Penetration Testing Jobs

34 were found based on your criteria {{ paging.total|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Hourly - Entry Level ($) - Est. Time: More than 6 months, 30+ hrs/week - Posted
I have already designed a website but I want to secure the website from all threats: 1-Secure the login screen. 2-Using Secure sessions 3-Security testing I need someone to give me upgrade my skills in that and teach me all the required skills for that help me complete some work using JQuery & PHP, Please you should apply if you already a good programmer, I'm using PHP + bootstrap + Javascript + JQuery + MySQL. Please make sure you have the skills to do this work. I'll pay 5$ to 6$ per hour for this job. Last thing: you'll be working on my machine. Also share your skype ID.
Skills: Penetration Testing Information Security jQuery PHP
Fixed-Price - Intermediate ($$) - Est. Budget: $25 - Posted
We have an email account that is hosted on google apps for work. We would like to pentest this email address i.e. get access to the email by phishing or using any other means, enable pop3/imap and download all the sent and received emails along with any attachments using an email client. The emails are then exported and saved in a file. Copy of downloaded emails are to be left untouched.
Skills: Penetration Testing Internet Security Network Security
Fixed-Price - Intermediate ($$) - Est. Budget: $250 - Posted
Background : a normal proxy requires the computer running the proxy to have it's ports open and forwarded. I need proxy that does not need the Remote Computer to perform Port forwarding and instead it will be my computer which will need the ports forwarded and open, hence why its called a reverse proxy. you can read more about reverse proxies here http://backproxy.blogspot.ca/ Functionally: the program will be divided by two : Server side & Client side. 1.Server side: the server side will run on my computer and will include a listener option to listen on incoming connections. it will have 2 options : Start, Build. 1.2)Start - the start option will let me configure a port number, and start a listener on that port 1.3)Build- the build option will configure the client side (proxy.exe). it will have the option to input my public IP ( for the listener to listen on) and port. after pressing ' build' it will produce an FUD executing file (proxy.exe) to the Proxy folder. 2)Client Side : the client Side is basically the executing file that came from the server builder - its the proxy.exe It needs to run on any windows system, open a connection to my public IP, and connect to the server which is listening on that IP:Port, according to the configurations on 1.3 in the end, i need to be able to surf the web from an other Public IP. add over skype : rick.fridman
Skills: Penetration Testing C C# C++
Hourly - Expert ($$$) - Est. Time: Less than 1 week, 10-30 hrs/week - Posted
I am looking to weaponize and add shellcode to MS12-020 PoC code. Please let me know your experience, budget and timeline to complete. The code should be written as a metasploit module in Ruby, or in Python. Thank you! For more information, please see... https://www.exploit-db.com/exploits/18606/ https://pentestlab.wordpress.com/2012/03/26/microsoft-rdp-vulnerability-poc/ http://pastebin.com/G99npvDy
Skills: Penetration Testing Information Security Vulnerability assessment
Hourly - Expert ($$$) - Est. Time: More than 6 months, 10-30 hrs/week - Posted
I am looking to find a highly skilled programmer / penetration tester to join my company. I am focused on paid advertising as an affiliate and drive a lot of traffic to different offers throughout various GEOs. This is a very interesting and lucrative market if this is something of interest send me a message
Skills: Penetration Testing Internet Marketing JavaScript Malware
Hourly - Expert ($$$) - Est. Time: More than 6 months, Less than 10 hrs/week - Posted
Looking for a report (monthly if goes well) regarding our business showing any online or physical threats that may impact our work. Password dumps with our domain, deep web searches, darknet searches, only information that impacts our company should be provided. Do not ask me what information should be collected, I am looking for an expert to tell me what is important and why. Only serious bids will be reviewed.
Skills: Penetration Testing Internet Security Research