Job Title | Budget | ||||
---|---|---|---|---|---|
Ethical Hacking for Mobile & Laptops
|
~1 - 5 USD
/ hr
|
2 days ago |
Client Rank
- Risky
1 open job
Registered at: 30/03/2025
|
||
I'm in need of an ethical hacker who can help me identify vulnerabilities in my mobile devices and laptops. The main objective is to ensure the security of these devices.
Ideal skills for the job include: - Proficiency in penetration testing - Expertise in identifying vulnerabilities - Experience in testing security protocols Please provide examples of previous similar work you've done. Skills: Web Security, Testing / QA, Computer Security, Website Testing, Internet Security
Hourly rate:
100 - 400 INR
2 days ago
|
|||||
DevOps Engineer Needed for Server Evaluation and optimization
|
~7 - 18 USD | 3 days ago |
Client Rank
- Medium
1 open job
Registered at: 16/05/2024
|
||
I'm in need of a skilled DevOps engineer to conduct a comprehensive evaluation of my server. The primary focus of this assessment is to optimize resource allocation. The server hosts a variety of applications, including web applications, databases, and microservices.
Key responsibilities: - Evaluate server load and resource distribution - Propose strategies for more efficient resource allocation - Assess and enhance network security, application security, and data protection measures Ideal candidates should possess: - Extensive experience in DevOps and server management - Deep understanding of web applications, databases, and microservices - Strong skills in identifying and implementing cost-effective resource allocation strategies - Proficiency in assessing and improving various aspects of security - Excellent knowledge of optimizing networking resources Skills: Linux, Web Security, Computer Security, Network Administration, Internet Security
Fixed budget:
600 - 1,500 INR
3 days ago
|
|||||
Restricted / locked Instagram acct
|
not specified | 2 days ago |
Client Rank
- Risky
|
||
I believe it has to do with 2FA. The page is visible to the end user but we can’t get into it from admin side. I attached a couple pictures for reference.
Skills: Accounting, Technical Support, Information Security, Instagram, Digital Marketing, Social Media Marketing, Social Media Management, Ethical Hacking, Facebook Page, Malware Removal, WordPress Malware Removal, Facebook, Instagram Reels, Data Recovery, Internet Security
Budget:
not specified
2 days ago
|
|||||
Ethical hacking
|
not specified | 2 days ago |
Client Rank
- Risky
|
||
Hello!
I'd like to ask you if you are able to help me with my situation.. I feel like my spouse is not truthful and might be cheating on me.. she’s in the uk and I’m in Germany atm so I’d like to be able to monitor her phone even just for a short time to get insights if my worries are indeed valid. Nico T
Skills: Security Assessment & Testing, Vulnerability Assessment, Kali Linux, Application Security, Penetration Testing, Network Security, Security Infrastructure, Manual Testing, Ethical Hacking, OWASP, Windows Server, NIST SP 800-53, Internet Security, Web Application Security, Security Engineering
Budget:
not specified
2 days ago
|
|||||
Cybersecurity Expert Needed for Account Security Assessment
|
100 USD | 2 days ago |
Client Rank
- Risky
|
||
We are looking for a cybersecurity expert to assist in hacking social media accounts that aimed at teenagers sex trade in Saudi Arabia.
Skills: Information Security, Vulnerability Assessment, Security Analysis, Encryption, Internet Security
Fixed budget:
100 USD
2 days ago
|
|||||
Network Security Audit for Compliance
|
~6 - 19 USD | 2 days ago |
Client Rank
- Risky
1 open job
Registered at: 31/03/2025
|
||
Our small company is in need of a comprehensive network security audit. The primary objective of this audit is to ensure we are in compliance with critical regulations including GDPR, HIPAA, and PCI-DSS.
Ideal candidates for this project should have: - Extensive experience in conducting network security audits - In-depth knowledge of GDPR, HIPAA, and PCI-DSS compliance standards - Proven track record of identifying vulnerabilities and recommending improvements We are looking for a professional who can provide a detailed report of our current security status, pinpoint areas of non-compliance, and suggest necessary improvements to our existing security measures. Your expertise will be crucial to our company's operational integrity and legal compliance. Skills: Web Security, Computer Security, Technical Writing, Cisco, Internet Security
Fixed budget:
10 - 30 AUD
2 days ago
|
|||||
Drop shipping
|
not specified | 1 day ago |
Client Rank
- Medium
1 jobs posted
open job
|
||
We’re excited to have you! As a drop shipping worker, you play a key role in our operations. Here’s an overview of your responsibilities:
### Job Title: Drop Shipping Worker #### Key Responsibilities: 1. **Product Management:** - Research and select trending products. - Update product details and catalog. 2. **Order Processing:** - Monitor and process customer orders. - Ensure accurate and timely shipping. 3. **Customer Service:** - Respond to customer inquiries and resolve issues. - Maintain a positive company image. 4. **Supplier Communication:** - Foster relationships with suppliers. - Negotiate pricing and ensure quality standards. 5. **Inventory Management:** - Check product availability regularly. - Update stock status on platforms. #### Skills and Qualifications: - Strong communication and organizational skills. - Basic knowledge of e-commerce platforms. - Ability to multitask effectively.
Skills: Legal, Packaging Design, Legal Consulting, Intellectual Property Protection, Legal Research, Copyright Law, Internet Security, Trademark, Intellectual Property Law, Data Privacy, Intellectual Property Consulting, Copyright, Label Design, Material Take-Off, Digital Millennium Copyright Act
Budget:
not specified
1 day ago
|
|||||
Gmail Account Recovery and Security Enhancement
|
15 - 48 USD
/ hr
|
1 day ago |
Client Rank
- Risky
|
||
We are seeking an expert to assist with Gmail account recovery and implement robust security measures to protect against hacking attempts. The ideal candidate should have experience in account recovery processes, as well as strategies to enhance security settings. Your expertise will help ensure that our Gmail account remains secure and accessible. Please provide details of your previous experience in similar tasks.
Skills: Ethical Hacking, Information Security, Internet Security, Security Analysis, Penetration Testing
Hourly rate:
15 - 48 USD
1 day ago
|
|||||
Cyber Essentials Plus Certification for SMB
|
~439 - 878 USD | 1 day ago |
Client Rank
- Excellent
$94 056 total spent
109 hires
, 3 active
5 open job
5.00
of 3 reviews
Registered at: 31/07/2020
|
||
We are a small business with 12 employees (some employees have more than one laptop as we are a software company and need different devices for desting apps etc), seeking expert assistance with obtaining our Cyber Essentials Plus certification. We're starting from scratch with our cybersecurity initiatives and need guidance in several key areas:
We currently have a mix of - Windows laptops - Ubuntu laptops - MAC books We are a virtual business with most of the team working from home (no central office/network), so home broadband connections/routers also need to be included in the scope (if needed). We use Google Workspace, Git, Quickbooks, wise.com, Gocardless, OVH, AWS. End of the project is passing certification. Skills: Computer Security, Internet Security, Security
Fixed budget:
37,500 - 75,000 INR
1 day ago
|
|||||
Facebook Recovery
|
not specified | 1 day ago |
Client Rank
- Risky
|
||
Hello!
I need assistance with facebook recovery. Job: $75. If all I can get is my data log of messages, that will suffice as I lost my dad and want to recover my messages sent and received from him and pertaining to him. JA
Skills: Accounting, Technical Support, Information Security, Instagram, Digital Marketing, Social Media Marketing, Social Media Management, Ethical Hacking, Facebook Page, Malware Removal, WordPress Malware Removal, Facebook, Instagram Reels, Data Recovery, Internet Security
Budget:
not specified
1 day ago
|
|||||
Linkedin
|
not specified | 1 day ago |
Client Rank
- Medium
3 jobs posted
open job
|
||
Hi, can you help me recover some restricted LinkedIn accounts? I have tried with Persona (ID) verification but I am unable to proceed. I have just posted a job about it. Let's discuss
Skills: PDF Conversion, Ethical Hacking, Internet Security, Data Recovery, Social Media Account Integration, Network Security, LinkedIn, Information Security, LinkedIn Campaign Manager, Company LinkedIn Profile, Facebook Business Page, Instagram, Facebook, Google, Google Ads Account Setup
Budget:
not specified
1 day ago
|
|||||
Gmail message recovery
|
not specified | 1 day ago |
Client Rank
- Risky
|
||
My gmail message are permanently deleted, can you recover?
Skills: Facebook, Instagram, Troubleshooting, Technical Support, Ethical Hacking, Information Security, Facebook Page, Internet Security, Data Recovery, Facebook Advertising, Network Security, Cybersecurity Management, Customer Service, Vulnerability Assessment, Recovery Testing
Budget:
not specified
1 day ago
|
|||||
Internet security
|
20 - 50 USD
/ hr
|
1 day ago |
Client Rank
- Risky
|
||
Help getting a hacked account back if possible. I will need help to access a hacked account. The hackers are currently using information is there any way possible you can help me thank you. I will definitely pay for a job well done. Thank you
Skills: Python, Google Sheets, Cybersecurity Tool, Penetration Testing, Red Team Assessment, Cyber Threat Intelligence, Vulnerability Assessment, PCI DSS, Firewall, Network Penetration Testing, Web App Penetration Testing
Hourly rate:
20 - 50 USD
1 day ago
|
|||||
Facebook account
|
not specified | 1 day ago |
Client Rank
- Risky
|
||
Hello!
Someone hacked my facebook profile and then removed me as admin on my facebook groups. Can you reclaim my groups? (I no longer have access to the groups. I wasn’t admin with my profile just with pages.)
Skills: Facebook, Instagram, Social Media Management, Cybersecurity Management, Data Recovery, Troubleshooting, Ethical Hacking, Vulnerability Assessment, Network Security, Information Security, Technical Support, Internet Security, Instagram API, Social Media Account Setup, Social Media Marketing
Budget:
not specified
1 day ago
|
|||||
Instagram recovery
|
not specified | 1 day ago |
Client Rank
- Risky
|
||
Hello!
I'm interested in recovering an Instagram account with a lost password
Skills: Facebook, Instagram, Social Media Management, Cybersecurity Management, Data Recovery, Troubleshooting, Ethical Hacking, Vulnerability Assessment, Network Security, Information Security, Technical Support, Internet Security, Instagram API, Social Media Account Setup, Social Media Marketing
Budget:
not specified
1 day ago
|
|||||
Regain access
|
not specified | 1 day ago |
Client Rank
- Risky
|
||
Hello!
I need help regaining access to accounts, which have been hacked. This includes social media and emails etc. please contact me at your soonest convenience. Thanks, Brittany L
Skills: Information Security, WordPress Malware Removal, Internet Security, Ethical Hacking, Bitcoin, Network Security, Security Testing, OWASP, Malware Removal, Blockchain, Web Application Security, Website Security, WordPress, Penetration Testing, Cryptocurrency
Budget:
not specified
1 day ago
|
|||||
VAPT and Security Compliance Support(CERT-IN Empanelled Vendor Required) -- 2
|
~5 - 9 USD
/ hr
|
1 day ago |
Client Rank
- Excellent
$185 097 total spent
189 hires
, 33 active
6 open job
4.99
of 11 reviews
Registered at: 07/01/2019
|
||
Project Overview
We are seeking the services of a CERT-IN empanelled cybersecurity vendor or professional to carry out a Vulnerability Assessment and Penetration Testing (VAPT) and assist in completing mandatory client security compliance questionnaires. This engagement is crucial for vendor onboarding with major corporate clients and insurance partners. Scope of Work: 1. Vulnerability Assessment & Penetration Testing (VAPT): o Perform comprehensive internal and external VAPT of our infrastructure, including web applications, APIs, servers, and endpoints. o Assess network and application layer vulnerabilities. o Provide a detailed report including: Risk categorization (High/Medium/Low) Technical findings with evidence (screenshots, logs) Suggested remediation Final re-validation report after fixes 2. Compliance Documentation Support: o Assist in completing two client security assessments: “Partner Onboarding – Security Parameters of Client Environment” “Digit – Vendor Self Assessment Questionnaire” o Align responses with industry best practices and regulatory standards (ISO 27001, NIST, CERT-IN). o Provide documented evidence such as: Information Security Policy Secure configuration baselines Data classification and protection policies Business continuity and disaster recovery plans Access control and monitoring procedures 3. Evaluation & Risk Score Optimization: o Understand the evaluation matrix and risk scoring methodology used by clients. o Recommend corrective actions to improve security posture and compliance scores. o Ensure documentation is audit-ready and presentable. Mandatory Requirement: • The selected professional must be a CERT-IN empanelled vendor or work in association with one. Proof of empanelment will be required. Deliverables: • Initial and Final VAPT Reports • Completed security assessment questionnaires • Supporting documentation (security policies, technical artifacts) • Advisory notes on risk mitigation and compliance readiness Required Skills: • Vulnerability Assessment & Penetration Testing (VAPT) • Experience with CERT-IN standards and compliance • Security Questionnaire Handling & Audit Documentation • Knowledge of ISO 27001, NIST, and Indian IT Act compliance • Network Security & Web Application Security Testing • Firewall, IDS/IPS, and Endpoint Security Assessment • Report Writing – Technical and Non-Technical (Audit-ready) • Risk Analysis & Mitigation Planning • Incident Response and Business Continuity Knowledge • Familiarity with tools like Burp Suite, Nmap, Nessus, OWASP ZAP, Metasploit • Certifications (preferred): CEH, OSCP, CISSP, CISA Timeline: • Kickoff: Immediate • Duration: 2-3 weeks (negotiable based on availability and scope) Budget: • Please quote your fixed price for the complete engagement or hourly rate. • Attach sample VAPT reports or redacted past project documentation, if available. Skills: Web Security, Testing / QA, Computer Security, Usability Testing, Internet Security
Hourly rate:
400 - 750 INR
1 day ago
|
|||||
VAPT and Security Compliance Support(CERT-IN Empanelled Vendor Required)
|
~5 - 9 USD
/ hr
|
1 day ago |
Client Rank
- Excellent
$185 097 total spent
189 hires
, 33 active
6 open job
4.99
of 11 reviews
Registered at: 07/01/2019
|
||
Project Overview We are seeking the services of a CERT-IN empanelled cybersecurity vendor or professional to carry out a Vulnerability Assessment and Penetration Testing (VAPT) and assist in completing mandatory client security compliance questionnaires. This engagement is crucial for vendor onboarding with major corporate clients and insurance partners. Scope of Work: 1. Vulnerability Assessment & Penetration Testing (VAPT): o Perform comprehensive internal and external VAPT of our infrastructure, including web applications, APIs, servers, and endpoints. o Assess network and application layer vulnerabilities. o Provide a detailed report including: Risk categorization (High/Medium/Low) Technical findings with evidence (screenshots, logs) Suggested remediation Final re-validation report after fixes 2. Compliance Documentation Support: o Assist in completing two client security assessments: “Partner Onboarding – Security Parameters of Client Environment” “Digit – Vendor Self Assessment Questionnaire” o Align responses with industry best practices and regulatory standards (ISO 27001, NIST, CERT-IN). o Provide documented evidence such as: Information Security Policy Secure configuration baselines Data classification and protection policies Business continuity and disaster recovery plans Access control and monitoring procedures 3. Evaluation & Risk Score Optimization: o Understand the evaluation matrix and risk scoring methodology used by clients. o Recommend corrective actions to improve security posture and compliance scores. o Ensure documentation is audit-ready and presentable. Mandatory Requirement: • The selected professional must be a CERT-IN empanelled vendor or work in association with one. Proof of empanelment will be required. Deliverables: • Initial and Final VAPT Reports • Completed security assessment questionnaires • Supporting documentation (security policies, technical artifacts) • Advisory notes on risk mitigation and compliance readiness Required Skills: • Vulnerability Assessment & Penetration Testing (VAPT) • Experience with CERT-IN standards and compliance • Security Questionnaire Handling & Audit Documentation • Knowledge of ISO 27001, NIST, and Indian IT Act compliance • Network Security & Web Application Security Testing • Firewall, IDS/IPS, and Endpoint Security Assessment • Report Writing – Technical and Non-Technical (Audit-ready) • Risk Analysis & Mitigation Planning • Incident Response and Business Continuity Knowledge • Familiarity with tools like Burp Suite, Nmap, Nessus, OWASP ZAP, Metasploit • Certifications (preferred): CEH, OSCP, CISSP, CISA Timeline: • Kickoff: Immediate • Duration: 2-3 weeks (negotiable based on availability and scope) Budget: • Please quote your fixed price for the complete engagement or hourly rate. • Attach sample VAPT reports or redacted past project documentation, if available. Skills: Web Security, Testing / QA, Computer Security, Usability Testing, Internet Security
Hourly rate:
400 - 750 INR
1 day ago
|
|||||
Cyber Security Expert Needed
|
~1 - 5 USD
/ hr
|
1 day ago |
Client Rank
- Risky
1 open job
Registered at: 01/04/2025
|
||
I am in need of a seasoned cyber security professional, with a strong focus on network and web application security. The selected freelancer will be responsible for conducting penetration testing to ensure the integrity and security of my network.
Key Responsibilities: - Conduct comprehensive penetration testing on my network and web applications. - Identify potential vulnerabilities and propose effective solutions. Ideal Skills and Experience: - Extensive experience in network and web application security. - Proven track record in penetration testing. - Ability to provide detailed assessments and recommendations. Please note, your application should prominently feature your relevant experience in cyber security, particularly with network and web application security. Skills: Web Security, Testing / QA, Computer Security, Usability Testing, Internet Security
Hourly rate:
100 - 400 INR
1 day ago
|
|||||
UISP Console 912 Wireguard Setup -- 2
|
10 - 30 USD | 1 day ago |
Client Rank
- Medium
1 open job
Registered at: 28/07/2023
|
||
I'm seeking a professional with experience in network security and VPNs to configure Wireguard on my UISP Console 912. The primary goal of this project is to establish secure remote access.
Key Requirements: - Design and implement new Wireguard configurations tailored for secure remote access. - Ensure connectivity and security for 1-5 devices. Ideal Skills: - Proficient in Wireguard and UISP Console 912. - Strong background in network security. - Proven experience in configuring VPNs for secure remote access. Please note, no pre-existing configurations will be provided. Your expertise and creativity will be essential in crafting a robust, secure setup from scratch. Skills: Web Security, Computer Security, Network Administration, Internet Security
Fixed budget:
10 - 30 USD
1 day ago
|
|||||
Instagram Account Security Consultant
|
30 USD | 1 day ago |
Client Rank
- Risky
|
||
We are seeking a skilled Instagram security consultant to assess and enhance the security of our Instagram account. The ideal candidate will have experience with ethical hacking, vulnerability assessment, and social media security protocols. Your responsibilities will include identifying potential security threats, providing recommendations for account protection, and ensuring our sensitive information remains secure. If you have a strong background in social media security and a passion for protecting online assets, we want to hear from you!
Skills: Information Security, Penetration Testing, Internet Security, Ethical Hacking, Instagram
Fixed budget:
30 USD
1 day ago
|
|||||
Instagram y Facebook hackeado e inhabilitado
|
100 USD | 23 hours ago |
Client Rank
- Medium
1 jobs posted
open job
|
||
Hola, me pongo en contacto con usted porque me gustaría obtener más información sobre sus servicios. Me hackearon e inhabilitaron la cuenta de Instagram y Facebook.
Estoy buscando a alguien serio, experto y cualificado que sepa recuperar cuentas hackeadas o inhabilitadas. En el mes de marzo me hackearon la cuenta de Instagram a través de Facebook, alguien entró desde el Facebook y vinculó una cuenta ajena dentro de mi perfil de Facebook y siguidamente entro en mi Instagram lo hackeo las dos cuenta, ahora mismo no puedo acceder a ninguna de mis redes sociales, intente por formulario, email, teléfono, por las plataformas de Instagram y Facebook pero no consigo acceder. Adjunto algunas capturas para que veas y valores el caso, la cuenta @kmaria_drzdx5208 no es mi cuenta, es la que me ha hackeado el Facebook e Instagram. Si crees que es posible recuperarlas, no dudes en ponerte en contacto conmigo para poder hablar y llegar a un acuerdo. Quedo pendiente para cualquir cosa. Un saludo y gracias. Joe
Skills: Information Security, Ethical Hacking, Facebook, Penetration Testing, Network Security, Data Recovery, Instagram, Internet Security, Recover Data Recovery Software, HackerRank
Fixed budget:
100 USD
23 hours ago
|
|||||
OSINT Pentest on WASP and Infrastructure
|
30 - 250 USD | 23 hours ago |
Client Rank
- Excellent
$169 846 total spent
220 hires
, 20 active
27 open job
5.00
of 1 reviews
Registered at: 01/06/2023
|
||
I'm seeking a skilled pentester with OSINT expertise to conduct a security assessment of our web applications and infrastructure.
Key Responsibilities: - Perform a thorough penetration test on our web applications. Ideal Skills: - Proficiency in web application security testing. - Extensive experience in OSINT techniques. - Familiarity with various pentesting tools. timeline to deliver all requirements within 7 days while maintaining high-quality standards. Below is the detailed plan: Timeline (7 Days) Day 1: Initial Assessment and Setup Review the existing intranet and network environment. Identify gaps in access control and security. Set up the Docker/VM environment for Red/Blue team configurations. Day 2-3: Access Control and SSO Implementation Integrate Single Sign-On (SSO) for secure and streamlined authentication. Implement role-based access control mechanisms. Test and validate SSO functionality for different user roles. Day 4-5: Red/Blue Team Setup and Penetration Testing Set up Red/Blue team configurations using VM/Docker to simulate attack/defense scenarios. Perform penetration testing on the application and network using Linux/WSL2. Day 6: Network Monitoring Setup Deploy and configure network monitoring tools for real-time traffic analysis and threat detection. Address any security issues identified during penetration testing. Day 7: Final Testing, Documentation, and Handover Conduct thorough end-to-end testing of all implemented solutions. Prepare and deliver comprehensive project documentation and guides. Handover and provide post-deployment support. Deliverables Fully configured Docker environment with integrated SSO. Red/Blue team setup documentation and configuration files. Penetration testing report with remediation steps. Network monitoring system deployed and operational. Final project documentation and user guides. Skills: Web Security, Network Administration, Internet Security, Git, Docker
Fixed budget:
30 - 250 USD
23 hours ago
|
|||||
Remove injected code and clean wordpress site
|
not specified | 20 hours ago |
Client Rank
- Good
$6 257 total spent
9 hires
13 jobs posted
69% hire rate,
open job
5.00
of 6 reviews
|
||
Hi, i have had this message from my webhost and i am looking for someone to fix the problem, can you help?
i am out of the office most of the day but i will keep checking in to see if you have replied thanks James The Sucuri Scanner found the following code injected via the active theme to the database: https://sitecheck.sucuri.net/results/https/www.female-seeds.co.uk http://labs.sucuri.net/db/malware/malware.magento_shoplift?51.16 The infection has spread among your WordPress posts/pages and it looks like that in the site's database: https://blog.sucuri.net/2024/04/magento-shoplift-ecommerce-malware-targets-both-wordpress-magento-cms.html Fortunately, your WordPress files appear to be unaffected and show no signs of malicious activity: Scanning: /home/u219-gac4k9rp6wtr/. Scanned Files : 23488 Scanner Hits : 0 It's important to note that our Site Scanner tool is designed to clean website files only, it seems the infection has targeted your WordPress database. Given this situation, I recommend consulting with a security expert to thoroughly clean your database. If you do not have a developer on hand and need assistance, you might consider our web development services available through our Expert Care support channel: https://eu.siteground.com/kb/expert-care-subscription/ Please feel free to reach out if you have any more questions or need further assistance. Sincerely, Nadya M. Technical Support Team
Skills: On-Page SEO, Web Development, PHP, WordPress Malware Removal, Internet Security, Virus Removal, Malware Removal, Website Security, WordPress, Website Migration, CMS Development, PHP Script
Budget:
not specified
20 hours ago
|
|||||
Recover business manager for fb celeb
|
not specified | 20 hours ago |
Client Rank
- Medium
1 jobs posted
100% hire rate,
open job
|
||
Facebook administrator who's been locked out of fb bm for 12 months. 15 meta requests and 15 meta replies saying there's been no breech. Still unable to get help. New computer, Microsoft business premium installed. Microsoft authenticator in use. Still no movement.
TheIceRoadAlex is the page in question. I am jackie.ameriault on fb. Maybe a lawyer is in order business can't find one lol
Skills: Facebook, Instagram, Troubleshooting, Digital Marketing, Ethical Hacking, Security Management, Internet Security, Facebook Page, Facebook Pixel Setup & Optimization, Facebook Ads Manager, Facebook Business Page, Technical Support, Instagram Ad Campaign, TikTok
Budget:
not specified
20 hours ago
|
|||||
Instagram and Facebook hacked
|
not specified | 18 hours ago |
Client Rank
- Medium
3 jobs posted
open job
|
||
Hola, me pongo en contacto con usted porque me gustaría obtener más información sobre sus servicios. Me hackearon e inhabilitaron la cuenta de Instagram y Facebook.
Estoy buscando a alguien serio, experto y cualificado que sepa recuperar cuentas hackeadas o inhabilitadas. En el mes de marzo me hackearon la cuenta de Instagram a través de Facebook, alguien entró desde el Facebook y vinculó una cuenta ajena dentro de mi perfil de Facebook y siguidamente entro en mi Instagram lo hackeo las dos cuenta, ahora mismo no puedo acceder a ninguna de mis redes sociales, intente por formulario, email, teléfono, por las plataformas de Instagram y Facebook pero no consigo acceder. Si crees que es posible recuperarlas, no dudes en ponerte en contacto conmigo para poder hablar y llegar a un acuerdo. Quedo pendiente para cualquir cosa. Un saludo y gracias. Joe
Skills: Security Assessment & Testing, Vulnerability Assessment, Kali Linux, Application Security, Penetration Testing, Network Security, Security Infrastructure, Manual Testing, Ethical Hacking, OWASP, Windows Server, NIST SP 800-53, Internet Security, Web Application Security, Security Engineering
Budget:
not specified
18 hours ago
|
|||||
Malware Removal for Bluehost Websites
|
not specified | 14 hours ago |
Client Rank
- Excellent
$95 687 total spent
13 hires
22 jobs posted
59% hire rate,
open job
4.76
of 5 reviews
|
||
I am seeking a skilled professional to perform malware removal on multiple Bluehost websites that are currently down. The ideal candidate should have experience with website security, malware detection, and removal. Your expertise is crucial to ensure that all sites are restored to full functionality and safeguarded against future threats. Please provide examples of similar work you have completed in the past.
Skills: Virus Removal, WordPress, WordPress Malware Removal, Internet Security
Budget:
not specified
14 hours ago
|
|||||
I’ve been hacked & want to know by who
|
not specified | 13 hours ago |
Client Rank
- Risky
|
||
I’ve been hacked & have been receiving threats ! I’ve been receiving threatening messages & so has my family members. I just want to trace the number that has been messaging me.
Skills: Penetration Testing, Information Security, Vulnerability Assessment, Application Security, System Security, Firewall, Ethical Hacking, Security Analysis, Security Infrastructure, Security Testing, Internet Security, Database Security, Security Assessment & Testing
Budget:
not specified
13 hours ago
|
|||||
Instagram got hacked
|
not specified | 10 hours ago |
Client Rank
- Risky
2 jobs posted
open job
|
||
Urgent: Instagram got hacked .
My instagram got hacked .I discovered that my password, email, phone number and two factor authentication had been changed, and unauthorised posts were made. I have attempted to reset my password, but it was unsuccessful. My account activity shows suspicious stories containing scam links. I am the rightful owner of this account. I am requesting you to please help me to get my account back.
Skills: Facebook, Instagram, Social Media Management, Cybersecurity Management, Data Recovery, Troubleshooting, Ethical Hacking, Vulnerability Assessment, Network Security, Information Security, Technical Support, Internet Security, Instagram API, Social Media Account Setup, Social Media Marketing
Budget:
not specified
10 hours ago
|
|||||
Malware testing for detection and response
|
300 USD | 4 hours ago |
Client Rank
- Excellent
$101 651 total spent
70 hires
148 jobs posted
47% hire rate,
open job
4.89
of 41 reviews
|
||
Looking someone to evaluate an new EDR solution, against other EDRs, under different frameworks, Testing scope will be provided, Looking someone who can work with offshore team and complete the testing, we need someone who knows how to work with offshore developers and get desired results, this may become on going task once we go for proper certifications
Skills: Information Security, Network Security, Penetration Testing, Security Analysis, Internet Security
Fixed budget:
300 USD
4 hours ago
|
|||||
Need a ethical hacker
|
not specified | 52 minutes ago |
Client Rank
- Risky
|
||
Need a ethical hacker for a smll project related to cyber security
Skills: Security Testing, Network Security, Vulnerability Assessment, Penetration Testing, Web Application Security, Network Penetration Testing, Internet Security, Information Security Audit, Website Security, API Testing, OWASP, Code Review, Web App Penetration Testing, Security Assessment & Testing, Ethical Hacking
Budget:
not specified
52 minutes ago
|
Streamline your Upwork workflow and boost your earnings with our smart job search and filtering tools. Find better clients and land more contracts.