Xss attack example jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 xss attack example jobs found, pricing in USD

    I need a versatile programmer who can work with Python, C or any other programming language to develop a system for identifying Distributed Denial of Service (DDoS) attacks with the help of machine learning algorithms. Skills and Experience: - Extensive experience in Python, C, or similar programming languages - Knowledge of Machine Learning algorithms - Experience in network security would be beneficial - Proven track record in detecting cyber threats in a small network environment. Your success will be judged by your ability to create a reliable, data-driven system capable of efficiently detecting DDoS attacks in a small-scale network.

    $350 (Avg Bid)
    $350 Avg Bid
    13 bids

    ...want to protect it from unauthorized access. - Identifying the attack surface: The primary attack surface in this case is the user devices. - Analyzing attack vectors: I anticipate cyber security issues like phishing emails, malware downloads, and social engineering to be major threats to the system. - Identifying potential vulnerabilities: I need all possible vulnerabilities to be identified. - Suggesting possible exploits: I need a comprehensive list of possible exploits. - Providing mitigation strategies: I would like mitigation strategies for the identified threats. The ideal candidate should have strong experience in Threat Modeling and Cybersecurity, particularly with regards to PPT files. Familiarity with common attack vectors and mitigation technique...

    $109 (Avg Bid)
    $109 Avg Bid
    41 bids
    Full Stack Developer (MERN) 5 days left
    VERIFIED

    Looking for a Full Stack Developer >6 years of experience in agile development of scalable SaaS apps in the cybersecurity area: Improve our app (URL Risk assessment) Improve our app (Domain Typosquatting) Improve our project (Darknet Monitoring) Create an app "hackerview" for passive attack surfave enumeration Create an app for detecting spoofed social media profiles Create an app to scrape ransomware threat actor website and maitain stats about those sites Improve an existing app to monitor paste sites Mininmal Tech Experience: MERN, REST API (JWT), Django, Python, Github, CI/CD, Celery, Redis, Linux, Postgress, Kubernetes, Docker, Nginx, JS, HTML5, Protocols (DNS, SMTP, SSL, HTTP..).Detailed app specifications will be shared at a later stage. |------

    $53 / hr (Avg Bid)
    $53 / hr Avg Bid
    69 bids

    ...need of a professional white hat hacker's services. I am dealing with some compromised accounts, and your expertise with vulnerability assessment, network penetration testing, and web application security testing is required. Tasks I need help with: 1. Vulnerability Assessment: Conduct a systematic evaluation of my system's vulnerabilities. 2. Network Penetration Testing: Simulate a possible attack on my network to assess its security. 3. Web Application Security Testing: Ensure the security of my web applications against potential threats. Further, I have been compromised on some of my email and social media accounts. I need your support with: - Password Recovery: Restore access to my accounts by recovering or resetting lost passwords. - Account Verification: Conf...

    $547 (Avg Bid)
    $547 Avg Bid
    16 bids
    Stop DDOS Attack 2 days left
    VERIFIED

    There appears to be a ddos attack on one of my servers, I have cloudflare active on all sites, and even with under attack mode on some sites, the ddos attack continues Ubuntu/Nginx server, no web panel

    $152 (Avg Bid)
    $152 Avg Bid
    20 bids

    I need a minimal flutter example app for android. The app must scan Bluetooth Ibeacons. I do not need a complete UI, simply a button to start scan and another to stop scan. The information obtained from beacons can be showed in a textbox. The monitoring of beacons mut be "Ranging" (each transmition of beacon must be received and showed) Is very important the scan continue in background. When the app is minimized or out of focus, the app must launch a foreground service (or the foregrounn service can be allways active on all the life of app) when te foreground service is running, a permanent notification must be showed (android policy to allow foreground service). The app must request all permitions required to user on start. When the app is minimized, and the foreground...

    $91 (Avg Bid)
    $91 Avg Bid
    12 bids

    I'm looking to incorporate Reinforcement Learning algorithms (DQN and Actor Critic) within my existing Godot game. The objective is to enhance the behavior of the slime entity, enabling it to both chase and attack the player. Key Points: - The game is in 2D, so experience with Godot's 2D engine is essential. - This project involves integrating a machine learning plugin into a game. - The AI of the slime entity should be at a basic level, with simple and predictable patterns, and should not be too complex. Ideal Freelancer: - Proficient in Godot engine, with experience in 2D game development. - Skilled in machine learning, particularly with reinforcement learning algorithms such as DQN and Actor Critic. - Understanding of game AI, and able to implement AI at a basic level...

    $154 (Avg Bid)
    $154 Avg Bid
    3 bids

    As a Wordpress site owner, I'm interested in conducting security testing with the primary aim of testing penetration resistance. I'm specifically looking to uncover any instances of ineffective firewalls, Denial Of Service attack possibilities in the security system of the website built with Elementor and WooCommerce plugins. Skills and Experience: • Expert in Wordpress security and firewall systems • Comprehensive understanding of penetration testing • Solid background in ethical hacking • Experience with Elementor and Woocommerce platforms • Ability to produce detailed reports Deliverables: • A thorough report on identified vulnerabilities, specifically related to firewalls • Recommendations for improvements in website security &bul...

    $2026 (Avg Bid)
    $2026 Avg Bid
    45 bids

    ...entity, enabling it to both chase and attack the player. Key Points: - The game is in 2D, so experience with Godot's 2D engine is essential. - This project involves integrating a machine learning plugin into a game. - The AI of the slime entity should be at a basic level, with simple and predictable patterns, and should not be too complex. Ideal Freelancer: - Proficient in Godot engine, with experience in 2D game development. - Skilled in machine learning, particularly with reinforcement learning algorithms such as DQN and Actor Critic. - Understanding of game AI, and able to implement AI at a basic level. - Good communication skills is a plus, as I would like to understand the process and logic behind the AI's implementation. Upon a successful attack on the ...

    $100 (Avg Bid)
    $100 Avg Bid
    6 bids

    I've had a hacking attack in the past and now need to regain my peace of mind by having an ethical hacker check my devices for security. The devices to be checked are my Windows computer and Android Smartphone. Desired Skills and Experience: - Proficient ethical hacker with experience in computer and smartphone security. - Knowledge of Windows and Android operating systems. - Ability to conduct a thorough security check and provide a detailed report of the findings.

    $99 (Avg Bid)
    $99 Avg Bid
    8 bids

    Project Requirements A. Implement Hatchetman attack in Contiki 3.0 B. Implement Resolution of Hatchetman attack using 2ACK scheme. C. Evaluate the solution with standard RPL (RFC 6550) under Hatchetman attack D. Detailed documentation of the steps so that it could be replicated. Details are provided in the attached PDF.

    $45 (Avg Bid)
    $45 Avg Bid
    2 bids

    I am looking for an experienced Flutter developer to create a minimal example that can effectively scan iBeacons for Android. This should be a simple, text-based UI that can display the UUID, major & minor values, as well as signal strength of iBeacons. Furthermore, it's important that the scanner remains functional in the background via a foreground service, providing a simple text notification when interacted with. The detection process must be constant (ranging). Key requirements for the project: - Develop a minimal Flutter app for Android - Ability to scan iBeacons and display UUID, major and minor values, and signal strength - The app should continue to work in the background - Use a foreground service for background function - Provide a simple text notification from...

    $270 (Avg Bid)
    $270 Avg Bid
    26 bids

    I'm in need of a cybersecurity expert who is well-versed with Microsoft Office 365. I've recently received an O365 login report and I'm looking for someone to analyze it. Specifically, I need your expertise to identify any suspicious activities within the access logs, focusing on potential indicators of a shell attack. Key Project Details: - I'm specifically interested in suspicious access logs. Your task is to meticulously scrutinize these logs and provide me with detailed written feedback. The questioned application activity is highlighted in red. - I do not require ongoing monitoring, so this will be a one-time project. Ideal Skills & Experience: - Proficiency in Microsoft Office 365 is a must. You should have deep understanding of the platform and its s...

    $74 (Avg Bid)
    $74 Avg Bid
    18 bids

    I'm in need of an experienced Python developer to assist with the development of critical web security tools. While specific tools aren't outlined below - Subdomain Enumeration: Subdomains to be listed and categorized. - Directory Enumeration - Sensitive Parameter Detection - XSS Testing - SQL Testing

    $25 (Avg Bid)
    $25 Avg Bid
    8 bids

    I'm in need of an experienced Python developer to assist with the development of critical web security tools. While specific tools aren't outlined below - Subdomain Enumeration: Subdomains to be listed and categorized. - Directory Enumeration - Sensitive Parameter Detection - XSS Testing - SQL Testing

    $22 (Avg Bid)
    $22 Avg Bid
    9 bids

    I'm in need of a website and customer portal. The w...Ruby (Ruby on Rails), or PHP (Laravel).  Database: MySQL, PostgreSQL, MongoDB, or similar.  Web server: Apache, Nginx, or equivalent. 3. Payment Gateway Integration:  Select and integrate with a payment gateway provider that meets the project requirements (e.g., Stripe, PayPal). 4. Security Measures:  Implement secure coding practices to prevent common vulnerabilities (e.g., SQL injection, XSS).  Use encryption for sensitive data storage and transmission. 5. Hosting and Deployment:  Leverage existing hosting provider of the platform supports the required technologies; otherwise recommend an alternative platform.  Set up automated deployment pipelines for continuous integration and delivery (CI/CD).

    $1352 (Avg Bid)
    $1352 Avg Bid
    165 bids

    i will be creating a website like the given hellman example

    $108 (Avg Bid)
    $108 Avg Bid
    1 bids

    ...on our web-based applications, with the aim to identify and eradicate any potential vulnerabilities. Key Tasks: - Perform Open Source Intelligence (OSINT) - Port scanning - Man-in-the-middle (MiTM) attack simulation - Focus intensively on injection attacks (SQL, XSS) - Authentication and session management puncturing - Cross-Site Scripting (XSS) evaluation The ideal freelancer will have: - Strong experience in cybersecurity and penetration testing - Excellent knowledge and experience with Linux-based systems - Proven experience in web application security testing - Firm understanding of SQL, XSS and authentication vulnerabilities Your final deliverable will be a complete penetration testing report, detailing vulnerabilities found, their potential impact, a...

    $628 (Avg Bid)
    NDA
    $628 Avg Bid
    13 bids

    I'm in need of an experienced Python developer to assist with the development of critical web security tools. While specific tools aren't outlined below - Subdomain Enumeration: Subdomains to be listed and categorized. - Directory Enumeration - Sensitive Parameter Detection - XSS Testing - SQL Testing

    $90 (Avg Bid)
    $90 Avg Bid
    14 bids

    I'm in need of an experienced Python developer to assist with the development of critical web security tools. While specific tools aren't outlined below - Subdomain Enumeration: Subdomains to be listed and categorized. - Directory Enumeration - Sensitive Parameter Detection - XSS Testing - SQL Testing

    $34 (Avg Bid)
    $34 Avg Bid
    6 bids

    ...password hashing and the use of access tokens, to prevent unauthorized access. 5. Input Validation and Sanitization: To mitigate the risk of security vulnerabilities, the application will implement strict input validation and sanitization techniques. This section emphasizes the importance of validating user input to prevent common vulnerabilities, such as SQL injection and cross-site scripting (XSS) attacks. 6. Secure Transaction Processing: The application will incorporate secure transaction processing mechanisms to ensure the integrity and confidentiality of financial transactions. This section discusses the implementation of secure communication protocols, such as HTTPS, to protect sensitive data during transit. It also highlights the need for transaction validation an...

    $289 (Avg Bid)
    $289 Avg Bid
    9 bids

    Example style: We - LigoWave provide easy-to-use wireless networking solutions for businesses and communities, ensuring reliable connectivity with advanced technology. We will be releasing new product and we want video showing the highlight features with "Mike" as our older videos had. We no longer have the contacts of older team who did those videos. I am looking for a talented animator to produce a high-quality 2D video that is under two minutes long. Key requirements are: • Skilled in 2D animation. This is a must as it is the style we have chosen for this video. • An ability to produce engaging and captivating content within a short span of time. The video is less than a 1.30min . • An understanding and ability to work

    $150 (Avg Bid)
    $150 Avg Bid
    59 bids

    Hi I need to very basic example on how to call a rest api from Aveva using a put command. It should be build importing .net libs.

    $132 (Avg Bid)
    $132 Avg Bid
    29 bids

    Hi, we need help compiling and running SDK example C code.

    $116 (Avg Bid)
    $116 Avg Bid
    16 bids

    : logo with display menu: select option: Subdomains Directories sensitive parameters 4. SQL Testing 5. xss Testing 1- : (use this open source code) Options: -d, --domain: Specify the target domain. -b, --bruteforce: Enable subdomain bruteforcing. -o, --output: Specify the output file path. -h, --help: Display help information. example subdomain -d -o /home/Desktop/ This option leverages various search engines like Google, Bing, Yahoo, DNSDumpster, VirusTotal, SSL, etc., to discover subdomains associated with the target domain. 2- find Directories: (use this open source code) Options: -u

    $168 (Avg Bid)
    $168 Avg Bid
    30 bids

    I require a person who has stage combat, choreography, and live performance experience. The main goal is to orchestrate a faux attack scenario wherein I appear to successfully defend myself. Key elements: - Choreographing a believable yet safe confrontation - Ensuring the performance goes as planned in a live setting - Professionalism in order to maintain the illusion for the audience Ideal skills and experience: - Stage combat and choreography - Previous acting or performing arts experience - Ability to react and improvise if things don't go as planned Please note, this is not about encouraging violence or causing fear. It's all about creating an engaging performance that makes me look like a hero in front of my girlfriend.

    $25 - $313
    $25 - $313
    0 bids

    Hello We have a codeigniter project and we need to secure it for Cross Site Scripting (XSS) Thanks

    $157 (Avg Bid)
    $157 Avg Bid
    60 bids

    ...specific expertise in creating intuitive user interfaces and seamless user experiences. The task at hand involves crafting the UI/UX for a cutting-edge platform dedicated to attack surface management. Project Overview: Our goal is to develop a user-friendly platform that enables efficient management of attack surfaces, empowering users to identify, assess, and mitigate potential vulnerabilities effectively. As such, we require a designer who can translate complex functionalities into visually appealing and easy-to-navigate interfaces. Key Requirements: - Strong background in UI/UX design - Experience designing for attack surface management or other cybersecurity platforms - Proficient in creating interactive visualizations, intuitive navigation, and real-time moni...

    $439 (Avg Bid)
    $439 Avg Bid
    92 bids

    ...with an emphasis on securing various applications. The scope of work includes web applications, mobile applications, and desktop applications. Key Responsibilities: - Identify and correct various security vulnerabilities specifically: cross-site scripting (XSS), SQL injection, and session hijacking. - Devise strategies to enhance the security of all our applications. - Regularly conduct security checks to identify potential threats. Ideal skills: - Proven experience in securing different application platforms. - In-depth understanding of XSS, SQL injection, and session hi-jacking. - Comprehensive knowledge of network security and data protection. I need someone who is adept in application security to safeguard our digital assets. Your expertise will play a fundamental...

    $309 (Avg Bid)
    $309 Avg Bid
    11 bids

    I need an expert in Natural Language Processing, specifically in sentiment analysis and text classification, to assist with my project. While I haven't chosen a programming language for this task, I am open to suggestions. It's currently unclear if I will need a pre-trained or custom NLP model, so both options should be explored. Best fit for the job would include: - Extensive experience in NLP, especially sentiment analysis and text classification - Ability to provide insights on different programming languages for the task - Experience with both pre-trained and custom NLP models.

    $317 (Avg Bid)
    $317 Avg Bid
    32 bids

    I'm looking for a talented and innovative graphics designer to create a logo from existing example.

    $20 (Avg Bid)
    $20 Avg Bid
    43 bids

    I'm seeking a professional PHP developer to create a custom CMS tha...should allow clients to customize meta tags, including title tags, meta descriptions, and keywords for each page. - XML Sitemap Generation: The CMS should automatically generate and update an XML sitemap, making it easier for search engines to crawl and index the site. Security Features: - Vulnerability Protection: Ensure the CMS is robust against common web vulnerabilities like SQL injection and XSS attacks. Skills and Experience: - Strong PHP and CMS development background. - Proficiency in implementing SEO best practices. - Experience in web security and vulnerability protection. - Excellent communication skills and ability to understand and incorporate client requirements effectively. Budget is not mo...

    $530 (Avg Bid)
    $530 Avg Bid
    60 bids

    Hello, i need someone good programmer who is able to modify ASF CDC echo example for atsamd11d14 mcu. When receive '1' by CDC -> set 2 pins of mcu When receive '0' by CDC -> reset these 2 pins of mcu And i would like device to be visible in Device Manager or Linux like 'USB CDC'

    $111 (Avg Bid)
    $111 Avg Bid
    7 bids

    I'm currently in an urgent situation where my website has seemingly vanished and a malware infection has been detected. The public PHP file has been modified which I discovered within the last 24 hours. Unfortunately...last 24 hours. Unfortunately, I have not been able to recover any data or files from my website. I'm looking for a skilled specialist with experience in: - Website restoration - Malware removal and prevention - PHP recovery and security The ideal freelancer would be someone who can help recover my lost data, restore the functionality of my website, mitigate the effect of the current malware attack, and ensure the robust constitution of the website to prevent future breaches. Quick turnaround is of essence due to the critical nature of this situation.

    $42 (Avg Bid)
    $42 Avg Bid
    23 bids

    It's unfortunate we've found ourselves under a malware attack on our WordPress website. We believe it's due to code injections, though we can't rule out other possibilities. As a result, we're looking to onboard a professional with relevant experience in swiftly identifying and effectively resolving such issues. Skills & Experience: - Proven experience in dealing with WordPress malware attacks - Proficient in identifying and resolving code injections - Strong security strategy for preventing future attacks Your application should demonstrate your previous experience in handling similar situations. Evidence of your ability to work quickly and effectively is crucial to this emergency! Let's secure our website and prevent this from happening again....

    $419 (Avg Bid)
    $419 Avg Bid
    152 bids

    I'm looking for an ethical hacker to test and secure my web application, focusing on specific vulnerabilities and conduct a thorough background verification. - Web Application Security: - Focus on existing vulnerabilities - Emphasis on Injection attacks, XSS, and other potential weaknesses - Particularly interested in vulnerabilities related to social media integrations - Background Verification: - Criminal records checks - Education and credential verification - Character check Ideal Skills: - Proficient in ethical hacking - Strong experience in web application security - Knowledge of common web vulnerabilities - Competency in conducting background checks - Attention to detail and thoroughness in their work. Please bid if you have the necessary skills and exper...

    $103 (Avg Bid)
    $103 Avg Bid
    8 bids

    I'm in need of a graphic designer who can draft a visually engaging and easy-to-understand training poster focused on safety specific to the security team Key features include: - The focal point: Highlighting Pre Attack Indicators (PAINs) . - Target audience: The security team - Content: A visual reminder of the different PAINs (Pre Attack Indicators) that they should be aware of when working. Company Name: 3D Academy of Applied Security The poster will be blown up and posted in our office (36 inches high x 24 inches wide) Would imagine it may be easier to have different squares for each PAIN, but will leave that up to designer As a bonus, would like to have something consistent on 2 pages that could be incorporated into a PowerPoint presentation. The righ...

    $183 (Avg Bid)
    Guaranteed
    $183
    151 entries

    I need a cybersecurity expert who can conduct penetration testing and data encryption tasks for me. Key Tasks: - **Penetration Testing:** This involves assessing the security of a system by simulating an attack from an external source. You need to be able to identify vulnerabilities, weaknesses and potential threats. I'm not sure whether I need comprehensive testing of my system or a specific target, so you should be able to advise on this. - **Data Encryption:** I would also need assistance with encrypting my data. This is crucial to protect sensitive information from unauthorized access. Reporting: - **Reporting Detail:** After the penetration testing and data encryption tasks are completed, I require a comprehensive report. This should include both an executive summary...

    $854 (Avg Bid)
    $854 Avg Bid
    12 bids

    Need after effect animation exactly same like that ribbon style with new text See animation and then placed the bid write " RIBBON " in the bid

    $26 (Avg Bid)
    $26 Avg Bid
    20 bids

    ...mechanism needs to be integrated to scan for and eliminate threats within my setup. - DDoS Prevention: The implementation should include tools and configurations to mitigate risks related to DDoS attacks. Specific OWASP Top 10 Concerns: - Injection: I'm concerned about potential vulnerabilities that could lead to code or data injection attacks. - Cross-Site Scripting (XSS): The setup must effectively protect against any XSS vulnerabilities. - Insecure Direct Object References: I need to ensure that proper protection is in place to avoid any object reference issues. Ideal Candidate: - Proficient in Docker and NGINX - Strong background in implementing security measures - Familiar with OWASP Top 10 vulnerabilities and ways to mitigate them - Experience in handling API ...

    $95 (Avg Bid)
    $95 Avg Bid
    9 bids

    I'm going to attack Freelancer and expose how you guys are crooks. The entire Freelancer community will know who you are. I give you 72 hours to give me my paid work. I paid you, and I have the receipts, but as of today, I can't get anything for work. It's a scam. I will shout your name and your techniques very loudly

    $266 (Avg Bid)
    $266 Avg Bid
    1 bids

    ...with crafting or construction businesses. - Be proficient in graphic design software. - Understand brand identity. - Have a good sense of typography and alignment. - Have a good color sense. Tips on getting the bag: Creativity, simplistic, Original, with a touch of pride. Add a simple touch of usa or florida flag element Simplistic is the foundation.. U got 13 days so please research..plan...and attack this with patience. I m taken my time and will hire to create brand stuff in future. Super Tip...if ur good at old vintage looking authentic wooden signs from old westerns(without bullet holes please) then u will have my attention. Carpenters dont use actual trees or logs or axes etc... Thats more arborists...or landscaping.. We use by products of wood..plywood..2*4s etc... If...

    $100 (Avg Bid)
    Guaranteed
    $100
    1596 entries

    ...paper discuss the current event you have selected, specifying the counterterrorism activity that was carried out and the specific terrorist activity that was directly prevented from being carried out, as a result of the actions of the individuals involved in the prevention of the attack. Include a summary of the major points presented in the selected news source, including what activity was prevented, how that activity was prevented, who was involved in preventing the attack, and who attempted to perpetuate the attack. Close by discussing the global efforts in counterterrorism and how these efforts affect the presence of terrorist activity. Include sub-headers for all sections of your paper. Include at least five (5) scholarly sources, three of which must be peer-re...

    $73 (Avg Bid)
    $73 Avg Bid
    52 bids

    I am seeking a developer with intermediate level experience IOS Swift. The task will be to help me get the example code working from the documentation at This is my first time working with IOS and the docs leave out some of the implementation. For example, in this code there is not map function, only "..." Bids under £70 only please. ``` var totalUsageByCategory: [ActivityCategory:TimeInterval] totalUsageByCategory = (…) ```

    $166 (Avg Bid)
    $166 Avg Bid
    38 bids

    ...conduct a security assessment of our Learning Management System (LMS) website. This assessment will involve identifying potential vulnerabilities and recommending improvements to strengthen the overall security posture of the platform. Tasks: LMS Security Testing: Utilize your expertise to perform a comprehensive security assessment of our LMS website. This includes testing for vulnerabilities like XSS, CSRF, insecure data storage, and insecure third-party integrations specific to LMS functionalities. Tool Proficiency: We require a freelancer familiar with security testing tools like Burp Suite to conduct a thorough analysis of the website's code and functionalities. PII Identification: Identify any Personally Identifiable Information (PII) being sent to third-party services...

    $84 (Avg Bid)
    $84 Avg Bid
    12 bids

    I need an experienced freelancer to replicate the design, layout & structure from an existing website to serve as a starting point for our own site. Key tasks involve: - Implementing the structure or an an existing example website on Wordpress. This includes the pages, placeholders for posts, menu structure, etc. - Utilizing Spectra blocks/Kadence theme, contact form 7 Ideal candidate should have strong skills in Wordpress and Spectra/Kadence theme implementation. Please include examples of past work in your application. You will be working from a clean Wordpress install.

    $107 (Avg Bid)
    $107 Avg Bid
    106 bids

    Game Requirement Character : Male, full animation: Idle, run, attack, jump, die… Provide full UI and Game Asset Provide full sound and effect Number Map: 8 Number Boss: 8 Enemy for each map: 4-5 ( with full animation: idle, run, attack, die… ) Provide Game icon. Intergrate with Admob in game Intergrate shop IAP in game. Game can run on Mobile and PC also. Game resolution: Hozirontal 1920x1080

    $25 (Avg Bid)
    $25 Avg Bid
    7 bids

    ...perceive the signs Unless we all align To her surprise people rush to protect her and use whatever they can find to protect her from the bullets and the fire. We can’t perceive the signs in time We can’t perceive these signs in time Time Time This gives the heroine strength and she slowly gets up again. This time everyone lines up behind her and uses whatever they can find to protect themselves and to attack the soldiers. Clearing our minds Woven countless times, we find It’s in our heads It won’t adjourn til we seize control They use a shield that bounces off the fire and hits the soldiers back as they get torched in flames. Break through the strain Until our truth is what remains It’s in our power And it won’t fade til we grasp the reigns The...

    $29 (Avg Bid)
    $29 Avg Bid
    8 bids

    I have a AWS Infrastructure setup project requiring expertise in Cloudfront NLB and protection using WAF. As the goal is targeted at content distribution and load balancing, proficiency in these areas is crucial. Some of t...EC2 IIS with custom ports like 8080, 5440 etc and not standard 80 or 443. User will be providing url with port number and on IIS different website is binded with different port number. For WAF, protective measures against DDoS attacks, SQL injections, and XSS attacks are necessary. Thus, an understanding of these areas is also needed. Skills and experience: - Proficient in AWS services (Amazon EC2, ELB, Cloudfront and Amazon S3) - Knowledge of Cloudfront NLB - Experience with WAF - Understanding of DDoS attacks, SQL injections, and XSS attacks protecti...

    $151 (Avg Bid)
    $151 Avg Bid
    31 bids

    I'm looking for a Python expert who can properly secure my Django web application and deploy the UAT environment on a private server. - **Vulnerabilities**: I need someone skilled in identifying and resolving Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) issues in my application. - **Static Folder Access**: The static folder should be configured to be only accessible to authenticated users. This is crucial for our security measures. - **Deployment**: You should be experienced in deploying Django applications. In this case, the UAT environment should be set up on a private server. Your expertise in Python, Django, web application security, and deployment will be highly valued. Please make sure to include any relevant experience you have in handling these s...

    $172 (Avg Bid)
    $172 Avg Bid
    17 bids