials, and protection against brute force attacks. 6. Cross-Site Request Forgery (CSRF) Protection: Implement measures to prevent cross-site request forgery attacks by adding appropriate tokens and verification mechanisms. I would appreciate if you could provide a detailed report highlighting any vulnerabilities discovered and recommendations for mitigating them. Additionally, any suggestions for improving th...

    $297 (Avg Bid)
    $297 Avg Bid
    12 bids

    I am going to launch a cloud application. So I need a similar service like AWS Elastic Beanstalk in Digital Ocean My requirements are below: Low cost infracture Setup application for storage like s3 ( spaces) Enable WAF to prevent and create a ACL rule to protect against brute force and sql injection Enable port 443 and disable 80 ( domain DNS in Cloudflare ) Sequence backup and auto deletion after 7 days or archive data Digester management for immediate recover. The ideal candidate should have experience in setting up cloud infrastructure on Digital Ocean and deploying Web Applications on it. They should be able to provide detailed project proposals outlining the approach and timeline for the project.

    $31 (Avg Bid)
    $31 Avg Bid
    5 bids

    Hi freelancers, I have a issue with a site. I think it is a 500 error. This happened after what I think was a brute force attack on the server. I would like to talk to the freelancer before starting the job Thanks for all, joseph

    $20 (Avg Bid)
    $20 Avg Bid
    66 bids

    The database would be a simple local You would go to the website where it would ask you to enter a first name, last name and customer number. If what you entered matched exactly what is in the database there would be a green background page with the information entered saying it is valid. If it is not a red page with invalid would come up. If you entered information that did not exactly match the information in the database it would bring up a black page saying No information found. To stop people from brute forcing the database, I would like to put a CAPTCHA or a time limited (per ip) lockout after 2 wrong attempts (with the page coming up to tell them)

    $36 (Avg Bid)
    $36 Avg Bid
    21 bids

    I'm looking to build a Node + react SaaS boilerplate. Required features Subscription Payments a pre-built Stripe billing system. Users & Authentication Secure authentication with brute-force protection, account lockouts, and 2FA (email). Social Logins Social auth google , linkedin REST API Blazing fast REST API with token authentication and API keys. Database Option to easily integrate the framework with- Mongo, Postgres, SQL, etc User Management tab ( FT and BE ) User management dashboard with features to control user access, reset access credentials User Impersonation Option to Log into user accounts from the Roles / Multi-timer plans with user access option to set multi-tier plans and user access based on that Error & Event Logging Log errors and user event...

    $452 (Avg Bid)
    $452 Avg Bid
    46 bids

    ...set up a Ubuntu VPS server and install HomeslabOS. The server will be used for business/production purposes, so it must be secured and all necessary services prepared. The ideal candidate should have experience with VPS setup and security. 1. Secure VPS: - Review and update the VPS's firewall rules to only allow necessary ports and services - Install and configure fail2ban to protect against brute-force attacks - Set up SSH key-based authentication and disable password authentication - Install and configure automatic security updates 2. Set Up Domain Name: - Configure DNS settings to point the domain name to the VPS IP address - Set up an SSL certificate using Let's Encrypt 3. Install HomelabOS and Web Applications: - Install and configure HomelabOS according to the...

    $135 (Avg Bid)
    $135 Avg Bid
    2 bids

    ...a Ubuntu VPS server and install HomeslabOS. The server will be used for business/production purposes, so it must be secured and all necessary services prepared. The ideal candidate should have experience with VPS setup and security. 1. Secure VPS: - Review and update the VPS's firewall rules to only allow necessary ports and services - Install and configure fail2ban to protect against brute-force attacks - Set up SSH key-based authentication and disable password authentication - Install and configure automatic security updates 2. Set Up Domain Name: - Configure DNS settings to point the domain name to the VPS IP address - Set up an SSL certificate using Let's Encrypt 3. Install HomelabOS and Web Applications: - Install and configure HomelabOS a...

    $71 (Avg Bid)
    $71 Avg Bid
    5 bids

    Hello, kindly checking if there is any news about the result of the assignment.

    $10 (Avg Bid)
    $10 Avg Bid
    1 bids